Identify the Devices and Protocols Used in a Small Network

Total Page:16

File Type:pdf, Size:1020Kb

Identify the Devices and Protocols Used in a Small Network

Name ______Date ______

Chapter 11 Student Version

Chapter 11 Objectives:

. Identify the devices and protocols used in a small network . Explain how a small network serves as the basis of larger networks. . Explain the need for basic security measures on network devices. . Identify security vulnerabilities and general mitigation techniques . Use the output of ping and tracert commands to establish relative network performance. . Use basic show commands to verify the configuration and status of a device interface. . Explain the file systems on Routers and Switches. . Apply the commands to back up and restore an IOS configuration file.

Required Materials:

Reading Organizer

Packet Tracer Activities: 11.3.2.2 Packet Tracer - Test Connectivity with Traceroute 11.3.3.4 Packet Tracer - Using Show Commands 11.4.2.5 Packet Tracer - Backing Up Configuration Files 11.5.2.4 Packet Tracer - Configuring a Linksys Router 11.6.1.2 Packet Tracer - Skills Integration Challenge

Labs: 11.0.1.2 Class Activity - Did You Notice Instructions 11.2.2.6 Lab - Researching Network Security Threats 11.2.4.5 Lab - Accessing Network Devices with SSH 11.2.4.6 Lab - Securing Network Devices 11.3.2.3 Lab - Testing Network Latency with Ping and Traceroute 11.4.2.6 Lab - Managing Router Configuration Files with Terminal Emulation Software 11.4.2.7 Lab - Managing Device Configuration Files Using TFTP, Flash, and USB 11.4.2.8 Lab - Researching Password Recovery Procedures 11.6.1.1 Class Activity - Design and Build a Small Network

Chapter Test

Cisco Semester 1 – Introduction to Networks 5.0 1 Mark Rawlings Chapter 11 Saint Paul College Chapter 11 Reading Organizer Student Version

Note: the Reading Organizer has weighted scoring. Any question with the word explain or define in it is expected to have a longer answer and is worth two points each.

After completion of this chapter, you should be able to:

. Identify the devices and protocols used in a small network . Explain how a small network serves as the basis of larger networks. . Explain the need for basic security measures on network devices. . Identify security vulnerabilities and general mitigation techniques . Use the output of ping and tracert commands to establish relative network performance. . Use basic show commands to verify the configuration and status of a device interface. . Explain the file systems on Routers and Switches. . Apply the commands to back up and restore an IOS configuration file.

11.1 Create and Grow

1. What are the factors to consider when planning a small network?

a.

b.

c.

d.

2. Planning and documenting the IP addressing scheme helps the administrator to track device types. Explain two reasons why this is important.

a.

b.

3. How can redundancy can be accomplished in a network environment?

2

4. The smaller the network, the less the chance that redundancy of equipment will be affordable. What is a common way to a common way to introduce redundancy in a small network?

5. To help ensure availability to network services, the network designer should take the following steps:

Step 1 –

Step 2 –

Step 3 –

Step 4 –

6. There are two forms of software programs or processes that provide access to the network. List and explain both.

a. ______–

b. ______–

7. What is the purpose of Network protocols?

8. List the common network protocols and add a brief description of the network services each provides.

a. ______–

b. ______– c. ______–

Cisco Semester 1 – Introduction to Networks 5.0 3 Mark Rawlings Chapter 11 Saint Paul College d. ______–

e. ______–

f. ______–

9. What is a concern when implementing Real-time applications?

10. Explain how VoIP works?

11. How is IP Telephony different than VoIP?

12. To transport streaming media effectively, the network must be able to support applications that require delay-sensitive delivery. List two protocols that support this requirement.

a.

b.

13. List and explain the elements required to scale a network.

a. ______–

b. ______–

c. ______–

d. ______– 14. What enables a network professional to quickly compile statistical information about traffic flows on a network?

4 15. To determine traffic flow patterns, it is important to:

a.

b.

16. Information gathered by the protocol analyzer is analyzed based on what?

a.

b.

c.

17. In addition to understanding changing traffic trends, a network administrator must also be aware of how network use is changing. What is one method of doing this?

11.2 Keeping the Network Safe

18. After the hacker gains access to the network, four types of threats may arise. Thses are:

a.

b.

c.

d.

19. List and explain the four classes of physical threats.

a. ______–

Cisco Semester 1 – Introduction to Networks 5.0 5 Mark Rawlings Chapter 11 Saint Paul College b. ______–

c. ______–

d. ______–

20. There are three network security factors. These are:

a.

b.

c.

21. What is network vulnerability?

22. What do network threats include?

23. There are three primary vulnerabilities or weaknesses. These are:

a.

b.

c.

24. List and explain the three main types of malicious code attacks?

a. ______–

6 b. ______–

c. ______–

25. Explain the three step process of a worm attack.

a. ______–

b. ______–

c. ______–

26. Network attacks can be classified into three major categories. List and explain each.

a. ______–

b. ______–

c. ______–

27. List several samples of Reconnaissance attacks.

a.

b.

Cisco Semester 1 – Introduction to Networks 5.0 7 Mark Rawlings Chapter 11 Saint Paul College c.

d.

28. List several samples of Access attacks.

a.

b.

c.

d.

29. List several samples of Denial of Service attacks.

a.

b.

c.

d.

e.

30. List and explain the recommended steps for worm attack mitigation.

a. ______–

b. ______–

c. ______–

d. ______–

31. What is the most effective way to mitigate a worm attack?

8 32. What is one solution to the management of critical security patches?

33. AAA, or “triple A” network security services provide the primary framework to set up access control on a network device. List and explain what the AAA represents?

a. ______–

b. ______–

c. ______–

34. List and explain the two most popular options for external authentication of users.

a. ______–

b. ______–

35. Firewall products use various techniques for determining what is permitted or denied access to a network. List and explain the techniques firewalls use.

a. ______–

b. ______–

c. ______–

d. ______–

Cisco Semester 1 – Introduction to Networks 5.0 9 Mark Rawlings Chapter 11 Saint Paul College 36. Firewall products come packaged in various forms. List and explain each.

a. ______–

b. ______–

c. ______–

d. ______–

37. Securing endpoint devices is one of the most challenging jobs of a network administrator, because it involves human nature. What must a company have to accomplish this task?

38. Endpoint security also requires securing Layer 2 devices in the network infrastructure to prevent against Layer 2 attacks such as MAC address spoofing, MAC address table overflow attacks, and LAN storm attacks. This is known as:

39. What are some simple steps that should be taken that apply to most operating systems?

a.

b.

c.

40. To protect network devices, it is important to use strong passwords. What are standard guidelines for creating strong passwords?

a.

b.

c.

10 d.

e.

f.

41. Which Cisco IOS command prevents unauthorized individuals from viewing passwords in plaintext in the configuration file?

42. Which Cisco IOS command ensures that all configured passwords are a minimum of a specified length?

43. Telnet is an unsecure method of accessing a Cisco device “in band”. What is a better method?

11.3 Basic Network Performance

44. Which command is an effective way to test connectivity?

45. A ping issued from the IOS will yield one of several indications for each ICMP echo that was sent. List and explain the most common indicators. a. ______–

b. ______–

Cisco Semester 1 – Introduction to Networks 5.0 11 Mark Rawlings Chapter 11 Saint Paul College c. ______–

46. Explain what pinging the loopback address 127.0.0.1 does.

47. Why would a network administrator enter a longer timeout period than the default when running an extended ping from a router?

48. What is a network baseline?

49. What does the Microsoft command tracert or the Cisco IOS command traceroute accomplish?

50. Network technicians use show commands extensively for:

a.

b.

c.

51. List some of the most popular Cisco IOS show commands.

a.

b.

c.

d.

e.

f.

12 52. List the output from the show version command.

a.

b.

c.

d.

e.

f.

g.

h.

53. What does the show version command on a switch display?

54. What information does the ipconfig command give you?

a.

b.

c.

55. What is the purpose of the arp command?

56. Explain what happens when a Cisco device boots up and has CDP enabled.

57. List and explain what information CDP provides about each CDP neighbor device.

a. ______–

Cisco Semester 1 – Introduction to Networks 5.0 13 Mark Rawlings Chapter 11 Saint Paul College b. ______–

c. ______–

d. ______–

e. ______–

58. What does the show cdp neighbors detail command reveal about a neighboring device?

59. What command can you use to disable CDP globally?

60. What does the show ip interface brief output display?

a.

b.

c.

11.4 Managing IOS Configuration Files

62. What is the purpose of the Cisco IOS File System (IFS)?

63. Which command can be used to view the file systems on a Catalyst switch or Cisco router?

64. Configuration files can be saved/archived to a text file using Tera Term. What are the steps involved?

Step 1.

Step 2.

14 Step 3.

Step 4.

Step 5.

65. Where can backup configuration files can be stored?

a.

b.

66. To be compatible with a Cisco router, a USB flash drive must be formatted in a ______format.

67. When backing up to a USB port, it is a good idea to issue the ______command to verify that the USB drive is there and confirm the name

68. What command do you use to copy the configuration file to the USB flash drive?

11.5 Integrated Routing Services

69. What is an integrated router (ISR)?

70. What is a wireless SSID?

71. How can you have multiple ISRs operate in close proximity?

72. What are some basic security measures you can take with and ISR?

Cisco Semester 1 – Introduction to Networks 5.0 15 Mark Rawlings Chapter 11 Saint Paul College a.

b.

c.

73. What is WEP?

74. Why is WPA a better choice than WEP?

75. Other security implementations that can be configured on a wireless AP include:

a.

b.

c.

16

Recommended publications