Chapter 13: Computer Networking Flashcards
Understand Computer Networking
{Blank} connect devices that are in the same building so they can talk to each other and to servers, printers, and other devices located in the office.
Local Area Networks (LANs)
{Blank} connect offices in different locations and also connect users to the internet.
Wide Area Networks (WANs)
The TCP/IP suite is made up of what two protocols?
- Transmission Control Protocol (TCP)
- Internet Protocol (IP)
{Blank} is responsible for routing information over the internet. It is used on the Internet and LAN.
Internet Protocol (IP)
IP assigns each computer on the network it own address, called an {blank}.
IP address
IP Addresses umiquely identify computers on a network and are they way that computers identify each other on an IP network.
When data travels on a TCP/IP network, the Internet Protocol breaks it up into small pieces called {blank}.
packets
{Blank} is responsible for setting up and tearing down connections between source and desination systems.
Transmission Control Protocol (TCP)
The {blank} is an alternative to TCP. It has less overhead but does not gurantee the delivery of packets from one system to another.
User Datagram Protocol (UDP)
The {blank} is the housekeeping protocol of the Internet. It’s designed to allow networked devices and systems to communicate with each other about the operation of the network.
Internet Control Message Protocol (ICMP)
ICMP can be used to detect whether remote systems are live on the network, to discover the network path between two systems, and to report issues with network devices.
What are the seven layers of the Open Systems Interconnection (OSI) model?
- Physical
- Data link
- Network
- Transport
- Session
- Presentation
- Application
OSI Model
The first layer, the {blank}, is responsible for sending bits over the network using wires, radio waves, fiber optics, and other means.
Physical Layer
OSI Model
The second layer, the {blank}, transfer data between two nodes connected to the same physical network.
Data-Link Layer
OSI Model
The third layer, the {blank}, expands networks to many different nodes. The Internet Protocol works at this layer.
Network Layer
OSI Model
The fourth layer, the {blank}, creates connections betweeen systems and transfer data in a reliable manner. TCP and UDP are at this layer.
Transport Layer
OSI Model
The fifth layer, the {blank}, manages the exchange of communications between systems.
Session Layer
OSI Model
The sixth layer, the {blank}, translates data so that it can be transmitted on a network. This layer determines how to represent a character in terms of bits and performs encryption and decryption
Presentation Layer
OSI Model
The seventh layer, the {blank}, determines how users interact with the data, using web browsers and other client applications. Protocols like HTTP, SMTP, and SSH exist at this layer.
Application Layer
The folowing two IP address are invilved in every network communication:
* The {blank} indicates the system sending information.
* The {blank} indicates the system reciving information.
- Source address
- Destination address
IP addresses can be assigned in to ways:
* You can assign an IP address {blank}.
* You can assign an IP address {blank} by using the Dynamic Host Configuration Protocol (DHCP).
- Statically
- Dynamically
{Blank} allows you to configure a pool of IP addresses, and then it will automatically assign those adresses to systems as they join the network.
DHCP
What rules help you indentify a valid IPv4 address?
- No octet in an IP address should ever be larger than 255.
- IP addresses starting with the number 127 are reserved for use as loopback addresses.
- The first number in an IP address should never be higher than 223.
The {blank} allows people to use easily recognizable names in place of IP address.
Domain Name System (DNS)
A domain name is a top-level name that may be registered by a company, organization, or individual (ex. certmike.com).
DNS is responsible for translating the {blank} addresses that are commonly used for websites into IP addresses associated with the servers supporting those sites.
uniform resource locator (URL)
A URL is the address of a specifif web page or other resource hosted on that domain (ex. www.certmike.com/cc/).
Network ports are particular locations on a system associated with a spefific application. Network ports are represented using a number ranging from 0 to 65,535.
What are the different ranges and how are they used?
- Ports between 0 and 1,023 are called well-known ports. These are reserved for common applications and assigned b internet authorities.
- Ports between 1,024 and 49,151nare known as registered ports. Application vendors can registor their applications to use these ports.
- Ports above 49,151are set aside as dynamic ports that applications can use on a temporary basis.
What is the port number for DNS?
Domain Name System
53
What are the port numbers for FTP?
File Transfer Protocol
20/21
What is the port number for HTTP (unencrypted)?
Hyper Text Transfer Protocol
80
What is the port number for HTTPS (encrypted)?
Hyper Text Transfer Protocol Secure
443
What is the port number for Microsoft SQL Server Databases?
1433
What is the port number for Oracle Databases?
1521
What is the port number for RDP?
Remote Desktop Protocol
3389
What is the port numer for SMTP (unencrypted)?
Simple Mail Transfer Protocol
25
What is the port number for SMTP (encrypted)?
587
What is the port number for SSH?
Secure Shell
22
What are some best practices for protecting your wireless network?
- Disable SSID Broadcasting
- Change Default Passwords
- Authenticate Wi-Fi Users
- Wireless Encryption
What does SSID stand for?
Service Set Identifier
This is the name set to identify your wireless network.
What are ways to authenticate Wi-Fi users?
- Preshared Keys
- Enterprise Authentication
- Captive Portals
Preshared keys (PSK) are the simplest kind of wireless authentication and are commonly used on home Wi-Fi networks. In the preshared key approach, the network uses an encryption key to control access. It connect a device to the network a user must enter the the preshared key on the device.
What are some major limitations that prevent PSKs from being used on large networks?
- Changing the network encryption key. Each time the key changes, users have to reconfigure all wireless devices with the new key.
- The use of a shared key prevents the identification of individuals users and the restriction of access by user identity.
The most common way to approach wireless authentication is through the use of {blank}. In this approach, the orginization runs an authentication server that verifies user credentials and ensures that only authorized users access the network.
Enterprise Authentication
Users would enter their individual username and password or provide other credentials to access the network.
{Blank} provide authentication on unencrypted wireless networks. When a user connects to a network using this, they are redirected to a web page that requires them to authenticate before gaining access to the network.
Captive Portals
What are the wireless encryption standards and security status?
- Open Network – Insecure
- WEP – Insecure
- WPA – Insecure
- WPA2 – Secure
- WPA3 – Secure
{Blank} use the dotted quad notation of four integers ranging from 0 to 255 separated by periods.
IPv4 addresses
{Blank} use eight groups of for hexadecimals digits separated by colons.
IPv6 addresses
You are assigning a host address to a new system on a network using a static IP address assignment. Which one of the following is a valid IP address?
A. 12.274.15.4
B. 127.19.6.200
C. 194.243.129.144
D. 240.1.15.2
194.243.129.144
Tom is configuring a Wi-Fi network for a user who will be working from home. He would like to configure the network so that it is as strongly protected from eavesdropping as possible. Which encrytion standard should Tom use?
A. WEP
B. WPA2
C. WPA3
D. WPA4
WPA3