Final CCENT , Exam Review Questions and answers, rated A+ Physical topology diagrams (1) - ✅✅ -Identify the physical location of intermediary devices, configured ports, and cable installation. Refers to the physical connections and identifies how end devices and infrastructure devices such as routers, switches, an d wireless access points are interconnected. ___ are usually point -to-point or star. Logical topology diagrams(1) - ✅✅ -Identify devices, ports, and IP addressing scheme. Refers to the way a network transfers frames from one node to the next. This arrangem ent consists of virtual connections between the nodes of a network. These logical signal paths are defined by data link layer protocols. The ___ of point -to-point links is relatively simple while shared media offers deterministic and a non -
deterministic me dia access control methods. Local Area Network (LAN)(1) - ✅✅ -A network infrastructure that provides access to users and end devices in a small geographical area. LANs interconnect end devices in a limited area such as a home, school, office building, or c ampus. A LAN is usually administered by a single organization or individual. The administrative control that governs the security and access control policies are enforced on the network level. LANs provide high speed bandwidth to internal end devices and i ntermediary devices. Wide Area Network (WAN)(1) - ✅✅ -A network infrastructure that provides access to other networks over a wide geographical area. WANs interconnect LANs over wide geographical areas such as between cities, states, provinces, countries, o r continents. WANs are usually administered by multiple service providers. WANs typically provide slower speed links between LANs. Metropolitan Area Network (MAN)(1) - ✅✅ -A network infrastructure that spans a physical area larger than a LAN but smaller th an a WAN (e.g., a city). MANs are typically operated by a single entity such as a large organization. Wireless LAN (WLAN)(1) - ✅✅ -Similar to a LAN but wirelessly interconnects users and end points in a small geographical area. Storage Area Network (SAN)( 1) - ✅✅ -A network infrastructure designed to support file servers and provide data storage, retrieval, and replication. It involves high -end servers, multiple disk arrays (called blocks), and Fibre Channel interconnection technology Intranet(1) - ✅✅ -Term often used to refer to a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization. Intranets are basically an internet which is usually only accessible from within the organization. Cable(1) - ✅✅ -Typically offered by cable television service providers, the Internet data signal is carried on the same coaxial cable that delivers cable television. It provides a high bandwidth, always on, connection to the Internet. A special cable modem separates the Internet data signal from the other signals carried on the cable and provides an Ethernet connection to a host computer or LAN DSL(1) - ✅✅ -Provides a high bandwidth, always on, connection to th e Internet. It requires a special high -speed modem that separates the DSL signal from the telephone signal and provides an Ethernet connection to a host computer or LAN. DSL runs over a telephone line, with the line split into three channels. One channel i s used for voice telephone calls. This channel allows an individual to receive phone calls without disconnecting from the Internet. A second channel is a faster download channel, used to receive information from the Internet. The third channel is used for sending or uploading information. This channel is usually slightly slower than the download channel. The quality and speed of the DSL connection depends mainly on the quality of the phone line and the distance from your phone company's central office. The farther you are from the central office, the slower the connection. Fault Tolerance(1) - ✅✅ -This requires a network architecture that is built to be fault tolerant. A fault tolerant network is one that limits the impact of a failure, so that the fewest nu mber of devices are affected by it. It is also built in a way that allows quick recovery when such a failure occurs. These networks depend on multiple paths between the source and destination of a message. If one path fails, the messages can be instantly s ent over a different link. Having multiple paths to a destination is known as redundancy. Quality of Service(1) - ✅✅ -Networks must provide predictable, measurable, and at times, guaranteed services. The packet -switched network architecture does not guaran tee that all packets that comprise a particular message will arrive on time, in their correct order, or even that they will arrive at all. kernel (2) - ✅✅ -The portion of the OS code that interacts directly with the computer hardware. shell (2) - ✅✅ -The portion that interfaces with the applications and user. command -line interface (CLI) (2) - ✅✅ -The user interacts directly with the system in a text -based environment by entering commands on the keyboard at a command prompt. The system e xecutes the command, often providing textual output. graphical user interface (GUI) (2) - ✅✅ -This interface allows the user to interact with the system in an environment that uses graphical images, multimedia, and text. Actions are performed by interactin g with the images on screen. What are several ways to access the CLI environment? (2) - ✅✅ -Console, telnet/SSH, AUX port Console port (2) - ✅✅ -A management port that provides out -of-band access to Cisco device. Out -of-
band access refers to access via a d edicated management channel that is used for device maintenance purposes only. -line con 0/ enable password ___/ login Telnet (2) - ✅✅ -A method for remotely establishing a CLI session of a device, through a virtual interface, over a network. -line vty 0 The Secure Shell (SSH) (2) - ✅✅ -This protocol provides stronger password authentication than Telnet and uses encryption when transporting session data. This keeps the user ID, password, and the details of the management session private. AUX (2) - ✅✅ -An o lder way to establish a CLI session remotely is via a telephone dialup connection using a modem connected to the _____ port of a router; this method is also an out -of-band connection and does not require any networking services to be configured or availabl e on the device. User executive (User EXEC) mode [commands](2) - ✅✅ -ping ____; show ______ (limited in this mode); enable ______. (>) Privileged executive (Privileged EXEC) mode [commands] (2) - ✅✅ -debug ______; reload _______; conf _______. **also all u ser EXEC commands. (#) Global configuration mode [commands] (2) - ✅✅ -hostname ______; enable secret ______; ip route ______; interface (serial ____; ethernet _____; dsl _____); router (rip ______; eigrp ______; ospf ______); line (vty ______; con ______). (config) configuration modes (interface) [commands] (2) - ✅✅ -**in global conf mode** int eth _____ (ip{/ipv6} address ___ ___; encapsulation ______; shutdown/ no shutdown); router rip ______ (network ____; version _____; auto summary ____); line vty ____ (password _____; login). (config -if) [command] Configure terminal(2) - ✅✅ -allows user to enter the global config mode from the privileged exec mode. [command] Disable(2) - ✅✅ -allows the user to return to the previous level of exec mode on the terminal. [command] Exit(2) - ✅✅ -Same as disable. [command] Enable(2) - ✅✅ -allows the user to enter privileged exec mode from user exec mode. [command] Show running -config(2) - ✅✅ -displays the current running configuration of the device located in the NVRAM. [command] Description(2) - ✅✅ -sets the description for the selected port. [command] Ping(2) - ✅✅ -allows the user to use the terminal to send and ICMP packet through the network to test connectivity.