Chapter 13: Computer Networking Flashcards

Understand Computer Networking

1
Q

{Blank} connect devices that are in the same building so they can talk to each other and to servers, printers, and other devices located in the office.

A

Local Area Networks (LANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

{Blank} connect offices in different locations and also connect users to the internet.

A

Wide Area Networks (WANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The TCP/IP suite is made up of what two protocols?

A
  1. Transmission Control Protocol (TCP)
  2. Internet Protocol (IP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

{Blank} is responsible for routing information over the internet. It is used on the Internet and LAN.

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP assigns each computer on the network it own address, called an {blank}.

A

IP address

IP Addresses umiquely identify computers on a network and are they way that computers identify each other on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When data travels on a TCP/IP network, the Internet Protocol breaks it up into small pieces called {blank}.

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

{Blank} is responsible for setting up and tearing down connections between source and desination systems.

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The {blank} is an alternative to TCP. It has less overhead but does not gurantee the delivery of packets from one system to another.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The {blank} is the housekeeping protocol of the Internet. It’s designed to allow networked devices and systems to communicate with each other about the operation of the network.

A

Internet Control Message Protocol (ICMP)

ICMP can be used to detect whether remote systems are live on the network, to discover the network path between two systems, and to report issues with network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the seven layers of the Open Systems Interconnection (OSI) model?

A
  1. Physical
  2. Data link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Model

The first layer, the {blank}, is responsible for sending bits over the network using wires, radio waves, fiber optics, and other means.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI Model

The second layer, the {blank}, transfer data between two nodes connected to the same physical network.

A

Data-Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Model

The third layer, the {blank}, expands networks to many different nodes. The Internet Protocol works at this layer.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Model

The fourth layer, the {blank}, creates connections betweeen systems and transfer data in a reliable manner. TCP and UDP are at this layer.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI Model

The fifth layer, the {blank}, manages the exchange of communications between systems.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI Model

The sixth layer, the {blank}, translates data so that it can be transmitted on a network. This layer determines how to represent a character in terms of bits and performs encryption and decryption

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI Model

The seventh layer, the {blank}, determines how users interact with the data, using web browsers and other client applications. Protocols like HTTP, SMTP, and SSH exist at this layer.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The folowing two IP address are invilved in every network communication:
* The {blank} indicates the system sending information.
* The {blank} indicates the system reciving information.

A
  • Source address
  • Destination address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP addresses can be assigned in to ways:
* You can assign an IP address {blank}.
* You can assign an IP address {blank} by using the Dynamic Host Configuration Protocol (DHCP).

A
  • Statically
  • Dynamically
20
Q

{Blank} allows you to configure a pool of IP addresses, and then it will automatically assign those adresses to systems as they join the network.

21
Q

What rules help you indentify a valid IPv4 address?

A
  • No octet in an IP address should ever be larger than 255.
  • IP addresses starting with the number 127 are reserved for use as loopback addresses.
  • The first number in an IP address should never be higher than 223.
22
Q

The {blank} allows people to use easily recognizable names in place of IP address.

A

Domain Name System (DNS)

A domain name is a top-level name that may be registered by a company, organization, or individual (ex. certmike.com).

23
Q

DNS is responsible for translating the {blank} addresses that are commonly used for websites into IP addresses associated with the servers supporting those sites.

A

uniform resource locator (URL)

A URL is the address of a specifif web page or other resource hosted on that domain (ex. www.certmike.com/cc/).

24
Q

Network ports are particular locations on a system associated with a spefific application. Network ports are represented using a number ranging from 0 to 65,535.

What are the different ranges and how are they used?

A
  • Ports between 0 and 1,023 are called well-known ports. These are reserved for common applications and assigned b internet authorities.
  • Ports between 1,024 and 49,151nare known as registered ports. Application vendors can registor their applications to use these ports.
  • Ports above 49,151are set aside as dynamic ports that applications can use on a temporary basis.
25
Q

What is the port number for DNS?

Domain Name System

26
Q

What are the port numbers for FTP?

File Transfer Protocol

27
Q

What is the port number for HTTP (unencrypted)?

Hyper Text Transfer Protocol

28
Q

What is the port number for HTTPS (encrypted)?

Hyper Text Transfer Protocol Secure

29
Q

What is the port number for Microsoft SQL Server Databases?

30
Q

What is the port number for Oracle Databases?

31
Q

What is the port number for RDP?

Remote Desktop Protocol

32
Q

What is the port numer for SMTP (unencrypted)?

Simple Mail Transfer Protocol

33
Q

What is the port number for SMTP (encrypted)?

34
Q

What is the port number for SSH?

Secure Shell

35
Q

What are some best practices for protecting your wireless network?

A
  • Disable SSID Broadcasting
  • Change Default Passwords
  • Authenticate Wi-Fi Users
  • Wireless Encryption
36
Q

What does SSID stand for?

A

Service Set Identifier

This is the name set to identify your wireless network.

37
Q

What are ways to authenticate Wi-Fi users?

A
  • Preshared Keys
  • Enterprise Authentication
  • Captive Portals
38
Q

Preshared keys (PSK) are the simplest kind of wireless authentication and are commonly used on home Wi-Fi networks. In the preshared key approach, the network uses an encryption key to control access. It connect a device to the network a user must enter the the preshared key on the device.

What are some major limitations that prevent PSKs from being used on large networks?

A
  • Changing the network encryption key. Each time the key changes, users have to reconfigure all wireless devices with the new key.
  • The use of a shared key prevents the identification of individuals users and the restriction of access by user identity.
39
Q

The most common way to approach wireless authentication is through the use of {blank}. In this approach, the orginization runs an authentication server that verifies user credentials and ensures that only authorized users access the network.

A

Enterprise Authentication

Users would enter their individual username and password or provide other credentials to access the network.

40
Q

{Blank} provide authentication on unencrypted wireless networks. When a user connects to a network using this, they are redirected to a web page that requires them to authenticate before gaining access to the network.

A

Captive Portals

41
Q

What are the wireless encryption standards and security status?

A
  • Open Network – Insecure
  • WEP – Insecure
  • WPA – Insecure
  • WPA2 – Secure
  • WPA3 – Secure
42
Q

{Blank} use the dotted quad notation of four integers ranging from 0 to 255 separated by periods.

A

IPv4 addresses

43
Q

{Blank} use eight groups of for hexadecimals digits separated by colons.

A

IPv6 addresses

44
Q

You are assigning a host address to a new system on a network using a static IP address assignment. Which one of the following is a valid IP address?

A. 12.274.15.4
B. 127.19.6.200
C. 194.243.129.144
D. 240.1.15.2

A

194.243.129.144

45
Q

Tom is configuring a Wi-Fi network for a user who will be working from home. He would like to configure the network so that it is as strongly protected from eavesdropping as possible. Which encrytion standard should Tom use?

A. WEP
B. WPA2
C. WPA3
D. WPA4