Chapter 2 Networking Flashcards
Computers use port numbers to:
identify protocols and keep the different processes sorted out
The protocol HTTP does what?
Makes the connection to the web server
How does the protocol HTTP work?
It selects an unused port on the computer (known as an outbound port) to send and receive data to and from a website
What is an inbound port?
It is a port used by the websites web server that is open at all times, ready to accept sessions
Transmission Control Protocol (TCP) sessions are known as:
connection-oriented sessions (this means that every packet that is sent is checked for delivery)
User Datagram Protocol (UDP) sessions are known as:
connectionless sessions (this means the messages are sent without an expectation of communication from the receiver.
UDP is used in:
streaming media sessions, such as Voice over IP (VoIP) and gaming
and for protocols that use a simple query and response, such as DNS
When is UDP better than TCP?
for time-sensitive information
When is TCP more beneficial than UDP?
When reliability is important
Port Number(s), Port Type
FTP
20 & 21, TCP/UDP
Port Number(s), Port Type
SSH
22, TCP/UDP
Port Number(s), Port Type
Telnet
23, TCP/UDP
Port Number(s), Port Type
SMTP
25, TCP/UDP
Port Number(s), Port Type
DNS
53, TCP/UDP
Port Number(s), Port Type
HTTP
80, TCP/UDP
Port Number(s), Port Type
POP3
110, TCP/UDP
Port Number(s), Port Type
IMAP
143, TCP
Port Number(s), Port Type
HTTPS
443, TCP/UDP
Port Number(s), Port Type
RDP
3389, TCP/UDP
Port Number(s), Port Type
NetBIOS/NetBT
137-139, TCP/UDP
Port Number(s), Port Type
SMB/CIFS
445, TCP
Port Number(s), Port Type
SLP
427, TCP/UDP
Port Number(s), Port Type
AFP
548, TCP
Port Number(s), Port Type
DHCP
67/68, UDP
Port Number(s), Port Type
LDAP
389, TCP/UDP
Port Number(s), Port Type
SNMP
161/162, TCP/UDP
File Transfer Protocol is a protocol used by:
both web browsers and specialized FTP programs to access dedicated file transfer servers for file downloads and uploads
What do you have to do in the command-line FTP program in both Windows and Linux?
type ftp
press enter
type help
If any credentials are required for the FTP, they are typically:
the username anonymous and the user’s email as a password
Some FTP sites require the user to log in with:
a specified username and password
FTP is not considered secure because:
FTP users can authenticate in clear-test sign-ins
For greater security, you can use FTP secured with:
SSL/TLS (FTPS) or Secure File Transfer Protocol (SFTP)
Secure Shell (SSH) allows:
data to be exchanged computers on a secured channel
What protocol is more secure than FTP and Telnet?
Secure Shell
Secure FTP combats
FTP lack of security by providing:
file access over a reliable data stream, generated and protected by SSH
Telnet enables:
a user to make a text-based connection to a remote computer or networking device and use it as if he were a regular user sitting in front of it rather than simply downloading pages and files he would with an http:// or ftp:// connection
Windows and Linux contain a command-line Telnet program. To open a connection to a remote computer:
open a command prompt (Windows) or Terminal session (Linux) and type telnet and press the enter key
Simple Mail Transfer Protocol (SMTP) is used to:
send email from a client system to an email server, which also uses SMTP to relay the message to the receiving email server
Domain Name System (DNS) is the name for:
the network of servers on the Internet that translate domain names and individual hostnames into their corresponding IP addresses
Hypertext Transfer Protocol (HTTP) is the protocol used by:
web browsers, such as Internet Explorer, Microsoft Edge, Firefox, and Chrome, to access websites and content
Hypertext Transfer Protocol Secure or HTTP over SSL (HTTPS) are:
sites that are secured with various encryption schemes
What are the two leading protocols for receiving email?
Post Office Protocol version (POP3)
Internet Message Access Protocol (IMAP)
What happens to the email in an email system based on POP3?
email is downloaded from the mail server to folders on a local system
POP3 is not a suitable email protocol for:
users who frequently switch between computers and mobile devices because email might be spread over computers
Users who utilize POP3 servers to retrieve email typically use SMTP for what?
to send messages
Internet Message Access Protocol (IMAP) is:
an email protocol that enables messages to remain on the email server so they can be retrieved from any location
IMAP also supports folders, so users can:
organize their messages as desired
What is the current version of IMAP?
IMAP4
To configure an IMAP-based email account you must:
select IMAP as the email server type and specify the name of the server, your username and password, and whether the server uses SSL
NetBIOS is also known as:
NetBT (RFC 1001)
NetBIOS is a protocol that:
allows some legacy applications that were developed in the 1980s to work on larger networks and the Internet
Server Message Block (SMB) provides:
access to shared items such as files and printers
Server Message Block (SMB) uses:
packets that authenticate remote computers through what are known as interprocess communication mechanisms
Server Message Block (SMB) uses ports 137-139 for:
SMB traffic using NetBIOS over TCP (NetBT)
Server Message Block (SMB) uses port 445 for:
SMB hosted on TCP
Port 445 is used by:
Server Message Block SMB)
Common Internet File System (CIFS)
Common Internet File System (CIFS) is an:
enhanced version of Microsoft SMB, which is an open, cross-platform protocol
Common Internet File System (CIFS) has now been widely replaced by:
updated versions of SMB (SMB 2.0 and 3.0)
Service Location Protocol (SLP) was designed to:
allow networked hosts to find services of other devices such as printers on the local network
With Service Location Protocol (SLP), devices providing services can:
announce their presence to hosts and provide configuration information
Apple Filing Protocol (AFP) was previously known as:
Apple-Talk Filing Protocol
Apple Filing Protocol (AFP) uses:
TCP/IP for transport
The Remote Desktop Protocol (RDP) is used by:
Remote Desktop Services (RDS), which is the Windows Server-based companion of Remote Desktop Connection
Dynamic Host Configuration Protocol (DHCP) is used to:
automatically assign IP addresses to hosts
In most SOHO networks, a router uses:
Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to the client computers
You ISP uses:
DHCP to assign an IP address to you, and usually your router gets this address
Dynamic Host Configuration Protocol (DHCP) service makes life easier for a network administrator:
by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on
If you get your address from a Dynamic Host Configuration Protocol (DHCP) server, you are getting:
your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically
Simple Network Management Protocol (SNMP) is used as:
the standard for managing and monitoring devices on a network
Simple Network Management Protocol (SNMP) manages:
routers, switches, and computers and is often incorporated into software known as a network management system (NMS)
What is the main software that controls everything Simple Network Management Protocol (SNMP) based?
Network management system (NMS)
Network management system (NMS) is installed on a computer known as:
a manager
The devices monitored by Network management system (NMS) is known as:
managed devices
Network management system (NMS) installs a small piece of software known as:
an agent
Lightweight Directory Access Protocol (LDAP) is used to:
access and maintain distributed directories of information such as the kind involved with Microsoft domains
Microsoft refers to Lightweight Directory Access Protocol (LDAP) as:
directory services
A router connects:
one network to another
Most routers sold for SOHO configurations are:
WiFi (802.11 family) wireless routers with integrated Fast Ethernet or Gigabit Ethernet switches
The switches built into routers are:
stackable
If a router needs more ports, you can add a:
switch
Routers are:
specialized computing devices that are controlled by firmware
When you log into a router to view or change its configuration:
the options available are limited by the router’s firmware
Buggy firmware can cause:
network problems and can make a network more vulnerable to attack
DD-WRT is:
the most popular replacement firmware for routers, and some vendors now use it in their high-end routers
A switch provides:
connectivity to devices in a local network
Each port on a switch works:
independently, allowing more than one concurrent session
A switch makes:
a direct connection between the sending and receiving devices by identifying the Media Access Control (MAC) address of each device
In today’s networks, switches are very common in:
100Mbps, 1000Mbps, and 10Gbps networks
Switches can be stacked to:
increase the number of connection ports in a network
Stacked switches are:
daisy-chained together, and in theory there is no limit to the number of switches possible in a network
A switch resembles a hub but:
creates a dedicated full-speed connection between the two computers that are communicating with each other
Low-cost switches used in SOHO networks cannot be:
configured to perform complex switching functions and are considered unmanaged
Managed switches are common in:
corporate and enterprise networks
Managed switches support:
Simple Network Mail Protocol (SNMP) for diagnostics and performance measurement,
virtual LANs (VLANs) to enable multiple workgroups to use the same physical switch but keep their traffic separate, and redundancy
Wireless access point (WAP) extends:
a wired network to wireless connections
Wireless access point (WAP) is based on:
Ethernet, but involves the IEEE 802.11 group of standards, which define wireless LANs (WLANs)
A Wireless access point (WAP) acts as a:
central connecting point for computers equipped with wireless network adapters, like a switch
A Wireless access point (WAP) identifies each computer by:
its MAC address
Using a cloud-based controller, administrators can:
manage wireless LANs and branch offices that are located anywhere on the Internet from a central location
A firewall is a:
hardware appliance or software application that protects a computer from unwanted intrusion
In SOHO, firewall functionality is usually built into:
the router
In larger organizations, firewall functionality is usually built into:
a device separate from the router
A firewall stops:
unwanted connections from the outside and can block basic network attacks
A network interface card (NIC) is:
the interface on a computer (or other device) that connects to the LAN
A network interface card (NIC) was traditionally a:
circuit board (card) that mounted to the motherboard
A network interface card (NIC) is now:
built-in interfaces
A network interface card (NIC) connects to:
a cable with an RJ-45 connecter
The network interface card (NIC) is designed to:
take communication off the physical cable (or wireless signal from the air) and present it to the computer for processing
A network interface card (NIC) has a:
unique physical address, known as a MAC address, that identifies the device to other hosts on the network
network interface card (NIC) have evolved to also provide:
wireless and virtual access to networks
Wireless network signals can be blocked by:
masonry
steel
concrete walls
Wireless network signals can be weaken:
over distance
A signal repeater or extender can:
enable areas of weak or no signals to take advantage of a wireless network
A wireless repeater resembles:
a wireless router and might include a switch, but instead of connecting a cable or DSL modem, it connects wirelessly to a wireless router
A hub is the simplest device used on:
an Ethernet network for connecting devices to each other
A hub features:
multiple RJ-45 ports
a power supply
signal lights to indicate network activity
Hubs were used to:
connect computers together and to boost the communication signal between computers
Hubs have been almost completely replaced by switches because:
a hub splits the bandwidth of a connection among all the computers connected to it
A hub broadcasts data to:
all computers connected to it
A modem connects:
a LAN to an Internet service provider (ISP)
A dial-up modem is:
a device that allows a computer access to the Internet by changing the digital signals of the computer to analog signals used by a typical land-based phone line
Dial-up modems are:
slow devices and are usually used today only if no other Internet option is available
The devices most commonly used to connect small networks to the Internet are:
Cable modems
DSL modems
A wireless bridge is:
a device (or a setting on many access points) that is used to connect two wireless LANs together in order to expand a wireless network or to connect wireless clients to an Ethernet network
A patch panel is a:
box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks
Patch panels are typically built into:
wiring closets or added to equipment racks in a 1U or taller form factor
After removing any connector on the cable, each wire in the TP cable must be:
untwisted before being punched into the appropriate connection on the back of the panel
The twisted cables are color codes so:
they can be properly terminated at the other end
The most common standards for color-coding for twisted cables are:
T568A or T568B
The front of the patch panel uses:
RJ-45 connectors for short standard network cables
Powerline adapters are sold in:
pairs
Where are the powerline adapter pairs plugged into?
One unit into an AC wall socket near the router and is connected to the router via a switch
One unit plugs into an AC wall socket in the room or area that needs network/Internet access
With a wired extender, you can plug:
a computer or switch into the Ethernet port
With a wireless extender you need to:
log into the network via the wireless extender’s SSID
A Power over Ethernet (PoE) switch is a:
switch with added capability (a built-in endspan) to send power out a port using CAT5 or better grades of twisted pair cable
A Power over Ethernet (PoE) enables:
wireless access points
IP security cameras
VoIP phones
routers
other Ethernet devices to be installed in areas away from traditional power sources
A power over Ethernet injector installed:
between a standard Ethernet switch and a PoE device to provide power only
Wireless Ethernet is also known as:
IEEE 802.11
WiFi
Wireless Ethernet is:
the collective name for a group of wireless technologies compatible with wired Ethernet
Wireless technologies compatible with wired Ethernet is referred to:
wireless LAN (WLAN) standards
A SOHO wired or wireless router can provide:
a secure way for users to access the Internet and local network resources
A SOHO wired or wireless router can become a magnet for:
attack
To connect to a router open a browser and enter:
the IP address of the router in the address bar and press Enter
The wireless spectrum is divided into:
11 channels
Part of installing a router on a 2.4GHz wireless network is:
selecting an appropriate channel for the signal
For best results, avoid overlapping channels
What channels do not overlap with other channels?
1
6
11
Some routers feature an Auto setting that enables:
the router to use the least-active channel
To change the channel used by a wireless network follow these steps:
- Log into the router
- Navigate the wireless configuration dialog
- Select a different channel (typically 1, 6, or 11 when using 2.4GHz networking because they have less interference than other channels)
- Save your changes and exit the wireless configuration dialog
Network address translation (NAT) is the process of:
modifying IP addresses as information crosses a router
Network address translation (NAT) hides:
an entire IP address space on the LAN
Whenever an IP address on the LAN wants to communicate with the Internet, the IP address is:
converted to the public IP address of the router
SOHO routers perform Network address translation (NAT) automatically when:
connected to an IPv4 network
Port forwarding involves:
forwarding external visitors through a router to a specific computer
Instead of opening the entire LAN, port forwarding directs:
particular traffic where you want it to go
Port forwarding is also called:
destination network address translation (DNAT)
Port triggering involves:
a particular service opening an outgoing port or range of ports on demand
Port triggering can be used without:
being tied to a specific IP address
A demilitarized zone (DMZ) allows:
outside traffic through a particular IP address on a LAN
Ina SOHO router, any device assigned to the DMZ receives:
traffic that is not specified for a particular device
Using a DMZ host makes sense for:
gaming and other types of traffic where you cannot specify in advance the ports needed
The DMZ host must have its own:
firewall because DMZ hosts are not protects by the router firewall
By default, SOHO routers have the:
DHCP service turned on so they can provide IP addresses to any wired or wireless devices that connect
Most routers enable you to:
specify the range and number of IP addresses available via DHCP
When do devices switch to Automatic Private IP Addressing (APIPA)?
When a router does not have sufficient IP addresses for the devices that need to connect to it, using the non-routable IP address range 169.254.x.x
A SOHO router comes with a:
default IP address known as a private address
Follow the steps to configure NIC in Windows:
- Click the Windows icon and select the Windows Settings gear
- In the Windows Settings window select the Network & Internet link
- When you see the different connection options, select the one you want and click Change adapter options on the right side of the window
- Choose the adapter you want to configure and click on the Properties button. A list of items available to the NIC are listed
- Double-click on Internet Protocol Version 4 (TCP/IPv4). You now see the window where the IP address is configured dynamically or statically
- Assign the address or leave the default DHCP options and click OK to accept any changes
A few examples of IoT are:
Thermostats
Light switches
Security cameras
Door locks
Voice-enabled smart speakers/digital assistants
Quality of service (QoS) is an important feature to:
enable on any network that provides streaming media, gaming, or VoIP services
Quality of service (QoS) priortizes:
real-time and streaming traffic
QoS can be configured by:
an ISP or by a router
Universal plug and play (UPnP) is a:
router feature that enables devices on a network to add themselves to a network without the need to reconfigure the router
Universal plug and play (UPnP) is widely used for:
media streaming across a network
Universal plug and play (UPnP) can be vulnerable to:
attacks
Encryption is a necessity for both:
SOHO wired or wireless routers and larger business wireless networks to preserve privacy and to prevent criminals from borrowing the network
Wired Equivalent Privacy (WEP) is the:
oldest and weakest WiFi encryption standard
If Wired Equivalent Privacy (WEP) is enabled, all:
network devices must use the same WEP key and encryption strength
Wired Equivalent Privacy (WEP) encryption key cannot:
include punctuation marks
Wired Equivalent Privacy (WEP) can be configured using a:
pre-shared key (PSK) or
Open System Authentication (OSA)
Wifi Protected Access (WPA) uses:
a variable-length encryption key (up to 63 ASCII characters, including punctuation marks)
Temporal Key Integrity Protocol (TKIP) 128-bit encryption
Wifi Protected Access (WPA) is much more secure than:
Wired Equivalent Privacy (WEP)
Wifi Protected Access (WPA) can use
PSK or RADIUS authentication server to generate unique keys
Wifi Protected Access (WPA) has been replaced by:
WPA2, but some routers can be configured to support both WPA an WPA2 clients on the same network
Wifi Protected Access 2 (WPA2) replaces:
Temporal Key Integrity Protocol with Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES) is a:
128- to 256-bit encryption protocol used in technologies such as hard drive encryption as well as networking
Advanced Encryption Standard (AES) can be used exclusively or in conjunction with:
Temporal Key Integrity Protocol, which is the recommended option
Wifi Protected Access 2 (WPA2) certification is:
mandatory for all new devices that bear the WiFi trademark
WiFi Protect Setup (WPS) provides:
an easier way to configure a wireless network than entering the router’s IP address on each device connecting to it
Routers that support WiFi Protect Setup (WPS) typically have the:
default WPS key on the bottom of the device
To use WiFi Protect Setup (WPS), use the:
setup software provided with a router on each computer and follow the directions on devices such as printers or multifunction devices
Note that WiFi Protect Setup (WPS) should be used:
only if all devices on a wireless network support it
There are two ways to use WiFi Protect Setup (WPS):
the default Pin method, in which the PIN on the router is used to set up clients,
a pushbutton method, in which a physical or software button is pushed on the router and clients to set up the network
The PIN and the pre-shared key for WPS could be compromised by:
brute-force attacks
Encryption Type; Key Length; Key Rules; Strength
Open
None; N/A; N/A; None
Encryption Type; Key Length; Key Rules; Strength
Wired Equivalent Privacy (WEP)
RC4; 10 hex/5 ASCII characters (64-bit) or 26 hex/13 ASCII characters (128-bit); ASCII: alphanumeric (no punctuation); very weak
Encryption Type; Key Length; Key Rules; Strength
WiFi Protected Access (WPA)
TKIP (128-bit); Up to 63 ASCII characters; Punctuation is okay, some devices can’t use a full-length encryption key; Strong
Encryption Type; Key Length; Key Rules; Strength
WiFi Protect Access 2 (WPA2)
AES (128-bit), Up to 63 ASCII characters; Punctuation is okay, some devices can’t use a full-length encryption key; Very strong
What are the five different WiFi standards?
- 11a
- 11ac
- 11b
- 11g
- 11n
Minimum speed(s); Maximum speed; frequency band
802.11b
5.5Mbps or slower if necessary; 11Mbps; 2.4GHz with 20MHz-wide channels
Minimum speed(s); Maximum speed; frequency band
802.11a
6Mbps to 48Mbps; 54Mbps; 5GHz
Minimum speed(s); Maximum speed; frequency band
802.11g
6Mbps to 48Mbps; 54Mbps; 2GHz, can optionally support 5GHz as well
Minimum speed(s); Maximum speed; frequency band
802.11n 2.4GHz
Doesn’t specify; 72Mbps per stream (20MHz channel); 2.4GHz
Minimum speed(s); Maximum speed; frequency band
802.11ac
Doesn’t specify; up to 433Mbps per stream when 80MHz-wide channels are used; 5GHz band and supports up to 80 MHz-wide channels
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With
802.11a
No; 35m/120m; 20MHz/12; Requires dual-mode (802.11a/b or 802.11a/g) hardware
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With
802.11b
No; 32m/140m; 20MHz/3; 802.11g
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With
802.11g
No; 32m/140m; 20MHz/3; 802.11b, 802.11n
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With
802.11n 2.4GHz
Yes; 70m/250m; 20MHz/3; 802.11b, 802.11g, 802.11 (on networks also supporting 5GHz frequency)
Multiple input multiple output (MIMO) support; Estimated Range Indoors/Outdoors; Channel Width/Number of Channels; Interoperable With
802.11n 5GHz
Yes; 70m/250m; 20MHz or 40MHz/12; 802.11a (20MHz-wide channels only)
Minimum speed(s); Maximum speed; frequency band
802.11n 5GHz
Doesn’t specify; 150Mbps per stream (40MHz channel); 5GHz
Compare 2.4GHz to 5GHz band:
2.4 GHz band has a longer range but may perform at slower speeds
5GHz band may provide faster rates has a shorter range
5GHz band is less used and has more channels than 2.4, and its channels do not overlap
Estimated Range; Channels; Advantages; Disadvantages
2.4GHz
50m (160 feet indoors); 11; Longer Range; Slower performance, channels easily overlap
Estimated Range; Channels; Advantages; Disadvantages
5GHz
15m (50 feet) indoors; 23; Shorter range; Faster performance, channels do not overlap
Multiple Input Multiple Output (MIMO) devices are available in the following configurations:
1x1 one transmit, one receive antenna
2x2 two transmit, two receive antenna
3x3 “ “
4x4 “ “
5x5 “ “
Bluetooth runs in virtually:
the same 2.4GHz frequency used by IEEE 802.11(b,g, and n) wireless networks but use a spread-spectrum frequency-hopping signaling method to help minimize interference
Bluetooth version 1.2 offers:
a data transfer rate of 1Mbps
Bluetooth version 2 offers:
a data transfer rate of 3Mbps
Bluetooth version 3.0 + HS can reach:
speeds of up to 24Mbps because it uses Bluetooth only to establish the connection, and the actual data transfer happens over an 802.11 link known as Alternative MAC/PHY (AMP)
Bluetooth 5 can provide up to:
twice the speed and up to four times the range of Bluetooth 4 while keeping power consumption low
Bluetooth Classes Power (mW); Range
Class 1
100mW; 100m (328 feet)
Bluetooth Classes Power (mW); Range
Class 2
2.5mW; 10m (33 feet)
Bluetooth Classes Power (mW); Range
Class 3
1mW; 1m (3 feet)
Class 1 Bluetooth generates:
the most powerful signal, and as such has the largest range
Near field communication (NFC) is:
a feature included in many mobile devices such as tablets for data transfer and shopping
Radio frequency identification (RFID) technology consists of:
an RFID tag that can broadcast information about an item, as well as an RFID reader to accept the broadcast information and deliver it to a computer system for use
Zigbee is similar to:
Bluetooth in that it is a near-range wireless protocol designed to allow communication using low power
Zigbee is most commonly used to:
connect IoT data-sharing devices in a home, industry, or medical environment
What are examples of a Zigbee device?
motion sensor
leak sensor
What frequency does a Zigbee chip operate on?
2.4GHz
What is Z-Wave?
it is a more recent version of Zigbee that uses less power and operates on the much lower 908.42MHz frequency.
Zigbee and Z-Wave are not:
interoperable
Phone network Year Released; New Features
3G
1998; Video calling, High-speed Internet, More data
Phone network Year Released; New Features
4G
2008; Live streaming of HD TV, Video conferencing, 100Mbps Internet speed while moving and 1Gbps when stationary
Phone network Year Released; New Features
LTE (Long-Term Evolution)
2010; Improved coverage, Faster speed
Phone network Year Released; New Features
5G
2019/2020; Much faster data, fewer delays
Web servers are:
specialized computers that host websites and provide various types of content to clients via the Internet
A web server uses HTTP to:
communicate with computers on other networks that are requesting information
A file server is used to:
provide shared storage on a network
A file server is typically:
a computer with a single large drive or a RAID array for storage
Dedicated servers are used only for:
storage
A non-dedicated server is a:
computer that shares storage and also performs standalone tasks
A network-attached storage (NAS) device is a:
special kind of file server designed to store large amounts of data in a central location for users on the network.
A print server manages:
the printing tasks for multiple users sharing one or more printers in an office
A Dynamic Host Configuration Protocol (DHCP) server supports:
Dynamic Host Configuration Protocol (DHCP), the protocol that automatically assigns IP addresses to connected devices on a network
Dynamic Host Configuration Protocol (DHCP) server functions are:
included in SOHO routers and are typical roles for domain controllers on small to medium business (SMB) networks
A proxy server is:
an intermediary between a client and another network, such as the Internet
A proxy server stores:
web pages that have been requested, and if a client requests a web page, the proxy server checks its cache for the page. If the page exists and is up to date, the proxy server used its cached copy to supply the client request
If the proxy server does not have the requested page:
it downloads the page on behalf of the client, sends the page to the client, and retains a copy of the page in its cache
A proxy server helps reduce:
traffic between a network and the Internet, and it can also be used to block requests for undesirable traffic
A mail server sends:
or receives email on a network
What servers are used to send outgoing email?
SMTP server
What servers are used to receive email?
POP3 server
IMAP server
An authentication server is used to:
examine and verify or deny credentials to a user attempting to log into secured networks
Syslog servers track:
events that happen on devices (such as logins or crashes) on a network
Unified threat management (UTM) devices provide:
firewall
remote access
virtual private network (VPN) support
web traffic filtering with anti-malware
network-intrusion prevention
Unified threat management (UTM) devices unite:
the functions of several earlier devices and have largely replaced IDS and IPS devices
An intrusion detection system (IDS) device or program detects:
network intrusions that might not be detected by a firewall
Typical threats detected by an Intrusion detection system (IDS) includes:
attacks against services
malware attacks
data-driven attacks
host-based attacks
To detect threats, a typical intrusion detection system (IDS) uses:
signature-based detection, detection of unusual activities (anomalies), and stateful protocol analysis
An intrusion detection system (IDS) or program must be:
updated frequently with new signatures and rules to maintain protection
An intrusion prevention system (IPS) uses:
methods similar to those used by an IDS, but unlike an IDS, an IPS blocks attacks
An end-point management server keeps:
track of devices using the network and ensures that they comply with the security parameters of the entire network
What are the end points on the end-point management server?
the end users
the devices that use the network
The term legacy refers to:
things handed down from predecessors
Legacy systems are systems:
that use outdated operating systems, programming languages, applications, or hardware
How can the problem of maintaining old hardware be eliminated?
If the legacy operating system and its applications can be run in a virtualized environment
Embedded systems are:
dedicated computing devices used for specific tasks such as machine control, point-of-sale system, or ATMs, are often also legacy systems
The biggest risk to both legacy and embedded systems is:
security
When considering whether and when to update legacy systems or embedded systems, consider these issues:
- Will the existing data be usable with newer apps?
- Can the existing program run with current operating systems?
- Will changes in network security, wireless, or Internet standards cause problems with the application?
- Can a proprietary application be licensed to run in a virtual machine?
- Does existing hardware used in the embedded system work with the new operating system?
Does the embedded application run on current embedded operating systems? If not, is an updated version available?
The Internet protocol (IP) is the:
communication protocol that computers and other devices use to communicate with computers outside of their local networks
What are two current versions of IP addressing commonly in use today?
IPv4
IPv6
IP addresses are:
changeable, logical addresses and are assigned to devices for communicating outside their local networks
The term static means:
unchanging, or always the same
The term dynamic means:
constantly changing
Static IP address is assigned:
to a device by the administrator and not subject to change until reconfigured by the administrator
Dynamic (DHCP server-assigned) IP address is assigned:
by a DHCP server and will likely change each time a device leaves and then rejoins the network or when the address is used beyond its lease time and expires
What it Does; Static IP Address; Dynamic IP Address
IP address
Identifies a computer on the network; unique value for each device; entered manually on the device; Automatically assigned by the DHCP server
What it Does; Static IP Address; Dynamic IP Address
Subnet mask
Determines which bits in the IP address are the network portion and which are the host portion; entered manually on the device, but a default subnet mask appears when the IP address is assigned; Automatically assigned by the DHCP server
What it Does; Static IP Address; Dynamic IP Address
DNS Configuration
Identifies Domain Name System servers; IP addresses of one or more DNS servers, hostname, and domain name must be entered; Automatically assigned by the DHCP server
What it Does; Static IP Address; Dynamic IP Address
Gateway
Identifies IP address of device that connects the computer to the Internet or another network, same values for all devices on the network; IP address for the gateway must be entered; Automatically assigned by the DHCP server
To configure an IP address in Windows, access:
the Internet Protocol Properties window
To open the General tab of the Internet Protocol Properties window, open:
Network Connections, right-click the network connection, select Properties, click Internet Protocol v4 (TCP/IPv4) or TCP/IPv6 in the list of protocols and features, and click Properties
When will a device on a network assign themselves APIPA/link local addresses?
When the DHCP server becomes unavailable and an alternate IP address has not been set up
If a DHCP problem causes APIPA/link local addresses to be assigned, you can resolve the problem by checking the:
device’s network connection and try using the ipconfig/release and ipconfig/renew commands at the command prompt
An IP address is divided into two sections:
the network portion, which is the number of the network the computer is on
the host portion, which is the individual number of the computer
A subnet mask is used to:
distinguish between the network portion of the IP and the host portion
IP version 6 (IPv6) greatly increases:
the number of available IP addresses
IPv6 uses:
128-bit source and destination IP addresses that are each then divided into eight 16-bit blocks
What is zero compression?
When a sequence of 16-bit blocks of IPv6 addresses set to zero being represented by double colon (::)
An IPv6 address can only include one:
zero-compressed block
To test your network interface in Windows where IPv6 is enabled by default:
type ping::1 at a command prompt
IPv6 supports what types of addresses?
unicast
multicast
anycast
There are five types of unicast addresses:
Global unicast addresses
Link local addresses
Site local addresses
Special addresses
Compatibility addresses
Global unicast addresses are:
used in the same way as IPv4 public addresses.
How are the bits comprised in a Global unicast address?
first 3 bits are set to 001
the following 45 bits are used for the global routing prefix
the collective 48 bits are known as the public topology
The subnet ID uses the next 16 bits
The interface uses the remaining 64 bits
Link local addresses correspond to:
the Automatic Private IP Addressing (APIPA) address scheme used by IPv4 (addresses that start with 169.254)
How are the bits comprised in a link local address?
the first 10 bits are set to FE80 hex
the next 54 are 0s
the following 54 bits are for the interface ID
Site local addresses correspond to:
IPv4 private address spaces (10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16)
Special addresses include
unspecified addresses (0:0:0:0:0:0:0:0 or ::) and indicates the absence of an IP address; a loopback address (0:0:0:0:0:0:0:1 or ::1)
Compatibility addresses are used in:
situations in which IPv4 and IPv6 are both in use
The term one-to-one-to-many association is used to describe:
anycast addressing sends information to a group of potential receivers that are identified by the same destination address
To view IP information on Linux:
Open Terminal
use the command ifconfig-a
Two scripts need to be edited in Terminal on Linux:
ifcfg-connection name (used to identify IP addresses)
the file resolv.conf (used to identify DNS servers)
The most common types of VPNs are:
PPTP
L2TP/IPsec
PPTP uses:
128-bit encryption
L2TP uses:
256-bit encryption
Virtual local area network (VLAN) is a:
grouping of some computers on a local area network (LAN) that are configured to behave as if they have their own separate LAN
Usually LANs are separated by:
a router, but a switch may have the capability of grouping ports together to behave like a LAN inside the switch
List the fastest to slowest wired network connection speeds:
Fiber
Cable
DSL
ISDN
Dial-up
List the fastest to slowest wireless network connection speeds:
Cellular
Fixed line-of-sight
Satellite
Cable is:
broadband Internet service that is provided by a cable TV company
Cable can deliver:
voice, data, and video at one time
Cable Internet can reach what download speeds?
3Mbps up to 300Mbps or faster
Cable Internet can reach what upload speeds?
10-20% of download speeds but vary by vendor
Digital Subscriber Line (DSL) was originally designed to:
work on the same telephone line used by a telephone and fax machine if the telephone line can carry a digital signal
For home use, DSL is designed:
strictly for Internet access
For business use, DSL is designed:
for Internet access and can be used for additional services and can be used in site-to-site scenarios between organizations
Two major types of DSL use telephone lines are:
Asynchronous DSL (ADSL)
Synchronous DSL (SDSL)
Two newer types of DSL are:
Very High Bit-Rate Digital Subscriber Line (VDSL)
Very High Bit-Rate Digital Subscriber Line 2 (VDSL2)
Both VDSL and VDSL2 use:
fiber for at least part of the signal path
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service
ADSL
Existing telephone line; Yes; 384Kbps to 24Mbps; 128Kbps to 3.3Mbps; No
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service
SDSL
New telephone line; No; 384 Kbps to 2.0Mbps; 384Kbps to 2.0Mbps; No
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service
VDSL
Fiber+telephone line; No; Up to 55Mbps; 15Mbps; Yes
Line Type; User Installation Option; Typical Downstream Speeds; Typical Upstream Speeds; Support HDTV Service
VDSL2
Fiber+telephone line; No; Up to 200Mbps; Up to 100Mbps; Yes
A DSL modem is used to:
connect a computer to DSL service
A DSL modem connects to:
a PC through the RJ-45 (Ethernet) port or the USB port
A Point-to-Point Protocol over Ethernet (PPPoE) connection requires:
the user to make a connection with a username and password
Until the late 1990s, dial-up networking (DUN) was the most:
common way for home and small businesses to connect to the Internet
Today, dial-up connections are used:
when no other Internet connection is available
Dial-up is sometimes referred to as:
public switched telephone network (PSTN)
plain old telephone service (POTS)
Dial-up is relatively slow, with rates ranging from:
28.8Kbps to 56Kbps
A disadvantage of telephone dial-up is that:
voice and data cannot share the wire simultaneously
Fiber connections to the home (FTTH) or Fiber to the premises (FTTP) network download speeds can reach:
up to 2Gbps
An optical network terminal (ONT) is used to:
convert the fiber connection entering a home and the Ethernet or coaxial WAN connection to connect a router or gateway
An optical network terminal (ONT) is supplied by:
the fiber provider and installed in the home
Satellite Internet uses:
dish antennas to receive and transmit signals between geosynchronous satellites and computers
Satellite modems are:
external devices used to connect computers to satellite dishes
The FCC requires:
professional installation for satellite Internet service because an incorrectly aligned satellite dish with uplink capabilities could cause a service outage on the satellite it’s aimed at
Integrated Services Digital Network (ISDN) was originally:
developed to provide an all-digital method for connecting multiple telephone and telephony-type devices to a single telephone line and to provide a faster connection for teleconferencing for remote computer uses
To make an ISDN connection:
a PC needs a device called an ISDN terminal adapter (TA)
There are two types of ISDN connections:
Primary Rate Interface (PRI)
Basic Rate Interface (BRI)
A Primary Rate Interface (PRI) connection provides:
1.536Mbps of bandwidth
A Basic Rate Interface (BRI) connection provides:
64Kbps (single-channel) or 128Kbps (dual-channel)
To use USB tethering, follow these steps:
- Connect a USB cable from your computer to the data port on your device
- Select the USB tethering option on your device
- If you are connecting a Windows computer, select the network type (Home) on the computer when prompted
- Use your computer’s web browser and other network features as usual
- When you’re finished, disable USB tethering
To use the mobile hotspot feature, follow these steps
- Enable the mobile hotspot feature in the device’s setup
- Select how you want to share the connection wirelessly. Provide the SSID and password listed to any devices that will share the connection
- If you decide the permit only allows devices to connect, you must provide a name for each device and its MAD address. The MAC address is listed on a label attached to an external adapter
- Open the Allowed Devices, click Add, enter the device name and address, and click OK
- Make the connection from your device just as you would with any other wireless Internet router or hotspot
- When your devices are finished using the Internet, disable the hotspot setting in your smartphone or tablet
Line-of-sight wireless is sometimes referred to:
as terrestrial wireless
Line-of-sight involves:
using small antennas to connect users to Internet service transmitted from microwave towers
A network is:
a group of computers, peripherals, and software that are connected to each other and can be used together
A local area network (LAN) is:
a group of connect computers under one administrative organization
Wired LANs can have:
high-speed connections with Ethernet unshielded twisted pair cable (UTP), shielded twisted pair cable (STP), or fiber
A wide area network (WAN) is:
a group of one or more LANs over a large geographic area
WANs are administered:
by several different Internet service providers, and the links are usually slower than LAN connections
A Personal area network (PAN) is:
larger than a LAN and smaller than a WAN (ex. phone, tablets)
A metropolitan area network (MAN) is:
a smaller version of WAN (two offices in the same city, makes a high-speed connection between them)
A wireless mesh network (WMN) is:
a communications network made up a cloud of radio nodes organized in a mesh topology
A wireless mesh network (WMN) often consists of:
mesh clients, mesh routers, and gateways
Management of a wireless mesh network (WMN) is:
decentralized
A cable stripper is used:
to strip a portion of the plastic jacket off the cable to expose the individual wires
A crimper attaches:
a connector to the end of raw twisted pair (TP or coaxial cable.)
There are two types of crimpers:
RJ-45 crimping tool
Compression-crimping tool
You use an RJ-45 crimping tool when:
you are working with TP
You use a compression-crimping tool when:
you are working with coaxial
A punchdown tool punches:
the individual wires down into the 110 IDC clips of an RJ-45 jack and the patch panel
A multimeter is a:
very flexible tool that can be used for testing both coaxial and TP cabling as well as AC and DC voltage
When set for DC voltage:
a multimeter can be used to test computer power supplies and AC adapters
When set for continuity (CONT):
it can be used as a cable tester
A multimeter can also be used to:
test ohm (resistance)
ampere (amp, or current) levels
All multimeters are:
equipped with red and black test leads
When used for voltage tests:
the red lead is attached to the power source to be measured, and the black lead is attached to ground
Multimeters use two different readout styles:
digital
analog
A tone generator and probe kit consists of two parts:
Tone device
Probing device
A tone device on a tone generator and probe connects:
to one end of the network cable and when turned on, sends a tone along the length of the cable
A probing device on a tone generator and probe can:
pick up the tone anywhere along the cable length and at the termination point
A cable tester tests:
each wire in the cable and makes sure everything is wired properly
A loopback plug connects:
directly to the RJ-45 port of a PC’s network adapter
When you use a loopback plug with a network diagnostic program, it:
simulates a network and tests whether the network adapter and TCP/IP are functioning properly
A WiFi analyzer provides:
an easy-to-use view of both 2.4GHz and 5.0GHz wireless networks in the area