2.0 Networking Flashcards

1
Q

2.1

Transmission Control Protocol (TCP)

  • What happens during a TCP session?
  • What happens if packets are dropped?
A

A connection-oriented protocol that ensures(verifies) reliable delivery of data to the destination computer.

  • every packet in a transmission is checked to be sure that it is delivered
  • the receiving computer requests that they be resent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.1

UDP(User Datagram Protocol)

(hint: unprotected)
- What happens to packets that are dropped?

A

connectionless-protocol in which packets are not checked for accuracy of delivery

-The packets are not resent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2.1

Protocol

A

A set of rules used to enable communication between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2.1

FTP(File Transfer Protocol)

(Drinking age) and -1

-What port does it use?

A

Protocol that transfers data between computers to servers on a network

Ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2.1

SSH(Secure Shell)

-What port(look at first 2 letters)

A

protocol for a remote terminal that works securely over the internet

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

2.1

Telnet

-What port?

A

A protocol that enables a user to make a text-based connection to a remote computer or networking device

-Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2.1

SMTP(Simple Mail Transfer Protocol)

(Samta)

-What port?

A

Used by your computer or other devices to send email

-Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2.1

HTTP(Hypertext Transfer Protocol)

-What port?

A

application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems

-Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

2.1

HTTPS(Hypertext Transfer Protocol Secure)

(1 less than 444)

-What port?

A

network protocol that is often used for payment transactions on the Web and for sensitive transactions in corporate information systems.

Port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2.1

IMAP4(Internet Message Access Protocol)

-What port?(think I and 4)

A

Used to retrieve email messages

Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2.1

NetBIOS(NetBT)

A

a protocol that allows some legacy applications to work on larger networks and the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2.1

SLP(Service Location Protocol) (think LAN)

  • Port (stoned + lucky)
  • Ex:

(listens on networks broadcasting SSIDs)

A
  • service discovery protocol that allows computers and other devices to find services in a LAN without prior configuration
  • Runs on port 427

Ex: displays printers on a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2.1

AFP(Apple Filing Protocol )

-What port?

A
  • file management protocol that allows us to copy or move files, delete and make changes to the file system(Apple)
  • Port 548
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2.1

SMB(Server Message Block)

  • Ex of this?(printing)
  • What’s a port it shared with CIFS?
A
  • Windows file sharing protocol that allows your devices to communicate with remote computers or servers.
  • Allows you to print from your laptop to an office printer
  • Port 445
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2.1

CIFS(Common Internet File System)

-What’s a port it shared with SMB?

A

(Windows) Legacy protocol that allows for file sharing, printer sharing

-Port 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.1

RDP(Remote Desktop Protocol)(Windows)

(1/3 + Berlin fall)

-What port?

A

allows you to view and control someone else’s desktop while you’re sitting at your own desk by using the network

-RDP uses port 3389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

2.1

Dynamic Host Configuration Protocol

-What ports does it run on?

A

It automatically assigns an IP address to all devices on the network, dynamic addressing.

-UDP 67 and 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

2.1

SNMP(Simple Network Management Protocol)

-What ports are they used for?

A

management protocol used between devices to gather details, metrics, about how multiple devices are performing

-UDP 161 to query devices and 162 to receive alarms/traps from devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

2.1

LDAP(Lightweight Directory Access Protocol)

-Default port?

A

database of everybody who’s in your organization, and it makes it very easy to manage things from a central location

Ex: Active Directory

-TCP 389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2.3

port forwarding(tunneling)

(Destination NAT)?

-Ex:

A

Forwards visitors to a specific ip address and port within a LAN

  • It changes the destination IP address for inbound traffic.
  • IF any device accesses my external IP address over ports 8088,it will translate those ports to port 80 on the inside and send that traffic to 10.1.10.221.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2.3

port triggering

A

opens an outgoing port or range of ports on demand by a particular service, such as Internet Relay Chat (IRC).

-Port triggering can be used without being tied to a specific IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

2.1

Port

A

A number or range of numbers assigned to a particular connection session or connection type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

2.3

WEP(Wired Equivalent Privacy)

(used with older routers)

A

legacy encryption protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

2.3

WPA(WiFi Protected Access)

A

wireless security standard that uses TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

2.3

TKIP(Temporal Key Integrity Protocol)

A

an encryption protocol used in the IEEE 802.11 wireless networking standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

2.3

WPA2(WiFi Protected Access version 2)

-How good?

A

Uses AES for encyption

-Best encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

2.3

Advanced Encryption Standard (AES)

-You want to configure your wireless network to use __ encryption

A

A protocol that is similar to TKIP but more secure and that is used with the WPA2 wireless encryption standard.

-It uses a block size of 128 bits with variable key lengths up to 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

2.1

DNS(Domain Name System)

  • What kind of addresses are usually assigned?
  • What port?(2 quarters + dns initials)
A

It maps domain names to IP addresses

ex: 192.34.22.4 - bob.com
- Static
- UDP Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

2.6

domain name

A

A unique alphanumeric identifier for a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

2.2

Router

-How does it determine where to forward it’s traffic

A

A networking device that routes internet packets(data) between LANs and WANs

-forwards traffic based on destination IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

2.3

Firewall

  • How do they filter traffic
  • Common use for firewalls
A

A hardware appliance or software application that protects a computer from unwanted intrusion.

  • Check UDP and TCP ports, and programs
  • They are used as a routing device
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

2.2

patch panel

A

A box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

2.6

NAT(Network address translation)

-Example of this when you want to access a website, and send your traffic to your router

A

translates(changes) one IP address to another.

-Your router takes the source IP(your pc) and translates it to an external address on public internet and sends it to that web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

2.6

DNAT(Destination network address translation)

A

provides port forwarding for incoming traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

2.3

DMZ(Demilitarized zone)

-Purpose?

A

allows people to access a device that would not allow them access to the internal network, and access these resources from the internet

-to add an additional layer of security to an organization’s local area network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

2.3

UPnP(Universal Plug and Play)

-How is this commonly used with SOHO routers?

(zero configuration)

A

allows network devices to automatically configure and find other network devices.

-other devices on your network can automatically configure your SOHO router and make changes to the configuration at any time.Ho

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

2.4

RFID(Radio-frequency identification)

-Example

A

small tags that we can put in anything that we’d like to track

-scan office badge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

2.7

Fiber optic

-What kind of fiber?

A

network cable that uses glass fibers to transmit photons to carry data over long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

2.8

cable stripper

A

A tool used to strip a portion of the plastic jacket off of a cable to expose the individual wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

2.8

Cable Crimper

A

device that pinches the modular connector onto the end of the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

2.8

punchdown tool

A

creates the termination inside a patch panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

2.8

Multimeter

-Great for performing continuity tests

A

A tool that can be used to test both coaxial and TP cabling and AC/DC voltage.

-Checking for an open or closed circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

2.8

tone generator

  • tone generator?
  • Connections?
A

This allows you to follow or track where a wire is going from one end to the other by simply following a tone.

  • plug it into the wire and it places an analog sound onto that wire.
  • Can connect to many connections, like RJ11 or RJ45
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

2.8

cable tester

A

A tool that tests each wire in a cable and makes sure each one is wired properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

2.8

loopback plug

-It’s also good for fooling ___

A

used to send traffic going out of a particular interface, loop them around, and send them back into that same interface

-different applications that are expecting to have an ethernet connection available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

2.8

WPS(WiFi Protected Setup)

A

network security protocol for new users to set up their wifi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

2.4

  1. 11a
    - What frequency range?
    - Megabits a second?
A
  • 5ghz range
  • 54 megabits a second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

2.4

  1. 11b
    - What frequency range?
    - Megabits a second?
A
  • 2.4 gigahertz range
  • 11 megabits a second.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

2.4

  1. 11g
    - What frequency range?
    - Megabits a second?
A
  • 2.4 gigahertz range
  • 54 megabits a second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

2.4

  1. 11ac(MIMO)
    - What frequency range?
    - Megabits a second?
A
  • 5 ghz
  • 7 gigabits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

2.4

  1. 11n(MIMO)
    - What frequency range?
    - Megabits a second?
A
  • 5 and 2.4 ghz
  • 600 megabits a second
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

2.7

line-of-sight wireless

  • Where?
  • Common LOS service(WiMAX)
A

wireless internet service that’s able to provide access over a very wide geographical area

  • Used in MAN networks
  • wireless high-speed internet connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

2.7

LAN( Local area network)

-How are devices connected to each other on a LAN

A

small network usually confined to a single building, although it could encompass more than just one building.

-Connected to each other by switches or hubs and use a router to reach other networks on a WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

2.7

WAN( Wide area network)

-What onnections get sent to where?

Ex:

A

covers a large area and consists of many smaller networks usually connected to each other by public communication lines.

-A satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

2.7

PAN(Personal area network)

Ex:

A

a small network a single user might connect for his own personal use, such as a PCmice, keyobards, and printers

-Bluetooth, NFC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

2.7

MAN(Metropolitan Area Network)

  • Who is it managed by?
  • How is it usually connected(wiring)
A

is between a LAN and a WAN in size and complexity, and it might encompass an entire city.

  • managed by one central network provider that’s in your area
  • Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

2.7

DSL(Digital Subscriber Line)

  • What kind of bandwidth?
  • Max range
A

carries voice and internet data over phone lines

  • dedicated bandwidth
  • 10,000 feet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

2.7

Asymmetric Digital Subscriber Line (ADSL)

-How is it provided and used by who?

A

a form of DSL that enables faster downloads than uploads.

-Can be provided over high-quality existing phone lines and is well suited for residential and small business use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

2.7

Symmetric Digital Subscriber Line(SDSL)

-For who?

A

a type of DSL connection in which upload and download speeds are the same.

-SDSL connections are marketed to business rather than to home users and almost always require a newly installed circuit to the location and professional installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

2.5

legacy system

A

An outdated operating system, programming language, application, or hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

2.5

embedded systems

A

Dedicated computing devices used for specific tasks such as machine control, point-of-sale systems, or ATMs. Embedded systems are often legacy systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

2.6

subnet mask

A

An IPv4 network addressing feature used to specify how much of an IP address is the host address and what part is the extended network address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

2.6

VLAN(Virtual local area network)

A

VLANs allow us to take the hardware interfaces on a switch and separate them out into logical groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

2.8

WiFi analyzer

A

A device or an app that detects which SSIDS are using which channels

-Monitors traffic and frequency on networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

2.3

NIC(network interface controller )

A

piece of hardware on a computer (or other device) for connecting to Ethernet network or multiple networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

2.2

Repeater

A

A device that resends a network signal to enable it to extend over longer cable or wireless distance than normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

2.2

(ethernet) Hub

(dumb version of a switch)

A

information sent from one interface on this hub is automatically repeated to every other interface on this hub.

-It must split its available bandwidth among all the connected computers, which slows its communication speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

2,2 hub half-duplex

A

two devices can’t communicate at the same time on a hub. Once one device is done, another device can then begin sending information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

2.2

(network )Switch

-MAC address(relation)

A

A network device that forwards and filters a path for data to run from one system to another

-it looks at the destination MAC address, and it sends that info to the appropriate interface on that switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

2.2 Managed switch

A

allow you to configure different VLANs on different interfaces

-You might also be able to connect switches together in a trunk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
  1. 2
    (network) Bridge
    - _____ by software
    - Example of a bridge?
A

Similar to a switch, but connects less network subnets

  • forwards decisions made by software
  • WAP(Wireless Access Point)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

2.2

Modem

  • Demodulates _ into _
  • Modulates _ into _
A

Demodulates(extracts) incoming analog signals into digital signals

Modulates(converts) outgoing digital signals into analog signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

2.2

Router

A

a network device that connects LAN to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

2.2

cable modem

  • What kidn of networks do they appear on?
  • What kind of bandwidth?
A

allow you to connect to a broadband network

  • home and corporate networks
  • Shared bandwidth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

2.2

DSL modem(Digital Subscriber Line modem)

-

A DSL modem connects to your computer through which of the following ports?

A

-A DSL modem connects to a computer via an RJ-45 (Ethernet) connector and port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

2.2

wireless access point (WAP)(bridge)

-What does it use to identify computers on a network?

A

a networking device that allow Wi-Fi devices to connect to a LAN/WAN

-MAC addresses of the destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

2.3

SOHO router (Small office/home office)

  • What other services can it provide?
  • What kind of server is it?
A

network device that supports functions of a data center but scaled down

  • extensive network configuration options that include a DHCP, firewall, and wired/wireless security settings
  • DHCP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

2.2

cloud-based controller

A

A virtual device that administrators can use to manage wireless LAN networks and branch offices that are located anywhere on the Internet from a central location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

2.7

Satellite

A

An Internet provider option that uses dish antennas similar to satellite TV antennas to receive and transmit signals between geosynchronous satellites and computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

2.2

PoE( Power over Ethernet)

-Example of a device that a PoE can charge

A

allows us to power devices using our ethernet cables

-WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

2.5

print server

A

software/hardware that act as a middleman between you and that printing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

2.5

DHCP server

A

a server that automatically assigns(leases) an IP and subnet mask, default gateway and DNS server and is usually incorporated into a SOHO wireless router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

2.5

syslog server

A

A server that tracks events, such as user logins and crashes, that happen on devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

2.5

UTM(Unified threat management)

(web security gateway.

  • capabities as a URL filter
  • Network connectivity
A
  • It might provide some type of content inspection from your users. It can look for malware going across your network, and it could stop spam from coming into your network.
  • So it may have a wide area network CSU/DSU associated with it. And of course, it may have routing and switching technology as well. This could act as your firewall. It may include an IPS as part of its technology, and it might even be able to do bandwidth shaping and quality of service all from one single device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

2.5

IDS(Intrusion Detection System)

or

IPS(Intrusion Prevention System)

A

designed to look at traffic going through your network identify any known attacks that may be inside of that traffic and block or mitigate those attacks in some way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

2.3

QoS(Quality of Service) configurations

(routers(

A

set priorities based on the type of application, the port numbers in use, IP addresses, and other settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

2.5

endpoint management server

  • What capabilties does it have for updating?
  • What does it requiew you to install?
A

A server that tracks devices using the network and ensures that they comply with the security parameters of the network.

  • Update an entire operating system
  • An agent on everyones workstation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

2.5

file server

A

Typically a computer with a single large drive or a RAID array for shared storage on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

NAS(Network attached storage)

A

a special kind of file server designed to store large amounts of data in a central location for users on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

2.8

Identify the tool in the following diagram and describe its use.

A

Wire stripper for removing the outer jacket from a cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

2.1

Post Office Protocol

-What is it’s default port?

(look at the 0)

A

application-layer Internet standard protocol used by e-mail clients to retrieve e-mail from a mail server.

-Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

command to assign a new IP address to the computer?(Windows)

A

ipconfig/renew

-ipconfig/release

93
Q

2.4

When configuring a channel for your 2.4GHz wireless home network, you decide to choose channel 11. For which of the following reasons did you make this selection?

A

Channel 11 does not overlap with other channels.

94
Q

ipconfig

A

command to see the IPv4 and IPv6 addresses on a Windows-based computer

95
Q

APIPA(private IPv4 link-local address)

Address ranges from 169. 254.0.1 through 169.254.255.254

A

automatic address for pc that allows communication on your local subnet

96
Q

You want to use the highest possible level of encryption on your wireless network. Which of the following protocols should you configure on your router?

A

WPA-AES

97
Q

2.7

Most cable Internet service providers build their long distance WAN networks using which of the following? (Choose two.)

A

Fiber optic cables

-Coaxial cables

98
Q

What situation would require only a modem?

A

Having only one device

99
Q

Hub vs switch

-Both are within

A

Switches can learn MAC addresses and filter them, unlike a hub which broadcasts to every port

-LAN

100
Q

nslookup

A
101
Q

IPv4

-What range is each byte(section)

A

32 bit address written as 4 numbers(octets) seperated by periods

-Between 0 and 255

102
Q

IPv6

Hexadecimal

(think nibble)

  • Split into how many sections(bytes) :
  • What do we do with leading zeros and consecutive zeros

Ex: fe80:0000:0000:0000:5d18:0652:cffd:8f52

A

128 bit addresses

  • 2 byte sections, made of 16 bits
  • Chop them off, and double colon :
103
Q

2.1

UDP vs TCP

  • What does TCP do?
  • What does UDP do?
A

-TCP/IP helps determine how a specific computer should connect to the internet, how you can transmit data between them + create a virtual network

-UDP is used for broadcast and multicast type of network transmission.

104
Q

2.1

What kind of address is leased?

DHCP or AIPA address?

A

DHCP lease, because DCHP uses IP addresses multiple times for different computers

105
Q

2.6

IP address

A

A numeric address that identifies a device on a network, and allows it to communicate with other devices

106
Q

2.6

Default gateway

A

Your router’s internal ip address

107
Q

2.1

POP3 Secure port

and IMAP Secure port

A
  • Port 995
  • Port 993
108
Q

2.1

SMTP Secure

A

Port 465, 587

109
Q

2.2

switch table

A

MAC address list for switch

110
Q

2.2

Wireless LAN controller

A

allows for a central management console to be able to support 100s-1000s of WAPs

111
Q

2.8

network topology

A

how a network is arranged, including the physical or logical description of how links and nodes are set up to relate to each other.

112
Q

2.8

LAN topology

A

Star topology

113
Q

SSID(Service Set Identifier)

A

a group of wireless network devices which share a service set identifier

114
Q

subnetting

A
115
Q

IOT(internet of things) devices

  • Ex:
  • How do they connect?
A

devices embedded with technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.

-Thermostat, light switches, door lock

116
Q

2.8

Cable modem topology

A

bus topology

117
Q

2.7

ISDN(Integrated Services Digital Network)

A

set of communication standards for simultaneous digital transmission of data, voice + video over the circuits of the public switched telephone network.

118
Q

2.7

PRI(Product Release Instructions ISDN)

-Which connections are they delivered over?

A

can be used as a reference during a mobile device update process

-T1 or E1 connection

119
Q

2.7

BRI( ISDN Basic Rate Interface)

(2B+D)

-2 bearer channels(how many bits each?)

A

configuration intended primarily for use in subscriber lines, and can use telephoen lines

-64 kilobits each

120
Q

2.6

PRL(Preferred Roaming List)

A

database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection with the right cell phone tower

121
Q

2.6

IMEI(International Mobile Station Equipment Identity.)

A

a unique identifier that allows the mobile provider to identify your specific physical mobile device

122
Q

2.6

IMSI(International Mobile Subscriber Identity)

A

A unique number used to identify a mobile network phone user

123
Q

2.6

VPN

A
124
Q

2.7 Examples of mobile device synchronization methods for Apple iOS devices

A

iTunes , iCloud

125
Q

2.7

Which of the following are examples of universal connection types that enable mobile device synchronization?

IEEE 802.11

USB-C

Cellular

Bluetooth

IEEE 802.3

A

All of them

126
Q

Which of the following are Apple-proprietary connector types that can be used for iOS mobile device synchronization?

A

Apple dock conenctor(30 pin) and lightning USB(8 pin)

127
Q

2.7 Android device synchronization

A

USB Micro-B

128
Q

2.1

Telnet features

A

Provides username & password authentication

  • Transmits data in an unencrypted form
129
Q
  1. 1 TCP/IP
    - What physical connection uses it?
A

Popular protocols that are used by the internet and other networks

-Ethernet

130
Q

2.1

FTP ports

What’s port 21 for?

-Port 20 for?

A

Control port, used to allow data through

-Send data between client and server

-

131
Q

2

PLC(Power Line Communication)

A

A type of technology that enables sending data over wiring used for transmission of electrical power

132
Q

2.1 encapsulation of protocols

A
133
Q

2.1 What two protcols can IP contain?

A

TCP or UDP

134
Q

2.1 multiplexing

A

put multiple applications inside of different (ethernet)frames and send them all across the network at one time

135
Q

2.1 encapsulation(full)

A

Ethernet, inside has IP, inside has TCP/UDP

136
Q

2.1 What are temporary ports, used only for a session?

A

Ephemeral ports

137
Q
  1. 1 What two kinds of ports numbers must a client choose to communicate with a web server?
    - port for the ___
    - port for the ___
A
  • probably using a non-ephemeral port number,
  • TCP 80 port
138
Q

2.1 FTP ports used for?

A

TCP port 20 is the active mode data port, and TCP port 21 which controls the communication.

139
Q

2.1 TCP security features

A

you can configure a username and a password that gains access to another system.

140
Q

2.1 Additional FTP features

-

-full featured functionality

A

anonymous log in

-list,add files, delete, rename files on the system

141
Q
  1. 1 NetBIOS ports
    - What ports?

(Compatible with WINS server)

-TCP port?

A
  • UDP 137,name services 138, datagram service
  • TCP 139, session service
142
Q
  1. 1 DHCP leases + reservations
    - Leases
    - Reservation
A
  • Lease is a specific time an IP adresss is “rented”
  • when a workstation/server requests an IP address, the server can recognize the MAC address of that device and provide the same IP address to that device

-

143
Q
  1. Current version of SNMP
A

version 3, which has provides message integrity and authentication method. And all of the information that’s sent between the client and the remote device is all encrypted.

144
Q

2.2 Application-Specific Integrated Circuit,(ASIC)

A

switch hardware responsbile for scaling up hundreds of interfaces on a switch

145
Q

2.2 multi-layer switches

A

both switching functionality and routing functionality within the same device

146
Q

2.2 un-managed switch

A

network switch with little setup

147
Q

2.2 Manage redunadacy in a managed switch

A

use Spanning Tree Protocol.

148
Q
  1. 2 port mirrors
    - What does this allow you to do?
A

traffic can be mirrored from one port to another.

-Connect a network analyzer to one of the ports on the switch and copy traffic from any other port on that switch to watch the traffic

149
Q
  1. 2 wireless router
    - What other functionality does it have?
A

router switch

150
Q

2.3 encrypted tunnels(firewall)

A

So if you’re off site, you still need connectivity to the corporate network.

151
Q
  1. 3 What to do if you want to surf a website(firewall)
    - What would the proxy firewall do?
A

you would send that request to the firewall.

-then it wou;d make the request for you, receive the response, check the response, and make sure it’s appropriate for you to view and then send that traffic to you.

152
Q

2.3 proxy firewalls

A

older firewalls that are in the middle of an intranet

153
Q
  1. 2 DOCSIS(Data Over Cable Service Interface Specification)
    - What standard is it?
    - Speeds
A
  • high speed networking for sending data on cable networks
  • 4 to 250 megabits
154
Q
  1. 7 DSL speeds
    - upstream
    - downstream
A
  • 16 megabits per second sending traffic upstream
  • 52 megabits per second downstream
155
Q
  1. 2 patch panel
    - create a simple patch between our patch panel and our networking equipment
A

terminates ethernet cables into a 110 blocl

  • extending some ethernet patch cables inside of our closet.
156
Q

2.2 on a different VLAN or a different network(patch panel)

If someone then moves from one desk to another or we need to plug that person into a different type of network connection

A

we can connect those users to a different switch or a different set of interfaces on the same switch.

-simply disconnect the rj-45 cable inside of our closet and plug it into the new connection.

157
Q
  1. 2 Ethernet over Power(EoP)
    - speed
A

we are extending our ethernet network using the power cables that we already have in our home.

-500 megabits a second

158
Q

2.2 Ethernet Over Power

(Can be called PLC)

  • What IEEE standard
  • What’s it designed to connect?
  • Ex: electric car
A
  • IEEE standard 1901
  • connect devices that normally wouldn’t be connected to our ethernet
  • if we had an electric car that we recharged overnight, when we plugged it into the power source, it would also be connected to our ethernet network.
159
Q
  1. 3 SOHO router features
    - what frequencies can it use
    - configure the SSID
    - Choose security mode(with what encryption)
A
  • 2.4 or 5ghz
  • name of the wireless network
  • which is how the data will be protected as it goes through the air, with WPA2 encryption
160
Q
  1. 3 Many wireless routers have this feature(shared __)
    - What’s alternative to this?
A

allow you to set a shared key that everyone will use,

-can configure an enterprise configuration where every user will put in their own user name and password to gain access to the wireless network.

161
Q
  1. 3 SOHO router(IP)
    - What networks need to have Ip addresses assigned to them?
    - What do some service prociders require before a router is used on a network?
A
  • LAN and WAN
  • Provide authentication for the router’s configuration
162
Q
  1. 3 What does a wired Ethernet device plugged into a SOHO router auto-configure
    - What duplex setting can be configured?
A
  • auto-negotiate its speed and duplex
  • half or full duplex
163
Q

2.3 What do you need to enable/disable when connectng a device over a wireless network?

A

-wireless adapter

164
Q
  1. 3 DHCP settings(automatic)
    - What do they configure automatically
A

-IP address, subnet mask router, and DNS information

165
Q
  1. 3 SOHO router(DMZ)
    - What setting can you configure(IP)
A

-adds the IP address of the device that would have access from the internet.

166
Q
  1. 3 Source Network Address Translation(SOHO)
    - definition?
A
  • Always on feature in SOHO routers
  • translates all of your internal(private) IP addresses to appear as a single external IP address on the internet.
167
Q

2.3 port forwarding table(SOHO router)

A

The router then changes the destination IP address,where the inbound traffic is then directed

168
Q
  1. 3 PnP advantage
    - (and security concern)

(SOHO router)

A

ports are only open when you’re using that particular application.

-you can’t control when the prots are open

169
Q

2.3 MAC Address(Media Access Control)

A
170
Q
  1. 3 router filtering(what does it use to filter devices)
    - However, these ___ can be viewed by a packet analyzer
    - They are also easily __
A
  • MAC addresses
  • MAC addresses
  • spoofed(changed)
171
Q

2.4 What frequencies(802.11) use 20 megahertz channel bandwidth

A

802.11a, 802.11b, and 802.11g

172
Q
  1. 4
  2. 11n bandwidth choices
A

20 mHz, or a 40 mHz bandwidth

173
Q

2.4 802.11ac bandwidth options

A

80 megahertz bandwidths by default, and can use 160 megahertz .

174
Q

2.4

If running 802.11n stations on a 802.11ac network, how much bandwidth?

A

40 megahertz bandwidth

175
Q

2.4

What channels are available for 2.4 mghz freqencies

A

channels 1, channel 6, and channel 11

176
Q

2.4 Wireless technology that uses tethering and file sharing between devices

A

Bluetooth

177
Q
A
178
Q
  1. 4 NFC(Near Field Communication)
    - Relation with RFID?
A

allows us to use our phones as identification devices so we’re able to pay for systems with a credit card or an online wallet.

-Advanced form

179
Q
  1. 4 Zigbee(PAN)
    - Advantages over Bluetooth
A

wireless meshed network

-It uses less energy and less power than Wi-Fi and can go longer distances

180
Q
  1. 4 Z-Wave(PAN)
    - Examples of use?
    - What band and frequencie(s)
A

wireless meshed network

  • lights, your garage door, and other home automation
  • ISM band and 900mhz frequency
181
Q
  1. 4 What 2 standards does 2G use
    - What were they built with in mind?
A

GSM(global system for mobile communications) and

CDMA(Code Division Multiple Access)

-Voice communication

182
Q
  1. 4 3G(1998)
    - What could we also run
A

-increased data, GPS technolgy, and video

183
Q
A
184
Q
  1. 4 LTE(Long Term Evolution) (4G)
    - What technology is it based on?
    - What dowload speeds
A
  • GSM and EDGE
  • 150 megabits a second
185
Q
  1. 4 LTE advance
    - What download speeds?
A

-300 megabits a seond

186
Q
  1. 5 What kind of pages are stored on the web server?
    - What protocols does it use?
A

static, previously created

dynamic, when client requests them

-HTML, HTML5

187
Q

2.5 IPP(Internet Printing Protocol)

(Line Printer Daemon, LPD)

A
188
Q

2.5 Enterprise DHCP server

A

Multiple ones that handle DSP configuration for devices

189
Q
  1. 5 DNS servers
    - Where are they run at home?
    - In enterprise?
A
  • ISP(Internet service Provider)
  • In the data center
190
Q

2.5 proxy server

A

an intermediate server that sits between you and some other third party resource

191
Q
  1. 5 proxy server steps
    - (steps)
    - What security functions does it perform?
A
  • you access a server> proxy makes your request > proxy receives the response >proxy checks the info> sends info to your work station
  • access control, malware scanning, and content filtering on the proxy server.
192
Q
  1. 5 mail server
    - What is it managed by?
A

where we would store any incoming mail and be able to send any outgoing mail.

-internet service provider(ISP) or your mail provider,

193
Q
  1. 5 authentication server
    - What kind of organization is it used in?
A

centralized repository of all of the authentication credentials for your organization.

-Enterprise

194
Q

2.5 SIEM (security information and event management device)

A

It allows you to consolidate logs from all of these different services into one single database. This is commonly used by the security team to look for real time alerts and be able to look at trends over time, but it’s also consolidating logs from many different devices– your routers, your switches, your file servers, your DCP servers, and more. And you can usually perform some advanced reporting with all of this data that you’ve stored.

195
Q

2.5 log files(SIEM)

A

-syslog

196
Q

2.5 Write Once Read Many(WORM)

A

you’re able to write once onto optical drives, and no one is able to change that information once it’s been written.

197
Q

2.5 IDS vs IPS

A
  • IDS can see you’re able to see the particular exploit was attempted.
  • IPS additional capability of blocking that particular event from occurring on the network

-

198
Q
  1. 6 IPv6 configuration
    - first half or the first 64 bits of the address
    - And then the last 64 bits of the address
A
  • the network prefix
  • are the node or the network address of the device.
199
Q
  1. 6 troubleshoot IP4/configure IP6 for workstation
    - 4 things to configure
A

-IP address, subnet mask, default gateway, dns ip address

200
Q

2.6 BOOTP(bootstrap protocol)

A

legacy protocol for IP address assignment

201
Q
  1. 6 DHCP process to obtain IP address
    - 1.When we first turn on our client workstation, it does not have an IP address, so __
    - 2.This broadcast will make its way to every device on our local subnet ___
    - 3.Those DHCP servers will examine the request. ___
    - 4.Those broadcasts from both DHCP servers will be seen by the original client workstation.
A
  • it’s going to send a broadcast out to UDP port 67 over the network.
  • and it will eventually end up at the DHCP servers that have been configured on our network.
  • And if they have an IP address that’s available, they will make an offer to this client workstation using a broadcast to UDP ports 68.
202
Q

2.6 IP helper-address

(DHCP relay address)

A

This tells this router that if it ever sees any requests for DHCP, to also send them to this DHCP server that’s outside of our local subnet

203
Q
  1. 6 DHCP known IP address
    - 1.Now that it knows that an IP address is available, our client workstation
    - 2.Once the DHCP server receives the address,
    - 3.And at this point, the client workstation can configure itself with that IP address.
A

When multiple offers are made to a device, the device usually chooses the first offer that was received.

  • can send a broadcast over UDP port 67 to request that IP address.
  • it can send a formal acknowledgment to that address to the client workstation over UDP port 68.
204
Q

2.6

On each of those DHCP servers, there was a pool of addresses configured.

  • So any time a request was made for an IP address,
A

any random set of IP addresses that was available could be sent down to that client

205
Q

2.6 Way to ensure an IP address is the same for devices

A

Disable DHCP

create an IP reservation on the DHCP server where you can associate the MAC address of this device to a specific IP address

206
Q
  1. 6 APIPA address assignment
    - before it puts that address onto your workstation, it sends
A

ARP(Address Resolution Protocol) frame out to the network to make sure that nobody else is using the IP address that it wants to assign to your workstation

207
Q

2.6 IP6 link local addresses

fe80 and all 0’s

-Are the last 64 bits of an IP6 address always random?

A

automatically assigned to every IPv6-enabled device

-No, they can be converted from the device MAC address

208
Q
  1. 6 SSL VPN
    - What protocol? Hint: same protocol that we use to communicate securely to web servers

client-to-site VPNs, or remote access VPNs

A
  • used for end user communication so that you can have a secure tunnel between your device and your corporate network
  • TCP 443
209
Q
  1. 6 VPN concentrator
    - What happens after this information is sent back to your remote laptop?
A

decrypts your traffic and sends it to the corporate network.

-the traffic is encrypted by the concentrator and sent over and decrypted by your laptop

210
Q

2.6 Group of devices that share the same broadcast domain(network)

A

LAN

211
Q

2.6

We often maintain the separation between different local area networks

A

-for security reasons and to maintain the efficiency of the network.

212
Q
A
213
Q
  1. 6 VLAN switch
    - Allows multiple
A
  • A single switch that logically seperates networks into 2 pieces
  • multiple VLANs to use one switch
214
Q

2.7 Upload/Download speed (DSL)

A

52 megabits per second downstream and 16 megabits per second upstream

215
Q
  1. 7 dial up
    - speeds
    - Where are they used?
A

using our existing analog voice telephone lines and sending data communication over that connection

  • 56 kb-320 kb a second
  • Enterprise environments
216
Q

2.7 Increase in bandwidth

What are the effects?

A

more HD channel connectivity , send and transfer more different types of data to the cloud,enhanced capabilities with DVR and video capabilities

217
Q
  1. 7 satellite networking
    - Upload/download stream
A

This satellite networking allows us to communicate directly to a satellite, which then sends that data to a station down on earth and then reverses that to get the data back to us

-50 megabits per second down, three megabits per second upstream

218
Q

2.7 Problems with satellite networking

-

A

High latency

-Heavy thunderstorm

219
Q

2.7 signalling channel(D channel)

What’s it do?

-How many bits when working with BRI

A

sets up the connection, it tears down the connection, and sends any management information while the call is going on.

-16 kilobit per second channel

220
Q
  1. 7 T1 and E1
    - How many bearer channels does a T1 connect support?
    - How many bearer channels does a E1 connect support?
A
  • T1 connection supports 23 bearer channels and a signaling channel
  • E1 supports 30 bearer channels, a signaling channel, and a separate alarm channel
221
Q
  1. 7 common to see PRI used ___
    - If you’re not converting over to voice over IP
A

as voice channels that are coming from your public switched telephone network,(local telephone network) nd connecting to a private branch exchange or a local phone system inside of your company.

-you may be using some of these legacy ISDN connections to provide all of your voice communication.

222
Q
  1. 7 point-to-point serial connection(MPLS connections)
    - What kind of network are they used to connect to?
    - What kind of wiring?
A
  • Wide Area Network(WAN)
  • Copper or fiber
223
Q
  1. 7 WMN(Wireless Mesh Network)
    - Usually associated with
    - What networking technologies can be part of it?
A
  • mesh network comprised of wireless devices
  • Internet of Things
  • 802.11, Zigbee , Z-WAVE
224
Q

2.8 cable crimper has a connector on the end, one that is a six-position, which is for ___

And one connector is an eight-position, which is used for crimping ___

A
  • RJ11
  • RJ45
225
Q
  1. 8 What does a crimper do?(modular connector)
    - crimper pushes in a piece of plastic that
A

take the copper that’s inside of that modular connector and push it through the insulation of that wire

  • holds the cable in place
226
Q
  1. 8 electrician scissors(cable snips)
    - Another tool for working with different kinds of wiring and need a quick way to strip away coax or other types of wired connections.
A

-Wire stripper

227
Q
  1. 8 inductive probe
    - ____ that allows you to listen in to see if you can hear that tone coming through a cable.
A

it doesn’t have to physically touch the copper to be able to listen in to that audio that’s being placed by the tone generato

-Small speaker

228
Q

2.8 time domain reflectometer

A

perform cross-talk analysis or frequency tests