CCNA cap1-3 finale

0.0(0)
studied byStudied by 4 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/242

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

243 Terms

1
New cards

What is the Transport Layer PDU called?

Segment (or Datagram for UDP)

2
New cards

What action discards unsaved router configuration changes (reverts to NVRAM config)?

Reboot the router without saving.

3
New cards

What is the PRIMARY function of powerline networking technology?

To connect devices to a network using existing electrical wiring.

4
New cards

Describe the TCP/IP encapsulation sequence.

Segments → Packets → Frames → Bits

5
New cards

Which command or key returns to the previous level in the Cisco command hierarchy?

exit

6
New cards

What are two characteristics of RAM in Cisco devices?

Stores the running configuration and is volatile (contents lost on power-off).

7
New cards

What is the result of issuing the copy running-config startup-config command?

Saves the current operating configuration (RAM) to the non-volatile memory (NVRAM).

8
New cards

The primary function of the service password-encryption command is to:

Encrypt all configured plaintext passwords in the configuration file.

9
New cards

What are the minimum security requirements for a small office network?

Antivirus software/antimalware and a firewall.

10
New cards

Which TWO criteria help select a network medium?

Distance and Cost (or Distance and Environment).

11
New cards

Pressing the Tab key in Cisco IOS:

Completes the command being typed.

12
New cards

DNS, DHCP, and FTP are protocols that reside at which TCP/IP layer?

Application Layer

13
New cards

Which of the following BEST describes an intranet?

A private network accessible only by authorized members of an organization (internal access).

14
New cards

What is the purpose of Ctrl-Shift-6 on a switch during a ping?

To interrupt or abort the running process (e.g., ping or traceroute).

15
New cards

What is the purpose of flow control in computer communication?

Ensuring data is not sent too fast for the receiver to process.

16
New cards

Accidentally allowing patients to view other patients' medical records violates which network security characteristic?

Confidentiality

17
New cards

What is being configured by the commands interface vlan 1 and ip address… on a switch?

A Switch Virtual Interface (SVI).

18
New cards

What does configuring a Switch Virtual Interface (SVI) with an IP address enable?

Remote network management of the Layer 2 switch.

19
New cards

Which command is used to verify the condition, status, and configured IP addresses of switch interfaces?

show ip interface brief

20
New cards

During encapsulation, a logical address is added at which OSI model layer?

Network layer (Layer 3)

21
New cards

From the client's perspective, what is the correct decoding order for a received web page transmission?

Ethernet, IP, TCP, HTTP

22
New cards

In the TCP/IP model, which layer routes messages through an internetwork?

Internet layer

23
New cards

During OSI encapsulation, physical addresses are added at which layer?

Data Link layer (Layer 2)

24
New cards

What is the PDU at the network layer called?

Packet

25
New cards

When a computer requests data and a server response is excessively delayed, how does the computer react?

It assumes no answer is coming (timeout).

26
New cards

Bits received by a NIC from the network medium use which PDU format?

Frame

27
New cards

Which three OSI model layers map to the TCP/IP Application Layer?

Application, Presentation, and Session.

28
New cards

Which function does a router perform in an internetwork?

Determine the message path through the network (Routing).

29
New cards

Which of the following lists the four layers of the TCP/IP model?

Application, Transport, Internet, and Network Access.

30
New cards

In the TCP/IP model, which layer is responsible for reliable data transmission between applications?

Transport layer

31
New cards

most common and relevant protocol suite used today. It's an Open Standard Protocol suite maintained by the IETF

Internet Protocol Suite or TCP/IP

32
New cards

provide authentication, data integrity and data encryption. (SSH, SSL, TLS)

network security protocols

33
New cards

assures users of timely and reliable access to data services for authorized users

availability

34
New cards

this protocol manages the individual conversation. It's responsible for guaranteeing the reliable delivery of the information and managint flow control between the end devices.

Transmission Control Protocol (TCP)

35
New cards

family of protocols developed by the ISO and ITU.

Open Systems Interconnection (OSI) protocols

36
New cards

layer that provides services to the presentation layer to organize its dialogue and to manage data exchange

Session (5)

37
New cards

benefts of using a layered network model

  1. assists in protocol design

  2. fosters competition between vendors

  3. prevents a technology that functions at one layer from affecting any other layer

  4. provides a common language for describing network functionality

  5. helps in visualizing the interaction between each layer and protocols between each layer

38
New cards

describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device

Physical (1)

39
New cards

illustrate devices, ports and the addressing scheme of the network

Logical Topology Diagrams

40
New cards

identifies the sender and the intended receiver of the message using a defines addressing scheme (Ethernet, IPv4, IPv6)

addressing

41
New cards

this protocol is responsible for the delivery of messages from one NIC to another NIC on the same LAN

Ethernet

42
New cards

enable remote access to the control plane of network devices

VTY lines

43
New cards

general term that is used to describe a piece of data at any layer of a networking model

Protocol data unit

44
New cards

primary benefits of segmenting messages

Increases speed (multiplexing) and efficiency of network communications.

45
New cards

contain malicious software or code running on a user device

viruses, worms and trojan horses

46
New cards

command used for test connectivity

ping

47
New cards

command used for change the host's name

hostname

48
New cards

process of converting information into the proper form for transmission

encoding

49
New cards

organization that develops, updates and maintains internet and TCP/IP technologies. This include RFC documents

Internet Engineering Task Force (IETF)

50
New cards

third layer in the OSI model, responsible for faciliting communication between different networks

Network (3)

51
New cards

occur on the first day that a vulnerability becomes known

Zero-day (or zero-hour) attacks

52
New cards

insecure, in-band method of remotely establishing a CLI session. it's not encrypted.

Telnet

53
New cards

these provide secure access into an organization for remote workers

Virtual Private Networks (VPN)

54
New cards

in-band and recomended method for remotely establishing a secure CLI connection, through a virtual interface over a network. It's encrypted.

SSH (Secure Shell)

55
New cards

a malicious person attacks user devices or network resources

threat actor attacks

56
New cards

process of numbering segments so that a complete message can be correctly reassembled at the destination device

sequencing

57
New cards

network protocol primarily used for connecting to and managing the operating system of a network device

SSH (Secure Shell)

58
New cards

data is sent from a single source device to all devices on the same local network segment

Broadcast

59
New cards

what are two characteristics of a scalable network?

  • grows in size without impacting existing users

  • suitable for modular devices that allow for expansion

60
New cards

physically connects the end device to the network

Network Interface Card (NIC)

61
New cards

32-bit value that differentiates the network portion of the address from the host portion

Subnet Mask

62
New cards

types of software which are installed on a user's device. The software then secretly collects information about the user

Spyware / Adware

63
New cards

network's ability to operate reliably even when components fail.

Fault Tolerance

64
New cards

what type of network must a home user access in order to do online shopping?

the Internet

65
New cards

three components of message timing

Flow Control, Response Timeout, Access Method

66
New cards

organization best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment

Electronic Industries Alliance (EIA)

67
New cards

mechanism that enforces a time limit for completing a network operation

Response Timeout

68
New cards

one of the largest and oldest communication standards organizations. Define standards for video compression, Internet Protocol Television (IPTV) and broadband communications, such as a digital subscriber line (DSL)

International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)

69
New cards

responsible for promoting the open development and evolution of internet use throughout the world

Internet Society (ISOC)

70
New cards

manages the rate of data transmission between devices to prevent a fast sender from overwhelming a slow receiver

Flow Control

71
New cards

physical management port that provides out-of-band access to a Cisco device.

Console Port

72
New cards

contains protocols used for process-to-process communications

Application Interface

73
New cards

a size used by corporation and schools which can have many locations

medium to large network

74
New cards

responsible for delivering messages from the sender to the receiver. Is used by routers to forward the messages across multiple networks.

Internet Protocol (IP)

75
New cards

focused on long-term research related to internet and TCP/IP protocols such as Anti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG) and Peer-to-Peer Research Group (P2PRG)

Internet Research Task Force (IRTF)

76
New cards

small segment of a larger message used to transmit data over networks

Packet

77
New cards

connects hundreads of millions of computers world-wide

The Internet

78
New cards

which two internet connection options do not require that psysical cables be run to the building?

Cellular and Satellite

79
New cards

a connector or outlet on a networking device where the media connects to an end device or another networking device

Physical Port

80
New cards

allows users to interact with the system using an environment of gaphical icons, menus and windows

Graphical User Interface (GUI)

81
New cards

these attacks slow or crash applications and processes on a network device

Denial of Service (DoS)

82
New cards

data is encoded into pulses of light

Fiber-optic cable

83
New cards

layer responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network

Network layer (Layer 3)

84
New cards

divide the data into smaller, more manageable pieces to send over the network. Use the TCP/IP protocol suite to send data in individual IP packets

Segmentation

85
New cards

responsible for the overall management and development of internet standards

Internet Architecture Board (IAB)

86
New cards

coordinates IP address allocation, the management of domain names and assignment of other information used in TCP/IP protocols

Internet Corporation for Assigned Names and Numbers (ICANN)

87
New cards

blocks unauthorized access into and out of the network

Firewall (Firewall filtering)

88
New cards

command used to save the active configuration permanently

copy running-config startup-config

89
New cards

connect a few computers to each other and to the internet

Small Home Networks

90
New cards

determinate if data become corrupted during transmission. (Ethernet, IPv4, IPv6, TCP)

error checking

91
New cards

layer provides for common representation of the data transferred between application layer services

Presentation Layer

92
New cards

intermediary device, connect multiple device within a LAN

Switch

93
New cards

the left-most part of the IP address that indicates the network in which the IP address is a member. All devices on the same network will have the same one.

Network portion (or Prefix)

94
New cards

layer responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network

Data Link layer (Layer 2)

95
New cards

service offered by a provider to the customer that It allows the client to store/archive and/or process data

Cloud computing

96
New cards

protocols that enable routers to exchange route informatiom, compare path information and then to select the best path to the destination network. (OSPF, BGP)

Routing protocols

97
New cards

step of the communication process that identify the address of the sender and receiver

Message Formatting and Encapsulation

98
New cards

organization that provides access to the internet for businesses and individuals

Internet Service Provider (ISP)

99
New cards

this attack steals the login credentials of a user in order to access private data

Identity theft (or Credential theft)

100
New cards

process used to receive transmitted data and convert it into a readable messagee

decoding