2.0 Networking Flashcards

1
Q

A language used by the computer to speak to each other over a network

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol suite do all computers today use to communicate? (2)

A

TCP / IP
Transmission Control Protocol / Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol that is used to share files with users in a LAN (local area network) or a WAN (wide area network) and supports authentication, authorization, and directory browsing

A

FTP
File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FTP (File Transfer Protocol) uses which ports? (2)

A

TCP Port 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False
FTP (File Transfer Protocol) is encrypted

A

False.
It is unencrypted – not recommended, instead use SFTP (Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protocol used to push (put) or pull (get) files from a server and commonly used to manage devices like IP phones, routers, and switches. Does not support authentication, authorization, or directory browsing

A

TFTP
Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TFTP (Trivial File Transfer Protocol) uses which port?

A

UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False
TFTP (Trivial File Transfer Protocol) is unencrypted

A

True
It is unencrypted – not recommended, instead should use SFTP (Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Protocol that supports the same functions as FTP, but with encryption

A

SFTP (Secure File Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SFTP (Secure File Transfer Protocol) uses which port?
hint: uses the same port as SSH

A

TCP Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Notes:
Difference between TCP and UDP

A

TCP is connection-oriented, meaning it establishes a connection before data is transmitted and ensures that all data arrives correctly and in order. It provides reliability, error checking, and retransmission of lost data. Example: web browsing (HTTP).

UDP is connectionless, meaning it sends data without establishing a connection and does not guarantee delivery, order, or error checking. It is faster but less reliable. Example: streaming (like video or audio).

In short: TCP = reliable, slower; UDP = fast, less reliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Mail Protocol that sends outgoing mail to a server

A

SMTP
Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMTP (Simple Mail Transfer Protocol) uses what port?

A

TCP Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mail protocol that downloads incoming mail from a server

a) POP3
or
b) IMAP

A

POP3
Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP3 (Post Office Protocol) uses what port number?

A

TCP Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Mail protocol that synchronizes incoming mail from a server

a) POP3
or
b) IMAP

A

IMAP
Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IMAP (Internet Message Access Protocol) uses what port number?

A

TCP Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Out of POP3 and IMAP, which is more recommended?

A

IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Connection protocol that provides remote command line access to interact with a server. Is considered insecure and should no longer be used, rather SSH instead.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port number does Telnet use?

A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Connection protocol that provides encrypted remote command line access to interact with a server (application such as PuTTY)

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SSH (Secure Shell) uses what port number?

A

TCP Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Protocol that provides name to IP address resolution for host

A

DNS
Domain Name Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

DNS uses what port number?

A

TCP/UDP Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Protocol that provides various configurations to clients in an IP network via broadcast
DHCP *Dynamic Host Configuration Protocol*
26
DHCP uses what port numbers? (2)
UDP port 67 -- server port UDP Port 68 -- client port
27
Web protocol used to transmit webpages (NOT the secure version)
HTTP *Hyper Test Transfer Protocol*
28
HTTP uses what port number?
TCP Port 80
29
Web protocol used to securely transmit encrypted webpages using SSL or TLS
HTTPS *Hyper Test Transfer Protocol Secure*
30
HTTPS uses what port number?
TCP Port 443
31
Protocol that provides various network communication features in a Windows network.
NetBios *Network Basic Input/Output System*
32
NetBios uses what port numbers? (3)
UDP Port 137 UDP Port 138 TCP Port 139
33
Protocol used to query, configure, and monitor host in a LAN
SNMP *Simple Network Management Protocol*
34
SNMP uses which port numbers?
UDP Port 161 and Port 162
35
Which SNMP version encrypts communication? (Unlike previous versions which were unencrypted)
SNMPv3
36
Protocol used in domain-based network environments to facilitate system and user management
LDAP *Lightweight Directory Access Protocol*
37
What port number does LDAP use?
TCP/UDP Port 389
38
Protocol that provides file sharing, network browsing, and printing services
SMB (Server Message Block)
39
Protocol that is an open implementation used on Linux and MacOS, and many other devices (basically SMB but for devices other than Windows)
CIFS *Common Internet File System*
40
SMB and CIFS both use which port number?
TCP Port 445
41
Connection protocol used to securely remotely access a Windows (proprietary) desktop
RDP *Remote Desktop Protocol*
42
RDP uses what port number?
TCP Port 3389
43
TCP or UDP? Protocol that is: - Reliable - Connection-oriented - Virtual circuit - Sequenced - Acknowledgements - 24 to 60 bytes (high overhead)
TCP *Transmission Control Protocol*
44
TCP or UDP? Protocol that is: - Unreliable - Connectionless - No virtual circuit - Un-sequenced - No acknowledgments - 8 bytes (lightweight)
UDP *User Datagram Protocol*
45
Why would UDP be be used over TCP?
UDP is used when speed and real-time delivery are more important than making sure every piece of data arrives perfectly.
46
Used to connect devices to a network. Has a unique 48-bit MAC address.
NIC *Network Interface Card*
47
Lights that are used to trouble shoot connections made to the NIC (2)
1) Link Light 2) Activity Light
48
For a NIC, what does the Link light do? What does the Activity light do?
Link light (red/green color) -- verifies the cable is plugged in at bother ends Activity light (yellow/amber color) -- will blink as data goes through the interface
49
A legacy device used to connect and manage wired communications in a LAN. Communicates by broadcasting. Uses CSMA/CD to manage collision
Hub
50
Device used to connect and manage wired communications in a LAN (replaced a hub). It forwards frames based on MAC addresses
Switch
51
Notes: What are the 2 categories of switches?
**1) Managed switch** - Can be configured - Used in enterprise LANs - Provide additional functions (like VLANs, port security, DHCP snooping) - Expensive **2) Unmanaged switch** - Can NOT be configured - Used in SOHO networks - Lower cost
52
Device used to connect different broadcast domains to each other. - Commonly used to connect a LAN to a WAN. - Forwards traffic based on IP addresses in packets. - Can usually provide DHCP
Router
53
Security device used to prevent authorized access to a LAN from the Internet - Can be a hardware appliance or host-based software - DMZ is a segment of the network that a firewall does not protect, this is used to intentionally expose a device to the Internet
Firewall
54
What port numbers are Common Port vs. Registered Ports?
Port 0 to 1023 -- Common Ports Port 1024 to 49,000 -- Registered Ports
55
Device used to provide and manage wireless communications in a LAN - Connects to switches or routers - Uses Radio Frequencies (RF) to transmit host data
AP (Access Points)
56
Type of router that are multifunction devices offering many features beyond routing. (Basically a router, switch, access point, firewall all-in-one device)
SOHO Router
57
PoE stand for?
Power over Ethernet
58
What allows you to power devices using just an Ethernet cable? *(ability to transfer power and data over an ethernet cable, such as for a ceiling camera)*
PoE (Power over Ethernet)
59
Type of internet that uses telephone lines
DSL modem *(Digital Subscriber Line)*
60
Converts the optical signal coming through the fiber into separate signals for TV, voice, and data.
ONT *(Optical Network Terminal)*
61
A piece of software that controls and manages your network (above the routers on the control plane)
SDN controller *(Software-Defined Networking)*
62
Notes: 2 types of Wireless Frequencies
**2.4 GHz Spectrum** - Long range communications because it has better penetration through barriers - Slower data rates compared to 5 GHz - Higher rate of interference because of its longer range - Has 11 Channels in total - Non-overlapping channels 1, 6, and 11 offer the best chance of minimizing interference **5 GHz Spectrum** - Short range communication because of poor penetration through barriers - Faster data rates than 2.4GHz - Has 45 in total and 24 non-overlapping channels - 20Mhz use -- 36, 40, 44, 48, 149, 153, 157, 161, 165 - 40MHz use -- 38, 46, 151, 159 - Low chance of interference because of its shorter range
63
Wireless standard with the specifics of: Frequency -- 5GHz Max Data Rate 54 Mbps Compatibility -- 802.11n/ac/ax Year -- 1999
802.11a *(Wi-Fi 1)*
64
Wireless standard with the specifics of: Frequency -- 2.4 GHz Max Data Rate -- 11 Mbps Compatibility -- 802.11g/n/ac/ax Year -- 1999
802.11b *(Wi-Fi 2)*
65
Wireless standard with the specifics of: Frequency -- 2.4GHz Max Data Rate 54 Mbps Compatibility -- 802.11b/n/ac/ax Year -- 2003
802.11g *(Wi-Fi 3)*
66
Wireless standard with the specifics of: Frequency -- 2.4GHz or 5GHz Max Data Rate 600 Mbps Compatibility -- 802.11a/b/g/ac/ax Feature -- MIMO (multiple in multiple out) Year -- 2009
802.11n *(Wi-Fi 4)*
67
Wireless standard with the specifics of: Frequency -- 2.4GHz or 5GHz Max Data Rate 3.5 Gbps Compatibility -- 802.11a/b/g/n/ax Feature -- MU-MIMO (4x4) Year -- 2012
802.11ac *(Wi-Fi 5)*
68
Wireless standard with the specifics of: Frequency -- 2.4GHz or 5GHz Max Data Rate 9.6 Gbps Compatibility -- 802.11a/b/g/n/ac Feature -- MU-MIMO (8x8) Year -- 2019
802.11ax *(Wi-Fi 6)*
69
Which Wi-Fi standards utilize MIMO? a) 802.11a -- Wi-Fi 1 b) 802.11b -- Wi-Fi 2 c) 802.11g -- Wi-Fi 3 d) 802.11n -- Wi-Fi 4 e) 802.11ac -- Wi-Fi 5 f) 802.11ax -- Wi-Fi 6
**d) 802.11n -- Wi-Fi 4 e) 802.11ac -- Wi-Fi 5 f) 802.11ax -- Wi-Fi 6**
70
Device used to connect wireless devices over miles. - Usually installed using point-to-point directional antennas - Licensed or Unlicensed
Long-range fixed wireless
71
Device / Software used to connect devices to devices, such as mouses, keyboards, headsets.
Bluetooth
72
Steps to setup Bluetooth (5)
1) Enable Bluetooth 2) Enable pairing 3) Find a device for pairing 4) Enter the appropriate PIN code 5) Test connectivity
73
A set of communication protocols that enables communication between two electronic devices over a database of 4 cm (11/2 in) or less. - Can be used for payment from a phone or watch - Can be used for entering a building with a phone
NFC *Near-Field Communication*
74
Device that uses electromagnetic fields to automatically identify and track tags attached to objects.
RFID *Radio-frequency identification*
75
Notes: Roles for Servers (7)
1) DNS - Translate domain name to IP address 2) DHCP - Gives out IP address on a network 3) Fileshare - Shares files and folders on a network 4) Print servers - Shares printers 5) Mail servers - Allows users to connect and send and receive email 6) Syslog - Receives logs from devices in a network 7) Web servers - Serves web pages using HTTP(S) protocol
76
AAA (Authentication, Authorization, and Accounting) Which "A": - Ensures you are the correct person - Uses passwords, key cards, or biometrics
Authentication
77
AAA (Authentication, Authorization, and Accounting) Which "A": - Ensure you can access the right data - Usually done with file permission
Authorization
78
AAA (Authentication, Authorization, and Accounting) Which "A": - Keeps tracks of what users are doing in their network
Accounting
79
Notes: Internet appliances (4)
1) Spam gateways - Keeps spam from entering your emails 2) Unified Threat Management (UTM) - A combination of antimalware, firewall, and intrusion detection system (IDS) 3) Load balancers - Allows multiple servers to serve the same amount of traffic (split the load) 4) Proxy Servers - Request webpages on behalf of users - Can be used to filter out web traffic, such as blocking users from seeing Facebook
80
Older systems still on a network. Usually not so secure as no updates are available.
Legacy / Embedded systems
81
All devices that connect to the internet - Phones - Cars - Watch - Household appliances
IoT devices *Internet of Things*
82
How many bits is an IPv4 address?
32 bits *X.X.X.X = 32 bits because X = 8 bits* *Each "X" represents an "octet"* *ex. 192.168.0.1 = 32 bits*
83
How many hosts can a Class A, B, and C have?
Class A -- 16.7 million Class B -- 65 Thousand Class C -- 254
84
What is the 1st Octet ranges for Class A, B, and C?
Class A: 1 - 126 Class B: 128 - 191 Class C: 192 - 223
85
What is the address for a IPv4 loopback address?
127.x.x.x
86
What is the address for IPv4 APIPA (Automatic Private IP Address)?
169.254.x.x
87
What is the address of IPv4 address range used for Multicast addressing?
224.x.x.x - 239.x.x.x
88
What IP address is used for IPv4 Broadcast addressing? (For Class A, B, and C)
Class A -- x.255.255.255 Class B -- x.x.255.255 Class C -- x.x.x.255
89
What are the non-routable IPv4 addresses (Private/NAT addresses) for Class A, B, and C?
Class A -- First Address: 10.0.0.0 -- Last Address: 10.255.255.255 Class B -- First Address: 172.16.0.0 -- Last Address: 172.16.0.0 Class C -- First Address: 192.168.0.0 -- Last Address: 192.168.255.255
90
A slash after an IP address with a number
CIDR / Prefix *Classless Inter Domain Router*
91
Notes: IP Communication styles (4)
1) Unicast: One to one communication - Public IP: Routable IP addresses assigned by an ISP - Private IP: Non-routable IP addresses - APIPA: Automatic private IP addresses self assigned by a host when DHCP is not available. (IP address range: 169.254.0.0 - 169.254.255.255) 2) Multicast: One to many communications - IP address range: 224.0.0.0 - 239.255.255.255 3) Broadcast (Layer 3): One to everyone communication - IP address: 192.168.20.255/24 4) Lookback (localhost): Used for a host to communicate with it self - IP address range: 127.0.0.0 - 127.255.255.255
92
NIP, AIP, and BIP stand for?
Network IP Assignable IP Broadcast IP
93
Notes: Hex-Addressing (IPv6)
Example IPv6 address: 2001:0db8:3c4d:0012:0000:0000:1234:56ab ------------------------------- ------------------------------- (1) (2) ----------------------- ------- (4) (3) (4) This area is categorized as the **Global routing prefix (48 bits)** (3) This area is categorized as the **Subnet-ID (16 bits)** (2) This area is categorized as the **Interface-ID (64 bits)** (1) This area is area 3 and 4 and they are categorized as the **Prefix (64 bits altogether** = 48 bits + 16 bits) - Each digit is a Hex, that represents 4 binary bits (ex. 2 = 4 bits, 0 = 4 bits), which would mean each grouping of digits is 16 bits (ex. 2001 = 16 bits) - An IPv6 address is 128 bits divided into 8 fields each being 16 bits. - Prefix: The first 64 bits of an IPv6 address, assigned to an organization. - Interface-ID: Last 64 bits of an IPv6 address and is used to identify a unique interface on a host.
94
Notes: Condensing IPv6 Addressing (4 steps)
**#1 Original:** ex 2001:0db8:3c4d:0012:0000:0000:1234:56ab **#2 Drop the leading zeros in fields:** was 2001:0db8:3c4d:0012:0000:0000:1234:56ab ------- ------- now 2001:db8:3c4d:12:0000:0000:1234:56ab ------ --- **#3 Note 4 zeros with a single zero:** was 2001:db8:3c4d:12:0000:0000:1234:56ab --------------- now 2001:db8:3c4d:12:0:0:1234:56ab ----- **#4 Drop groups of 4 zeros and note them with a "::" (can only appear once):** was 2001:db8:3c4d:12:0:0:1234:56ab ----- now 2001:db8:3c4d:12::1234:56ab --
95
A Hexadecimal can contain how many different values? What could they be?
0-9, A-F
96
How many bits is in a Hex?
4 bits
97
How many bits are in a hexadecimal quartet?
16 bits
98
How many bits are in an IPv6 address?
128 bits
99
What are the first 64 bits of an IPv6 address, assigned to an organization called?
Prefix
100
What are the last 64 bits of an IPv6 address (used to identify a unique interface on a host) called?
Interface-ID
101
What are the first 48 bits of an IPv6 address called?
Global Routing Prefix
102
What are the the next 16 bits (after the first 48 bits) of an IPv6 address called?
Subnet ID
103
Notes: IPv6 Addressing styles (4)
**1) Unicast:** One to one, packet is sent to a single interface - **Global Unicast Addresses:** publicly routable addresses used to communicate outside of a local network. - **2000::/3** was originally defined address space, but now all "non-defined addresses are considered global unicast addresses. - **Unique Local Addresses:** non-publicly routable addresses used to communicate within a local network. - **FC00:/7** but the 8th bit must always be enabled so **FD00/8** is the actual useable defined space - **Link-local addresses:** replacement for APIPA (Automatic Private IP Addresses), every IPv6 host will have a link-local address - **FE80::/10** **2) Multicast:** One to many, packet is sent to many interfaces - **FF00::/8** is the defined space for all IPv6 multicast **3) Loopback:** Used for testing, **::1** **4) Anycast:** One to nearest, packet is sent to the nearest interface in terms of routing distance. Replaces broadcast from IPv4.
104
What is the address for a IPv6 loopback address?
::1
105
What is the address for a IPv6 Global Unicast address (publicly routable address)?
2000::/3 or all "non-defined" addresses *^ the original, but now all "non-defined" addresses are considered global unicast addresses*
106
What is the address for a IPv6 Unique Local address (non-publicly routable address)?
fc00::/7 fc00::/8
107
What is the address for a IPv6 Link-Local address? (APIPA for IPv6)
fe80::/10
108
What is the address for a IPv6 Multicast address?
ff00::/8
109
Protocol used to assign various configurations a host on a network.
DHCP
110
Notes: Common Configurations of DHCP
1) Scope -- the range of addresses the server can assign - ex. 192.168.50 - 192.158.50.250 2) Exclusion range -- the range of addresses the server can NOT assign 3) Reservations -- allow you to bind a MAC address to a specific IP address - Allows DHCP to consistently assign the same IP address to a device without having to manually configure a static IP address 4) Lease time -- defines how long an IP address is "owned" by a host before it can be assigned to another host. Available leases identify how many addresses are still avaliable from the scope
111
Notes: DNS (Domain Name Service)
DNS provides name to IP address resolution for host - DNS servers can be in your LAN or out on the internet - A host is normally assigned a DNS server via DHCP, but it can also be assigned manually - DNS Name Types - Host names -- identify a specific device in a network (ex. Hostname = workstation01) - Domain names -- identify a specific network (ex. Domain name = companyx.lan - FQDN (Fully Qualified Domain Name) -- identify a specific in a specific network (ex. FQDN = workstation01.companyx.lan)
112
Notes: DNS Records
Record Type: A Description: Resolves a name to an IPv4 Address Example: example.com => 123.234.34.56 Record Type: AAAA Description: Resolves a name to an IPv6 Address Example: example.com => 2001:0db8:3c4d:0012::1234:56ab Record Type: TXT (SPF) Description: Sender Policy Framework list of hostname/IPv4 and IPv6 addresses that mail can be sent from Example: v=spf1 ip4:40.113.200.201 ip6:2001:0db8:3c4d:0012::1234:56ab include:company.com ~all Record Type: TXT (DKIM) Description: Domain Keys Identified Mail provides authentication of mail being sent and received to prevent spam Example: email_provider._domainkey_.companyx.com v=DKIM1; p=76E629F05F70 9EF665853333 EEC3F5ADE69A 2362BECE4065 8267AB2FC3CB 6CBE Record Type: TXT (DMARC) Description: Domain-based Message Authentication, Reporting, and Conformance controls what happens if authentication fails to prevent spam Example: v=DMARC1; p=reject; rua=mailto:dmar@example.com Record Type: CNAME Description: Canonical Name records resolves an alias to a domain name Example: bn.com => barnsandnoble.com Record Type: MX Description: Resolves a name to a mail exchanger (email server) Example: imap.gmail.com => 142.250.31.108
113
Creates a secure tunnel to a private network. - Required to access resources in a LAN over the internet
VPN (Virtual Private Network)
114
Any network that is partitioned and isolated in a computer network at the data link layer or by switches. - Carries a separate network address with separate network traffic
VLAN *(Virtual Local Area Network)*
115
Notes: Internet Connection Types (3)
**DSL (Digital Service Line)** - DSL is a broadband service that operates over the PSTN (Public Switches Telephone Network) - Requirements include: - DSL modem - DSL filter/splitter (prevent noise when connecting a telephone to a DSL line) **Cable** - Uses DOCSIS (Data Over Cable Service Interface Specification) standard to deliver internet over coax. - Described as an FTTN (Fiber to the Node) service - Requirements include: - Cable modem **Fiber: Internet over fiber optic cable** - Fiber services like FIOS are FTTP - Fastest service but also most expensive - Requirements include: - ONT (Optical Network Transceiver) converts the fiber cable from the provider to twisted pair to connect to a router
116
Notes: Wireless Internet Connection Types (3)
**Satellite** - Widely available (only option in rural areas) - Suffers from high latency (not good for video streaming or online gaming) - Requirements include: - Satellite dish connected to satellite receiver via coax - Clear view into space **Cellular** - Requirements include: - Within the 4G/LTE or 5G coverage area - Mobile device with a cellular radio installed **WISP (Wireless Internet Service Provider)** - Provides internet to smaller cities where cable or fiber services aren't available - Providers use wireless access points deployed and at customer sites - Requirements include: - Must be within the limited coverage area
117
Private networks found in homes, offices, and schools. Can vary in size from a single room to an entire building.
LAN (Local Area Network)
118
Network spread across a single city. Connections between the sites are often privately owned and managed by the organization that use them.
MAN (Metropolitan Area Network)
119
Network an organization needs to connect their office on one side of the world to the other.
WAN (Wide Area Network)
120
Small networks usually made up of two devices. These devices can be connected over wired connections (Ethernet or USB) or wireless connections (Wi-Fi, Bluetooth, Infrared).
PAN (Personal Area Network)
121
Tool used to terminate RJ45 and RJ11 heads to twisted-pair cables
Crimper
122
Tool used to identify the other end of a twisted-pair cable
Toner Probe
123
Tool used to terminate twisted-pair to a 110 or 66 block
Punch-Down tool
124
Tool used to test if a network port can communicate to itself
Loopback Plugs