Greg Flashcards

Learn information

1
Q

How many bytes make up a MAC address?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many bits make up a MAC address?

A

48

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The OUI (organizationally unique identifier) are assigned by the IEEE to the m___________.

A

manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

THE OUI is represented by the f________ t_______ bytes in the MAC address

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The l________ t_________ bytes in the MAC address are usually assigned s_____________ which allows for u____________; duplications are rare.

A

last three
sequentially
uniqueness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command to determine MAC address

A

ipconfig /all

ipconfig then space forward slash all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The physical unique address of the network interface card burned on the network adapter card; allows internetwork communication

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI level of MAC address

A

Layer 2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP/IP level of MAC address

A

Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

OSI level of IP address

A

Layer 3 Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many bytes make up an IP address

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many bits make up an IP address

A

32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Command to determine IP address

A

ipconfig /all

ipconfig then space forward slash all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logical Address that allows network to network communication via routers (Distant WAN communication); represented in dotted decimal notation)

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Local Area Network (LAN) is a collection of computers and other network devices that fit within the scope of a ___________ p_________ network

A

single physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Wide Area Network (WAN) is an internetwork that connects m_________ s_______ and spans l________ g_________ r____________.

A

multiple sites; large geographic regions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Unlike a WAN, a LAN may reside in only a __________ location

A

single

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Examples of a WAN

A

Internet; different buildings of a campus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

With peer-to-peer architecture all computers on the networks are peers. There are no dedicated s_________.

A

servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Peer-to-peer architecture

There is no c__________ c_________ over shared resources. Any individual machine can share its resources as it pleases.

A

centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Peer-to-peer architecture

All computers on the network can act as either a client ( r__________ resources) or a server ( p________ resources)

A

receive; provide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Client/Server Architecture

Network is composed of clients and servers. Servers provide c__________ c__________ over network resources, i.e. files, printers, authentication,etc

A

centralized control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Client/Server Architecture

____________ receive resources
_________________ provide resources

A

clients; servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Connects LANs to other LANs, routes traffic across the Internet

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Protects network from malicious packets of data; keeps the bad stuff out

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Connects devices together within a LAN; switches traffic within a LAN

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Servers

Type of server that manages access control on the network. Ex. Microsoft Active Directory

A

Authentication Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Servers

Type of server that stores and dispenses files

A

File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Servers

Type of server that is the network’s post office, which handles email functions. Ex. Microsoft Exchange

A

Mail Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Servers

Type of server that manages all printers on the network

A

Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Servers

Type of server that manages web-based activities on the network. Ex. Microsoft IIS and Apache

A

Web Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Servers

Type of server that manges network applications

A

Application Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Server

Type of server that stores data in the form of a relational database Ex. Microsoft SQL Server, Oracle, MySQL

A

Database Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Useful in planning a new network; shows the network on a “map”; assists in understanding signal flow

A

Network topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Network topologies

All devices are connected to a central device; usually a switch or a hub; popular topology in today’s networks; used in most large and small networks.

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Star toplogy has a built in fault tolerance (as long as the central devices doesn’t go down the network will continue to work; central device is a s_____ point of f_________

A

single; failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Network topologies

Each device is connected to every other device by separate cabling

Highly redundant and fault tolerance

A

Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Mesh topology

Used in W______
Expensive to install

A

WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Network Topology

One to One Connection

Seen in Connections between buildings

A

Point to Point Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Point to Point Topology

Often used as d________ secure ______ link
Doesn’t provide r___________

A

dedicated
WAN
redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Network Topology
A combination of multiple physical topologies

Almost all networks are this type of network topology

Ex. Star, Mesh and Point to Point Topologies combined

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The network adapter installed on your computer that provides the physical and electrical connections to the network media. Can either be an expansion card or built directly into the motherboard.

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Older device used to connect devices together within a network. Replaced by switches

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Hub
Multi-port repeater
-Traffic goes in one port and is repeated out e\_\_\_\_\_\_ o\_\_\_\_\_\_ p\_\_\_\_\_\_\_\_
-OSI Layer 1 device
-Dumb network device
-Less secure
A

every other port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Connects Devices together just like a hub; intelligent network device

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Switches use ________ address to communicate

A

MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Switch memorizes the M_______ A_________ of each device connect to it via a M________ A_______ T_______

A

MAC address

MAC address table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Switch

  • Traffic goes in one port and is repeated out to o_______ d_________ port
  • Designed for high bandwidth
  • Standard in Today’s Network Infrastructure
  • More secure
A

only destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What OSI Layer are Hubs

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What OSI Layer are Switches

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

MAC address devices usually are what OSI level

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Switches learn MAC addresses by ____ MAC address

A

source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Whenever you send a packet of information it includes the ________ MAC address (where it is coming from) as well as _________ MAC Address (where you want to send the data.

A

source;destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Extends the Wired Network onto the WIreless Network

A

Wireless Access Point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

WAP is not a wireless r________

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

WAP allows moible users to connect to a w________ n________ wirelessly

A

wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

__________ are used to connect different networks together;

A

Router;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Routers route traffics between networks using ________ ___________

A

IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What OSI layer are routers?

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Packet Routing Process
If computer A wants to communicate with computer C, it knows based upon its IP address configuration that Computer C is not on its network. So, it sends a packet of data to Router 1, its configured ___________ _________.

A

Default Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Packet Routing Process

The default gateway router, using a selected ________ _________ routes the packet of information through the Internet or a WAN via router h_____ until the packet either reaches its destiantion network or the packet is timed out.

A

routing protocol

hops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Protects your LAN from malciious activity on the internet

A

Firewall

63
Q

Firewall

Prevents u__________ network traffic on different networks from accessing your network and vice versa

A

unwanted

64
Q

A firewall can be a standalone network ______________ or __________ on a computer system, meaning network based or host based

A

device;software

65
Q

Automatically assigns IP addresses to hosts

A

Dynamic Host Configuration Protocol (DHCP)

66
Q

Twisted-Pair Cooper Cabling (the most commonly used in networks) is twisted because it helps to reduce i_________such as cross talk and noise (electromagnetic interference)

A

interference

67
Q

Twisted-Pair Cooper Cabling can only go _______- meters maximum before the signal gets too weak

A

100

68
Q

Type of Twisted Pair Network Cabling that is used to connect non-similar devices such as

  • switch to router
  • computer to switch
  • switch to wireless access point
A

Straight-Through Cable

69
Q

Type of Twisted Pair Cabling that is used to connect similar devices such as

  • computer to computer
  • switch to switch
  • router directly connected to computer
A

Crossover cable

70
Q

Used to learn order of OSI layers

A

Please Do Not Throw Sausage Pizza Away

71
Q

OSI layers

A
Application
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link (MAC) Layer
Physical Layer
72
Q

OSI Layers: Application Layer-Layer 7

Where u________ communicate to the computer

A

users

73
Q

OSI Layers: Application Layer-Layer 7

Acts as an i_________ between the application program and the network

Provies an i___________ for Internet Explorer or Outlook to communicate with the network

A

interface

interface

74
Q

OSI Layers: Application Layer-Layer 7

Applications don’t r__________ in the application layer protocol, but instead interfaces with application-layer protocols

Ex. Internet Explorer interfacing with HTTP protocol

A

don’t reside

75
Q

OSI Layers: Presentation Layer-Layer 6

Ensures that data transferred from one system’s application layer can be r______ by the application layer on another one.

A

read

76
Q

OSI Layers: Presentation Layer-Layer 6

Character encoding; Acts as the t___________ and f_______

A

translator; formatter

77
Q

OSI Layers: Presentation Layer-Layer 6

Application e_________
Example: Internet Explorer HTML converted to ASCII format

A

encryption

78
Q

OSI Layers: Session Layer-Layer 5

Responsible for s________ u____; m________ and then t_______ d_______ sessions between presentation-layer entities

A

setting up; managing; tearing down

79
Q

OSI Layers: Session Layer- Layer 5

C__________ c__________ between systems.
-start, stop, restart sessions

A

Coordinates communication

80
Q

OSI Layers: Transport Layer-Layer 4

Ensures that d_______ a_____ safely at its destiantion

A

data arrives

81
Q

OSI Layers: Transport Layer-Layer 4

S________ and r_________ data into a data stream

A

Segments; reassembles

82
Q

OSI Layer considered to be the Post Office Layer

A

Layer 4-Transport Layer

83
Q

OSI Layer known as the Routing Layer

A

Layer 3: Network Layer

84
Q

OSI Layers: Network Layer-Layer 3

Provides a________________ and r___________ services

A

addressing; routing

85
Q

OSI Layers: Network Layer-Layer 3
Places two addresses in the packet
-_______________ address and _____________ address

A

source; destination

86
Q

OSI Layers: Network Layer-Layer 3

I_________ P________
-The primary network protocol used on the internet, IPv4, IPv6 logical address

A

Internet Protocol (IP)

87
Q

OSI layer that provides physical transmission of the data

A

Layer 2-Data Link Layer

88
Q

OSI Layers: Data Link Layer-Layer 2
Ensures that messages are delivered to the proper devices on a _______ using __________ address
-________ address
-the basic fundamental addressing on the network to be able to send traffic from one devices to antoher

A

LAN; hardware

MAC

89
Q

OSI Layers: Data Link Layer-Layer 2

Translates messages from the n_______ layer into bits for the p________ layer

A

network; physical

90
Q

OSI layer known as the switching Layer

A

Layer 2-Data Link Layer

91
Q

OSI Layers: Physical layer-Layer 1

The physics of the network

  • sends b______ and receives b______ ( 1 or 0)
  • Singaling, cabling, connectors
  • This layer isn’t about p________
A

bits;bits

protocols

92
Q

Data e_____________ and d_________ occurs when data moves down and up the OSI model

A

encapsulation; decapsulation

93
Q

Encapsulation is when we ________ chunks of information to network data (IP, MAC, etc)

A

add

94
Q

Encapsulation occurs when we _________ data from a computer

A

send

95
Q

Decapsulation is when we ________ chunks of information from network data

A

remove

96
Q

Decapsulation occurs when we _________ data at a computer

A

receive

97
Q

Protocol that resolves the IP address to the MAC address

A

ARP (Address Resolution Protocol)

98
Q

Finds the hardware address of a host from a known IP address

-And vice versa (RARP)

A

Address Resolution Protocol

99
Q

Without ARP, nothing can c____________ across the nwtowrk

A

communicate

100
Q

ARP command

A

arp -a

arp space dash a

101
Q

If a computer knows an IP address but not the MAC address, it will send a _________ message to all of the devices on the LAN asking what device is assigned that IP address

A

broadcast

102
Q

Primary internet protocol

A

IPv4

103
Q

IP version 4

A__________ and t________ data from one network node to another

A

Addresses; transports

104
Q

IP version 4

It’s job is to get d_____ from one side of the internet tot the other

A

data

105
Q

IP version 4

Moves data b_______ and f______ throughout the internet via routing

A

back;forth

106
Q

IP version 4

Looks at each packet’s destination _____ a______, the uses a r_______ t_________ to dtermine where to send it.

-A connectionless protocol-fires and forgets”

A

IP address; routing table

107
Q

The next generation Internet Protocol; developed because we are running out of IPv4 addresses

A

IP version 6 (IPv6)

108
Q

IP version 6 is a _______ bit address

A

128

109
Q

IP version 6 improves r__________, s________, efficiency, and more.

A

routing; security

110
Q

Sends management messages between systems

  • echo request, echo reply
  • destination unreachable
  • Ping command
A

ICMP (Internet Control Message Protocol)

111
Q

ICMP provides e_______ c________ and reporting functionality. Great tool for t____________ a network.

A

error checking; troubleshooting

112
Q

ICMP command

A

ping space dash the address to be pinged
Ex. ping -google.com
ping -?

113
Q

Transmission Control Protocol

-Assures delivery of packets through e____-c______ (data sequencing)

A

error-checking

114
Q
Transmission Control Protocol
Connection Oriented: 3 way handshake
-SYN --->SYN/ACK--->ACK
-r\_\_\_\_\_\_\_\_\_ delivery
-virtual connection between 2 devices
A

reliable

115
Q

A scaled-down, economic version of TCP

A

User Datagram Protocol

116
Q

UDP-User Datagram Protocol

  • c__________ and u_________
  • No Data r_________
  • “Best effort”
  • used a lot for streaming real-time data: voIP, video streams, audio streams
A

connectionless;unreliable

retransmission

117
Q

With reliability and assurance, comes a cost. _____ packets are much larger than _______ packets, so they take more bandwidth.

A

TCP; UDP

118
Q

If you need to reliabily deliver IP packets which transport layer protocl should be used?

A

TCP

119
Q

If you need fast, economical IP packet delivery which transport protocl should be used?

A

UDP

120
Q

Management protocol that converts domain name to IP address

Ex. google.com—>74.125.224.52

A

Domain Name Services (DNS)

121
Q

DNS command

A

NSLOOKUP

122
Q

Management program that automatically synchronizes clocks on network devices

A

Network Time Protocol (NTP)

123
Q

Mangement protocol that is used for network mangement and maintenance

A

SNMP-SImple Network Management Protocol

124
Q

Communication Protocol that:

  • Provides a virtual terminal protocol logging into and managing devices remotely
  • Not used often anymore because unencrypted communication
A

Telnet (TCP)

125
Q

Communication Protocol that

  • Looks and acts like telnet, but communicationis encrypted
  • PuTTY SSH Client Popular
A

SSH-Secure Shell (TCP)

126
Q

File transfer application that:

  • Transfers files between systems
  • authentications with a username and password
  • full-featured functionality (list, add, delete,etc.)
A

FTP-FIle Transfer Protocol

127
Q

File transfer applicaiton that

  • very simple file transfer appliation
  • can send adn receive files; no directory browsing
  • no authentication
A

TFTP-Trivial File Transfer Protocol

128
Q

Mail application protocol that’s:

  • used most often for sending mail
  • transferring between mail servers
A

Simple Mail Transsfer Protocol (TCP)

129
Q

Mail application protocol that’s used to:

  • receive email
  • designed for intermittent connectivity
A

Post Office Protocl version 3 (TCP)

130
Q

Mail application protoocl that’s used to:
-allows users to access email on servers and either read the email on the server or download the email to the client machine

A

Internet Message Access Protocl v4 (TCP)

131
Q

Browser application protocol that porovides for browsing services for the WWW

A

HTTP-Hypertext Transfer Protocol (TCP)

132
Q

Browser application that provides for access to resources on the internet in a secure fashion; encryption via TLS/SSL

A

HTTPS- Hypertext transfer protocol secure (TCP)

133
Q

Browser application that utilizes cryptographic protocols for enabling secure online data-transfer activities

A

TLS/SSL-Transport Layer Security and Secure socket layer

134
Q

Voice over IP (VoIP) protocols

Sets up and tears downvoice and video calls over the itnernet

A

SIP (Session Initiation Protocol) TCP

135
Q

Voice over IP (VoIP) protocols

The standard for delivering audio and video over the internet. Commonly employed for streaming media, video conferencing, and VoIP.

A

RTP (Real-Time Transport Protocol (UDP)

136
Q

Voice over IP (VoIP) protocols

Will commonly use reliable ____to set-up and manage the session, but _____to send the real-time data.

A

TCP; UDP

137
Q

Computers require ports because of network applicaiton m____________

A

multitasking

138
Q

Ports allow you to associate packets with ____/_____ protocols

A

TCP/IP

139
Q

Because a computer has 1 IP and MAC address, it needs ports to differentiate network p__________ and s_______

A

protocols; services

140
Q

Communication originates from your computer utilizing a h____________ r_______ p______ to communicate across a LAN/WAN/Internet to communicate with a remote server, in this case a web server. The Web will be listening in on specific ports for its associated TCP/IP protocols.

A

high random port

141
Q
  • Logical addresses
  • Allows network to network communication via routers
  • WAN communication
  • Dotted Decimal Notation
A

Network

142
Q

What OSI Layer are Network addresses (IP addresses on)

A

Network Layer (OSI Layer 3)

143
Q
  • Physical Addresses
  • Allows internetwork communication via hubs, switches, and routers
  • LAN communication (switching)
  • Physically burned on NIC
A

MAC address (OSIL Layer 2)

144
Q

Two parts of an IP address

A

Network address+Host Address=IP address

145
Q

Part of an IP address that uniquely identifies each network

A

Network Address

146
Q

Part of an IP address that uniquely identifies each machine on a network

A

Host Address

147
Q

A private IP address is a n_________ IP address

A

non-routable

148
Q

If a router receives a private IP address, it will ________ it.

A

drop

149
Q

Private IP addresses are unable to communicate across the ______.

Uses Network Address Translation (NAT) to route traffic from network to network.
-c________ one address to another to allow a private IP address to communicate with the WAN through the public address.

A

WAN

converts

150
Q

The process of breaking up Class A, B, and C networks into smaller, more manageable networks

A

Subnetting

151
Q

We b_________ host bits to create more s_________ for a Class A, B, or C network

A

borrow; sub-networks

152
Q

When you borrow host bits, you ________ the amount of sub-networks, aka Subnets available to you and __________ the amount of host IP addresses available to you.

A

increase; decrease

153
Q

Subnetting allows you to create m______ l_______ n_______ that exist within a single Class A, B, or C network
-i.e., break a major network down into multiple smaller sub-networks, i.e. subnets

A

multiple logical networks

154
Q

If you don’t subnet, you are only able to use _____ network from Class A, B, or C network, which isn’t realistic

A

one