Chapter 11 - Reading Organizer - Student Version - R&S 6 PDF

Title Chapter 11 - Reading Organizer - Student Version - R&S 6
Author Blaze Koteles
Course Networking
Institution Community College of Allegheny County
Pages 23
File Size 387 KB
File Type PDF
Total Views 162

Summary

gbgbfcx...


Description

Name _______________________________________________________ Date ________________

Chapter 11 Cisco 1 – Introduction to Networks Student Version Chapter 11 Sections:

   

11.1 Network Design 11.2 Network Security 11.3 Basic Network Performance 11.4 Network Troubleshooting

Required Materials: Reading Organizer Packet Tracer Activities:

11.2.4.5 - Configuring Secure Passwords and SSH 11.3.2.3 - Test Connectivity with Traceroute 11.3.3.3 - Using Show Commands 11.4.3.6 - Troubleshooting Connectivty Issues 11.5.1.2 - Skills Integration Challenge 11.5.1.3 - Troubleshooting Challenge

Labs: 11.0.1.2 - Class Activity - Did You Notice 11.2.2.6 - Researching Network Security Threats 11.2.4.6 - Accessing Network Devices with SSH 11.2.4.7 - Examining Telnet and SSH in Wireshark 11.2.4.8 - Securing Network Devices 11.3.2.4 - Testing Network Latency with Ping and Traceroute 11.3.4.6 - Using the CLI to Gather Network Device Information 11.4.3.5 - Troubleshooting Connectivity Issues 11.5.1.1 - Class Activity - Design and Build a Small Network Chapter Test

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 1 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 2 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

Page intentionally

left blank. Points__________ / __273___

Name__________________________________________________________ Date ________________

Chapter 11 Reading Organizer Student Version Note: the Reading Organizer has weighted scoring. Any question with the word explain or define in it is expected to have a longer answer and is worth two points each. After completion of this chapter, you should be able to:                

Identify the devices used in a small network. Identify the protocols used in a small network. Explain how a small network serves as the basis of larger networks. Explain why security measures are necessary on network devices. Identify security vulnerabilities. Identify general mitigation techniques. Configure network devices with device hardening features to mitigate security threats. Apply the commands to back up and restore an IOS configuration file. Use the output of the ping command to establish relative network performance. Use the output of the tracert command to establish relative network performance. Use show commands to verify the configuration and status of network devices. Use host and IOS commands to acquire information about network devices. 11.4 Network Troubleshooting Apply troubleshooting methodologies to resolve problems Troubleshoot interface and cable issues Troubleshoot client connectivity issues involving DNS

11.1 Network Design 1. Describe the design of a small network. How many router and switches are typical?

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 3 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

2. A single WAN connection can be provided through: a. b. c.

3. Explain the factors must you consider when selecting intermediate devices used to support the network. . a. Cost –

b. Speed –

c. Expandability –

d. Manageable –

4. Since it is necessary to plan the IP addressing space, all hosts within an internetwork must have a ____________________________________. 5. How does planning and documenting the IP addressing scheme help the administrator?

6. List four different types of devices that factor into the IP design: a. b. CCNA R&S 6.0 - Semester 1 – Introduction to Networks 4 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

c. d. 7. Administrators are better able to ___________________________to resources on the network based on IP address when a deterministic IP addressing scheme is used. 8. How should IP address be allocated for each of the different device types within the address range of the network?

9. Redundancy is required in a network design to maintain a high degree of reliability. What does it do?

10. Name two ways to accomplish redundancy in a network. a. b.

11. Due to single exit point to the internet, it may be advisable for a small business to______________________________________________________. 12. How do you classify network traffic sent to a router?

13. What are the four priority queues? Give an example for each queue, and circle the one that is always emptied first. Queue

Example

a. __________________________

___________________________

b. __________________________

___________________________

c. __________________________

___________________________

d. __________________________

___________________________

14. What are the software programs used to communicate over the network? CCNA R&S 6.0 - Semester 1 – Introduction to Networks 5 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

15. What does the phrase “network-aware” mean in terms of end-user applications?

16. What do other programs need to use network resources like file transfer or network print spooling?

17. What is the function of a protocol?

18. What do network protocols define: a. b. c.

19. How messages are sent and the expected response

20. Give a description of each protocol listed: a. DNS –

b. SSH –

c. Email –

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 6 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

d. Access Protocol (IMAP) –

e. DHCP –

f. Web –

g. FTP –

21. __________________________ convert analog into digital IP packets. 22. In __________________________, the IP phone itself performs voice-to-IP conversion. 23. What are two protocols that support applications that require delay-sensitive delivery? a. b.

24. What are the four elements used to inform the decision-making that accompanies the scaling of a small network? a. b. c. d.

25. It is important to understand the type of traffic that is crossing the network as well as the current traffic flow. What does a protocol analyzer do?

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 7 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

26. How is the information gathered by the protocol analyzer evaluated?

27. How is the information generated by the protocol analyzer utilized? What are two solutions to adjust traffic flows?

28. Documenting snapshots for employees in a small network over a period of time will go a long way toward informing the network administrator of evolving _______________________________ and _______________________________.

11.2 Network Security 29. List the four types of threats that may arise after a hacker gains access to a network: a. b. c. d.

30. List and describe the four classes of physical threats. a. __________________________ –

b. __________________________ –

c. __________________________ –

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 8 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

d. __________________________ –

31. List examples of the three primary vulnerabilities/weaknesses? . Technological – a. b. c.

Configuration – a. b. c. d. e.

Security Policy – a. b. c. d. e. f.

32. Describe Malware and what it is designed to do. CCNA R&S 6.0 - Semester 1 – Introduction to Networks 9 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

33. Name and describe three types of malware. a. __________________________ –

b. __________________________ –

c. __________________________ –

34. List and describe the three categories for network attacks. a. __________________________ –

b. __________________________ –

c. __________________________ –

35. List the four types of reconnaissance attack tools. a. CCNA R&S 6.0 - Semester 1 – Introduction to Networks 10 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

b. c. d.

36. What are the four types of access attacks: a. b. c. d.

37. Describe the ultimate goal of a DoS attack.

38. List and describe four DoS and DDoS attacks. a. __________________________ –

b. __________________________ –

c. __________________________ –

d. __________________________ –

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 11 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

39. What is the most effective way to mitigate a worm attack?

40. Describe the three network security services provided by Authentication, Authorization, and Acounting (AAA)? a. Authenticate – b. Authorize – c. Accounting –

41. Describe the difference between network firewalls and host-based firewalls.

42. List the name and explain the technique that describes what is permitted or denied access on a network using firewalls. a. __________________________ -

b. __________________________ -

c. __________________________ -

d. __________________________ CCNA R&S 6.0 - Semester 1 – Introduction to Networks 12 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

43. Most home integrated routers have built-in basic firewall capabilities that ____________________________________________________ 44. Server-based firewalls can be less secure than dedicated, appliance-based firewalls because of the ____________________________________________________ 45. Client-side firewalls typically filter using SPI, and personal firewalls are often used when a ____________________________________________________ 46. Describe an endpoint.

47. Describe the three simple security steps that should be taken when a new operating system is installed on a device. a.

b.

c.

48. In addition to the simple security steps, it is important to __________________________ and __________________________ prior to implementation. 49. The global configuration command __________________________ prevents unauthorized individuals from viewing passwords in plain text in the configuration file, and it causes the encryption of all passwords that are unencrypted. 50. In global configuration mode use the __________________________ command to ensure that all configured passwords are a minimum of a specified length. CCNA R&S 6.0 - Semester 1 – Introduction to Networks 13 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

51. What does the following command do on a Cisco router? Router(config)# login block-for 120 attempts 3 within 60

52. What does the exec-timeout command tell the Cisco device to do?

53. Exec timeouts can be configured on __________________________, ____________________, and __________________________ using the exec-timeout command in line configuration mode. 54. Explain why Telnet is not secure?

55. Describe the four steps to configure SSH on a Cisco device. a. b. c. d.

11.3 Basic Network Performance

56. The ping command uses the ____________________________________________________ and verifies __________________________ connectivity. 57. List the three common ping indicators resulting from each ICMP request sent. and explain what the results indicate? a. __________________________ –

b. __________________________ – CCNA R&S 6.0 - Semester 1 – Introduction to Networks 14 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

c. __________________________ –

58. When sending a ping on an Ethernet LAN, it is common for the first echo request to __________________________ if the ARP process is required.

59. What does pinging the loopback address verify?

60. Describe three reasons network technicians use the Cisco IOS CLI show command. a. b. c.

61. List the six more popular show commands a. b. c. d. e. f.

62. Describe the output of each command. a. Ipconfig CCNA R&S 6.0 - Semester 1 – Introduction to Networks 15 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

b. Ipconfig/all –

c. Ipconfig/displaydns –

63. Describe the output of each arp command. a. arp –a -

b. arp –d* -

64. What can you do to ensure the ARP cache is populated?

65. Cisco Discovery Protocol (CDP) runs at which layer?

66. When show cdp neighbors commands runs on a Cisco device, describe what information is exchanged between its directly connected CDP neighbors?

67. Describe the information provided about each CDP neighbor. a. Device identifiers –

b. Address list – CCNA R&S 6.0 - Semester 1 – Introduction to Networks 16 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

c. Port identifier –

d. Capabilities list –

e. Platform –

68. The _______________________________________command reveals the IP address of a neighboring device regardless if you can ping it or not. 69. Why should CDP advertisements be disabled on user-facing ports?

70. To disable CDP globally, use the global configuration command __________________________. To disable CDP on an interface, use the interface command __________________________.

71. The show ip interface command verifies the operation of __________________________ and __________________________ interfaces.

72. The show ip interface brief command displays what three things on Cisco devices? a. b. c.

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 17 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

73. Label the show command scenarios.

74. What command can provide valuable information when troubleshooting or verifying system operations?

75. All debug commands are entered in __________________________ mode. 76. The Cisco IOS allows for narrowing the output of debug to include only the relevant feature or subfeature. This is important because debugging output is ______________________________________ and it can ___________________________________________________. 77. You should use debug commands only to troubleshoot __________________________. 78. What command do you use in privileged EXEC mode to list a brief description of all the debugging command options?

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 18 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

79. List two commands to turn off a specific debugging feature for ip icmp. a. b.

80. Describe how a local connection is established between a PC and a switch or router.

81. What are two common protocols to establish remote connections over the network: a. b.

82. Debug (log) messages are sent to the console by default, but they are not sent to the virtual lines. In order to display log messages on a terminal or virtual console, use the ____________________________________________________ . 83. To stop logging messages on a terminal, use the __________________________ privileged EXEC command.

11.4 Network Troubleshooting 84. Network problems can be simple or complex, and can result from a combination of __________________________, __________________________, and __________________________ issues.

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 19 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

85. A common and efficient troubleshooting methodology is based on the scientific method and can be broken into the six main steps. List the six steps. a. b. c. d. e. f.

86. What are some causes that may require a problem to be escalated? a. b. c.

87. List three Cisco IOS commands that can help with troubleshooting. a. b. c.

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 20 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

88. Number the troubleshooting steps in the correct order.

89. What does duplex refer to in data communications?

90. For best communication performance, two connected Ethernet network interfaces must operate in the same __________________________ to avoid inefficiency and latency on the link. 91. If one of the two connected devices is operating in full-duplex and the other is operating in halfduplex, a __________________________ occurs. 92., Which Cisco protocol can easily detect a duplex mismatch between two Cisco devices? CCNA R&S 6.0 - Semester 1 – Introduction to Networks 21 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

93. What are two common causes of incorrect IPv4 addressing assignment? a. b.

94. What two Cisco IOS commands can be used to verify what IPv4 addresses are assigned to a network interface? a. b.

95. In Windows-based machines, when the device cannot contact a DHCP server, Windows will automatically assign an address belonging to the __________________________ range.

96. What will other operating systems such as Linux or OS X do if no DHCP server is available?

97. What command can be used on a Windows-based computers to verify the IP addresses assigned?

98. What is the closest networking device that can forward traffic to other networks for an end device called?

99. What command can be used to verify the default gateway on Windows-based computers?

100. What command can be used on a Cisco IOS to verify the default gateway?

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 22 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA

101. Define the term Domain Name Servies (DNA).

102. Use the __________________________ to verify which DNS server is in use by the Windows computer.

103. What is another useful DNS troubleshooting command for PCs?

CCNA R&S 6.0 - Semester 1 – Introduction to Networks 23 Robb Jones & Kimberly Mentzeli Chapter 11 Frederick County Career & Tech Center, MD, USA...


Similar Free PDFs