Chapter 1/2/3 Test Flashcards

0
Q

What is Internet?

A

A network of networks, both public and private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Who owns the Internet?

A

Nobody

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Client:

A

Piece of hardware/software that access a service made by a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Server:

A

Application software that accepts requests from clients and responds accordingly to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Peer-to-peer network:

A

Two or more PCs connect and share resources without going through a separate server or whatever.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Medium:

A

Channel over which a message flows from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Topology:

A

Visual representation of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIC:

A

Network Interface Card: provides the physical connection to the network at the PC (host device). Media plugs directly into the NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical Port:

A

A connector or outlet on a networking decide where the media is connected to a host or other networking device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Interface:

A

Specialized ports on an internetworking device that connect to individual networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Convergence:

A

Coexistence of telephone, video, and data communication within a single network.
Offers convenience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network architecture:

A

Technologies that support the infrastructure, programmed services/rules/protocols that move messages across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network Bandwidth:

A

Amount of information that can be transmitted over a network in a given amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud computing:

A

Use of computing resources that are delivered as a service over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Power line networking:,

A

Use of adapters to expand range of router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three basic categories of network components:

don’t overthink

A
  1. devices
  2. Media
  3. Services and processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tasks performed by intermediary devices:

A

Provide connectivity.

Connect hosts to network, connect multiple networks to form internetwork.

Manage data as it flows through the network.

Direct path of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Examples of end/intermediary devices:

A

End:
PC, phone, client, server.

Intermediary:
Router, switch, security devices (firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3 types of network media:

A
  1. copper wire
  2. Fiber optic
  3. Wireless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Be familiar with the visual representations of end devices, intermediary devices, and network media.

A

On power point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Difference between logical and physical topology:

A

Physical shows exactly how the network will be implemented in the actual physical environment, while logical just shows how it will work, but not necessarily exactly how it will actually be arranged in wherever it is implemented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LAN vs. WAN vs. WLAN

A

LAN, small area; home.

WAN, wide area; provides access or other networks.

WLAN, same but with wireless connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Intranet /extranet:

A

Intranet used by company employees,

Extranet, sample of intranet given access to customers/suppliers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Four basic characteristics that the underlying architectures need to address in order to meet user expectations:

A
  1. Fault tolerance
  2. Scalability
  3. Quality of Service
  4. security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Advantages/disadvantages of circuit-based and packet-switched networks.

A

Packet switched:

  • many different “paths.” Route according to best path.
  • fault tolerable

Circuit-based:

  • secure
  • but when one line is being used, others may not be able to access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

4 clouds:

A

Public: available to public.

Private:for specific organization or entity.

Custom: designed for specific industry.

Hybrid: 2 or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Common external security threats:

A
Viruses
Spyware/adware
Hackers
Data theft
Zero-day attacks. 
Denial of service attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Methods to connect romote users to Internet.

A

wireless internet service provider (WISP)
Or
Wireless broadband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Non-volatile vs. volatile memory.

A

Non-volatile does not erase when power is lost.

Volatile Is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RAM has what type of memory:

A

Volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Flash / NVRAM has what kind of memory.

A

Non-volatile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Functions of router:

A

Forwards data packets and receives data packets from the Internet.

32
Q

Functions of switches:

A

Connect end devices using network cables.

33
Q

Methods of accessing Command Line Interface (CLI)

A

Console

Telnet/SHH:wireless

AUX port

34
Q

What can be done in User Exec mode:

A

Allows limited number of monitoring commands. “View only mode”

35
Q

What can be done in privileged exec mode:

A

All monitoring commands, as debugging/testing, file manipulation, and remote access.

36
Q

What can be done in global Config mode:

A

Global configuration commands. Affects whole router.

37
Q

Hierarchy of modes:

A

User exec -> privileged exec -> global Config -> other Config modes.

38
Q

Which modes can have passwords set on them:

A

Privileged exec mode.
Console connection.
Access over telnet

39
Q

Command for secret password:

A

Enable secret.

40
Q

Command to get into privileged exec mode:

A

Enable.

41
Q

Command to save running configuration.

A

In privileged exec mode:

Copy run start.

42
Q

Commands to configure console line and telnet passwords:

A
  1. Console password

2. VTY password

43
Q

Command to view the running configuration:

A

Show running-Config

44
Q

Are commands case-sensitive?

A

No

45
Q

Command to enter global Config mode:

A

Config t

46
Q

Command to name router/ switch

A

In global Config:

hostname (name)

47
Q

Different types of CISCO IOS help:

A

Context sensitive (?)

Command syntax check: returns a help message indicating what is wrong

Hot keys and shortcuts.

48
Q

What info needs to be configured on a PC in order for it to have connectivity to remote networks:

A

Code:

In global Config mode

(Config)#Interface VLAN 1 (that might just be hostname)
(Config-if)#IP address 192.168.10.2 255.255.255.0 (default gateway)
(Config-if)#No shutdown.

49
Q

How do you remove a command given to a router/switch?

A

“Reload” restores device to previous configuration.

Also “erase start” erases the startup Config and restarts device.

** put NO in front of whatever command.

50
Q

DCHP:

A

Dynamic Host Configuration Protocol.

Finds IP address.

51
Q

List the 3 elements that all communication methods have in common.

A
  1. The message source or sender
  2. Message destination or receiver
  3. A channel that carries that message. (Media)
52
Q

Differentiate between encoding and decoding by defining each:

A

Encoding: process of converting information in another, acceptable form, for transmutation.

Decoding: reverses the process in order to interpret information.

53
Q

Encapsulation:

A

Adding headings to properly transfer the message to the correct end device.

54
Q

De-encapsulation:

A

Removes headings added by encapsulation,

55
Q

Why Is a message broken into segments before traveling on a network?

A

The size restrictions of frames won’t allow for messages of a certain size.

56
Q

Unicast:

A

1-to-1 communication.

57
Q

Multicast:

A

Sent to many but not all.

58
Q

Broadcast:

A

Sent to all.

59
Q

Protocol suite:

A

A group of inter-related protocols necessary to perform a communication function.

60
Q

Proprietary:

A

Privately owned and controlled network/design.

61
Q

Open standard:

A

No ownership, updated by volunteers.

62
Q

Segmenting:

A

Breaking a large message down into small pieces before transmitting.

63
Q

Default gateway:

A

Device that passes traffic from the local subnet to devices in other networks.

64
Q

Protocol:

A

Define the “rules” for his data is sen across networks.

65
Q

Multiplexing:

A

When multiple message signals/digital streams are combined into one signal over a shared medium.

66
Q

List the layers of the OSI Model:

A

From top to bottom:

Layers; data unit

Application; data
Presentation; data
Session; data
Transport; segments
Network; packets
Data Link; frames
Physical; bit
67
Q

List the layers of the TCP/IP model:

A

Application layer
Transport layer
Internet layer
Network access layer

68
Q

Be able to relate layers of OSI model to TCP/IP model.

A

Look at picture in camera roll.

69
Q

Difference between protocol model and reference model:

A

Protocol model:
closely matches the structure of a particular protocol suite. (TCP/IP model)

Reference model:
provides consistency within all types of network protocols and services, by describing what have to be done at a particular lasher but not how it should be accomplished.(OSI model)

70
Q

Which model is used for teaching?

A

OSI model

71
Q

Advantages/Disadvantages of segmenting:

A

Adv.:

  • Different conversations can be interleaved by multiplexing.
  • increased reliability.

Disadvantage:
Increased level of complexity.

72
Q

How many MAC and IP addresses get placed on a packet that is traveling over the Internet.

A

2 IPs: One from the source and one from the destination.

Same with MAC.

73
Q

Which address can change during their journey from source to destination?

A

MAC address

74
Q

What are the two parts of every IP address:

A

Network prefix, and host parts

Network prefix is used by routers to forward message to proper network.

Host part is used by the last router in the path to deliver packet to the destination device.

75
Q

What does an ARP do?

A

Address Resolution Protocol:

Finds MAC address if only IP address is known.

76
Q

What is a proxy ARP?

A

Answers the ARP queries for a network address that is not on that network.

77
Q

Start up Config is on what memory?

A

NVRAM

78
Q

OS is on what memory?

A

Flash