Term
| What is a piont-to-point topology? |
|
Definition
| Contains 2 hosts conected to each other and nothing else. |
|
|
Term
|
Definition
| Also called a hub and spoke topology. One host or device has more than one conections to other hosts. |
|
|
Term
|
Definition
| Hosts are conected in a line or circle. a token is passed to the host whos turn it is to broadcast. |
|
|
Term
| What happens when a colision occurs? |
|
Definition
1. A jam signal is sent
2. All host briefly stop transmitting
3. All host run the backoff algorithm, which decides the random time they will wait before attempting to transmit again |
|
|
Term
|
Definition
- Topology = Bus
- Sp/Duplex/Media= 10mbs,half duplex, thicknet
- Range= 500m
|
|
|
Term
|
Definition
1. sp\duplex\media = 10mbs, half duplex, thinnet 2. topology = Bus 3. 185m |
|
|
Term
|
Definition
1. Topology = Star 2. sp\duplex\media = 10/100mbs, half, UTP 3. range = 100m |
|
|
Term
|
Definition
1. Topology = Star 2. sp\duplex\media = 100mbs, half or full, UTP 3. Range = 100m |
|
|
Term
|
Definition
1. Topology = Star 2. sp\duplex\media = 100mbs, full. UTP 3. Range 400m |
|
|
Term
|
Definition
1. Topology = Star
2. sp\duplex\media = 1000mbs, full, Fiber
3 Range = 100m |
|
|
Term
|
Definition
1. Topology = Star 2. sp\duplex\media = 1000mbs\ full\ single fiber 3. Range = 100km |
|
|
Term
| What is Cisco's three-layer hirarchial model |
|
Definition
| core, distorbution, access |
|
|
Term
| Advantages to the three-layer model |
|
Definition
1. scalability- easier to extend one layer fuctionablity at a time 2. cost savings- upgrading one layer at a time will save money 3. easier trouble shooting - able to track down problems easier |
|
|
Term
| 7 layers of the OSI model in order |
|
Definition
7. Application 6. Pressentation 5. session 4. Transport 3. Network 2. Data link 1. physical
All People Seam To Need Data Processing |
|
|
Term
| Application Layer Protocols |
|
Definition
HTTP - hyper text transfer protocol. browes web page
FTP - file transfer protocol. sends and recives files
SMTP - simple mail transfer protocol. sends mail. POP3 - post office protocol
NTP - Network TIme Protocol
SNMP - simple network management protocol
TFTP - Trivial file transfer protocol
DNS - Domain name service
DHCP - dynamic host configuration
Teltnet |
|
|
Term
| What does the presentation layer do? |
|
Definition
responsible for formatting data so that application layer protocols can reconize and work with it.
extentions include .doc, .jpg, .txt, .avi |
|
|
Term
| what does the Session layer do? |
|
Definition
| Deals with initiating and terminating network connections. It provides instructions to connect, authenitcate, and disconnect from netowrk resources. |
|
|
Term
| What does the transport layer do? |
|
Definition
| Deals with the exact way 2 hosts are going to send data. |
|
|
Term
| What are the 2 main ways data is transmitted in the Transport layer? |
|
Definition
| connection (TCP) & Connectionless (UDP) |
|
|
Term
| What is the 3 way hand shake? |
|
Definition
| establishes a connection between two hosts. |
|
|
Term
| What is the range of a class A subnet? |
|
Definition
|
|
Term
| What are the 3 parts of the 3 way hand shake? |
|
Definition
-
- The sender starts it by sending a sequence number
- the resiever sends an acknolagement which is 1 more than the sequence
- the senders sends out a message saying it is ready.
|
|
|
Term
| What is the TCP sliding window? |
|
Definition
| if the reciver is getting to many packets is can send out a message letting the sender know that it can only recive so many packages and some packeges will be dropped and need to be resent. |
|
|
Term
|
Definition
|
|
Term
| Registered port ranges for applications built by companies |
|
Definition
|
|
Term
| Dynamic/Private port ranges |
|
Definition
|
|
Term
|
Definition
- DNS - 53
- DHCP - 67, 68
- TFTP - 69
- NTP - 123
- SNMP - 161
|
|
|
Term
|
Definition
FTP - 20, 21
Telnet - 23
SMTP - 25
DNS - 53
HTTP - 80
POP - 110
NNTP - 119
HTTPS - 443 |
|
|
Term
| What does the network layer do? |
|
Definition
Deals with logical addressing such as ip addresses.
Detrimins the route path.
Communicates with the layer below (data link) and the layer above (transport) |
|
|
Term
| What are the Layer 3 protocols? |
|
Definition
- IP
- IPX
- OSPF, EIGRP, IGRP, RIP, ISIS
- ARP RARP
|
|
|
Term
| what does the Data Link layer do? |
|
Definition
| resonsible for taking layer 3 packets and preparing a frame for the packet to be transmitted on the media. |
|
|
Term
| What are the layer 2 fram types/ |
|
Definition
- Ethernet
- Frame relay
- PPP
- HDLC
- Cisco discovery protocol CDP
|
|
|
Term
| How does a switch handel a unicast frame? |
|
Definition
| It will compare the destination host with its MAC address table and send it out the correct port |
|
|
Term
What is the range of a class B subnet?
|
|
Definition
|
|
Term
What is the range of a class C subnet?
|
|
Definition
|
|
Term
| What is a straight-through cable used for? |
|
Definition
| To connect routers and hosts to switches or hubs |
|
|
Term
| what is the settings for a terminal session? |
|
Definition
Baud Rate= 9600
Data Bits= 8
Parity= none
Stop Bits= 1
Flow control= None |
|
|
Term
| What is the pin layout of a straight-through cable. |
|
Definition
[image][image]1-----------1
2________2
3-----------3
4________4
5-----------5
6________6
7-----------7
8________8
|
|
|
Term
What is the pinout for a crossover cable?
|
|
Definition
1-----------3
2________6
3-----------1
4________4
5-----------5
6________2
7-----------7
8________8 |
|
|
Term
| When should a crossover cable be used? |
|
Definition
| When connecting 2 switches, a switch to a hub, a PC to PC, PC directly into router eithernet interface |
|
|
Term
| When is a serial port normally used? |
|
Definition
| When doing WAN connections |
|
|
Term
| What is the default capsulation on a Cisco serial port? |
|
Definition
|
|
Term
| What does the ROM memory hold in a Cisco device? |
|
Definition
POST
Bootsrtap
ROMMON
RXBoot Microcode |
|
|
Term
| What is the Bootsrtap used for? |
|
Definition
| Its job is to find an operating system to load |
|
|
Term
| What is the ROMMON used for? |
|
Definition
| used to connect to a TFTP server to restore corrupted or missing IOS image |
|
|
Term
| What is stored in the Flash memory? |
|
Definition
| normally stores the IOS image file |
|
|
Term
| What does NVRAM store in a Cisco device? |
|
Definition
|
|
Term
| What is RAM memory used for on a Cisco device? |
|
Definition
| dynamically learned info such as routing tables ,ARP cache, and buffers |
|
|
Term
What are the basic steps the IOS Start-up Process goes through?
|
|
Definition
1. Run the POST
2. Find the IOS
3. Load the IOS to RAM
4. Find the config
5. Load config to Ram |
|
|
Term
| What is the command to encrypt vty lines? |
|
Definition
| service-password encryption |
|
|
Term
What are the 4 parts of the cisco IOS file?
|
|
Definition
Platfor, Feature set, Run Location, IOS version
C2500 (Platfrom)-D (feature Set)-L (Run Location)-12-9 (IOS Version).bin |
|
|
Term
What command do you use to suspend a telnet session?
|
|
Definition
|
|
Term
| What are the four commands that you can end a telnet session? |
|
Definition
Ctrl+Shift+6, x, show sessions, resume, disconect.
|
|
|
Term
| What does a switch do with a broadcast frame? |
|
Definition
| The switch will check the source address to its MAC table and update it if needed. Since the broadcast destination add will match all it will flood all the ports except the port it came from. |
|
|
Term
| What does a switch do with a muliti cast frame? |
|
Definition
| It will treat it like a broadcast frame and send it out all but the port it came in on. |
|
|
Term
| What are teh three switching modes? |
|
Definition
| Store and Forward, Cut Through, Fragment free |
|
|
Term
| What does the switch mode Store and Forward mean? |
|
Definition
| The Frame is buffard (stored in memory) and then the CRC also know as the Frame Check Sequence to see if the frame is corrupt. |
|
|
Term
| WHat does the switch mode Cut Through work? |
|
Definition
It is the fastes switch mode. Only checks the first bytes of the preamble to get the destination MAC address then sends it on.
Can send bad frames no CRC\CFC done
|
|
|
Term
| How does the switch mode Fragment Free work? |
|
Definition
| Checks the first 64 bits and then moves it on. If a frame is shorter than 64 bits it will discard it. |
|
|
Term
| What are 3 problems caused by switching loops? |
|
Definition
Broadcast storms,
MAC table instabliity
Duplicate frames |
|
|
Term
| What does the Spanning Tree Protocol do? |
|
Definition
| Stops loops. It will block a redundent route until it is needed. |
|
|
Term
| What are the 3 ways Wide area networking can be broken down? |
|
Definition
Leased line
Circuit Switched
Packet switched |
|
|
Term
| What is a leased line WAN? |
|
Definition
Uses synchronous serial interfaces to connect two sites together.
Easy to configure
Most expensive over long distances |
|
|
Term
| What is a circuit-switched WAN? |
|
Definition
Uses both modems connected to asynchronous interfaces and ISDN technologies.
You establish a circuit between two sites using a telephone company |
|
|
Term
| What is a packet-switched WAN? |
|
Definition
Uses snychronous serial interfaces like leased lines but a virtual circuit is established between 2 or more sites.
Data packets are switched across a service provider network. |
|
|
Term
| What are the packet-switched WAN technologies? |
|
Definition
|
|
Term
| What are your encapsolation choices when useing a packet-switched networks? |
|
Definition
| X.25, Frame relay or ATM frames |
|
|
Term
What are you encapsolation choices when useing a leased line for a WAN?
|
|
Definition
| HDLC, PPP, Serial Line IP SLIP |
|
|
Term
| What are your encapsolation choices when useing a circuit-switched WAN? |
|
Definition
| PPP (most common), HDLC, SLIP |
|
|
Term
| What are the 2 sublayers to PPP? |
|
Definition
Network control protocol NCP
Link control protocol LCP |
|
|
Term
| In PPP what is NCP responsible for? |
|
Definition
Supporting multiple Layer 3 protocols.
Each protocol has its own NCP |
|
|
Term
|
Definition
| Used for establishing the line and negotiating optional settings. |
|
|
Term
| In PPP what are the optional settings LCP can negotiate? |
|
Definition
Compression
Callback
Multilink
Authentication |
|
|
Term
| In LCP what does option Compression do? |
|
Definition
Compresses you data to conserver bandwidth across you WAN.
Options for compression are Stacker and Predictor |
|
|
Term
| What are the 2 types of authentication used in PPP? |
|
Definition
PAP - Password Authentication Protocol
CHAP - Challenge handshake authentication protocol |
|
|
Term
|
Definition
| PAP sends the username and password followed by a message indicating if it passed or failed. |
|
|
Term
|
Definition
CHAP uses a 3-way authentication at the begining and every 2minutes.
passwords are sent in a MD5 hash |
|
|
Term
| What does DLCI stand for? |
|
Definition
| Data-link Control Identifiers |
|
|
Term
| What does LMI ( Local Management Interface) do? |
|
Definition
Helps out behind the sences with your router and the providers frame relay equipment report and verify the status of your PVC
|
|
|
Term
| What are the 3 possible statuses your PVC can be in? |
|
Definition
Active - good
inactive - bad
Disabled - bad |
|
|
Term
| What does the inverse arp command do? |
|
Definition
| Maps an IP address to a DLCI |
|
|
Term
| What are the steps to configure Frame Relay? |
|
Definition
- change encapsulation to frame relay
- config LMI type
- Config Frame Relay map or config sub interfaces
- config DLCI if using subinterfaces
|
|
|
Term
What are the 2 types of frame relay encapsulations?
What is the syntax to set the encapsulation? |
|
Definition
Cisco and IETF
encapsulation frame-relay [ietf] |
|
|
Term
| What are the 3 types of LMI's and what is the syntax to set it? |
|
Definition
Cisco, Ansi, Q933a
frame-relay lmi-type [ cisco| ansi | q933a ] |
|
|
Term
| What is the syntax to map a DLCI? |
|
Definition
| frame-relay map ip 10.2.2.2 200 |
|
|
Term
| what does the command show frame-relay lmi show? |
|
Definition
| It shows LMI stats, including the number of status enquireies snet adn recived |
|
|
Term
| What does the command show frame-relay pvc show? |
|
Definition
| will inform you to the sttus of your PVC. Should read ACTIVE. Also shows if the router is recieving BECN FECN |
|
|
Term
| What does the command show frame-relay map show? |
|
Definition
| will show you any static maps configured and mapes created by inverse-arp |
|
|
Term
| What is the syntax to setup a static NAT route? |
|
Definition
| ip nat inside source static <inside local ip> <inside global ip> |
|
|
Term
| What is the sytax to build a NAT pool? |
|
Definition
| ip nat pool [pool-name] [first IP] [last IP] netmask [mask] |
|
|
Term
| What is the definition, and mitigation steps of Confidentiality? |
|
Definition
keeping your data private from eavesdroppers
use encryption to hide the contents of the data in transit
|
|
|
Term
| What is the definition and mitigation steps of integrity? |
|
Definition
keeping your data from being altered
Use hashing to take a fingerprint of your data so you can verify it has not changed from its orgininal form |
|
|
Term
| Definition and mitigation steps for Availability |
|
Definition
keeping your data, hosts, and services svailable for their intedned purposes
use rate limiting to stop an excessive flow of traffic and install teh latest patches |
|
|
Term
| Does security start with a corporate security policy or technology policy? |
|
Definition
|
|
Term
| What are the 3 catagories attacks against you Cisco infrastructure can fall into? |
|
Definition
Reconnaissance
Access attacks
Denial of service attacks |
|
|
Term
| how to change the admin distance |
|
Definition
at the end of a route put the new ad
ip route 10.0.0.0 255.0.0.0 serial 0/0 130 |
|
|
Term
| Admin distance for connected |
|
Definition
|
|
Term
| Admin distance for Static |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| What metric does RIP use? |
|
Definition
|
|
Term
| What metric does EIGRP use? |
|
Definition
|
|
Term
| What metric does OSPF use? |
|
Definition
|
|
Term
| What are the 2 catagories of routing protocols? |
|
Definition
| Distance vector and link state |
|
|
Term
| What are charateristics of Distance vector portocols? |
|
Definition
Periodically gridcastes entire routing table out ot all interfaces
Trusts what the other router tells it.
RIP, IGRP, EIGRP |
|
|
Term
| what are the max hop counts of RIP and EIGRP |
|
Definition
|
|
Term
| What are the 3 major problems swithing loops can cause? |
|
Definition
broadcast storms
MAC address table instalbility
Duplicate frames |
|
|
Term
| How is the Root Bridge detrimined? |
|
Definition
| Which switch has the lowest Bridge ID |
|
|
Term
| What dertmines the Bridge ID |
|
Definition
adminstative priority and teh MAC address of the switch.
if the ad priority is left at the default on all swtiches then it is the one with the lowest MAC address |
|
|
Term
| How often are BPDU's muliticasted? |
|
Definition
|
|
Term
STP Path Costs old and new for
10Gbps
1Gbps
100Mbps
10Mbps |
|
Definition
new old
10Gbps 2 1
1Gbps 4 1
100Mbps 19 10
10Mbps 100 1000 |
|
|
Term
| In STP what is the designated port do? |
|
Definition
| it is the port that willf forward traffic to the Root form the LAN segment. |
|
|
Term
| What is the order of the port selection in STP? |
|
Definition
- port with lowest cumulative root path cost
- if 1. is tied lowest bridge ID
- if multiple ports on same switch the lowest STP priority wins
- if tied port with lowest hardware number ex. Fa0/1 beats fa0/2
|
|
|
Term
| what STP state do ports on a switch start in when first booted up? |
|
Definition
|
|
Term
| What is the listing state in STP? |
|
Definition
| enables a blocked port to begin sending its own BPDUs. lasts 15 seconds |
|
|
Term
| What is Learning state is STP? |
|
Definition
is when the stithc begins population it MAC address Table.
Does not forward frames yet.
Lasts 15 secs |
|
|
Term
| What is forwarding state in STP? |
|
Definition
| ports start forwarding frames. |
|
|
Term
| What is the goal of RSTP? |
|
Definition
| To speed up convergance. No timers |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| In RSTP what is a alterinitive port type? |
|
Definition
| it is a port that will become the root port if the main goes down |
|
|
Term
| In RSTP what is a backup port? |
|
Definition
| it will become the designated port if the primary desg fails. |
|
|
Term
| What are the 3 steps in implementing a VLAN? |
|
Definition
- Create the VLAN
- Name the VLAN
- Assign switch ports to the VLAN
|
|
|
Term
| What are the three tables in EIGRP? |
|
Definition
Neighbor
Topology
Routing |
|
|
Term
| What are the 2 adminstative distances for EIGRP? |
|
Definition
internal is 90
external is170 |
|
|
Term
|
Definition
Cost savings
Backup
Security
Telecommuters |
|
|
Term
| How does a IPSec VPN work? |
|
Definition
| Uses a suite of IP security protocols to proide a means of securing TCP/IP communication. |
|
|
Term
|
Definition
| Use secure HTTP but work only with HTTP traffic |
|
|
Term
|
Definition
- Authentication of every IP packet
- Verification of the data intergirty for each packet
- Confidentiality of your packet payload.
- Antireplay protection to verify that each packet is unique.
|
|
|
Term
| What are the commponets of IPSec |
|
Definition
Security protocols
key management
security alogorithms |
|
|
Term
| Internet Key Exchange (IKE) is made up of 3 components what are they? |
|
Definition
|
|
Term
|
Definition
| uses DIffie-Helman (DH) algorithm to generate and exchange secret keys |
|
|
Term
|
Definition
| Protcol framework that forms the basis of key exchange by defining the message formats and types. |
|
|
Term
|
Definition
| Uses public key encryption to authenitcate keying material. |
|
|
Term
| What are the 2 types of security algorithms used with IPSec VPNs? |
|
Definition
Encryption
Message integrity |
|
|
Term
| VPN Encryption Algorithms |
|
Definition
| Provide confidentiality of your data. they enclude AES, DES, 3DES |
|
|
Term
| VPN Message intergirty algorithms |
|
Definition
| provide you with authentication and intergity. include MD5, SHA-1 |
|
|