Block 3 Highlights

5.0(1)
studied byStudied by 53 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/89

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

90 Terms

1
New cards

Switches use _______ ______ _______ ______ to build and maintain MAC address tables, which is used to help make forwarding decisions.

Application Specific Integrated Circuits (ASICs)

2
New cards

______ learn each connected physical device identified by a unique 48-bit MAC address and breaks up collision domains.

Switches

3
New cards

Each ____ on a switch is a separate collision domain.

Port

4
New cards

A ______ ______ is when devices share same bandwidth.

Collision domain

5
New cards

Hardware-based switching performance uses ______ to form multiple internal connections

ASICS

6
New cards

Which switching performance adjusts speed/bandwidth and interface may support up to 1GB bandwidth, but a device NIC may only support 100Mbps?

Wire speed

7
New cards

Which switching performance is fast?

Low latency

8
New cards

Which switching performance segment networks?

Broadcast control

9
New cards

Which external component allows local access to initially configure ‘blank’ switch?

Console Port

10
New cards

According to DoD policy the console port should be _______ protected

Password

11
New cards

Which layer 2 protocol establishes communication between two network devices without relying on any host or network system?

PPP (Point to Point)

12
New cards

______ layer protocol operates over a point-to-point link.

Data link

13
New cards

Which layer 2 protocol prevent loops in Ethernet networks to maintain a loop-free topology and ensures efficient and reliable data transmission.

Spanning Tree Protocol (STP)

14
New cards

The Spanning Tree Protocol is standardized by IEEE _____.

802.1D

15
New cards

The Spanning Tree Protocol is layer ____ switching loop-prevention protocol

2

16
New cards

What describes the switching method Store-and-Foward?

• Stores entire frame in memory and checks frame for errors.

• Error checking is done with CRC (Cyclic Redundancy Check).

• Frame is discarded if error is found.

• Ensures high level of error-free traffic.

17
New cards

Loops are _____ paths to the same direction

Multiple

18
New cards

Switches are ______ to other switches allowing multiple paths.

Connected

19
New cards

What are 3 things that loops can cause?

  1. Broadcast strorms

  2. Multiple frame copies

  3. Multiple loops

20
New cards

Loops can occur within loops consuming _______.

Bandwidth

21
New cards

Spanning Tree Protocol IEEE 802.1D used for _____ _______.

Loop avoidance

22
New cards

What is a logical grouping of network devices into a single broadcast domain?

VLAN

23
New cards

Communication between VLANs requires a _______ routing process.

Layer 3

24
New cards

Communication between VLANs requires a _______ routing process.

Layer 3

25
New cards

VLANs are created on a switch and can span _____ switches.

Multiple

26
New cards

Switches are configured with default _____ by manufactures.

VLAN 1

27
New cards

Ports must be assigned ________ to create VLANs

Membership

28
New cards

What is a trunk port or trunk link?

Connection that carries multiple VLANs

29
New cards

VLAN ____ are applied to frames identifying individual VLANs

Tags

30
New cards

What does the IEEE 802.1q do?

Encapsulates and tags a VLAN frame by utilizing existing space in a data frame header

31
New cards

What is open standard VLAN trunking?

IEEE 802.1q

32
New cards

Unused ports should be shut down and assigned to an ______ VLAN

Inactive

33
New cards

All ports are assigned to VLAN 1 _________

Automatically

34
New cards

Ports should _____ be assigned to the default VLAN on any network for security.

Never

35
New cards

What is the Management VLAN used for?

Telnet, SSH, SNMP, and Syslog

36
New cards

The management VLAN should never be assigned to VLAN __

1

37
New cards

What forwards IP packets between networks using IP address?

Routers

38
New cards

Routers operate at what layer of the OSI model?

Network (Layer 3)

39
New cards

Routers connect ___ or more lines from different networks

Two

40
New cards

When routers connect two or more lines from different networks, the connections form a ________.

Internetwork

41
New cards

_______ refers to taking a packet from one device on one network and sending it to another device on a different network.

Routing

42
New cards

_____ _____ allows configuration using a modem. (often disabled due to its inherent security risk)

Auxiliary Port

43
New cards

____ interfaces used for WAN connections

Serial

44
New cards

_____ interfaces used for LAN connections

Ethernet

45
New cards

______ _____ stores the startup configuration and loads it into RAM

Non-Volatile(NVRAM)

46
New cards

Non-Volatile means it will hold informations even with __ power

No

47
New cards

_____ contains running configuration and is used for operations

RAM

48
New cards

______ ______ routers serves as an access point to and from a specific subnet or network

Default Gateway

49
New cards

IP is a ____ _____

Routed protocol

50
New cards

IP provides _________ best effort delivery of packets

Connectionless

51
New cards

IP provides ________ and _______ of packets if necessary

Fragmentation and reassembly

52
New cards

What is the ICMP?

Internet Control Message Protocol

53
New cards

The ICMP can be used to ______ packets for destination arrival

Monitor

54
New cards

ICMP examples include :

  1. Destination Unreachable

  2. Time Exceeded

  3. Router Advertisement

  4. Echo Request and Echo Reply known as Packet Internet Groper (PING)

55
New cards

What are routing protocols?

Protocols responsible for path determination and packet switching

56
New cards

Routing Protocols are used by networks to learn about _____ and calculate best path

Networks

57
New cards

Routers may know about the same path from ______ sources

Different

58
New cards

What is routing decisions?

Routers use routing tables to determine the best path. Routers populate their routing tables by learning paths to network

destinations. The paths can be learned from static routes, default routes or dynamic routes.

59
New cards

Path with lowest Administrative Distance (AD) is chosen when it knows about the ____ ____ destination from one or more routing sources.

Same exact

60
New cards

The lower the (AD) Metric the more ______ the route.

Trustworthy

61
New cards

_____ _____ are manually configured by system administrator

Static routes

62
New cards

What are the characteristics of a Default Route?

  1. Type of static route

  2. Used by router if no path to destination is known

  3. Also known as the ‘Gateway of Last Resort’

  4. Gives all traffic a path out of router

63
New cards

Routing algorithms use _____ to determine best route

Metrics

64
New cards

The Path Length routing algorithm is the ____ _____ ____ _____.

Most relied upon metric

65
New cards

In the Path Length routing algorithm, cost is calculated as the sum of all ____ associated with each link traversed

Costs

66
New cards

____ ____ is the number of Internet working devices from source to destination

Hop Count

67
New cards

What is the definition of the routing algorithm Reliability?

Up time

68
New cards

What is the definition of the routing algorithm Delay?

Length of time required to move packet from source to location

69
New cards

What is the definition of the routing algorithm Bandwidth?

Available capacity of link.(More bandwidth may not be the better path if link is at capacity)

70
New cards

What is the definition of the routing algorithm Load?

Degree to which a network resource is busy

71
New cards

RIPv2 allows _______ length subnet masking

Variable

72
New cards

In the Routing Information Protocol (Distance Vector), The metric hop count is limited to ___ hops.

15

73
New cards

The Border Gateway Protocol(BGP) exchanges routing information between _________ systems

Autonomous

74
New cards

The only purpose of the core layer is to _______ large amounts of traffic quickly and reliably.

Transport

75
New cards

The Spanning Tree Protocol is layer ____ switching loop-prevention protocol

2

76
New cards

What are the characteristics of the design considerations Speed?

  1. Core layers are designed with speed in mind

  2. Don’t slow down traffic such as applying access control lists, routing, and packet filtering when possible

77
New cards

What is the primary function of the Distribution Layer?

Providing routing, filtering, WAN access and determining how packets can access the core layer.

78
New cards

The distribution layer is the place to _______ polices for your network

Implement

79
New cards

The access layer is the _______ _____ and includes hubs and switches to connect nodes such as workstations and other end-user devices to the network.

Aggregation point

80
New cards

What are the functions in Client Connections?

  1. Shared bandwidth devices

  2. Switched bandwidth devices

  3. Layer 2 functions such as VLAN membership

  4. Traffic filtering based on MAC

81
New cards

What are the 3 device layers?

  1. Core layer

  2. Distribution layer

  3. Access layer

82
New cards

A Subnet is a network within a ______

Network

83
New cards

What are two characteristics of a Subnet?

  1. Logical division of a network of connected devices based on the IP address

  2. Separate and identifiable portion of an orginization network

84
New cards

What are the 3 parts of an IP address?

Network portion, Subnet mask, Host portion

85
New cards

_______ is when the networking portion borrows bits from the host portion

Subnetting

86
New cards

Provides most available subnets because class __ has more host bits to borrow from

A

87
New cards

Variable Length Subnet Masking(VLSM) is used when _______ a network(Based on network needs)

Subnetting

88
New cards

Any one subnet can be _____ _____ into further subnets

Broken down

89
New cards

______ ______ ______ ______ allows efficient use of IP addressing by allowing each subnet to have a different number of host, depending on their requirements.

Variable Length Subnet Masking

90
New cards

Variable Length Subnet Masking results in ______ the number of wasted addresses

Reducing