Chapter 2 Networking Flashcards
Computers use port numbers to:
identify protocols and keep the different processes sorted out
The protocol HTTP does what?
Makes the connection to the web server
How does the protocol HTTP work?
It selects an unused port on the computer (known as an outbound port) to send and receive data to and from a website
What is an inbound port?
It is a port used by the websites web server that is open at all times, ready to accept sessions
Transmission Control Protocol (TCP) sessions are known as:
connection-oriented sessions (this means that every packet that is sent is checked for delivery)
User Datagram Protocol (UDP) sessions are known as:
connectionless sessions (this means the messages are sent without an expectation of communication from the receiver.
UDP is used in:
streaming media sessions, such as Voice over IP (VoIP) and gaming
and for protocols that use a simple query and response, such as DNS
When is UDP better than TCP?
for time-sensitive information
When is TCP more beneficial than UDP?
When reliability is important
Port Number(s), Port Type
FTP
20 & 21, TCP/UDP
Port Number(s), Port Type
SSH
22, TCP/UDP
Port Number(s), Port Type
Telnet
23, TCP/UDP
Port Number(s), Port Type
SMTP
25, TCP/UDP
Port Number(s), Port Type
DNS
53, TCP/UDP
Port Number(s), Port Type
HTTP
80, TCP/UDP
Port Number(s), Port Type
POP3
110, TCP/UDP
Port Number(s), Port Type
IMAP
143, TCP
Port Number(s), Port Type
HTTPS
443, TCP/UDP
Port Number(s), Port Type
RDP
3389, TCP/UDP
Port Number(s), Port Type
NetBIOS/NetBT
137-139, TCP/UDP
Port Number(s), Port Type
SMB/CIFS
445, TCP
Port Number(s), Port Type
SLP
427, TCP/UDP
Port Number(s), Port Type
AFP
548, TCP
Port Number(s), Port Type
DHCP
67/68, UDP
Port Number(s), Port Type
LDAP
389, TCP/UDP
Port Number(s), Port Type
SNMP
161/162, TCP/UDP
File Transfer Protocol is a protocol used by:
both web browsers and specialized FTP programs to access dedicated file transfer servers for file downloads and uploads
What do you have to do in the command-line FTP program in both Windows and Linux?
type ftp
press enter
type help
If any credentials are required for the FTP, they are typically:
the username anonymous and the user’s email as a password
Some FTP sites require the user to log in with:
a specified username and password
FTP is not considered secure because:
FTP users can authenticate in clear-test sign-ins
For greater security, you can use FTP secured with:
SSL/TLS (FTPS) or Secure File Transfer Protocol (SFTP)
Secure Shell (SSH) allows:
data to be exchanged computers on a secured channel
What protocol is more secure than FTP and Telnet?
Secure Shell
Secure FTP combats
FTP lack of security by providing:
file access over a reliable data stream, generated and protected by SSH
Telnet enables:
a user to make a text-based connection to a remote computer or networking device and use it as if he were a regular user sitting in front of it rather than simply downloading pages and files he would with an http:// or ftp:// connection
Windows and Linux contain a command-line Telnet program. To open a connection to a remote computer:
open a command prompt (Windows) or Terminal session (Linux) and type telnet and press the enter key
Simple Mail Transfer Protocol (SMTP) is used to:
send email from a client system to an email server, which also uses SMTP to relay the message to the receiving email server
Domain Name System (DNS) is the name for:
the network of servers on the Internet that translate domain names and individual hostnames into their corresponding IP addresses
Hypertext Transfer Protocol (HTTP) is the protocol used by:
web browsers, such as Internet Explorer, Microsoft Edge, Firefox, and Chrome, to access websites and content
Hypertext Transfer Protocol Secure or HTTP over SSL (HTTPS) are:
sites that are secured with various encryption schemes
What are the two leading protocols for receiving email?
Post Office Protocol version (POP3)
Internet Message Access Protocol (IMAP)
What happens to the email in an email system based on POP3?
email is downloaded from the mail server to folders on a local system
POP3 is not a suitable email protocol for:
users who frequently switch between computers and mobile devices because email might be spread over computers
Users who utilize POP3 servers to retrieve email typically use SMTP for what?
to send messages
Internet Message Access Protocol (IMAP) is:
an email protocol that enables messages to remain on the email server so they can be retrieved from any location
IMAP also supports folders, so users can:
organize their messages as desired
What is the current version of IMAP?
IMAP4
To configure an IMAP-based email account you must:
select IMAP as the email server type and specify the name of the server, your username and password, and whether the server uses SSL
NetBIOS is also known as:
NetBT (RFC 1001)
NetBIOS is a protocol that:
allows some legacy applications that were developed in the 1980s to work on larger networks and the Internet
Server Message Block (SMB) provides:
access to shared items such as files and printers
Server Message Block (SMB) uses:
packets that authenticate remote computers through what are known as interprocess communication mechanisms
Server Message Block (SMB) uses ports 137-139 for:
SMB traffic using NetBIOS over TCP (NetBT)
Server Message Block (SMB) uses port 445 for:
SMB hosted on TCP
Port 445 is used by:
Server Message Block SMB)
Common Internet File System (CIFS)
Common Internet File System (CIFS) is an:
enhanced version of Microsoft SMB, which is an open, cross-platform protocol
Common Internet File System (CIFS) has now been widely replaced by:
updated versions of SMB (SMB 2.0 and 3.0)
Service Location Protocol (SLP) was designed to:
allow networked hosts to find services of other devices such as printers on the local network
With Service Location Protocol (SLP), devices providing services can:
announce their presence to hosts and provide configuration information
Apple Filing Protocol (AFP) was previously known as:
Apple-Talk Filing Protocol
Apple Filing Protocol (AFP) uses:
TCP/IP for transport
The Remote Desktop Protocol (RDP) is used by:
Remote Desktop Services (RDS), which is the Windows Server-based companion of Remote Desktop Connection
Dynamic Host Configuration Protocol (DHCP) is used to:
automatically assign IP addresses to hosts
In most SOHO networks, a router uses:
Dynamic Host Configuration Protocol (DHCP) to assign IP addresses to the client computers
You ISP uses:
DHCP to assign an IP address to you, and usually your router gets this address
Dynamic Host Configuration Protocol (DHCP) service makes life easier for a network administrator:
by automatically assigning IP addresses, subnet masks, gateway addresses, DNS servers, and so on
If you get your address from a Dynamic Host Configuration Protocol (DHCP) server, you are getting:
your address from a DHCP server, you are getting your address assigned dynamically, and it could change periodically
Simple Network Management Protocol (SNMP) is used as:
the standard for managing and monitoring devices on a network
Simple Network Management Protocol (SNMP) manages:
routers, switches, and computers and is often incorporated into software known as a network management system (NMS)
What is the main software that controls everything Simple Network Management Protocol (SNMP) based?
Network management system (NMS)
Network management system (NMS) is installed on a computer known as:
a manager
The devices monitored by Network management system (NMS) is known as:
managed devices
Network management system (NMS) installs a small piece of software known as:
an agent
Lightweight Directory Access Protocol (LDAP) is used to:
access and maintain distributed directories of information such as the kind involved with Microsoft domains
Microsoft refers to Lightweight Directory Access Protocol (LDAP) as:
directory services
A router connects:
one network to another
Most routers sold for SOHO configurations are:
WiFi (802.11 family) wireless routers with integrated Fast Ethernet or Gigabit Ethernet switches
The switches built into routers are:
stackable
If a router needs more ports, you can add a:
switch
Routers are:
specialized computing devices that are controlled by firmware
When you log into a router to view or change its configuration:
the options available are limited by the router’s firmware
Buggy firmware can cause:
network problems and can make a network more vulnerable to attack
DD-WRT is:
the most popular replacement firmware for routers, and some vendors now use it in their high-end routers
A switch provides:
connectivity to devices in a local network
Each port on a switch works:
independently, allowing more than one concurrent session
A switch makes:
a direct connection between the sending and receiving devices by identifying the Media Access Control (MAC) address of each device
In today’s networks, switches are very common in:
100Mbps, 1000Mbps, and 10Gbps networks
Switches can be stacked to:
increase the number of connection ports in a network
Stacked switches are:
daisy-chained together, and in theory there is no limit to the number of switches possible in a network
A switch resembles a hub but:
creates a dedicated full-speed connection between the two computers that are communicating with each other
Low-cost switches used in SOHO networks cannot be:
configured to perform complex switching functions and are considered unmanaged
Managed switches are common in:
corporate and enterprise networks
Managed switches support:
Simple Network Mail Protocol (SNMP) for diagnostics and performance measurement,
virtual LANs (VLANs) to enable multiple workgroups to use the same physical switch but keep their traffic separate, and redundancy
Wireless access point (WAP) extends:
a wired network to wireless connections
Wireless access point (WAP) is based on:
Ethernet, but involves the IEEE 802.11 group of standards, which define wireless LANs (WLANs)
A Wireless access point (WAP) acts as a:
central connecting point for computers equipped with wireless network adapters, like a switch
A Wireless access point (WAP) identifies each computer by:
its MAC address
Using a cloud-based controller, administrators can:
manage wireless LANs and branch offices that are located anywhere on the Internet from a central location
A firewall is a:
hardware appliance or software application that protects a computer from unwanted intrusion
In SOHO, firewall functionality is usually built into:
the router
In larger organizations, firewall functionality is usually built into:
a device separate from the router
A firewall stops:
unwanted connections from the outside and can block basic network attacks
A network interface card (NIC) is:
the interface on a computer (or other device) that connects to the LAN
A network interface card (NIC) was traditionally a:
circuit board (card) that mounted to the motherboard
A network interface card (NIC) is now:
built-in interfaces
A network interface card (NIC) connects to:
a cable with an RJ-45 connecter
The network interface card (NIC) is designed to:
take communication off the physical cable (or wireless signal from the air) and present it to the computer for processing
A network interface card (NIC) has a:
unique physical address, known as a MAC address, that identifies the device to other hosts on the network
network interface card (NIC) have evolved to also provide:
wireless and virtual access to networks
Wireless network signals can be blocked by:
masonry
steel
concrete walls
Wireless network signals can be weaken:
over distance
A signal repeater or extender can:
enable areas of weak or no signals to take advantage of a wireless network
A wireless repeater resembles:
a wireless router and might include a switch, but instead of connecting a cable or DSL modem, it connects wirelessly to a wireless router
A hub is the simplest device used on:
an Ethernet network for connecting devices to each other
A hub features:
multiple RJ-45 ports
a power supply
signal lights to indicate network activity
Hubs were used to:
connect computers together and to boost the communication signal between computers
Hubs have been almost completely replaced by switches because:
a hub splits the bandwidth of a connection among all the computers connected to it
A hub broadcasts data to:
all computers connected to it
A modem connects:
a LAN to an Internet service provider (ISP)
A dial-up modem is:
a device that allows a computer access to the Internet by changing the digital signals of the computer to analog signals used by a typical land-based phone line
Dial-up modems are:
slow devices and are usually used today only if no other Internet option is available
The devices most commonly used to connect small networks to the Internet are:
Cable modems
DSL modems
A wireless bridge is:
a device (or a setting on many access points) that is used to connect two wireless LANs together in order to expand a wireless network or to connect wireless clients to an Ethernet network
A patch panel is a:
box designed as a junction point for twisted pair (TP) cable and fiber cable used in networks
Patch panels are typically built into:
wiring closets or added to equipment racks in a 1U or taller form factor
After removing any connector on the cable, each wire in the TP cable must be:
untwisted before being punched into the appropriate connection on the back of the panel
The twisted cables are color codes so:
they can be properly terminated at the other end
The most common standards for color-coding for twisted cables are:
T568A or T568B
The front of the patch panel uses:
RJ-45 connectors for short standard network cables
Powerline adapters are sold in:
pairs
Where are the powerline adapter pairs plugged into?
One unit into an AC wall socket near the router and is connected to the router via a switch
One unit plugs into an AC wall socket in the room or area that needs network/Internet access
With a wired extender, you can plug:
a computer or switch into the Ethernet port
With a wireless extender you need to:
log into the network via the wireless extender’s SSID
A Power over Ethernet (PoE) switch is a:
switch with added capability (a built-in endspan) to send power out a port using CAT5 or better grades of twisted pair cable
A Power over Ethernet (PoE) enables:
wireless access points
IP security cameras
VoIP phones
routers
other Ethernet devices to be installed in areas away from traditional power sources
A power over Ethernet injector installed:
between a standard Ethernet switch and a PoE device to provide power only
Wireless Ethernet is also known as:
IEEE 802.11
WiFi
Wireless Ethernet is:
the collective name for a group of wireless technologies compatible with wired Ethernet
Wireless technologies compatible with wired Ethernet is referred to:
wireless LAN (WLAN) standards
A SOHO wired or wireless router can provide:
a secure way for users to access the Internet and local network resources
A SOHO wired or wireless router can become a magnet for:
attack
To connect to a router open a browser and enter:
the IP address of the router in the address bar and press Enter
The wireless spectrum is divided into:
11 channels
Part of installing a router on a 2.4GHz wireless network is:
selecting an appropriate channel for the signal
For best results, avoid overlapping channels
What channels do not overlap with other channels?
1
6
11
Some routers feature an Auto setting that enables:
the router to use the least-active channel
To change the channel used by a wireless network follow these steps:
- Log into the router
- Navigate the wireless configuration dialog
- Select a different channel (typically 1, 6, or 11 when using 2.4GHz networking because they have less interference than other channels)
- Save your changes and exit the wireless configuration dialog
Network address translation (NAT) is the process of:
modifying IP addresses as information crosses a router
Network address translation (NAT) hides:
an entire IP address space on the LAN