Network Fundamentals and Router Commands

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the length of an IPv6 address?

  • 128 bytes
  • 32 bits
  • 128 bits (correct)
  • 64 bits

What type of transmission do modems typically use?

  • Timed interval
  • Asynchronous (correct)
  • Synchronous
  • PPP

Which device can be connected to a 15-pin female connector with pins in two rows?

  • Video device
  • Joystick (correct)
  • Parallel device
  • Serial device
  • MIDI device

What type of peripheral is a 34-pin connection on an I/O card typically used for?

<p>Floppy drive (A)</p> Signup and view all the answers

Which issue is most likely indicated by the absence of a beep during a PC boot sequence?

<p>Bad or disconnected speaker (D)</p> Signup and view all the answers

Which WLAN IEEE specification allows for data transfer rates up to 54Mbps at 2.4GHz?

<p>G (B)</p> Signup and view all the answers

Given the IP address 192.168.168.188 and subnet mask 255.255.255.192, what is the valid host range for the subnet?

<p>192.168.168.129-190 (A)</p> Signup and view all the answers

To create a backup of an IOS image on a Cisco device, which command is used?

<p>copy flash tftp (D)</p> Signup and view all the answers

Which protocol is used by PPP to identify the Network layer protocol during connection establishment?

<p>NCP (B)</p> Signup and view all the answers

Which command is used to set a Telnet password on a Cisco router?

<p>line vty 0 4 (D)</p> Signup and view all the answers

Which transport layer protocol does DHCP use for its operations?

<p>UDP (D)</p> Signup and view all the answers

What command is used on Cisco devices to determine if an IP access list is enabled on an interface?

<p>show ip interface (B)</p> Signup and view all the answers

In the OSI model, where is a hub specified to operate?

<p>Physical layer (D)</p> Signup and view all the answers

What is the effect of the passive command when applied to dynamic routing protocols on a Cisco router?

<p>Stops an interface from sending periodic dynamic updates but not from receiving updates. (A)</p> Signup and view all the answers

Which protocol is used to send a destination network unreachable message back to the originating host?

<p>ICMP (C)</p> Signup and view all the answers

How often are Bridge Protocol Data Units (BPDUs) sent by a layer 2 device by default?

<p>Every 2 seconds (A)</p> Signup and view all the answers

How many broadcast domains are created when a network is segmented using a 12-port switch?

<p>1 (A)</p> Signup and view all the answers

On a Cisco router, what does the command routerA(config)#line con 0 allow you to configure next?

<p>Set your console password. (D)</p> Signup and view all the answers

Which command allows you to view the entire contents of all access lists configured on a Cisco router?

<p>show access-lists (D)</p> Signup and view all the answers

Which class of IP address, by default, provides the largest number of host addresses?

<p>A (C)</p> Signup and view all the answers

In a network with multiple switches implementing spanning tree protocol, how many root bridges would you typically have?

<p>1 (D)</p> Signup and view all the answers

Which PPP protocol is responsible for dynamic addressing, authentication and multilink?

<p>NCP (D)</p> Signup and view all the answers

What defines a stub network in network topology?

<p>A network that has only one entry and exit point. (D)</p> Signup and view all the answers

If a Cisco router connects to a CSU/DSU, which command is required to configure a serial interface for a 64000bps link?

<p>RouterA(config-if)#clock rate 64000 (B)</p> Signup and view all the answers

Which statement accurately describes VLANs (Virtual LANs) in a Cisco switching environment?

<p>Two VLANs are configured by default on all Cisco switches. (C)</p> Signup and view all the answers

What is the primary function of a VLAN in a Layer 2 network?

<p>Breaks up broadcast domains in a layer 2 switch internetwork. (B)</p> Signup and view all the answers

What was the main motivation behind the creation of the OSI model?

<p>So different networks could communicate. (A)</p> Signup and view all the answers

How many collision domains are created when segmenting a network with a 12-port switch?

<p>12 (B)</p> Signup and view all the answers

Which command on a Cisco router displays line protocol, DLCI, and LMI information for a Frame Relay interface?

<p>show interface (B)</p> Signup and view all the answers

Which protocol does the ping utility use to send echo requests?

<p>ICMP (B)</p> Signup and view all the answers

Which command is used to upgrade the IOS (Internetwork Operating System) on a Cisco router?

<p>copy tftp flash (B)</p> Signup and view all the answers

If you need to delete the configuration stored in NVRAM on a Cisco router, which command should you use?

<p>erase startup (D)</p> Signup and view all the answers

Which protocols are used to configure trunking on a switch?

<p>3 and 4 (B)</p> Signup and view all the answers

Which of the following services use the TCP transport protocol?

<p>1, 3 and 4 (C)</p> Signup and view all the answers

Which layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model?

<p>Host-to-Host (B)</p> Signup and view all the answers

Which statements are true regarding the Transport layer in the TCP/IP stack?

<p>3 and 4 (A)</p> Signup and view all the answers

Which protocol is typically implemented to automate IP configuration, including the IP address, subnet mask, default gateway, and DNS information?

<p>DHCP (D)</p> Signup and view all the answers

Which of the following IP addresses is considered a private IP address?

<p>192.168.24.43 (C)</p> Signup and view all the answers

Which mechanism allows a router to respond to ARP requests intended for a remote hosts?

<p>Proxy ARP (D)</p> Signup and view all the answers

In the DoD model, which layer is equivalent to the Network layer of the OSI model?

<p>Internet (A)</p> Signup and view all the answers

Flashcards

IPv6 Address Length

128 bits

Asynchronous Transmission

A transmission method where data bits are sent with irregular time intervals, using start and stop bits.

15 Pin Female Connector

Connects with Serial device or video device.

34-Pin I/O Connection

Supports floppy drive

Signup and view all the flashcards

No Beep on PC Boot

Bad or disconnected speaker.

Signup and view all the flashcards

WLAN IEEE 802.11g

Provides 54Mbps at 2.4GHz.

Signup and view all the flashcards

Valid Host Range

192.168.168.129-190

Signup and view all the flashcards

IOS Backup Command

copy flash tftp

Signup and view all the flashcards

PPP's Protocol Usage

Identifies Network layer protocol.

Signup and view all the flashcards

Set Telnet Password

line vty 0 4

Signup and view all the flashcards

DHCP Transport Protocol

Uses UDP

Signup and view all the flashcards

IP Access List Command

show ip interface

Signup and view all the flashcards

Hub's OSI Model Layer

Physical Layer

Signup and view all the flashcards

Passive Command Function

Stops an interface from sending periodic dynamic updates but not from receiving updates

Signup and view all the flashcards

Destination Network Protocol

ICMP

Signup and view all the flashcards

BPDU Sending Frequency

Every 2 Seconds

Signup and view all the flashcards

Broadcast Domains

1

Signup and view all the flashcards

Console Line Command

Set your console password.

Signup and view all the flashcards

View Access List Command

show access-lists

Signup and view all the flashcards

IP Address Class

A

Signup and view all the flashcards

Root Bridges in Network

1

Signup and view all the flashcards

PPP Protocol Benefits

Dynamic addressing, authentication, and multilink.

Signup and view all the flashcards

Stub Network Definition

A network that has only one entry and exit point.

Signup and view all the flashcards

Command for CSU/DSU

RouterA(config-if)#clock rate 64000

Signup and view all the flashcards

VLANs

Breaks up broadcast domains in a layer 2 switch internetwork

Signup and view all the flashcards

VLAN Function

Breaks up broadcast domains in a layer 2 switch internetwork.

Signup and view all the flashcards

OSI Model Creation Reason

So different networks could communicate.

Signup and view all the flashcards

Interface Command

show interface

Signup and view all the flashcards

Ping Protocol

ICMP

Signup and view all the flashcards

Upgrade IOS command

copy tftp flash

Signup and view all the flashcards

Delete NVRAM startup type

erase startup

Signup and view all the flashcards

Configuring Trunking

3 and 4

Signup and view all the flashcards

TCP Services

2, 3 and 5

Signup and view all the flashcards

OSI Model layer

Host-to-Host

Signup and view all the flashcards

Compose a signature

Insert

Signup and view all the flashcards

To provide level security

The purpose of firewall

Signup and view all the flashcards

for the site. (Folders)

The Exchange servers

Signup and view all the flashcards

are based on the databaed

The Exchange databases

Signup and view all the flashcards

Study Notes

Network Fundamentals and Addressing

  • IPv6 addresses are 128 bits long
  • A modem uses asynchronous transmission.
  • A 15-pin female connector in two rows is typically used for a joystick.
  • A 34-pin connection on an I/O card interfaces with a floppy drive.
  • The IEEE 802.11g WLAN specification allows speeds up to 54Mbps at 2.4GHz.
  • For an IP address of 192.168.168.188 with a subnet mask of 255.255.255.192, the valid host range is 192.168.168.129-190.
  • PPP uses Network Control Protocol (NCP) to identify the Network layer protocol.
  • DHCP uses the User Datagram Protocol (UDP) at the Transport layer.
  • A hub operates at the Physical layer of the OSI model.

Router and Switch Commands

  • "copy flash tftp" command is used to back up an IOS.
  • "line vty 0 4" command is used to set a Telnet password on a Cisco router.
  • "show ip interface" command determines if an IP access list is enabled on an interface.
  • The "passive" command stops an interface from sending periodic dynamic updates but still allows receiving updates.
  • ICMP (Internet Control Message Protocol) is used to send a destination network unknown message back to originating hosts.
  • BPDU's are sent every 2 seconds from a layer 2 device
  • Segmenting a network with a 12-port switch creates 12 collision domains
  • The "routerA(config)#line cons 0" command allows you to set your console password.
  • The "show access-lists" command displays the contents of all access lists.
  • In a network with multiple switches, there is usually 1 root bridge.
  • The "debug ip rip" command displays RIP routing updates.
  • AAA refers to dynamic addressing, authentication and multilink that's provided by the PPP Protocol.
  • A stub network has only one entry and exit point.
  • The command "RouterA(config-if)#clock rate 64000" is needed to provide the router with a 64000bps serial link.
  • Typing "Router#sh ru" results in an ambiguous command error because there is more than one show command that starts with the letters "ru".
  • By default, a Cisco router supports 5 simultaneous Telnet sessions.
  • The command "show interfaces" displays the configurable parameters and statistics of all interfaces on a router.
  • The command "Router(config)#line vty 0 4" configures all the default VTY ports on a router.
  • The command "show interfaces" is used to find the broadcast address used on a LAN on a router from user mode.
  • The command "erase startup" will delete the contents of NVRAM on a router.
  • The "Ctrl+C" keystroke will terminate setup mode.
  • The "Router#copy run startup" command saves the configuration stored in RAM to NVRAM.
  • The "banner motd" command is used to display a message to administrators when logging into the router.
  • If a routing table has a static, a RIP, and an IGRP route to the same network, the static route will be used by default to route packets.
  • The command "ip access-group 101 in" applies an access list to a router interface.
  • A standard IP access list example is: access-list 1 deny 172.16.10.1 0.0.0.0
  • By default, the "show interface serial 1" command indicates a problem in the Physical layer if the output shows "Serial1 is down, line protocol is down".
  • If you want to delete the configuration stored in NVRAM, you would enter the command: "erase startup"
  • Protocols "802.1Q" and "ISL" are used to configure trunking on a switch.
  • The TCP services are SMTP and HTTP.

Network Protocols and Concepts

  • When you store your group list in a personal address book, it is your responsibility to keep them up to date.
  • Internet is a worldwide collection of computer networks and gateways.
  • Computers use protocols to communicate with one another.
  • The Internet browser displays images and text.
  • Dial-up networking allows you to connect to a network using a modem.
  • Class A addresses are assigned to networks designed for a very large number of hosts.
  • The command "Router(config-router)# passive-interface s0" is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates.
  • A private IP address is 192.168.24.43
  • Proxy ARP allows a router to respond to an ARP request for a remote host.
  • The Internet layer is equivalent to the Network layer of the OSI model in the DoD model.
  • UDP is used by the following services DHCP, SNMP, and TFTP.
  • Class C provides a maximum of 254 host addresses per network ID.
  • FTP and Telnet use the Application layer to transmit data on the highest level
  • The decimal and hexadecimal equivalents of the binary number 10011101 are 157 and 0x9D.
  • The following statements are true regarding ICMP packets.
    • They can provide hosts with information about network problems
    • They are encapsulated within IP datagrams
  • PPP stands for Point to Point protocol.
  • The Outlook Today feature in Microsoft Outlook appoints for the next 5 days and include task that are over due
  • Transmission Control Protocol (TCP) is used for a Telnet connection where it's being a layer 4 protocol.
  • The four layers in the TCP/IP model is Application, Transport, Internet, and Physical
  • ICMP can provide hosts with information about network problems and it is encapsulated within IP datagrams.
  • The Virtual Private Network creates private networks across the Internet by enabling privacy and tunneling of non-TCP/IP protocols.
  • A firewall provides a high level of security for a network.
  • Erase startup will wipe the contents of the NVRAM and also put the router into setup mode.
  • B class IP address has the most host addresses available by default.
  • VLANs break up broadcast domains in a layer 2 switch internetwork.
  • In a LAN network, Class C addresses are used.
  • "110" - The three high order bits in a class C address are always set to binary.
  • There are 2 types of Hub and it connects 3 major categories of cables that connect the networks.
  • The ATM stands for Asynchronous Transfer Mode
  • The "5" from - "The Internet community has 5 type of IP address" - implies the class full from A to E

TCP/IP and OSI Model

  • Transport layer is equivalent of host-to-host in the TCP/IP model and the OSI model. Host is a connection orientated and not an application.
  • For an IP addressing and information to be completed in a mechanism. DHCP is the best protocol to select to finish this.
  • Domain Name System (DNS) uses TCP and UDP
  • 10xxxXXX is the address range of a Class B network address in binary -The most likely command that sets the enable secret password to Cisco, is enable secret Cisco
  • The commands "show interfaces," "show ip interface," and "show protocols" will display to the current IP addressing and the layer 1 and 2 status of an interface
  • There are no host bits used in multicast operations.

Outlook and System Administration in Windows NT

  • Offline Address Book is a list of recipient addresses that can be downloaded to a client computer.
  • You can give others access to your web presentation by publishing it to a designated server
  • The virtual private network is the VPN acronym
  • The maximum transfer retry is 2
  • "Global Address" - The global address list contains the names and emails.
  • You can check to send and receive with faxes using computer
  • The modem is an analog signal that can be converted to a digital and be signed
  • Faxes are not installed on "window set up" by default.
  • Virtual Private Network (VPN) creates secure, private networks across a public network, such as the Internet.
  • The Global Address List automatically contains the entries in your Contacts folder in the Corporate/Workgroups configuration.
  • Creating a New E-Mail Address in Address Book, you'll click on File and then on the new contact function if you are using this option.
  • "Spin Box" if you are automatically recording to a contact or manually regarding the phone calls and other aspects - you'll be in control of it from contact.
  • All aspects of a "hidden" outlook dialog is to keep tabs and the system'll still be able to track progress, even when boxes are being ticked.
  • The "voting" function helps track the delivery through the check box within the message options through Outlook.
  • You'll find the "To do" with the list of options that helps take the work task adding to track of new dimensions and adding the track progress.
  • The "Actual Box" - to change the percentage, either to increase or decrease the percentage within an active state of progress.
  • In network systems, class A addresses are used for networks with very high number of hosts.
  • Each IP address requires 2 different TP addresses where parameters are considered.
  • Flash - BIOS usually needs to be stored in an eery that often gets the job done with memory
  • The default view in task having the options for columns with 4 options

File Management and System Tools

  • "Performance" is important and to improve whenever server runs files that has multiple drives
  • To a database, to write to the the database engine will firstly write to an actual Transaction Log file.
  • You Can make data and log files reside on different drives for better over Performance.
  • The LAN is a general, class C to address, and connect to a class C, and generally connects to a 2 way method.
  • "NTFS" with "Window NT" is always the best file system but it only supports for window NT operating system (because for any new support system it also implements a new feature.
  • Disk makes sure all parameters are set properly with the communication in (communication) -There are 2 types that can be used from the network, which covers and supports each device.
  • Always leave at 0.0.0.0 window to leave IP addresses with the technical support CSV stands for Comma Separated Value

Network Hardware and Topologies

  • The NIC is the network interface connector device
  • Select the "protocol" within a select point "to point" in settings - select "next" under "protocol" which helps select what kind for the connection within serial line.
  • Ensure that a proper amount (32 to 48 MB of RAM) is supplied with the window
  • The "Noise" can increase for the cable connection with the cable length increases.
  • There 2 types from each "TP address", also with that in mind that (128 MB or RAM) is required from the "Windows NT operation"
  • The common protocol in computer that allows a fast data in files is the "computer".

Troubleshooting

  • If you are using Telnet or FTP, the Application layer is the highest for data transmitting.
  • If the outlook is slow, try the "defragmenter" to improve the performance
  • High is the level of security on a network with a purpose of firewall in high security is being used for the right reasons when the device is in operation.
  • An exchange server is used for an MS office with outlook.
  • "Mailbox home" is home for all the data for an exchange server.

Exchange Server

  • Core components of exchange servers are the services - running on window.
  • Location transparency is the called for users that are not to be concerned with the data, simply to focus on the accessibility of a folder. Folders are stored as exchange servers.
  • 5 MB is transaction log file can store in MS exchange.
  • The DS (Information Store directory) is a is a list of names you can select addresses from.

Network Security and Access

  • The most common protocols that uses Appication layer of the OSI model are Telnet, FTP, and TFTP.
  • Proxies are often used in place of preventing traffic to passing directly between (networks) and provides security from the (bandwidth) using application
  • All exchange data, such as messages and directory information, is stored in various Data base files
  • There are no "Host bits" that are working for a D class - it is a reserved multicast operations system
  • "Two" The number of that "TP address" has

Miscellaneous

  • "MTA component" is "NOT" additional (optional) in exchange server system, it is a "required".
  • A server needs to have multiple for a data to be running within the correct drives.
  • With database engine - the most fastest version will be the best support system for the engine and that 32 is the most accurate one to use.
  • Most permission are in the next hierarchy to which created (higher in the lever)
  • Directory Replication (DR) is a set for each systems

Wireless Standards

  • At 2.4GHz, the frequency range of an IEEE 802.11b. Also it follows the IEEE 802.11b - At "2.4GHz"

"Lower Right Corner" is an option to select to customize the Outlook Todays options.

"Outlook 2000" is a flexible environment and can be used "business" or "personal".

  • mail merge helper can create form letters and labels, and can also mail the items for the sender

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

IPv6 Addressing
90 questions

IPv6 Addressing

ProdigiousQuantum avatar
ProdigiousQuantum
IPv6 and IP Addressing Quiz
12 questions

IPv6 and IP Addressing Quiz

TenaciousFeynman9892 avatar
TenaciousFeynman9892
Understanding IPv6 Addressing
39 questions

Understanding IPv6 Addressing

PermissibleAltoSaxophone avatar
PermissibleAltoSaxophone
Use Quizgecko on...
Browser
Browser