1/147
Comprehensive flashcards covering Cisco networking basics, TCP/IP, OSI, security threats, and configuration commands from exam notes.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Traffic types using the Real-Time Transport Protocol (RTP)
video and voice
Low-power and low-data rate wireless technology popular in home automation
ZigBee
TCP/IP model layer that provides a route to forward messages through an internetwork
Internet
DNS record types used to provide services
A, NS, AAAA, and MX
Proprietary protocols
Protocols developed by organizations that have control over their definition and operation
DNS (Domain Name System) primary service
Resolves domain names, such as cisco.com, into IP addresses
Service requested with destination port number 110
POP3
Windows CLI command to see IP configuration
ipconfig
Networking model for a shared wired laser printer on a home network
Peer to peer
Virus characteristic
Malicious software or code running on an end device
High to low QoS priorities for different data types
audio conference, financial transactions, web page
Standard TCP/IP model layers
application, transport, Internet, and network access layers
Switching method that always stores the entire frame and checks the CRC
store-and-forward
Characteristics of Cut-through switching
Low latency, may forward runt frames, and begins forwarding when the destination address is received
Identified interface for R1 in the exhibit
G0/0
Internet Messenger
An application that allows real-time chatting among remote users
Protocol responsible for building the MAC table mapping
ARP
Factors causing signal distortion and data corruption in copper cabling
EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference)
Mechanism to obtain a destination MAC address for a remote LAN host
Send an ARP request for the MAC address of the default gateway
Service requested with destination port number 53
DNS
Smallest network mask to support 25 connected devices
255.255.255.224
Trojan horse characteristic
Malicious software or code running on an end device
HTTPS service benefit
Uses encryption to secure the exchange of text, graphic images, sound, and video on the web
Tracking mechanism for multiple application sessions on a PC
Based on the source port number that is used by each application
Smallest network mask to support 61 connected devices
255.255.255.192
Network D address with prefix 192.168.0.224/30
192.168.0.224/30
DoS (Denial of Service) attack characteristic
An attack that slows or crashes a device or network service
SMTP (Simple Mail Transfer Protocol) service
Allows clients to send email to a mail server and servers to send email to other servers
Transport layer function for multiple browser windows
Ensures the correct web page is delivered to the correct browser window
Layer 3 Source Address for Host B to Host D transmission
172.16.10.200
Layer 3 Destination Address for Host B to Host D transmission
172.16.20.200
Attenuation in data communication
Loss of signal strength as distance increases
Required mode for switch configuration after receiveing an error message
privileged EXEC mode
Two protocols at the top layer of the TCP/IP suite
POP and DNS
AAA framework component dealing with Read-Only vs Edit rights
authorization
Three protocol requirements for message transmission
message size, message encoding, and delivery options
Two characteristics of IP (Internet Protocol)
Does not require a dedicated end-to-end connection and operates independently of the network media
Network characteristic where a secondary connection activates automatically
FAULT TOLERANCE
Security and QoS characteristics in a video conference scenario
Ensuring high video quality and secure login/authentication
Common causes of signal degradation in UTP cabling
improper termination and Low-quality cable or connectors
Subnet containing address 192.168.1.96 as a usable host
192.168.1.64/26
Connectivity status for device at 192.168.100.1 with 4 hops
There is connectivity between the device and the host
Best practices for using a protocol analyzer
Capture traffic during peak utilization times and on different network segments
Outcome of 'ipv6 unicast-routing' command
Enabled router interfaces begin sending ICMPv6 Router Advertisement messages
OSI layers mapping to TCP/IP Application layer
APPLICATION, SESSION, and PRESENTATION
Router R1 action on Ethernet header from PC1 to PC2
Remove the Ethernet header and configure a new Layer 2 header
Effect of incorrectly configured default gateway on a host
The host cannot communicate with hosts in other networks
ARP function for unknown MAC with known IP
Host generates an ARP broadcast
ARP reply mechanism
A device receiving an ARP request with its own IPv4 address responds with an ARP reply
Smallest network mask to support 90 connected devices
255.255.255.128
Two ICMPv6 messages not present in ICMP IPv4
Neighbor Solicitation and Router Advertisement
Service requested with destination port number 80
HTTP
IMAP advantage over POP for small organizations
Messages are kept on the mail servers until they are manually deleted
Utility to diagnose ping failure to URL but success to IP
nslookup
LLC sublayer function regarding network protocols
Identifies which network layer protocol is being encapsulated by the frame
LLC sublayer function regarding NIC hardware
Handles communication between upper layer networking software and Ethernet NIC hardware
Effect of 'ip default-gateway 172.16.100.1' on a switch
The switch can be remotely managed from a host on another network
Effect of 'transport input ssh' command on switch vty lines
Communication between the switch and remote users is encrypted
Reconnaissance attack
Using wireless tools to determine enterprise network information to plan a hack
HTTP service characteristic
A basic set of rules for exchanging text, graphic images, and multimedia on the web
Service requested with destination port number 67
DHCP
Problems caused by large numbers of ARP messages
ARP requests flood entire subnets and must be processed by all nodes
Commands to verify IP config and router connectivity on Windows
ping, ipconfig, and nslookup
Router action after matching destination IP to a directly connected routing table entry
Switch the packet to the directly connected interface
Antispyware
Applications that protect end devices from infection by malicious software
SSH (Secure Shell)
Access method providing remote CLI connectivity while keeping IDs, passwords, and sessions private
Most effective ways to defend against malware
Update the operating system/software and install/update antivirus software
Trojan horse scenario
A spreadsheet add-on disabling a local software firewall
Frame check sequence (FCS) field
Used by destinations to ensure data signals were not altered by interference or distortion
Smallest network mask to support 4 connected devices
255.255.255.248
POP3 service characteristic
Retrieves email from a server by downloading it to the client's local mail application
Security solutions typical for corporate environments
Virtual private networks (VPNs) and intrusion prevention systems (IPS)
Antivirus software
Applications that protect end devices from becoming infected with malicious software
TTL (Time-to-Live) field mechanism
Router decrements value by 1; if result is 0, packet is discarded and Time Exceeded is sent
Service requested with destination port number 69
TFTP
Configuring SSH on R1 steps
Configure IP domain name, generate SSH keys, and enable inbound vty SSH sessions
MAC sublayer function regarding error detection
Implements trailer with frame check sequence (FCS)
MAC sublayer function regarding frame synchronization
Applies delimiting of Ethernet frame fields
Target of IPv6 data packet with destination address FF02::2
all IPv6 configured routers on the local link
Three parts of an IPv6 global unicast address
subnet ID, global routing prefix, and interface ID
Concerns for wireless network design
interference, security, and coverage area
Fastest way to test configured banner message
Exit privileged EXEC mode and press Enter
CSMA/CA
Method used to manage contention-based access on a wireless network
Data link layer function
Provides for the exchange of frames over a common local media
TCP sliding window purpose
Requests that a source decrease the rate at which it transmits data
Spyware definition
Software installed on a user device that collects information about the user
Switching method that drops frames failing the FCS check
store-and-forward switching
IPv6 link-local address range interface assignment
FE80::/10
FTP service capacity
Allows for data transfers between a client and a file server
Host configuration values required to access a URL
DNS server and default gateway
Advantages and disadvantages of NAT for IPv4
Slows address depletion but introduces problems for applications requiring end-to-end connectivity
EUI-64 Interface ID for MAC 1C−6F−65−C2−BD−F8
1E6F:65FF:FEC2:BDF8
PC2 response to PC1 ARP request
PC2 will send an ARP reply with the PC2 MAC address
BOOTP service description
Legacy application enabling a diskless workstation to discover its own IP and BOOTP server
Adware description
Software that is installed on a user device and collects information about the user
Switching method used when an error threshold is reached on a port
STORE AND FORWARD
Ethernet MAC sublayer primary responsibilities
accessing the media and data encapsulation
Determined facts from switch 'show ip interface brief'
Switch remotely managed, device attached to physical interface, default SVI configured
Subnet ID for IPv6 address 2001:DA48:FC5:A4:3D1B::1/64
2001:DA48:FC5:A4::/64
Performance indicator for troubleshooting authentication delays
The network performance baseline