Domain 4 Flashcards

1
Q

The ________layer of the OSI model is responsible for the transport medium.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The application layer of the TCP model is the equivalent of the top _________layers of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NetBIOS runs on the __________layer of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UDP is a__________ protocol and does not provide acknowledgement of data received.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Well-known ports are in the number range of 0 to _______.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is converted to frames on the ________layer of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The __________layer in the TCP model mirrors the Network layer in the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption, as well as the incorporation of software pieces, takes place on the ________layer.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPv4 addresses are __________bits in length.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Subnetting takes physical networks and splits them into ________networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The_________ command empties a DNS cache.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A shortcoming of IPv4 is that it has run out of________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IP address that starts with a number between 128 and 191 is a Class_________ IP address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________provides IPv6 connectivity to IPv4 hosts.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

dual IP stack is the implementation of both _______and _______in an operating system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

subnet mask defines the network and________ portions of an IP address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A gateway handles traffic meant for a _________network.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An___________can transmit data through multiple ports.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The IP address range with numbers starting with 240 through 255 are used for ___________purposes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class _________addresses are used for multicast transmissions, while Class ________addresses are used for research.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPv6 addresses are________ bits in length.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ________command renews an IPv6 address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPv6 uses IPsec, which provides_________ and encryption on data

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The first 48 bits of an IPv6 address typically represents the__________ portion of the address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IPv6 addresses are normally obtained through a_________ server.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A double colon represents a block of ________in an IPv6 address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The multicast range for IPv6 addresses is_________ .

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A unique local IPv6 address is only routable within a single___________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Users rely on __________in cases where sensitive data is transmitted over the internet.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Since people often use multiple devices to access email, __________is more secure than POP3.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A DNS table relies on_________ records, or hostname-to-IP address lookup records, and contains entries for the devices on a network.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

While both SSH and _______can be used to connect a PC to a router, the latter is less secure.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DNS resolves________ to IP addresses.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A _______record creates an alias for a host name in DNS.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HOSTS files are used to resolve host names to IP addresses when DNS is not available.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

HOSTS files resolve host names to_________

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

LMHOSTS files resolve IP addresses to__________ names on devices.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

By default, the ________command returns A type records.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

In smaller networks, a wireless access point often serves as a DHCP_________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

________NAT is a one-to-one mapping between a private IP address and a public IP address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

On most firewalls, outbound connections are_______.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Remote ___________allows one to connect to a device and perform tasks while a user is watching what is
being done.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In Port NAT, a request for data is sent to another network. That network’s _________matches up the port
number to the private IP address requesting the data and then transmits that data back.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In Port NAT, a request for data is sent to another network. That network’s _________matches up the port
number to the private IP address requesting the data and then transmits that data back.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The Open Systems Interconnection (OSI) model is a seven-layer model that defines how data is packaged, framed, and then converted to bits and transferred from a source to a destination.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

The TCP model has four layers but covers the same seven principles as does the
OSI model

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What are the seven layers of the OSI model, bottom to top?

A

a.
b.
c.
d.
e.
f.
g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

For each action, indicate the layer of the OSI model in which the action takes place.

A

a. ____________Gets data into frames
b. ____________Opens a communication line between a source and a destination
c. ____________Responsible for the transport medium
d. ____________Data is encrypted, if necessary
e. ____________Addresses data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which layers in the OSI model are in the Application layer of the TCP model?

A

a.________
b.________
c.________

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Part of understanding the concept of the OSI and TCP models is understanding the layers on which devices, protocols, and applications run. For the OSI model,
the first three layers are hardware layers while layers four through seven are mainly protocol-based.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

For each protocol, app format, or device, identify the layer of the OSI model on which the protocol, format, or device resides:

A

a. Hub:___________
b. NetBIOS:___________
c. HTML:___________
d. Router:___________
e. DNS:___________

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

On which layer of the TCP model does encryption take place?

A

a.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

TCP and UDP are transport-layer protocols that help start the process of organizing data into segments, with the eventual goal of breaking data down
into bits of data. It is important, for the exam, to know the differences between these protocols.

A
54
Q

For each situation, identify if TCP or UDP is the protocol being used.

A

a. A Word document is being sent to a coworker:_____
b. A video is being streamed:_____
c. An acknowledgement is sent for data received:_____
d. The protocol is connection-oriented:_____
e. The protocol is connectionless:_____

55
Q

It is important to know the concept of well-known ports, as administrators may need to do port scans to see which ports are active. Well-known ports that do
not have an associated app or protocol should not be handling traffic.

It is also important to know the order in which, through the OSI model, data is packaged into packets and frames, with the eventual goal being that data is
converted into bits and then transmitted from one device to the other.

A
56
Q

For each description of ports, identify the port range numbers for the ports being described.

A

a. Dynamic and private ports:_______
b. Ports used for proprietary apps and
services:_______
c. Well-known ports:__________

57
Q

For each state of data, indicate the OSI model layer responsible for putting the data into said state:

A

a. Segment:_________
b. Packet:_________
c. Frame:_________
d. Bit:_________

58
Q

On which layer of the OSI model is IP address information added to data?

A
59
Q

The Transmission Control Protocol (TCP or TCP/IP) model is a protocol used in internet communications. It establishes several rules concerning communication
and connection between network devices and the internet.

A
60
Q

Unlike the OSI model, the TCP/IP model contains four layers: the Network Access layer, the Internet layer, the Transport layer, and the Application layer. Different devices, protocols, and applications are used at each layer.

A
61
Q

Match the TCP/IP layer to the OSI layer(s) with equivalent duties.
A. Application
B. Transport
C. Internet
D. Network Access

A

a. ________Presentation and Session layers
b. ________Transport layer
c. ________Data Link and Physical layers
d. ________Network layer

62
Q

Identify the TCP/IP layer described

A

a. ________Features the use of switches, media, and Ethernet cables
b. ________Employs IP as the main protocol and incorporates the use of hardware
c. ________Includes the use of session protocols, as well as text and image formats
d. ________Performs data segmentation
e. ________Breaks data into frames and bits and transfers it to a destination
f. ________Breaks data into packets and addresses those packets
g. ________Employs TCP as the main protocol
h. ________Formats data and opens a session with the data recipient

63
Q

IPv4 addresses are logical addresses assigned to devices, with the main purpose being the ability to send traffic to and from other devices, using their IP addresses as a destination, especially if the destination device resides on a network other than the sending device. For the exam, users will want to know the reasons for using IP addressing, what an IP address looks like, the purpose of subnetting, and the purpose of the ipconfig command.

A
64
Q

What is the purpose of subnetting?

A
65
Q

What device is needed to connect subnets?

A
66
Q

Which type of IPv4 address is most likely to be obtained when connecting to a network?

A
67
Q

What is the number range of each of the numbers in an IPv4 address?

A
68
Q

For each IP address, indicate the class to which the IP address belongs:
a. 192.168.1.10:
b. 10.10.10.10:
c. 172.16.16.10:

A

a.
b.
c.

69
Q

On a Windows device, open a command prompt…..Run the command that will show the IP address, DHCP, and DNS servers for your device.

A

a.

70
Q

As IPv4 and IPv6 are different address systems, steps need to be taken to ensure compatibility between the two. Tunneling allows for one address type to carry
packets of the other address type. Dual IP stack allows for both IPv4 and IPv6 to coexist within an operating system.

A
71
Q

For each description, identify the form of IPv6 tunneling taking place.
a. Provides IPv6 connectivity to IPv4 hosts:
b. Transmits IPv6 packets between dual-stack nodes on an IPv4 network:
c. Allows a router with a public IPv4 address to be an IPv6 gateway for a set of LANs:

A

a.
b.
c.

72
Q

The IP address ::ffff:192.168.1.1 is an example of which type of address?

A
73
Q

In the IP address ::ffff:192.168.1.1, how many bits does the :: represent?

A
74
Q

The subnet mask for an IP address defines the network and host portion of the address. The subnet mask itself also indicates the size of a subnet, a logical
network.

A
75
Q

A gateway, specifically a default gateway, is a device that handles traffic that has a destination outside of the current network.

A
76
Q

Ports, as covered earlier, are used to run specific apps and protocols while packets are forms of data on layer 3 of the OSI model.

A
77
Q

An IP address of 10.0.2.46 has a subnet mask of 255.255.255.0. What is
the host portion of the IP address?

A

a.

78
Q

How many devices are allowed in a network with a subnet mask of 255.255.255.0?

A

a.

79
Q

What type of physical device typically serves as a gateway?

A
80
Q

What is the name of the layer on the OSI model on which data packets are formed?

A
81
Q

Open a command prompt. Run the command that will show the IP address for the default gateway on your device. What is the address?

A

a.

82
Q

This project reviews private and reserved IP address ranges discussed earlier in the course. There are also other reserved IP address ranges that are not private
in nature.

A
83
Q

What is the range of IP addresses set aside for multicast IP addresses?

A
84
Q

What is the purpose of a multicast address?

A
85
Q

What is the range of IP addresses set aside for experimental purposes?

A
86
Q

What is the overall broadcast address?

A
87
Q

What does the IP address 169.254.1.1 represent?

A
88
Q

A subnet mask dictates which part of an IP address is the network portion and which part is the host portion. Subnet masks fall into one of two types: classful
or classless.

A
89
Q

Classful addresses refer to an organized structure in which the subnet mask number for each octet is either 0 or 255. Classes A, B, and C represent addresses in wide use on networks. Classes D and E are not assigned IP addresses; they represent other types of addresses.

Classless addresses do not follow this organized structure.

A
90
Q

Indicate whether the following statements are true or false.
a. _______An address that uses 127 is a broadcast
transmission and does not fit into the IP addressing scheme.
b. _______An IP address with a subnet mask of 255.255.240.0 is classified as a Class B address.
c. _______Class E addresses are used for research.

A

a.
b.
c.

91
Q

Complete the table by filling in the range of IP addresses represented by each class.

Class IP Address Range (first numbers) Subnet Mask
A a.____________ 255.0.0.0
B b.____________ 255.255.0.0
C c.____________ 255.255.255.0
D d.____________ N/A
E e.____________ N/A

A

a.
b.
c.
d.
e.

92
Q

The basic concepts behind IPv6 addressing and subnetting are the same as they are for IPv4. The major differences are in the addressing schemes and the number of addresses. As is the case with IPv4, users will want to know the basics of addressing and subnetting IPv6 for the exam.

A
93
Q

What is the bit length of an IPv6 address?

A
94
Q

What is the main reason for using IPv6?

A
95
Q

What can the IPv6 address 2001:80e4:4003:0000:0000:3e23:2a39:0001 be reduced to using shorthand notation?

A
96
Q

What are two security measures built in to IPv6 addressing?

A

a.
b.

97
Q

What is the equivalent for an IPv4 subnet in IPv6?

A
98
Q

On a Windows device, open a command prompt. Run the command that will renew the IPv6 addresses on the device.

A

a.

99
Q

Like IPv4, IPv6 traffic meant for a network other than the current network needs a gateway to handle traffic meant for other networks. Ports can be analyzed for IPv6 traffic. Packets of data work the same way in IPv6 as they do in IPv4.

A
100
Q

How are IPv6 addresses usually obtained?

A
101
Q

On which named layer of the OSI model is data broken up into packets?

A
102
Q

Can an IPv6 address and default gateway be defined manually?

A
103
Q

What does a :: represent in an IPv6 address?

A
104
Q

Which command is run in a command prompt to show open ports for IPv6 addresses?

A
105
Q

Just as IPv4 addresses have reserved ranges, IPv6 addresses have reserved ranges as well. Some of these are like IPv4 and some are unique to IPv6. For the exam, you will want to know these reserved ranges.

A
106
Q

For each IPv6 address range, identify the name of the reserved range.
a. ::1:
b. 2000::/3:
c. 3FFF:FFFF::/32:
d. 2001:0DB8::/32:
e. FF00::/8:
f. FC00::/7:
g. FE80::/10:

A

a.
b.
c.
d.
e.
f.
g.

107
Q

Two important types of IPv6 addresses to know for the exam are link-local addresses and global addresses. Both share similar functions to their IPv4 equivalents. An IPv6 link-local address communicates with other devices on a local network. An IPv6 global address is equivalent to a public IPv4 address.

A
108
Q

Global unicast addresses usually start with either a 2 or which other number?_________
A. 3
B. 4
C. 5
D. 6

A
109
Q

A unique local IPv6 address starts with which letters?_______
A. FA or FB
B. FC or FD
C. FE or FF
D. FG or FH

A
110
Q

Link-local IPv6 addresses are most similar to which type of IPv4 address?__________
A. Loopback
B. MAC
C. DHCP
D. APIPA

A
111
Q

An IPv6 address that starts with 2601 falls under which type of address?_________
A. Global unicast
B. Global broadcast
C. Private
D. Link-local

A
112
Q

Different ports and protocols are preferred for webpages, emails, servers, and remote access.

Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS),
and File Transfer Protocol (FTP) are the most common protocols used for webpages.

Simple Mail Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP) are used for emails. POP3 is similar to IMAP but is less popular.

Domain Name Server (DNS) is used for domains and records.

Remote Desktop Protocol (RDP) and Secure Shell (SSH) are used for remote connections. Telnet, while similar, is a less secure alternative.

A
113
Q

Match the protocol to its definition.
A. HTTP (Port 80)
B. HTTPS (Port 442)
C. FTP (Port 21)
D. SMTP (Port 25)
E. IMAP (Port 143)
F. POP3
G. DNS (Port 53)
H. RDP (Port 3389)
I. SSH (Port 22)

A

a. ______Protocol that ensures data transmitted over the internet is encrypted
b. ______Ensures that incoming email accessed on a client device stays on the server
c. ______Primary webpage protocol that transmits unencrypted data over the internet
d. ______Maps hostnames to IP addresses, often via records
e. ______Protocol that focuses on outgoing email
f. ______Encrypted protocol used to connect one device to another
g. ______Downloads email off a server and onto a client device
h. ______Used to upload and download files to and from a web server
i. ______Used to connect one device to another remotely

114
Q

Domain Name System (DNS) is the service most responsible for resolving hostnames to IP addresses. This helps users remember a destination by name instead of needing an IP address to reach a destination.

With DNS comes resource records of many types. For the exam, it is important to know the differences among A, AAAA, CNAME, MX, and PTR records.

A
115
Q

Which types of DNS servers have very large tables of records?

A
116
Q

Match the resource record type to its description.
A. A
B. AAAA
C. MX
D. PTR
E. CNAME

A

a. _____Used to describe a mail server
b. _____Resolves host names to IP addresses
c. _____Resolves IP addresses to host names
d. _____Creates an alias for a host name
e. _____Resolves host names to IPv6 addresses

117
Q

Windows Internet Name Services (WINS) is an older method of resolving host names to IP addresses and is generally used only when an app is built to use WINS. HOSTS and LMHOSTS files can also resolve host names to IP addresses but DNS is by far the primary means of resolving host names to IP addresses.

A
118
Q

What does WINS resolve to IP addresses?

A
119
Q

Which type of host file is the equivalent of using WINS?

A
120
Q

List, in order, the three steps in the name resolution process:

A

a.
b.
c.

121
Q

On a Windows device, open the HOSTS file using Notepad. Does the HOSTS file have any name resolution entries?

A
122
Q

When looking up DNS information on an entity, users can rely on several commands in the command prompt to help their search.

A
123
Q

Open the command prompt on your device. Enter nslookup mode. Type google.com
What is the name of the server that Google is listed under?

Enable nslookup to display the mail exchange records for an entity. Look up the mail exchange records for google.com

A

a.

124
Q

As you become more familiar with the overall concept of networks, how they are built, and how they function, you will want to learn more about networking services, such as Dynamic Host Configuration Protocol (DHCP), NAT, remote access, and two services covered earlier in this course: firewalls and VPNs. For the exam, you will want to know which service to use or is in use given a scenario.

A
125
Q

Match the network service to its description.
A. DHCP
B. VPN
C. Firewall

A

a. ________A private network over a public network connection
b. ________A service which grants IP addresses to devices joining
a network
c. ________Software or hardware that filters traffic based on ports
and protocols

126
Q

Match the form of NAT to its description.
A. Static NAT
B. Dynamic NAT
C. PAT

A

a. ________A many-to-many mapping between private IP addresses and a pool of public IP addresses
b. ________A form of NAT in which a single public IP address takes requests from multiple private IP addresses and assigns each private IP address a distinct port number
c. ________A one-to-one mapping between a private IP address and a public IP address

127
Q

Which form of remote access allows users to connect to another device and have exclusive viewing of that device?

A
128
Q

With NAT, three kinds of address translations can occur as a request from a private address that is attached to a public IP address.

In the first type, every private IP address that makes a request receives a public IP for use.

In the second type, private IP addresses request to use a public IP from an available pool of addresses.

In the third type, each private IP address request is assigned a port from a public IP address. This type is also known as Port NAT.

A
129
Q

Indicate whether the following statements are true or false.

A

a. ___________The most common form of NAT is a NAT pool.
The least common form is Port NAT.
b. ___________ In Port NAT, the combination of a public IP address and port is used to send a request
for data from to another network.
c. ___________ Since most homes and businesses have only one public IP address, the first form of NAT
request (in which every private IP address request receives a public IP) is rarely used.

130
Q

What is one disadvantage to applying for a public IP address via a NAT pool?

A