CCNA

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/172

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

173 Terms

1
New cards

ROUTER

 If we have traffic that needs to go from one network to another network, this makes the decision as to how we're going to forward that traffic.

2
New cards

SWITCHES

These can interconnect devices within the same network. These devices might be PCs, printers, servers, wireless access points, surveillance cameras, and the list goes on.

3
New cards

Security Appliances

Devices designed to protect networks from threats by blocking unauthorized access and ensuring data integrity. They include firewalls, intrusion detection systems, and antivirus solutions. These help safeguard networks from threats and unauthorized access.

4
New cards

Wireless Devices

They extend the reach of our networks, enabling wireless operation for devices. Their key role is promoting mobility and flexibility within network environments

5
New cards

Endpoints & Servers

These are where users access resources—whether from a server or another user/device. Examples include: PCs, mobile devices, file servers, and peer devices.

6
New cards

Cisco Catalyst Center

 Represents the future of enterprise networking with Cisco hardware. This tool helps streamline administrative tasks and improves operational efficiency. It allows for centralized management of network resources and leverages AI for enhanced performance and security.

7
New cards

Virtualized Devices

Showcase the power of software-based networking.

Benefits: Flexibility, Scalability, Reduced reliance on physical hardware.

They allow networks to adapt quickly to changing demands. Virtualized devices use software to create network environments, enabling efficient resource utilization and rapid deployment. They enhance flexibility and scalability while minimizing dependence on physical infrastructure.

8
New cards

TCP and UDP

Both are core transport protocols for transmitting data across networks

9
New cards

Transmission Control Protocol

Reliable, connection-oriented (e.g., file transfers, web traffic)

10
New cards

User Datagram Protocol

 Fast, connectionless, less overhead (e.g., video streaming, gaming) Understanding when to use each protocol is critical for performance and reliability.

11
New cards

Media Access Control (MAC) Address

48-bit identifier that is burned into the network interface card by the manufacturer.

12
New cards

Flooding

Occurs when a switch sends a copy of a frame out of all ports except the pot on which the frame was recieved.

13
New cards

IDS sensor

An Intrusion Detection System sensor monitors network traffic for suspicious activity and policy violations, alerting administrators of potential security breaches.

14
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

15
New cards

IPS

An Intrusion prevention system sensor that actively monitors network traffic and can take actions to block or mitigate detected threats.

16
New cards

Host-based firewall

A security solution that monitors and controls incoming and outgoing network traffic on a single device, often used to protect individual computers or servers.

17
New cards

Packet-filtering firewall

A type of firewall that controls network traffic based on predetermined rules and filters packets based on their source and destination IP addresses, protocols, and ports.

18
New cards

Stateful Firewall

A firewall that maintains records of all active connections and makes decisions based on the context of the traffic, allowing for more sophisticated control compared to packet-filtering firewalls.

19
New cards

Next Generation Firewall (NGW/Layer 7 Firewall)

A firewall that goes beyond traditional filtering by inspecting the payload of packets and applications, providing advanced features like intrusion prevention, deep packet inspection, and application awareness.

20
New cards

Wireless Access Point (WAP)

Not to be confused with Wireless Routers. A device that allows wireless devices to connect to a wired network using Wi-Fi or other standards, enabling access to the network and internet.

21
New cards

SSID (Service Set Identifier)

The name of a wireless network, allowing devices to identify and connect to specific networks within a range.

22
New cards

Endpoints and servers

Also known as Client-Server Architecture. This architecture refers to the model in which client devices, or endpoints, make requests to servers that provide data or services. It facilitates communication and resource sharing over a network.

23
New cards

Peer-to-Peer Architecture

Direct resource sharing among devices without central server; enables decentralized communication and collaboration.

24
New cards

Cisco Catalyst Center

An appliance that provides a graphical interface and a programming interface to design your network, add and configure devices, monitor, and troubleshoot your network.

25
New cards

As a network administrator, you have a packet that needs to be routed to a specific network. How does a router determine the appropriate interface to forward this packet?

Through the packet’s destination IP address.

26
New cards

Imagine you are troubleshooting a newly installed Ethernet switch. You notice that frames from a device are being flooded to all ports. What is the likely reason for this behavior?

The destination MAC address is not yet learned

27
New cards

What is the primary function of an Intrusion Prevention System (IPS) sensor in network security?

Analyzing and blocking potential threats

28
New cards

What characterizes an ad hoc wireless LAN?

Involves direct communication between wireless clients

29
New cards

What is the key difference between client-server and peer-to-peer architectures?

Client-server architecture uses a server for resource sharing

30
New cards

You are designing a network using Cisco Catalyst Center. Which of the following tasks can you perform with this tool?

Mapping out network topology and allocating IP addresses.

31
New cards

You are setting up a virtual environment and need to choose a hypervisor. If you require running the hypervisor directly on the server's hardware without a host operating system, which type of hypervisor should you select?

Type 1: Native or Bare metal Hypervisor

32
New cards

What is the purpose of the three-way handshake in the TCP protocol?

To establish a connection between two devices.

33
New cards

Full Mesh Architecture

A network topology where every node is directly connected to every other node. Not scalable for large systems due to the exponential growth of required links.

34
New cards

3 tier architecture

A scalable network design model that includes the access layer, distribution layer, and core layer.

35
New cards


Access Layer

The layer where end devices (e.g., PCs, printers, wireless access points) connect to the network, typically through layer 2 switches in wiring closets.

36
New cards

Distribution Layer

The intermediate layer that aggregates access layer switches from different floors or areas and connects to the core layer. Often uses multilayer switches.

37
New cards

Core Layer

The backbone of the network providing high-speed interconnectivity between distribution layers in various buildings.

38
New cards

Collapse Core Architecture

A simplified network design where the distribution and core layers are merged, often used when there are only a few buildings to connect.

39
New cards

EtherChannel (Port Aggregation)

A method of combining multiple physical links into a single logical link to increase bandwidth and provide redundancy between switches.

40
New cards

Layer 2 Switch

A switch that operates at the data link layer of the OSI model and forwards frames based on MAC addresses.

41
New cards

Lauyer 3 Switch

A switch that operates at the network layer of the OSI model, capable of routing packets based on IP addresses.

42
New cards

Multilayer Switch

A switch that performs functions at multiple layers of the OSI model, typically both Layer 2 (switching) and Layer 3 (routing).

43
New cards

Wiring Closet

A small room or cabinet containing network equipment such as switches, typically one per floor in a building.

44
New cards

Fiber Optic Connection

High-speed transmission medium used to connect buildings across a campus due to its long-distance and high-bandwidth capabilities.

45
New cards

Scalability

The ability of a network to grow and support more devices or buildings without significant redesign.

46
New cards

Redundancy

The inclusion of extra components or links to ensure network reliability in case of failure.

47
New cards

Campus Network

A network infrastructure that interconnects buildings within a limited geographical area like a corporate or university campus.

48
New cards

High-End Switches

Powerful and expensive switches used at the core layer to ensure high-speed data transfer and low latency.

49
New cards

n(n-1)/2 Formula

A formula to calculate the number of links in a full mesh network, where n is the number of nodes or buildings.

50
New cards

Logical Link

A virtual connection formed by combining multiple physical connections, often using technologies like EtherChannel.

51
New cards

Top-of-Rack (ToR) Switch

Switches installed at the top of a server rack in a data center, connecting directly to all servers in that rack.

52
New cards

Data Center

A facility used to house computer systems and associated components like servers, storage systems, and networking equipment.

53
New cards

Spine-Leaf Topology

A modern data center network design where every leaf switch connects to every spine switch, minimizing latency and bottlenecks.

54
New cards

Leaf Switch

A switch at the access layer in a spine-leaf topology that connects directly to devices such as servers, firewalls, and spine switches.

55
New cards

Spine Switch

A high-performance switch in a spine-leaf network topology that connects only to leaf switches, ensuring consistent performance and equal access across the network.

56
New cards

Node (Data Center Context)

Any device or endpoint connected to a network such as a server, firewall, load balancer, or router.

57
New cards

Application Centric Infastructure (ACI)

Cisco’s collection of Software Defined Networking (SDN) solutions for data center environments

58
New cards

Solid Line (WAN)

represents a connection that is always up

59
New cards

Dotted Line (WAN)

represents a connection that can be brought up by demand

60
New cards

What is a primary advantage of using a three-tier architecture for interconnecting buildings on a corporate campus?

It enhances the scalability by allowing easy addition of new buildings through a structured heiarchy

61
New cards

What distinguishes Top-of-Rack (ToR) switches in a spine-leaf data center architecture?

They act as leaves, connecting both to servers within the rack and spine switches.

62
New cards

What are the two main types of copper cables out there?

Coaxial cables and Twisted Pair Cabling

63
New cards

Electromagnetic Interference (EMI)

Occurs when radio waves are picked up by or radiated by a cable carrying another signal, resulting in signal degradation

64
New cards

Impedance

A circuit’s opposition to current flow (measured in Ohms), which can have resistive, capacitive, or inductive components

65
New cards

Cable: RG-59 and RG-6

Connector: F-Type
Common use: TV Cable and Modem
Impedance: 75 Ohms

66
New cards

Cable: RG-58

Connector: BNC (Bayonet Neill Concelman)
Common Use: 10Base2
Impedance: 50 Ohms

67
New cards

Connector: RG-8/U

Connector: Amphenol N-type
Common Use: 10BASE5
Impedance: 50 Ohm

68
New cards

Unshielded Twisted Cabling (UTP)

Twisting pairs of wires helps reduce EMI
It does not add any additional EMI Sheilding (i.e. wrapping it in foil)

69
New cards

Sheilded Twisted Pair Cabling (STP)

For additional EMI protection, these are wrapped together with foil.
Sometimes wrapped with metal braiding for more protection.

Supports higher data rates.

More expensive

70
New cards

Plenum Rated cabling

Area of building used by HVAC for air flow

Plenum Area Cabling will not emit toxic fumes in the presence of heat.

71
New cards

RJ-45

Commonly used on Ethernet Cables

8 positions with 8 conductors

72
New cards

RJ-11

Commonly used on telephones and fax machines.

6 positions with 2 conductors

73
New cards

RJ-14

Commonly used on telephones and fax machines.

6 positions with 4 conductors.

74
New cards

What Ethernet standards does Category 3 cabling support?

10BASE-T and 100BASE-T4

75
New cards

What is the distance limitation for Category 3 cabling?

100 meters

76
New cards

What Ethernet standards does Category 5 cabling support?

100BASE-TX and 1000BASE-T

77
New cards

What is the distance limitation for Category 5 cabling?

100 Meters

78
New cards

What Ethernet standards does Category 5e cabling support?

1000BASE-TX and 1000BASE-T

79
New cards

What is the distance limitation for Category 5e cabling?

100 meters

80
New cards

What Ethernet standards does Category 6 cabling support?

1000BASE-T, 5GBASE-T, and 10GBASE-T

81
New cards

What is the distance limitation for Category 6 cabling?

100 meters (55m for 10GBASE-T)

82
New cards

What Ethernet standards does Category 6a cabling support?

1000BASE-T, 5GBASE-T, and 10GBASE-T

83
New cards

What is the distance limitation for Category 6a cabling?

100 meters

84
New cards

What Ethernet standards does Category 7 cabling support?

5GBASE-T, 10GBASE-T, and POTS/CATV/1000BASE-T

85
New cards

What is the distance limitation for Category 7 cabling?

100 Meters

86
New cards

What Ethernet standards does Category 8 cabling support?

25GBASE-T and 40GBASE-T

87
New cards

What is the distance limitation for Category 8 cabling?

30 to 36 meters (intended for data centers)

88
New cards

You are configuring a home entertainment system and need to choose the appropriate coaxial cable for connecting to your television and also to your cable modem. Which of the following cable types should you consider for optimal performance given the electrical characteristics mentioned?

RG-6, as it has better electrical characteristics than RG-59, which is an older standard. RG-58 and RG-8/U are used for different applications, such as networking in older 10BASE2 and 10BASE5 networks. Also, RG-58 and RG-8/U cables have a different impedance (i.e., 50 Ohms) as compared to RG-59 and RG-6 cables (i.e., 75 Ohms).

89
New cards

You are installing a network in an office environment with a significant amount of electromagnetic interference (EMI). Which type of twisted pair cabling should you choose to ensure the best protection against EMI?

STP

90
New cards

A network engineer is tasked with upgrading the company's network infrastructure to support 1 gigabit per second data transmission over a maximum distance of 100 meters. Which category of twisted pair cabling should the engineer choose to ensure compatibility with the 1000BASE-T standard, while minimizing cost of the cabling?

5e

91
New cards

You are tasked with connecting two PCs directly to facilitate a file transfer without using a switch or router. What type of Ethernet cable should you use to ensure the PCs can communicate effectively?

Crossover Ethernet Cable

92
New cards

When considering the installation of a fiber optic network that spans a long distance, which type of fiber optic cabling would you choose to minimize data corruption due to multimode delay distortion?

SMF

93
New cards

In setting up a high-density fiber network panel, which connector would you choose to maximize port density?

MTRJ Connector

94
New cards

A network administrator is tasked with implementing a fiber optic network to interconnect several buildings on a university campus, where the maximum distance between any two buildings does not exceed 220 meters. Also, the fiber network must support a speed of 1 gigabit per second. Which of the following Ethernet standards should the administrator choose to ensure compatibility, while minimizing cost?

1000BASE SX

95
New cards

A network designer is planning to deploy IP cameras and wireless access points in a new office building. To simplify the installation and reduce the need for additional power outlets, which technology should be utilized to power these devices over the Ethernet infrastructure?

Power over Ethernet

96
New cards

A network engineer notices an increasing number of input/output errors on router interfaces. What could be a potential cause for these errors?

Duplex Mismatch

97
New cards

What do the first 3 numbers (9 digits) in an ipv4 address represent

The Network

98
New cards

What do the first 3 digits in an ipv4 address represent

the host

99
New cards

Benefits of Network Programmability

Network Management, Agility, Cost, Security

100
New cards

How do you read an 8 bit binary number?

128 64 32 16 8 4 2 1