IT0007_Formative_2
IT0007_Formative_2
1. It used a fixed /8 prefix with the first octet to indicate the network Class A
address and the remaining three octets for host addresses.
2. It encapsulates the transport layer segment by adding an IP IP
header.
3. These are block consisting of 224.0.0.0 to 239.0.0.0 Class D
4. It is called multicast block. Class D
5. It defines four categories of functions that must occur for TCP/IP Protocol
communications to be successful. Model
6. IP operates independently of the media that carry the data at Media
lower layers of the protocol stack Independent
7. This application protocol governs the way a web server and a web HTTP
client interact.
8. It used to identify the network/host portion of the IPv4 address Subnet Mask
9. Identifies the local gateway (i.e. local router interface IPv4 Default Gateway
address) to reach remote networks
10. It is a hierarchical address that is made up of a network portion Ipv4 Address
and a host portion.
11. It must be able to reconstruct the pieces of data into a complete Transport Layer
data stream that is useful to the application layer.
12. It is responsible for managing reliability requirements of a Transport Layer
conversation.
13. It is the link between the application layer and the lower layers Transport Layer
that are responsible for network transmission.
14. It is a simplified file transfer protocol that uses well-known UDP TFTP
port number 69.
15. Its role in network communication is to segments data and Transport Layer
reassembles segments.
16. Its role in network communication is to move data between Transport Layer
applications on network devices.
17. It is a client/server file sharing protocol that describes the SMB
structure of shared network resources, such as directories, files,
printers, and serial ports
18. It must be prepared to be sent across the media in manageable Data
pieces.
19. It may have multiple applications that are communicating across Host
the network simultaneously.
20. It is reliable, acknowledges data, resends lost data, delivers data in TCP
sequenced order.
21. It uses a different frame format than wired Ethernet LANs. Wireless LANs
(WLANs)
22. It allows an administrator to segment networks based on factors VLAN
such as function, project team, or application, without regard for
the physical location of the user or device
23. It connects clients to the network through a wireless access point Wireless LANs
(AP) or wireless router, instead of an Ethernet switch. (WLAN)
24. It prevents users on different VLANs from snooping on each VLAN
other’s traffic.
25. It is a physical port that acts similarly to an interface on a router Routed Ports
26. It requires additional information in the Layer 2 header of the Routed Ports
frame.
27. It is centralized management by WLC. LWAP
28. It provides segmentation and organizational flexibility. VLAN
29. In this phase, the AP then decrypts the encrypted text using its Authentication
shared key.
30. In this phase, a wireless client locates the appropriate AP to first Discovery
associate with.
31. All end systems are chained to each other and terminated in some Bus
form on each end.
32. It is a firewall design where there is typically one inside interface Demilitarized Zone
connected to the private network, one outside interface (DMZ)
connected to the public network, and one DMZ interface
33. It records what the user does, what is accessed, the amount of AAA Accounting
time the resource is accessed, and any changes that were made.
34. It provides standard firewall capabilities like stateful inspection. Next-generation
Firewalls
35. It provides data to enable network and security monitoring, NetFlow
network planning, traffic analysis, and IP accounting for billing
purposes.
36. Sensors detect malicious and unauthorized activity in real time and Network-based IPS
can take action when required.
37. It consists of a permanent link between two endpoints. Point-to-point
38. It usually part of a router firewall, which permits or denies traffic Packet Filtering
based on Layer 3 and Layer 4 information. Firewalls
39. It screens hosts to permit or deny access to network services. Access Control Lists
(ACLs)
40. A Cisco IOS technology that provides statistics on packets flowing NetFlow
through a Cisco router or multilayer switch.
41. To test connectivity to another host on a network, an echo Ping
request is sent to the host address using
42. It is also responsible for controlling the size and rate at which TCP
messages are exchanged between the server and the client.
43. It is considered to be a Layer 3 protocol. ICMP
44. It can also be used to test the ability of a local host to Ping
communicate across an internetwork.
45. It is the router that can route traffic out of the local network. Default Gateway
46. It makes use of a function of the TTL field in IPv4 and the Hop Traceroute
Limit field in IPv6 in the Layer 3 headers, along with the ICMP
time exceeded message.
47. It used a fixed /16 prefix with the two high-order octets to Class B
indicate the network address and the remaining two octets for
host addresses.
48. Ethernet encapsulates the IP packet into a frame, adding timing IP
information, destination and source MAC addresses, and error
checking feature.
49. At each set of data flowing between a source application and a Transport Layer
destination application is known as a conversation
50. It tracks individual conversations in network communication. Transport Layer
51. It is preferable for applications such as streaming live audio, live UDP
video, and Voice over IP (VoIP).
52. It generates data that is sent from an application on a source host Transport Layer
to an application on a destination host. Data Link Layer
53. It is used to reassemble the data pieces into streams to be passed Transport Layer
to the application layer.
54. It segments the data into smaller chunks enables many different Transport Layer
communications, from many different users, to be interleaved
(multiplexed) on the same network.
55. It is fast, low overhead, does not require acknowledgments, does UDP
not resend lost data, delivers data as it arrives
56. It is also responsible for managing reliability requirements of a Transport Layer
conversation.
57. In this phase, the wireless client forwards an Association Request Association
frame that includes its MAC address.
58. Usually contains the MAC address of the transmitting wireless Address1
device or AP. Address3
59. In this phase, the AP responds with a challenge text. Authentication
60. With these, broadcast SSID feature disabled do not respond. WLC
61. It can be created for any VLAN that exists on the switch. Multilayer Switches
62. It identifies the type of wireless frame and contains subfields for Frame control
protocol version, frame type, address type, power management,
and security settings.
63. It could also send a probe request without an SSID name to Wireless Client
discover nearby WLAN networks.
64. Typically used to indicate the remaining time needed to receive Duration
the next frame transmission.
65. It contains the Sequence Number and the Fragment Number Sequence Control
subfields.
66. It ensures that there is only one logical path between all Spanning Tree
destinations on the network by intentionally blocking redundant Protocol (STP)
paths that could cause a loop.
67. It protects the network by automatically blocking risky sites and WSA
testing unknown sites before allowing users to access them.
68. The original traffic is forwarded in the usual manner. Port Mirroring
69. It provides malware protection, application visibility and control, WSA
acceptable use policy controls, insightful reporting and secure
mobility.
70. It is a combine antivirus software, antimalware software, and Host-based IPS
firewall. (HIPS)
71. It uses application awareness and control to see and block risky Next-generation
apps. Firewall
72. A WAN version of the star topology in which a central site Hub and Spoke
interconnects branch sites using point-to-point links.
73. It is a set of three independent security functions: Authentication, AAA Services
Authorization, and Accounting/auditing.
74. It has additional Ethernet switches interconnect other star Extended Star
topologies.
75. It is the most versatile and common firewall technology in use. Stateful Firewalls
76. It allows or blocks traffic based on state, port, and protocol. Stateful Firewalls
77. When a host needs to send messages using a one-to-many Multicast
delivery option, it is referred to as
78. By sending smaller individual pieces from source to destination, Multiplexing
many different conversations can be interleaved on the network.
79. Any frame less than 64 bytes in length is considered as Runt frame
80. If all hosts on the network need to receive the message at the Broadcast
same time, it is referred to as
81. Designed to support the needs of moderate to large size networks Class B
with up to approximately 65,000 host addresses.
82. Ethernet manages the process of converting the frame into bits Ethernet
and sending the frame out onto the network.
83. It is the route or pathway your computer will take when it tries to Default route
contact a remote network.
84. It was developed to allow for data transfers between a client and a FTP
server.
85. The combination of the source IP address and source port number, Socket
or the destination IP address and destination port number is
known as
86. It is used to identify the server and service being requested by the Socket
client.
87. It manages and provides domain names and associated IP DNS
addresses.
88. It is dynamically generated by the sending device to identify a Source Port
conversation between two devices.
89. It is responsible for establishing a temporary communication Transport Layer
session between two applications and delivering data between
them.
90. In this phase, the client encrypts the message using its shared key Authentication
and returns the encrypted text back to the AP.
91. A pure Layer 3 interface similar to a physical interface on a Cisco Routed Port
IOS router.
92. It is virtual interface can be configured for any VLAN within a SVI
multilayer switch.
93. It is a key to maintaining network reliability. Network
Redundancy
94. A wireless client goes through a three-stage process to associate Identification
with an AP except with
95. A wireless client goes through a three-stage process to associate Multilayer switches
with an AP except with
96. It is considered to be virtual because there is no physical port SVI
dedicated to the interface.
97. It determines which resources the user can access and which AAA Authorization
operations the user is allowed to perform.
98. End devices are connected to a central intermediate device. Star
99. A PC or server with firewall software running on it. Host-based
Firewall
100. It provides comprehensive malware protection for AMP
organizations before, during, and after an attack.
101. A feature that allows a switch to make duplicate copies of Port Mirroring
traffic passing through a switch, and then send data out a port
with a network monitor attached.
102. It can be used to permit or deny traffic only from source Standard ACLs
IPv4 addresses
103. It filters IP traffic between a pair of bridged interfaces. Transparent
Firewalls
104. It used a fixed /24 prefix with the first three octets to Class C
indicate the network and the remaining octet for the host
addresses.
105. It is a series of 32 binary bits (ones and zeros). IPv4
106. It is used to test connectivity between two hosts but does Ping
not provide information about the details of devices between the
hosts.
107. It divides the HTTP messages into smaller pieces, called TCP
segments.
108. It means that no dedicated end-to-end connection is Connectionless
created before data is sent
109. It is implemented by the computer’s network interface card IP
(NIC).
110. It consists of fields containing important information about Packet Header
the packet.
111. Frames with more than 1518 bytes are considered as Baby giant frames
112. These are experimental address block. Class E
113. This is a technique used by an attacker to reply to an ARP ARP Spoofing
request for an IPv4 address belonging to another device, such as
the default gateway.
114. It is a request/response protocol that uses TCP port 80, HTTP
although other ports can be used.
115. Its role in network communication is to tracks individual Transport Layer
conversations.
116. In the segment to tell the destination server what service is Destination Port
being requested
117. It usually empty because it is used only in ad hoc mode. Payload
118. These are based on logical connections, instead of physical VLAN
connections.
119. It is a virtual interface that is configured within a multilayer SVI
switch
120. In this phase, the AP responds with an Associate Response Association
that includes the AP MAC address.
121. It is considered blocked when user data is prevented from Port
entering or leaving that port.
122. It ensures a single logical pathway between all destinations Spanning Tree
on a network by blocking redundant paths. Protocol (STP)
123. Filtering decisions are made based on both administrator- Firewalls
defined rules as well as context, which refers to using information
from previous connections and packets belonging to the same
connection
124. It allows routers on the network to synchronize their time NTP
settings with an NTP server and use strata levels.
125. Software installed on a single host to monitor and analyze Host-based IPS
suspicious activity.
126. It filters IPv4 packets based on several attributes Extended ACLs
127. It provides a basic level of security for network access. Access Control Lists
128. It is private in that the traffic is encrypted to keep the data VPN
confidential while it is transported across the public network.