Domain 4 Flashcards

1
Q

The ________layer of the OSI model is responsible for the transport medium.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The application layer of the TCP model is the equivalent of the top _________layers of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NetBIOS runs on the __________layer of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

UDP is a__________ protocol and does not provide acknowledgement of data received.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Well-known ports are in the number range of 0 to _______.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data is converted to frames on the ________layer of the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The __________layer in the TCP model mirrors the Network layer in the OSI model.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption, as well as the incorporation of software pieces, takes place on the ________layer.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPv4 addresses are __________bits in length.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Subnetting takes physical networks and splits them into ________networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The_________ command empties a DNS cache.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A shortcoming of IPv4 is that it has run out of________.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An IP address that starts with a number between 128 and 191 is a Class_________ IP address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

__________provides IPv6 connectivity to IPv4 hosts.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

dual IP stack is the implementation of both _______and _______in an operating system.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

subnet mask defines the network and________ portions of an IP address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A gateway handles traffic meant for a _________network.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An___________can transmit data through multiple ports.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The IP address range with numbers starting with 240 through 255 are used for ___________purposes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class _________addresses are used for multicast transmissions, while Class ________addresses are used for research.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IPv6 addresses are________ bits in length.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ________command renews an IPv6 address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPv6 uses IPsec, which provides_________ and encryption on data

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The first 48 bits of an IPv6 address typically represents the__________ portion of the address.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
IPv6 addresses are normally obtained through a_________ server.
26
A double colon represents a block of ________in an IPv6 address.
27
The multicast range for IPv6 addresses is_________ .
28
A unique local IPv6 address is only routable within a single___________.
29
Users rely on __________in cases where sensitive data is transmitted over the internet.
30
Since people often use multiple devices to access email, __________is more secure than POP3.
31
A DNS table relies on_________ records, or hostname-to-IP address lookup records, and contains entries for the devices on a network.
32
While both SSH and _______can be used to connect a PC to a router, the latter is less secure.
33
DNS resolves________ to IP addresses.
34
A _______record creates an alias for a host name in DNS.
35
HOSTS files are used to resolve host names to IP addresses when DNS is not available.
36
HOSTS files resolve host names to_________
37
LMHOSTS files resolve IP addresses to__________ names on devices.
38
By default, the ________command returns A type records.
39
In smaller networks, a wireless access point often serves as a DHCP_________.
40
________NAT is a one-to-one mapping between a private IP address and a public IP address.
41
On most firewalls, outbound connections are_______.
42
Remote ___________allows one to connect to a device and perform tasks while a user is watching what is being done.
43
In Port NAT, a request for data is sent to another network. That network’s _________matches up the port number to the private IP address requesting the data and then transmits that data back.
44
In Port NAT, a request for data is sent to another network. That network’s _________matches up the port number to the private IP address requesting the data and then transmits that data back.
45
The Open Systems Interconnection (OSI) model is a seven-layer model that defines how data is packaged, framed, and then converted to bits and transferred from a source to a destination.
46
The TCP model has four layers but covers the same seven principles as does the OSI model
47
What are the seven layers of the OSI model, bottom to top?
a. b. c. d. e. f. g.
48
For each action, indicate the layer of the OSI model in which the action takes place.
a. ____________Gets data into frames b. ____________Opens a communication line between a source and a destination c. ____________Responsible for the transport medium d. ____________Data is encrypted, if necessary e. ____________Addresses data
49
Which layers in the OSI model are in the Application layer of the TCP model?
a.________ b.________ c.________
50
Part of understanding the concept of the OSI and TCP models is understanding the layers on which devices, protocols, and applications run. For the OSI model, the first three layers are hardware layers while layers four through seven are mainly protocol-based.
51
For each protocol, app format, or device, identify the layer of the OSI model on which the protocol, format, or device resides:
a. Hub:___________ b. NetBIOS:___________ c. HTML:___________ d. Router:___________ e. DNS:___________
52
On which layer of the TCP model does encryption take place?
a.
53
TCP and UDP are transport-layer protocols that help start the process of organizing data into segments, with the eventual goal of breaking data down into bits of data. It is important, for the exam, to know the differences between these protocols.
54
For each situation, identify if TCP or UDP is the protocol being used.
a. A Word document is being sent to a coworker:_____ b. A video is being streamed:_____ c. An acknowledgement is sent for data received:_____ d. The protocol is connection-oriented:_____ e. The protocol is connectionless:_____
55
It is important to know the concept of well-known ports, as administrators may need to do port scans to see which ports are active. Well-known ports that do not have an associated app or protocol should not be handling traffic. It is also important to know the order in which, through the OSI model, data is packaged into packets and frames, with the eventual goal being that data is converted into bits and then transmitted from one device to the other.
56
For each description of ports, identify the port range numbers for the ports being described.
a. Dynamic and private ports:_______ b. Ports used for proprietary apps and services:_______ c. Well-known ports:__________
57
For each state of data, indicate the OSI model layer responsible for putting the data into said state:
a. Segment:_________ b. Packet:_________ c. Frame:_________ d. Bit:_________
58
On which layer of the OSI model is IP address information added to data?
59
The Transmission Control Protocol (TCP or TCP/IP) model is a protocol used in internet communications. It establishes several rules concerning communication and connection between network devices and the internet.
60
Unlike the OSI model, the TCP/IP model contains four layers: the Network Access layer, the Internet layer, the Transport layer, and the Application layer. Different devices, protocols, and applications are used at each layer.
61
Match the TCP/IP layer to the OSI layer(s) with equivalent duties. A. Application B. Transport C. Internet D. Network Access
a. ________Presentation and Session layers b. ________Transport layer c. ________Data Link and Physical layers d. ________Network layer
62
Identify the TCP/IP layer described
a. ________Features the use of switches, media, and Ethernet cables b. ________Employs IP as the main protocol and incorporates the use of hardware c. ________Includes the use of session protocols, as well as text and image formats d. ________Performs data segmentation e. ________Breaks data into frames and bits and transfers it to a destination f. ________Breaks data into packets and addresses those packets g. ________Employs TCP as the main protocol h. ________Formats data and opens a session with the data recipient
63
IPv4 addresses are logical addresses assigned to devices, with the main purpose being the ability to send traffic to and from other devices, using their IP addresses as a destination, especially if the destination device resides on a network other than the sending device. For the exam, users will want to know the reasons for using IP addressing, what an IP address looks like, the purpose of subnetting, and the purpose of the ipconfig command.
64
What is the purpose of subnetting?
65
What device is needed to connect subnets?
66
Which type of IPv4 address is most likely to be obtained when connecting to a network?
67
What is the number range of each of the numbers in an IPv4 address?
68
For each IP address, indicate the class to which the IP address belongs: a. 192.168.1.10: b. 10.10.10.10: c. 172.16.16.10:
a. b. c.
69
On a Windows device, open a command prompt.....Run the command that will show the IP address, DHCP, and DNS servers for your device.
a.
70
As IPv4 and IPv6 are different address systems, steps need to be taken to ensure compatibility between the two. Tunneling allows for one address type to carry packets of the other address type. Dual IP stack allows for both IPv4 and IPv6 to coexist within an operating system.
71
For each description, identify the form of IPv6 tunneling taking place. a. Provides IPv6 connectivity to IPv4 hosts: b. Transmits IPv6 packets between dual-stack nodes on an IPv4 network: c. Allows a router with a public IPv4 address to be an IPv6 gateway for a set of LANs:
a. b. c.
72
The IP address ::ffff:192.168.1.1 is an example of which type of address?
73
In the IP address ::ffff:192.168.1.1, how many bits does the :: represent?
74
The subnet mask for an IP address defines the network and host portion of the address. The subnet mask itself also indicates the size of a subnet, a logical network.
75
A gateway, specifically a default gateway, is a device that handles traffic that has a destination outside of the current network.
76
Ports, as covered earlier, are used to run specific apps and protocols while packets are forms of data on layer 3 of the OSI model.
77
An IP address of 10.0.2.46 has a subnet mask of 255.255.255.0. What is the host portion of the IP address?
a.
78
How many devices are allowed in a network with a subnet mask of 255.255.255.0?
a.
79
What type of physical device typically serves as a gateway?
80
What is the name of the layer on the OSI model on which data packets are formed?
81
Open a command prompt. Run the command that will show the IP address for the default gateway on your device. What is the address?
a.
82
This project reviews private and reserved IP address ranges discussed earlier in the course. There are also other reserved IP address ranges that are not private in nature.
83
What is the range of IP addresses set aside for multicast IP addresses?
84
What is the purpose of a multicast address?
85
What is the range of IP addresses set aside for experimental purposes?
86
What is the overall broadcast address?
87
What does the IP address 169.254.1.1 represent?
88
A subnet mask dictates which part of an IP address is the network portion and which part is the host portion. Subnet masks fall into one of two types: classful or classless.
89
Classful addresses refer to an organized structure in which the subnet mask number for each octet is either 0 or 255. Classes A, B, and C represent addresses in wide use on networks. Classes D and E are not assigned IP addresses; they represent other types of addresses. Classless addresses do not follow this organized structure.
90
Indicate whether the following statements are true or false. a. _______An address that uses 127 is a broadcast transmission and does not fit into the IP addressing scheme. b. _______An IP address with a subnet mask of 255.255.240.0 is classified as a Class B address. c. _______Class E addresses are used for research.
a. b. c.
91
Complete the table by filling in the range of IP addresses represented by each class. Class IP Address Range (first numbers) Subnet Mask A a.____________ 255.0.0.0 B b.____________ 255.255.0.0 C c.____________ 255.255.255.0 D d.____________ N/A E e.____________ N/A
a. b. c. d. e.
92
The basic concepts behind IPv6 addressing and subnetting are the same as they are for IPv4. The major differences are in the addressing schemes and the number of addresses. As is the case with IPv4, users will want to know the basics of addressing and subnetting IPv6 for the exam.
93
What is the bit length of an IPv6 address?
94
What is the main reason for using IPv6?
95
What can the IPv6 address 2001:80e4:4003:0000:0000:3e23:2a39:0001 be reduced to using shorthand notation?
96
What are two security measures built in to IPv6 addressing?
a. b.
97
What is the equivalent for an IPv4 subnet in IPv6?
98
On a Windows device, open a command prompt. Run the command that will renew the IPv6 addresses on the device.
a.
99
Like IPv4, IPv6 traffic meant for a network other than the current network needs a gateway to handle traffic meant for other networks. Ports can be analyzed for IPv6 traffic. Packets of data work the same way in IPv6 as they do in IPv4.
100
How are IPv6 addresses usually obtained?
101
On which named layer of the OSI model is data broken up into packets?
102
Can an IPv6 address and default gateway be defined manually?
103
What does a :: represent in an IPv6 address?
104
Which command is run in a command prompt to show open ports for IPv6 addresses?
105
Just as IPv4 addresses have reserved ranges, IPv6 addresses have reserved ranges as well. Some of these are like IPv4 and some are unique to IPv6. For the exam, you will want to know these reserved ranges.
106
For each IPv6 address range, identify the name of the reserved range. a. ::1: b. 2000::/3: c. 3FFF:FFFF::/32: d. 2001:0DB8::/32: e. FF00::/8: f. FC00::/7: g. FE80::/10:
a. b. c. d. e. f. g.
107
Two important types of IPv6 addresses to know for the exam are link-local addresses and global addresses. Both share similar functions to their IPv4 equivalents. An IPv6 link-local address communicates with other devices on a local network. An IPv6 global address is equivalent to a public IPv4 address.
108
Global unicast addresses usually start with either a 2 or which other number?_________ A. 3 B. 4 C. 5 D. 6
109
A unique local IPv6 address starts with which letters?_______ A. FA or FB B. FC or FD C. FE or FF D. FG or FH
110
Link-local IPv6 addresses are most similar to which type of IPv4 address?__________ A. Loopback B. MAC C. DHCP D. APIPA
111
An IPv6 address that starts with 2601 falls under which type of address?_________ A. Global unicast B. Global broadcast C. Private D. Link-local
112
Different ports and protocols are preferred for webpages, emails, servers, and remote access. Hypertext Transfer Protocol (HTTP), Hypertext Transfer Protocol Secure (HTTPS), and File Transfer Protocol (FTP) are the most common protocols used for webpages. Simple Mail Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP) are used for emails. POP3 is similar to IMAP but is less popular. Domain Name Server (DNS) is used for domains and records. Remote Desktop Protocol (RDP) and Secure Shell (SSH) are used for remote connections. Telnet, while similar, is a less secure alternative.
113
Match the protocol to its definition. A. HTTP (Port 80) B. HTTPS (Port 442) C. FTP (Port 21) D. SMTP (Port 25) E. IMAP (Port 143) F. POP3 G. DNS (Port 53) H. RDP (Port 3389) I. SSH (Port 22)
a. ______Protocol that ensures data transmitted over the internet is encrypted b. ______Ensures that incoming email accessed on a client device stays on the server c. ______Primary webpage protocol that transmits unencrypted data over the internet d. ______Maps hostnames to IP addresses, often via records e. ______Protocol that focuses on outgoing email f. ______Encrypted protocol used to connect one device to another g. ______Downloads email off a server and onto a client device h. ______Used to upload and download files to and from a web server i. ______Used to connect one device to another remotely
114
Domain Name System (DNS) is the service most responsible for resolving hostnames to IP addresses. This helps users remember a destination by name instead of needing an IP address to reach a destination. With DNS comes resource records of many types. For the exam, it is important to know the differences among A, AAAA, CNAME, MX, and PTR records.
115
Which types of DNS servers have very large tables of records?
116
Match the resource record type to its description. A. A B. AAAA C. MX D. PTR E. CNAME
a. _____Used to describe a mail server b. _____Resolves host names to IP addresses c. _____Resolves IP addresses to host names d. _____Creates an alias for a host name e. _____Resolves host names to IPv6 addresses
117
Windows Internet Name Services (WINS) is an older method of resolving host names to IP addresses and is generally used only when an app is built to use WINS. HOSTS and LMHOSTS files can also resolve host names to IP addresses but DNS is by far the primary means of resolving host names to IP addresses.
118
What does WINS resolve to IP addresses?
119
Which type of host file is the equivalent of using WINS?
120
List, in order, the three steps in the name resolution process:
a. b. c.
121
On a Windows device, open the HOSTS file using Notepad. Does the HOSTS file have any name resolution entries?
122
When looking up DNS information on an entity, users can rely on several commands in the command prompt to help their search.
123
Open the command prompt on your device. Enter nslookup mode. Type google.com What is the name of the server that Google is listed under? Enable nslookup to display the mail exchange records for an entity. Look up the mail exchange records for google.com
a.
124
As you become more familiar with the overall concept of networks, how they are built, and how they function, you will want to learn more about networking services, such as Dynamic Host Configuration Protocol (DHCP), NAT, remote access, and two services covered earlier in this course: firewalls and VPNs. For the exam, you will want to know which service to use or is in use given a scenario.
125
Match the network service to its description. A. DHCP B. VPN C. Firewall
a. ________A private network over a public network connection b. ________A service which grants IP addresses to devices joining a network c. ________Software or hardware that filters traffic based on ports and protocols
126
Match the form of NAT to its description. A. Static NAT B. Dynamic NAT C. PAT
a. ________A many-to-many mapping between private IP addresses and a pool of public IP addresses b. ________A form of NAT in which a single public IP address takes requests from multiple private IP addresses and assigns each private IP address a distinct port number c. ________A one-to-one mapping between a private IP address and a public IP address
127
Which form of remote access allows users to connect to another device and have exclusive viewing of that device?
128
With NAT, three kinds of address translations can occur as a request from a private address that is attached to a public IP address. In the first type, every private IP address that makes a request receives a public IP for use. In the second type, private IP addresses request to use a public IP from an available pool of addresses. In the third type, each private IP address request is assigned a port from a public IP address. This type is also known as Port NAT.
129
Indicate whether the following statements are true or false.
a. ___________The most common form of NAT is a NAT pool. The least common form is Port NAT. b. ___________ In Port NAT, the combination of a public IP address and port is used to send a request for data from to another network. c. ___________ Since most homes and businesses have only one public IP address, the first form of NAT request (in which every private IP address request receives a public IP) is rarely used.
130
What is one disadvantage to applying for a public IP address via a NAT pool?