1 / 66

CCENT Review

CCENT Review. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer. Which addresses are valid host IP addresses given the network 172.16.32.8 subnet mask 255.255.255.248?.

gitano
Download Presentation

CCENT Review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CCENT Review

  2. Put the following descriptions in order from Layer 7 to Layer 1 and give the name of each layer

  3. Which addresses are valid host IP addresses given the network 172.16.32.8 subnet mask 255.255.255.248?

  4. Which addresses are valid host IP addresses given the network 172.16.32.8 subnet mask 255.255.255.248? • Shortcut 256-248=8 • Range 8 in last octet • 172.168.32.8 – 172.168.32.15

  5. 192.168.102.65/27 32 hosts on each subnet 192.168.101.64-95 73 ok 81 ok 192.168.102.97/27 32 hosts on each subnet 192.168.101.96-127 123 ok 148 OUT OF RANGE

  6. A network host has the IP address 10.250.206.55/20. How many more network devices can be added to this same subnetwork?

  7. A network host has the IP address 10.250.206.55/20. How many more network devices can be added to this same subnetwork? • /20 = • 11111111.11111111.11110000.00000000 • NOTE - 255.255.XXX.0 (XXX – interesting octet) • 2 ^ 12 = 4096 • 4096 – 3 = 4093

  8. To which subnetwork does this packet belong? 10.149.177.135/14

  9. To which subnetwork does this packet belong? 10.149.177.135/14 • /14 subnet mask 255.252.0.0 • 10.149.177.135 • 00001010.10010101.10110001.10000111 AND • 11111111.11111100.00000000.00000000 EQUALS • 00001010.10010100.00000000.00000000 binary • 10.148.0.0 Network • 10.151.255.255 Broadcast

  10. The router receives a packet with the destination address of 172.16.30.79. To which subnetwork does this packet belong? 172.16.0.0/21172.16.20.0/21172.16.24.0/21172.16.28.0/21172.16.32.0/21

  11. The router receives a packet with the destination address of 172.16.30.79. To which subnetwork does this packet belong? /21 = 11111111.11111111.11111000.000000002^3=8172.16.0.0/21 = 172.16.0.0 – 172.16.7.255172.16.20.0/21 20 not a multiple of 8172.16.24.0/21 = 172.16.24.0 – 172.16.31.255172.16.28.0/21 28 not a multiple of 8172.16.32.0/21 = 172.16.32.0 – 172.16.39.255

  12. How many collision and broadcast domains are show in the following network topology?

  13. If all the switches have the default configuration, how many collision and broadcast domains are show in the following network topology? Collision – 12 Broadcast – 3

  14. What is the function of the router in this topology?

  15. What is the function of the router in this topology?Determines the path to send the message to get to a destination network.Each port, or interface, on a router connects to a different local network. Every router contains a table of all locally-connected networks and the interfaces that connect to them. These routing tables can also contain information about the routes, or paths, that the router uses to reach other remote networks that are not locally attached. When a router receives a frame, it decodes the frame to get to the packet containing the destination IP address. It matches the address of the destination to all of the networks that are contained in the routing table. If the destination network address is in the table, the router encapsulates the packet in a new frame in order to send it out. It forwards the new frame out of the interface associated with the path, to the destination network. Routers contain broadcasts.

  16. Define Default Gateway and discussed how it would be used in this topology.

  17. The default gateway address is the address of the router interface connected to the same local network as the source host. All hosts on the local network use the default gateway address to send messages to the router. Once the host knows the default gateway IP address, it can use ARP to determine the MAC address. The MAC address of the router is then placed in the frame, destined for another network.

  18. What tables are maintained by routers?

  19. What tables are maintained by routers? If the router cannot determine where to forward a message, it will drop it. Configure a routing table with a default route to keep a packet from being dropped. A default route is the interface through which the router forwards a packet containing an unknown destination IP network address.

  20. Identify the following as a unicast, broadcast or multicast.

  21. A company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment?

  22. A company has an 802.11b wireless access point installed. Which type of wireless NIC is a valid standards-based one but will not work in this environment? 802.11a

  23. Match the wireless term to its definition.

  24. Match the wireless term to its definition.

  25. Once a hacker gains access to the network, what are the four types of threats?

  26. Once a hacker gains access to the network, what are the four types of threats? • Information theft • Identity theft • Data loss / manipulation • Disruption of service

  27. What command is described below? • Tests the accessibility of a specific IP address • Sends an ICMP (Internet Control Message Protocol) echo request packet to the destination address and then waits for an echo reply packet to return from that host • Output indicates whether the reply was received successfully and displays the round-trip time for the transmissions

  28. What command is described below?Answer - ping • Tests the accessibility of a specific IP address • Sends an ICMP (Internet Control Message Protocol) echo request packet to the destination address and then waits for an echo reply packet to return from that host • Output indicates whether the reply was received successfully and displays the round-trip time for the transmissions

  29. Draw a picture using each of the following cables.

  30. Describe what has to happen for this packet to continue.

  31. Describe what has to happen for this packet to continue.

  32. Describe what has to happen for this packet to continue.

  33. Describe what has to happen for this packet to continue.

  34. Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host? Static NAT Dynamic NAT PAT

  35. Which type of Network Address Translation allows a host on a public network consistent access to a specified private inside host? Static NAT Dynamic NAT PAT

  36. Which addresses are “inside global” addresses?

  37. Which addresses are “inside global” addresses? Answer - 198.133.219.33 – 198.133.219.62

  38. Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used

  39. Which two items are required for initial configuration of Cisco routers if the IOS command-line interface is used Answer – Rollover cable and terminal emulation

  40. Fill in the blanks. The router bootup process has three stages. 1. Perform _________________________ and load the bootstrap program. • The _________ is a process that occurs on almost every computer when it boots up. _________ is used to test the router hardware. After _______________, the bootstrap program is loaded. 2. Locate and load the Cisco IOS software. • The bootstrap program locates the Cisco IOS software and loads it into RAM. Cisco IOS files can be located in one of three places: ____________, _____________, or another location indicated in the startup configuration file. By default, the Cisco IOS software loads from _________ memory. The configuration settings must be changed to load from one of the other locations. 3. Locate and execute the _____________ configuration file or enter setup mode. • After the Cisco IOS software is loaded, the bootstrap program searches for the ____________ configuration file in NVRAM. This file contains the previously saved configuration commands and parameters, including interface addresses, routing information, passwords, and other configuration parameters. • If a configuration file is not found, the router prompts the user to enter _______ mode to begin the configuration process. • If a __________ configuration file is found, it is copied into RAM and a prompt containing the host name is displayed. The prompt indicates that the router has successfully loaded the Cisco IOS software and configuration file.

  41. Fill in the blanks. The router bootup process has three stages. 1. Perform Power-on self test (POST) and load the bootstrap program. • The POST is a process that occurs on almost every computer when it boots up. POST is used to test the router hardware. After POST, the bootstrap program is loaded. 2. Locate and load the Cisco IOS software. • The bootstrap program locates the Cisco IOS software and loads it into RAM. Cisco IOS files can be located in one of three places: flash memory, a TFTP server, or another location indicated in the startup configuration file. By default, the Cisco IOS software loads from flash memory. The configuration settings must be changed to load from one of the other locations. 3. Locate and execute the startup configuration file or enter setup mode. • After the Cisco IOS software is loaded, the bootstrap program searches for the startup configuration file in NVRAM. This file contains the previously saved configuration commands and parameters, including interface addresses, routing information, passwords, and other configuration parameters. • If a configuration file is not found, the router prompts the user to enter setup mode to begin the configuration process. • If a startup configuration file is found, it is copied into RAM and a prompt containing the host name is displayed. The prompt indicates that the router has successfully loaded the Cisco IOS software and configuration file.

  42. NVRAM – running-config or startup-config • RAM – running-config or startup-config • ROM – running-config or startup-config

More Related