Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Discovery2

QuestionAnswer
What is ecommerce Any business that can be conducted over the web
Collaboration and Training "Creating environments that allow for sharing of documents, presentations, and spreadsheets."
Internet standards A set of rules that determines how something must be done.
What are some addidional services offered by ISPs (6) "Equipment-co=location, Web Browsing, FTP,Application and media hosting, VOIP, Support, POP Internet Access."
What type of cable is used by a cable modem " Coax, the same as used for cable television."
What is SDSL Symetrical Digital Subscriber Line.
What are the speed ranges for stelite 128kbs to 523 kbps.
What are the three high bandwidth options available "T1, T3, metro ethernet."
T1 Up to 1.544Mbps symmetrical.
T3 Up to 45 Mbps.
Metro Ethernet Uses switched technology up to Gbps links for large companies.
What does a POP do Located at the edge of the ISP network provides authentication for multiple users and serves a geographic area.
What is at the top of the Internet Hierarchy ISP organisations whose POPS join together to an Internet Exchange Point (IXP) or Network Access Point (NAP) to access each other’s networks.
What is a tier 1 ISP Huge organisations that connect to one another through private peering and joining their backbones together to create the Internet backbone.
What is a tier 2 ISP Large companies but don’t usually have networks spanning continents they often pay tier one for access or use public peering.
What is a tier 3 ISP Further away from the backbone they pay tier1 and tier 2 companies for access.
What type of packet does Ping send Internet Control Message Protocol
What does the NOC at an ISP do Tests and monitors new connections and ensures proper performance.
What is the role of the planning and provisioning team in an ISP Determines whether new customer has existing network hardware and circuits.
What is level one help desk support Immediate help handled by junior technicians.
What is level two help desk support Elevated support calls. But done remotely.
What is level three help desk support Higher grade needs a site visit.
What is the application layer for Defines interfaces between application software and network communication functions and Provides standardized services such as file transfer between systems.
Presentation Layer Standardizes user data formats for use between different types of systems andEncodes and decodes user data; encrypts and decrypts data; compresses and decompresses data.
Session Layer Manages user sessions and dialogues and Manages links between applications.
Transport Layer Manages end-to-end message delivery over the network and can provide reliable and sequential packet delivery through error recovery and flow control mechanisms.
Network Layer Provides logical network addressing and Routes packets between networks based on logical addressing.
Data Link Layer Defines procedures for operating the communication links;Detects and corrects frame transmit errorsAdds physical addresses to frame.
Physical Layer Defines physical means of sending data over network devices.
The term upper layer Is sometimes used to refer to any layer above the Transport layer of the OSI model ;The upper layers deal with application functionality and are generally implemented only in software
Layer 7 Protocols "DNS, NFS, DHCP, SNMP, FTP, TFTP, SMTP, POP3, I MAP, HHTP, Telnet."
Layer 6 Protocols "SSL, shells and redirectors, MIME"
Layer 5 Protocols "NetBIOS, application program interfaces, remote procedure calls (RPCs)."
Layer 4 Protocols TCP and UDP.
Layer 3 Protocols "IPv4, IPv6, IP NAT."
Layer 2 Protocols "W LAN, Wi Fi, ATM, PPP."
TCP/IP stack error checking Ping loopback will show if this is an issue.
What are the five steps needed by an onsite technician 1/Provide Identification 2/Review ticket for correctness 3/Communicate actions you expect to take 4/Get permission to begin work5/Confirm work done with client.
Managed service "The equipment is obtained from the ISP through a lease or some other agreement, and the ISP is responsible for updating and maintaining the equipment."
failure domain A failure domain is the area of the network affected when a piece of networking equipment malfunctions or fails.
Catalyst 2960 switches are "Entry-level, enterprise-class, fixed-configuration switching that is optimized for Access Layer deployments; Fast Ethernet and Gigabit Ethernet to desktop configurations; Ideal for entry-level enterprise, mid-market, and branch-office environments; Comp
Class A private addresses Address range: 10.0.0.0 to 10.255.255.255
Class B private addresses : 172.16.0.0 to 172.31.255.255.
Class C private addresses Address range: 192.168.0.0 to 192.168.255.255.
With traditional classful subnetting The same number of host bits is used to designate the subnet ID for all the resulting subnetworks
Variable length subnet masking (VLSM) VLSM addressing allows an address space to be divided into networks of various sizes; This is done by subnetting subnets
Classless Inter-Domain Routing (C I D R) CIDR "protocols freed routers from using only the high-order bits to determine the network prefix. Removing that restriction eliminated the need to allocate registered IP addresses by address class; By ignoring the traditional address classes, CIDR enabl
What are 3 disadvantages of NAT Incompatibility with certain applications; Hinders legitimate remote access; Performance reduction caused by increased router processing
NAT Inside local network Refers to any network connected to a router interface that is part of the privately addressed LAN. Hosts on inside networks have their IP addresses translated before they are transmitted to outside destinations.
NAT Outside global network Any network attached to the router that is external to the LAN and does not recognize the private addresses assigned to hosts on the LAN.
NAT Inside local address - Private IP address configured on a host on an inside network. The address must be translated before it can travel outside the local network addressing structure.
NAT Inside global address IP address of an inside host as it appears to the outside network. This is the translated IP address.
NAT Outside local address "Destination address of the packet while it is on the local network. Usually, this address is the same as the outside global address."
NAT Outside global address - Public IP address of an external host. The address is allocated from a globally routable address or network space.
Dynamic NAT "allows hosts on a private network that have private IP addresses to access a public network, such as the Internet; Dynamic NAT occurs when a router assigns an outside global address from a pre-defined address, or pool of addresses, to an inside private
Static translations ensure that an individual host private IP address is always translated to the same registered global IP address; It ensures that no other local host is translated to the same registered address.
Port-based Network Address Translation (PAT) "PAT translates multiple local addresses to a single global IP address. The gateway router receives the request and translates the source IP address to the one available public IP address. It then chooses an available port number from the available ports
A general list of improvements that IPv6 proposes are "1/ More address space2/ Better address space management3/Easier TCP/IP administration4/Modernized routing capabilities5/Improved support for multicasting, security, and mobility."
IPV6 Address length 128 : 32 hex digit: Expressed in eight groups of four.
What are the first three blocks of an IPV6 address The global prefix is the first three blocks of the address and is assigned to an organization by an Internet names registry. T
The entry-level Cisco IOS software image is called The IP Base image.
Command to save startup configuration file copy running-config startup-config.
show version command can be used to verify and troubleshoot some of the basic hardware and software components used during the bootup process
Show version command outputs "1/The Cisco IOS software version being used. 2/The version of the system bootstrap software, stored in ROM memory, that was initially used to boot the router. 3/The complete filename of the Cisco IOS image and where the bootstrap program located it. 4/Ty
dir flash command Looks for a valid image and used to troubleshoot.
boot flash: command Used to manually boot an image and used to troubleshoot.
If the router boots with the boot flash command what procedure do you follow "First, use the show version command to check the configuration register to ensure that it is configured for the default boot sequence. If the configuration register value is correct, use the show startup-config command to see if there is a boot system co
Out-of-band Management Direct connect ion to device through console.
Security Device Manager (SDM) " ISRis a web-based GUI device management tool. Unlike CLI, SDM can be used only for in-band management tasks."
Cisco SDM Express Is a tool bundled within the Cisco Router and Security Device Manager that makes it easy to create a basic router configuration
A serial connection can be used to connect networks that are separated by large geographic distances. These WAN network interconnections require a telecommunications service provider (TSP).
Protocol Encapsulation for a serial connection The protocol encapsulation must be the same at both ends of a serial connection.
High-Level Data Link Control (HDLC) A bit-orientated Data Link Layer protocol developed by the International Standards Organization (I S O
Frame Relay "A packet-switch Data Link Layer protocol that handles multiple virtual circuits, meaning that the circuit connections are temporarily built up and torn down based on need. The D L C I is a required number, supplied by the service provider to identify the
Point-to-Point Protocol (P P P) "Commonly used to establish a direct connection between two devices. It can connect computers using serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber-optic links. Most Internet service providers use PPP for custom
Commands that can be executed in user EXEC mode "are limited to obtaining information about how the device is operating, and troubleshooting using some show commands and the ping and traceroute utilities."
Privelage Exec Mode Enter commands that can alter the operation of the device requires privileged level access. Enable the privileged EXEC mode by entering enable at the command prompt and pressing Enter.
To disable the privileged mode and return to user mode enter disable at the command prompt.
"To enter global configuration, type the command " configure terminal or config t. Global configuration mode is indicated by the command line prompt Router(config)#
Interface configuration mode Is used to configure LAN and WAN interfaces.
"To access interface configuration mode, from global configuration " Type the command interface [type] [number]. Interface configuration mode is indicated by the command prompt: Router(config-if)#
The router configuration submode Router(config-router)#
Some of the more popular show commands are show running-config; show interfaces; show arp;show ip route;show protocols;show version
When should a device be assigned a name A device should be given a unique name as one of the first configuration tasks. This task is accomplished in global configuration mode with the following command. Router(config)# hostname [name]
What commands do you use to restrict access to the router "The enable password and enable secret commands are used to restrict access to privileged EXEC mode, preventing unauthorized users from making configuration changes to the router"
Banners "A banner is text that a user sees when initially logging on to the router. Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that welcomes an u
To configure the banners "The commands are banner motd and banner login. For both types, a delimiting character, such as a #, is used at the beginning and at the end of the message. The delimiter allows the user to configure a multiline banner."
If both banners are configured The login banner appears after the MOTD but before the login credentials.
To keep the unsolicited output separate from the typed input The logging synchronous command can be entered in global configuration mode.
Disabling Domain Lookup "By default, when a host name is entered in enable mode, the router assumes that the user is attempting to telnet to a device. The router tries to resolve unknown names entered in enable mode by sending them to the DNS server. This process includes any wo
When a router connects to the ISP network using a serial connection what type of connection is required "A CSU/DSU is required if the WAN is digital. A modem is required if the WAN is analog. These devices convert the data from the router into a form acceptable for crossing the WAN, and convert data from the WAN into an acceptable format for the router"
What type of equipment are Cisco routers by default "Cisco routers are data terminal equipment (DTE) devices. Because the DCE devices control the timing of the communication with the router, the Cisco DTE devices accept the clock rate from the DCE device. "
What are the steps to configure an interface "Step 1. Specify the type of interface and the interface port number. Step 2. Specify a description of the interface. Step 3. Configure the interface IP address and subnet mask. Step 4. Set the clock rate, if configuring a serial interface as a DCE. Step
Default Route The default route is used by the router only if the router does not know where to send a packet.
Default route in a Cisco router must be done in what mode Configuring the default route on a Cisco ISR must be done in global configuration mode.
What are eight basic steps to configuring DHCP using the CLI Step 1. Create a DHCP address pool.Step 2. Specify the network or subnet.Step 3. Exclude specific IP addresses.Step 4. Specify the domain name.Step 5. Specify the IP address of the DNS server.Step 6. Set the default gateway.Step 7. Set the lease duration.
What are the steps to configure a NAT using the CISCO IOS Step 1. Specify the inside interface.Step 2. Set the primary IP address of the inside interface.Step 3. Identify the inside interface using the ip nat inside command.Step 4. Specify the outside interface.Step 5. Set the primary IP address of the outside i
To output detailed NAT assignments show ip nat translations
Displays information about the total number of active NAT translations show ip nat statistics
View NAT configurations Use the show run command.
One way configuration files can be saved to a network server is using TFTP. The TFTP server must be accessible to the router via a network connection. The setpes involved are Step 1. Enter the copy startup-config tftp command. Step 2. Enter the IP address of the host where the configuration file will be stored. Step 3. Enter the name to assign to the configuration file or accept the default.Step 4. Confirm each choice by answe
C P E Customer Premises Equipment.
Packet-Switched "In a packet-switched connection, networks have connections into the TSP switched network. Many customers share this TSP network. Instead of the circuit being physically reserved from source to destination, as in a circuit-switched network, each customer
Point-to-Point "A point-to-point connection is a predefined communications path from the customer premises through a TSP network. It is a dedicated circuit with fixed bandwidth available at all time. Point-to-point lines are usually leased from the TSP. These lines are
Circuit-Switched "A circuit-switched connection functions similarly to the way a phone call is made over a telephone network. When making a phone call to a friend, the caller picks up the phone, opens the circuit, and dials the number. The caller hangs up the phone when f
What are the 3 types of serial WAN connections "PointoPoint, Packet Switched, Circuit Switched."
The Cisco default serial encapsulation is "HDLC. It can be changed to PPP, which provides a more flexible encapsulation and supports authentication by the remote device."
Created by: tmat
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards