Cisco Networking and Security Fundamentals

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/147

flashcard set

Earn XP

Description and Tags

Comprehensive flashcards covering Cisco networking basics, TCP/IP, OSI, security threats, and configuration commands from exam notes.

Last updated 5:14 PM on 5/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

148 Terms

1
New cards

Traffic types using the Real-Time Transport Protocol (RTP)

video and voice

2
New cards

Low-power and low-data rate wireless technology popular in home automation

ZigBee

3
New cards

TCP/IP model layer that provides a route to forward messages through an internetwork

Internet

4
New cards

DNS record types used to provide services

A, NS, AAAA, and MX

5
New cards

Proprietary protocols

Protocols developed by organizations that have control over their definition and operation

6
New cards

DNS (Domain Name System) primary service

Resolves domain names, such as cisco.comcisco.com, into IP addresses

7
New cards

Service requested with destination port number 110110

POP3

8
New cards

Windows CLI command to see IP configuration

ipconfig

9
New cards

Networking model for a shared wired laser printer on a home network

Peer to peer

10
New cards

Virus characteristic

Malicious software or code running on an end device

11
New cards

High to low QoS priorities for different data types

audio conference, financial transactions, web page

12
New cards

Standard TCP/IP model layers

application, transport, Internet, and network access layers

13
New cards

Switching method that always stores the entire frame and checks the CRC

store-and-forward

14
New cards

Characteristics of Cut-through switching

Low latency, may forward runt frames, and begins forwarding when the destination address is received

15
New cards

Identified interface for R1 in the exhibit

G0/0

16
New cards

Internet Messenger

An application that allows real-time chatting among remote users

17
New cards

Protocol responsible for building the MAC table mapping

ARP

18
New cards

Factors causing signal distortion and data corruption in copper cabling

EMI (Electromagnetic Interference) and RFI (Radio Frequency Interference)

19
New cards

Mechanism to obtain a destination MAC address for a remote LAN host

Send an ARP request for the MAC address of the default gateway

20
New cards

Service requested with destination port number 5353

DNS

21
New cards

Smallest network mask to support 2525 connected devices

255.255.255.224255.255.255.224

22
New cards

Trojan horse characteristic

Malicious software or code running on an end device

23
New cards

HTTPS service benefit

Uses encryption to secure the exchange of text, graphic images, sound, and video on the web

24
New cards

Tracking mechanism for multiple application sessions on a PC

Based on the source port number that is used by each application

25
New cards

Smallest network mask to support 6161 connected devices

255.255.255.192255.255.255.192

26
New cards

Network D address with prefix 192.168.0.224/30192.168.0.224/30

192.168.0.224/30

27
New cards

DoS (Denial of Service) attack characteristic

An attack that slows or crashes a device or network service

28
New cards

SMTP (Simple Mail Transfer Protocol) service

Allows clients to send email to a mail server and servers to send email to other servers

29
New cards

Transport layer function for multiple browser windows

Ensures the correct web page is delivered to the correct browser window

30
New cards

Layer 3 Source Address for Host B to Host D transmission

172.16.10.200172.16.10.200

31
New cards

Layer 3 Destination Address for Host B to Host D transmission

172.16.20.200172.16.20.200

32
New cards

Attenuation in data communication

Loss of signal strength as distance increases

33
New cards

Required mode for switch configuration after receiveing an error message

privileged EXEC mode

34
New cards

Two protocols at the top layer of the TCP/IP suite

POP and DNS

35
New cards

AAA framework component dealing with Read-Only vs Edit rights

authorization

36
New cards

Three protocol requirements for message transmission

message size, message encoding, and delivery options

37
New cards

Two characteristics of IP (Internet Protocol)

Does not require a dedicated end-to-end connection and operates independently of the network media

38
New cards

Network characteristic where a secondary connection activates automatically

FAULT TOLERANCE

39
New cards

Security and QoS characteristics in a video conference scenario

Ensuring high video quality and secure login/authentication

40
New cards

Common causes of signal degradation in UTP cabling

improper termination and Low-quality cable or connectors

41
New cards

Subnet containing address 192.168.1.96192.168.1.96 as a usable host

192.168.1.64/26192.168.1.64/26

42
New cards

Connectivity status for device at 192.168.100.1192.168.100.1 with 44 hops

There is connectivity between the device and the host

43
New cards

Best practices for using a protocol analyzer

Capture traffic during peak utilization times and on different network segments

44
New cards

Outcome of 'ipv6 unicast-routing' command

Enabled router interfaces begin sending ICMPv6 Router Advertisement messages

45
New cards

OSI layers mapping to TCP/IP Application layer

APPLICATION, SESSION, and PRESENTATION

46
New cards

Router R1 action on Ethernet header from PC1 to PC2

Remove the Ethernet header and configure a new Layer 2 header

47
New cards

Effect of incorrectly configured default gateway on a host

The host cannot communicate with hosts in other networks

48
New cards

ARP function for unknown MAC with known IP

Host generates an ARP broadcast

49
New cards

ARP reply mechanism

A device receiving an ARP request with its own IPv4 address responds with an ARP reply

50
New cards

Smallest network mask to support 9090 connected devices

255.255.255.128255.255.255.128

51
New cards

Two ICMPv6 messages not present in ICMP IPv4

Neighbor Solicitation and Router Advertisement

52
New cards

Service requested with destination port number 8080

HTTP

53
New cards

IMAP advantage over POP for small organizations

Messages are kept on the mail servers until they are manually deleted

54
New cards

Utility to diagnose ping failure to URL but success to IP

nslookup

55
New cards

LLC sublayer function regarding network protocols

Identifies which network layer protocol is being encapsulated by the frame

56
New cards

LLC sublayer function regarding NIC hardware

Handles communication between upper layer networking software and Ethernet NIC hardware

57
New cards

Effect of 'ip default-gateway 172.16.100.1' on a switch

The switch can be remotely managed from a host on another network

58
New cards

Effect of 'transport input ssh' command on switch vty lines

Communication between the switch and remote users is encrypted

59
New cards

Reconnaissance attack

Using wireless tools to determine enterprise network information to plan a hack

60
New cards

HTTP service characteristic

A basic set of rules for exchanging text, graphic images, and multimedia on the web

61
New cards

Service requested with destination port number 6767

DHCP

62
New cards

Problems caused by large numbers of ARP messages

ARP requests flood entire subnets and must be processed by all nodes

63
New cards

Commands to verify IP config and router connectivity on Windows

ping, ipconfig, and nslookup

64
New cards

Router action after matching destination IP to a directly connected routing table entry

Switch the packet to the directly connected interface

65
New cards

Antispyware

Applications that protect end devices from infection by malicious software

66
New cards

SSH (Secure Shell)

Access method providing remote CLI connectivity while keeping IDs, passwords, and sessions private

67
New cards

Most effective ways to defend against malware

Update the operating system/software and install/update antivirus software

68
New cards

Trojan horse scenario

A spreadsheet add-on disabling a local software firewall

69
New cards

Frame check sequence (FCS) field

Used by destinations to ensure data signals were not altered by interference or distortion

70
New cards

Smallest network mask to support 44 connected devices

255.255.255.248255.255.255.248

71
New cards

POP3 service characteristic

Retrieves email from a server by downloading it to the client's local mail application

72
New cards

Security solutions typical for corporate environments

Virtual private networks (VPNs) and intrusion prevention systems (IPS)

73
New cards

Antivirus software

Applications that protect end devices from becoming infected with malicious software

74
New cards

TTL (Time-to-Live) field mechanism

Router decrements value by 11; if result is 00, packet is discarded and Time Exceeded is sent

75
New cards

Service requested with destination port number 6969

TFTP

76
New cards

Configuring SSH on R1 steps

Configure IP domain name, generate SSH keys, and enable inbound vty SSH sessions

77
New cards

MAC sublayer function regarding error detection

Implements trailer with frame check sequence (FCS)

78
New cards

MAC sublayer function regarding frame synchronization

Applies delimiting of Ethernet frame fields

79
New cards

Target of IPv6 data packet with destination address FF02::2FF02::2

all IPv6 configured routers on the local link

80
New cards

Three parts of an IPv6 global unicast address

subnet ID, global routing prefix, and interface ID

81
New cards

Concerns for wireless network design

interference, security, and coverage area

82
New cards

Fastest way to test configured banner message

Exit privileged EXEC mode and press Enter

83
New cards

CSMA/CA

Method used to manage contention-based access on a wireless network

84
New cards

Data link layer function

Provides for the exchange of frames over a common local media

85
New cards

TCP sliding window purpose

Requests that a source decrease the rate at which it transmits data

86
New cards

Spyware definition

Software installed on a user device that collects information about the user

87
New cards

Switching method that drops frames failing the FCS check

store-and-forward switching

88
New cards

IPv6 link-local address range interface assignment

FE80::/10FE80::/10

89
New cards

FTP service capacity

Allows for data transfers between a client and a file server

90
New cards

Host configuration values required to access a URL

DNS server and default gateway

91
New cards

Advantages and disadvantages of NAT for IPv4

Slows address depletion but introduces problems for applications requiring end-to-end connectivity

92
New cards

EUI-64 Interface ID for MAC 1C6F65C2BDF81C-6F-65-C2-BD-F8

1E6F:65FF:FEC2:BDF81E6F:65FF:FEC2:BDF8

93
New cards

PC2 response to PC1 ARP request

PC2 will send an ARP reply with the PC2 MAC address

94
New cards

BOOTP service description

Legacy application enabling a diskless workstation to discover its own IP and BOOTP server

95
New cards

Adware description

Software that is installed on a user device and collects information about the user

96
New cards

Switching method used when an error threshold is reached on a port

STORE AND FORWARD

97
New cards

Ethernet MAC sublayer primary responsibilities

accessing the media and data encapsulation

98
New cards

Determined facts from switch 'show ip interface brief'

Switch remotely managed, device attached to physical interface, default SVI configured

99
New cards

Subnet ID for IPv6 address 2001:DA48:FC5:A4:3D1B::1/642001:DA48:FC5:A4:3D1B::1/64

2001:DA48:FC5:A4::/642001:DA48:FC5:A4::/64

100
New cards

Performance indicator for troubleshooting authentication delays

The network performance baseline