4. Networking Infrastructure Flashcards

1
Q

2 ways to connect with a LAN

A

Ethernet and WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standard Ethernet cable

A

RJ 45 (8 pin connecter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Landline phone cable

A

RJ 11 (6 pin connecter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN

A

a collection of LANs not tied to one specific location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a PAN is a

A

Personal Area Network - designed to support a single person (Bluetooth - main purpose is to connect peripherals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFC uses

A

inductive coupling - for payment and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadband connections are

A

always on (as opposed to dial-up) and measured in Mbps or Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A modem converts

A

Digital computer signals to analog for copper wires (and back)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fiber optic modems use a

A

laser to convert digital signals to pulses of light to travel through glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

6 types of internet connections

A

DSL (Digital Subscriber Line); Cable (coaxial), Fiber Optic (glass); Wireless for Mobile; Fixed Wireless (RF), Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5G has speeds

A

up to 20 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4G has speeds

A

up to 14 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP (2 main things)

A

Assigns IP addresses (addresses used by the internet) and breaks data into packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP (2 main things)

A

(Transmission Control Protocol) establishes network connections between systems and tracks/requests new packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The 2 addresses for a computer

A

IP and MAC (media access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 ways to assign an IP address

A

Static (manual) and DHCP (Dynamic Host Configuration Protocol - creates a pool of IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Usually, Static IP addresses are for ______ and DHCP addresses are for ______

A

Servers; End Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IP addresses are used to

A

address network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAC addresses are assigned by the manufacturer of the device and use

A

12 hexidecimal digits (first 6 identify the manufacturer and the last 6 are a unique identifier assigned by the manufacturer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3 rules for valid IP address octets

A

never higher than 255, never start with 127 (loop back), never start with a number greater than 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IP address that start from 224 - 239 are for

A

multicast systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP address that start from 240 - 255

A

are for experimental use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Switches connect

A

all of the devices on a LAN to each other using MAC addresses

24
Q

Routers manage

A

traffic to/from the internet and to all of the switches using IP addresses

25
Q

Firewalls use

A

rules to allow/block traffic between 2 or more networks

26
Q

Border Firewalls sit

A

between LANs and the Internet (most common - protects the overall network)

27
Q

WiFi uses these items

A

a radio transceiver, antenna, and wireless access points

28
Q

WiFi is a

A

set of rules for interaction for all wireless devices and wireless access points, governed by the IEEE (Institute of Electrical and Electronics Engineers). Different versions of the 802.11 standard

29
Q

2 major differences between wireless networking versions are

A

maximum speed and radio frequency range

30
Q

2.4 GHz networks have

A

longer range but slower speeds

31
Q

5 GHz networks have

A

higher speeds but reduced range (need more wireless access points

32
Q

802.11

A

2.4 GHz / 2 Mbps (1997)

33
Q

802.11b

A

2.4 GHz / 11 Mbps

34
Q

802.11a

A

5.0 GHz / 54 Mbps

35
Q

802.11g

A

2.4 GHz / 54 Mbps

36
Q

802.11n

A

2.4 or 5 GHz / 600 Mbps (2009) - uses MIMO antenna (Multiple Input/Multiple Output)

37
Q

802.11ac

A

5 GHz / 1 (3?) Gbps - uses beam forming antenna scheme

38
Q

802.11ax

A

2.4 and 5 GHz (WiFi 6) / 9.6 Gbps

39
Q

when objects weaken a signal

A

attenuation

40
Q

2 basic categories of antennas

A

Omnidirectional (rubber ducks) -doughnut shaped waves, and directional - increases range by focusing power

41
Q

beamforming

A

the access point uses multiple antennas to detect and steer the signal towards the connecting device (virtual directional antenna)

42
Q

best way to set up a wireless network is to

A

conduct site survey - measure signal strength, detect electromagnetic interference, and use heat maps to show dead spots

43
Q

different radio frequencies are known as

A

channels

44
Q

the ‘name’ of the wireless network visible to users

A

SSID (Service Set Identifier)
- broadcasted by default
- disable SSID broadcasting to hide your network

45
Q

3 methods of wireless authentication

A

Pre Shared Keys; Enterprise Authentication (server w/username & password); Captive Portals (redirected - must ‘escape’ the portal to access the internet)

46
Q

WEP is

A

(Wired Equivalent Privacy) insecure

47
Q

WPA is

A

(WiFi Protected Access) insecure (uses TKIP - Temporal Key Integrity Protocol, which changes the encryption key for each packet)

48
Q

WPA2 is

A

secure (uses the protocol CCMP - based on AES (advanced encryption standard) )

49
Q

WPA3

A

secure (supports CCMP protocol and adds new technology SAE (Simultaneous Authentication of Equals) - a secure key exchange protocol)

50
Q

The protocol used for web content

A

HTTP - sever uses this protocol to send content, and the web browser re-assembles the content

51
Q

The secure protocol for web content

A

HTTPS - adds encryption (“s” is for “secure”)

52
Q

used to SEND messages between email servers

A

SMTP (used if the recipient does not already have an account on the senders server) - use SMTPS (secure)

53
Q

When you check your email, your email client reaches out to your email server and requests your messages.
This connection can use 3 different protocols

A

HTTPS (for web based clients - connection takes place over the web, gmail), POP3, and IMAP

54
Q

POP3

A

Post Office Protocol (downloads/deletes from server - traditional email clients like Outlook) - older protocol. Used to RECEIVE messages. Secure version is POP3 over TLS

55
Q

IMAP(S)

A

Internet Message Access Protocol (messages remain on the server, can access from any device - traditional email clients like Outlook). Used to RECEIVE messages

56
Q

A subnet mask _______

A

reveals how many bits in the IP address are used by the network by masking the network portion of the IP address