Chapter 2 Networking Flashcards

1
Q

Computers use port numbers to:

A

identify protocols and keep the different processes sorted out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The protocol HTTP does what?

A

Makes the connection to the web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does the protocol HTTP work?

A

It selects an unused port on the computer (known as an outbound port) to send and receive data to and from a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an inbound port?

A

It is a port used by the websites web server that is open at all times, ready to accept sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission Control Protocol (TCP) sessions are known as:

A

connection-oriented sessions (this means that every packet that is sent is checked for delivery)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

User Datagram Protocol (UDP) sessions are known as:

A

connectionless sessions (this means the messages are sent without an expectation of communication from the receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UDP is used in:

A

streaming media sessions, such as Voice over IP (VoIP) and gaming

and for protocols that use a simple query and response, such as DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When is UDP better than TCP?

A

for time-sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When is TCP more beneficial than UDP?

A

When reliability is important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port Number(s), Port Type

FTP

A

20 & 21, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Port Number(s), Port Type

SSH

A

22, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Port Number(s), Port Type

Telnet

A

23, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port Number(s), Port Type

SMTP

A

25, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Port Number(s), Port Type

DNS

A

53, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port Number(s), Port Type

HTTP

A

80, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port Number(s), Port Type

POP3

A

110, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port Number(s), Port Type

IMAP

A

143, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port Number(s), Port Type

HTTPS

A

443, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port Number(s), Port Type

RDP

A

3389, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Port Number(s), Port Type

NetBIOS/NetBT

A

137-139, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Port Number(s), Port Type

SMB/CIFS

A

445, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Port Number(s), Port Type

SLP

A

427, TCP/UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port Number(s), Port Type

AFP

A

548, TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Port Number(s), Port Type

DHCP

A

67/68, UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Port Number(s), Port Type LDAP
389, TCP/UDP
26
Port Number(s), Port Type SNMP
161/162, TCP/UDP
27
File Transfer Protocol is a protocol used by:
both web browsers and specialized FTP programs to access dedicated file transfer servers for file downloads and uploads
28
What do you have to do in the command-line FTP program in both Windows and Linux?
type ftp press enter type help
29
If any credentials are required for the FTP, they are typically:
the username anonymous and the user's email as a password
30
Some FTP sites require the user to log in with:
a specified username and password
31
FTP is not considered secure because:
FTP users can authenticate in clear-test sign-ins
32
For greater security, you can use FTP secured with:
SSL/TLS (FTPS) or Secure File Transfer Protocol (SFTP)
33
Secure Shell (SSH) allows:
data to be exchanged computers on a secured channel
34
What protocol is more secure than FTP and Telnet?
Secure Shell
35
Secure FTP combats | FTP lack of security by providing:
file access over a reliable data stream, generated and protected by SSH
36
Telnet enables:
a user to make a text-based connection to a remote computer or networking device and use it as if he were a regular user sitting in front of it rather than simply downloading pages and files he would with an http:// or ftp:// connection
37
Windows and Linux contain a command-line Telnet program. To open a connection to a remote computer:
open a command prompt (Windows) or Terminal session (Linux) and type telnet and press the enter key
38
Simple Mail Transfer Protocol (SMTP) is used to:
send email from a client system to an email server, which also uses SMTP to relay the message to the receiving email server
39
Domain Name System (DNS) is the name for:
the network of servers on the Internet that translate domain names and individual hostnames into their corresponding IP addresses
40
Hypertext Transfer Protocol (HTTP) is the protocol used by:
web browsers, such as Internet Explorer, Microsoft Edge, Firefox, and Chrome, to access websites and content
41
Hypertext Transfer Protocol Secure or HTTP over SSL (HTTPS) are:
sites that are secured with various encryption schemes
42
What are the two leading protocols for receiving email?
Post Office Protocol version (POP3) Internet Message Access Protocol (IMAP)
43
What happens to the email in an email system based on POP3?
email is downloaded from the mail server to folders on a local system
44
POP3 is not a suitable email protocol for:
users who frequently switch between computers and mobile devices because email might be spread over computers
45
Users who utilize POP3 servers to retrieve email typically use SMTP for what?
to send messages
46
Internet Message Access Protocol (IMAP) is:
an email protocol that enables messages to remain on the email server so they can be retrieved from any location
47
IMAP also supports folders, so users can:
organize their messages as desired
48
What is the current version of IMAP?
IMAP4
49
To configure an IMAP-based email account you must:
select IMAP as the email server type and specify the name of the server, your username and password, and whether the server uses SSL
50
NetBIOS is also known as:
NetBT (RFC 1001)
51
NetBIOS is a protocol that:
allows some legacy applications that were developed in the 1980s to work on larger networks and the Internet
52
Server Message Block (SMB) provides:
access to shared items such as files and printers
53
Server Message Block (SMB) uses:
packets that authenticate remote computers through what are known as interprocess communication mechanisms
54
Server Message Block (SMB) uses ports 137-139 for:
SMB traffic using NetBIOS over TCP (NetBT)
55
Server Message Block (SMB) uses port 445 for:
SMB hosted on TCP
56
Port 445 is used by:
Server Message Block SMB) Common Internet File System (CIFS)
57
Common Internet File System (CIFS) is an:
enhanced version of Microsoft SMB, which is an open, cross-platform protocol
58
Common Internet File System (CIFS) has now been widely replaced by:
updated versions of SMB (SMB 2.0 and 3.0)
59
Service Location Protocol (SLP) was designed to:
allow networked hosts to find services of other devices such as printers on the local network
60
With Service Location Protocol (SLP), devices providing services can:
announce their presence to hosts and provide configuration information
61
Apple Filing Protocol (AFP) was previously known as:
Apple-Talk Filing Protocol
62
Apple Filing Protocol (AFP) uses:
TCP/IP for transport
63
The Remote Desktop Protocol (RDP) is used by:
Remote Desktop Services (RDS), which is the Windows Server-based companion of Remote Desktop Connection
64
Dynamic Host Configuration Protocol (DHCP) is used to:
automatically assign IP addresses to hosts
65
In most SOHO networks, a router uses:
Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to the client computers
66
You ISP uses:
DHCP to assign an IP address to you, and usually your router gets this address
67
Dynamic Host Configuration Protocol (DHCP) service makes life easier for a network administrator:
by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on
68
If you get your address from a Dynamic Host Configuration Protocol (DHCP) server, you are getting:
your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically
69
Simple Network Management Protocol (SNMP) is used as:
the standard for managing and monitoring devices on a network
70
Simple Network Management Protocol (SNMP) manages:
routers, switches, and computers and is often incorporated into software known as a network management system (NMS)
71
What is the main software that controls everything Simple Network Management Protocol (SNMP) based?
Network management system (NMS)
72
Network management system (NMS) is installed on a computer known as:
a manager
73
The devices monitored by Network management system (NMS) is known as:
managed devices
74
Network management system (NMS) installs a small piece of software known as:
an agent
75
Lightweight Directory Access Protocol (LDAP) is used to:
access and maintain distributed directories of information such as the kind involved with Microsoft domains
76
Microsoft refers to Lightweight Directory Access Protocol (LDAP) as:
directory services
77
A router connects:
one network to another
78
Most routers sold for SOHO configurations are:
WiFi (802.11 family) wireless routers with integrated Fast Ethernet or Gigabit Ethernet switches
79
The switches built into routers are:
stackable
80
If a router needs more ports, you can add a:
switch
81
Routers are:
specialized computing devices that are controlled by firmware
82
When you log into a router to view or change its configuration:
the options available are limited by the router's firmware
83
Buggy firmware can cause:
network problems and can make a network more vulnerable to attack
84
DD-WRT is:
the most popular replacement firmware for routers, and some vendors now use it in their high-end routers
85
A switch provides:
connectivity to devices in a local network
86
Each port on a switch works:
independently, allowing more than one concurrent session
87
A switch makes:
a direct connection between the sending and receiving devices by identifying the Media Access Control (MAC) address of each device
88
In today's networks, switches are very common in:
100Mbps, 1000Mbps, and 10Gbps networks
89
Switches can be stacked to:
increase the number of connection ports in a network
90
Stacked switches are:
daisy-chained together, and in theory there is no limit to the number of switches possible in a network
91
A switch resembles a hub but:
creates a dedicated full-speed connection between the two computers that are communicating with each other
92
Low-cost switches used in SOHO networks cannot be:
configured to perform complex switching functions and are considered unmanaged
93
Managed switches are common in:
corporate and enterprise networks
94
Managed switches support:
Simple Network Mail Protocol (SNMP) for diagnostics and performance measurement, virtual LANs (VLANs) to enable multiple workgroups to use the same physical switch but keep their traffic separate, and redundancy
95
Wireless access point (WAP) extends:
a wired network to wireless connections
96
Wireless access point (WAP) is based on:
Ethernet, but involves the IEEE 802.11 group of standards, which define wireless LANs (WLANs)
97
A Wireless access point (WAP) acts as a:
central connecting point for computers equipped with wireless network adapters, like a switch
98
A Wireless access point (WAP) identifies each computer by:
its MAC address
99
Using a cloud-based controller, administrators can:
manage wireless LANs and branch offices that are located anywhere on the Internet from a central location
100
A firewall is a:
hardware appliance or software application that protects a computer from unwanted intrusion
101
In SOHO, firewall functionality is usually built into:
the router
102
In larger organizations, firewall functionality is usually built into:
a device separate from the router
103
A firewall stops:
unwanted connections from the outside and can block basic network attacks
104
A network interface card (NIC) is:
the interface on a computer (or other device) that connects to the LAN
105
A network interface card (NIC) was traditionally a:
circuit board (card) that mounted to the motherboard
106
A network interface card (NIC) is now:
built-in interfaces
107
A network interface card (NIC) connects to:
a cable with an RJ-45 connecter
108
The network interface card (NIC) is designed to:
take communication off the physical cable (or wireless signal from the air) and present it to the computer for processing
109
A network interface card (NIC) has a:
unique physical address, known as a MAC address, that identifies the device to other hosts on the network
110
network interface card (NIC) have evolved to also provide:
wireless and virtual access to networks
111
Wireless network signals can be blocked by:
masonry steel concrete walls
112
Wireless network signals can be weaken:
over distance
113
A signal repeater or extender can:
enable areas of weak or no signals to take advantage of a wireless network
114
A wireless repeater resembles:
a wireless router and might include a switch, but instead of connecting a cable or DSL modem, it connects wirelessly to a wireless router
115
A hub is the simplest device used on:
an Ethernet network for connecting devices to each other
116
A hub features:
multiple RJ-45 ports a power supply signal lights to indicate network activity
117
Hubs were used to:
connect computers together and to boost the communication signal between computers
118
Hubs have been almost completely replaced by switches because:
a hub splits the bandwidth of a connection among all the computers connected to it
119
A hub broadcasts data to:
all computers connected to it
120
A modem connects:
a LAN to an Internet service provider (ISP)
121
A dial-up modem is:
a device that allows a computer access to the Internet by changing the digital signals of the computer to analog signals used by a typical land-based phone line
122
Dial-up modems are:
slow devices and are usually used today only if no other Internet option is available
123
The devices most commonly used to connect small networks to the Internet are:
Cable modems DSL modems
124
A wireless bridge is:
a device (or a setting on many access points) that is used to connect two wireless LANs together in order to expand a wireless network or to connect wireless clients to an Ethernet network
125
A patch panel is a:
box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks
126
Patch panels are typically built into:
wiring closets or added to equipment racks in a 1U or taller form factor
127
After removing any connector on the cable, each wire in the TP cable must be:
untwisted before being punched into the appropriate connection on the back of the panel
128
The twisted cables are color codes so:
they can be properly terminated at the other end
129
The most common standards for color-coding for twisted cables are:
T568A or T568B
130
The front of the patch panel uses:
RJ-45 connectors for short standard network cables
131
Powerline adapters are sold in:
pairs
132
Where are the powerline adapter pairs plugged into?
One unit into an AC wall socket near the router and is connected to the router via a switch One unit plugs into an AC wall socket in the room or area that needs network/Internet access
133
With a wired extender, you can plug:
a computer or switch into the Ethernet port
134
With a wireless extender you need to:
log into the network via the wireless extender's SSID
135
A Power over Ethernet (PoE) switch is a:
switch with added capability (a built-in endspan) to send power out a port using CAT5 or better grades of twisted pair cable
136
A Power over Ethernet (PoE) enables:
wireless access points IP security cameras VoIP phones routers other Ethernet devices to be installed in areas away from traditional power sources
137
A power over Ethernet injector installed:
between a standard Ethernet switch and a PoE device to provide power only
138
Wireless Ethernet is also known as:
IEEE 802.11 WiFi
139
Wireless Ethernet is:
the collective name for a group of wireless technologies compatible with wired Ethernet
140
Wireless technologies compatible with wired Ethernet is referred to:
wireless LAN (WLAN) standards
141
A SOHO wired or wireless router can provide:
a secure way for users to access the Internet and local network resources
142
A SOHO wired or wireless router can become a magnet for:
attack
143
To connect to a router open a browser and enter:
the IP address of the router in the address bar and press Enter
144
The wireless spectrum is divided into:
11 channels
145
Part of installing a router on a 2.4GHz wireless network is:
selecting an appropriate channel for the signal For best results, avoid overlapping channels
146
What channels do not overlap with other channels?
1 6 11
147
Some routers feature an Auto setting that enables:
the router to use the least-active channel
148
To change the channel used by a wireless network follow these steps:
1. Log into the router 2. Navigate the wireless configuration dialog 3. Select a different channel (typically 1, 6, or 11 when using 2.4GHz networking because they have less interference than other channels) 4. Save your changes and exit the wireless configuration dialog
149
Network address translation (NAT) is the process of:
modifying IP addresses as information crosses a router
150
Network address translation (NAT) hides:
an entire IP address space on the LAN
151
Whenever an IP address on the LAN wants to communicate with the Internet, the IP address is:
converted to the public IP address of the router
152
SOHO routers perform Network address translation (NAT) automatically when:
connected to an IPv4 network
153
Port forwarding involves:
forwarding external visitors through a router to a specific computer
154
Instead of opening the entire LAN, port forwarding directs:
particular traffic where you want it to go
155
Port forwarding is also called:
destination network address translation (DNAT)
156
Port triggering involves:
a particular service opening an outgoing port or range of ports on demand
157
Port triggering can be used without:
being tied to a specific IP address
158
A demilitarized zone (DMZ) allows:
outside traffic through a particular IP address on a LAN
159
Ina SOHO router, any device assigned to the DMZ receives:
traffic that is not specified for a particular device
160
Using a DMZ host makes sense for:
gaming and other types of traffic where you cannot specify in advance the ports needed
161
The DMZ host must have its own:
firewall because DMZ hosts are not protects by the router firewall
162
By default, SOHO routers have the:
DHCP service turned on so they can provide IP addresses to any wired or wireless devices that connect
163
Most routers enable you to:
specify the range and number of IP addresses available via DHCP
164
When do devices switch to Automatic Private IP Addressing (APIPA)?
When a router does not have sufficient IP addresses for the devices that need to connect to it, using the non-routable IP address range 169.254.x.x
165
A SOHO router comes with a:
default IP address known as a private address
166
Follow the steps to configure NIC in Windows:
1. Click the Windows icon and select the Windows Settings gear 2. In the Windows Settings window select the Network & Internet link 3. When you see the different connection options, select the one you want and click Change adapter options on the right side of the window 4. Choose the adapter you want to configure and click on the Properties button. A list of items available to the NIC are listed 5. Double-click on Internet Protocol Version 4 (TCP/IPv4). You now see the window where the IP address is configured dynamically or statically 6. Assign the address or leave the default DHCP options and click OK to accept any changes
167
A few examples of IoT are:
Thermostats Light switches Security cameras Door locks Voice-enabled smart speakers/digital assistants
168
Quality of service (QoS) is an important feature to:
enable on any network that provides streaming media, gaming, or VoIP services
169
Quality of service (QoS) priortizes:
real-time and streaming traffic
170
QoS can be configured by:
an ISP or by a router
171
Universal plug and play (UPnP) is a:
router feature that enables devices on a network to add themselves to a network without the need to reconfigure the router
172
Universal plug and play (UPnP) is widely used for:
media streaming across a network
173
Universal plug and play (UPnP) can be vulnerable to:
attacks
174
Encryption is a necessity for both:
SOHO wired or wireless routers and larger business wireless networks to preserve privacy and to prevent criminals from borrowing the network
175
Wired Equivalent Privacy (WEP) is the:
oldest and weakest WiFi encryption standard
176
If Wired Equivalent Privacy (WEP) is enabled, all:
network devices must use the same WEP key and encryption strength
177
Wired Equivalent Privacy (WEP) encryption key cannot:
include punctuation marks
178
Wired Equivalent Privacy (WEP) can be configured using a:
pre-shared key (PSK) or Open System Authentication (OSA)
179
Wifi Protected Access (WPA) uses:
a variable-length encryption key (up to 63 ASCII characters, including punctuation marks) Temporal Key Integrity Protocol (TKIP) 128-bit encryption
180
Wifi Protected Access (WPA) is much more secure than:
Wired Equivalent Privacy (WEP)
181
Wifi Protected Access (WPA) can use
PSK or RADIUS authentication server to generate unique keys
182
Wifi Protected Access (WPA) has been replaced by:
WPA2, but some routers can be configured to support both WPA an WPA2 clients on the same network
183
Wifi Protected Access 2 (WPA2) replaces:
Temporal Key Integrity Protocol with Advanced Encryption Standard (AES)
184
Advanced Encryption Standard (AES) is a:
128- to 256-bit encryption protocol used in technologies such as hard drive encryption as well as networking
185
Advanced Encryption Standard (AES) can be used exclusively or in conjunction with:
Temporal Key Integrity Protocol, which is the recommended option
186
Wifi Protected Access 2 (WPA2) certification is:
mandatory for all new devices that bear the WiFi trademark
187
WiFi Protect Setup (WPS) provides:
an easier way to configure a wireless network than entering the router's IP address on each device connecting to it
188
Routers that support WiFi Protect Setup (WPS) typically have the:
default WPS key on the bottom of the device
189
To use WiFi Protect Setup (WPS), use the:
setup software provided with a router on each computer and follow the directions on devices such as printers or multifunction devices
190
Note that WiFi Protect Setup (WPS) should be used:
only if all devices on a wireless network support it
191
There are two ways to use WiFi Protect Setup (WPS):
the default Pin method, in which the PIN on the router is used to set up clients, a pushbutton method, in which a physical or software button is pushed on the router and clients to set up the network
192
The PIN and the pre-shared key for WPS could be compromised by:
brute-force attacks
193
Encryption Type; Key Length; Key Rules; Strength Open
None; N/A; N/A; None
194
Encryption Type; Key Length; Key Rules; Strength Wired Equivalent Privacy (WEP)
RC4; 10 hex/5 ASCII characters (64-bit) or 26 hex/13 ASCII characters (128-bit); ASCII: alphanumeric (no punctuation); very weak
195
Encryption Type; Key Length; Key Rules; Strength WiFi Protected Access (WPA)
TKIP (128-bit); Up to 63 ASCII characters; Punctuation is okay, some devices can't use a full-length encryption key; Strong
196
Encryption Type; Key Length; Key Rules; Strength WiFi Protect Access 2 (WPA2)
AES (128-bit), Up to 63 ASCII characters; Punctuation is okay, some devices can't use a full-length encryption key; Very strong
197
What are the five different WiFi standards?
802. 11a 802. 11ac 802. 11b 802. 11g 802. 11n
198
Minimum speed(s); Maximum speed; frequency band 802.11b
5.5Mbps or slower if necessary; 11Mbps; 2.4GHz with 20MHz-wide channels
199
Minimum speed(s); Maximum speed; frequency band 802.11a
6Mbps to 48Mbps; 54Mbps; 5GHz
200
Minimum speed(s); Maximum speed; frequency band 802.11g
6Mbps to 48Mbps; 54Mbps; 2GHz, can optionally support 5GHz as well
201
Minimum speed(s); Maximum speed; frequency band 802.11n 2.4GHz
Doesn't specify; 72Mbps per stream (20MHz channel); 2.4GHz
202
Minimum speed(s); Maximum speed; frequency band 802.11ac
Doesn't specify; up to 433Mbps per stream when 80MHz-wide channels are used; 5GHz band and supports up to 80 MHz-wide channels
203
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With 802.11a
No; 35m/120m; 20MHz/12; Requires dual-mode (802.11a/b or 802.11a/g) hardware
204
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With 802.11b
No; 32m/140m; 20MHz/3; 802.11g
205
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With 802.11g
No; 32m/140m; 20MHz/3; 802.11b, 802.11n
206
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With 802.11n 2.4GHz
Yes; 70m/250m; 20MHz/3; 802.11b, 802.11g, 802.11 (on networks also supporting 5GHz frequency)
207
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With 802.11n 5GHz
Yes; 70m/250m; 20MHz or 40MHz/12; 802.11a (20MHz-wide channels only)
208
Minimum speed(s); Maximum speed; frequency band 802.11n 5GHz
Doesn't specify; 150Mbps per stream (40MHz channel); 5GHz
209
Compare 2.4GHz to 5GHz band:
2.4 GHz band has a longer range but may perform at slower speeds 5GHz band may provide faster rates has a shorter range 5GHz band is less used and has more channels than 2.4, and its channels do not overlap
210
Estimated Range; Channels; Advantages; Disadvantages 2.4GHz
50m (160 feet indoors); 11; Longer Range; Slower performance, channels easily overlap
211
Estimated Range; Channels; Advantages; Disadvantages 5GHz
15m (50 feet) indoors; 23; Shorter range; Faster performance, channels do not overlap
212
Multiple Input Multiple Output (MIMO) devices are available in the following configurations:
1x1 one transmit, one receive antenna 2x2 two transmit, two receive antenna 3x3 " " 4x4 " " 5x5 " "
213
Bluetooth runs in virtually:
the same 2.4GHz frequency used by IEEE 802.11(b,g, and n) wireless networks but use a spread-spectrum frequency-hopping signaling method to help minimize interference
214
Bluetooth version 1.2 offers:
a data transfer rate of 1Mbps
215
Bluetooth version 2 offers:
a data transfer rate of 3Mbps
216
Bluetooth version 3.0 + HS can reach:
speeds of up to 24Mbps because it uses Bluetooth only to establish the connection, and the actual data transfer happens over an 802.11 link known as Alternative MAC/PHY (AMP)
217
Bluetooth 5 can provide up to:
twice the speed and up to four times the range of Bluetooth 4 while keeping power consumption low
218
Bluetooth Classes Power (mW); Range Class 1
100mW; 100m (328 feet)
219
Bluetooth Classes Power (mW); Range Class 2
2.5mW; 10m (33 feet)
220
Bluetooth Classes Power (mW); Range Class 3
1mW; 1m (3 feet)
221
Class 1 Bluetooth generates:
the most powerful signal, and as such has the largest range
222
Near field communication (NFC) is:
a feature included in many mobile devices such as tablets for data transfer and shopping
223
Radio frequency identification (RFID) technology consists of:
an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use
224
Zigbee is similar to:
Bluetooth in that it is a near-range wireless protocol designed to allow communication using low power
225
Zigbee is most commonly used to:
connect IoT data-sharing devices in a home, industry, or medical environment
226
What are examples of a Zigbee device?
motion sensor leak sensor
227
What frequency does a Zigbee chip operate on?
2.4GHz
228
What is Z-Wave?
it is a more recent version of Zigbee that uses less power and operates on the much lower 908.42MHz frequency.
229
Zigbee and Z-Wave are not:
interoperable
230
Phone network Year Released; New Features 3G
1998; Video calling, High-speed Internet, More data
231
Phone network Year Released; New Features 4G
2008; Live streaming of HD TV, Video conferencing, 100Mbps Internet speed while moving and 1Gbps when stationary
232
Phone network Year Released; New Features LTE (Long-Term Evolution)
2010; Improved coverage, Faster speed
233
Phone network Year Released; New Features 5G
2019/2020; Much faster data, fewer delays
234
Web servers are:
specialized computers that host websites and provide various types of content to clients via the Internet
235
A web server uses HTTP to:
communicate with computers on other networks that are requesting information
236
A file server is used to:
provide shared storage on a network
237
A file server is typically:
a computer with a single large drive or a RAID array for storage
238
Dedicated servers are used only for:
storage
239
A non-dedicated server is a:
computer that shares storage and also performs standalone tasks
240
A network-attached storage (NAS) device is a:
special kind of file server designed to store large amounts of data in a central location for users on the network.
241
A print server manages:
the printing tasks for multiple users sharing one or more printers in an office
242
A Dynamic Host Configuration Protocol (DHCP) server supports:
Dynamic Host Configuration Protocol (DHCP), the protocol that automatically assigns IP addresses to connected devices on a network
243
Dynamic Host Configuration Protocol (DHCP) server functions are:
included in SOHO routers and are typical roles for domain controllers on small to medium business (SMB) networks
244
A proxy server is:
an intermediary between a client and another network, such as the Internet
245
A proxy server stores:
web pages that have been requested, and if a client requests a web page, the proxy server checks its cache for the page. If the page exists and is up to date, the proxy server used its cached copy to supply the client request
246
If the proxy server does not have the requested page:
it downloads the page on behalf of the client, sends the page to the client, and retains a copy of the page in its cache
247
A proxy server helps reduce:
traffic between a network and the Internet, and it can also be used to block requests for undesirable traffic
248
A mail server sends:
or receives email on a network
249
What servers are used to send outgoing email?
SMTP server
250
What servers are used to receive email?
POP3 server IMAP server
251
An authentication server is used to:
examine and verify or deny credentials to a user attempting to log into secured networks
252
Syslog servers track:
events that happen on devices (such as logins or crashes) on a network
253
Unified threat management (UTM) devices provide:
firewall remote access virtual private network (VPN) support web traffic filtering with anti-malware network-intrusion prevention
254
Unified threat management (UTM) devices unite:
the functions of several earlier devices and have largely replaced IDS and IPS devices
255
An intrusion detection system (IDS) device or program detects:
network intrusions that might not be detected by a firewall
256
Typical threats detected by an Intrusion detection system (IDS) includes:
attacks against services malware attacks data-driven attacks host-based attacks
257
To detect threats, a typical intrusion detection system (IDS) uses:
signature-based detection, detection of unusual activities (anomalies), and stateful protocol analysis
258
An intrusion detection system (IDS) or program must be:
updated frequently with new signatures and rules to maintain protection
259
An intrusion prevention system (IPS) uses:
methods similar to those used by an IDS, but unlike an IDS, an IPS blocks attacks
260
An end-point management server keeps:
track of devices using the network and ensures that they comply with the security parameters of the entire network
261
What are the end points on the end-point management server?
the end users the devices that use the network
262
The term legacy refers to:
things handed down from predecessors
263
Legacy systems are systems:
that use outdated operating systems, programming languages, applications, or hardware
264
How can the problem of maintaining old hardware be eliminated?
If the legacy operating system and its applications can be run in a virtualized environment
265
Embedded systems are:
dedicated computing devices used for specific tasks such as machine control, point-of-sale system, or ATMs, are often also legacy systems
266
The biggest risk to both legacy and embedded systems is:
security
267
When considering whether and when to update legacy systems or embedded systems, consider these issues:
1. Will the existing data be usable with newer apps? 2. Can the existing program run with current operating systems? 3. Will changes in network security, wireless, or Internet standards cause problems with the application? 4. Can a proprietary application be licensed to run in a virtual machine? 5. Does existing hardware used in the embedded system work with the new operating system? Does the embedded application run on current embedded operating systems? If not, is an updated version available?
268
The Internet protocol (IP) is the:
communication protocol that computers and other devices use to communicate with computers outside of their local networks
269
What are two current versions of IP addressing commonly in use today?
IPv4 IPv6
270
IP addresses are:
changeable, logical addresses and are assigned to devices for communicating outside their local networks
271
The term static means:
unchanging, or always the same
272
The term dynamic means:
constantly changing
273
Static IP address is assigned:
to a device by the administrator and not subject to change until reconfigured by the administrator
274
Dynamic (DHCP server-assigned) IP address is assigned:
by a DHCP server and will likely change each time a device leaves and then rejoins the network or when the address is used beyond its lease time and expires
275
What it Does; Static IP Address; Dynamic IP Address IP address
Identifies a computer on the network; unique value for each device; entered manually on the device; Automatically assigned by the DHCP server
276
What it Does; Static IP Address; Dynamic IP Address Subnet mask
Determines which bits in the IP address are the network portion and which are the host portion; entered manually on the device, but a default subnet mask appears when the IP address is assigned; Automatically assigned by the DHCP server
277
What it Does; Static IP Address; Dynamic IP Address DNS Configuration
Identifies Domain Name System servers; IP addresses of one or more DNS servers, hostname, and domain name must be entered; Automatically assigned by the DHCP server
278
What it Does; Static IP Address; Dynamic IP Address Gateway
Identifies IP address of device that connects the computer to the Internet or another network, same values for all devices on the network; IP address for the gateway must be entered; Automatically assigned by the DHCP server
279
To configure an IP address in Windows, access:
the Internet Protocol Properties window
280
To open the General tab of the Internet Protocol Properties window, open:
Network Connections, right-click the network connection, select Properties, click Internet Protocol v4 (TCP/IPv4) or TCP/IPv6 in the list of protocols and features, and click Properties
281
When will a device on a network assign themselves APIPA/link local addresses?
When the DHCP server becomes unavailable and an alternate IP address has not been set up
282
If a DHCP problem causes APIPA/link local addresses to be assigned, you can resolve the problem by checking the:
device's network connection and try using the ipconfig/release and ipconfig/renew commands at the command prompt
283
An IP address is divided into two sections:
the network portion, which is the number of the network the computer is on the host portion, which is the individual number of the computer
284
A subnet mask is used to:
distinguish between the network portion of the IP and the host portion
285
IP version 6 (IPv6) greatly increases:
the number of available IP addresses
286
IPv6 uses:
128-bit source and destination IP addresses that are each then divided into eight 16-bit blocks
287
What is zero compression?
When a sequence of 16-bit blocks of IPv6 addresses set to zero being represented by double colon (::)
288
An IPv6 address can only include one:
zero-compressed block
289
To test your network interface in Windows where IPv6 is enabled by default:
type ping::1 at a command prompt
290
IPv6 supports what types of addresses?
unicast multicast anycast
291
There are five types of unicast addresses:
Global unicast addresses Link local addresses Site local addresses Special addresses Compatibility addresses
292
Global unicast addresses are:
used in the same way as IPv4 public addresses.
293
How are the bits comprised in a Global unicast address?
first 3 bits are set to 001 the following 45 bits are used for the global routing prefix the collective 48 bits are known as the public topology The subnet ID uses the next 16 bits The interface uses the remaining 64 bits
294
Link local addresses correspond to:
the Automatic Private IP Addressing (APIPA) address scheme used by IPv4 (addresses that start with 169.254)
295
How are the bits comprised in a link local address?
the first 10 bits are set to FE80 hex the next 54 are 0s the following 54 bits are for the interface ID
296
Site local addresses correspond to:
IPv4 private address spaces (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16)
297
Special addresses include
unspecified addresses (0:0:0:0:0:0:0:0 or ::) and indicates the absence of an IP address; a loopback address (0:0:0:0:0:0:0:1 or ::1)
298
Compatibility addresses are used in:
situations in which IPv4 and IPv6 are both in use
299
The term one-to-one-to-many association is used to describe:
anycast addressing sends information to a group of potential receivers that are identified by the same destination address
300
To view IP information on Linux:
Open Terminal use the command ifconfig-a
301
Two scripts need to be edited in Terminal on Linux:
ifcfg-connection name (used to identify IP addresses) the file resolv.conf (used to identify DNS servers)
302
The most common types of VPNs are:
PPTP L2TP/IPsec
303
PPTP uses:
128-bit encryption
304
L2TP uses:
256-bit encryption
305
Virtual local area network (VLAN) is a:
grouping of some computers on a local area network (LAN) that are configured to behave as if they have their own separate LAN
306
Usually LANs are separated by:
a router, but a switch may have the capability of grouping ports together to behave like a LAN inside the switch
307
List the fastest to slowest wired network connection speeds:
Fiber Cable DSL ISDN Dial-up
308
List the fastest to slowest wireless network connection speeds:
Cellular Fixed line-of-sight Satellite
309
Cable is:
broadband Internet service that is provided by a cable TV company
310
Cable can deliver:
voice, data, and video at one time
311
Cable Internet can reach what download speeds?
3Mbps up to 300Mbps or faster
312
Cable Internet can reach what upload speeds?
10-20% of download speeds but vary by vendor
313
Digital Subscriber Line (DSL) was originally designed to:
work on the same telephone line used by a telephone and fax machine if the telephone line can carry a digital signal
314
For home use, DSL is designed:
strictly for Internet access
315
For business use, DSL is designed:
for Internet access and can be used for additional services and can be used in site-to-site scenarios between organizations
316
Two major types of DSL use telephone lines are:
Asynchronous DSL (ADSL) Synchronous DSL (SDSL)
317
Two newer types of DSL are:
Very High Bit-Rate Digital Subscriber Line (VDSL) Very High Bit-Rate Digital Subscriber Line 2 (VDSL2)
318
Both VDSL and VDSL2 use:
fiber for at least part of the signal path
319
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service ADSL
Existing telephone line; Yes; 384Kbps to 24Mbps; 128Kbps to 3.3Mbps; No
320
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service SDSL
New telephone line; No; 384 Kbps to 2.0Mbps; 384Kbps to 2.0Mbps; No
321
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service VDSL
Fiber+telephone line; No; Up to 55Mbps; 15Mbps; Yes
322
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service VDSL2
Fiber+telephone line; No; Up to 200Mbps; Up to 100Mbps; Yes
323
A DSL modem is used to:
connect a computer to DSL service
324
A DSL modem connects to:
a PC through the RJ-45 (Ethernet) port or the USB port
325
A Point-to-Point Protocol over Ethernet (PPPoE) connection requires:
the user to make a connection with a username and password
326
Until the late 1990s, dial-up networking (DUN) was the most:
common way for home and small businesses to connect to the Internet
327
Today, dial-up connections are used:
when no other Internet connection is available
328
Dial-up is sometimes referred to as:
public switched telephone network (PSTN) plain old telephone service (POTS)
329
Dial-up is relatively slow, with rates ranging from:
28.8Kbps to 56Kbps
330
A disadvantage of telephone dial-up is that:
voice and data cannot share the wire simultaneously
331
Fiber connections to the home (FTTH) or Fiber to the premises (FTTP) network download speeds can reach:
up to 2Gbps
332
An optical network terminal (ONT) is used to:
convert the fiber connection entering a home and the Ethernet or coaxial WAN connection to connect a router or gateway
333
An optical network terminal (ONT) is supplied by:
the fiber provider and installed in the home
334
Satellite Internet uses:
dish antennas to receive and transmit signals between geosynchronous satellites and computers
335
Satellite modems are:
external devices used to connect computers to satellite dishes
336
The FCC requires:
professional installation for satellite Internet service because an incorrectly aligned satellite dish with uplink capabilities could cause a service outage on the satellite it's aimed at
337
Integrated Services Digital Network (ISDN) was originally:
developed to provide an all-digital method for connecting multiple telephone and telephony-type devices to a single telephone line and to provide a faster connection for teleconferencing for remote computer uses
338
To make an ISDN connection:
a PC needs a device called an ISDN terminal adapter (TA)
339
There are two types of ISDN connections:
Primary Rate Interface (PRI) Basic Rate Interface (BRI)
340
A Primary Rate Interface (PRI) connection provides:
1.536Mbps of bandwidth
341
A Basic Rate Interface (BRI) connection provides:
64Kbps (single-channel) or 128Kbps (dual-channel)
342
To use USB tethering, follow these steps:
1. Connect a USB cable from your computer to the data port on your device 2. Select the USB tethering option on your device 3. If you are connecting a Windows computer, select the network type (Home) on the computer when prompted 4. Use your computer's web browser and other network features as usual 5. When you're finished, disable USB tethering
343
To use the mobile hotspot feature, follow these steps
1. Enable the mobile hotspot feature in the device's setup 2. Select how you want to share the connection wirelessly. Provide the SSID and password listed to any devices that will share the connection 3. If you decide the permit only allows devices to connect, you must provide a name for each device and its MAD address. The MAC address is listed on a label attached to an external adapter 4. Open the Allowed Devices, click Add, enter the device name and address, and click OK 5. Make the connection from your device just as you would with any other wireless Internet router or hotspot 6. When your devices are finished using the Internet, disable the hotspot setting in your smartphone or tablet
344
Line-of-sight wireless is sometimes referred to:
as terrestrial wireless
345
Line-of-sight involves:
using small antennas to connect users to Internet service transmitted from microwave towers
346
A network is:
a group of computers, peripherals, and software that are connected to each other and can be used together
347
A local area network (LAN) is:
a group of connect computers under one administrative organization
348
Wired LANs can have:
high-speed connections with Ethernet unshielded twisted pair cable (UTP), shielded twisted pair cable (STP), or fiber
349
A wide area network (WAN) is:
a group of one or more LANs over a large geographic area
350
WANs are administered:
by several different Internet service providers, and the links are usually slower than LAN connections
351
A Personal area network (PAN) is:
larger than a LAN and smaller than a WAN (ex. phone, tablets)
352
A metropolitan area network (MAN) is:
a smaller version of WAN (two offices in the same city, makes a high-speed connection between them)
353
A wireless mesh network (WMN) is:
a communications network made up a cloud of radio nodes organized in a mesh topology
354
A wireless mesh network (WMN) often consists of:
mesh clients, mesh routers, and gateways
355
Management of a wireless mesh network (WMN) is:
decentralized
356
A cable stripper is used:
to strip a portion of the plastic jacket off the cable to expose the individual wires
357
A crimper attaches:
a connector to the end of raw twisted pair (TP or coaxial cable.)
358
There are two types of crimpers:
RJ-45 crimping tool Compression-crimping tool
359
You use an RJ-45 crimping tool when:
you are working with TP
360
You use a compression-crimping tool when:
you are working with coaxial
361
A punchdown tool punches:
the individual wires down into the 110 IDC clips of an RJ-45 jack and the patch panel
362
A multimeter is a:
very flexible tool that can be used for testing both coaxial and TP cabling as well as AC and DC voltage
363
When set for DC voltage:
a multimeter can be used to test computer power supplies and AC adapters
364
When set for continuity (CONT):
it can be used as a cable tester
365
A multimeter can also be used to:
test ohm (resistance) ampere (amp, or current) levels
366
All multimeters are:
equipped with red and black test leads
367
When used for voltage tests:
the red lead is attached to the power source to be measured, and the black lead is attached to ground
368
Multimeters use two different readout styles:
digital analog
369
A tone generator and probe kit consists of two parts:
Tone device Probing device
370
A tone device on a tone generator and probe connects:
to one end of the network cable and when turned on, sends a tone along the length of the cable
371
A probing device on a tone generator and probe can:
pick up the tone anywhere along the cable length and at the termination point
372
A cable tester tests:
each wire in the cable and makes sure everything is wired properly
373
A loopback plug connects:
directly to the RJ-45 port of a PC's network adapter
374
When you use a loopback plug with a network diagnostic program, it:
simulates a network and tests whether the network adapter and TCP/IP are functioning properly
375
A WiFi analyzer provides:
an easy-to-use view of both 2.4GHz and 5.0GHz wireless networks in the area