CCENT ICND1 Study Guide. Lammle Todd

Читать онлайн книгу.

CCENT ICND1 Study Guide - Lammle Todd


Скачать книгу
The IP address is configured under a logical interface, called a management domain or VLAN 1, by default. See Chapter 10 for more information.

      11. A. 256 – 192 = 64, so 64 is our block size. Just count in increments of 64 to find our subnet: 64 + 64 = 128. 128 + 64 = 192. The subnet is 128, the broadcast address is 191, and the valid host range is the numbers in between, or 129–190. See Chapter 4 for more information.

      12. C. An inside global address is considered to be the IP address of the host on the private network after translation. See Chapter 13 for more information.

      13. B. Once you create your pool, the command ip nat inside source must be used to say which inside locals are allowed to use the pool. In this question, we need to see if access list 100 is configured correctly, if at all, so show access-list is the best answer. See Chapter 13 for more information.

      14. D. Layer 2 switching creates individual collision domains per port. See Chapter 1 for more information.

      15. C. The command line vty 0 4 places you in a prompt that will allow you to set or change your Telnet password. See Chapter 6 for more information.

      16. B. To see the contents of all access lists, use the show access-lists command. See Chapter 12 for more information.

      17. C. VLANs break up broadcast domains at layer 2. See Chapter 11 for more information.

      18. A. The command erase startup-config deletes the configuration stored in NVRAM. See Chapter 6 for more information.

      19. C. ICMP is the protocol at the Network layer that is used to send messages back to an originating router. See Chapter 3 for more information.

      20. A. Class A addressing provides 22 bits for host subnetting. Class B provides 16 bits, but only 14 are available for subnetting. Class C provides only 6 bits for subnetting. See Chapter 3 for more information.

      21. B. Only the EIGRP route will be placed in the routing table because EIGRP has the lowest administrative distance (AD), and that is always used before metrics. See Chapter 9 for more information.

      22. D. Switches send information about only one VLAN down a link unless it is configured as a trunk link. See Chapter 11 for more information.

      23. A. By default, switches break up collision domains on a per-port basis but are one large broadcast domain. See Chapter 1 for more information.

      24. C, D. VLAN Trunking Protocol (VTP) is not right because it has nothing to do with trunking except that it sends VLAN information across a trunk link. 802.1q and ISL encapsulations are used to configure trunking on a port. See Chapter 11 for more information.

      25. D. Stub networks have only one connection to an internetwork. Default routes should be set on a stub network or network loops may occur; however, there are exceptions to this rule. See Chapter 9 for more information.

      26. B. Hubs regenerate electrical signals, which are specified at the Physical layer. See Chapter 1 for more information.

      27. A, C. Standard and extended access control lists (ACLs) are used to configure security on a router. See Chapter 12 for more information.

      28. C. If you start at 192.168.128.0 and go through 192.168.159.0, you can see that this is a block of 32 in the third octet. Since the network address is always the first one in the range, the summary address is 192.168.128.0. What mask provides a block of 32 in the third octet? The answer is 255.255.224.0, or /19. See Chapter 5 for more information.

      29. B. The command to back up the configuration on a router is copy running-config startup-config. See Chapter 7 for more information.

      30. C. IEEE 802.3ab is the standard for 1 Gbps on twisted-pair. See Chapter 2 for more information.

      Chapter 1

      Internetworking

      THE FOLLOWING ICND1 EXAM TOPICS ARE COVERED IN THIS CHAPTER:

      ✓ Network Fundamentals

      ■ 1.3 Describe the impact of infrastructure components in an enterprise network

      ■ 1.3.a Firewalls

      ■ 1.3.b Access points

      ■ 1.3.c Wireless controllers

      ■ 1.5 Compare and contrast network topologies

      ■ 1.5.a Star

      ■ 1.5.b Mesh

      ■ 1.5.c Hybrid

      inline Welcome to the exciting world of internetworking. This first chapter will serve as an internetworking review by focusing on how to connect networks together using Cisco routers and switches, and I’ve written it with the assumption that you have some simple basic networking knowledge. The emphasis of this review will be on the Cisco CCENT and/or CCNA Routing and Switching (CCNA R/S) objectives, on which you’ll need a solid grasp in order to succeed in getting your certifications.

      Let’s start by defining exactly what an internetwork is: You create an internetwork when you connect two or more networks via a router and configure a logical network addressing scheme with a protocol such as IP or IPv6.

      We’ll also dissect the Open Systems Interconnection (OSI) model, and I’ll describe each part of it to you in detail because you really need complete, reliable knowledge of it. Understanding the OSI model is key for the solid foundation you’ll need to build upon with the more advanced Cisco networking knowledge gained as you become increasingly more skilled.

      The OSI model has seven hierarchical layers that were developed to enable different networks to communicate reliably between disparate systems. Since this book is centering upon all things CCNA, it’s crucial for you to understand the OSI model as Cisco sees it, so that’s how I’ll be presenting the seven layers to you.

      After you finish reading this chapter, you’ll encounter review questions and written labs. These are given to you to really lock the information from this chapter into your memory. So don’t skip them!

      inline To find up-to-the-minute updates for this chapter, please see www.lammle.com/ccna or the book’s web page via www.sybex.com/go/ccna.

      Internetworking Basics

      Before exploring internetworking models and the OSI model’s specifications, you need to grasp the big picture and the answer to this burning question: Why is it so important to learn Cisco internetworking anyway?

      Networks and networking have grown exponentially over the past 20 years, and understandably so. They’ve had to evolve at light speed just to keep up with huge increases in basic, mission-critical user needs (e.g., the simple sharing of data and printers) as well as greater burdens like multimedia remote presentations and conferencing. Unless everyone who needs to share network resources is located in the same office space – an increasingly uncommon situation – the challenge is to connect relevant networks so all users can share the wealth of whatever services and resources are required.

Figure 1.1 shows a basic local area network (LAN) that’s connected using a hub, which is basically just an antiquated device that connects wires together. Keep in mind that a simple network like this would be considered one collision domain and one broadcast domain. No worries if you have no idea what I mean by that because coming up soon, I’m going to talk about collision and broadcast domains enough to make you dream about them!

Figure 1.1 A very basic network

      Things really can’t get much simpler than this. And yes, though


Скачать книгу