31 days before your CCENT Certification

  1. What are hosts often attached to a network?
    • Servers
    • A desktop
    • A workstation
    • Laptops and handheld computers
  2. Provide application services to client computers. Typically have multiple hard drives and increased processing power and memory?
  3. Provide services such as file storage, web page hosting, e-mail storage, and print services?
  4. Uses a mouse, keyboard, and monitor to give the user direct access to local applications such as word processing and network applications such as e-mail?
    A desktop
  5. is a customized desktop designed for a specific application that demands improved hardware such as dual monitors, a specialized 3-D card, a faster disk drive, and processor, or increased memory?
    A workstation
  6. Provide more accessible mobile devices with relatively less powerful hardware than desktops or workstations.
    Laptops and handheld computers
  7. A system that can cost less, but it might not have the performance level of a custom-built computer system?
    A preassembled computer
  8. The main components of a computer are?
    • The motherboard
    • Central processing unit (CPU)
    • Random-access memory (RAM)
  9. What may require a computer system that has no built-in or compatible network connection to communicate on the network?
    a network interface card (NIC)
  10. As with any adapter card, the NIC typically attaches to?
    the motherboard
  11. Earlier, networks provided only a single dedicated and specific service, Such as?
    voice communication
  12. The structure of each dedicated network allowed?
    voice communication or video transfer, but not both
  13. Newer converged networks can offer voice, video, and data from?
    a single device over the same network
  14. Devices connected to a network allow users to?
    • communicate electronically
    • share resources
    • and engage in online trade
  15. The Internet is an example of?
    a converged network capable of simultaneous voice, video, and data transmission.
  16. One way to classify the purpose and placement of networking devices is through?
    a hierarchical model
  17. Outline a three-layer hierarchical model:
    • Access layer devices
    • Distribution layer devices
    • Core layer devices
  18. To which layer of the hierarchical model refer connected hosts on a local-area network (LAN)?
    Access layer devices
  19. Which layer of the hierarchical model provides connectivity between LANs?
    Distribution layer devices
  20. Which layer of the hierarchical model provides high-speed connectivity between distribution layer devices?
    Core layer devices
  21. In addition to hosts, what other devices do networks include?
    • hubs
    • switches
    • and routers
  22. What device is typically installed in a LAN at the access layer?
  23. What device is used at the access layer?
  24. What device is connected to the distribution layer?
  25. Is an ethernet networking device with multiple ports that simply regenerates a signal it receives on one port to all other ports. All devices are on the same channel and share that channel’s bandwidth. If two devices send a message at the same time a collision occurs, this device is known as?
  26. A multiport networking device that looks at the destination physical address of a received frame on one port to forward the frame to the port where the host is connected. Hosts communicate through temporary circuits avoiding collisions. This device is known as?
  27. Is essentially a two-port switch an administrator could use to divide a large, hub-based collision domain?
    A bridge
  28. Is a device that looks at the destination IP address of a received packet and forwards the packet to its destination network?
  29. Is a device that also determines the best path for a packet to its destination network?
  30. What provides the foundation for your understanding of networks?
    A layered model
  31. When you learn, teach, troubleshoot, and tackle network configuration, what models should guide your plan of attack?
    the Open Systems Interconnection (OSI) model and the Transmission Control Protocol/Internet Protocol (TCP/IP) model
  32. a host running a server application provides information and services to other hosts running?
    client applications.
  33. The communication between a server and client requires?
    a set of Standards and protocols
  34. When hosts communicate over a network, they implement?
    many protocols
  35. This protocol stack is made up of layers, each of which relies upon?
    on its neighboring layers
  36. The lower-layer protocols focus on?
    moving the data across the network
  37. And the higher-layer protocols focus on?
    the format of the data in the transmission.
  38. When you use a layered model to learn network protocols, you can?
    single out the operation of a single layer and how it interacts with other layers
  39. The following list explains the benefits of a layered model:
    • Helps with the design of protocols, because each layer has a standard function and a standard interface for communication with adjacent layers.
    • Allows products from different vendors to work together, allowing for collaboration in design and competition between manufacturers of compatible components.
    • Allows the technology of one layer to improve without affecting other layers.
    • Provides common terminology to teach, learn, and discuss networks and network protocols.
  40. The first layered model for internetworking was?
    • the Internet or TCP/IP model. This TCP/IP, a four-layer model, consists of?
    • the application layer
    • transport layer
    • Internet layer
    • and network access layer
  41. In the TCP/IP Model and corresponding Protocol Data Units (PDU) Layer 4(application) deals with?
    Network applications and its PDU is Data
  42. Layer 3(transport) deals with?
    host to host communication and its PDU is segments
  43. Layer 2(interntet) deals with?
    routing or path of the communications and its PDU is packets
  44. Layer 1(Network Access) deals with?
    two functions: the framing of the data and signaling over the physical media. Its PDU is Frame, bits
  45. The following steps take you through the flow of data through a network using the TCP/1P model protocol stack as a reference:
    • 1. You start at the top of the protocol stack with the application layer. For example, you use a network application such as a web browser to make a Hypertext Transfer Protocol (HTTP) request for a web page.
    • 2. At the transport layer, the request is broken down and encapsulated into a Transmission Control Protocol (TCP) segment and is given a header identifying the source port, destination port, and sequence number. Some applications at the transport layer use the faster, less reliable User Datagram Protocol (UDP).
    • 3. At the Internet layer, the TCP segments are encapsulated into Internet Protocol (IP) packets and are given an IP header with a source and destination IP address.
  46. 4. The network access layer uses the Ethernet protocol to encapsulate the packets into frames. Each frame has a header including a source and destination media access control (MAC) address, as well as a cyclical redundancy check (CRC) field at the end of the frame to verify proper transmission. In this layer, the frames are also encoded into bits and are sent electronically over the medium by the network interface card (NIC).
    5. After the bits cross the physical medium and arrive at the destination, they are deencapsulated up the protocol stack until the data reaches the application. In this case, the HTTP request would reach the server application, and it would respond with web data and start the process again.
  47. The OSI model is another reference model for network communication. It was created in 1984 by? the International Organization for Standardization (ISO).
  48. Unlike the TCP/IP model, which focuses on the TCP and IP protocols used on the Internet, the OSI model divides?
    all network communication (not just TCP/IP) into seven layers.
  49. Which model provides the same benefits of standardization and independent compatibility as the TCP/IP layered model?
    The OSI seven-layer model
  50. Layer Name: 7(Application)
  51. **28*It is decentralized, it has no dedicated servers, all clients can also provide services such as file and print sharing, are the key characteristics of?
    A peer-to-peer network
  52. The advantages of a peer-to-peer networking are?
    • Easy to set up.
    • Less complexity.
    • Lower cost because network devices and dedicated servers might not be required.
    • Can be used for simple tasks such as transferring files and sharing printers.
  53. The disadvantages of peer-to-peer networking are?
    • No centralized administration.
    • Not as secure.
    • Not scalable.
    • All devices may act as both clients and servers, which can slow their performance.
  54. Stand for IXP:
    Internet Exchange Points
  55. Stand for NAP:
    Network Access Points
  56. The IXPs and NAPs between ISPs provide?
    The back bone for the Internet.
  57. The connection between continents are handled by?
    Tier 1 ISPs
  58. The intermediary connection between countries are classified as?
    Tier 2 ISPs
  59. Connections between major cities are classified as?
    Tier 3 ISPs
  60. Stand for CLI:
    Command line interface
  61. Allows you to send an echo request and receive an echo reply to test connectivity?
    The ping command
  62. Allows you to test connectivity between hosts and displays each hop the packet traverse on its trip?
    The traceroute command
  63. Hosts on ethernet networks identify themselves with a?
    Media access control (MAC) address
  64. When a host communicates over a ethernet network, it uses?
    Its MAC address as the source and the recipient's MAC address as the destination
  65. A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols is known as?
  66. A system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems is known as?
  67. What are the three layers used in a hierarchical design model of a local network?
    Access layer, distribution layer and core layer
  68. In which layer hosts connect to each other on the local network?
    At the access layer
  69. In which layer local networks connect to each other?
    At the distribution layer
  70. In which layer high speed devices and media connect distribution layer devices?
    At the core layer
  71. Provides an unique identifier on a local network?
    MAC (media access control) address
  72. Identifies the location of a host in divided hierarchical network?
    IP (Internet Protocol) address
  73. Where is a MAC address physically assigned to and remain the same on a host?
    The NIC (network interface card)
  74. How many parts contain an IP address and which are these?
    An IP address contains two parts: one identifies the host and the other part identifies the local network where the host is connected.
  75. What does a host need to communicate over the network?
    A host needs both a MAC address and an IP address to communicate over the network
  76. What does a router do on a network?
    A router manages IP traffic
  77. At the access layer, a host is connected to a hub or a switch that?
    Connects other hosts on the network
  78. All host in the same network would have?
    The same network portion of an IP address
  79. At the distribution layer networks are connected to routers. The routers only forward?
    IP packets that are destined for other networks.
  80. At the core layer, what does powerful routers and switches do?
    They move internetwork traffic as efficiently as possible.
  81. To send information over a network, what does a host do?
    It provides each packet with a source and destination IP address.
  82. Why does routers use IP for?
    To determine whether to forward the packet to another network.
  83. What is it that each host must have on the Internet?
    An unique IP address.
  84. When a host sends packets, what does it do?
    It places the assigned IP address in the packet header as the source address, including also a destination address.
  85. What happen if the destination IP address is outside of your ISP's local network?
    The ISP's routers forward it on a path to the outside network.
  86. On the Internet, to whom does your IP address belongs to?
    It likely belongs to an ISP.
  87. From where does the ISP received the address and assigned it to you?
    From an Internet registry.
  88. When the ISP's routers forward a packet on a path to the outside network, what do the ISP's routers do?
    They choose the best known path for the destination and forward the packet to other ISP routers.
  89. Which commands are used to test connectivity and path selection on a destinationjQuery110107444680869347144_1493957324846
    The ping and traceroute commands.
  90. A cloud in network diagrams often represents?
    The numerous routers that's choose the path for a packet.
Card Set
31 days before your CCENT Certification
Questionnaire of the entire book. Please play in order at least the first few times.