What type of Cloud is intended for exclusive use by multiple organizations with shared functional needs?
Community
What technology can run several different operating systems in parallel on a single CPU.
Virtualization
Usernames and passwords relate to?
Network Security
Voice and video data need to be transmitted in a continuous stream. If packets are delayed, the audio and video quality will be poor, sometimes even not usable. What networking "Technology" can we use to fix this problem for Voic and Video data?
QoS can give voice and video data high priority during the data transmission so that they would be sent first before other types of traffic, such as email, web surfing, and web page update.
What are three layers of the hierarchical network design model?
Access: Provides a connection point to end users.
Distribution: Controls traffic flows between access and core layers.
Core: Maximizes throughput moving traffic as quickly as possible.
What are the three commands needed to password protect the console port?
The three commands needed to password protect the console port are as follows:
– line console 0
– password XXXXXXXX
– login
What ype of Cloud is services made available to the general population?
Public Cloud
What are the two types of hypervisors?
Define them.
Type 1
This type of hypervisor runs directly on the system hardware.
Type 2
This type of hypervisor requires a host OS to run.
Both types of hypervisors can run on regular computer systems and support multiple OS virtualizations.
What is an argument in the IOS command structure?
Arguments are not predefined; they are the variables defined by the user when completing a command.
Good quality video, to support video conferencing, relates to prioritizing the video traffic with ________?
Quality of Service (QoS)
Define the IPv6 packet header field Traffic Class?
Traffic Class is a 8 bit field that is equivalent to the IPv4 Differenciated Services (DS) field.
What configuration steps must be performed to implement SSH access to a router?
To implement SSH on a router the following steps need to be performed:
– Configure a unique hostname.
– Configure the domain name of the network.
– Configure a user account to use AAA or local database for authentication.
– Generate RSA keys.
– Enable VTY SSH sessions.
What type of Cloud is made up of two or more distinct cloud infrastructures bound together by technology?
Hybrid Cloud
To successfully send a packet on an Ethernet network, the computer sending the ping needs four key pieces of information. What are those 4 things?
1. Source MAC Address
2. Destination MAC Address
3. Source IP Address
4. Destination IP Address.
What are the correct flag and steps in the session establishment sequence.
Step 1 - SYN
Step 2 - SYN + ACK
Step 3 - ACK
The fact that a connection to an ISP failed and was then restored but went unnoticed by employees relates to ________ __________.
Fault Tolerance
Define the IPV6 Next Header Field.
Next Header is a 8 bit field that indicates the data payload type.
What protocal can be used for error messaging?
ICMP is used by IPv4 and IPv6 to provide for messages to be sent in the event of certain errors and for informational purposes.
What type of Cloud is intended for a specific organization or entity, such as the government?
Private Cloud
What are the features of UDP and TCP?
What are the potential network problems that can result from ARP operation?
Large numbers of ARP broadcast messages could cause momentary data communications delays.
Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent to intercept network traffic.
What are the IPV6 Packet Headers Fields?
The IPv6 packet header fields are as follows:
Version, Traffic Class, Flow Label, Payload Length, Next Header, Hop Limit, Source Address, and Destination Address.
Define the IPV6 Header Feild Flow Label.
Flow Label is a 20 bit field that maintains the same packet flows through routers and switches to ensure that the packets arrive in the same order.
What does the command ip default-gateway do on a switch?
A default gateway address is typically configured on all devices to allow them to communicate beyond just their local network. In a switch this is achieved using the command ip default-gateway <ip address>.
What is cloud computing?
Cloud computing provides on-demand access to shared resources. With minimal management effort, resources can be deployed quickly at data centers.
What two address's do you need to do the ANDing process?
ANDing uses any IP address with a subnet mask of a network. If the source network number is the same as the destination network number, the data stays on the local network. If the destination network number is different, the packet is sent to the default gateway (the router that will send the packet onward toward the destination network).
What are the four different DHCP message types?
DHCPDISCOVER - A client initiating a message to find a DHCP server
DHCPOFFER - A DHCP server responding to the initial request by a client
DHCPREQUEST - The client accepting the IP address provided by the DHCP server
DHCPACK - The DHCP server confirming that the address lease has been accepted
What are the IPV4 PAcket Header Fields?
The IPv4 packet header fields include the following:
Version, Differentiated Services, Time-to-Live, Protocol, Source IP Address, and Destination IP Address.
Define the IPV6 Header Field Payload Length.
Payload Length is a 16 bit field that stipulates the length of the data portion of the IPv6 packet.
What does the the show version command on a router do?
The show version command displays much information about the device, including the amount of memory (flash, NVRAM, and DRAM) that is installed on the device.
How do you conver dotted decimal to Binary?
Each section (octet) contains eight binary digits. Each digit represents a specific value (128, 64, 32, 16, 8, 4, 2, and 1). Everywhere there is a 1, the specific value is relevant. Add all relevant values in a particular octet to obtain the decimal value. For example binary 11001010 equals 202 in decimal.
What are keywords in the IOS command structure?
Keywords are specific parameters that are defined in IOS.
What type fields do both IPV4 and IPV6 have in common?
Both versions have:
a 4-bit Version field.
a Source (IP) Address field.
The Time-to-Live or TTL field in IPv4 is now called Hop Limit in IPv6, but this field serves the same purpose in both versions.
The value in this 8-bit field decrements each time a packet passes through any router. When this value is 0, the packet is discarded and is not forwarded to any other router.
Define the IPV6 Header Field Hop Limit.
Hop Limit is a 8 bit field that is decremented by one for each router that fowards the packet.
What does a a switch do when it receives a frame with a destination that it does not already have in its CAM table?
When a switch receives a frame with a destination that it does not already have in its CAM table, it will forward the frame out all ports except the one on which the frame was received. This is called unknown unicast flooding.
What does a switch do if the destination MAC address is a unicast address?
If the destination MAC address is a unicast address, the switch will look for a match between the destination MAC address of the frame and an entry in its MAC address table:
What is the purpose of the MAC address?
A Media Access Control (MAC) address is unique on every device.
Which two types of address does the ARP table in a switch maps together?
The switch ARP table keeps a mapping of Layer 2 MAC addresses to Layer 3 IP addresses. These mappings can be learned by the switch dynamically through ARP or statically through manual configuration.
Why would you assign an IP address to the VLAN1 interface on a Cisco Layer 2 switch?
The VLAN 1 on a Cisco Layer 2 switch is a virtual interface. By default, VLAN 1 is assigned as the management interface for remote access (Telnet or SSH) to the device for management tasks. In order to allow remote access through the network, a valid IP address configuration is needed on VLAN 1.
What does the command ping 127.0.0.1 do?
The ping 127.0.0.1 command tests the TCP/IP stack through the loopback interface.