1/242
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the Transport Layer PDU called?
Segment (or Datagram for UDP)
What action discards unsaved router configuration changes (reverts to NVRAM config)?
Reboot the router without saving.
What is the PRIMARY function of powerline networking technology?
To connect devices to a network using existing electrical wiring.
Describe the TCP/IP encapsulation sequence.
Segments → Packets → Frames → Bits
Which command or key returns to the previous level in the Cisco command hierarchy?
exit
What are two characteristics of RAM in Cisco devices?
Stores the running configuration and is volatile (contents lost on power-off).
What is the result of issuing the copy running-config startup-config command?
Saves the current operating configuration (RAM) to the non-volatile memory (NVRAM).
The primary function of the service password-encryption command is to:
Encrypt all configured plaintext passwords in the configuration file.
What are the minimum security requirements for a small office network?
Antivirus software/antimalware and a firewall.
Which TWO criteria help select a network medium?
Distance and Cost (or Distance and Environment).
Pressing the Tab key in Cisco IOS:
Completes the command being typed.
DNS, DHCP, and FTP are protocols that reside at which TCP/IP layer?
Application Layer
Which of the following BEST describes an intranet?
A private network accessible only by authorized members of an organization (internal access).
What is the purpose of Ctrl-Shift-6 on a switch during a ping?
To interrupt or abort the running process (e.g., ping or traceroute).
What is the purpose of flow control in computer communication?
Ensuring data is not sent too fast for the receiver to process.
Accidentally allowing patients to view other patients' medical records violates which network security characteristic?
Confidentiality
What is being configured by the commands interface vlan 1 and ip address… on a switch?
A Switch Virtual Interface (SVI).
What does configuring a Switch Virtual Interface (SVI) with an IP address enable?
Remote network management of the Layer 2 switch.
Which command is used to verify the condition, status, and configured IP addresses of switch interfaces?
show ip interface brief
During encapsulation, a logical address is added at which OSI model layer?
Network layer (Layer 3)
From the client's perspective, what is the correct decoding order for a received web page transmission?
Ethernet, IP, TCP, HTTP
In the TCP/IP model, which layer routes messages through an internetwork?
Internet layer
During OSI encapsulation, physical addresses are added at which layer?
Data Link layer (Layer 2)
What is the PDU at the network layer called?
Packet
When a computer requests data and a server response is excessively delayed, how does the computer react?
It assumes no answer is coming (timeout).
Bits received by a NIC from the network medium use which PDU format?
Frame
Which three OSI model layers map to the TCP/IP Application Layer?
Application, Presentation, and Session.
Which function does a router perform in an internetwork?
Determine the message path through the network (Routing).
Which of the following lists the four layers of the TCP/IP model?
Application, Transport, Internet, and Network Access.
In the TCP/IP model, which layer is responsible for reliable data transmission between applications?
Transport layer
most common and relevant protocol suite used today. It's an Open Standard Protocol suite maintained by the IETF
Internet Protocol Suite or TCP/IP
provide authentication, data integrity and data encryption. (SSH, SSL, TLS)
network security protocols
assures users of timely and reliable access to data services for authorized users
availability
this protocol manages the individual conversation. It's responsible for guaranteeing the reliable delivery of the information and managint flow control between the end devices.
Transmission Control Protocol (TCP)
family of protocols developed by the ISO and ITU.
Open Systems Interconnection (OSI) protocols
layer that provides services to the presentation layer to organize its dialogue and to manage data exchange
Session (5)
benefts of using a layered network model
assists in protocol design
fosters competition between vendors
prevents a technology that functions at one layer from affecting any other layer
provides a common language for describing network functionality
helps in visualizing the interaction between each layer and protocols between each layer
describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device
Physical (1)
illustrate devices, ports and the addressing scheme of the network
Logical Topology Diagrams
identifies the sender and the intended receiver of the message using a defines addressing scheme (Ethernet, IPv4, IPv6)
addressing
this protocol is responsible for the delivery of messages from one NIC to another NIC on the same LAN
Ethernet
enable remote access to the control plane of network devices
VTY lines
general term that is used to describe a piece of data at any layer of a networking model
Protocol data unit
primary benefits of segmenting messages
Increases speed (multiplexing) and efficiency of network communications.
contain malicious software or code running on a user device
viruses, worms and trojan horses
command used for test connectivity
ping
command used for change the host's name
hostname
process of converting information into the proper form for transmission
encoding
organization that develops, updates and maintains internet and TCP/IP technologies. This include RFC documents
Internet Engineering Task Force (IETF)
third layer in the OSI model, responsible for faciliting communication between different networks
Network (3)
occur on the first day that a vulnerability becomes known
Zero-day (or zero-hour) attacks
insecure, in-band method of remotely establishing a CLI session. it's not encrypted.
Telnet
these provide secure access into an organization for remote workers
Virtual Private Networks (VPN)
in-band and recomended method for remotely establishing a secure CLI connection, through a virtual interface over a network. It's encrypted.
SSH (Secure Shell)
a malicious person attacks user devices or network resources
threat actor attacks
process of numbering segments so that a complete message can be correctly reassembled at the destination device
sequencing
network protocol primarily used for connecting to and managing the operating system of a network device
SSH (Secure Shell)
data is sent from a single source device to all devices on the same local network segment
Broadcast
what are two characteristics of a scalable network?
grows in size without impacting existing users
suitable for modular devices that allow for expansion
physically connects the end device to the network
Network Interface Card (NIC)
32-bit value that differentiates the network portion of the address from the host portion
Subnet Mask
types of software which are installed on a user's device. The software then secretly collects information about the user
Spyware / Adware
network's ability to operate reliably even when components fail.
Fault Tolerance
what type of network must a home user access in order to do online shopping?
the Internet
three components of message timing
Flow Control, Response Timeout, Access Method
organization best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment
Electronic Industries Alliance (EIA)
mechanism that enforces a time limit for completing a network operation
Response Timeout
one of the largest and oldest communication standards organizations. Define standards for video compression, Internet Protocol Television (IPTV) and broadband communications, such as a digital subscriber line (DSL)
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)
responsible for promoting the open development and evolution of internet use throughout the world
Internet Society (ISOC)
manages the rate of data transmission between devices to prevent a fast sender from overwhelming a slow receiver
Flow Control
physical management port that provides out-of-band access to a Cisco device.
Console Port
contains protocols used for process-to-process communications
Application Interface
a size used by corporation and schools which can have many locations
medium to large network
responsible for delivering messages from the sender to the receiver. Is used by routers to forward the messages across multiple networks.
Internet Protocol (IP)
focused on long-term research related to internet and TCP/IP protocols such as Anti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG) and Peer-to-Peer Research Group (P2PRG)
Internet Research Task Force (IRTF)
small segment of a larger message used to transmit data over networks
Packet
connects hundreads of millions of computers world-wide
The Internet
which two internet connection options do not require that psysical cables be run to the building?
Cellular and Satellite
a connector or outlet on a networking device where the media connects to an end device or another networking device
Physical Port
allows users to interact with the system using an environment of gaphical icons, menus and windows
Graphical User Interface (GUI)
these attacks slow or crash applications and processes on a network device
Denial of Service (DoS)
data is encoded into pulses of light
Fiber-optic cable
layer responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network
Network layer (Layer 3)
divide the data into smaller, more manageable pieces to send over the network. Use the TCP/IP protocol suite to send data in individual IP packets
Segmentation
responsible for the overall management and development of internet standards
Internet Architecture Board (IAB)
coordinates IP address allocation, the management of domain names and assignment of other information used in TCP/IP protocols
Internet Corporation for Assigned Names and Numbers (ICANN)
blocks unauthorized access into and out of the network
Firewall (Firewall filtering)
command used to save the active configuration permanently
copy running-config startup-config
connect a few computers to each other and to the internet
Small Home Networks
determinate if data become corrupted during transmission. (Ethernet, IPv4, IPv6, TCP)
error checking
layer provides for common representation of the data transferred between application layer services
Presentation Layer
intermediary device, connect multiple device within a LAN
Switch
the left-most part of the IP address that indicates the network in which the IP address is a member. All devices on the same network will have the same one.
Network portion (or Prefix)
layer responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network
Data Link layer (Layer 2)
service offered by a provider to the customer that It allows the client to store/archive and/or process data
Cloud computing
protocols that enable routers to exchange route informatiom, compare path information and then to select the best path to the destination network. (OSPF, BGP)
Routing protocols
step of the communication process that identify the address of the sender and receiver
Message Formatting and Encapsulation
organization that provides access to the internet for businesses and individuals
Internet Service Provider (ISP)
this attack steals the login credentials of a user in order to access private data
Identity theft (or Credential theft)
process used to receive transmitted data and convert it into a readable messagee
decoding