CCNA cap. 1-3

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/87

flashcard set

Earn XP

Description and Tags

solo errori

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

IANA (Internet Assigned Numbers Authority)

Responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers for ICANN.

2
New cards

ICANN (Internet Corporation for Assigned Names and Numbers)

Coordinates IP address allocation and the management of domain names globally.

3
New cards

IETF (Internet Engineering Task Force)

Develops, updates, and maintains Internet and TCP/IP protocols, documented as RFCs (Request for Comments).

4
New cards

ISOC (Internet Society)

Responsible for promoting the open development, evolution, and use of the Internet.

5
New cards

IAB (Internet Architecture Board)

Responsible for the overall management and development of Internet standards.

6
New cards

IEEE (Institute of Electrical and Electronics Engineers)

Creates standards like 802.3 (Ethernet) and 802.11 (WLAN).

7
New cards

ITU-T (International Telecommunications Union-Telecommunication Standardization Sector)

Defines standards for broadband communications (e.g., DSL), video compression, and IPTV.

8
New cards

EIA (Electronic Industries Alliance)

Best known for standards relating to electrical wiring, connectors, and the 19-inch racks used for mounting equipment.

9
New cards

Layer 7 (Application - OSI)

Contains protocols used for process-to-process communications (user interface).

10
New cards

Layer 4 (Transport - OSI)

Defines services to segment, transfer, and reassemble data; utilizes port numbers.

11
New cards

Layer 3 (Network - OSI)

Provides services to exchange data between identified end devices using logical (IP) addresses.

12
New cards

Layer 2 (Data Link - OSI)

Describes methods for exchanging frames between devices over a common media using physical (MAC) addresses.

13
New cards

Layer 1 (Physical - OSI)

Describes means to manage physical connections for bit transmission (mechanical and electrical).

14
New cards

Application Layer (TCP/IP)

Represents data to the user, plus encoding and dialog control.

15
New cards

Internet Layer (TCP/IP)

Determines the best path through the network (OSI L3 equivalent).

16
New cards

Network Access Layer (TCP/IP)

Controls the hardware devices and media that make up the network (OSI L1 and L2 equivalent).

17
New cards

Transport Layer Data

Encoded application data + Source and destination process numbers (Ports).

18
New cards

Data Link Layer Address Responsibility

Delivering the frame between NICs on the same network.

19
New cards

Network Layer Address Responsibility

Delivering the packet from the original source to the final destination.

20
New cards

Source IP address

The IP address of the sending device, which is the original source of the packet.

21
New cards

Destination IP address

The IP address of the receiving device, which is the final destination of the packet.

22
New cards

Network portion (IPv4) / Prefix (IPv6)

The left-most part of the address that indicates the network the IP address is a member of.

23
New cards

Host portion (IPv4) / Interface ID (IPv6)

The remaining part of the address that identifies the specific device on the network (must be unique).

24
New cards

Subnet Mask (IPv4)

A 32-bit value that differentiates the network portion from the host portion in an IPv4 address.

25
New cards

Default Gateway

The IP address of the router the host uses to access remote networks (including the internet).

26
New cards

Kernel

Communicates between the hardware and software; manages how hardware resources are used to meet software requirements.

27
New cards

Shell

The user interface (CLI or GUI) that allows users to request specific tasks from the computer.

28
New cards

Question

Answer

29
New cards

What is the function of Network Communications Protocols?

To enable two or more devices to communicate over one or more networks.

30
New cards

What are examples of Network Communications Protocols?

IP (Internet Protocol), TCP (Transmission Control Protocol), and HTTP (HyperText Transfer Protocol).

31
New cards

What is the function of Network Security Protocols?

To secure data by providing authentication, data integrity, and data encryption.

32
New cards

What are examples of Network Security Protocols?

SSH (Secure Shell), SSL (Secure Sockets Layer), and TLS (Transport Layer Security).

33
New cards

What is the function of Routing Protocols?

To enable routers to exchange route information, compare path information, and select the best path to the destination.

34
New cards

What are examples of Routing Protocols?

OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol).

35
New cards

What is the function of Service Discovery Protocols?

They are used for the automatic detection of devices or services on the network.

36
New cards

What are examples of Service Discovery Protocols?

DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System).

37
New cards

Which Service Discovery protocol discovers services for IP address allocation?

DHCP (Dynamic Host Configuration Protocol)

38
New cards

Which Service Discovery protocol is used to perform name-to-IP address translation?

DNS (Domain Name System)

39
New cards

What do Network Protocols define?

The rules and formats for how messages are exchanged between the source and the destination.

40
New cards

What is required for the Remote Management of a Layer 2 switch?

An IP address (assigned to the Switched Virtual Interface - SVI).

41
New cards

What are the two primary criteria for selecting a Network Medium?

  1. The distance the signal can successfully travel; 2. The environment where it will be installed.

42
New cards

Extranet

An extended network that provides secure access to external partners or customers outside the organization.

43
New cards

Intranet

The private, internal network of an organization, accessible only to employees.

44
New cards

The computing model where server software runs on dedicated machines.

Client/Server

45
New cards

Which connectivity protocol uses coaxial cable as the physical medium?

Cable (Cable TV service)

46
New cards

Which high-bandwidth connection runs over the existing copper telephone line?

DSL (Digital Subscriber Line)

47
New cards

Which internet connection is "not suited for heavily wooded areas"?

Satellite (Requires clear line-of-sight)

48
New cards

To which Layer (and protocol) is the Port Number added?

Transport Layer (L4), protocols TCP or UDP.

49
New cards

Which Cisco IOS mode is protected to prevent unauthorized access to configuration commands?

Privileged EXEC mode (protected by the enable password).

50
New cards

Which two Cisco device access interfaces can be secured with passwords?

Console interface (local access) and VTY interface (remote Telnet/SSH access).

51
New cards

During Decapsulation (receiving), what is the first protocol that examines the frame?

Ethernet (Layer 2)

52
New cards

What is the correct order of decapsulation (bottom-up) for receiving a web page?

Ethernet, IP, TCP, HTTP

53
New cards

When a device sends data to a remote network (across a router), the Destination IP is that of…

…the final destination device.

54
New cards

When a device sends data to a remote network (across a router), the Destination MAC is that of…

…the Next-Hop (the router's interface).

55
New cards

Is DSL classified as a narrowband or broadband connection?

Broadband (High bandwidth).

56
New cards

Which layer uses MAC addresses to forward Frames on the local network?

Layer 2 (Data Link)

57
New cards

Which layer uses IP addresses to route Packets between different networks?

Layer 3 (Network)

58
New cards

Which connection type typically has very low bandwidth (max 56 Kbps)?

Dial-up telephone

59
New cards

User EXEC Mode

The first level of access to the CLI after login. Has limited commands (monitoring only). The prompt ends with >.

60
New cards

Privileged EXEC Mode

Accessed with the enable command. Allows advanced monitoring and file management commands (like copy run start). The prompt ends with #.

61
New cards

Global Configuration Mode

Accessed with configure terminal (from Privileged EXEC mode). Changes made here (e.g., hostname) affect the entire device.

62
New cards

Command: copy running-config startup-config

Saves the currently running configuration (in RAM) to the startup configuration (in NVRAM). The new config will load upon reboot.

63
New cards

Command: service password-encryption

Encrypts (using a weak algorithm) all clear-text passwords (e.g., console, VTY) in the configuration file to prevent them from being read with show running-config.

64
New cards

Key: Tab

Completes abbreviated commands or parameters. (E.g., conf t + Tab -> configure terminal)

65
New cards

Key: ?

Provides context-sensitive help (shows available commands or subsequent options).

66
New cards

Key: Ctrl-Shift-6

The "break sequence." Stops executing commands like ping or traceroute.

67
New cards

Key: Up Arrow

Scrolls backward through the history of previously entered commands.

68
New cards

Key: Space Bar

Displays the next screen when the output is long (e.g., show running-config).

69
New cards

Order of Encapsulation (Sending)

Data -> Segment (TCP) -> Packet (IP) -> Frame (Ethernet).

70
New cards

Telnet Sending (1st Step)

Telnet-formatted Data (Application) is provided to the next layer (Transport).

71
New cards

Telnet Sending (2nd Step)

The TCP header is added (creating a Segment).

72
New cards

Telnet Sending (3rd Step)

The IP header is added (creating a Packet/Datagram).

73
New cards

Telnet Sending (4th Step)

The Ethernet header is added (creating a Frame).

74
New cards

IANA (Internet Assigned Numbers Authority)

Organization responsible for IP address allocation and domain name management (DNS).

75
New cards

ISO (International Organization for Standardization)

The largest developer of international standards. Known for the OSI (Open Systems Interconnection) reference model.

76
New cards

ISOC (Internet Society)

Organization that promotes the open development, evolution, and use of the Internet globally.

77
New cards

Packet Destination (IP)

When sending to a remote network, the destination IP is always that of the final host (e.g., HostA).

78
New cards

Frame Destination (MAC)

When sending to a remote network, the destination MAC is that of the default gateway (e.g., RouterB).

79
New cards

RAM (Volatile Memory)

Short-term memory. Contents are lost when the device is powered off. It holds the running-config.

80
New cards

NVRAM (Non-Volatile Memory)

Long-term memory. Retains contents without power. It holds the startup-config.

81
New cards

Running Configuration

The configuration that is actively running on the device, stored in RAM.

82
New cards

SVI (Switched Virtual Interface)

A logical (Layer 3) interface on a Layer 2 switch that allows the switch to be assigned an IP address.

83
New cards

Main purpose of an SVI

To enable remote management of the switch (e.g., via SSH or Telnet).

84
New cards

Default SVI

Interface VLAN 1 (associated with VLAN 1 by default).

85
New cards

IOS Mode Order (Step 1)

User EXEC Mode (Switch>) - The starting point.

86
New cards

IOS Mode Order (Step 2)

Privileged EXEC Mode (Switch#) - Accessed via the enable command.

87
New cards

IOS Mode Order (Step 3)

Global Configuration Mode (Switch(config)#) - Accessed via the configure terminal command.

88
New cards

IOS Mode Order (Step 4 - Final)

Line Configuration Mode (Switch(config-line)#) - Used to configure specific lines (like console 0 or vty).