2. Networking (20%) Flashcards

1
Q

Port 20/21

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port 22

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File Transfer Protocol (FTP)

A

is optimized to do what it says it does—transfer files

  • includes both uploading and downloading files from one host to another
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Secure Shell (SSH)

A

is a connection-oriented protocol that can be used to set up a secure Telnet session for remote logins or for remotely executing programs and transferring files

  • originally designed to be a replacement for the unsecure telnet command
  • a connection-oriented protocol, it has higher overhead than UDP and is a little slower.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port 23

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Telnet

A

Someone using this can log into another machine and “see” the remote computer in a window on their screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port 25

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMTP (Simple Mail Transfer Protocol)

A

is the protocol most commonly used to send email messages

  • the protocol used to send email from mail server to mail server as well as from a mail server to an email client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Port 53

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS (Domain Name System)

A

is to resolve hostnames to IP addresses

  • let’s say that you open your web browser and type in a Uniform Resource Locator (URL) such as https://www.wiley.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port 67/68

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP (Dynamic Host Configuration Protocol)

A

dynamically assigns IP addresses and other IP configuration information to network clients

  • is connectionless, which makes it a bit faster, but it doesn’t guarantee packet delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port 80

A

Hypertext Transfer Protocol (HTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP (Hypertext Transfer Protocol)

A

It manages the communication between a web server and client, and it lets you connect to and view all the content that you enjoy on the Internet

  • All the information transmitted is plain text, which means that it’s not secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port 110

A

Post Office Protocol 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

POP3 (Post Office Protocol 3)

A

the preferred protocol for downloading email for a long time

  • replaced in most installations by IMAP4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port 137/139

A

Network Basic Input/Output System (NetBIOS)/NetBIOS over TCP/IP (NetBT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Basic Input/Output System (NetBIOS)

A

is an application programming interface (API) that allows computers to communicate with each other over the network

  • It works at
    Layer 5 of the OSI model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port 143

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Internet Message Access Protocol (IMAP)

A

is a secure protocol designed to download email. Its current version is version 4, or IMAP4

  • works in connected and disconnected modes
  • lets you store the email on the server, as opposed to POP3, which requires you to download it
  • allows multiple clients to be simultaneously connected to the same inbox
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port 161/162

A

Simple Network Management Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Simple Network Management Protocol (SNMP)

A

gathers and manages network performance information

  • mostly used to monitor connectivity devices, many other network devices are SNMP-compatible as well
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 389

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Lightweight Directory Access Protocol (LDAP)

A

is a directory services protocol based on the X.500 standard

  • designed to access information stored in an information directory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port 443

A

Hypertext Transfer Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hypertext Transfer Protocol Secure (HTTPS)

A

To encrypt traffic between a web server and client securely

  • are secured using either Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
  • a connection-oriented protocol, it has higher overhead than UDP and is a little slower.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Port 445

A

Server Message Block (SMB)/Common Internet File System (CIFS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Server Message Block (SMB)/Common Internet File System (CIFS)

A

is a protocol originally developed by IBM but then enhanced by Microsoft, IBM, Intel, and others.

  • used to provide shared access to files, printers, and other network resources and is primarily implemented by Microsoft systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Common Internet File System (CIFS)

A

is a Microsoft-developed enhancement of the SMB protocol, which was also developed by Microsoft

  • used to share files and printers between computers, regardless of the operating system that they run
  • default file and print sharing protocol in Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Port 3389

A

Remote Desktop Protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Remote Desktop Protocol (RDP)

A

allows users to connect to remote computers and run programs on them

  • is available for Windows, Linux, macOS, iOS, and Android
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Trivial File Transfer Protocol (TFTP)

A

Transmitting configurations to
and from network devices. It can transfer files much like FTP, but it’s much simpler and faster

  • is connectionless, which makes it a bit faster, but it
    doesn’t guarantee packet delivery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Router

A

highly intelligent devices that connect multiple network types and determine the best path for sending data

  • They connect multiple networks to each other, which none of the other devices we have discussed do
  • operate at the Network layer (Layer 3) of the OSI mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Switches

A

work at Layer 2 and they provide centralized connectivity, just like hubs

  • examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Unmanaged Switch

A

it connects two or more computers, and passes along all traffic sent to a MAC address to its port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Managed switch

A

adds the ability to configure ports, manage traffic, and monitor traffic for issues

  • cost more but provide features such as quality of service (QoS), redundancy, port mirroring, and virtual LANs (VLANs)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Access Points

A

any point that allows a user on to a network

  • On a wired network, this means a hub or a switch, both of which we will cover shortly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Patch Panel

A

is essentially a large hub that is rack mounted. It houses multiple cable connections but possesses no network intelligence

  • Its sole purpose is to connect cables together
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Firewall

A

a hardware or software solution that serves as your network’s security guard

  • they protect your network resources from hackers lurking in the dark corners of the Internet
  • they can simultaneously prevent computers on your network from accessing undesirable content on the Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Power over Ethernet (PoE)

A

provides for electricity
over Ethernet cables

  • useful in situations where you need a wireless access point in a relatively remote location that does not have any power outlets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Power over Ethernet injectors

A

a device that sits
between the switch and the access point (called a midspan device) whose sole purpose is to supply power via the Ethernet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Hub

A

a device used to link several computers together

  • They simply repeat any signal that comes in on one port and copy it to the other ports (a process that is also called broadcasting)
  • They work at Layer 1 of the OSI model
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Cable Modem

A

most homes and many businesses now access the Internet through this

  • use
    television cable lines
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Digital Subscriber Line (DSL)

A

uses existing phone lines and provides fairly reliable high-speed access

  • you need a DSL modem and a network card in your computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Optical Network Terminal (ONT)

A

If there is fiber in your work or home neighborhood, you need a different type of modem to connect to the ISP for Internet access

  • It is closer to a modem in a sense though because it takes optical signals and changes them into electrical ones for your internal home or business network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Network Interface Card (NIC)

A

an expansion card that connects a computer to a network so that it can communicate with other computers on that network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Software-Defined Networking (SDN)

A

essentially setting up a network virtually, without the physical hardware connectivity devices that most people are used to

  • it’s a network without the network hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

2.GHz vs 5 GHz

A

unlicensed frequencies

  • many electronic devices from bluetooth, cordless phones, cell phones, and microwaves create interference problems
49
Q

802.11

A

standard was ratified in 1997 and defines WLANs transmitting at 1 Mbps or 2 Mbps bandwidths using the 2.4 GHz frequency spectrum

50
Q

802.11a

A

a standard provides WLAN bandwidth of up to 54 Mbps in the 5 GHz frequency spectrum

  • ratified in 1999, but devices didn’t hit the market until 2001
51
Q

802.11b

A

was ratified in 1999 as well, but device makers were much quicker to market, making this the de facto wireless networking standard for several years

  • provides for bandwidths of up to 11 Mbps in
    the 2.4 GHz range
52
Q

802.11g

A

ratified in 2003, standard provides for bandwidths of 54 Mbps in the 2.4 GHz frequency spectrum

53
Q

802.11n

A

claims to support bandwidth up to 600 Mbps, but in reality the typical throughput is about 300–450 Mbps

  • works in both the 2.4 GHz and 5 GHz ranges.
54
Q

802.11ac (Wi-Fi 5)

A
  • 5 GHz frequency
  • 6.9 Gbps Maximum throughput
55
Q

802.11ax (Wi-Fi 6)

A
  • 5 GHz/2.4 GHz frequency
  • 9.6 Gbps maximum throughput
56
Q

Unlicensed Frequencies

A
  • Wi-Fi operates on these 2.4 GHz and 5 GHz
  • Other unlicensed frequencies include 900 MHz and 1.8 GHz and are used by devices such as walkie-talkies and cordless telephones
  • they are more susceptible to interference from other signals or eavesdropping
57
Q

Licensed Frequencies

A

use of them is granted by a governmental body

  • Think of AM and FM radio, for example
  • If access is granted, then that company is the only one that can use the frequency within a certain geographical area
58
Q

Near-Field Communication
(NFC)

A

designed to facilitate information sharing and, in particular, contactless payment

  • transmits at 13.56 MHz, which is the same frequency as HF RFID
59
Q

Radio-frequency identification
(RFID)

A

a communications standard that uses radio waves to facilitate communication

  • Low frequency (LF): 125–134 kHz & 10 centimeters
  • High frequency (HF): 13.56 MHz & 30 centimeters
  • Ultra-high frequency (UHF): 856–960 MHz & 100 meters
60
Q

Fileshare or File Server

A

a central repository for users to store, manage, and access files on the network

  • Ease of access to files for collaboration
  • Centralized security management
  • Centralized backups
61
Q

Print Server

A

makes printers available to clients over the network and accepts print requests from those clients

  • can be a physical server like a
    Windows- or Linux-based server, a small stand-alone device attached to a printer, or even a server built into the printer itself
62
Q

Mail Server

A

the computer must be running a specialized email server package

  • popular ones are Microsoft Exchange, Sendmail, Postfix, and Exim, although there are dozens of others on the market
63
Q

Syslog

A

works as a client-server model, where the clients generate messages based on the triggering of certain conditions, such as a login event or an error with a device, and send them to a centralized logging server

  • uses UDP port 514 by default
64
Q

Web Server

A

Whenever you visit a web page, you are making a connection from your device (the client) to this

65
Q

Authentication, Authorization, and Accounting (AAA)

A

The ultimate goal of a security system is to protect resources by keeping the bad people out and letting the good people in

  • servers are gatekeepers and critical components to network security, and they can be implemented on a dedicated server machine, wireless router or access point, Ethernet switch, or a remote access server
66
Q

Spam Gateways

A

a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user’s inbox

  • by other names as well, such as antispam gateways, spam
    blockers, and email gateways
67
Q

Unified Threat Management (UTM)

A

to centralize security management, allowing administrators to manage all their security-related hardware and software through a single device or interface

  • implemented as a stand-alone device (or series of devices) on a network, and it will replace the traditional firewall
68
Q

Load Balancing

A

Each server helps balance out the work
for the website

  • When a user visits the website, the load balancer sends the request to one of many real web servers to fulfill the request
69
Q

Proxy Server

A

makes requests for resources on behalf of a client

  • Keep in mind that if all of the traffic from a network must pass through a proxy server to get to the Internet, that can really slow down the response time
70
Q

Legacy/Embedded Systems

A

usually defined as those using old technology in one or more of the following areas:

■ Hardware
■ Software (applications or operating system)
■ Network protocols

71
Q

Supervisory control and data
acquisition (SCADA)

A

is a category of software applications for controlling industrial processes, which is the gathering of data in real time from remote locations in order to control equipment and condition

  • are extremely old
    and were designed to be open access, so they are huge security holes
72
Q

Internet of Things Devices

A

a central controller or coordinating device, like a computer switch but dedicated specifically to IoT devices

73
Q

IPv4

A

a 32-bit hierarchical address that identifies a host on the network

  • allows for nearly 4.3 billion addresses
  • only about 250 million of those addresses are actually usable
74
Q

Private addresses

A

are not routable on the Internet

  • weren’t intended for use on the Internet freed us from the requirement that all addresses be globally unique
75
Q

Public Addresses

A

All the addresses that are used on the Internet

76
Q

IPv6

A

uses a 32-bit
addressing scheme that provides for more than 4 billion unique addresses

  • 3.4 × 10^38 addresses
  • uses three types of addresses: unicast, anycast, and multicast
77
Q

Automatic Private IP Addressing (APIPA)

A

a TCP/IP standard used to automatically configure IP-based hosts that are unable to reach a DHCP server.

  • are in the
    169.254.0.0–169.254.255.255 range, with a subnet mask of 255.255.0.0
78
Q

Static IP

A

should only be used under certain circumstances for client computers, since it is not very scalable and a nightmare to keep track of manually

  • only be used on internal network resources such as routers, network printers, and servers
79
Q

Dynamic IP

A

is the standard in small-to-large networks when configuring client computers

80
Q

Gateway

A

is the address to the router to take a client to the next network (or Internet

  • can be configured with a static assignment or dynamically through a DHCP server.
81
Q

A (DNS)

A

IPv4 host record

82
Q

AAAA (DNS)

A

Called “quad A,” it’s the host record for IPv6 hosts.

83
Q

MX (DNS)

A

Mail Exchange. It’s the name or address of the email server

84
Q

TXT (DNS)

A

Text record. Used to enter human-readable or machine-readable data. Today, text records are used primarily for email spam prevention and domain ownership verification

85
Q

Domain
Keys Identified Mail (DKIM)

A

a bit more involved, as it authenticates using encryption through a public-private key pair

86
Q

Sender Policy Framework (SPF)

A

is the simplest of the three. It authenticates an email server based on its IP address

87
Q

Domain-based Message Authentication, Reporting,
and Conformance (DMARC)

A

builds on both SPF and DKIM and essentially combines them together into one framework

  • it allows a domain owner to decide how they want email from their domain to be handled if it fails either an SPF
    or a DKIM authentication
88
Q

Virtual LAN (VLAN)

A

computers attached to the same physical switch can be segmented into multiple logical networks

  • can still communicate with those on another virtual LAN, if the switch is configured properly
  • also be completely isolated from each other, adding an
    additional level of security
89
Q

Virtual Private Networks (VPN)

A

a secure (private) network connection that occurs through a public network

90
Q

Satellite

A

Great for rural areas without cabled broadband methods. More expensive than DSL or cable

  • downloads often maxing out at around 125 Mbps and uploads around 3 Mbps
  • delay occurs because of the length of time required to transmit the data and receive a response
91
Q

Cellular

A

Great range; supported by cell phone providers. Best for a very limited number of devices

  • Up to 100 Mbps with 5G LTE
92
Q

Fiber

A

Incredibly fast and expensive

  • Up to 1 Gbps
93
Q

Cable

A

Inexpensive broadband Internet access method with wide availability, using cable television lines.

  • Up to 100 Mbps
94
Q

DSL

A

Inexpensive broadband Internet access method with wide availability, using telephone lines

  • Up to 50 Mbps
95
Q

Wireless Internet service provider (WISP)

A

Fast connection for rural areas without cabled broadband methods

  • 6 Mbps to 50 Mbps
96
Q

Local area network (LAN)

A

created to connect computers in a single office or building

  • backend to process and store information
  • user’s computer is the frontend, where data entry and minor processing functions are performed
97
Q

Wide area network (WAN)

A

networks expanding to cover large geographical areas and were supporting thousands of users

  • span buildings, states, countries, and even continental boundaries
  • , only larger corporations used WANs, but many smaller companies with remote locations now use them as well
98
Q

Personal Area Networks (PANs)

A

is a network that connects devices, such as mice, keyboards, printers, smartphones, and tablets within the range of an individual person

  • most commonly used in reference to Bluetooth networks
99
Q

Metropolitan Area Networks (MANs)

A

a network that spans a city or a large campus

  • networks that are larger than a LAN but confined to a relatively small geographical area
100
Q

Storage Area Networks (SANs)

A

designed to do exactly what it says, which is to store information

  • This network won’t have client computers or other types of servers on it. It’s for storage only
101
Q

Wireless Local Area Networks (WLANs)

A

simply a LAN, but one in which clients connect wirelessly rather than through network cables

  • Wireless clients on a network typically access the network through a wireless access point (WAP)
102
Q

Crimpers

A

a tool used to attach a terminator or connector to the end of a cable

  • used for RJ-45 and RJ-11
103
Q

Cable Stripper

A

a tool used to remove the plastic jacket from a cable, exposing the wires

104
Q

Wi-Fi analyzer

A

software that could be used to scan the area for 802.11 signals, the SSIDs, wireless frequency and the wireless transmission channels

105
Q

Toner Probe

A

a two-part kit that is used to trace cables in walls, floors and ceilings `

106
Q

Punch-down tools

A

a tool used to punchdown or fasten individual wires from a network cable to a patch panel

  • 66 blocks or 110 blocks are types of patch panels
107
Q

Cable Testers

A

a tool used to test a cable to find out if it is good or to find out what type of cable it is if the cable is not labeled

108
Q

Loopback plug

A

a device to test the functionality of a RJ-45 port

109
Q

Network tap (test access port)

A

is a hardware device that creates a copy of network traffic for use by monitoring devices without disrupting normal traffic

110
Q

Ethernet over Power

A

a technology in which two adapters are usually plugged in to wall outlets in order to extend the range of a wired/wireless connection

111
Q

Bandwidth

A

the maximum amount of data transmitted over an internet connection in a given amount of time

112
Q

Latency

A

the amount of time it takes for data to travel from point A to point B

113
Q

Authentication

A

verifies credentials when a person or another server needs to prove who they are to access a resource

114
Q

Authorization

A

users are allowed to perform only specific task on specific objects based on what they are authorized to do

115
Q

Accounting

A

the principle of accounting seeks to keep a record of who accessed what and when, and the actions they performed

116
Q

multimeter

A

a tool used to measure voltage, current, and resistance of a device

117
Q

Cell tower analyzer

A

software that could be used to scan the area for surrounding cellular towers of certain providers. This could be used to troubleshoot cellular network connectivity issues

  • both of these could be downloaded onto your mobile device
118
Q

PoE standards

A

There have been a number of standards created for providing power over a data cable.
These standards differ in several ways.:
- Minimum power per port provided to the device
- Maximum power per port provided by the power-sourcing
device
- Required cable category
- Power over pairs
- Released date