Chapter 1 Network Fundamentals Flashcards

1
Q

What is a router?

A

It’s a device that directs internet traffic with multiple devices to a network and directs data packets to their correct destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Switch?

A

It’s a device that connects multiple devices on a network and allows them to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS (Intrusion Detection System)

A

It monitors network traffic and devices for suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Proxies?

A

It is an application or server that acts as an intermediary between the user and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the layers of an OSI Model

A

Layer 1: Physical Data Link
Layer 2: Data Link
Layer 3: Network
Layer 4: Transport
Layer 5: Session Layer
Layer 6: Presentation Layer
Payer 7: Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encapsulation vs Decapsulation

A

Encapsulation adds information to the packet as it travels to its destination. Decapsulation reverses the process by removing the info, so the destination can read the original data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Point (AP)

A

It’s not a wireless router. An access point a bridge to access the router itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Content Delivery Network

A

It takes time to get data from one place to another. Geographically distributed caching servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(VPN) Virtual Private Network

A

Secure private data traversing the public network. This is often a built-in network that can encrypt and decrypt access to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quality of Service (QoS)

A

Traffic Shaping, Packet Shaping. Control Bandwidth usage or data rates. It is important to have higher priorities than other apps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TTL (Time to Live)

A

A networking mechanism that limits the amount of time for a data packet that exists on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Network Function Virtualization (NFV)

A

Replace physical network devices with virtual versions. It has the same functionality as a physical device, like routing, switching, load balancing, and maintaining a cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Virtual Private Cloud (VPC)

A

A pool of resources created in a public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a TCP (Transmission Control Protocol)

A

A communication standard that allows a device to exchange data over a network. TCP is a fundamental protocol that defines how to establish and maintain network conversations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ICMP (Internet Control Message Protocol)

A

One of the primary ways in which ICMP is used to determine if data is getting to its destination and at the right time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unicast

A

One stations sends information to another station.

17
Q

Multicast

A

Delivery of information to interested systems. Multimedia delivery, stock exchanges, and dynamic routing updates.

18
Q

Broadcast

A

Send information to everyone at once.

19
Q

Fiber Communication

A

It’s a type of cabling that is immune to radio interference. Signals slow to degrade and transmit over long distances.

20
Q

Copper Cabling

A

Two wires twisted to resist interference. They have equal, but opposite signals.

21
Q

Coaxial Cable

A

Two or more forms share an axis and these cable are used for television and digital.

22
Q

Twin axial Cable

A

It has two inter conductors and travel in is 10 gigabytes of info through an ethernet cable.

23
Q

Transceiver

A

Transmitter and receiver. Usually in a single component. It’s a device that can both send and receive signals and is a combination of a transmitter and transceiver in a single package. Different types can range from fiber and copper.

24
Q

What are network topologies?

A

It is a physical and logical arrangement of devices and connections in a network. It describes how data flows and how nodes such as routers and switches are interconnected.

25
Q

What are some of the network topologies you can list?

A

Star Network- Used in most large and small networks. The middle has a central hub where all the other devices communicate in one center.

Mesh- Multiple Links to the sample place. Redundancy, fault tolerance, and load balancing.

Hybrid (Star and Mesh)- A
combination of physical topologies.

Top-of-rack Switching- A network topology that uses layers of switcher to improve network efficiency and reduce latency. The advantage is that this can send data quickly, but it is costly since buying switches is expensive.

Point-to-point- Older WAN links that can send data by themselves.

26
Q

Three-Tier Architecture

A

Three-tier architecture is commonly found in small geographical areas like cities and towns. Our homes are usually connected to these architectures, but only because it’s possible by distribution channels.

27
Q

Two-Tier Architecture

A

Its simplicity has an advantage over its three tier model. It has been seen to combine the core and distribution layers. However, it is not as resilient if you happen to lose components.

28
Q

Loopback Address

A

A special IP address that points back to the same device to send and receive network traffic to itself. It is primarily used for testing purposes, debugging, or establishing network connections without involving external devices.

29
Q

Reserved Address

A

It refers to an IP address that are set aside for specific purposes and are not assigned for general use on public networks like the Internet. These addresses are typically reserved by organizations.

30
Q

Virtual IP Addresses (VIP)

A

They are not real IP addresses, since these addresses are based on virtual machines or reserved addresses that are given to a router

31
Q

DHCP (Dynamic Host Configuration Protocol)

A

A network management protocol is used to automatically assign IP addresses and other network configuration settings to devices on a network. IP configuration settings are done through this sever.

32
Q

Subnetting

A

It’s a process in which a larger network is divided into smaller and sub-manageable networks.

33
Q

CIDR (Classless Inter-Domain Routing)

A

It allows for more efficient use of IP address space, which is especially important as the number of devices on the internet grows.

34
Q

VLSM (Variable Length Subnet Masks)

A

It’s a technique in IP networking that allows you to create subnets of different sizes from a single IP network, as opposed to fixed-size subnets.

35
Q

SDN (Software Defined Networking)

A

Networking devices have different functional planes of operation. It is a network architecture approach that separates the control plane from the data plane in networking devices.

36
Q

Adaptive Identity

A

Multiple Risk Indicators that have a relationship to the organization, physical location, type of connection, and IP address.

37
Q

IPV6 (Internet Protocol Version 6)

A

The number of IPV6 addresses can be the sum of 45 quintillion unique addresses. This was specifically used to address the limitation of IPV4.

38
Q

Tunneling IPV6

A

It sends IPV6s over existing IPV4s.