1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
1 to 126
Class A address range
128 to 191
Class B address aange
192 to 223
Class C address range
10.0.0 to 10.255.255.255
Class A private address range
172.16.0.0 to 172.31.255.255
Class B private address range
192.168.0.0 to 192.168.255.255
Class C private address range
The router translates between the private and public addresses using a process called ________________ ________________ ________________.
Network Address Translation (NAT)
Internet access can be facilitated for hosts using a private addressing scheme in two ways:
NAT (Network Address Translation) or Proxy Server
An intermediate server that retrieves data from an Internet source, such as a webpage, on behalf of a user. They act as additional security boundaries protecting users from malicious activity on the internet.
Proxy Server
Developed by Microsoft as a means for clients that could not contact DHCP server to communicate on the local network. If a Windows host does not receive response from a DHCP server within a given time frame, if selects an address at random from the range 169.254.1.1 to 169.254.254.254.
APIPA (Automatic Private IP Addressing)
224.0.0.0 to 239.255.255.255
Class D address range
240.0.0.0 to 255.255.255.255
Class E address range
Class ___ are used for multicasting
Class D
Class ___ are reserved from experiments use and testing
Class E
127.0.0.0 to 127.255.255.255
Loopback address range
Used when a specific address unknown. This is typically used as a source address by a client seeking a DHCP lease.
0.0.0.0/8
Used to broadcast to the local network when the local network address is not known.
255.255.255.255
Set a side for a variety if special prupose
100.64.0.0/10
192.0.0.0/24
192.88.99.0/24
198.18.0.0./15
Set a side for use in documentation and examples
192.0.2.0/24
198.51.100.0/24
203.0.113.0/24
The _______ table tracks layer 2 and implements it as content addressable memory (CAM). It is a special type of memory, optimized for searching, rather than random access.
CAM
IEEE 802.3x ________ _______________ allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its butter and causing it to drop frames.
Flow control
What is the purpose of subnetting?
Layer 3 segments
A ________ _____________ configuration validates the MAC address of end systems that connect to switch port. In most scenarios, the MAC address of servers and workstations does not change often.
Port Security
________ are useful to divide a network into logically distinct zones for security and administrative control.
VLANs
IPv4 ____________________ allows one host on the Internet (or private network) to send content to other hosts that have identified themselves as interested in receiving the originating host's content.
multicasting
________ ____: 255.0.0.0(/8). The first octet for _________ ____ is from 1 - 126. The default masks reengineer the classful scheme but allow network designers to create subnets of different numbers.
Class A
________ ____: 255.255.0.0 (/16). The first octet for ________ ____ is from 128 - 191. The Only remaining use of classful terminology is to describe the default subnet masks.
Class B
________ ____: 255.255.255.0(/24). The first octet for ________ ____ is from 192 - 223.
Class C
________ ____ refers to a group of hosts configured with the same IP address
Anycast
One method of addressing multiple hosts is to perform a ____________. An administrator performs a ____________ by sending a packet to the network or subnet's ____________ address
Broadcast
When an IPv4 host wants to send a packet to a single recipient, it uses a ____________ packet addressed to the IP address of the destination host.
Unicast
Implemented broadcasts occur at layer 2 by sending them to MAC address ______________________________. All hosts connected to the switch (or in the same VLAN) will receive them.
ff:ff:ff:ff:ff:ff
Nodes within each subnet can address one another directly since they are in the same broadcast domain, but they can only communicate with nodes in other subnets via the ____________.
Router
Most hosts are configured to obtain an address automatically, using a service called the ____________ ____________ ____________ ____________.
Dynamic Host Configuration Protocol (DHCP)
A command line utility that allows you to configure and display status of various network communications server roles and components after they are installed on computers running Windows Server.
* You can use ____________ to report the IP configuration.
* ____________ is implemented in the legacy command prompt interface. Script-based configuration is now more likely to use PowerShell cmdlets.
netsh (network shell)
IP:MAC address mappings held in the ARP cache of a Linux host
ip neigh
Utility to display and modify contents of host's cache of IP to MAC address mappings, as resolved by ____________ ____________ ____________ replies.
Address Resolution Protocol (ARP)
Command tool used to gather information about the IP configuration of a Windows host
IPConfig
Parameter assigned by a host to distinguish ambiguous interface addresses within a link local scope
zone index
Mechanism used in IPv6 for hosts to assign addresses to interfaces without manual intervention.
SLAAC (stateless address autoconfiguation)
A method of tunneling IPv6 packets over an IPv4 network
6to4
____________ ____________ means that hosts and routers process both IPv4 and IPv6 traffic simultaneously.
Dual statck
____________ ____________ ____________ is a measure of the latency or delay between the host sending the probe and receiving a reply. ping will report minimum, maximum and average ________ values
Round Trip Time, RTT
Linux command tool used to gather information about IP configuration of the network adapter or to configure the network adapter.
IP
IPv6 protocol used to identify link local nodes
Neighbor Discover (ND) protocol
Cross-platform command tool for testing IP packet transmissions
ping
Display the current configuration of TCP/IP on a given workstation - including the current IP address, DNS configuration, Windows Internet Naming Service (WINS) configuration, and default gateway
ipconfig(Windows), ifconfig (Linux/Unix/Mac)
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 802.1Q
B. STP
C. Flow control
D. CSMA/CD
B. STP (Spanning Tree Protocol)
The ____________ ____________ ____________ is used by hosts to determine which MAC address is associated with an IP address on the local network.
Address Resolution Protocol (ARP)
In the Linux, the ____________ ____________ command shows entries in the local ARP cache (replacing the old ________ command).
ip neigh, ARP
The ____________ ____________ ____________ ____________ is used to report errors and send messages about the delivery of packet. ____________ messages are generated under error conditions in most types of unicast traffic, but not for broadcast or multicast packets
Internet Control Message Protocol (ICMP), ICMP
____________ can also be used to test and troubleshoot connectivity issues on IP networks. The ____________ utility sends a configurable number and size of ____________ request packets to destination host. ____________ is implemented on both Windows and Linux hosts.
ICMP, ping ICMP, ping
Connectivity issue - Performing tests using ping
Ping loopback
Ping local host
Ping gateway
Ping remote host
Ping host name
Establish session
Ping the ____________ ____________ to verify TCP/IP installed and loaded correctly. If this fails, reinstall the network protocol stack.
Loopback address (ping 127.0.0.1)
Ping the Ip address of ____________ ____________ to verify it was added correctly and to verify that the network adapter is functioning properly. If you cannot ping your own address, there might have been a configuration error, or the network adapter or adapter driver could be fault.
local host
ping the IP address of ____________ ____________ to verify it is up and running and that you can communicate with another host on the local network.
default gateway
Ping the IP address of a ____________ ____________ to verify you can communicate through the router.
remote host
If you can successfully perform all connectivity tests by IP address but cannot ping be host name, then this suggests a ____________ ____________ problem.
name resolution
The ____________ command is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the queried name server(s).
The command ____________ is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux or Macintosh OS X operating system. The most typical use of ____________ is to simply query a single host.
dig (domain information groper)
A ____________ ____________ ____________ is a Simple Network Management Protocol (SNMP) flat file, nonrelational database that describes devices being monitored. Network management platforms monitor nodes by reading value of the managed resources in the ____________ .
MIB (Management Information Base)
A ____________ is a multihomed intermediate system with links and network topology information to facilitate forwarding packets between subnets or around internetwork.
router
Information about the location of IP networks and hosts is stored in the ____________ _________. Each entry in the ____________ _________ represents an available route to a destination network or host.
routing table
____________ network routes, for subnets to which the router is directly attached.
Direct
____________ network routes, for subnets and IP networks that are not directly attached.
Remote
____________ routes, for routes to specific IP address. A ____________route has a /32 network prefix.
Host
____________ routes, which are used when an extra match for a network or host route is not found.
The IP network or subnet for each active router interface is automatically added to the routing table.
directly connected routes
A ____________ route is manually added to the routing table and only changes if edited by the administrator. It can be problematic if the routing topology changes often, as each route on each affected route needs to be updated manually. ____________ routes can be configured either as non-persistent or persistent/permanent.
static
A ____________ route is removed from the routing table if the route is rebooted.
A ____________ route might be added as troubleshooting action, for instance. If a static route is not reachable, it will be disabled.
non-persistent
A ____________ route is special type of static route that identifies the next hop router for a destination that cannot be matched by another routing table entry. The destination address ____________(IPv4) or ____________(IPv6) is used to present the default route.
* Entry in the routing table to represent the forwarding path that will be used if no other entries are matched.
default, 0.0.0.0/0, ::/0
Fragmentation
Mechanism for splitting a layer 3 datagram between multiple frames to fit the maximum transmission unit (MTU) of the underlying Data Link network.
Entry in the routing table that has been learned from another router via a dynamic routing protocol.
Dynamic routing
Process whereby routers agree on routes through the network to establish the same network topology in their routing tables (steady state). The time taken to reach steady state is a measure of a routing protocol's convergence performance.
Convergence
Distance vector-based routing protocol that uses a hop count to determine the least-cost path to a destination network.
RIP (Routing Information Protocol)
The ____________ ____________ ____________ is designed to be used between routing domains in a mesh internetwork and as such is used as the routing protocol on the internet, primarily between ISPs.
Border Gateway Protocol (BGP)
Combines multiple physical connections into a single logical connection to minimize or prevent congestion.
Link Aggregation (IEEEE 802.2ad)
PoE 802.3af
Supplies 15.4 watts of DC power
PoE+ 802.3at
Supplies 25.5 watts of DC power
802.1x
User authentication
Permits or denies traffic based on a device's MAC address
MAC Filtering
Uses Hot Standby Router Protocol (HSRP) to create a virtual IP and MAC addresses to provide active and standby routers
First-Hop Redundancy
Permits or denies traffic based on a device's MAC address
MAC Filtering
Permits or denies traffic based on IP addresses or application ports
Port Filtering
Forwards traffic based on priority markings
Quality of Service (QoS)
802.1d
Spanning Tree Protocol (STP)
Permits redundant links between switches and prevents looping of network traffic
802.1q
VLAN Trunking: Multiple VLANs transmitted over the same physical cable
Allows an existing IPv4 router to carry IPv6 traffic
Tunneling
Running both IPv4 and IPv6 protocols by your network devices simultaneously
Dual Stack