Domain 4 Flashcards
The ________layer of the OSI model is responsible for the transport medium.
The application layer of the TCP model is the equivalent of the top _________layers of the OSI model.
NetBIOS runs on the __________layer of the OSI model.
UDP is a__________ protocol and does not provide acknowledgement of data received.
Well-known ports are in the number range of 0 to _______.
Data is converted to frames on the ________layer of the OSI model.
The __________layer in the TCP model mirrors the Network layer in the OSI model.
Encryption, as well as the incorporation of software pieces, takes place on the ________layer.
IPv4 addresses are __________bits in length.
Subnetting takes physical networks and splits them into ________networks.
The_________ command empties a DNS cache.
A shortcoming of IPv4 is that it has run out of________.
An IP address that starts with a number between 128 and 191 is a Class_________ IP address.
__________provides IPv6 connectivity to IPv4 hosts.
dual IP stack is the implementation of both _______and _______in an operating system.
subnet mask defines the network and________ portions of an IP address.
A gateway handles traffic meant for a _________network.
An___________can transmit data through multiple ports.
The IP address range with numbers starting with 240 through 255 are used for ___________purposes
Class _________addresses are used for multicast transmissions, while Class ________addresses are used for research.
IPv6 addresses are________ bits in length.
The ________command renews an IPv6 address.
IPv6 uses IPsec, which provides_________ and encryption on data
The first 48 bits of an IPv6 address typically represents the__________ portion of the address.
IPv6 addresses are normally obtained through a_________ server.
A double colon represents a block of ________in an IPv6 address.
The multicast range for IPv6 addresses is_________ .
A unique local IPv6 address is only routable within a single___________.
Users rely on __________in cases where sensitive data is transmitted over the internet.
Since people often use multiple devices to access email, __________is more secure than POP3.
A DNS table relies on_________ records, or hostname-to-IP address lookup records, and contains entries for the devices on a network.
While both SSH and _______can be used to connect a PC to a router, the latter is less secure.
DNS resolves________ to IP addresses.
A _______record creates an alias for a host name in DNS.
HOSTS files are used to resolve host names to IP addresses when DNS is not available.
HOSTS files resolve host names to_________
LMHOSTS files resolve IP addresses to__________ names on devices.
By default, the ________command returns A type records.
In smaller networks, a wireless access point often serves as a DHCP_________.
________NAT is a one-to-one mapping between a private IP address and a public IP address.
On most firewalls, outbound connections are_______.
Remote ___________allows one to connect to a device and perform tasks while a user is watching what is
being done.
In Port NAT, a request for data is sent to another network. That network’s _________matches up the port
number to the private IP address requesting the data and then transmits that data back.
In Port NAT, a request for data is sent to another network. That network’s _________matches up the port
number to the private IP address requesting the data and then transmits that data back.
The Open Systems Interconnection (OSI) model is a seven-layer model that defines how data is packaged, framed, and then converted to bits and transferred from a source to a destination.
The TCP model has four layers but covers the same seven principles as does the
OSI model
What are the seven layers of the OSI model, bottom to top?
a.
b.
c.
d.
e.
f.
g.
For each action, indicate the layer of the OSI model in which the action takes place.
a. ____________Gets data into frames
b. ____________Opens a communication line between a source and a destination
c. ____________Responsible for the transport medium
d. ____________Data is encrypted, if necessary
e. ____________Addresses data
Which layers in the OSI model are in the Application layer of the TCP model?
a.________
b.________
c.________
Part of understanding the concept of the OSI and TCP models is understanding the layers on which devices, protocols, and applications run. For the OSI model,
the first three layers are hardware layers while layers four through seven are mainly protocol-based.
For each protocol, app format, or device, identify the layer of the OSI model on which the protocol, format, or device resides:
a. Hub:___________
b. NetBIOS:___________
c. HTML:___________
d. Router:___________
e. DNS:___________
On which layer of the TCP model does encryption take place?
a.