click below
click below
Normal Size Small Size show me how
Discovery2
| Question | Answer |
|---|---|
| What is ecommerce | Any business that can be conducted over the web |
| Collaboration and Training | "Creating environments that allow for sharing of documents, presentations, and spreadsheets." |
| Internet standards | A set of rules that determines how something must be done. |
| What are some addidional services offered by ISPs (6) | "Equipment-co=location, Web Browsing, FTP,Application and media hosting, VOIP, Support, POP Internet Access." |
| What type of cable is used by a cable modem | " Coax, the same as used for cable television." |
| What is SDSL | Symetrical Digital Subscriber Line. |
| What are the speed ranges for stelite | 128kbs to 523 kbps. |
| What are the three high bandwidth options available | "T1, T3, metro ethernet." |
| T1 | Up to 1.544Mbps symmetrical. |
| T3 | Up to 45 Mbps. |
| Metro Ethernet | Uses switched technology up to Gbps links for large companies. |
| What does a POP do | Located at the edge of the ISP network provides authentication for multiple users and serves a geographic area. |
| What is at the top of the Internet Hierarchy | ISP organisations whose POPS join together to an Internet Exchange Point (IXP) or Network Access Point (NAP) to access each other’s networks. |
| What is a tier 1 ISP | Huge organisations that connect to one another through private peering and joining their backbones together to create the Internet backbone. |
| What is a tier 2 ISP | Large companies but don’t usually have networks spanning continents they often pay tier one for access or use public peering. |
| What is a tier 3 ISP | Further away from the backbone they pay tier1 and tier 2 companies for access. |
| What type of packet does Ping send | Internet Control Message Protocol |
| What does the NOC at an ISP do | Tests and monitors new connections and ensures proper performance. |
| What is the role of the planning and provisioning team in an ISP | Determines whether new customer has existing network hardware and circuits. |
| What is level one help desk support | Immediate help handled by junior technicians. |
| What is level two help desk support | Elevated support calls. But done remotely. |
| What is level three help desk support | Higher grade needs a site visit. |
| What is the application layer for | Defines interfaces between application software and network communication functions and Provides standardized services such as file transfer between systems. |
| Presentation Layer | Standardizes user data formats for use between different types of systems andEncodes and decodes user data; encrypts and decrypts data; compresses and decompresses data. |
| Session Layer | Manages user sessions and dialogues and Manages links between applications. |
| Transport Layer | Manages end-to-end message delivery over the network and can provide reliable and sequential packet delivery through error recovery and flow control mechanisms. |
| Network Layer | Provides logical network addressing and Routes packets between networks based on logical addressing. |
| Data Link Layer | Defines procedures for operating the communication links;Detects and corrects frame transmit errorsAdds physical addresses to frame. |
| Physical Layer | Defines physical means of sending data over network devices. |
| The term upper layer | Is sometimes used to refer to any layer above the Transport layer of the OSI model ;The upper layers deal with application functionality and are generally implemented only in software |
| Layer 7 Protocols | "DNS, NFS, DHCP, SNMP, FTP, TFTP, SMTP, POP3, I MAP, HHTP, Telnet." |
| Layer 6 Protocols | "SSL, shells and redirectors, MIME" |
| Layer 5 Protocols | "NetBIOS, application program interfaces, remote procedure calls (RPCs)." |
| Layer 4 Protocols | TCP and UDP. |
| Layer 3 Protocols | "IPv4, IPv6, IP NAT." |
| Layer 2 Protocols | "W LAN, Wi Fi, ATM, PPP." |
| TCP/IP stack error checking | Ping loopback will show if this is an issue. |
| What are the five steps needed by an onsite technician | 1/Provide Identification 2/Review ticket for correctness 3/Communicate actions you expect to take 4/Get permission to begin work5/Confirm work done with client. |
| Managed service | "The equipment is obtained from the ISP through a lease or some other agreement, and the ISP is responsible for updating and maintaining the equipment." |
| failure domain | A failure domain is the area of the network affected when a piece of networking equipment malfunctions or fails. |
| Catalyst 2960 switches are | "Entry-level, enterprise-class, fixed-configuration switching that is optimized for Access Layer deployments; Fast Ethernet and Gigabit Ethernet to desktop configurations; Ideal for entry-level enterprise, mid-market, and branch-office environments; Comp |
| Class A private addresses | Address range: 10.0.0.0 to 10.255.255.255 |
| Class B private addresses | : 172.16.0.0 to 172.31.255.255. |
| Class C private addresses | Address range: 192.168.0.0 to 192.168.255.255. |
| With traditional classful subnetting | The same number of host bits is used to designate the subnet ID for all the resulting subnetworks |
| Variable length subnet masking (VLSM) | VLSM addressing allows an address space to be divided into networks of various sizes; This is done by subnetting subnets |
| Classless Inter-Domain Routing (C I D R) | CIDR "protocols freed routers from using only the high-order bits to determine the network prefix. Removing that restriction eliminated the need to allocate registered IP addresses by address class; By ignoring the traditional address classes, CIDR enabl |
| What are 3 disadvantages of NAT | Incompatibility with certain applications; Hinders legitimate remote access; Performance reduction caused by increased router processing |
| NAT Inside local network | Refers to any network connected to a router interface that is part of the privately addressed LAN. Hosts on inside networks have their IP addresses translated before they are transmitted to outside destinations. |
| NAT Outside global network | Any network attached to the router that is external to the LAN and does not recognize the private addresses assigned to hosts on the LAN. |
| NAT Inside local address | - Private IP address configured on a host on an inside network. The address must be translated before it can travel outside the local network addressing structure. |
| NAT Inside global address | IP address of an inside host as it appears to the outside network. This is the translated IP address. |
| NAT Outside local address | "Destination address of the packet while it is on the local network. Usually, this address is the same as the outside global address." |
| NAT Outside global address | - Public IP address of an external host. The address is allocated from a globally routable address or network space. |
| Dynamic NAT | "allows hosts on a private network that have private IP addresses to access a public network, such as the Internet; Dynamic NAT occurs when a router assigns an outside global address from a pre-defined address, or pool of addresses, to an inside private |
| Static translations | ensure that an individual host private IP address is always translated to the same registered global IP address; It ensures that no other local host is translated to the same registered address. |
| Port-based Network Address Translation (PAT) | "PAT translates multiple local addresses to a single global IP address. The gateway router receives the request and translates the source IP address to the one available public IP address. It then chooses an available port number from the available ports |
| A general list of improvements that IPv6 proposes are | "1/ More address space2/ Better address space management3/Easier TCP/IP administration4/Modernized routing capabilities5/Improved support for multicasting, security, and mobility." |
| IPV6 Address length | 128 : 32 hex digit: Expressed in eight groups of four. |
| What are the first three blocks of an IPV6 address | The global prefix is the first three blocks of the address and is assigned to an organization by an Internet names registry. T |
| The entry-level Cisco IOS software image is called The IP Base image. | |
| Command to save startup configuration file | copy running-config startup-config. |
| show version command | can be used to verify and troubleshoot some of the basic hardware and software components used during the bootup process |
| Show version command outputs | "1/The Cisco IOS software version being used. 2/The version of the system bootstrap software, stored in ROM memory, that was initially used to boot the router. 3/The complete filename of the Cisco IOS image and where the bootstrap program located it. 4/Ty |
| dir flash command | Looks for a valid image and used to troubleshoot. |
| boot flash: command | Used to manually boot an image and used to troubleshoot. |
| If the router boots with the boot flash command what procedure do you follow | "First, use the show version command to check the configuration register to ensure that it is configured for the default boot sequence. If the configuration register value is correct, use the show startup-config command to see if there is a boot system co |
| Out-of-band Management | Direct connect ion to device through console. |
| Security Device Manager (SDM) | " ISRis a web-based GUI device management tool. Unlike CLI, SDM can be used only for in-band management tasks." |
| Cisco SDM Express | Is a tool bundled within the Cisco Router and Security Device Manager that makes it easy to create a basic router configuration |
| A serial connection can be used to connect networks that are separated by large geographic distances. These WAN network interconnections require a telecommunications service provider (TSP). | |
| Protocol Encapsulation for a serial connection | The protocol encapsulation must be the same at both ends of a serial connection. |
| High-Level Data Link Control (HDLC) | A bit-orientated Data Link Layer protocol developed by the International Standards Organization (I S O |
| Frame Relay | "A packet-switch Data Link Layer protocol that handles multiple virtual circuits, meaning that the circuit connections are temporarily built up and torn down based on need. The D L C I is a required number, supplied by the service provider to identify the |
| Point-to-Point Protocol (P P P) | "Commonly used to establish a direct connection between two devices. It can connect computers using serial cable, phone line, trunk line, cellular telephone, specialized radio links, or fiber-optic links. Most Internet service providers use PPP for custom |
| Commands that can be executed in user EXEC mode | "are limited to obtaining information about how the device is operating, and troubleshooting using some show commands and the ping and traceroute utilities." |
| Privelage Exec Mode | Enter commands that can alter the operation of the device requires privileged level access. Enable the privileged EXEC mode by entering enable at the command prompt and pressing Enter. |
| To disable the privileged mode and return to user mode | enter disable at the command prompt. |
| "To enter global configuration, type the command | " configure terminal or config t. Global configuration mode is indicated by the command line prompt Router(config)# |
| Interface configuration mode | Is used to configure LAN and WAN interfaces. |
| "To access interface configuration mode, from global configuration | " Type the command interface [type] [number]. Interface configuration mode is indicated by the command prompt: Router(config-if)# |
| The router configuration submode | Router(config-router)# |
| Some of the more popular show commands are | show running-config; show interfaces; show arp;show ip route;show protocols;show version |
| When should a device be assigned a name | A device should be given a unique name as one of the first configuration tasks. This task is accomplished in global configuration mode with the following command. Router(config)# hostname [name] |
| What commands do you use to restrict access to the router | "The enable password and enable secret commands are used to restrict access to privileged EXEC mode, preventing unauthorized users from making configuration changes to the router" |
| Banners | "A banner is text that a user sees when initially logging on to the router. Configuring an appropriate banner is part of a good security plan. At a very minimum, a banner should warn against unauthorized access. Never configure a banner that welcomes an u |
| To configure the banners | "The commands are banner motd and banner login. For both types, a delimiting character, such as a #, is used at the beginning and at the end of the message. The delimiter allows the user to configure a multiline banner." |
| If both banners are configured | The login banner appears after the MOTD but before the login credentials. |
| To keep the unsolicited output separate from the typed input | The logging synchronous command can be entered in global configuration mode. |
| Disabling Domain Lookup | "By default, when a host name is entered in enable mode, the router assumes that the user is attempting to telnet to a device. The router tries to resolve unknown names entered in enable mode by sending them to the DNS server. This process includes any wo |
| When a router connects to the ISP network using a serial connection what type of connection is required | "A CSU/DSU is required if the WAN is digital. A modem is required if the WAN is analog. These devices convert the data from the router into a form acceptable for crossing the WAN, and convert data from the WAN into an acceptable format for the router" |
| What type of equipment are Cisco routers by default | "Cisco routers are data terminal equipment (DTE) devices. Because the DCE devices control the timing of the communication with the router, the Cisco DTE devices accept the clock rate from the DCE device. " |
| What are the steps to configure an interface | "Step 1. Specify the type of interface and the interface port number. Step 2. Specify a description of the interface. Step 3. Configure the interface IP address and subnet mask. Step 4. Set the clock rate, if configuring a serial interface as a DCE. Step |
| Default Route | The default route is used by the router only if the router does not know where to send a packet. |
| Default route in a Cisco router must be done in what mode | Configuring the default route on a Cisco ISR must be done in global configuration mode. |
| What are eight basic steps to configuring DHCP using the CLI | Step 1. Create a DHCP address pool.Step 2. Specify the network or subnet.Step 3. Exclude specific IP addresses.Step 4. Specify the domain name.Step 5. Specify the IP address of the DNS server.Step 6. Set the default gateway.Step 7. Set the lease duration. |
| What are the steps to configure a NAT using the CISCO IOS | Step 1. Specify the inside interface.Step 2. Set the primary IP address of the inside interface.Step 3. Identify the inside interface using the ip nat inside command.Step 4. Specify the outside interface.Step 5. Set the primary IP address of the outside i |
| To output detailed NAT assignments | show ip nat translations |
| Displays information about the total number of active NAT translations | show ip nat statistics |
| View NAT configurations | Use the show run command. |
| One way configuration files can be saved to a network server is using TFTP. The TFTP server must be accessible to the router via a network connection. The setpes involved are | Step 1. Enter the copy startup-config tftp command. Step 2. Enter the IP address of the host where the configuration file will be stored. Step 3. Enter the name to assign to the configuration file or accept the default.Step 4. Confirm each choice by answe |
| C P E | Customer Premises Equipment. |
| Packet-Switched | "In a packet-switched connection, networks have connections into the TSP switched network. Many customers share this TSP network. Instead of the circuit being physically reserved from source to destination, as in a circuit-switched network, each customer |
| Point-to-Point | "A point-to-point connection is a predefined communications path from the customer premises through a TSP network. It is a dedicated circuit with fixed bandwidth available at all time. Point-to-point lines are usually leased from the TSP. These lines are |
| Circuit-Switched | "A circuit-switched connection functions similarly to the way a phone call is made over a telephone network. When making a phone call to a friend, the caller picks up the phone, opens the circuit, and dials the number. The caller hangs up the phone when f |
| What are the 3 types of serial WAN connections | "PointoPoint, Packet Switched, Circuit Switched." |
| The Cisco default serial encapsulation is | "HDLC. It can be changed to PPP, which provides a more flexible encapsulation and supports authentication by the remote device." |