AP Notes, Outlines, Study Guides, Vocabulary, Practice Exams and more!

CCNA Chapter 1 exam Flashcards

Terms : Hide Images
8717758441What two criteria are used to help select network media? (Choose two.)the distance the media can successfully carry a signal The environment where the media is to be installed0
8717758442Which device performs the function of determining the path that messages should take through internetworks?a router1
8717758443Which area of the network would a college IT staff most likely have to redesign as a direct result of many students bringing their own tablets and smartphones to school to access school resources?wireless LAN2
8717758444What type of network must a home user access in order to do online shopping?the internet3
8717758445Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)cellular satellite4
8717758446Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.) Which two Internet solutions provide an always-on, high-bandwidth connection to computers on a LAN? (Choose two.)DSL cable5
8717758447Which statement describes a characteristic of cloud computing?Applications can be accessed over the Internet through a subscription6
8717758448A company is contemplating whether to use a client/server or a peer-to-peer network. What are three characteristics of a peer-to- peer network?easy to create lacks centralized admin less cost to implement7
8717758449Which two statements describe intermediary devices?direct path of the data connect individual hosts to the network8
8717758450What are two functions of end devices on a network? (Choose two.)originate the data that flows through the network interface between humans and the communication network9
8717758451An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?intranet10
8717758452Which two connection options provide an always-on, high- bandwidth Internet connection to computers in a home office?DSL cable11
8717758453Which term describes the state of a network when the demand on the network resources exceeds the available capacitycongestion12
8717758454What type of network traffic requires QoSvideo conferencing13
8717758455Which expression accurately defines the term bandwidthmeasure of the data carrying capacity of the media14
8717758456A network admin is implementing administrator is network a policy that strong, complex passwords. Which data protection requires goal does this policy supportdata confidentiality15
8717758457Which statement describes a characteristic of cloud computingApplications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.16
8717758458Which statement describes the use of powerline networking technologyA device connects to an existing home LAN using an adapter and an existing electrical outlet17
8717758459What security violation would cause the most amount of damage to the life of a home usercapturing of personal data that leads to identity theft18
8717758460A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for this network?implementing a firewall installing antivirus software19
8717758461a network is text, and graphics over the same communication channelsconverged20
8717758462The acronym refers to the policy that allows employees to use their personal devices in the business office to access the network and other resources.byod21

Chapter 2 ccna Flashcards

Terms : Hide Images
8720941377Which interface allows remote management of a Layer 2 switch?The switch virtual interface0
8720941378What is the function of the kernel of an operating software?the kernel provisions hardware resources to meet software requirements1
8720941379Why would a Layer 2 switch need an IP address?to enable the switch to be managed remotely2
8720941380Which two host names follow the guidelines for naming conventions on Cisco IOS device?know rules3
8720941381Why is it important to configure a hostname on a device?to identify the device during remote access (SSH or telnet)4
8720941382A router has a valid OS and a config file stored in NVRAM. the config file contains an enable secret password but no console password. When the router boots up, which mode will display?user EXEC mode5
8720941383A network admin needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?SSH6
8720941384What are 2 characteristics of RAM on a Cisco device?The configuration that is actively running on the device is stored in RAM, The contents of RAM are lost during a power cycle.7
8720941385What command can be used on a Windows PC to see the IP configuration of that computer?ipconfig8
8720941386Which interface is the default SVI on a Cisco switch?VLAN 19
8720941387How does the service password-encryption command enhance password security on Cisco routers and switches?It encrypts passwords that are stored in router or switch configuration files.10
8720941388Which statement is true about the running configuration file in a Cisco IOS device?It affects the operation of the device immediately when modified.11
8720941389What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC.if there is connectivity with the destination device.12
8720941390Which command or key combination allows a user to return to the previous level in the command hierarchy?exit13
8720941391Which procedure is used to access a Cisco 2960 switch when performing an initial config in a secure environment?us the console port to locally access the switch from a serial or USB interface of the PC.14
8720941392Which 2 functions are provided to users by the context sensitive help feature of the Cisco IOS CLI?displaying a list of all available commands within the current mode, determining which option keyword or argument is available for the entered command.15
8720941393Which info does the show startup-config command display?the contents of the saved configuration file in the NVRAM16
8720941394While trying to solve a network issue, a tech made multiple changes to the current router config file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?issue the reload command without saving the running configuration17
8720941395A tech is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the tech opens a browser and verifies that the PC can reach the internet. Why was the PC able to connect to the network with no additional configuration?the PC was preconfigured to use DHCP18

CCNA 2 Chapter 7 (SYC) Flashcards

Terms : Hide Images
87216051491. data structures - routing tables 2. messages (incoming & outgoing on interfaces) - to discover neighboring routers, exchange router info, and learn about remote networks with other routers using the same routing protocol 3. when a router detects a topology change the routing protocol advertises this change to other routers 4. algorithm - steps used to complete a task and determining the best pathWhat are the 4 main components of dynamic routing protocols?0
87216104781. the router applies configuration stored in NVRAM & discovers its own directly connected networks 2. next, the routing table is updated with all directly connected networks and the interfaces those networks reside on 3. if a routing protocol is configured, the router begins exchanging routing updates to learn about any remote networks 4. the router sends an update packet out all enabled interfaces (contains routing table) and at the same time, the router receives and processes similar updates from other connected routers 5. when the router receives the updates, it checks the updates for new network info to add networks that aren't already listed into the routing table 6. another exchange of routing information gives routers full knowledge about a converged networkWhen a router powers up, it does not even know that there are devices on the other end of its links. What happens next?1
8721616145distance vector routing protocols implement a routing loop prevention technique which prevents information from being sent out the same interface in which it was receivedWhat is a split horizon?2
87216193841. speed of propagation of routing info - amount of time routers take to forward routing info 2. calculation of optimal pathsWhat are 2 convergence properties?3
8721624074* Distance - how far to the destination network - based on metrics like hop count, cost, bandwidth, delay, etc. * Vector - the direction of the next-hop router or exit interface to reach the destinationWhat 2 characteristics does a distance vector use to advertise?4
87216344781. sending & receiving updates 2. calculate and install the best path 3. detect and react to topology changesWhat is the purpose of algorithms for distance vector routing protocols?5
8721637965Both use hop count metric - maximum # of hops is 15. RIPv1 - updates go to 255.255.255.255 RIPv2 - updates go to multicast 224.0.0.9 Only RIPv2 supports VLSM, CIDR, Summarization, and Authentication.Compare/Contrast RIPv1 and RIPv2:6
87216447581. router builds topological map of network to determine the shortest path 2. faster convergence achieved by immediate flooding of LSPs 3. LSPs only sent when topology changes 4. hierarchical designList 4 advantages of Link-State Routing Protocols:7
87216491811. database & SPF tree uses memory 2. calculating SPF algorithm uses CPU 3. LSP flooding adversely affects bandwidth 4. requires a lot of hardware resourcesList 4 overhead disadvantages of Link-State Routing protocols:8
87216534701. level 1 Ultimate network route 2. level 2 child route of a level 1 parent route 3. level 1 supernet 4. default route 5. if no match is found - packet is droppedWhen a packet arrives on a router interface, in what order does the router choose a route to forward the packet?9

CCNA 2 Chapter 8 (SYC) Flashcards

Terms : Hide Images
87217735021. AD = 110 2. Classless - supports VLSM & CIDR 3. Efficient - routing changes trigger routing updates 4. Fast Convergence 5. Scalable 6. Secure - supports MD5 7. Dijkstra Algorithm chooses best pathWhat are the 7 features of OSPF?0
87217783101. Adjacency - neighbor table 2. Link-state (LSDB) - topology table 3. Forwarding - routing tableWhat 3 databases does OSPF create and keep in RAM?1
87217844811. Establish Neighbor Adjacencies - hello packets are sent out all OSPF-enabled interfaces 2. Exchange Link-State Advertisements (LSAs) - routers flood LSAs to adjacent routers which contain the state, cost, and sequence # of each directly connected link 3. Build the Topology Table - based on the LSAs a router receives - eventually holds all info about networks topology 4. Execute the SPF Algorithm - which then creates the SPF treeTo reach a state of convergence, what 4 steps does OSPF complete?2
87217950641. it lightens the load on routers 2. all areas must connect to the backbone (0) area 3. interconnecting routers are called Area Border Routers (ABRs).A Multi-area OSPF is used in larger networks to dived a large AS (autonomous system) into smaller areas. What are 3 characteristics of a multi-area OSPF?3
87218045201. smaller routing tables because network addresses can be summarized between areas 2. reduced link-state update overhead - uses less processing and memory 3. reduced frequency of SPF calculation - LSA flooding stops at the area boundary 4. link failure affects only the local areaWhat are 4 advantages of Multi-area OSPFs?4
87218079571. discover OSPF neighbors & establish adjacencies 2. advertise parameters on which 2 routers must agree to become neighbors 3. elect designated router (DR) & backup designated router (BDR) on multiaccess networks like Ethernet & Frame RelayList 3 things the OSPF Hello Packet is used for?5
8721813647* Create adjacencies with neighbors * Exchange routing information * Calculate the best routes * Reach convergenceWhat 4 steps does an OSPF attempt to do when initially connected to a network?6
8721816811* down state * Init state * two-way state * exStart state * exchange state * loading state * full stateWhile attempting to reach convergence, what 7 states does OSPF go thru?7
87218236991. configure router-id command 2. router chooses highest IPv4 address of any configured lookback interfaces 3. if no loopback interfaces are configured, router chooses the highest active IPv4 address of any of its physical interfaces - least recommendedHow does the router determine its router ID?8
87218300901. subnets don't match - different network 2. OSPF Hello or Dead timers don't match 3. OSPF Network Types don't match 4. Missing or incorrect OSPF network commandWhat 4 conditions prevent 2 routers from forming an OSPF adjacency?9

CCNA 2 Chapter 9 (SYC) Flashcards

Terms : Hide Images
8721910084controls if a router forwards or drops packets based on information found in the packet headerWhat is an ACL?0
87219141651. limits traffic 2. traffic flow control 3. basic network access security 4. filters traffic based on traffic type 5. screen hosts to permit or deny access to network services a. specifying internal hosts for NAT b. identifying traffic for QoSWhat 5 tasks does an ACL perform when configured on a router interface? What are 2 additional uses of ACLs?1
8721920323source & destination IP address source & destination TCP/UDP ports protocol typeWhat do extended ACLs filter IP packets on?2
8721929314Calculate 255.255.255.255 - 0.0.15.255 = subnet mask Use the info to find the range of IP addresses on a subnet calculator.How would you find the range of IP addresses represented by the network and wildcard mask 172.16.32.0 and 0.0.15.255?3
87219340151. in firewall routers between internal and external networks 2. on a router between 2 parts of your network to control traffic 3. on border routers 4. for each network protocol configured on the border router interfacesIn general, which 4 areas should you use ACLs on routers?4
8721942685* specify an access list # and in or out ** only numbered access lists can be applied to VTYs *** verify ACL with show access-listsRestricting VTY access allows you to define which IP addresses are allowed Telnet access to the router. Which command restricts incoming and outgoing connections between a VTY and the access list addresses. R1(config-line)# access-class5
8721947096Before forwarding a packet to outbound interface, the router checks the routing table to see if packet is routable. If it isn't - it's dropped. If it is, the router checks to see whether the outbound interface is grouped to an ACL. If it isn't, the packet can be sent to the output buffer. If it is grouped, the packet is tested by the ACEs associated with that interface and then either denied or permitted.What is outbound ACL logic?6

Chapter 3: Introduction to TCP/IP \||/ More on TCP Flashcards

Terms : Hide Images
8727751704Source Portthe port number of the application on the host sending the data0
8727756070Destination Portthe port number of the application requested on the destination host1
8727769188Sequence Numbera number used by TCP to put the data back in the correct order or retransmit missing or damaged data2
8727799428Acknowledgement Numberthe value is the TCP octet that is expected next3
8727831764Code Bits/Flagscontrols functions used to set up and terminate a session4
8727839335Windowthe window size the sender is willing to accept in octets5
8727867528Checksumthe cyclic redundancy check -CRC- used by TCP to check everything6
8727875456Urgentindicates the offset from the current sequence number where the segment of nonurgent data begins7
8727909682Optionsmay be 0, meaning that no options have to be present or a multiple of 32 bits8
8727925123Datahanded down to the TCP protocol at the transport layer9

CCNA Wireless Chapter 1 Flashcards

Terms : Hide Images
8728022852amplitudeThe height from the top peak to the bottom peak of a signal's waveform; also known as the peak-to-peak amplitude.0
8728022853bandA contiguous range of frequencies.1
8728022854bandwidthThe range of frequencies used by a single channel or a single RF signal.2
8728025672Barker codeAn 11-bit sequence of encoded bits that represents a single data bit.3
8728025673carrier signalThe basic, steady RF signal that is used to carry other useful information4
8728029489channelAn arbitrary index that points to a specific frequency within a band.5
8728029490chipA bit produced by a coder6
8728031773CCK (stands for)Complementary Code Keying (acronym)7
8728031774dB decibelA logarithmic function that compares one absolute measurement to another8
8728035762dBdThe gain of an antenna, measured in dB, as compared to a simple dipole antenna.9
8728035763dBiThe gain of an antenna, measured in dB, as compared to an isotropic reference antenna.10
8728035764dBmThe power level of a signal measured in dB, as compared to a reference signal power of 1 milliwatt.11
8728039817demodulationThe receiver's process of interpreting changes in the carrier signal to recover the original information being sent.12
8728039818DBPSK stands fordifferential binary phase shift keying13
8728044048DQPSK stands fordifferential quadrature phase shift keying14
8728044049DSSS stands fordirect sequence spread spectrum15
8728049169EIRP stands foreffective isotropic radiated power16
8728052571frequencyThe number of times a signal makes one complete up and down cycle in 1 second.17
8728052572FHSS stands forfrequency hopping spread spectrum18
8728052573Hz hertzA unit of frequency equaling one cycle per second.19
8728054934in phaseThe condition when the cycles of two identical signals are in sync with each other.20
8728054935isotropic antennaAn ideal, theoretical antenna that radiates RF equally in every direction.21
8728057592link budgetThe cumulative sum of gains and losses measured in dB over the complete RF signal path; a transmitter's power level must overcome the link budget so that the signal can reach a receiver effectively.22
8728057593modulationThe transmitter's process of altering the carrier signal according to some other information source.23
8728060477narrowbandRF signals that use a very narrow range of frequencies24
8728060480noise floorThe average power level of noise measured at a specific frequency.25
8728062949OFDM stands fororthogonal frequency-division multiplexing26
8728062950out of phaseThe condition when the cycles of one signal are shifted in time in relation to another signal.27
8728065511phaseA measure of shift in time relative to the start of a cycle; ranges between 0 and 360 degrees.28
8728065512QAM stands forquadrature amplitude modulation29
8728065513RF radio frequencyThe portion of the frequency spectrum between 3 kHz and 300 GHz.30
8728067478RSSI stands forreceived signal strength indicator31
8728067479sensitivity levelThe RSSI threshold (in dBm) that divides unintelligible RF signals from useful ones32
8728070146SNR signal-to-noise ratioA measure of received signal quality, calculated as the difference between the signal's RSSI and the noise floor. A higher SNR is preferred.33
8728070147spread spectrumRF signals that spread the information being sent over a wide range of frequencies.34
8728070220symbolA complete group of encoded chips that represents a data bit.35
8728073530wavelengthThe physical distance that a wave travels over one complete cycle.36
8728112601coderA function that converts data bits into multiple encoded bits before transmission, to provide resilience against noise and interference.37
8728125741CCK DeffinitionAn encoding method that takes either 4 or 8 data bits at a time to create a 6-bit or 8-bit symbol, respectively. The symbols are fed into DQPSK to modulate the carrier signal.38
8728154827DBPSK DeffinitionA modulation method that takes 1 bit of encoded data and changes the phase of the carrier signal in one of two ways.39
8728169651DQPSK DeffinitionA modulation method that takes 2 bits of encoded data and changes the phase of the carrier signal in one of four ways40
8728169652DSSS DeffinitionA wireless LAN method where a transmitter uses a single fixed, wide channel to send data.41
8728172333EIRP DeffinitionThe resulting signal power level, measured in dBm, of the combination of a transmitter, cable, and an antenna, as measured at the antenna.42
8728189444FHSS DeffinitionA wireless LAN method where a transmitter "hops" between frequencies all across a band.43
8728206218OFDM deffinitionA data transmission method that sends data bits in parallel over multiple frequencies within a single 20-MHz-wide channel. Each frequency represents a single subcarrier.44
8728225594QAM DeffinitionA modulation method that combines QPSK phase shifting with multiple amplitude levels to produce a greater number of unique changes to the carrier signal. The number preceding the QAM name designates how many carrier signal changes are possible.45
8728234367RSSI DefinitionThe measure of signal strength (in dBm) as seen by the receiver. RSSI is normally negative (0 to -100) because the received signal is always a degraded form of the original signal that was sent.46

CCNA1 Hands on Commands Assessment Final Flashcards

Terms : Hide Images
8728945956enable(S/R) Enter privileged executive mode0
8728981918configure terminal(S/R) Enter global configuration mode1
8729003048hostname (S/R) Add a hostname to the device2
8729033728no ip domain-lookup(S/R) Disable DNS lookup3
8729125054enable secret (S/R) Set the privileged executive mode password4
8729292902line con 0 password login(S/R) Set the console line passwords5
8729344818line vty 0 15 password login(S/R) Set the VTY line passwords6
8729359380banner motd # #(S/R) Set a MOTD banner7
8729395536service password-encryption(S/R) Encrypt all plaintext passwords8
8729411106clock set (S/R) Set the current time and date on your device9
8729429971interface ip address no shutdown(S/R) Configure an ip address on the SVI10
8729877410show ip interface brief(S/R) Display the status of the connected interfaces11
8729895034copy running-configuration startup-configuration(S/R) Save the current configuration12
8729910575show running-configuration(S/R) Display the current running configuration13

Chapter 2 Flashcards

Terms : Hide Images
8728740834EthernetA series of LAN standards defined by the IEEE, originally invented by Xerox and developed jointly by Xerox, Intel, and Digital Equipment Corporation.0
8728796395IEEEInstitute of Electrical and Electronics Engineers. A professional organization that develops communications and network standards, among other activities.1
8728808687Wired LANA LAN that physically transmits bits using cables, often the wires inside cables.2
8728826694Wireless LANA LAN that physically transmits bits using radio waves.3
8728830643Ethernet FrameAn Ethernet data link header and trailer, plus the data encapsulated between them.4
872884528210BASE-TThe 10-Mbps baseband Ethernet specification using two pairs of twisted-pair cabling: One pair transmits data and the other receives data. 802.3 specification. 100 meters.5
8728858065100BASE-TFast Ethernet. Two-pair copper cabling. 100 Mbps. 100 meters.6
87288650431000BASE-TGigabit Ethernet. Four-Pair copper cabling. 1000 Mbps (1 Gbps). 100 meters.7
8728911713Fast EthernetThe common name for all the IEEE standards that send data at 100 megabits per second.8
8728918896Gigabit EthernetThe common name for all the IEEE standards that send data at 1 gigabit per second.9
8728922608Ethernet LinkAny physical link between two Ethernet nodes, no matter what type of cabling is used.10
8728928715RJ-45Cabling connector used for Ethernet cabling. Similar to RJ-11 for telephones.11
8728938622Ethernet PortThe opening on the side of any Ethernet node, typically an Ethernet NIC or LAN switch, into which an Ethernet cable can be connected.12
8728950399Network Interface Card (NIC)A computer card, sometimes an expansion card and sometimes integrated into the motherboard of the computer, that provides the electronics and other functions to connect to a computer network.13
8728967044Straight-through CableIn Ethernet, a cable that connects 1-1, 2-2, 3-3...14
8728983424Crossover-CableAn Ethernet cable that swaps the pair used for transmission on one device to a pair used for receiving on the device on the opposite end of the cable. 1-3, 2-615
8728998029Ethernet AddressA 48-bit (6 byte) binary number, usually written with a 12-digit hexadecimal number, used to identify Ethernet nodes in an Ethernet network. Ethernet frame headers list a destination and source address field, used by the Ethernet devices to deliver Ethernet frames to the correct destination.16
8729023551MAC AddressA standardized data link layer address that is required by every device that connects to a LAN. Ethernet MAC addresses are 6 bytes long and are controlled by the IEEE. AKA hardware address + physical address.17
8729040486Unicast AddressAny address in networking that represents a single device or interface, instead of a group of addresses.18
8729052187Broadcast AddressAny address that represents all devices, and can be used to send one message to all devices.19
8729061531Frame Check SequenceA field in many data link trailers used as part of the error-detection process.20

Pages

Subscribe to CourseNotes RSS

Need Help?

We hope your visit has been a productive one. If you're having any problems, or would like to give some feedback, we'd love to hear from you.

For general help, questions, and suggestions, try our dedicated support forums.

If you need to contact the Course-Notes.Org web experience team, please use our contact form.

Need Notes?

While we strive to provide the most comprehensive notes for as many high school textbooks as possible, there are certainly going to be some that we miss. Drop us a note and let us know which textbooks you need. Be sure to include which edition of the textbook you are using! If we see enough demand, we'll do whatever we can to get those notes up on the site for you!