CCST Networking

Created by Squid Milcc

What is created when two or more networks are connected via a router using a logical addressing scheme?
An internetwork.

1/188

TermDefinition
What is created when two or more networks are connected via a router using a logical addressing scheme?
An internetwork.
What is created when two or more networks are connected via a router using a logical addressing scheme?
An internetwork.
How many collision domains and broadcast domains does a standard hub represent?
One collision domain and one broadcast domain.
How many collision domains and broadcast domains does a standard hub represent?
One collision domain and one broadcast domain.
Which network device is primarily used to break up broadcast domains by default?
A router.
Which network device is primarily used to break up broadcast domains by default?
A router.
What is the primary function of a layer 2 switch regarding collision domains?
It breaks up collision domains by making each port its own separate domain.
What is the primary function of a layer 2 switch regarding collision domains?
It breaks up collision domains by making each port its own separate domain.
List four common causes of LAN traffic congestion.
"Too many hosts, broadcast storms, excessive multicast traffic, and low bandwidth."
List four common causes of LAN traffic congestion.
"Too many hosts, broadcast storms, excessive multicast traffic, and low bandwidth."
"In networking, what is the definition of a broadcast domain?"
The set of all devices on a network segment that hear all broadcasts sent on that segment.
"In networking, what is the definition of a broadcast domain?"
The set of all devices on a network segment that hear all broadcasts sent on that segment.
Which older physical interface is commonly used on Cisco routers for WAN connections?
Serial V.35.
Which older physical interface is commonly used on Cisco routers for WAN connections?
Serial V.35.
Name the four functions a router performs in a network.
"Packet switching, packet filtering, internetwork communication, and path selection."
Name the four functions a router performs in a network.
"Packet switching, packet filtering, internetwork communication, and path selection."
What hardware component do layer 2 switches use to achieve high gigabit speeds and low latency?
Application-specific integrated circuits (ASICs).
What hardware component do layer 2 switches use to achieve high gigabit speeds and low latency?
Application-specific integrated circuits (ASICs).
Term: Latency
Definition: The time measured from when a frame enters a port to when it exits a port.
Term: Latency
Definition: The time measured from when a frame enters a port to when it exits a port.
Which network device allows wireless devices to connect to a wired network and extends a collision domain?
Wireless Access Point (AP).
Which network device allows wireless devices to connect to a wired network and extends a collision domain?
Wireless Access Point (AP).
What is the role of a WLAN controller in a network environment?
To automatically handle the configuration and management of multiple wireless access points.
What is the role of a WLAN controller in a network environment?
To automatically handle the configuration and management of multiple wireless access points.
What device establishes a barrier between a trusted internal network and an untrusted external network like the Internet?
A firewall.
What device establishes a barrier between a trusted internal network and an untrusted external network like the Internet?
A firewall.
Which organization developed the OSI reference model to allow different vendor networks to interoperate?
International Organization for Standardization (ISO).
Which organization developed the OSI reference model to allow different vendor networks to interoperate?
International Organization for Standardization (ISO).
How many layers are in the OSI reference model?
Seven.
How many layers are in the OSI reference model?
Seven.
What are the three upper layers of the OSI model responsible for?
Applications communicating between hosts and user interfaces.
What are the three upper layers of the OSI model responsible for?
Applications communicating between hosts and user interfaces.
Which OSI layer acts as the interface between the application program and the protocol stack?
The Application layer (Layer 7).
Which OSI layer acts as the interface between the application program and the protocol stack?
The Application layer (Layer 7).
"Which OSI layer is responsible for data translation, code formatting, encryption, and decryption?"
The Presentation layer (Layer 6).
"Which OSI layer is responsible for data translation, code formatting, encryption, and decryption?"
The Presentation layer (Layer 6).
"Which OSI layer sets up, manages, and dismantles sessions between entities and keeps user data separate?"
The Session layer (Layer 5).
"Which OSI layer sets up, manages, and dismantles sessions between entities and keeps user data separate?"
The Session layer (Layer 5).
Define 'Full-duplex' communication.
Two-way communication where devices can transmit and receive data simultaneously.
Define 'Full-duplex' communication.
Two-way communication where devices can transmit and receive data simultaneously.
Which OSI layer is responsible for segmenting and reassembling data into a single data stream?
The Transport layer (Layer 4).
Which OSI layer is responsible for segmenting and reassembling data into a single data stream?
The Transport layer (Layer 4).
What are the three requirements for 'reliable' networking at the Transport layer?
"Acknowledgments, sequencing, and flow control."
What are the three requirements for 'reliable' networking at the Transport layer?
"Acknowledgments, sequencing, and flow control."
What is the name of the process used to establish a connection-oriented session in TCP?
The three-way handshake.
What is the name of the process used to establish a connection-oriented session in TCP?
The three-way handshake.
"In a TCP three-way handshake, what is the first segment sent by the initiator?"
Synchronization (SYN).
"In a TCP three-way handshake, what is the first segment sent by the initiator?"
Synchronization (SYN).
Which flow control mechanism involves a receiver telling a sender to stop transmitting until its buffer is processed?
Buffering (or Source Quench via ICMP).
Which flow control mechanism involves a receiver telling a sender to stop transmitting until its buffer is processed?
Buffering (or Source Quench via ICMP).
The quantity of data segments a transmitter is allowed to send without receiving an acknowledgment is known as _____.
Windowing.
The quantity of data segments a transmitter is allowed to send without receiving an acknowledgment is known as _____.
Windowing.
"Which OSI layer manages device addressing, tracks device locations, and determines the best path for data?"
The Network layer (Layer 3).
"Which OSI layer manages device addressing, tracks device locations, and determines the best path for data?"
The Network layer (Layer 3).
What is the difference between a 'routed' protocol and a 'routing' protocol?
"Routed protocols transport user data (e.g., IP), while routing protocols update routing tables (e.g., OSPF)."
What is the difference between a 'routed' protocol and a 'routing' protocol?
"Routed protocols transport user data (e.g., IP), while routing protocols update routing tables (e.g., OSPF)."
What three variables are typically found in a router's routing table?
"Network addresses, interface (exit port), and metric (distance)."
What three variables are typically found in a router's routing table?
"Network addresses, interface (exit port), and metric (distance)."
What are the two sublayers of the IEEE Ethernet Data Link layer?
Media Access Control (MAC) and Logical Link Control (LLC).
What are the two sublayers of the IEEE Ethernet Data Link layer?
Media Access Control (MAC) and Logical Link Control (LLC).
What information does the LLC sublayer use to tell the Data Link layer what to do with a received frame?
The LLC header (identifying the Network layer protocol).
What information does the LLC sublayer use to tell the Data Link layer what to do with a received frame?
The LLC header (identifying the Network layer protocol).
OSI PDU: Transport Layer
Segment.
OSI PDU: Transport Layer
Segment.
OSI PDU: Network Layer
Packet.
OSI PDU: Network Layer
Packet.
OSI PDU: Data Link Layer
Frame.
OSI PDU: Data Link Layer
Frame.
OSI PDU: Physical Layer
Bits.
OSI PDU: Physical Layer
Bits.
"Which OSI layer is responsible for activating, maintaining, and deactivating the physical link between systems?"
The Physical layer (Layer 1).
"Which OSI layer is responsible for activating, maintaining, and deactivating the physical link between systems?"
The Physical layer (Layer 1).
"In serial connections, what do the acronyms DTE and DCE stand for?"
Data Terminal Equipment (DTE) and Data Communication Equipment (DCE).
"In serial connections, what do the acronyms DTE and DCE stand for?"
Data Terminal Equipment (DTE) and Data Communication Equipment (DCE).
Why is a hub considered a multiple-port repeater?
It reamplifies and broadcasts a signal received on one port to all other active ports.
Why is a hub considered a multiple-port repeater?
It reamplifies and broadcasts a signal received on one port to all other active ports.
Which physical topology involves every network device having a connection to every other device for high redundancy?
Mesh topology.
Which physical topology involves every network device having a connection to every other device for high redundancy?
Mesh topology.
Ethernet uses a physical _____ layout and a logical _____ topology.
Star; Bus.
Ethernet uses a physical _____ layout and a logical _____ topology.
Star; Bus.
List the four layers of the DoD (TCP/IP) model.
"Process/Application, Host-to-Host (Transport), Internet, and Network Access (Link)."
List the four layers of the DoD (TCP/IP) model.
"Process/Application, Host-to-Host (Transport), Internet, and Network Access (Link)."
Which DoD model layer is equivalent to the OSI Network layer?
The Internet layer.
Which DoD model layer is equivalent to the OSI Network layer?
The Internet layer.
What is the primary drawback of using Telnet for remote access?
"It does not use encryption, sending all data (including passwords) in clear text."
What is the primary drawback of using Telnet for remote access?
"It does not use encryption, sending all data (including passwords) in clear text."
"Which protocol provides a secure, encrypted alternative to Telnet?"
Secure Shell (SSH).
"Which protocol provides a secure, encrypted alternative to Telnet?"
Secure Shell (SSH).
"Which protocol is used for fast, simple file transfers without directory browsing or authentication?"
Trivial File Transfer Protocol (TFTP).
"Which protocol is used for fast, simple file transfers without directory browsing or authentication?"
Trivial File Transfer Protocol (TFTP).
What is the role of an SNMP 'agent'?
To monitor a device and send 'traps' (alerts) to a management station when aberrations occur.
What is the role of an SNMP 'agent'?
To monitor a device and send 'traps' (alerts) to a management station when aberrations occur.
Which protocol resolves a fully qualified domain name (FQDN) to an IP address?
Domain Name Service (DNS).
Which protocol resolves a fully qualified domain name (FQDN) to an IP address?
Domain Name Service (DNS).
List the four steps of the DHCP process.
"Discover (broadcast), Offer (unicast), Request (broadcast), and Acknowledgment (unicast)."
List the four steps of the DHCP process.
"Discover (broadcast), Offer (unicast), Request (broadcast), and Acknowledgment (unicast)."
What mechanism does a DHCP client use to ensure its newly assigned IP address is not a duplicate?
Gratuitous ARP.
What mechanism does a DHCP client use to ensure its newly assigned IP address is not a duplicate?
Gratuitous ARP.
What is the IP address range assigned by Automatic Private IP Addressing (APIPA)?
$169.254.0.1$ to $169.254.255.254$.
What is the IP address range assigned by Automatic Private IP Addressing (APIPA)?
$169.254.0.1$ to $169.254.255.254$.
What default subnet mask does APIPA use?
$255.255.0.0$.
What default subnet mask does APIPA use?
$255.255.0.0$.
What are the two primary protocols found at the DoD Host-to-Host layer?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
What are the two primary protocols found at the DoD Host-to-Host layer?
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
What is the length of a standard TCP header without options?
20 bytes.
What is the length of a standard TCP header without options?
20 bytes.
Why is UDP called a 'connectionless' protocol?
It does not establish a virtual circuit or contact the destination before sending data.
Why is UDP called a 'connectionless' protocol?
It does not establish a virtual circuit or contact the destination before sending data.
Port Number: FTP (Data/Control)
20 and 21.
Port Number: FTP (Data/Control)
20 and 21.
Port Number: SSH
22.
Port Number: SSH
22.
Port Number: Telnet
23.
Port Number: Telnet
23.
Port Number: DNS
53.
Port Number: DNS
53.
Port Number: HTTP
80.
Port Number: HTTP
80.
Port Number: HTTPS
443.
Port Number: HTTPS
443.
Port Number: SNMP
161.
Port Number: SNMP
161.
Which layer of the TCP/IP stack allows a single IP address to maintain multiple simultaneous sessions?
The Session layer (using Transport layer port numbers).
Which layer of the TCP/IP stack allows a single IP address to maintain multiple simultaneous sessions?
The Session layer (using Transport layer port numbers).
What is the purpose of the 'Time to Live' (TTL) field in an IP header?
To prevent packets from endlessly circling the network by discarding them when the counter reaches zero.
What is the purpose of the 'Time to Live' (TTL) field in an IP header?
To prevent packets from endlessly circling the network by discarding them when the counter reaches zero.
What is the Protocol field value in an IP header for TCP?
6.
What is the Protocol field value in an IP header for TCP?
6.
What is the Protocol field value in an IP header for UDP?
17.
What is the Protocol field value in an IP header for UDP?
17.
"Which Network layer protocol provides messaging services, such as 'Destination Unreachable' or 'Echo Request'?"
Internet Control Message Protocol (ICMP).
"Which Network layer protocol provides messaging services, such as 'Destination Unreachable' or 'Echo Request'?"
Internet Control Message Protocol (ICMP).
Which command-line utility uses ICMP 'Echo Request' and 'Reply' to test connectivity?
Ping.
Which command-line utility uses ICMP 'Echo Request' and 'Reply' to test connectivity?
Ping.
What is the function of the Address Resolution Protocol (ARP)?
To find a destination's hardware (MAC) address using a known IP address.
What is the function of the Address Resolution Protocol (ARP)?
To find a destination's hardware (MAC) address using a known IP address.
IP Address Term: Octet
Definition: An 8-bit section of a 32-bit IP address.
IP Address Term: Octet
Definition: An 8-bit section of a 32-bit IP address.
What is the maximum number of possible IP addresses in a 32-bit address space?
Approximately 4.3 billion ($2^{32}$).
What is the maximum number of possible IP addresses in a 32-bit address space?
Approximately 4.3 billion ($2^{32}$).
What is the decimal range of the first octet for a Class A IP address?
1 to 126.
What is the decimal range of the first octet for a Class A IP address?
1 to 126.
What is the decimal range of the first octet for a Class B IP address?
128 to 191.
What is the decimal range of the first octet for a Class B IP address?
128 to 191.
What is the decimal range of the first octet for a Class C IP address?
192 to 223.
What is the decimal range of the first octet for a Class C IP address?
192 to 223.
What is the purpose of the IP address range 127.x.x.x?
Reserved for loopback tests on the local node.
What is the purpose of the IP address range 127.x.x.x?
Reserved for loopback tests on the local node.
What type of communication is a Class D IP address (224-239) used for?
Multicast.
What type of communication is a Class D IP address (224-239) used for?
Multicast.
Private IP Range: Class A
$10.0.0.0$ to $10.255.255.255$.
Private IP Range: Class A
$10.0.0.0$ to $10.255.255.255$.
Private IP Range: Class B
$172.16.0.0$ to $172.31.255.255$.
Private IP Range: Class B
$172.16.0.0$ to $172.31.255.255$.
Private IP Range: Class C
$192.168.0.0$ to $192.168.255.255$.
Private IP Range: Class C
$192.168.0.0$ to $192.168.255.255$.
What is the destination MAC address for a layer 2 hardware broadcast?
ff:ff:ff:ff:ff:ff.
What is the destination MAC address for a layer 2 hardware broadcast?
ff:ff:ff:ff:ff:ff.
What is the layer 3 'all-networks' broadcast address?
$255.255.255.255$.
What is the layer 3 'all-networks' broadcast address?
$255.255.255.255$.
Which address type represents a single interface for directing packets to one specific host?
Unicast.
Which address type represents a single interface for directing packets to one specific host?
Unicast.
What is the primary benefit of subnetting a large network?
"It breaks one large broadcast domain into multiple smaller, more manageable networks."
What is the primary benefit of subnetting a large network?
"It breaks one large broadcast domain into multiple smaller, more manageable networks."
What is the default subnet mask for a Class B network?
$255.255.0.0$.
What is the default subnet mask for a Class B network?
$255.255.0.0$.
What does the slash notation (CIDR) indicate in an address like /24?
The number of bits in the subnet mask that are set to 1 (turned on).
What does the slash notation (CIDR) indicate in an address like /24?
The number of bits in the subnet mask that are set to 1 (turned on).
Which Cisco IOS command enables the use of the first and last subnets in a network design?
ip subnet-zero.
Which Cisco IOS command enables the use of the first and last subnets in a network design?
ip subnet-zero.
Formula: How do you calculate the number of subnets from masked bits (x)?
$2^x$.
Formula: How do you calculate the number of subnets from masked bits (x)?
$2^x$.
Formula: How do you calculate the number of valid hosts per subnet from unmasked bits (y)?
$2^y - 2$.
Formula: How do you calculate the number of valid hosts per subnet from unmasked bits (y)?
$2^y - 2$.
Formula: How do you calculate the 'block size' (increment) for subnets from a mask value?
$256 - \text{subnet mask value}$.
Formula: How do you calculate the 'block size' (increment) for subnets from a mask value?
$256 - \text{subnet mask value}$.
"If a subnet mask is 255.255.255.192, what is the block size?"
64.
"If a subnet mask is 255.255.255.192, what is the block size?"
64.
What is the CIDR notation for the subnet mask 255.255.255.240?
/28.
What is the CIDR notation for the subnet mask 255.255.255.240?
/28.
How many valid hosts are available on a /30 subnet?
2.
How many valid hosts are available on a /30 subnet?
2.
"In a Class C subnet with a block size of 32, what is the broadcast address for the .32 subnet?"
".63 (the number before the next subnet, .64)."
"In a Class C subnet with a block size of 32, what is the broadcast address for the .32 subnet?"
".63 (the number before the next subnet, .64)."
Which port does NTP use for time synchronization?
123.
Which port does NTP use for time synchronization?
123.
What kind of communication is 'one-to-many' without flooding every host on a broadcast domain?
Multicast.
What kind of communication is 'one-to-many' without flooding every host on a broadcast domain?
Multicast.