2809ICT Computer Networking Essentials – Comprehensive Revision

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/80

flashcard set

Earn XP

Description and Tags

These question-and-answer flashcards cover the core concepts, definitions, commands, protocols and security practices discussed across all modules of 2809ICT Computer Networking Essentials, including networking fundamentals, switching, routing, subnetting, IPv6, LAN security, troubleshooting, and distributed ledger technologies.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

What are the four basic characteristics of a reliable network architecture?

Fault tolerance, Scalability, Quality of Service (QoS), and Security.

2
New cards

In networking diagrams, what does a physical topology illustrate?

The physical location of devices and how they are interconnected.

3
New cards

What IOS command encrypts all plaintext passwords in the running-config?

service password-encryption

4
New cards

Which IOS mode is entered with the command "enable"?

Privileged EXEC mode (Switch# or Router#).

5
New cards

How is a /24 subnet mask written in dotted decimal notation?

255.255.255.0

6
New cards

Name the three elements that every communication system must include.

Source (sender), Destination (receiver), and Channel (transmission media).

7
New cards

Which three aspects are defined by a protocol?

Syntax, Semantics, and Timing.

8
New cards

Define Unicast, Multicast, and Broadcast message delivery.

Unicast: one-to-one; Multicast: one-to-many (selected); Broadcast: one-to-all (IPv4 only).

9
New cards

What two IP addressing parts exist in every IPv4 address?

Network portion and Host portion.

10
New cards

At Layer 2, which addresses does a frame carry when the source and destination are on the same LAN?

Source MAC = NIC of sender; Destination MAC = NIC of destination device on the same link.

11
New cards

What is the purpose of the Logical Link Control (LLC) sublayer?

To identify the Layer-3 protocol and allow multiple network layer protocols to share the same interface and media.

12
New cards

What Ethernet access method is used in half-duplex LANs?

CSMA/CD (Carrier Sense Multiple Access/Collision Detection).

13
New cards

Which wireless LAN access method attempts to avoid collisions rather than detect them?

CSMA/CA (Collision Avoidance).

14
New cards

How does a switch learn MAC addresses?

By examining the Source MAC address of incoming frames and storing it with the ingress port in the MAC address table.

15
New cards

What happens when a switch receives a frame with an unknown destination MAC?

The frame is flooded out all ports except the port it arrived on.

16
New cards

What is a broadcast domain and which device breaks it?

All devices that receive broadcast traffic on a LAN; a router (Layer-3 device) breaks broadcast domains.

17
New cards

List the three common VLAN types defined in class.

Data VLAN, Native VLAN, Management VLAN.

18
New cards

What command sets an access port to VLAN 20?

switchport access vlan 20

19
New cards

Which IEEE standard defines VLAN trunk tagging?

IEEE 802.1Q

20
New cards

What field in the 802.1Q header holds the VLAN ID?

The 12-bit VLAN ID (VID) field.

21
New cards

Name two Cisco-specific commands that disable DTP negotiations on a port.

switchport mode access (on access ports) and switchport nonegotiate (on trunk ports).

22
New cards

Why is STP required in a redundant Layer-2 topology?

To prevent Layer-2 loops that cause broadcast storms, MAC table instability, and link saturation.

23
New cards

List the four main steps STP uses to create a loop-free topology.

Elect Root Bridge, Elect Root Ports, Elect Designated Ports, Identify Alternate (blocked) Ports.

24
New cards

What is EtherChannel?

A technology that bundles multiple physical links into one logical link for redundancy and increased bandwidth without being blocked by STP.

25
New cards

Which three route source codes might appear in a Cisco IPv4 routing table?

C (Connected), S (Static), O (OSPF) – other codes include L, D, etc.

26
New cards

What type of route forwards traffic when there is no specific match in the routing table?

Default route.

27
New cards

Why must a Layer-2 switch be configured with a default gateway?

To allow remote management (e.g., SSH/Telnet) from outside its local network.

28
New cards

Explain "Router-on-a-Stick" inter-VLAN routing.

A single router interface configured as an 802.1Q trunk with multiple subinterfaces, each serving as a gateway for a different VLAN subnet.

29
New cards

What IPv4 header field prevents a packet from circulating indefinitely?

Time to Live (TTL).

30
New cards

Which IPv6 header field replaces the IPv4 TTL?

Hop Limit.

31
New cards

State the formula for maximum number of subnets created when borrowing bits.

2^b where b = number of borrowed bits.

32
New cards

State the formula for maximum usable hosts per subnet.

(2^r) – 2, where r = remaining host bits.

33
New cards

What is the first rule for shortening (compressing) an IPv6 address?

Omit leading zeros in any hextet.

34
New cards

What symbol (::) can replace one contiguous string of all-zero hextets in an IPv6 address?

A double colon (::) – but only once per address.

35
New cards

What is SLAAC?

Stateless Address Autoconfiguration – allows IPv6 hosts to self-configure a GUA using information from Router Advertisements.

36
New cards

Differentiate between Stateless and Stateful DHCPv6.

Stateless supplies supplemental info (DNS, domain) while host configures its own address via SLAAC; Stateful provides the IPv6 address, prefix, DNS, etc., similar to DHCPv4.

37
New cards

Describe the EUI-64 process used to create an IPv6 interface ID.

Insert FFFE in the middle of the 48-bit MAC and flip the 7th bit of the original MAC to 1.

38
New cards

Give two examples of Layer-2 security threats.

MAC address flooding (CAM table attack) and VLAN hopping.

39
New cards

Which feature helps mitigate DHCP starvation and spoofing attacks?

DHCP Snooping.

40
New cards

What Layer-2 security feature validates ARP messages before updating the ARP table?

Dynamic ARP Inspection (DAI).

41
New cards

List two best practices to mitigate VLAN hopping attacks.

Disable DTP on access ports and set the native VLAN to a non-default VLAN other than VLAN 1.

42
New cards

What are the six basic troubleshooting steps (Cisco methodology)?

1) Identify the problem, 2) Establish theory of probable causes, 3) Test the theory, 4) Establish plan of action & implement, 5) Verify solution & implement preventive measures, 6) Document findings.

43
New cards

Define distributed ledger technology (DLT) in one sentence.

A peer-to-peer, append-only system that provides a shared, tamper-evident record of transactions without a central authority.

44
New cards

Name three key properties blockchain aims to provide.

Immutability (tamper-evident records), Traceability (provenance), and Censorship resistance.

45
New cards

Which data structure is used in blockchains to summarise all transactions in a block?

Merkle tree (Merkle root stored in the block header).

46
New cards

What consensus mechanism does Bitcoin employ?

Proof of Work (PoW).

47
New cards

What prevents "double-spending" in Bitcoin?

Timestamped PoW chain and network consensus on the longest valid chain.

48
New cards

List four core mechanisms combined in blockchain systems.

Peer-to-Peer networking, Hash functions, Asymmetric encryption (digital signatures), and Consensus algorithms with incentives.

49
New cards

What is a smart contract?

Program code stored and executed on a blockchain, automatically enforcing agreed rules and transferring value/state when conditions are met.

50
New cards

Explain "UTXO" in Bitcoin.

Unspent Transaction Output – a chunk of bitcoin value that can be consumed as an input in a future transaction.

51
New cards

Why is the nonce field important in a Bitcoin block header?

Miners vary the nonce to produce a hash below the difficulty target, proving work for the block.

52
New cards

What happens if two miners simultaneously discover valid blocks (fork)?

Both blocks propagate, forming parallel chains; the longest chain (most cumulative PoW) eventually becomes the accepted chain.

53
New cards

Which three IPv6 dynamic addressing methods were covered?

1) SLAAC only, 2) SLAAC + Stateless DHCPv6, 3) Stateful DHCPv6 only.

54
New cards

In Cisco switches, what command converts an interface to a trunk manually?

switchport mode trunk

55
New cards

Name two advantages of using a layered network model.

Encourages vendor interoperability and isolates technology changes to individual layers.

56
New cards

Place these PDUs in order from Layer-7 down to Layer-1: Packet, Frame, Segment, Bits, Data.

Data, Segment, Packet, Frame, Bits.

57
New cards

What conversion operations between numbering systems should a student know for the exam?

Binary–Decimal, Binary–Hex, Decimal–Hex (and vice-versa), plus logical AND operation.

58
New cards

Give two properties that make fiber-optic cabling attractive for network backbones.

Longer distance transmission with low attenuation and immunity to EMI/RFI.

59
New cards

Which IEEE standards correspond to Wi-Fi, Bluetooth, and WiMAX?

Wi-Fi – 802.11; Bluetooth – 802.15; WiMAX – 802.16.

60
New cards

What does the switchport trunk native vlan command do?

Sets which VLAN’s frames are sent untagged on a trunk link.

61
New cards

Which STP standard is defined by IEEE?

IEEE 802.1D.

62
New cards

What Cisco proprietary protocol negotiates trunk links?

Dynamic Trunking Protocol (DTP).

63
New cards

Why is NAT considered a limitation of IPv4?

It breaks true end-to-end connectivity, adds complexity, latency, and complicates troubleshooting.

64
New cards

What is the main goal of Variable Length Subnet Masking (VLSM)?

To allocate IP address space efficiently by creating subnets of different sizes based on host requirements.

65
New cards

Describe "Fault Tolerance" in network architecture.

The ability of a network to continue operating properly even when a component fails.

66
New cards

What command shows the routing table on a Cisco router?

show ip route

67
New cards

Which field in the IPv4 header is used for QoS marking?

Differentiated Services (DS) field.

68
New cards

What Cisco attack mitigation technique prevents IP/MAC spoofing on a port?

IP Source Guard (IPSG).

69
New cards

Which security practice secures device management traffic within a dedicated VLAN?

Using a management VLAN and restricting it with ACLs or out-of-band management.

70
New cards

What process is used to convert data down the OSI stack before transmission?

Encapsulation.

71
New cards

Define "Scalability" in the context of network design.

The capability to grow and adapt to increased demand without reducing performance.

72
New cards

What is meant by "Quality of Service"?

Techniques to manage network resources and guarantee performance (delay, bandwidth, jitter) for critical traffic.

73
New cards

Why are broadcast frames forwarded by switches but typically blocked by routers?

Switches operate at Layer-2 and forward broadcasts within a LAN; routers operate at Layer-3 and do not forward Layer-2 broadcasts, thereby containing broadcast domains.

74
New cards

What advantage does EtherChannel provide during link failure?

The logical bundle stays up, so traffic automatically redistributes across remaining active links without STP reconvergence.

75
New cards

Which subnet ID field in IPv6 addressing allows easy subnetting within an organisation?

The 16-bit subnet ID field between the Global Routing Prefix and Interface ID.

76
New cards

What is "Anycast" in IPv6?

An address assigned to multiple devices where traffic is routed to the nearest (topologically) device holding that address.

77
New cards

Give one example where an out-of-band management network is useful.

Managing switches/routers even when the production network is down or under attack.

78
New cards

Name two common consensus algorithms besides Proof of Work.

Proof of Stake and Practical Byzantine Fault Tolerance (PBFT).

79
New cards

What property do hash functions provide that is crucial for blockchain integrity?

Collision resistance and the ability to verify data integrity with fixed-length outputs.

80
New cards

Why is formal verification important in DLT systems?

To mathematically prove protocol correctness and reduce vulnerabilities in implementation.

81
New cards

What Cisco feature enforces a maximum number of MAC addresses on a switch port?

Port Security (with static, sticky, or dynamic MAC limits).