Chapter 13: Computer Networking Flashcards

Understand Computer Networking

1
Q

{Blank} connect devices that are in the same building so they can talk to each other and to servers, printers, and other devices located in the office.

A

Local Area Networks (LANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

{Blank} connect offices in different locations and also connect users to the internet.

A

Wide Area Networks (WANs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The TCP/IP suite is made up of what two protocols?

A
  1. Transmission Control Protocol (TCP)
  2. Internet Protocol (IP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

{Blank} is responsible for routing information over the internet. It is used on the Internet and LAN.

A

Internet Protocol (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IP assigns each computer on the network it own address, called an {blank}.

A

IP address

IP Addresses umiquely identify computers on a network and are they way that computers identify each other on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When data travels on a TCP/IP network, the Internet Protocol breaks it up into small pieces called {blank}.

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

{Blank} is responsible for setting up and tearing down connections between source and desination systems.

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The {blank} is an alternative to TCP. It has less overhead but does not gurantee the delivery of packets from one system to another.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The {blank} is the housekeeping protocol of the Internet. It’s designed to allow networked devices and systems to communicate with each other about the operation of the network.

A

Internet Control Message Protocol (ICMP)

ICMP can be used to detect whether remote systems are live on the network, to discover the network path between two systems, and to report issues with network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the seven layers of the Open Systems Interconnection (OSI) model?

A
  1. Physical
  2. Data link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSI Model

The first layer, the {blank}, is responsible for sending bits over the network using wires, radio waves, fiber optics, and other means.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OSI Model

The second layer, the {blank}, transfer data between two nodes connected to the same physical network.

A

Data-Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Model

The third layer, the {blank}, expands networks to many different nodes. The Internet Protocol works at this layer.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OSI Model

The fourth layer, the {blank}, creates connections betweeen systems and transfer data in a reliable manner. TCP and UDP are at this layer.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI Model

The fifth layer, the {blank}, manages the exchange of communications between systems.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI Model

The sixth layer, the {blank}, translates data so that it can be transmitted on a network. This layer determines how to represent a character in terms of bits and performs encryption and decryption

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI Model

The seventh layer, the {blank}, determines how users interact with the data, using web browsers and other client applications. Protocols like HTTP, SMTP, and SSH exist at this layer.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The folowing two IP address are invilved in every network communication:
* The {blank} indicates the system sending information.
* The {blank} indicates the system reciving information.

A
  • Source address
  • Destination address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IP addresses can be assigned in to ways:
* You can assign an IP address {blank}.
* You can assign an IP address {blank} by using the Dynamic Host Configuration Protocol (DHCP).

A
  • Statically
  • Dynamically
20
Q

{Blank} allows you to configure a pool of IP addresses, and then it will automatically assign those adresses to systems as they join the network.

21
Q

What rules help you indentify a valid IPv4 address?

A
  • No octet in an IP address should ever be larger than 255.
  • IP addresses starting with the number 127 are reserved for use as loopback addresses.
  • The first number in an IP address should never be higher than 223.
22
Q

The {blank} allows people to use easily recognizable names in place of IP address.

A

Domain Name System (DNS)

A domain name is a top-level name that may be registered by a company, organization, or individual (ex. certmike.com).

23
Q

DNS is responsible for translating the {blank} addresses that are commonly used for websites into IP addresses associated with the servers supporting those sites.

A

uniform resource locator (URL)

A URL is the address of a specifif web page or other resource hosted on that domain (ex. www.certmike.com/cc/).

24
Q

Network ports are particular locations on a system associated with a spefific application. Network ports are represented using a number ranging from 0 to 65,535.

What are the different ranges and how are they used?

A
  • Ports between 0 and 1,023 are called well-known ports. These are reserved for common applications and assigned b internet authorities.
  • Ports between 1,024 and 49,151nare known as registered ports. Application vendors can registor their applications to use these ports.
  • Ports above 49,151are set aside as dynamic ports that applications can use on a temporary basis.
25
What is the port number for DNS? ## Footnote Domain Name System
53
26
What are the port numbers for FTP? ## Footnote File Transfer Protocol
20/21
27
What is the port number for HTTP (unencrypted)? ## Footnote Hyper Text Transfer Protocol
80
28
What is the port number for HTTPS (encrypted)? ## Footnote Hyper Text Transfer Protocol Secure
443
29
What is the port number for Microsoft SQL Server Databases?
1433
30
What is the port number for Oracle Databases?
1521
31
What is the port number for RDP? ## Footnote Remote Desktop Protocol
3389
32
What is the port numer for SMTP (unencrypted)? ## Footnote Simple Mail Transfer Protocol
25
33
What is the port number for SMTP (encrypted)?
587
34
What is the port number for SSH? ## Footnote Secure Shell
22
35
What are some best practices for protecting your wireless network?
* Disable SSID Broadcasting * Change Default Passwords * Authenticate Wi-Fi Users * Wireless Encryption
36
What does SSID stand for?
Service Set Identifier ## Footnote This is the name set to identify your wireless network.
37
What are ways to authenticate Wi-Fi users?
* Preshared Keys * Enterprise Authentication * Captive Portals
38
Preshared keys (PSK) are the simplest kind of wireless authentication and are commonly used on home Wi-Fi networks. In the preshared key approach, the network uses an encryption key to control access. It connect a device to the network a user must enter the the preshared key on the device. What are some major limitations that prevent PSKs from being used on large networks?
* Changing the network encryption key. Each time the key changes, users have to reconfigure all wireless devices with the new key. * The use of a shared key prevents the identification of individuals users and the restriction of access by user identity.
39
The most common way to approach wireless authentication is through the use of {blank}. In this approach, the orginization runs an authentication server that verifies user credentials and ensures that only authorized users access the network.
Enterprise Authentication ## Footnote Users would enter their individual username and password or provide other credentials to access the network.
40
{Blank} provide authentication on unencrypted wireless networks. When a user connects to a network using this, they are redirected to a web page that requires them to authenticate before gaining access to the network.
Captive Portals
41
What are the wireless encryption standards and security status?
* Open Network -- Insecure * WEP -- Insecure * WPA -- Insecure * WPA2 -- Secure * WPA3 -- Secure
42
{Blank} use the dotted quad notation of four integers ranging from 0 to 255 separated by periods.
IPv4 addresses
43
{Blank} use eight groups of for hexadecimals digits separated by colons.
IPv6 addresses
44
You are assigning a host address to a new system on a network using a static IP address assignment. Which one of the following is a valid IP address? A. 12.274.15.4 B. 127.19.6.200 C. 194.243.129.144 D. 240.1.15.2
194.243.129.144
45
Tom is configuring a Wi-Fi network for a user who will be working from home. He would like to configure the network so that it is as strongly protected from eavesdropping as possible. Which encrytion standard should Tom use? A. WEP B. WPA2 C. WPA3 D. WPA4
WPA3