Term
What are the four major catagories of physical components in a computer network? |
|
Definition
-computer -interconnects -switches -routers |
|
|
Term
What are the major resources that are shared in a computer network? |
|
Definition
-data and applications -peripherals -storage devices -backup devices |
|
|
Term
How do user applications affect the network? |
|
Definition
-consuming network resources |
|
|
Term
What is a physical topology? |
|
Definition
describes the layout for wiring the physical devices |
|
|
Term
What is a logical topology? |
|
Definition
describes how information flows through a network |
|
|
Term
What are the most common network user application? |
|
Definition
-email -web browsers -instant messaging -collaboration -databases |
|
|
Term
|
Definition
a single cable that effectively connects all devices |
|
|
Term
Each device in the network is connected to the central device with its own cable describes what topology? |
|
Definition
|
|
Term
A star network expanded to include additional network devices that are connected to the main networking device describes what topology? |
|
Definition
|
|
Term
All the hosts are connected in teh form of a ring or circle describes what topology? |
|
Definition
|
|
Term
There are 2 rings that all the hosts are connected in the for of a ring or circle describes what topology? |
|
Definition
|
|
Term
Connects all devices to each other describes what topology? |
|
Definition
|
|
Term
At least one device has multiple connections to all other devices describes what type of topology? |
|
Definition
|
|
Term
List the 3 common methods of connecting the small office to the internet. |
|
Definition
-DSL -cable /catv -digital local loops |
|
|
Term
Unauthorized discovery and mapping of systems,services,and vulnerabilities (information gathering) describe what type of attack? |
|
Definition
|
|
Term
Trojan horse, Ip spoofing, and packet sniffers are examples of what type of attack? |
|
Definition
|
|
Term
Exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information is what type of attack? |
|
Definition
|
|
Term
Hardware, environmental, electrical, maintenance, are examples of what types of threats? |
|
Definition
|
|
Term
|
Definition
-passive -active -close in -insider -distributed |
|
|
Term
List the layers in OSI model |
|
Definition
-application -presentation -session -transport -network -data link -physical |
|
|
Term
Defines the electrical,mechanical,procedural,and functional specifications for activatin,maintaining,and deactivating the physical link. This describes what layer of the osi model |
|
Definition
|
|
Term
-Access to media -Defines how data is formated for transmission and how access to the network is controlled -provides error detection All these describe what layer of the OSI model |
|
Definition
|
|
Term
-data delivery -routes data packets -selects best path to deliver data -provides logical addressing and path selection All these describe what layer of the osi model |
|
Definition
|
|
Term
-end to end connections -handles transportation issues between hosts -ensures data transport reliability -provides reliability through fault detection and recovery information flow control Above describes what layer of the osi model |
|
Definition
|
|
Term
-Interhost communication -establishes,managaes,and terminates sessions between applications Above describes what layer of the osi model |
|
Definition
|
|
Term
-data representation -ensures the data is reachable by recieving systems -formats data -structures data -provides encryption -negotiates data transfer Above describes what layer on the osi model? |
|
Definition
|
|
Term
-network processes to applications -provides network services to application processes (such as email,file transfer and terminal emulation) -provides user authentication Above describes what layer of the osi model? |
|
Definition
|
|
Term
Wraps data with the necessary protocol information before network transit. What is this called? |
|
Definition
|
|
Term
Process of "unwrapping" data from the protocol information is called what? |
|
Definition
|
|
Term
Bits are on what layer of the osi model? |
|
Definition
|
|
Term
Frames are on what layer of the osi model? |
|
Definition
|
|
Term
packets are on what layer of the osi model? |
|
Definition
|
|
Term
segments are on what layer of the osi model? |
|
Definition
|
|
Term
Each octet is represented as a decimal number between 0 and 255 and separated by a period, or dot. This is called what? |
|
Definition
|
|
Term
IPv4 is broken into 4 groups called what? |
|
Definition
|
|
Term
-uses only 1st octet to indicate the network address -contains addresses between 1-126 What class of address is this? |
|
Definition
|
|
Term
-uses 2 of the 4 octets to indicate network address -contains addresses between 128-191 What class of ip is this? |
|
Definition
|
|
Term
Class B address contains what addresses? |
|
Definition
|
|
Term
-first 3 octets are used to identify the network portion -contains ip range 192-223 What class of ip is this? |
|
Definition
|
|
Term
Class C contains what range of Ip addresses? |
|
Definition
|
|
Term
IP operates on what layer of the osi model? |
|
Definition
|
|
Term
-assigns Ip addresses automatically -set tcp/ip stack configurations What does this? |
|
Definition
|
|
Term
What application converts human readable names into IP addresses? |
|
Definition
|
|
Term
What is the first bit of a Class A ip? |
|
Definition
|
|
Term
What are the 1st 2 bits of a Class B ip? |
|
Definition
|
|
Term
What are the 1st 3 bits of a Class C ip? |
|
Definition
|
|
Term
List the different topologys that can be used. |
|
Definition
-physical bus -physical star -ring -dual ring -full mesh -partial mesh |
|
|
Term
CISCO IOS COMMANDS / What command manages the system clock? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command activates the configuration mode from the terminal? |
|
Definition
configure terminal (config t) |
|
|
Term
CISCO IOS COMMANDS / What command copies the switch running configuration file to another destination? A typical destination is the startup configuration. |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command copies the switch running configuration file to another destination? A typical destination is the startup configuration. |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command activates the privileged EXEC mode. |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command enables password protect access to the enable mode ? Password is stored in cleartext |
|
Definition
enable password xxxxx(x=enter password you want) |
|
|
Term
CISCO IOS COMMANDS / What is the command for entering an encrypted password? |
|
Definition
enable secrect xxx (x=secret password wanting) |
|
|
Term
CISCO IOS COMMANDS / What command terminates the configuration mode? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command erases the startup configuration that is stored in nonvolatile memory? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command sets the inactivity time that is allowed before a session will be automatically logged out? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command sets the number of lines that are held in history buffer for recall? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command sets the system name? |
|
Definition
hostname xxx (x=name you want the host to be) |
|
|
Term
CISCO IOS COMMANDS / What command enters the interface configuration mode for VLAN1 to set the switch management IP address? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command sets the IP address and mask of the interface? |
|
Definition
ip address xxxx (xxx=ip-address mask wanting) |
|
|
Term
CISCO IOS COMMANDS / What command sets the default gateway of the switch. |
|
Definition
ip default-gateway xxx (xxx=ip-address wanting) |
|
|
Term
CISCO IOS COMMANDS / What command turns off the command-line interpreter. |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command enters the line console configuration mode? |
|
Definition
line console x (x=# of console accessing) |
|
|
Term
CISCO IOS COMMANDS /What command enters the vty configuration mode? |
|
Definition
line vty x x (x= vty accessing) |
|
|
Term
What type of lines allow access to the switch for remote network management? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command synchronizes unsolicited messages and debug privileged EXEC command output? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command applies a login process requireing a username and password for access? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command assigns a password to the console or vty ports? |
|
Definition
password x (x=line password) |
|
|
Term
CISCO IOS COMMANDS / What command restarts the switch and reloads the cisco ios operating system and configuration? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command displays the switch ip address information? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command displays the system clock? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command displays recently entered commands? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command displays information on all the switch interfaces? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command displays the active configuration? |
|
Definition
show running-configuration |
|
|
Term
CISCO IOS COMMANDS /What command displays the current settings for the terminal? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What command displays the configuration of the switch hardware and the various software versions? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What configuration command disables an interface? |
|
Definition
|
|
Term
CISCO IOS COMMANDS /What configuration command enables an interface? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command sets the history buffer size? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command allows the configuration of a message that will be displayed at the time of the login process? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command activates the configuration mode from the terminal? |
|
Definition
configure terminal (config t) |
|
|
Term
CISCO IOS COMMANDS / What command copies the switch running configuration file to the startup configuration file that is held in local NVRAM? |
|
Definition
copy running-config startup-config |
|
|
Term
CISCO IOS COMMANDS / What command generates the RSA key pairs that are to be used? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command supplies an IP domanin name, which is required by crypto key generation process? |
|
Definition
ip domain-name x (x=name) |
|
|
Term
CISCO IOS COMMANDS / What command enters the line console 0 configuration mode? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command displays the IP address resolution table? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command displays only the dynamically learned MAC addresses in the table? |
|
Definition
show mac-address-table dynamic |
|
|
Term
CISCO IOS COMMANDS / What command enables port security on an interface? |
|
Definition
|
|
Term
When a security violation occurs in the switch, what are the 3 valid modes that may occure? |
|
Definition
protect, restrict, shutdown |
|
|
Term
CISCO IOS COMMANDS / What command creates a username and password pair, which can be used as a local authentication database? |
|
Definition
username x password y (x=name you want, y=name you want) |
|
|
Term
CISCO IOS COMMANDS / What command displays all adminstrative and operational status of all secure ports on a switch? |
|
Definition
|
|
Term
CISCO IOS COMMANDS / What command is used to troubleshoot the accessibilty of devices and amount of time that it takes to receive the echo reply? |
|
Definition
|
|