CCNA 1 – Introduction to Networks Quiz
56 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which two traffic types utilize the Real-Time Transport Protocol (RTP)?

  • Audio conferencing traffic (correct)
  • Web browsing traffic
  • Email traffic
  • Video streaming traffic (correct)

What wireless technology is particularly suited for low-power and low-data rate applications in home automation?

  • Bluetooth
  • LTE
  • Wi-Fi
  • Zigbee (correct)

Which layer of the TCP/IP model is responsible for routing messages through an internetwork?

  • Application layer
  • Data link layer
  • Internet layer (correct)
  • Transport layer

Which type of server uses record types such as A, NS, AAAA, and MX to provide its services?

<p>DNS server (C)</p> Signup and view all the answers

What is a characteristic of proprietary protocols?

<p>Controlled by a specific vendor (A)</p> Signup and view all the answers

What service does DNS provide?

<p>Name resolution services (A)</p> Signup and view all the answers

A packet received by a server has a destination port number of 110. What service is the client requesting?

<p>Email receiving (B)</p> Signup and view all the answers

What networking model is employed when a shared printer is accessible to other computers on the same home network?

<p>Peer-to-peer model (A)</p> Signup and view all the answers

What is an advantage for small organizations of adopting IMAP instead of POP?

<p>IMAP allows multiple devices to access the same mailbox simultaneously. (A)</p> Signup and view all the answers

Which software utility can a technician use to diagnose connectivity issues when they can ping the IP address but not the URL address of a web server?

<p>nslookup (A)</p> Signup and view all the answers

Which two functions are performed at the LLC sublayer of the OSI Data Link Layer to facilitate Ethernet communication?

<p>Logical addressing (A), Error detection and correction (C)</p> Signup and view all the answers

What is the effect of applying the global configuration command ip default-gateway 172.16.100.1 to a switch?

<p>It allows the switch to communicate beyond its local network. (C)</p> Signup and view all the answers

What happens when the transport input ssh command is entered on the switch vty lines?

<p>The switch will accept only secure SSH connections. (A)</p> Signup and view all the answers

What type of attack is initiated by a disgruntled employee using wireless networking tools to hack a corporate wireless network?

<p>Reconnaissance attack (D)</p> Signup and view all the answers

Which range of link-local addresses can be assigned to an IPv6-enabled interface?

<p>FE80::/10 (A)</p> Signup and view all the answers

What is the purpose of the TCP sliding window?

<p>To manage flow control between sender and receiver. (C)</p> Signup and view all the answers

Which characteristic describes antispyware?

<p>It is software designed to remove spyware from a system. (A)</p> Signup and view all the answers

Which two security solutions are most likely to be used only in a corporate environment?

<p>Intrusion Detection Systems (B), Firewalls (C)</p> Signup and view all the answers

What service is provided by FTP?

<p>Transferring files between a client and a server. (A)</p> Signup and view all the answers

Which two statements accurately describe an advantage or disadvantage of deploying NAT for IPv4 in a network?

<p>NAT enhances security by obscuring internal IP addresses. (B), NAT conserves public IP addresses. (D)</p> Signup and view all the answers

Which mechanism is used by a router to prevent a received IPv4 packet from traveling endlessly on a network?

<p>Time-to-Live (TTL) (B)</p> Signup and view all the answers

What is the subnet ID associated with the IPv6 address 2001:DA48:FC5:A4:3D1B::1/64?

<p>2001:DA48:FC5:A4:3D1B:0:0:0:0 (B), 2001:DA48:FC5:A4:3D1B::/64 (C)</p> Signup and view all the answers

Which single subnet mask would best accommodate 22 IP phones, 20 PCs, 2 printers, and 2 scanners?

<p>/26 (C)</p> Signup and view all the answers

What is the minimum network mask required for a new LAN supporting 200 connected devices?

<p>/23 (C)</p> Signup and view all the answers

Which service is being requested if a packet has a destination port number of 21?

<p>FTP (A)</p> Signup and view all the answers

Which two statements are correct in a comparison of IPv4 and IPv6 packet headers?

<p>IPv6 reduces the time for routing and forwarding. (A), IPv4 uses 32 bits for addresses while IPv6 uses 128 bits. (D)</p> Signup and view all the answers

What characteristic describes identity theft?

<p>Unauthorized use of someone else's personal information. (B)</p> Signup and view all the answers

What must a client do after generating an IPv6 address using SLAAC?

<p>Send a Neighbor Solicitation message. (B)</p> Signup and view all the answers

Which wireless technology is popular in IoT environments due to its low-power requirements?

<p>LoRaWAN (C)</p> Signup and view all the answers

Which ICMPv6 message types must be permitted to allow resolution of Layer 3 addresses to Layer 2 MAC addresses?

<p>Neighbor Solicitation and Neighbor Advertisement (B)</p> Signup and view all the answers

What attribute of a NIC allows it to operate at the data link layer of the OSI model?

<p>Physical address identification. (B)</p> Signup and view all the answers

What technique is used with UTP cable to protect against interference from crosstalk?

<p>Twisted pairs of wire. (D)</p> Signup and view all the answers

What is one possible cause for unsuccessful pings to the default gateway but successful pings outside the local network?

<p>The default gateway is powered off. (D)</p> Signup and view all the answers

How many total host addresses are unused across four subnets with a network address of 192.168.99.0 and a /26 mask?

<p>20 (B)</p> Signup and view all the answers

What will the destination address be in the frame when an IP packet leaves host A directed to host B?

<p>The MAC address of host B (C)</p> Signup and view all the answers

What is a benefit of using cloud computing in networking?

<p>Enhanced scalability and flexibility (C)</p> Signup and view all the answers

Which two statements correctly describe a characteristic of the CSMA/CD process? (Choose two.)

<p>Ensures all devices wait their turn to send data (A), Uses a carrier sense mechanism to prevent collisions (B)</p> Signup and view all the answers

What are two functions provided by the network layer? (Choose two.)

<p>Routing data packets between networks (A), Assigning MAC addresses to devices (C)</p> Signup and view all the answers

Which two statements correctly describe features of an IPv4 routing table on a router? (Choose two.)

<p>Displays next hop information for packet delivery (A), Can include both static and dynamic routes (D)</p> Signup and view all the answers

What value in an IPv4 header is decremented by each router that receives a packet?

<p>Time to Live (TTL) (C)</p> Signup and view all the answers

What type of malware might be introduced that causes slow performance of the network?

<p>Adware (C)</p> Signup and view all the answers

During encapsulation of an HTTP request, what information is added to the address field of a frame?

<p>The MAC address of the default gateway (D)</p> Signup and view all the answers

Which tool should a technician use with administrator privileges to locate network issues for a slow-loading web page?

<p>Tracert command (D)</p> Signup and view all the answers

Which command could be used on a Windows host to display the routing table?

<p>route print (C)</p> Signup and view all the answers

Which two factors may interfere with copper cabling and result in signal distortion and data corruption?

<p>Electromagnetic interference from devices (A), Distance between the devices (B)</p> Signup and view all the answers

How does a device obtain a destination MAC address when there are no mappings in its ARP cache?

<p>It sends a broadcast ARP request (B)</p> Signup and view all the answers

What is the smallest network mask that can support 25 connected devices?

<p>/26 (D)</p> Signup and view all the answers

Which component is addressed in the AAA network service framework for assigning Read-Only rights to a Public folder?

<p>Authorization (A)</p> Signup and view all the answers

What layer 2 destination address is contained in the PDU transmitted from Host B to the router?

<p>00-00-0c-94-36-ab (D)</p> Signup and view all the answers

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?

<p>The router will support IPv6 unicast traffic (B)</p> Signup and view all the answers

Which three layers of the OSI model map to the application layer of the TCP/IP model?

<p>Layer 5, Layer 6, Layer 7 (C)</p> Signup and view all the answers

Which two ICMPv6 messages are not present in ICMP for IPv4?

<p>Neighbor Solicitation (D)</p> Signup and view all the answers

What does the term 'attenuation' mean in data communication?

<p>Loss of signal strength over distance (B)</p> Signup and view all the answers

What are two characteristics of IP?

<p>Supports multiple protocols (B), Unreliable delivery (C)</p> Signup and view all the answers

Which scenario describes a function provided by the transport layer?

<p>Data segmentation and reassembly (C)</p> Signup and view all the answers

What will happen if the default gateway address is incorrectly configured on a host?

<p>The host can only communicate with its local subnet (C)</p> Signup and view all the answers

Flashcards

What are the two traffic types that use RTP?

The Real-Time Transport Protocol (RTP) is a standard protocol used for delivering audio and video over Internet Protocol (IP) networks. It is used in real-time applications such as video conferencing, internet telephony, and streaming media.

Which wireless technology is often used in home automation due to its low power and data rate requirements?

Zigbee is a wireless technology designed for low-power, low-bandwidth applications. It is popular for home automation as it allows for low-power communication between devices over short distances while using minimal energy.

Which layer of the TCP/IP model focuses on routing data through an internetwork?

The Network layer (Layer 3) of the TCP/IP model is responsible for addressing and routing data packets. It determines the path that data will take across an internetwork, ensuring packets reach their destination.

Which type of server uses records like 'A,' 'NS,' 'AAAA,' and 'MX' to provide its service?

A DNS server relies on various record types, including A (address), NS (nameserver), AAAA (IPv6 address), and MX (mail exchange), to map domain names to corresponding IP addresses. It ensures the internet works by translating user-friendly domain names into numerical IP addresses.

Signup and view all the flashcards

What are proprietary protocols?

Proprietary protocols are communication standards owned and controlled by a specific organization. They are not open to public use or modification without permission, potentially limiting interoperability with other systems.

Signup and view all the flashcards

What service does DNS provide?

The Domain Name System (DNS) provides a service that translates human-readable domain names (like google.com) into numerical IP addresses (like 172.217.160.142) that computers understand. This allows users to access websites and other online resources without memorizing complex IP addresses.

Signup and view all the flashcards

A client packet is received by a server with a destination port number of 110. What service is the client requesting?

The client is requesting the Post Office Protocol (POP3), a protocol for retrieving emails from a mail server. Port 110 is the standard port for POP3 communication.

Signup and view all the flashcards

What command can be used on a Windows PC to see the IP configuration of that computer?

To view the IP configuration of a Windows computer, use the 'ipconfig' command in the Command Prompt. This command displays details about the network interfaces, including their IP addresses, subnet masks, and default gateways.

Signup and view all the flashcards

IMAP advantage for small organizations

IMAP allows for clients to access and manage emails on a remote server without needing to download them locally, which is advantageous for small organizations as it can improve collaboration and access across multiple devices.

Signup and view all the flashcards

Troubleshooting inability to ping a URL

The technician can use the tracert or traceroute utility to diagnose the problem. This will map the path data takes to get to the web server and give insight into where the connection is failing.

Signup and view all the flashcards

Functions of LLC Sublayer in Ethernet

Two functions performed at the LLC sublayer are framing and flow control. Framing is responsible for structuring data into frames for transmission. Flow control prevents overwhelming the receiver by controlling the rate of data sent.

Signup and view all the flashcards

Effect of 'ip default-gateway' on a switch

The command sets the default gateway of the switch, so any traffic destined for addresses outside the switch's local network will be forwarded to the specified gateway.

Signup and view all the flashcards

Effect of 'transport input ssh' on a switch

This command enables SSH connections to the switch, allowing for secure remote access.

Signup and view all the flashcards

Matching threat types to causes

Virus: Malicious software designed to replicate itself and spread. Worm: Self-replicating malware that spreads across networks. Trojan horse: Malicious software disguised as legitimate software. Logic bomb: Malware that triggers a harmful action based on a specific condition. Denial of service: Attack that aims to disrupt normal operation of a service or network. Sniffing: Interception of network traffic to steal data. Spoofing: Attempting to impersonate a legitimate entity. Man-in-the-middle: Attack that intercepts communications and acts as a mediator between two parties. Social Engineering: Psychological manipulation techniques to gain access to sensitive information. Phishing: Attempt to obtain sensitive information through deceptive emails or websites.

Signup and view all the flashcards

Gathering information to hack a wireless network

The disgruntled employee is performing reconnaissance, gathering information to plan a future attack.

Signup and view all the flashcards

Service provided by HTTP

HTTP provides the service of transferring files and data over the internet.

Signup and view all the flashcards

Service requested by a client with destination port 67.

The client is requesting the DHCP service, used to automatically assign IP addresses to devices on a network.

Signup and view all the flashcards

Problems caused by excessive ARP messages

Two problems caused by a large number of ARP messages are network congestion and performance degradation, as the switch is flooded with ARP requests and replies, slowing down network traffic.

Signup and view all the flashcards

Troubleshooting connectivity issues on Windows

The three Windows CLI commands and utilities are ipconfig, ping, and nslookup. ipconfig shows IP configuration, ping verifies connectivity to the router, and nslookup checks DNS settings.

Signup and view all the flashcards

Router's action after matching destination IP

After matching the destination IP address, the router will perform a lookup in the routing table to determine the next hop for the packet.

Signup and view all the flashcards

Characteristic of antispyware

Antispyware is software that detects and removes spyware from a computer.

Signup and view all the flashcards

Secure remote connectivity for switch management

The SSH access method should be chosen to keep the connection encrypted and secure.

Signup and view all the flashcards

Defense against malware

Two effective ways to defend against malware are using updated antivirus software and keeping the operating system and applications patched. These ensure the latest protections against known and emerging threats.

Signup and view all the flashcards

What is the destination address in a frame sent from host A to host B on the same network?

The destination MAC address is the MAC address of the intended recipient on the local network. This is the address of the device the packet is intended to reach.

Signup and view all the flashcards

What is a benefit of using cloud computing in networking?

Cloud computing can provide scalability, cost-effectiveness, and flexibility in networking. It allows organizations to access and manage resources like servers, storage, and software on demand, reducing capital expenditure and increasing agility.

Signup and view all the flashcards

What is the primary purpose of a MAC address?

MAC addresses are unique to each device on the network.

Signup and view all the flashcards

What is the primary function of the data link layer?

The data link layer is responsible for providing error-free data transmission over a physical link by managing the flow of data and handling error detection.

Signup and view all the flashcards

Explain CSMA/CD.

The CSMA/CD process is a method for sharing a network medium. It involves carriers sense multiple access with collision detection.

Signup and view all the flashcards

What does the show startup-config command display?

The show startup-config command displays the saved configuration of the device, which includes all the settings that are loaded when the device boots up.

Signup and view all the flashcards

What are two functions of the network layer?

The network layer is responsible for addressing and routing data packets across the network.

Signup and view all the flashcards

What is an IPv4 routing table?

The IPv4 routing table contains routes that identify known destinations on the network. Each entry in the table specifies the destination network, the next hop router to reach that network, and the interface to use for sending traffic.

Signup and view all the flashcards

Describe VPNs.

A VPN creates a secure connection over a public network. It encrypts data and provides a private tunnel for users to access private networks remotely.

Signup and view all the flashcards

Why would a Layer 2 switch need an IP address?

A Layer 2 switch needs an IP address to be managed by network devices, such as a router or a management console. This allows for configuration and monitoring of the switch on the network.

Signup and view all the flashcards

What is a subnet ID?

A subnet ID refers to the network portion of an IP address, indicating the specific network that the address belongs to. For an IPv6 address with a /64 prefix, the subnet ID comprises the first 64 bits of the address.

Signup and view all the flashcards

What's a firewall?

A firewall is a network security device that examines incoming and outgoing network traffic and blocks access to unauthorized traffic. It acts as a barrier to protect a network from external threats by enforcing predefined security rules.

Signup and view all the flashcards

What does 'service password-encryption' do?

The service password-encryption command on Cisco devices encrypts stored passwords, making them more difficult to decipher. This enhances password security by preventing unauthorized access even if the configuration file is compromised.

Signup and view all the flashcards

Which IPv4/IPv6 difference is significant for address space?

IPv4 addresses are 32 bits long, while IPv6 addresses are 128 bits long. This allows for a much larger address space in IPv6.

Signup and view all the flashcards

What's the purpose of a subnet mask?

A subnet mask helps you determine which part of an IP address is the network ID and which part is the host ID. It allows you to divide a large network into smaller subnets.

Signup and view all the flashcards

What's identity theft?

Identity theft refers to the unauthorized use of another person's personal information, such as their name, credit card details, or social security number, for illegal activities.

Signup and view all the flashcards

What's the smallest network mask for 200 devices?

The smallest network mask for 200 devices is /23 as it provides enough addresses. A /23 mask allows for 512 addresses, sufficient to support your 200 devices.

Signup and view all the flashcards

What are cabling standards?

Common cabling standards ensure consistent installation and compatibility for reliable network connections. Examples include EIA/TIA-568, ISO/IEC 11801, and ANSI/TIA/EIA-568.

Signup and view all the flashcards

What's incorrect about cable termination in the exhibit?

The termination in the exhibit is incorrect because the wires are not in the correct order for TIA/EIA 568B standards.

Signup and view all the flashcards

How does TCP ensure reliable data transfer?

The TCP protocol provides a reliable, ordered, and connection-oriented communication channel. It checks for errors, and if a packet is lost, it retransmits it, ensuring that data is delivered reliably.

Signup and view all the flashcards

What are UDP's characteristics?

The UDP protocol provides a connectionless, unreliable communication channel. It's efficient for applications requiring fast data transfer, even if a few packets are lost or arrive out of order.

Signup and view all the flashcards

How does 'service password-encryption' enhance password security?

The service password-encryption command enables encryption of the passwords stored in the configuration file. When the encryption is enabled, the passwords are protected even if the configuration file is compromised, which makes the configuration file less susceptible to breaches.

Signup and view all the flashcards

What's an Intrusion Prevention System (IPS)?

An IPS (Intrusion Prevention System) is a network security device that detects and blocks malicious activity in real time. It analyzes network traffic for suspicious patterns and proactively prevents attacks before they can impact the network.

Signup and view all the flashcards

What's the purpose of DHCP?

DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to network devices. This simplifies network management by eliminating the need for manual IP address assignments.

Signup and view all the flashcards

What connector is used with twisted-pair cabling in an Ethernet LAN?

The standard connector used with twisted-pair cabling in an Ethernet LAN is the RJ-45 connector. It is a modular connector with eight pins, commonly found on Ethernet network cables and network devices.

Signup and view all the flashcards

What service is the client requesting with a destination port of 22?

The client is requesting the SSH (Secure Shell) protocol, which provides a secure connection for remote login, command-line access, and file transfers over a network.

Signup and view all the flashcards

What protocol maps IP addresses to MAC addresses?

ARP (Address Resolution Protocol) is responsible for mapping IP addresses to their corresponding MAC addresses.

Signup and view all the flashcards

What two factors can interfere with copper cabling?

Fluorescent lights and electrical equipment can generate electromagnetic interference (EMI), which can disrupt copper cabling and cause signal distortion and data corruption.

Signup and view all the flashcards

How does a host find a destination MAC address if it's not in its ARP cache?

When a host needs to send a packet to a device on a remote LAN segment, and there's no mapping in its ARP cache, it sends an ARP broadcast request to the local network. The device with the matching IP address responds with its MAC address, updating the host's cache.

Signup and view all the flashcards

What service is requested when a client packet has a destination port number of 53?

DNS (Domain Name System) service.

Signup and view all the flashcards

What is the smallest network mask for 25 connected devices?

The smallest network mask that can support 25 connected devices is /27. This network mask provides 30 usable host addresses (2^5 - 2 = 30).

Signup and view all the flashcards

What is a Trojan horse?

A Trojan horse is a type of malware that disguises itself as a legitimate program or file. It often appears harmless, but once executed, it can secretly perform malicious actions.

Signup and view all the flashcards

What does HTTPS provide?

HTTPS (Hypertext Transfer Protocol Secure) provides a secure communication channel between a client and a server. It uses encryption to protect data transmitted over the internet.

Signup and view all the flashcards

How does a PC manage data flow from multiple applications?

The TCP/IP model's Transport Layer provides multiplexing, using port numbers to separate data streams from different applications. This allows a single network connection to handle traffic for multiple applications.

Signup and view all the flashcards

What is the smallest network mask for 61 connected devices?

The smallest network mask that can support 61 connected devices is /26. This network mask provides 62 usable host addresses (2^6 - 2 = 62).

Signup and view all the flashcards

What is a DoS attack?

A DoS (Denial of Service) attack attempts to overwhelm a target system with a flood of requests, preventing legitimate users from accessing the system's resources.

Signup and view all the flashcards

What service is provided by SMTP?

SMTP (Simple Mail Transfer Protocol) is responsible for sending emails between email servers.

Signup and view all the flashcards

What function does the Transport Layer provide?

The Transport Layer is responsible for segmenting data into packets and providing reliable transmission between communicating applications. It ensures that packets arrive in the correct order and are free from errors.

Signup and view all the flashcards

What is attenuation in data communication?

Attenuation refers to the loss of signal strength as it travels through a network medium. It is a natural phenomenon that occurs over long distances or when the signal encounters resistance.

Signup and view all the flashcards

What is the problem with the switch configuration?

The error message indicates that the switch is not able to boot because the configuration file is missing or corrupt. It could be due to a failed boot flash or a corrupt IOS image.

Signup and view all the flashcards

Which protocols operate at the Application Layer?

The top layer of the TCP/IP model is referred to as the Application Layer, and it includes protocols like HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol) that provide services directly to users.

Signup and view all the flashcards

Which component of the AAA framework is addressed by the Public folder permissions?

The Public folder permissions reflect the Authentication (who can access the server), Authorization (what operations are allowed), and Accounting (logging user activity) aspects of the AAA network service framework.

Signup and view all the flashcards

What are the requirements defined by network communication protocols?

Network communication protocols define requirements for message format, addressing, and data transmission to ensure successful data transfer across a network.

Signup and view all the flashcards

What are two characteristics of IP?

IP is connectionless, meaning that packets are sent independently without establishing a dedicated connection. It is also best effort, meaning that there are no guarantees that packets will arrive in order or at all.

Signup and view all the flashcards

What three network characteristics are described in this scenario?

The scenario describes the network characteristics of Redundancy (secondary connection took over), Reliability (no disruption noticed despite the failure), and Quality of Service (excellent video quality).

Signup and view all the flashcards

What are two common causes of signal degradation with UTP cabling?

UTP cabling can experience signal degradation due to factors like Electromagnetic Interference (EMI) from electrical equipment or fluorescent lights, and Crosstalk, where signals from adjacent cables interfere with each other.

Signup and view all the flashcards

Which subnet would include the address 192.168.1.96?

The subnet 192.168.1.0/26 would include the IP address 192.168.1.96 as a usable host address. This is because /26 blocks are defined by the formula 2^6 - 2 = 62 usable host addresses.

Signup and view all the flashcards

Based on the output, what network connectivity statements are true?

The output suggests that R1 is connected to R2 (since it is in the routing table), and there is a valid route to 192.168.2.0 network.

Signup and view all the flashcards

How does a protocol analyzer assess traffic flow patterns?

Protocol analyzers capture and analyze network traffic by filtering traffic by specific protocols and identifying traffic types. Based on the content of the packets, they can identify traffic patterns and understand network usage.

Signup and view all the flashcards

What happens when you configure a router with ipv6 unicast-routing?

Configuring a router with the ipv6 unicast-routing command enables the router to process and forward IPv6 unicast packets. This setting is necessary to support communication over IPv6 networks.

Signup and view all the flashcards

Which OSI layers map to the Application Layer of the TCP/IP model?

The Application Layer of the TCP/IP model maps to layers 5, 6, and 7 of the OSI model, which are the Session Layer, Presentation Layer, and Application Layer.

Signup and view all the flashcards

What does R1 do with the Ethernet frame header from PC1?

When PC1 sends a packet to PC2, R1 receives the Ethernet frame header. R1 looks up the destination IP address (192.168.2.20) in its routing table. Based on the routing table, R1 forwards the packet to R2, replacing the Ethernet frame header with a new header containing the MAC address of R2.

Signup and view all the flashcards

What happens if the default gateway address is incorrectly configured?

If the default gateway address is incorrectly configured on a host, the host will not be able to send packets outside its local network. The host will attempt to send the packets to the incorrect gateway address, which will result in network connectivity issues.

Signup and view all the flashcards

What are two features of ARP?

ARP (Address Resolution Protocol) is a dynamic protocol that maintains a cache of MAC addresses for frequently accessed devices to reduce the time needed to determine the MAC address of a destination device. ARP is used for resolving IP addresses into MAC addresses and helps devices communicate effectively on a local network.

Signup and view all the flashcards

What is the smallest network mask for 90 connected devices?

The smallest network mask that can support 90 connected devices is /25. This network mask provides 126 usable host addresses (2^7 - 2 = 126).

Signup and view all the flashcards

What are two ICMPv6 messages not present in ICMPv4?

ICMPv6 includes Router Solicitation (RS) and Router Advertisement (RA), which are used in IPv6 network discovery and address configuration. These messages are not present in ICMP for IPv4.

Signup and view all the flashcards

What service is requested when a client packet has a destination port number of 80?

HTTP (Hypertext Transfer Protocol) service.

Signup and view all the flashcards

Study Notes

Exam Structure and Requirements

  • Exam consists of 60 questions.
  • Passing score is 70%.
  • Time limit per attempt is 1 hour and 15 minutes.
  • Course: CCNA 1 – Introduction to Networks (Version 7.00) – ITNv7.

Key Protocols and Services

  • Real-Time Transport Protocol (RTP): Used for two traffic types (specific types not specified).
  • DNS (Domain Name System): Resolves domain names to IP addresses.
  • SMTP (Simple Mail Transfer Protocol): Used for sending email.
  • POP3 (Post Office Protocol version 3): Used for receiving email.
  • HTTP (Hypertext Transfer Protocol): Used for web browsing.
  • HTTPS (Hypertext Transfer Protocol Secure): Secure web browsing.
  • FTP (File Transfer Protocol): Used for transferring files.
  • IMAP (Internet Message Access Protocol): Used for email management, alternative to POP3.
  • BOOTP (Bootstrap Protocol): Dynamically assigns IP addresses.
  • DHCP (Dynamic Host Configuration Protocol): Dynamically assigns IP addresses, subnet masks, and other configuration parameters.
  • SSH (Secure Shell): Secure remote connection protocol.
  • ARP (Address Resolution Protocol): Maps IP addresses to MAC addresses.
  • ICMP (Internet Control Message Protocol): Used for error messages and diagnostics.
  • ICMPv6: Version of ICMP for IPv6.
  • QoS (Quality of Service): Used to prioritize network traffic.
  • NAT (Network Address Translation): Used to translate private IP addresses to public IP addresses.
  • HTTPS: Secure web communication.

Network Devices and Configurations

  • IP Configuration (Windows): Using command-line tools to view IP address settings on a Windows PC.

Network Security

  • Virus: Malicious software that can replicate itself.
  • Trojan Horse: Malicious software that disguises itself as a benign program.
  • DoS (Denial-of-Service) attack: Attack aimed at disrupting network service.
  • Antivirus software: Protects against viruses.
  • Antispyware: Protects against spyware.
  • VPN: Virtual Private Network, used for secure remote access..
  • Firewall: Security system that controls network traffic.
  • IPS(Intrusion prevention system): Security system that monitors network for malicious activities.

OSI and TCP/IP Models

  • TCP/IP Model Layers: Specific layers are identified and used in data transfer processes.
  • OSI Model Layers: Relevant OSI layers are discussed, but their mapping to TCP/IP might not all be explicit layers.
  • PDU (Protocol Data Unit): Data as it travels between protocols and layers.
  • MAC addresses: Unique hardware addresses for network devices
  • IP addresses: Unique logical addresses for network devices
  • Subnet Masks: Needed to determine network and host part of the IP address.

Network Cabling and Wireless

  • UTP (Unshielded Twisted Pair) cabling interference: Interference sources identified like proximity to electrical equipment, proximity to fluorescent lights.

Troubleshooting and Diagnostics

  • ARP cache: Needed for resolving IP addresses to MAC addresses.
  • Protocol analyzer: Device for observing and analyzing network traffic.
  • Tracert: Tool to trace route from source to destination.

Other key concepts not listed

  • Addressing
  • Routers function
  • Wireless technologies with specific low-power and low-data requirements
  • Ethernet communication
  • Switch configuration errors

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on key protocols and services covered in the CCNA 1 – Introduction to Networks course. This quiz features 60 questions focusing on protocols like DNS, SMTP, and HTTP, among others. Achieve a passing score of 70% within a 1 hour and 15 minutes time limit.

More Like This

Use Quizgecko on...
Browser
Browser