What is created when two or more networks are connected via a router using a logical addressing scheme?
An internetwork.
1/188
| Term | Definition |
|---|---|
What is created when two or more networks are connected via a router using a logical addressing scheme? | An internetwork. |
What is created when two or more networks are connected via a router using a logical addressing scheme? | An internetwork. |
How many collision domains and broadcast domains does a standard hub represent? | One collision domain and one broadcast domain. |
How many collision domains and broadcast domains does a standard hub represent? | One collision domain and one broadcast domain. |
Which network device is primarily used to break up broadcast domains by default? | A router. |
Which network device is primarily used to break up broadcast domains by default? | A router. |
What is the primary function of a layer 2 switch regarding collision domains? | It breaks up collision domains by making each port its own separate domain. |
What is the primary function of a layer 2 switch regarding collision domains? | It breaks up collision domains by making each port its own separate domain. |
List four common causes of LAN traffic congestion. | "Too many hosts, broadcast storms, excessive multicast traffic, and low bandwidth." |
List four common causes of LAN traffic congestion. | "Too many hosts, broadcast storms, excessive multicast traffic, and low bandwidth." |
"In networking, what is the definition of a broadcast domain?" | The set of all devices on a network segment that hear all broadcasts sent on that segment. |
"In networking, what is the definition of a broadcast domain?" | The set of all devices on a network segment that hear all broadcasts sent on that segment. |
Which older physical interface is commonly used on Cisco routers for WAN connections? | Serial V.35. |
Which older physical interface is commonly used on Cisco routers for WAN connections? | Serial V.35. |
Name the four functions a router performs in a network. | "Packet switching, packet filtering, internetwork communication, and path selection." |
Name the four functions a router performs in a network. | "Packet switching, packet filtering, internetwork communication, and path selection." |
What hardware component do layer 2 switches use to achieve high gigabit speeds and low latency? | Application-specific integrated circuits (ASICs). |
What hardware component do layer 2 switches use to achieve high gigabit speeds and low latency? | Application-specific integrated circuits (ASICs). |
Term: Latency | Definition: The time measured from when a frame enters a port to when it exits a port. |
Term: Latency | Definition: The time measured from when a frame enters a port to when it exits a port. |
Which network device allows wireless devices to connect to a wired network and extends a collision domain? | Wireless Access Point (AP). |
Which network device allows wireless devices to connect to a wired network and extends a collision domain? | Wireless Access Point (AP). |
What is the role of a WLAN controller in a network environment? | To automatically handle the configuration and management of multiple wireless access points. |
What is the role of a WLAN controller in a network environment? | To automatically handle the configuration and management of multiple wireless access points. |
What device establishes a barrier between a trusted internal network and an untrusted external network like the Internet? | A firewall. |
What device establishes a barrier between a trusted internal network and an untrusted external network like the Internet? | A firewall. |
Which organization developed the OSI reference model to allow different vendor networks to interoperate? | International Organization for Standardization (ISO). |
Which organization developed the OSI reference model to allow different vendor networks to interoperate? | International Organization for Standardization (ISO). |
How many layers are in the OSI reference model? | Seven. |
How many layers are in the OSI reference model? | Seven. |
What are the three upper layers of the OSI model responsible for? | Applications communicating between hosts and user interfaces. |
What are the three upper layers of the OSI model responsible for? | Applications communicating between hosts and user interfaces. |
Which OSI layer acts as the interface between the application program and the protocol stack? | The Application layer (Layer 7). |
Which OSI layer acts as the interface between the application program and the protocol stack? | The Application layer (Layer 7). |
"Which OSI layer is responsible for data translation, code formatting, encryption, and decryption?" | The Presentation layer (Layer 6). |
"Which OSI layer is responsible for data translation, code formatting, encryption, and decryption?" | The Presentation layer (Layer 6). |
"Which OSI layer sets up, manages, and dismantles sessions between entities and keeps user data separate?" | The Session layer (Layer 5). |
"Which OSI layer sets up, manages, and dismantles sessions between entities and keeps user data separate?" | The Session layer (Layer 5). |
Define 'Full-duplex' communication. | Two-way communication where devices can transmit and receive data simultaneously. |
Define 'Full-duplex' communication. | Two-way communication where devices can transmit and receive data simultaneously. |
Which OSI layer is responsible for segmenting and reassembling data into a single data stream? | The Transport layer (Layer 4). |
Which OSI layer is responsible for segmenting and reassembling data into a single data stream? | The Transport layer (Layer 4). |
What are the three requirements for 'reliable' networking at the Transport layer? | "Acknowledgments, sequencing, and flow control." |
What are the three requirements for 'reliable' networking at the Transport layer? | "Acknowledgments, sequencing, and flow control." |
What is the name of the process used to establish a connection-oriented session in TCP? | The three-way handshake. |
What is the name of the process used to establish a connection-oriented session in TCP? | The three-way handshake. |
"In a TCP three-way handshake, what is the first segment sent by the initiator?" | Synchronization (SYN). |
"In a TCP three-way handshake, what is the first segment sent by the initiator?" | Synchronization (SYN). |
Which flow control mechanism involves a receiver telling a sender to stop transmitting until its buffer is processed? | Buffering (or Source Quench via ICMP). |
Which flow control mechanism involves a receiver telling a sender to stop transmitting until its buffer is processed? | Buffering (or Source Quench via ICMP). |
The quantity of data segments a transmitter is allowed to send without receiving an acknowledgment is known as _____. | Windowing. |
The quantity of data segments a transmitter is allowed to send without receiving an acknowledgment is known as _____. | Windowing. |
"Which OSI layer manages device addressing, tracks device locations, and determines the best path for data?" | The Network layer (Layer 3). |
"Which OSI layer manages device addressing, tracks device locations, and determines the best path for data?" | The Network layer (Layer 3). |
What is the difference between a 'routed' protocol and a 'routing' protocol? | "Routed protocols transport user data (e.g., IP), while routing protocols update routing tables (e.g., OSPF)." |
What is the difference between a 'routed' protocol and a 'routing' protocol? | "Routed protocols transport user data (e.g., IP), while routing protocols update routing tables (e.g., OSPF)." |
What three variables are typically found in a router's routing table? | "Network addresses, interface (exit port), and metric (distance)." |
What three variables are typically found in a router's routing table? | "Network addresses, interface (exit port), and metric (distance)." |
What are the two sublayers of the IEEE Ethernet Data Link layer? | Media Access Control (MAC) and Logical Link Control (LLC). |
What are the two sublayers of the IEEE Ethernet Data Link layer? | Media Access Control (MAC) and Logical Link Control (LLC). |
What information does the LLC sublayer use to tell the Data Link layer what to do with a received frame? | The LLC header (identifying the Network layer protocol). |
What information does the LLC sublayer use to tell the Data Link layer what to do with a received frame? | The LLC header (identifying the Network layer protocol). |
OSI PDU: Transport Layer | Segment. |
OSI PDU: Transport Layer | Segment. |
OSI PDU: Network Layer | Packet. |
OSI PDU: Network Layer | Packet. |
OSI PDU: Data Link Layer | Frame. |
OSI PDU: Data Link Layer | Frame. |
OSI PDU: Physical Layer | Bits. |
OSI PDU: Physical Layer | Bits. |
"Which OSI layer is responsible for activating, maintaining, and deactivating the physical link between systems?" | The Physical layer (Layer 1). |
"Which OSI layer is responsible for activating, maintaining, and deactivating the physical link between systems?" | The Physical layer (Layer 1). |
"In serial connections, what do the acronyms DTE and DCE stand for?" | Data Terminal Equipment (DTE) and Data Communication Equipment (DCE). |
"In serial connections, what do the acronyms DTE and DCE stand for?" | Data Terminal Equipment (DTE) and Data Communication Equipment (DCE). |
Why is a hub considered a multiple-port repeater? | It reamplifies and broadcasts a signal received on one port to all other active ports. |
Why is a hub considered a multiple-port repeater? | It reamplifies and broadcasts a signal received on one port to all other active ports. |
Which physical topology involves every network device having a connection to every other device for high redundancy? | Mesh topology. |
Which physical topology involves every network device having a connection to every other device for high redundancy? | Mesh topology. |
Ethernet uses a physical _____ layout and a logical _____ topology. | Star; Bus. |
Ethernet uses a physical _____ layout and a logical _____ topology. | Star; Bus. |
List the four layers of the DoD (TCP/IP) model. | "Process/Application, Host-to-Host (Transport), Internet, and Network Access (Link)." |
List the four layers of the DoD (TCP/IP) model. | "Process/Application, Host-to-Host (Transport), Internet, and Network Access (Link)." |
Which DoD model layer is equivalent to the OSI Network layer? | The Internet layer. |
Which DoD model layer is equivalent to the OSI Network layer? | The Internet layer. |
What is the primary drawback of using Telnet for remote access? | "It does not use encryption, sending all data (including passwords) in clear text." |
What is the primary drawback of using Telnet for remote access? | "It does not use encryption, sending all data (including passwords) in clear text." |
"Which protocol provides a secure, encrypted alternative to Telnet?" | Secure Shell (SSH). |
"Which protocol provides a secure, encrypted alternative to Telnet?" | Secure Shell (SSH). |
"Which protocol is used for fast, simple file transfers without directory browsing or authentication?" | Trivial File Transfer Protocol (TFTP). |
"Which protocol is used for fast, simple file transfers without directory browsing or authentication?" | Trivial File Transfer Protocol (TFTP). |
What is the role of an SNMP 'agent'? | To monitor a device and send 'traps' (alerts) to a management station when aberrations occur. |
What is the role of an SNMP 'agent'? | To monitor a device and send 'traps' (alerts) to a management station when aberrations occur. |
Which protocol resolves a fully qualified domain name (FQDN) to an IP address? | Domain Name Service (DNS). |
Which protocol resolves a fully qualified domain name (FQDN) to an IP address? | Domain Name Service (DNS). |
List the four steps of the DHCP process. | "Discover (broadcast), Offer (unicast), Request (broadcast), and Acknowledgment (unicast)." |
List the four steps of the DHCP process. | "Discover (broadcast), Offer (unicast), Request (broadcast), and Acknowledgment (unicast)." |
What mechanism does a DHCP client use to ensure its newly assigned IP address is not a duplicate? | Gratuitous ARP. |
What mechanism does a DHCP client use to ensure its newly assigned IP address is not a duplicate? | Gratuitous ARP. |
What is the IP address range assigned by Automatic Private IP Addressing (APIPA)? | $169.254.0.1$ to $169.254.255.254$. |
What is the IP address range assigned by Automatic Private IP Addressing (APIPA)? | $169.254.0.1$ to $169.254.255.254$. |
What default subnet mask does APIPA use? | $255.255.0.0$. |
What default subnet mask does APIPA use? | $255.255.0.0$. |
What are the two primary protocols found at the DoD Host-to-Host layer? | TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). |
What are the two primary protocols found at the DoD Host-to-Host layer? | TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). |
What is the length of a standard TCP header without options? | 20 bytes. |
What is the length of a standard TCP header without options? | 20 bytes. |
Why is UDP called a 'connectionless' protocol? | It does not establish a virtual circuit or contact the destination before sending data. |
Why is UDP called a 'connectionless' protocol? | It does not establish a virtual circuit or contact the destination before sending data. |
Port Number: FTP (Data/Control) | 20 and 21. |
Port Number: FTP (Data/Control) | 20 and 21. |
Port Number: SSH | 22. |
Port Number: SSH | 22. |
Port Number: Telnet | 23. |
Port Number: Telnet | 23. |
Port Number: DNS | 53. |
Port Number: DNS | 53. |
Port Number: HTTP | 80. |
Port Number: HTTP | 80. |
Port Number: HTTPS | 443. |
Port Number: HTTPS | 443. |
Port Number: SNMP | 161. |
Port Number: SNMP | 161. |
Which layer of the TCP/IP stack allows a single IP address to maintain multiple simultaneous sessions? | The Session layer (using Transport layer port numbers). |
Which layer of the TCP/IP stack allows a single IP address to maintain multiple simultaneous sessions? | The Session layer (using Transport layer port numbers). |
What is the purpose of the 'Time to Live' (TTL) field in an IP header? | To prevent packets from endlessly circling the network by discarding them when the counter reaches zero. |
What is the purpose of the 'Time to Live' (TTL) field in an IP header? | To prevent packets from endlessly circling the network by discarding them when the counter reaches zero. |
What is the Protocol field value in an IP header for TCP? | 6. |
What is the Protocol field value in an IP header for TCP? | 6. |
What is the Protocol field value in an IP header for UDP? | 17. |
What is the Protocol field value in an IP header for UDP? | 17. |
"Which Network layer protocol provides messaging services, such as 'Destination Unreachable' or 'Echo Request'?" | Internet Control Message Protocol (ICMP). |
"Which Network layer protocol provides messaging services, such as 'Destination Unreachable' or 'Echo Request'?" | Internet Control Message Protocol (ICMP). |
Which command-line utility uses ICMP 'Echo Request' and 'Reply' to test connectivity? | Ping. |
Which command-line utility uses ICMP 'Echo Request' and 'Reply' to test connectivity? | Ping. |
What is the function of the Address Resolution Protocol (ARP)? | To find a destination's hardware (MAC) address using a known IP address. |
What is the function of the Address Resolution Protocol (ARP)? | To find a destination's hardware (MAC) address using a known IP address. |
IP Address Term: Octet | Definition: An 8-bit section of a 32-bit IP address. |
IP Address Term: Octet | Definition: An 8-bit section of a 32-bit IP address. |
What is the maximum number of possible IP addresses in a 32-bit address space? | Approximately 4.3 billion ($2^{32}$). |
What is the maximum number of possible IP addresses in a 32-bit address space? | Approximately 4.3 billion ($2^{32}$). |
What is the decimal range of the first octet for a Class A IP address? | 1 to 126. |
What is the decimal range of the first octet for a Class A IP address? | 1 to 126. |
What is the decimal range of the first octet for a Class B IP address? | 128 to 191. |
What is the decimal range of the first octet for a Class B IP address? | 128 to 191. |
What is the decimal range of the first octet for a Class C IP address? | 192 to 223. |
What is the decimal range of the first octet for a Class C IP address? | 192 to 223. |
What is the purpose of the IP address range 127.x.x.x? | Reserved for loopback tests on the local node. |
What is the purpose of the IP address range 127.x.x.x? | Reserved for loopback tests on the local node. |
What type of communication is a Class D IP address (224-239) used for? | Multicast. |
What type of communication is a Class D IP address (224-239) used for? | Multicast. |
Private IP Range: Class A | $10.0.0.0$ to $10.255.255.255$. |
Private IP Range: Class A | $10.0.0.0$ to $10.255.255.255$. |
Private IP Range: Class B | $172.16.0.0$ to $172.31.255.255$. |
Private IP Range: Class B | $172.16.0.0$ to $172.31.255.255$. |
Private IP Range: Class C | $192.168.0.0$ to $192.168.255.255$. |
Private IP Range: Class C | $192.168.0.0$ to $192.168.255.255$. |
What is the destination MAC address for a layer 2 hardware broadcast? | ff:ff:ff:ff:ff:ff. |
What is the destination MAC address for a layer 2 hardware broadcast? | ff:ff:ff:ff:ff:ff. |
What is the layer 3 'all-networks' broadcast address? | $255.255.255.255$. |
What is the layer 3 'all-networks' broadcast address? | $255.255.255.255$. |
Which address type represents a single interface for directing packets to one specific host? | Unicast. |
Which address type represents a single interface for directing packets to one specific host? | Unicast. |
What is the primary benefit of subnetting a large network? | "It breaks one large broadcast domain into multiple smaller, more manageable networks." |
What is the primary benefit of subnetting a large network? | "It breaks one large broadcast domain into multiple smaller, more manageable networks." |
What is the default subnet mask for a Class B network? | $255.255.0.0$. |
What is the default subnet mask for a Class B network? | $255.255.0.0$. |
What does the slash notation (CIDR) indicate in an address like /24? | The number of bits in the subnet mask that are set to 1 (turned on). |
What does the slash notation (CIDR) indicate in an address like /24? | The number of bits in the subnet mask that are set to 1 (turned on). |
Which Cisco IOS command enables the use of the first and last subnets in a network design? | ip subnet-zero. |
Which Cisco IOS command enables the use of the first and last subnets in a network design? | ip subnet-zero. |
Formula: How do you calculate the number of subnets from masked bits (x)? | $2^x$. |
Formula: How do you calculate the number of subnets from masked bits (x)? | $2^x$. |
Formula: How do you calculate the number of valid hosts per subnet from unmasked bits (y)? | $2^y - 2$. |
Formula: How do you calculate the number of valid hosts per subnet from unmasked bits (y)? | $2^y - 2$. |
Formula: How do you calculate the 'block size' (increment) for subnets from a mask value? | $256 - \text{subnet mask value}$. |
Formula: How do you calculate the 'block size' (increment) for subnets from a mask value? | $256 - \text{subnet mask value}$. |
"If a subnet mask is 255.255.255.192, what is the block size?" | 64. |
"If a subnet mask is 255.255.255.192, what is the block size?" | 64. |
What is the CIDR notation for the subnet mask 255.255.255.240? | /28. |
What is the CIDR notation for the subnet mask 255.255.255.240? | /28. |
How many valid hosts are available on a /30 subnet? | 2. |
How many valid hosts are available on a /30 subnet? | 2. |
"In a Class C subnet with a block size of 32, what is the broadcast address for the .32 subnet?" | ".63 (the number before the next subnet, .64)." |
"In a Class C subnet with a block size of 32, what is the broadcast address for the .32 subnet?" | ".63 (the number before the next subnet, .64)." |
Which port does NTP use for time synchronization? | 123. |
Which port does NTP use for time synchronization? | 123. |
What kind of communication is 'one-to-many' without flooding every host on a broadcast domain? | Multicast. |
What kind of communication is 'one-to-many' without flooding every host on a broadcast domain? | Multicast. |