Chapter 11 Flashcards

1
Q

Network hardware devices that function at the ____ layer, are network interface cards (NICs), hubs, repeaters, concentrators, and amplifiers.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switches function at the ___ layer.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is used to resolve IP addresses into MAC addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ used to resolve MAC addresses into

IP addresses.

A

Reverse Address Resolution Protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The routing protocols are located at the _____ layer and include the following:

Internet Control Message Protocol (ICMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Internet Group Management Protocol (IGMP)
Internet Protocol (IP)
Internet Protocol Security (IPSec)
Internetwork Packet Exchange (IPX)
Network Address Translation (NAT)
Simple Key Management for Internet Protocols (SKIP)
A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ determine the best logical path for the transmission of packets based on speed, hops, preference, and so on.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ use the destination IP address to guide the transmission of packets.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops (in other words, the number of routers to cross to reach the destination).

A

Distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ routing protocols maintain a topography map of all connected networks and use this map to determine the shortest path to the destination.

A

Link state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Secure Sockets Layer (SSL), Transport Layer Security (TLS) operate within the ________ layer

A

Transport layer:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
\_\_\_\_\_\_\_\_\_\_ manages dialogue discipline or
dialogue control (simplex, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint.
A

The Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The _________ is responsible for establishing, maintaining, and terminating communication sessions between two computers.

A

Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ layer is also responsible for encryption and compression.

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ is a simplex connectionless protocol.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The client sends a ____ flagged packet to the server.
  2. The server responds with a ______ flagged packet
    back to the client.
  3. The client responds with an ___________ flagged packet back to the server.
A

SYN

SYN/ACK

ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each side of a conversation will transmit a ___ flagged packet once all of its data is transmitted, triggering the opposing side to confirm with an ___ flagged packet.

A

FIN

ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data flow is controlled through a mechanism called _______ .

A

sliding windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A TCP header is ___ bytes long.

A

20 to 60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ offers no error detection or correction, does not use sequencing, does not use flow control mechanisms, does not use a preestablished session, and is considered unreliable.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A UDP header is ______ long.

A

8 bytes (64 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ provides route addressing for data
packets. It is this route addressing that is the foundation of global Internet communications because it provides a means of identity and prescribes transmission paths.

A

Internet Protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Decimal Range of First Octet of Class A

A

0 - 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Decimal Range of First Octet of Class B

A

128 - 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Decimal Range of First Octet of Class C

A

192 - 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Decimal Range of First Octet of Class D

A

224 - 239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Decimal Range of First Octet of Class E

A

240 - 255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

_____ allows systems to support multicasting.

A

Internet Group Management Protocol (IGMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Telnet, TCP port ____

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

File Transfer Protocol (FTP), port____

A

TCP Ports 20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Trivial File Transfer Protocol (TFTP)

A

UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Simple Mail Transfer Protocol (SMTP)

A

TCP Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Post Office Protocol (POP3)

A

TCP Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Internet Message Access Protocol (IMAP),

A

Port 143

34
Q

Dynamic Host Configuration Protocol (DHCP)

A

Ports 67 and 68

35
Q

Line Print Daemon (LPD)

A

TCP Port 515

36
Q

X Window

A

Ports 6000–6063

37
Q

Bootstrap Protocol (BootP)/Dynamic Host Connfiguration Protocol (DHCP)

A

UDP Ports 67 and 68

38
Q

Network File System (NFS)

A

TCP Port 2049

39
Q

Simple Network Management Protocol (SNMP)

A

UDP Port 161 (UDP Port 162

for Trap Messages)

40
Q

____________ is a form of network datastorage
solution (storage area network [SAN]) or network-attached storage [NAS]) that allows for high-speed file transfers at upward of 16 Gbps.

A

Fibre Channel over Ethernet (FCoE)

41
Q

______ is a high-throughput high-performance network technology that directs data across a network
based on short path labels rather than longer network addresses.

A

MPLS (Multiprotocol Label Switching)

42
Q

___________ can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.

A

Internet Small Computer System Interface (iSCSI)

43
Q

___________ is the IEEE standard for wireless network communications.

A

802.11

44
Q

Two mthods that wireless clients can use to

authenticate to WAPs before normal network communications can occur across the wireless link are

A

open system authentication (OSA) and shared key

authentication (SKA).

45
Q

______ encapsulates EAP methods within a

TLS tunnel that provides authentication and potentially encryption.

A

PEAP (Protected Extensible Authentication Protocol)

46
Q

_______ is a Cisco proprietary alternative

to TKIP for WPA.

A

LEAP (Lightweight Extensible Authentication Protocol)

47
Q

_______ improvements include a key-mixing function that combines the initialization vector (IV)
(i.e., a random number) with the secret root key before using that key with RC4 to perform encryption

A

TKIP (Temporal Key Integrity Protocol)

48
Q

_______ the preferred standard security protocol
of 802.11 wireless networking,the preferred standard security protocol of 802.11 wireless networking uses (Advanced Encryption Standard) with a 128-bit key.

A

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol)

49
Q

_____ are crafted from a straight bar with cross
sections to catch specific radio frequencies in the direction of the main bar.

Panel antennas
Parabolic antennas
Cantennas
Yagi antennas

A

Yagi antennas

50
Q

________ are flat devices that focus from only one side of the panel.

Panel antennas
Parabolic antennas
Cantennas
Yagi antennas

A

Panel antennas

51
Q

________ are constructed from tubes with one sealed end. They focus along the direction of the open end of the tube.

Panel antennas
Parabolic antennas
Cantennas
Yagi antennas

A

Cantennas

52
Q

________ are used to focus signals from very long distances or weak sources.

Panel antennas
Parabolic antennas
Cantennas
Yagi antennas

A

Parabolic antennas

53
Q

An ________ is a section of an
organization’s network that has been sectioned off so that it acts as an intranet for the
private network but also serves information to the public Internet.

A

extranet

54
Q

networks are segmented or subdivided into smaller organizational units to :

A

Boosting Performance
Reducing Communication Problems
Providing Security

55
Q

____________ filters traffic by
examining data from a message header. Usually, the rules are concerned with source, destination, and port addresses. Also known as first- generation firewalls.

stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls

A

Static Packet-Filtering Firewalls

56
Q

____________ filters traffic based on the Internet service (in other words, the application) used to transmit or receive the data. This type of firewall negatively affects network performance because each packet must be examined and processed as it passes through the firewall. Also known as second-generation firewalls.

stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls

A

Application-Level Gateway Firewalls

57
Q

____________ permit or deny forwarding decisions based solely on the endpoint designations of the communication circuit (in other words, the source and destination addresses and service port numbers).

stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls

A

Circuit-level gateway firewalls

58
Q

By examining source and destination addresses, application usage, source of origin, and
relationship between current packets and the previous packets of the same session, ________ are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.users and activities and actively watch for and block unauthorized users and activities.

stateful inspection firewalls
Application-Level Gateway Firewalls
Static Packet-Filtering Firewalls
Circuit-level gateway firewalls

A

stateful inspection firewalls

59
Q

______ are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two.

A

Routers

60
Q

10Base2 Max Speed ______ Distance ______

A

10 Mbps 185 meters

61
Q

10Base5 Max Speed ______ Distance ______

A

10 Mbps 500 meters

62
Q

10Base-T (UTP) Max Speed ______ Distance ______

A

10 Mbps 100 meters

63
Q

STP Max Speed ______ Distance ______

A

155 Mbps 100meters

64
Q

100Base- T/100Base-TX Max Speed ______ Distance ______

A

100 Mbps

100 meters

65
Q

1000Base-T Max Speed ______ Distance ______

A

1 Gbps 100 meters

66
Q

Fiber-optic Max Speed ______ Distance ______

A

2+ Gbps 2+ kilometers

67
Q

________ transmits data
in a series while constantly changing the frequency in use. The entire range of available
frequencies is employed, but only one frequency at a time is used. As the sender changes
from one frequency to the next, the receiver has to follow the same hopping pattern to
pick up the signal.

Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)

A

Frequency Hopping Spread Spectrum (FHSS)

68
Q

_________ employs all the available frequencies
simultaneously in parallel and also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference.

Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)

A

Direct Sequence Spread Spectrum (DSSS)

69
Q

_________ employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular (orthogonal) and thus do not cause interference with each other.

Direct Sequence Spread Spectrum (DSSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
Frequency Hopping Spread Spectrum (FHSS)

A

Orthogonal Frequency-Division Multiplexing (OFDM)

70
Q

IEEE 802.15

A

Bluetooth

71
Q

_______ allows an attacker to transmit SMS-like
messages to your device.

Bluebugging
bluejacking
Bluesnarfing

A

bluejacking

72
Q

______ allows hackers to connect with your Bluetooth
devices without your knowledge and extract information from them.

Bluebugging
bluejacking
Bluesnarfing

A

Bluesnarfing

73
Q

_______ is an attack that grants hackers remote control over the feature and functions of a Bluetooth device.

Bluebugging
bluejacking
Bluesnarfing

A

Bluebugging

74
Q

IEEE 802.3

Ethernet
Token Ring
Fiber Distributed Data Interface

A

Ethernet

75
Q

______ can be deployed as a physical star using a multistation access unit (MAU).

A

Token Ring

76
Q

_________ is a high-speed token-passing technology that employs two rings with traffic flowing in opposite directions.

A

Fiber Distributed Data Interface

77
Q

_________ communications occur through the use of a discontinuous electrical signal and a state change or on-off pulses.

Analog
Digital

A

Digital

78
Q

__________ communications occur with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape (as opposed to the square shape of a digital signal). The actual
communication occurs by variances in the constant signal.

Analog
Digital

A

Analog

79
Q

There are two broad categories of routing protocols: ______ and ____ .

A

link state distance vector

80
Q

What are the two broad categories of routing protocols ?

A

distance vector and link state

81
Q

a tunneling mechanism used to transport voice and/or data over a TCP/IP network.

A

Voice over IP (VoIP)

82
Q

______ allows data transmission paths, communication decision trees, and flow control to be
virtualized rather than being handled on the hardware on a per device basis.

A

Software-Defined Networking (SDN)