Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
What is a network?
"A network is a collection of devices and end systems.
Networks consist of computers, servers, and network devices, such as switches an
d routers, that can communicate with each other."
What are the four major categories of physical components of a computer network?
"- Personal computers (PCs): Send and receive data and are the endpoints of the
network.
- Interconnections: The components that provide a means for data to travel acros
s the network. This includes network interface cards (NIC), network media, and c
onnectors.
- Switches: Provide network access for the PCs.
- Routers: Interconnect networks."
What are the four major resources that are shared on a computer network?
"The four major resources that are shared on a computer network are as follows:
- Data and applications: Consist of computer data and network-aware applications
such as e-mail
- Resources: Include input and output devices such as cameras and printers
- Network storage: Consists of directly attached storage devices (physical stora
ge that is directly attached to a computer and a shared server), network attache
d storage, and storage area networks
- Backup devices: Can back up files and data from multiple computers"
What are the most common network user applications on today's networks? "The mos
t common network user applications on today's networks are as follows:
- E-mail
- Web browsers
- Instant messaging
- Collaboration
- Databases"
List three categories of network applications.
Three categories of network applications are as follows:
Batch applications: Examples are FTP and TFTP. They are started by a human and c
omplete with no other interaction.
Interactive applications: Include database updates and queries. A person request
s data from the server and waits for a reply. Response time depends more on the
server than the network.
Real-time applications: Include VoIP and video. Network bandwidth is critical be
cause these applications are time critical. Quality of service (QoS) and suffici
ent network bandwidth are mandatory for these applications."
What are two types of network-monitoring software?
"Two types of network-monitoring software are as follows:
Protocol analyzers: Capture network packets between computers and decode the pac
kets so that one can view what is occurring during transmission
Sniffers: Work like a wiretap and allow you to not only observe communication be
tween computers but also view what is being transmitted"
When describing the characteristics of a network, what does speed refer to?
Speed refers to how fast data is transmitted over the network.
When describing the characteristics of a network, what does cost refer to?
Cost refers to the general cost of network components, installation, and mainten
ance.
When describing the characteristics of a network, what does security refer to?
Security refers to how secure the network and network data are.
When describing the characteristics of a network, what does availability refer t
o?
"Availability is the measure of the likelihood that the network will be availabl
e for use when required.
Network availability can be calculated using the following formula, which calcul
ates the minutes of downtime compared to the number of minutes in a year:
([525,600 [ms] Minutes downtime]/[525,600]) * 100"
Your CEO wants to know the stability and availability of your company's network
for the past year. During the past year, the network was down for 30 minutes. Wh
at was the total availability for the network? "99.994%.
([525,600 [ms] 30]/[525,600]) * 100 = 99.994%"
When describing the characteristics of a network, what does scalability refer to
? Scalability refers to how well the network can accommodate more users an
d more data.
When describing the characteristics of a network, what does reliability refer to
? Reliability refers to the dependability of the devices that make up the
network (switches, routers, PCs, servers, and so on).
What is the difference between the physical and logical network topology?
"Physical topology defines the physical components of the network: cables, netwo
rk devices, and computers.
Logical topology defines the data path of the network."
What are three common methods (technologies) used to connect to the Internet?
Three common methods (technologies) used to connect to the Internet are digital
subscriber line (DSL), cable, and serial.
What are the five classes of network attacks? "The five classes of network att
acks are as follows:
- Passive: Include capturing and monitoring unprotected communication and captur
ing passwords. The attacker gains access to information or data without the cons
ent or knowledge of users.
- Active: Actively try to break or bypass security devices, introduce malicious
code, and steal and modify data.
- Close-in: Occur when an individual attains close physical proximity to network
s or facilities with the intent of gathering or changing data.
- Insider: Occur from authorized users inside a network. They can be either mali
cious or nonmalicious.
- Distribution: Focus on the malicious changes to hardware or software at the fa
ctory or during distribution to introduce the malicious code to unsuspecting use
rs."
A hacker monitors traffic on an unencrypted e-business website, and captures con
sumer login information to the website. What type of attack is this? This is
a passive attack.
Parked across the street with his Pringles-can antenna in hand, a hacker capture
s wireless data to crack the wireless key on a company's network. Why type of ne
twork attack is this? "This is a close-in and passive attack.
It is passive because the hacker is monitoring and gathering data. It is also cl
ose-in because the hacker had to gain close proximity to the company's wireless
network to capture the wireless data."
What are the four steps of the Cisco security wheel? "The four steps of the C
isco security wheel are as follows:
- Step 1: Secure
- Step 2: Monitor
- Step 3: Test
- Step 4: Improve"
What are reconnaissance network attacks? "Reconnaissance attacks are atta
cks that gather information about the target.
Types of attacks include sniffers, ping sweeps, port scans, and Internet Domain
Name System (DNS) queries."
Define access attacks. Access attacks exploit known web services, databases, op
erating systems, and authentication services.
List five types of access attacks. "Five types of access attacks are as fol
lows:
- Password attacks
- Trust exploitation
- Port redirection
- Man-in-the-middle attacks
- Buffer overflow"
What are some ways to mitigate password attacks? "Some ways to mitigate p
assword attacks are as follows:
- Disable accounts after a specific number of unsuccessful login attempts.
- Do not use plain-text passwords.
- Do not allow users to share the same password on different systems.
- Use strong passwords."
Why should you use Secure Shell (SSH) instead of Telnet to manage your Cisco dev
ices? Telnet sends all data in clear text, including passwords. SSH encrypts a
ll data, ensuring that passwords and session data are secured.
What are six reasons the OSI reference model was created? "Six reasons tha
t the OSI reference model was created are as follows:
- To ensure that different vendors' products can work together
- To create standards to enable ease of interoperability by defining standards f
or the operations at each level
- To clarify general functions of internetworking
- To divide the complexity of networking into smaller, more manageable sublayers
- To simplify troubleshooting
- To enable developers to modify or improve components at one layer without havi
ng to rewrite an entire protocol stack"
What are the seven layers of the OSI reference model? Include the layer number a
nd name of each layer in your answer. "The seven layers of the OSI reference m
odel are as follows:
- Layer 7: Application layer
- Layer 6: Presentation layer
- Layer 5: Session layer
- Layer 4: Transport layer
- Layer 3: Network layer
- Layer 2: Data link layer
- Layer 1: Physical layer"
What is the function of the OSI model's physical layer (Layer 1)? Give some exam
ples of physical layer implementations. The physical layer defines the physical
medium. It defines the media type, the connector type, and the signaling type (b
aseband versus broadband). This includes voltage levels, physical data rates, an
d maximum cable lengths. The physical layer is responsible for converting frames
into electronic bits of data, which are then sent or received across the physic
al medium. Twisted-pair, coaxial, and fiber-optic cable operate at this level. O
ther implementations at this layer are repeaters/hubs.
What is the responsibility of the data link layer (Layer 2)? "The data link l
ayer defines how data is formatted from transmission and how access to the physi
cal media is controlled. This layer also typically includes error correction to
ensure reliable delivery of data.
The data link layer translates messages from the network layer into bits for the
physical layer, and it enables the network layer to control the interconnection
of data circuits within the physical layer. Its specifications define different
network and protocol characteristics, including physical addressing, error noti
fication, network topology, and sequencing of frames.
Data-link protocols provide the delivery across individual links and are concern
ed with the different media types, such as 802.2 and 802.3. The data link layer
is responsible for putting 1s and 0s into a logical group. These 1s and 0s are t
hen put on the physical wire. Some examples of data link layer implementations a
re IEEE 802.2/802.3, IEEE 802.5/802.2, packet trailer (for Ethernet, frame check
sequence [FCS], or cyclic redundancy check [CRC]), Fiber Distributed Data Inter
face (FDDI), High-Level Data Link Control (HDLC), and Frame Relay."
The Institute of Electrical and Electronics Engineers (IEEE) defines what two su
blayers of the data link layer? "The IEEE defines the following two sublayers of
the data link layer:
- The Logical Link Control (LLC) sublayer
- The Media Access Control (MAC) sublayer
These two sublayers provide physical media independence."
For what is the Logical Link Control (LLC) sublayer responsible? "The Log
ical Link Control (802.2) sublayer is responsible for identifying different netw
ork layer protocols and then encapsulating them to be transferred across the net
work.
Two types of LLC frames exist: Service access point (SAP) and Subnetwork Access
Protocol (SNAP). An LLC header tells the data link layer what to do with a packe
t after it is received."
What functions does the Media Access Control (MAC) sublayer provide? "The MAC
sublayer specifies how data is placed and transported over the physical wire. I
t controls access to the physical medium.
The LLC sublayer communicates with the network layer, but the MAC sublayer commu
nicates downward directly to the physical layer. Physical addressing (MAC addres
ses), network topologies, error notification, and delivery of frames are defined
at the MAC sublayer."
What are some network devices that operate at the data link layer? "Bridges
and switches operate at the data link layer.
Both devices make decisions about what traffic to forward or drop (filter) by MA
C addresses, and logical network address are not used at this layer. Data link l
ayer devices assume a flat address space."
Describe the function of the network layer (Layer 3). Give some examples of netw
ork layer implementations. "The network layer provides internetwork routing
and logical network addresses. It defines how to transport traffic between devi
ces that are not locally attached.
The network layer also supports connection-oriented and connectionless service f
rom higher-layer protocols.
Routers operate at the network layer. IP, Internetwork Packet Exchange (IPX), Ap
pleTalk, and Datagram Delivery Protocol (DDP) are examples of network layer impl
ementations."
Are network layer addresses physical or logical? "Network layer addresses
are logical.
These addresses are logical addresses that are specific to the network layer pro
tocol being run on the network. Each network layer protocol has a different addr
essing scheme. They are usually hierarchical and define networks first and then
hosts or devices on that network. An example of a network address is an IP addre
ss, which is a 32-bit address often expressed in decimal format. An example of a
n IP address in decimal format is 192.168.0.1."
What is the transport layer (Layer 4) responsible for? Give some examples of tra
nsport layer implementations. "The transport layer segments and reassembles da
ta from upper-layer applications into data streams. It provides reliable data tr
ansmission to upper layers.
End-to-end communications, flow control, multiplexing, error detection and corre
ction, and virtual circuit management are typical transport layer functions. Som
e examples include TCP, User Datagram Protocol (UDP), and Sequenced Packet Excha
nge (SPX)."
What is flow control, and what are the three methods of implementing it?
"Flow control is the method of controlling the rate at which a computer sends da
ta, thus preventing network congestion.
The three methods of implementing flow control are as follows:
- Buffering
- Source-quench messages (congestion avoidance)
- Windowing"
What are the functions of the session layer (Layer 5)? Give some examples.
"The session layer is responsible for creating, managing, and ending communicati
on sessions between presentation layer entities.
These sessions consist of service requests and responses that develop between ap
plications located on different network devices. Some examples include Structure
d Query Language (SQL), remote-procedure call (RPC), X Window System, Zone Infor
mation Protocol (ZIP), NetBIOS names, and AppleTalk ASP."
In the OSI model, what are the responsibilities of the presentation layer (Layer
6)? Give some examples of this layer. "Also known as the translator, the prese
ntation layer provides coding and conversion functions to application layer data
. This guarantees that the application layer on one system can read data transfe
rred from the application layer of a different system. Some examples of the pres
entation layer are as follows:
- Compression, decompression, and encryption
- JPEG, TIFF, GIF, PICT, QuickTime, MPEG, EBCDIC, and ASCII file types"
What does the application layer (Layer 7) of the OSI model do, and what are some
examples of this layer? "The application layer is the layer that is clos
est to the user. This means that this layer interacts directly with the software
application. The application layer's main function is to identify and establish
communication partners, determine resource availability, and synchronize commun
ication. Some examples include the following:
- TCP/IP applications such as Telnet, FTP, Simple Mail Transfer Protocol (SMTP),
and HTTP
- OSI applications such as Virtual Terminal Protocol; File Transfer, Access, and
Management (FTAM); and Common Management Information Protocol (CMIP)"
How do the different layers of the OSI model communicate with each other?
"Each layer of the OSI model can communicate only with the layer above it, below
it, and parallel to it (a peer layer).
For example, the presentation layer can communicate with only the application la
yer, session layer, and presentation layer on the machine it is communicating wi
th. These layers communicate with each other using service access points (SAP) a
nd protocol data units (PDU). The SAP is a conceptual location at which one OSI
layer can request the services of another OSI layer. PDUs control information th
at is added to the user data at each layer of the model. This information reside
s in fields called headers (the front of the data field) and trailers (the end o
f the data field)."
What is data encapsulation? "Encapsulation wraps data with the necessary pro
tocol information before network transmission.
A PDU can include different information as it goes up or down the OSI model. It
is given a different name according to the information it is carrying (the layer
where it is located). When the transport layer receives upper-layer data, it ad
ds a TCP header to the data; this is called a segment. The segment is then passe
d to the network layer, and an IP header is added; thus, the data becomes a pack
et. The packet is passed to the data link layer, thus becoming a frame. This fra
me is then converted into bits and is passed across the network medium. This is
data encapsulation. For the ICND test, you should know the following:
- Application layer: Data
- Transport layer: Segment
- Network layer: Packet
- Data link layer: Frame
- Physical layer: Bits"
What are the four layers of the TCP/IP stack? "The four layers of the TCP/IP s
tack are as follows:
- Application
- Transport
- Internet
- Network Access"
On what layer are physical data rates, connectors, and MAC addresses located in
the TCP/IP stack? Physical data rates, connectors, and MAC addresses are l
ocated on the network access layer.
What are some protocols that operate at the TCP/IP Internet layer? "Some pr
otocols that operate at the TCP/IP Internet layer are as follows:
- IP
- ICMP (Internet Control Message Protocol)
- ARP (Address Resolution Protocol)
- RARP (Reverse Address Resolution Protocol)"
What is the Internet Protocol (IP)? "IP is a connectionless protocol that pr
ovides best-effort delivery routing of packets.
IP has the following characteristics:
- Operates at Layer 3 of the Open Systems Interconnection (OSI) (network) and TC
P/IP (Internet) model
- Is connectionless
- Uses hierarchical addressing
- Provides best-effort delivery of packets
- Has no built-in data recovery" Understanding TCP/IP
What is an IP address used for? An IP address uniquely identifies a device on an
IP network. Understanding TCP/IP
How many bits are in an IPv4 address? In an IPv6 address? "IPv4: 32 bits
IPv6: 128 bits" Understanding TCP/IP
An IP address is a hierarchical address that consists of what two parts?
"An IP address is a hierarchical address that consists of the following two part
s:
- Network ID: Describes the network to which the IP address or device belongs
- Host ID: The ID that identifies a specific host" Understanding TCP/IP
What are the different classes of IP addressing and the address ranges of each c
lass? "The different classes of IP addressing and their ranges are as follows:
- Class A: 1.0.0.0 to 126.255.255.255
- Class B: 128.0.0.0 to 191.255.255.255
- Class C: 192.0.0.0 to 223.255.255.255
- Class D: 224.0.0.0 to 239.255.255.255 (Multicasting)
- Class E: 240.0.0.0 to 255.255.255.254 (Reserved)" Understanding TCP/IP
What does RFC 1918 define? "RFC 1918 defines reserved (private) networks an
d addresses that are not routed on the Internet.
These addresses are as follows:
- 10.0.0.0 to 10.255.255.255
- 172.16.0.0 to 172.31.255.255
- 192.168.0.0 to 192.168.255.255" Understanding TCP/IP
If an IP wants to communicate with all devices on the local network, what is the
destination IP address of its broadcast? "255.255.255.255.
This address is also called the local broadcast address." Understanding TC
P/IP
What is special about IP address 127.0.0.1? "127.0.0.1 is the loopback addre
ss.
The loopback address lets the host send a message to itself to see whether TCP/I
P was properly bounded to the network card." Understanding TCP/IP
In a Class A network, how many octets are used for host addresses? 3. One o
ctet consists of 8 bits; thus a Class A network reserves 24 bits for host addres
ses. The maximum number of hosts a Class A network can have is 16,777,214 (224 [
ms] 2). Understanding TCP/IP
How many hosts are available for use in a Class B network? 65,534. A Class
B network reserves 16 bits for host addresses; thus 216 [ms] 2 = 65,534.
Understanding TCP/IP
How many hosts are available for use in a Class C network? 254. A Class C n
etwork reserves 8 bits for host addresses. Thus 28 [ms] 2 = 254. Understa
nding TCP/IP
What is DHCP? Dynamic Host Configuration Protocol (DHCP) allows a host to obta
in an IP address automatically and to set TCP/IP stack configuration parameters
such as subnet mask, default gateway, and DNS addresses. Understanding TC
P/IP
What is DNS? "The Domain Name System (DNS) converts names into IP addresses.
Instead of having to remember a host's IP address, DNS allows you to use a frien
dly name to access the host. For example, it is easier to remember http://www.ci
sco.com than 198.133.219.25." Understanding TCP/IP
On a Windows XP computer, what command can you use to view the IP information as
signed to the PC? ipconfig. Understanding TCP/IP
On a Windows XP computer, what commands do you use to release an IP address obta
ined from DHCP and request a new address? "To release the IP address: ipco
nfig /release
To request a new address: ipconfig /renew" Understanding TCP/IP
What two protocols function at the transport layer of the TCP/IP model? "Two pro
tocols that function at the transport layer of the TCP/IP model are as follows:
- TCP (Transmission Control Protocol): A connection-oriented, reliable protocol
- UDP (User Datagram Protocol): A connectionless and unacknowledged protocol"
Understanding TCP/IP
Which has more overhead, UDP or TCP? TCP. Because UDP segments are not acknow
ledged, they do not carry the overhead that TCP does, thus allowing faster trans
missions and greater efficiency. Understanding TCP/IP
What are the protocol numbers for TCP and UDP? "TCP: 6
UDP: 17" Understanding TCP/IP
What is reliable versus best-effort delivery? Reliable delivery is connection
oriented, and best-effort is connectionless. Understanding TCP/IP
What are TCP and UDP port numbers? To pass information (such as e-mail) to
upper layers, TCP and UDP use port numbers. These port numbers are predefined an
d keep track of different conversations among different hosts at the same time.
Originating source port numbers are dynamically assigned by the source host usin
g a number in the range of 49,152 to 65,535. Understanding TCP/IP
What are well-known port numbers? Well-known port numbers are used for fun
damental applications on the Internet such as e-mail and DNS. They have a range
from 1 to 1023. Understanding TCP/IP
What is the port number for SMTP? 25. Understanding TCP/IP
What is the port number for DNS? 53. Understanding TCP/IP
What are the port numbers for FTP? "20 and 21.
FTP uses port 20 for data transfer; port 21 is the command port." Understa
nding TCP/IP
What is the port number for TFTP? 69. Understanding TCP/IP
What is the port number for Telnet? 23. Understanding TCP/IP
What is a socket? "A socket is an IP address combined with a TCP or UDP po
rt number.
When a host wants to talk to another host, it sends its IP address along with th
e application (port number) it wants to communicate with. For example, if host 1
92.168.0.3 wants to talk to host 192.168.0.2 by e-mail, host 192.168.0.3 sends i
ts IP address and destination port number (192.168.0.3:1023) to host 192.168.0.2
with the port number it wants to communicate with (192.168.0.2:25)." Understa
nding TCP/IP
What are the three mechanisms TCP uses to accomplish a connection-oriented conne
ction? "The three mechanisms TCP uses to accomplish a connection-oriented conne
ction are as follows:
- Packet sequencing
- Acknowledgments, checksums, and timers
- Windowing" Understanding TCP/IP
What are the steps for the TCP three-way handshake? "The steps for the TCP t
hree-way handshake are as follows:Step 1. The source host sends a SYN to t
he destination host.
Step 2. The destination host replies to the source with an ACK. At the same time
, it sends a SYN to the source host.
Step 3. The source host replies with an ACK." Understanding TCP/IP
What is the purpose of flow control? "Flow control provides a mechanism for t
he receiver to control the transmission speed.
TCP implements flow control by using the SYN and ACK fields in the TCP header, a
long with the Window field. The Window field is a number that implies the maximu
m number of unacknowledged bytes allowed outstanding at any time." Understa
nding TCP/IP
What is a TCP window? A TCP window is the amount of data that can be sent befo
re an acknowledgment is required. Understanding TCP/IP
What is the purpose of a three-way handshake? The three-way handshake initiate
s communication by establishing an initial sequence number and window size.
Understanding TCP/IP
What is the purpose of TCP sequencing? The purpose of sequencing is to provide
reliability by requiring the recipient to acknowledge receipt of a group of segm
ents before a timer expires. Understanding TCP/IP
What fields are included in the TCP header? "The fields included in the TCP
header are as follows:
- Acknowledgment Number
- Sequence Number
- Source/Destination Port
- Window Size
- TCP Checksum" Understanding TCP/IP
What is an example of a Layer 2 address? "MAC address.
MAC addresses are assigned to end devices and are used for communication over th
e local network. MAC addresses are hard-coded into the network card." Understa
nding TCP/IP
What is the Address Resolution Protocol (ARP)? ARP is used to resolve a known I
P address to a MAC address. For a host to communicate with another host, it must
know the MAC address of the destination host (if they are on the same network)
or next-hop router. This is the reason for ARP. Understanding TCP/IP
What is the ARP table? "The ARP table stores the reference of each known IP add
ress to its MAC address.
The ARP table is created and maintained dynamically." Understanding TCP/IP
What is the purpose of the default gateway? "The default gateway allows host
s to communicate to hosts that are on a different network (segment).
All data that is not destined for the same network is sent to the default gatewa
y for delivery." Understanding TCP/IP
A host computer has been correctly configured with a static IP address, but the
default gateway is incorrect. Which layer of the OSI model is first affected by
this misconfiguration? "Layer 3.
The default gateway sends IP packets to a remote network and functions at Layer
3 of the OSI model." Understanding TCP/IP
What three configuration settings does a host on a TCP/IP network require to com
municate with hosts on a remote TCP/IP network? "The configuration settings are
as follows:
- IP address
- Subnet mask
- Default gateway address" Understanding TCP/IP
You want to test TCP/IP connectivity between two hosts. What IP tool can you use
to do this? "Ping. Ping is a tool that is part of IP that sends Internet Con
trol Message Protocol (ICMP) packets to test network layer connectivity between
two hosts. Ping sends an ""echo request"" packet to the target host and listens
for an ICMP ""echo response.""" Understanding TCP/IP
What two utilities test IP connectivity? "Ping and traceroute (tracert).
Ping and traceroute are ICMP utilities. ICMP can test only Layer 3 connectivity.
" Understanding TCP/IP
List four functions of ICMP. "Four functions of ICMP are as follows:
- Flow control
- Detect unreachable destinations
- Redirect routes
- Check remote hosts" Understanding TCP/IP
"While troubleshooting a computer with network connectivity problems, you notice
steady link lights on both the computer and the switch port the computer is con
nected to. However, when you issue the ping command from the computer, you recei
ve a ""Request timed out"" message. On what layer of the OSI model does the prob
lem most likely exist?" "The network layer.
Because the link lights on the computer network interface card (NIC) and worksta
tion port are on, the physical connection is working properly. Because you are g
etting a ""Request timed out"" message, the problem most likely resides at the n
etwork layer." Understanding TCP/IP
What are local-area networks? "Local-area networks (LANs) are high-speed, low-
error data networks that cover a small geographic area.
LANs are usually located in a building or campus and do not cover a large distan
ce. They are relatively inexpensive to develop and maintain. LANs connect comput
ers, printers, terminals, and other devices in a single building or a limited ar
ea." Understanding Ethernet
What are LAN standards? "LAN standards define the physical media and connectors
used to connect to the media at the physical layer and the way devices communica
te at the data link layer.
LAN standards encompass Layers 1 and 2 of the OSI model. Examples of LAN standar
ds are Ethernet and IEEE 802.3." Understanding Ethernet
What functions does the Media Access Control (MAC) sublayer provide? "The MAC
sublayer specifies how data is placed and transported over the physical wire.
It controls access to the physical medium. The LLC sublayer communicates with th
e network layer, but the MAC sublayer communicates downward directly to the phys
ical layer. Physical addressing (MAC addresses), network topologies, error notif
ication, and delivery of frames are defined at this sublayer." Understanding Et
hernet
What does the LLC sublayer do? "The Logical Link Control (802.2) sublayer is re
sponsible for identifying different network layer protocols and then encapsulati
ng them to be transferred across the network.
Two types of LLC frames exist: service access points (SAP) and Subnetwork Access
Protocol (SNAP). An LLC header tells the data link layer what to do with a pack
et after it is received." Understanding Ethernet
What do the Ethernet and IEEE 802.3 standards define? "The Ethernet and IEEE 8
02.3 standards define a bus-topology LAN that operates at a baseband signaling r
ate of 10 Mbps, referred to as 10BASE. Within the Ethernet standards are protoco
l specifications that define the transmission medium and access. The following t
hree protocol specifications exist:
- 10BASE2: Known as thin Ethernet, this specification uses thin coaxial cable as
its medium and provides access for multiple stations on the same segments.
- 10BASE5: Called thick Ethernet, this specification uses a thick coaxial cable
as its medium. The maximum segment length of 10BASE5 is over twice that of 10BAS
E2.
- 10BASE-T: This specification provides access for a single station only, so all
stations connect to a switch or hub. The physical topology of 10BASE-T is that
of a star network. It uses unshielded twisted-pair (UTP) cable Category 3, 4, 5,
and 5e as its network medium." Understanding Ethernet
Define the Fast Ethernet standard. "The Ethernet standard that defines Fast
Ethernet is IEEE 802.3u. This standard raises the speed of the Ethernet standar
d of 10 Mbps to 100 Mbps with only minimal changes to the existing cable structu
re. The Fast Ethernet standard defines different protocol specifications dependi
ng of the physical medium used. The following are the four different Fast Ethern
et specifications:
- 100BASE-FX: Uses two strands of multimode fiber-optic cable as its medium and
has a maximum segment length of 400 meters.
- 100BASE-T: Defines UTP as its medium and has a maximum segment length of 100 m
eters.
- 100BASE-T4: Uses four pairs of Cat 3 to 5 UTP as its medium. It maximum segmen
t length is 100 meters.
- 100BASE-TX: Specifies two pairs of UTP or shielded twisted-pair (STP) cable as
its medium with a maximum segment distance of 100 meters." Understanding Et
hernet
What does BASE mean in 10BASE-T and 100BASE-T? BASE in 10BASE-T and 100BASE-T r
efers to the baseband signaling method. Baseband is a network technology in whic
h only one carrier frequency is used. This means that when a device transmits, i
t uses the entire bandwidth on the wire and does not share it. Ethernet defined
baseband technology. Understanding Ethernet
What is Gigabit Ethernet? Gigabit Ethernet is an extension of the IEEE 802
.3 Ethernet standard. It increases the speed of the Ethernet protocol to 1000 Mb
ps, or 1 Gbps. IEEE 802.3z specifies Gigabit over fiber, and IEEE 802.3ab specif
ies Gigabit over twisted-pair cable. Understanding Ethernet
What is carrier sense multiple access collision detect (CSMA/CD)? "CSMA/CD
describes the Ethernet access method.
In CSMA/CD, many stations can transmit on the same cable, and no station has pri
ority over any other. Before a station transmits, it listens on the wire (carrie
r sense) to make sure that no other station is transmitting. If no other station
is transmitting, the station transmits across the wire. If a collision occurs,
the transmitting stations detect the collision and run a backoff algorithm. The
backoff algorithm is a random time that each station waits before retransmitting
." Understanding Ethernet
What are the three ways LAN traffic is transmitted? "LAN traffic is transmit
ted one of the following three ways:
- Unicast: Unicasts are the most common type of LAN traffic. A unicast frame is
a frame intended for only one host.
- Broadcast: Broadcasts frames intended for everyone. Stations view broadcast fr
ames as public service announcements. All stations receive and process broadcast
frames.
- Multicast: Multicasts are traffic in which one transmitter tries to reach only
a subset, or group, of the entire segment." Understanding Ethernet
How many bits are in an Ethernet address? 48. Also called a MAC address, a
n Ethernet address is the Layer 2 address associated with the Ethernet network a
dapter. Typically burned into the adapter, the MAC address is usually displayed
in a hexadecimal format, such as 00-0d-65-ac-50-7f. Understanding Ethernet
What portion of the MAC address is vendor specific? "The first half or first
24 bits of the MAC address are vendor specific.
A MAC address is 48 bits and is displayed in hexadecimal. The first half of the
address identifies the vendor or manufacturer of the card. This is called the Or
ganizational Unique Identifier (OUI). The last half of the address identifies th
e card address." Understanding Ethernet
What portion of the MAC address is vendor assigned? The last 24 bits are ven
dor assigned. Understanding Ethernet
What is UTP cabling? "Unshielded twisted-pair (UTP) cabling is a type of twis
ted-pair cable that relies solely on the cancellation effects produced by the tw
isted wire pairs to limit electromagnetic interference (EMI) and radio frequency
interference (RFI).
UTP cable is often installed using an RJ-45 connector, and UTP cabling must foll
ow precise specifications dictating how many twists are required per meter of ca
ble. The advantages of UTP are ease of installation and low cost. A disadvantage
of UTP is that it is more prone to EMI than other types of media." Understa
nding Ethernet
What is the difference between STP and UTP cable? Shielded twisted-pair (S
TP) cable combines the twisting techniques of UTP, but each pair of wires is wra
pped in a metallic foil. The four pairs of wires are then wrapped in a metallic
braid or foil. STP reduces electrical noise and EMI. STP is installed with an ST
P data connector but can also use an RJ-45 connector. An advantage of STP is tha
t it is more resistant to outside interference; a disadvantage is that it is mor
e expensive and difficult to install. Understanding Ethernet
What is the maximum cable length for STP? 100 meters or 328 feet. Understa
nding Ethernet
What is the maximum cable length for UTP? 100 meters or 328 feet. Understa
nding Ethernet
What is a straight-through Ethernet cable, and when would you use it? "A strai
ght-through Ethernet cable is wired the same way at both ends. This cable uses p
ins 1, 2, 3, and 6. The send and receive wires are not crossed.
You should use a straight-through Ethernet cable when connecting dissimilar devi
ces (for example, data terminal equipment [DTE] to data communications equipment
[DCE]). Examples include connecting PCs (DTE) to switches or hubs (DCE) or a ro
uter (DTE) to a switch or a hub (DCE)." Understanding Ethernet
What is a crossover Ethernet cable, and when would you use it? "A crossover Eth
ernet cable is a cable that has the send and receive wires crossed at one of the
ends. In a Category 5 cable, the 1 and 3 wires are switched and the 2 and 6 wir
es are switched at one end of the cable.
You should use a crossover cable when connecting similar devices (DCE to DCE), s
uch as connecting a router to a router, a switch to a switch or hub, a hub to a
hub, or a PC to a PC." Understanding Ethernet
Describe the difference between physical network topology and logical network to
pology. Physical topologies refer to the physical layout of devices and network
media. Logical topologies refer to the logical paths in which data accesses the
media and transmits packets across it. LAN Network Topologies
What are the five types of physical topologies implemented in today's networks?
"The five types of physical topologies implemented in today's networks are as fo
llows:
- Bus
- Ring
- Star
- Extended star
- Mesh" LAN Network Topologies
What physical network topology connects all devices to one cable? "Bus top
ology.
A bus topology connects all devices to a single cable. This cable connects one c
omputer to another. In a logical bus topology, only one packet can be transmitte
d at a time." LAN Network Topologies
Describe a star and extended star physical topology. "Star and extended star
physical topologies are made of a central connection point, such as a hub or swi
tch, where all cable segments connect. A star topology resembles spokes in a bic
ycle wheel and is the network topology of choice in Ethernet networks.
When a star network is expanded to include additional network devices that conne
ct to a main center network device, it is called an extended star topology."
LAN Network Topologies
Describe a ring topology. "In a ring topology, all hosts and devices are c
onnected in the form of a ring or circle. The following two types of ring networ
ks exist:
- Single-ring: In a single-ring network, all devices share a single cable and da
ta travels in one direction. Each device waits its turn to send data over the ne
twork.
- Dual-ring: A dual-ring network has a second ring to add redundancy and allows
data to be sent in both directions." LAN Network Topologies
What physical network topology connects all devices to each other? A mesh n
etwork topology connects all devices to each other for fault tolerance and redun
dancy. LAN Network Topologies
What is the difference between a mesh and a partial-mesh topology? A full-m
esh topology connects all nodes to one another for full redundancy. In a partial
-mesh, at least one node maintains multiple connections to all other devices.
LAN Network Topologies
What is the logical topology of Ethernet? Bus. Ethernet uses a logical bus
topology and either a physical bus or star topology. LAN Network Topologies
What do wireless networks use to communicate to end devices? Radio frequency
(RF) or infrared waves. LAN Network Topologies
In wireless LANs (WLANs), what distributes the wireless signal? "Access points (
AP) or a wireless hub.
APs or wireless hubs distribute the wireless signal, and nodes receive the wirel
ess signal through a wireless adapter card." LAN Network Topologies
What are two types of Layer 1 network devices? "Two types of Layer 1 network de
vices are as follows:
- Repeaters: Regenerate and retime network signals, amplifying them to allow the
signal to travel a longer distance on a network media.
- Hubs: Known as a multiple-port repeaters, hubs also regenerate and retime netw
ork signals. The main difference between a hub and a repeater is the number of c
ables that connect to the device. A repeater typically has 2 ports, whereas a hu
b has from 4 to 48 ports." LAN Network Topologies
What are some network devices that operate at the data link layer (Layer 2)?
"Bridges and switches are network devices that operate at the data link layer. B
oth devices make decisions about what traffic to forward or drop (filter) by MAC
addresses, and logical network addresses are not used at this layer. Data link
layer devices assume a flat address space.
Typically, a bridge is designed to create two or more LAN segments and is softwa
re implemented.
A switch is a hardware version of a bridge, but that has many more ports than a
bridge, and is designed to replace a hub while providing the filtering benefits
of a bridge." LAN Network Topologies
What is a LAN segment? "A LAN segment is a network connection made by a single
unbroken network cable.
Segments are limited by physical distance because, after a certain distance, the
data transmission becomes degraded because of line noise and the reduction of s
ignal strength." LAN Network Topologies
"What are the Ethernet segment distance limitations for the following?
- 100BASE-TX
- 100BASE-FX
- 1000BASE-T
- 1000BASE-LX
- 1000BASE-SX
- 1000BASE-CX" "The Ethernet segment distance limitations are as follows:
- 100BASE-TX: 100 meters
- 100BASE-FX: 400 meters
- 1000BASE-T: 100 meters
- 1000BASE-LX: 550 meters for multimode fiber, 10 km for single-mode fiber
- 1000BASE-SX: 250 meters for multimode fiber, 550 meters for single-mode fiber
- 1000BASE-CX: 25 meters" LAN Network Topologies
What devices can you use to extend a LAN segment? "To extend a LAN segment
, you can use the following devices:
- Hubs
- Repeaters
- Bridges
- Switches" LAN Network Topologies
How do collisions occur in Ethernet? Collisions occur on a shared LAN segment
when two devices try to communicate at the same time. In a shared Ethernet segm
ent, only one device can transmit on the cable at a time. When two devices try t
o transmit at the same time, a collision occurs. LAN Network Topologies
What are collision domains? "A collision domain defines a group of devices c
onnected to the same physical medium.
A collision occurs when two packets are sent at the same time and collide with e
ach other. When a collision occurs, a jam signal is sent from a workstation. A c
ollision affects all the machines on the segment, not just the two that collided
; when the jam signal is on the wire, no workstations can transmit data. The mor
e collisions that occur in a network, the slower it will be, because the devices
must resend the packets that collided." LAN Network Topologies
What happens when you segment the network with hubs/repeaters? "Because hubs an
d repeaters operate at the physical layer of the OSI model, segmenting a network
with these devices appears as an extension to the physical cable.
Hubs and repeaters are transparent to devices; they are unintelligent devices. A
ll devices that connect to a hub/repeater share the same bandwidth. Hubs/repeate
rs create a single broadcast and collision domain." LAN Network Topologies
What is the advantage of segmenting a network with bridges/switches? Bridges/
switches operate at Layer 2 of the OSI model and filter by MAC address. Each por
t on a bridge/switch provides fully dedicated bandwidth and creates a single col
lision domain. Because bridges/switches operate at Layer 2 of the OSI model, the
y cannot filter broadcasts, and they create a single broadcast domain. LAN Netw
ork Topologies
What devices are used to break up collision domains? Switches, bridges, and r
outers are used to break up collision domains. They create more collision domain
s and fewer collisions. Each port on a bridge, switch, and router creates one co
llision domain. For example, if you have a switch with 24 ports, you have 24 sep
arate collision domains. LAN Network Topologies
In an attempt to extend your Ethernet segment, you add a 24-port hub. How many c
ollision domains will you have in the segment with the addition of the hub?
1. A hub only extends the network segment, and all devices share the same segmen
t bandwidth. As a result, a hub does not create more collision domains. LAN Netw
ork Topologies
In an attempt to extend your Ethernet segment you add a 24-port switch. How many
collision domains and broadcast domains will you have in the segment with the a
ddition of a switch? "24 collision domains and 1 broadcast domain.
Because switches operate at Layer 2 of the OSI model, they can divide the networ
k into different segments, thus creating more collision domains. Each port on a
switch creates one collision domain. Also, because a switch operates at Layer 2
of the OSI model, it cannot filter broadcasts. As such, a switched network will
have one broadcast domain." LAN Network Topologies
What are broadcast domains? A broadcast domain defines a group of devices th
at receive each other's broadcast messages. As with collisions, the more broadca
sts that occur on the network, the slower the network will be. This is because e
very device that receives a broadcast must process it to see whether the broadca
st is intended for that device. LAN Network Topologies
You install a 6-port router on your network. How many collision domains and broa
dcast domains will be created on the network with the addition of the 6-port rou
ter? "Six collision domains and six broadcast domains.
Each interface on a router creates a collision domain and a broadcast domain."
LAN Network Topologies
List four advantages that Layer 2 switches have over bridges. "Four advantages
that Layer 2 switches have over bridges are as follows:
- A high-speed backplane that enables multiple simultaneous conversations to occ
ur.
- Data-buffering capabilities that store and forward packets to the correct port
s or port.
- Higher port densities versus bridges.
- Lower latency than bridges. Layer 2 switches are implemented in hardware, allo
wing millions of bits per second to be transmitted at the same time." LAN Netw
ork Topologies
What is a broadcast storm? Broadcast storms occur when many broadcasts are
sent simultaneously across all network segments. They are usually caused by Laye
r 2 loops because of spanning tree failures, a bad network interface card (NIC),
a faulty network device, or a virus. LAN Network Topologies
What three major functions do Layer 2 switches provide? "The three major functio
ns that Layer 2 switches provide are as follows:
- Address learning
- Packet forwarding/filtering
- Loop avoidance with the Spanning Tree Protocol" LAN Network Topologies
What are the three switching methods (frame transmission modes) in Cisco Catalys
t switches? "The three frame operating modes to handle frame switching are a
s follows:
- Store-and-forward
- Cut-through
- Fragment-free" LAN Network Topologies
What is the Cisco Catalyst store-and-forward switching method? In the store-and
-forward switching method, the switch's incoming interface receives the entire f
rame before it forwards it. The switch computes the cyclic redundancy check (CRC
) to make sure that the frame is not bad. If the frame is good, the switch forwa
rds it. If the CRC is bad, the switch drops it. If the frame is a runt (less tha
n 64 bytes, including the CRC) or a giant (more than 1518 bytes, including the C
RC), the switch discards it. Because the switch stores the frame before forwardi
ng it, latency is introduced in the switch. Latency through the switch varies wi
th the size of the frame. LAN Network Topologies
What is the Cisco Catalyst cut-through switching method? In cut-through s
witching mode, the switch only checks the frame's destination address and immedi
ately begins forwarding the frame out the appropriate port. Because the switch c
hecks the destination address in only the header and not the entire frame, the s
witch forwards a collision frame or a frame that has a bad CRC. LAN Network Topo
logies
What is the Cisco Catalyst fragment-free switching method? Also known as mo
dified cut-through, fragment-free switching checks the first 64 bytes before for
warding the frame. If the frame is less than 64 bytes, the switch discards the f
rame. Ethernet specifications state that collisions should be detected during th
e first 64 bytes of the frame. By reading the first 64 bytes of the frame, the s
witch can filter most collisions, although late collisions are still possible.
LAN Network Topologies
What is an example of Layer 2 addresses? MAC addresses. LAN Network Topo
logies
What is an example of Layer 3 addresses? IP addresses. LAN Network Topo
logies
If a sending device does not know the MAC address of the receiving device, what
tool is used to find the MAC address? "Address Resolution Protocol (ARP).
ARP is a local broadcast sent to all devices on the local segment to find the MA
C address of a host." LAN Network Topologies
Host A wants to send data to host B. Host B is on a different segment from host
A. The two segments are connected to each other through a router. What happens t
o the MAC address of host A during data transit to host B? "Because host B
is on a different segment that is separated by a router, the MAC address of host
A will change. Anytime a frame passed through a router, a router rewrites the M
AC address to the MAC address of the router and then sends the frame to the loca
l host.
In this case, the router will change the MAC address of the frame sent from host
A. Host B will see that the frame came from the MAC address of the router with
the IP address of host A." LAN Network Topologies
What is the function of CSMA/CD algorithm in Ethernet technologies? Carrier
sense multiple access collision detect (CSMA/CD) defines how the Ethernet media
is accessed. LAN Network Topologies
What are six ways to configure a Cisco device? "Six ways to configure a Cisco d
evice are as follows:
- Console connection
- Auxiliary connection (through a modem)
- Telnet connection
- HTTP/HTTPS connection
- Secure Shell (SSH) Connection
- CiscoWorks" Operating Cisco IOS
What type of cable do you need to connect to a Cisco device's console port?
You need an RJ-45[nd]to[nd]RJ-45 rollover cable. A rollover cable is a cable tha
t has each pin wired to its opposite number at the other end. Operating Cisco
IOS
What are the console configuration settings needed to connect to a Cisco device'
s console port? "The console configuration settings needed to connect to a Cisco
device's console port are as follows:
- Speed: 9600 bits per second
- Data bits: 8
- Parity: None
- Stop bit: 1
- Flow control: None" Operating Cisco IOS
What two EXEC modes are supported in the Cisco IOS? "The two EXEC modes supp
orted in Cisco IOS are as follows:
- User EXEC mode (user mode)
- Privileged EXEC mode (enable or privileged mode)" Operating Cisco IOS
In IOS, what is user EXEC mode? "User EXEC mode is the first mode you enter when
you log in to the IOS. This mode is limited and is mostly used to view statisti
cs. You cannot change a router's configuration in this mode. By default, the gre
ater-than sign (>) indicates that you are in user mode. This is how the router p
rompt looks in user mode:
Router>" Operating Cisco IOS
In the IOS, what is privileged EXEC mode? "In privileged EXEC mode, you ca
n view and change the configuration in a router; you have access to all the rout
er's commands and the powerful debug commands.
To enter privileged mode, enter the enable command while in user mode. By defaul
t, the pound symbol (#) indicates that you are in privileged mode. This mode is
usually protected with a password. Here is an example of how to enter privileged
mode. You also see the output of the prompt:
Router>enable
Password:
Router#" Operating Cisco IOS
When you are in privileged EXEC mode, how do you return to user EXEC mode?
"You can return to user EXEC mode by using the disable IOS command. Here is an e
xample of using the disable command:
Router#disable
Router>" Operating Cisco IOS
What two types of context-sensitive help are available in the Cisco IOS?
"Word help and command syntax help.
Word help uses a question mark and identifies commands that start with a charact
er or sequence of characters. For example, the following router output shows the
use of word help for any IOS command that starts with the letters ""cl"":
Router#cl?
clear clock
Command syntax help is when you use a question mark after a command so that you
can see how to complete the command. For example:
Router#clock ?
set Set the time and date" Operating Cisco IOS
"You enter a command in EXEC mode and receive the following error:
% Ambiguous command:
What does this error mean?" """% Ambiguous command"" means that not enough c
haracters were entered for the IOS to recognize the command." Operating Cisco
IOS
"From EXEC mode, you issue the show ip command. After pressing Enter, you receiv
e the following error:
% Incomplete command
Why did you get this error?" "You received the error because you did not ente
r all the values or keywords that IOS requires for this command.
In this case, IOS does not know which ip command you want to view." Operatin
g Cisco IOS
"Upon entering a command in EXEC mode, you receive the following error:
% Invalid input detected at '^' marker
Why did you get this error?" "You received the ""% Invalid input detected at
'^' marker"" error because you entered the command incorrectly. For example, if
you entered sjow ip instead of show ip, you would receive this error." Operatin
g Cisco IOS
What are Cisco IOS global commands? Global configuration commands are comman
ds that affect the entire device. They can be executed only in global configurat
ion mode. Operating Cisco IOS
How do you enter global configuration mode? "To enter global configuration m
ode, you enter the config terminal command from privileged EXEC mode, as follows
:
Router#config terminal
Enter configuration commands, one per line. End with CTRL-Z.
Router(config)#" Operating Cisco IOS
"On a Cisco IOS device, name the enhanced editing commands that do the following
:
- Move the cursor to the beginning of the line
- Move the cursor to the end of the line
- Move the cursor forward one word
- Move the cursor forward one character
- Move the cursor back one character
- Erase a line" "The enhanced editing commands are as follows:
- Move the cursor to the beginning of the line: Ctrl-A
- Move the cursor to the end of the line: Ctrl-B
- Move the cursor forward one word: Esc-B
- Move the cursor forward one character: Ctrl-F
- Move the cursor back one character: Ctrl-B
- Erase a line: Ctrl-U" Operating Cisco IOS
What Cisco IOS command would you use to view a list of the most recently used co
mmands? "The show history command, by default, displays the last ten commands us
ed. You can also use the up-arrow key (or press Ctrl-P) to display the very last
command you entered and the down-arrow key (or press Ctrl-N) to display the pre
vious commands you entered. As you use the up- or down-arrow keys, you are scrol
ling through the history buffer. The following is an example of the show history
command:
Router#show history
en
show running-config
show history
enable
show version
show clock
show history
Router#" Operating Cisco IOS
Command history is enabled by default and records ten commands in its history bu
ffer for the current session. How do you edit the number of commands that are st
ored in the Cisco IOS device's history buffer? "To edit the number of command l
ines stored for the current session, use the terminal history [size number-of-li
nes] command in privileged EXEC mode.
For example, the following changes the history size to 20 lines:
Router#terminal history size 20" Operating Cisco IOS
How can an administrator determine whether a switch has been configured when it
is first powered up? An unconfigured switch goes into the setup dialog box.
Configuring a Cisco Switch
What are the two configuration modes in the Cisco Catalyst 2960 series switch IO
S? "The two configuration modes are global configuration and interface conf
iguration.
Global configuration configures global settings to the switch, such as IP addres
s or host name.
Interface configuration configures interface settings, such as port speed or dup
lex." Configuring a Cisco Switch
What can cause a switch to enter setup mode? "A switch enters setup mode if a
ny of the following occur:
- The switch is a new switch, with no previous configuration.
- No configuration is stored in NVRAM.
- The setup command was issued from the privileged mode prompt." Configur
ing a Cisco Switch
What IOS command is used to enter global configuration mode? To enter global
configuration mode, use the configure terminal command. Configuring a Cisco Swit
ch
What IOS command is used to enter interface configuration mode? "To enter interf
ace configuration mode, use the interface interface-id command.
To enter interface mode, you first need to be in global configuration mode. The
interface-id parameter is the type and number of the interface you want to confi
gure.
For example, if to configure Gigabit interface 1, enter the following:
switch(config)#interface g0/1
switch(config-if)#" Configuring a Cisco Switch
What IOS command would you use to issue a switch the host name of BuildingB-Swit
ch? The hostname BuildingB-Switch privileged IOS command allows you to confi
gure this switch with a host name. Configuring a Cisco Switch
As a network administrator, you have a new Catalyst 2960 switch. You want to ass
ign it the IP address of 192.168.0.10/24. What IOS commands do you need to enter
to assign the IP address to the switch? "To assign the IP address to the
switch, enter the following commands:Step 1. Enter the VLAN 1 interface. This
is a logical interface used for management.
Step 2. Assign the IP address and subnet masks.
Step 3. Enable the interface by issuing the no shutdown command.
interface vlan1
ip address 192.168.0.10 255.255.255.0
no shutdown
Follow these steps to assign the IP address to the switch:" Configuring a Ci
sco Switch
How do you configure a Catalyst 2960 switch with a default gateway? "To conf
igure the default gateway, use the ip default-gateway ip-address global configur
ation command. The following example configures the switch to use IP address 192
.168.0.1 as its default gateway:
Switch(config)#ip default-gateway 192.168.0.1" Configuring a Cisco Switch
Because a switch operates at Layer 2 of the OSI model, why do you need to config
ure a default gateway on the switch? "You need to configure a default gateway
on the switch to allow remote networks to manage the switch.
Although a switch does not see Layer 3 and above information, a default gateway
is configured on a switch to allow administrators to remotely administer and con
figure the switch." Configuring a Cisco Switch
What Cisco switch IOS command displays the system hardware, software version, na
mes of configuration files, and boot images? "The show version switch IOS com
mand displays the system hardware, software version, boot images, and configurat
ion register. The following is the output of the show version command:
Cat2960#show version
Cisco IOS Software, C2960 Software (C2960-LANBASE-M), Version 12.2(25)SEE2, RELE
ASE SOFTWARE (fc1)
Copyright (c) 1986-2006 by Cisco Systems, Inc.
Compiled Fri 28-Jul-06 04:33 by yenanh
Image text-base: 0x00003000, data-base: 0x00AA2F34
ROM: Bootstrap program is C2960 boot loader
BOOTLDR: C2960 Boot Loader (C2960-HBOOT-M) Version 12.2(25r)SEE1, RELEASE SOFTWA
RE (fc1)
Cat2960 uptime is 17 hours, 32 minutes
System returned to ROM by power-on
System image file is ""flash:c2960-lanbase-mz.122-25.SEE2/c2960-lanbase-mz.122-2
5.SEE2.bin""
cisco WS-C2960-24TT-L (PowerPC405) processor (revision B0) with 61440K/4088K byt
es of memory.
Processor board ID FOC1043Z2SG
Last reset from power-on
1 Virtual Ethernet interface
24 FastEthernet interfaces
2 Gigabit Ethernet interfaces
The password-recovery mechanism is enabled.
<text omitted>