Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Advance Networking F

From midterms to finals

Answer
Access the console line to add Switch(config)# line console 0 Access the console line to add
Lalagyan password yung pag enter pa lang Switch(config-line)# password <> Switch(config-line)# login
Lalagyan ng encrypted password Switch(config)# enable secret <>
Encrypt lahat ng password Switch(config)# service password-encryption
Lalagyan ng motto of the day Switch(config)# banner motd “”
Lalagyan ng name yung device Switch(config)# hostname <>
Routers interface ay automatic shutdown by default True
Routers interface ay hindi automatic shutdown by default false
Switch interface ay hindi automatic shutdown by default True
Switch interface ay automatic shutdown by default false
Shortcut para sa mga interfaces Switch(config)# int range fa0/1 - 21
Off ang interfaces sa switches Switch(config-if-range)#shutdown
Lalagyan notes sa bawat interface Switch(config-if-range)#description <>
The steps in IP routing Step 1: Assign IP Address sa bawat port ng Routers Step 2: Assign IP Address to End Devices and make sure to add a Gateway Address Step 3: Use IP route
Lalagyan ng ip bawat port Router(config-if)# ip address <ip address> <subnet> Router(config-if)# no shut
Config ng route sa lahat ng ports Router(config)# ip route <destination address> <subnet mask> <next hop>
Make sure na naka write memory para safe Router# wr mem
under RIPv2 This accessesthe router as rip Router(config)# router rip
use v2 Router(config-router)# version 2
under RIPv2 do not use classfull networks Router(config-router)# no auto-summary
under ROPv2 No need to put network mask Router(config-router)# network <ip address>
Under EIGRP access the router as a rip Router(config)# router eigrp 1
under EIGRP Do not use classful networks Router(config-router)# no auto-summary
find the network within the EIGRP ip routing Router(config-router)# network 10.0.0.0
Under EIGRP Wild card mask = 255.255.255.255 minus ip address Router(config-router)# network <ip address> <wildcard mask>
Steps in getting the vlan configuration for static Step 1: Implement port-channel if needed (usually 2 switches between the networks) Step 2: Implement trunking for the port-channel Step 3: Assign each interface to a switchport and access VLAN
Checks the vlan configs Switch# show vlan brief
Naming the VLANs Switch(config)# vlan <> Switch(config-vlan) name <>
Sets up the port-channel Switch(config)# interface port-channel 1 Switch(config-if)# range g0/1 – 2 Switch(config-if-range)# channel-group 1 mode on
Sets up the trunk under static vlan configurations Switch(config)# int port-channel 1 Switch(config-if)# switchport mode trunk
Assigning the interface of vlan under static configurations Switch(config-if)# switchport mode access Switch(config-if)# switchport access vlan <>
The first step on configuring a Router on a stick Step 1: Assign VLANs on the Switch (switchport mode access, switchport access vlan)
After assigning the VLANs in the switch port on a router on the stick what is the next step? Step 2: Switchport mode trunk the port that is connected to the Router
Once you trunked the ports that is connected to a router what is the next step to configure a Router on a stick Step 3: Assign the End Devices an IP Address at make sure may default gateway sa port ng router
The final step on Router on a Stick after you assign the end devices an Ip add Step 4: Configure bawat sub-interface, nag iincrement yung g0/0/0.2 tas yung ip don dapat gateway ng bawat VLAN
Enables the connected switch on a Router on a stick Router(config-if)# no shut
Lalagyan ng VLAN access via encapsulation sa bawat sub-interfaces Router(config)# int g0/0/0.2 Router(config-subif)# encapsulation dot1Q <vlan number> Router(config-subif)# ip address <ip address> <subnet mask>
Dunamic trunking protocol Switch(config-if)# switchport mode dynamic <auto/desirable>
Steps in VLAN Trunking protocol Step 1: Make all the switches interface as TRUNK Step 2: Assign each Switch kung sino ang client, domain, mode, password at version Step 3: Write Memory Step 4: Configure the VTP SERVER SWITCH the vlan and its name
Assigning sa lahat ng switch para makopya VLANs Switch(config)# vtp mode <server/client> Switch(config)# vtp domain cisco.com Switch(config)# vtp password cisco Switch(config)# vtp version 2 Switch# wr mem
Check lang ng spanning tree sa interface Switch# show spanning-tree int fa0/1 detail
Apply only sa port na may end device Pag may default, auto implement sa lahat ng ports Switch(config-if)# spanning-tree portfast
Apply sa need ng guard Switch(config-if)# spanning-tree bpduguard enable
Gagawing pvst Switch(config)# spanning-tree mode pvst
Manipulate ng priority ID kung sino primary at secondary Switch(config)# spanning-tree vlan 1 root primary Switch(config)# spanning-tree vlan 1 root secondary Switch(config)# spanning-tree vlan 1 priority <>
What type of network traffic requires QoS? Video Conferencing
Which interface allows remote management of a Layer 2 switch the switch virtual interface
What functions does pressing the Tab key have when entering a command in the IOS? completes the remainder of a partially typed word in a command
Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network Segments are sent from the transport layer to the internet layer
the layer 2 address of the device which sent the frame Source
5C:23:5A:24:2B:3D is the MAC Address format of: LINUX and IOS
Frames that are larger than the maximum frame size (1518 bytes) Giants
5C-23-5A-24-2B-3D is the MAC Address format of: Windows
This layer is closest to the end user. Interacts with software applications, for example your web browser (Brave, Firefox, Chrome, etc). Layer 7 Application
Light enters at a single angle (mode) from a laser-based transmitter (ANSWER IN ALL CAPS) Single Mode Fiber
ARP Reply is Unicast – sent only to one host ( the host that sent the request) True
Preamble and SFD is usually considered part of the Ethernet header False ( *Preamble and SFD is usually not considered part of the Ethernet* *header.)*
Are known as “ Next-Generation Firewalls” when they include more modern and advanced filtering capabilities (ANSWER IN ALL CAPS) Firewall
Which name is assigned to the transport layer PDU? segment
When IPv4 addressing is manually configured on a web server, which property of the IPv4 configuration identifies the network and host portion for an IPv4 address? subnet mask
What process involves placing one PDU inside of another PDU? encapsulation
What layer is responsible for routing messages through an internetwork in the TCP/IP model? internet
Which PDU format is used when bits are received from the network medium by the NIC of a host? frame
Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond? response timeout
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? Ethernet, IP, TCP, HTTP
At which layer of the OSI model would a logical address be added during encapsulation? network layer
What is a characteristic of multicast messages? they are sent to a select group of host
Which statement is correct about network protocols? They define how messages are exchanged between the source and the destination.
What is an advantage of network devices using open standard protocols? A client host and a server running different operating systems can successfully exchange data.
Which device performs the function of determining the path that messages should take through internetworks? router
Why would a Layer 2 switch need an IP address? to enable the switch to be managed remotely
What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device? cloud
What term describes a network where one computer can be both client and server? peer to peer
What term describes a type of network used by people who work from home or from a small remote office? SOHO network
What term describes a computing model where server software runs on dedicated computers? client/server
What term describes a technology that allows devices to connect to the LAN using an electrical outlet? powerline networking
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video? quality of service
What term describes a private collection of LANs and WANs that belongs to an organization? intranet
What term describes the ability to use personal devices across a business or campus network? BYOD bring your own device
At which OSI layer is a destination port number added to a PDU during the encapsulation process? transport layer
At which OSI layer is data added to a PDU during the encapsulation process? application layer
At which OSI layer is a source IP address added to a PDU during the encapsulation process? network layer
At which OSI layer is a source MAC address added to a PDU during the encapsulation process data link layer
Indicate the total length of the packet (L3 header + L4 segment) IPV4 Header TotalLength Field
a network engineer/admin manually configure routes on the router Static Routing
Used for synchronization and to allow the receiving device to be prepared to received the rest of data in the frame. Preamble and SFD
routers use dynamic routing protocol (ex. OSPF) to share routing information with each other automatically and build their routing tables Dynamic Routing
Controls dialogues (sessions) between communicating hosts. Establishes, manages, and terminates connections between the local application (for example, your web browser) and the remote application (for example, YouTube). Layer 5 Session
a device that provides functions or services for clients Server
Dynamic MAC addresses are removed from the MAC address table after 5 min of inactivity. True
Used to indicate the position of the fragment within the original IPV4 Header Fragment offset Field
If the minimum payload(packet) is less than 46 bytes, padding bytes are added. true
sent to inform the requesting device of the MAC address arp reply
SFD has a length of 1 byte (8-bit) true
ARP Request is broadcast – sent to all host on the network. true
Identifies the length of the header in 4 –byte increments IPV4 Header Internet Header Length
used to identify which packet the frame fragment belongs to IPV4 Header Identification Field
Translate between application and network formats. For example, encryption of data as it is sent, and decryption of data as it is received. Layer 6 Presentation
software applications that filter traffic entering and exiting a host machine, like a PC Host-based firewalls
Provides end-to-end (between two points) notification of networks congestion without dropping packets. IPV4 Header ECN Field
a digital telecommunications network that allows nodes to share resources Computer Network
are configured on switches on per-interface basis VLAN
Used for QoS (Quality of Service) IPV4 Header DDCSP FIeld
store routes to all of their known destination in a routing table, Routers
Have fewer network interfaces than switches Routers
The size of the Ethernet header and trailer is 6+6+2+4 = 18 bytes. True
Used to control/identify fragments IPV4 Header Flag Field
The native VLAN is VLAN 1 by default on all trunk ports and can be manually configures on each trunk port. True
switchports which carry multiple VLANs Trunk Port
Are therefore used to send data over the Internet Routers
Conceptual model and set of communications protocols used on the Internet and other networks. TCP/IP
hardware devices that filter traffic between networks Network Firewalls
is a collection of network protocols/standards ethernet
Switches do not forward traffic directly between host in different VLANs true
a process that routers use to determine the path the IP packets should take over a network to reach their destination Routing
Have many network interfaces/ports for end hosts to connect to (usually 24+) Switch
Have the shutdown command applied by default – will be in the administratively down/down state by default Router Interface
0011.5ccc.5c00 is the MAC Address format of: Cisco
the layer 2 address to which the frame is being sent Destination
When the number of VLANs increases, this is not viable. It will result in wasted interfaces, and often routers won’t have enough interfaces for each VLAN. What should be done? Use trunk port to carry traffic from multiple VLANs over a single interface.
Frames that have an incorrect format Frames
When a device sends some data to another device, it doesn’t just include a source and destination MAC address. True
a single broadcast domain, including all devices that broadcast domain LAN
[Marks the end of the preamble, and the beginning of the rest of the frame SFD
If you disable service password-encryption Current passwords will not be decrypted Future passwords will not be encrypted
The minimum payload(packet) sized is 36 bytes. False
A network utility that is used to test reachability PIng
Frames that are smaller than the maximum frame size (64 bytes) Runts
Default gateway configuration is also called default route. True
When sending data to another computer, you enter MAC address not the IP address. false
Provides node-to-node connectivity and data transfer (for example, PC to switch, switch to router, router to router). Defines how data is formatted for transmission over a physical medium (for example, copper UTP cables). Layer 2 Data link
a device that accesses a service made available by a server Client
sent by the device that wants to know the MAC address of the other device ARP Request
Also known as Burned –In Address (BIA) MAC Address
refer to logical rules about how the devices should communicate, not physical standards Protocols
indicates the layer 3 protocol used in the encapsulated packet ( IPV4 or IPV6), sometimes this is called a length field- indicating the length of the encapsulated data. Type
Used to check for errors only in the IPv4 header PV4 HEADER – HEADER CHECKSUM FIELD
A /32 netmask is used to specify the exact IP address of the interface. /32 means all 32 bits are fixed and can be changed. False A /32 netmask is used to specify the exact IP address of the interface. /32 means all 32 bits are fixed and can't be changed.
Allows multiple angles (modes) of light waves to enter the fiberglass core MULTIMODE FIBER
What if autonegotiation is disable on the device connected to the switch? The switch will try to sense the speed that the other device is operating at. If it fails to sense the speed, it will use the slowest supported speed.
If you enable service password-encryption: Current passwords will be encrypted Future passwords will be encrypted The enable secret will not be affected
Preamble has a length of 7 byte (56-bit) true
used by the receiving device to detect any errors that might have occurred in transmission. FRAME CHECK SEQUENCE
Preamble has a length of 7 byte (54-bit). False Preamble has a length of 7 byte (56-bit).
a switchport which belongs to a single VLAN, and usually connects to end hosts like PCS Access Port
categorize and provide a structure for networking protocols and standards Network Models
Interfaces that can run at the same speed (10/100 or 10/100/1000) have default settings of speed auto and duplex auto. False Interfaces that can run at different speeds (10/100 or 10/100/1000) have default settings of speed auto and duplex auto.
Provide connectivity to hosts within the same LAN (Local Area Network) Switches
Do not have the shutdown command applied by default – will be in up/up state if connected to another device or down/down state if not connected to another device. Switch Interface
Router and layer 3 switch (multi- layer switch) operates at network laye true
Frames that failed the CRC check(in the ethernet FCS Trailer) CRC
Frames the switch tried to send , but failed due to error Output Errors
Breaks large pieces of data into smaller segments which can be more easily sent over the network and are less likely to cause transmission problems if errors occur. Provide host-to-host communication. LAYER 4: TRANSPORT
Used to prevent infinite loops IPV4 HEADER – TIME TO LIVE FIELD
Speed is measured in bits per second (Kbps, Mbps, Gbps, etc.) not bytes per second. True
Allows devices to synchronize their receiver clocks. Preamble
Monitor and control network traffic based on configured rules Firewalls
Total of various counters, such as the above four Inout Errors
Defines physical characteristics of the medium used to transfer data between devices. LAYER 1: PHYSICAL
- A _______is a digital telecommunications network that allows nodes to share resources - Router - Switch - Firewall - Server - Client computer network
A _____is a device that accesses a service made available by a server. CLIENT
A _____is a device that provides functions or services for clients Server
Have many network interfaces/ports for end hosts to connect to (usually 24+) Switches
Provide connectivity to hosts within the same LAN (Local Area Network) Switches
Do not provide connectivity between LANs/over the internet Switches
Have fewer network interfaces than switches Routers
Are used to provide connectivity between LANs Routers
Routers are used to send data over the internet True
These monitor and control network traffic based on the configuration rules Firewall
Are known as “Next-Generation Firewalls” when they include more modern, advanced filtering capabilities Firewalls
CISCO classic firewall, but modern ASAs include modern features so-called “next generation firewalls” including IPS (Intrusion Protection System) ASA (Adaptive Security Appliance)
are hardware devices that filter traffic between networks NETWORK FIREWALLS
are software applications that filter traffic entering and exiting a host machine, like a PC HOST-BASED FIREWALLS
You are setting up a network for a small office and need a device to connect multiple computers within a local area network (LAN). Which device would best suit this purpose? Switch
A company wants to ensure that its internal network is secure and isolated from the public internet. Which device should be installed to provide this protection? Firewall
You need to connect two different networks that use different protocols. Which network device will facilitate this connection? Gateway
In a network, which device is responsible for forwarding packets based on their IP address to reach devices outside of the LAN? Router
Which device would be most suitable to expand a Wi-Fi network's coverage within a large office building? Access Point
Which type of interface is commonly used to connect a router’s console port to a computer for configuration purposes? Serial
You need to connect two network switches in different buildings across a large campus. Which type of cable is most suitable? Fiber Optic
What type of cable is commonly used to connect a computer directly to a switch within a network? Ethernet
What is the subnet mask for the IP address 192.168.23.45/16? 255.255.0.0
How many bits are in the subnet mask for the CIDR notation /16? 16 bits
What is the network address for 192.168.23.45/16? 192.168.0.0
How many possible IP addresses are available in the /16 subnet? 65,536
What is the first usable IP address in the subnet 192.168.0.0/16? 192.168.0.1
What is the last usable IP address in the subnet 192.168.0.0/16? 192.168.255.254
What is the broadcast address for 192.168.23.45/16? 192.168.255.255
If the subnet is /16, how many bits are available for host addresses? 16 bits
What would the CIDR notation be if the subnet mask was 255.255.255.0? /24
How many subnets are created if a /16 network is divided into /24 subnets? 256 subnets
What is the IP class for 192.168.23.45? Class C
If 192.168.23.45 belongs to a /16 subnet, what is the subnet range? 192.168.0.0 to 192.168.255.255
For 192.168.23.45/16, how many host addresses can each subnet support? 65,534
What would the subnet mask be for a /20 CIDR? 255.255.240.0
In binary, what does a /16 subnet mask look like? 11111111.11111111.00000000.00000000
What is the default subnet mask for a Class C IP? 255.255.255.0
Convert the subnet mask 255.255.0.0 to CIDR notation. /16
If a subnet has 65,536 addresses, what is its CIDR notation? /16
What is the last octet range for the network address 192.168.0.0/16? 0 to 255
If a device has the IP address 192.168.23.45/16, is 192.168.100.50 in the same subnet? Yes
Created by: Nochubuena
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards