Networking & CCNA
Networking & CCNA
Networking & CCNA
Set of flashcards Details
Flashcards | 80 |
---|---|
Language | Deutsch |
Category | Computer Science |
Level | University |
Created / Updated | 25.09.2021 / 21.06.2025 |
Weblink |
https://card2brain.ch/box/20210925_networking_ccna
|
Embed |
<iframe src="https://card2brain.ch/box/20210925_networking_ccna/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
Create or copy sets of flashcards
With an upgrade you can create or copy an unlimited number of sets and use many more additional features.
Log in to see all the cards.
Which network service automatically assigns IP addresses to devices on the network?
Dynamic Host Configuration Protocol (DHCP) can be used to allow end devices to automatically configure IP information, such as their IP address, subnet mask, DNS server, and default gateway. The DNS service is used to provide domain name resolution, mapping hostnames to IP addresses. Telnet is a method for remotely accessing a CLI session of a switch or router. Traceroute is a command used to determine the path a packet takes as it traverses the network.
What is the purpose of a small company using a protocol analyzer utility to capture network traffic on the network segments where the company is considering a network upgrade?
An important prerequisite for considering network growth is to understand the type and amount of traffic that is crossing the network as well as the current traffic flow. By using a protocol analyzer in each network segment, the network administrator can document and analyze the network traffic pattern for each segment, which becomes the base in determining the needs and means of the network growth.
What is the advantage of using SSH over Telnet?
SSH provides a secure method for remote access to hosts by encrypting network traffic between the SSH client and remote hosts. Although both Telnet and SSH request authentication before a connection is established, Telnet does not support encryption of login credentials.
Which attack involves a compromise of data that occurs between two end points?
What is the difference between a virus and a worm?
Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation.
Which example of malicious code would be classified as a Trojan horse?
A Trojan horse is malicious code that has been written specifically to look like a legitimate program. This is in contrast to a virus, which simply attaches itself to an actual legitimate program. Viruses require manual intervention from a user to spread from one system to another, while a worm is able to spread automatically between systems by exploiting vulnerabilities on those devices.
Which type of attack involves an adversary attempting to gather information about a network to identify vulnerabilities?
Reconnaissance is a type of attack where the intruder is looking for wireless network vulnerabilities.
A user is redesigning a network for a small company and wants to ensure security at a reasonable price. The user deploys a new application-aware firewall with intrusion detection capabilities on the ISP connection. The user installs a second firewall to separate the company network from the public network. Additionally, the user installs an IPS on the internal network of the company. What approach is the user implementing?
Using different defenses at various points of the network creates a layered approach.
When applied to a router, which command would help mitigate brute-force password attacks against the router?
he login block-for command sets a limit on the maximum number of failed login attempts allowed within a defined period of time. If this limit is exceeded, no further logins are allowed for the specified period of time. This helps to mitigate brute-force password cracking since it will significantly increase the amount of time required to crack a password. The exec-timeout command specifies how long the session can be idle before the user is disconnected.
What is the purpose of the network security authentication function?
Authentication, authorization, and accounting are network services collectively known as AAA. Authentication requires users to prove who they are. Authorization determines which resources the user can access. Accounting keeps track of the actions of the user.
Only employees connected to IPv6 interfaces are having difficulty connecting to remote networks. The analyst wants to verify that IPv6 routing has been enabled. What is the best command to use to accomplish the task?
An administrator decides to use "pR3s!d7n&0" as the password on a newly installed router. Which statement applies to the password choice?
List at least two functions of intermediary devices.
- Regenerate and retransmit communication signals
- Maintain information about what pathways exist through the network and internetwork
- Notify other devices of errors and communication failures
- Direct data along alternate pathways when there is a link failure
- classify and direct message according to priorities
- Permit or deny the flow of data, based on seurity settings
List the intermediary device categories.
- Wireless Router
- Lan Switch
- Router
- Multilayer Switch
- Firewall Appliance
List at least two criteria for choosing a network media type.
- What is the maximum distance that the media can successfully carry a signal?
- What is the environment in which the media will be installed?
- That is the amount of data and at what speed must it be transmitted?
- What is the cost of the media and installation?
Explain the difference between a LAN and a WAN. Give examples of each
The two most common types of network infrastructures are Local Area Networks (LANs), and Wide Area Networks (WANs). A LAN is a network infrastructure that provides access to users and end devices in a small geographical area. A LAN is typically used in a department within an enterprise, a home, or a small business network. A WAN is a network infrastructure that provides access to other networks over a wide geographical area, which is typically owned and managed by a larger corporation or a telecommunications service provider
A LAN is a network infrastructure that spans a small geographical area. LANs have specific characteristics:
- LANs interconnect end devices in a limited area such as a home, school, office building, or campus.
- A LAN is usually administered by a single organization or individual. Administrative control is enforced at the network level and governs the security and access control policies.
- LANs provide high-speed bandwidth to internal end devices and intermediary devices, as shown in the figure.
WANs
The figure shows a WAN which interconnects two LANs. A WAN is a network infrastructure that spans a wide geographical area. WANs are typically managed by service providers (SPs) or Internet Service Providers (ISPs).
WANs have specific characteristics:
- WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, or continents.
- WANs are usually administered by multiple service providers.
- WANs typically provide slower speed links between LANs.
What are some of the common ways a home user connects to the internet?
- Cable - Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
- DSL - Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line. In general, small office and home office users connect using Asymmetrical DSL (ADSL), which means that the download speed is faster than the upload speed.
- Cellular - Cellular internet access uses a cell phone network to connect. Wherever you can get a cellular signal, you can get cellular internet access. Performance is limited by the capabilities of the phone and the cell tower to which it is connected.
- Satellite - The availability of satellite internet access is a benefit in those areas that would otherwise have no internet connectivity at all. Satellite dishes require a clear line of sight to the satellite.
- Dial-up Telephone - An inexpensive option that uses any phone line and a modem. The low bandwidth provided by a dial-up modem connection is not sufficient for large data transfer, although it is useful for mobile access while traveling.
What are some common methods that businesses use to connect to the internet in your area?
- Dedicated Leased Line - Leased lines are reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking. The circuits are rented at a monthly or yearly rate.
- Metro Ethernet - This is sometimes known as Ethernet WAN. In this module, we will refer to it as Metro Ethernet. Metro ethernets extend LAN access technology into the WAN. Ethernet is a LAN technology you will learn about in a later module.
- Business DSL - Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.
- Satellite - Satellite service can provide a connection when a wired solution is not available
4 basic characteristics that network architects must address to meet user expectations:
- Fault Tolerance
- Scalability
- Quality of Service (QoS)
- Security
Types of clouds
Public clouds
Cloud-based applications and services offered in a public cloud are made available to the general population. Services may be free or are offered on a pay-per-use model, such as paying for online storage. The public cloud uses the internet to provide services.
Private clouds
Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as a government. A private cloud can be set up using the organization’s private network, though this can be expensive to build and maintain. A private cloud can also be managed by an outside organization with strict access security.
Hybrid clouds
A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a distinct object, but both are connected using a single architecture. Individuals on a hybrid cloud would be able to have degrees of access to various services based on user access rights.
Community clouds
A community cloud is created for exclusive use by specific entities or organizations. The differences between public clouds and community clouds are the functional needs that have been customized for the community. For example, healthcare organizations must remain compliant with policies and laws (e.g., HIPAA) that require special authentication and confidentiality. Community clouds are used by multiple organizations that have similar needs and concerns. Community clouds are similar to a public cloud environment, but with set levels of security, privacy, and even regulatory compliance of a private cloud.
common external threats to networks:
- Viruses, worms, and Trojan horses - These contain malicious software or code running on a user device.
- Spyware and adware - These are types of software which are installed on a user’s device. The software then secretly collects information about the user.
- Zero-day attacks - Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
- Threat actor attacks - A malicious person attacks user devices or network resources.
- Denial of service attacks - These attacks slow or crash applications and processes on a network device.
- Data interception and theft - This attack captures private information from an organization’s network.
- Identity theft - This attack steals the login credentials of a user in order to access private data.
basic security components for a home or small office network:
- Antivirus and antispyware - These applications help to protect end devices from becoming infected with malicious software.
- Firewall filtering - Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
The physical layer standards address three functional areas:
- Physical Components
- Encoding
- Signaling
Fiber-optic cables are broadly classified into two types:
- Single-mode fiber (SMF)
- Multimode fiber (MMF)
Fiber-optic cabling is now being used in four types of industry:
- Enterprise Networks - Used for backbone cabling applications and interconnecting infrastructure devices
- Fiber-to-the-Home (FTTH) - Used to provide always-on broadband services to homes and small businesses
- Long-Haul Networks - Used by service providers to connect countries and cities
- Submarine Cable Networks - Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments at up to transoceanic distances. Search the internet for “submarine cables telegeography map” to view various maps online.
A PC that is communicating with a web server has a TCP window size of 6,000 bytes when sending data and a packet size of 1,500 bytes. Which byte of information will the web server acknowledge after it has received four packets of data from the PC?
Which scenario describes a function provided by the transport layer?
-
- 1 / 80
-