ITN101 - Intro to Network Concepts - Exam 1 - Review Flashcards
DHCP
Dynamic Host Configuration Protocol
Air waves are an example of what type of network component?
network medium
a device that connects other devices to each other, and allows for data transmission. It’s smarter than a Hub, and is used for LAN transmission
Switch
Type 2 Hypervisor
Installs in a host OS as an application and is called a hosted hypervisor. (VirtualBox)
A routing protol is either ___ or ___
IGP (Interior Gateway Protocols) or EGP (Exterior Gateway Protocols)
When referring to network bandwidth, what is the basic unit of measurement?
bits per second
What type of transmission is occurring when data flows both ways
Full-duplex mode
3 Main Types of Cabline
Fiber, ethernet, coaxial
In wireless networks, what type of media access control is used?
CSMA/CA
What command would you issue from a command prompt to see a listing of the computers in your workgroup?
net view
ipconfig(Windows) / ifconfig(Linux)
shows current TCP/IP addressing and domain name information
ICMP
Internet Control Message Protocol - Network Layer - Reports on the success or failure of data delivery
OSI Layer 3
Network Layer
What is not true of forward error error correction?
Always used because it is cheap.
Routing Protocols Examples
RIP, RIPv2, BGP, ISIS, OSPF
A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?
hub
PaaS
Platform as a Service - Developers often require access to multiple platforms during dev process. Rather than purchasing and maintaining a seperate device for each platforkm they can subscribe to PaaS.
Binary base
2
How many bits is an IPV6 address?
128 (8 blocks of 16 bits)
Which structured cabling component provides connectivity to computer equipment in the nearby work area?
IDF
OSI Layer 1
Physical Layer
Layer 2
Data Link Layer - Encapsulates the data with header and footer and creates framee
Ethernet uses carrier sense multiple access (CSMA) to handle collisions. Wired ethernet uses (1) ______ while Wireless uses (2) ____
collision detection
collision avoidance
PAT
Port Address Translation
Ethernet - Twisted Pair
Twisted-Pair Cable Twisted-pair cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm (approximately the diameter of a sewing pin). Every two wires are twisted around each other to form pairs, and all the pairs are encased in a plastic sheath,
Fiber Optic
Fiber-optic cable, or simply fiber, contains one or several glass or plastic fibers at its center, or core. Data is transmitted through the central fibers via pulsing light typically sent from one of two possible sources: • laser—An intense, focused light that can travel extremely long distances with very high data throughput • LED (light-emitting diode)—A cool-burning, long-lasting technology used on shorter fiber-optic connections, such as between floors in a building or between a switch and a router
Which of the following protocols uses a three-way-handshake to establish a connection before transmitting the payload/message?
TCP
ping
Used to verify that =TCP/IP is installed and uses ICMP (Internet Control Message Protocol)
dig
provides more detailed information than nslookup
Last 24 bits of MAC address
Extension Identifier or Device ID
SMTP Port
25
Port 443
HTTPS
TCP
Transmission Control Protocol - Provides reliable data delivery services (3way handshake)
Port
Assigned to a process such as an application or service that can recieve ata.
IaaS
Infrastructure as a Service - Hardware services are provides birtually. HVD’s (Histed Virtual Desktops) are different desktop operating enviornments on a different computer that require network infrastructure that IaaS provides.
Hub Layer
Layer 1
There are two dynamic routing algorithms (1) _______ is based on the number of hops between two devices while (2)_______ is based on the number of hops, circuit speed, and traffic congestion - which provide more reliable and up to date paths to destinations.
distance vector
link state
Public IP addresses
Class A, B and C licensed
Layer 1
Phisical Later - on NIC and recieves the frame and places the actual transmission on the network
Exhausted DHCP scope
when the IP addresses are used up and no new clients can connect to the network
Which of the following is true about collisions?
They can occur on Ethernet half-duplex networks
What is middleware?
Software that acts as an intermediary by sitting between client and server applications and provides a standard way of translating between software from different vendors
Hypervisor
Creates and manages a VM and manages resource allocation
What type of network covers a small geographical area such as a single floor or a single building?
Local Area Network (LAN)
any end device that requests or transfers data to a server
Operated by end user (desktop, laptop, tablet, phone, ATM, kiosk, etc.)
Client
How boos signal
Repeater
What type of transmission is occurring when data can flow in both directions, but only one at a time?
Half-Duplex
Which of the following is NOT one of the main differences between the types of network cabling?
the ability to send and receive signals
What Layer of the OSI Reference Model does not contain any protocols, and has the job of formatting, encrypting, and compressing the data?
Presentation
What does DNS do?
Translates IP
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
signal bounce
a device that connects other devices to each other, and allows for data transmission. It’s smarter than a switch, and is used for WAN transmission
Router
Each cable type can transport data at a particular speed only so far before its signals begin to weaken past the point that a receiving station can read them accurately What is the term for this phenomenon?
attenuation
How many bits is an IPv4 address?
32
When a tech refers to a hostname it is assumed they are referring to the ____
FQDN
What is attenuation
Signal degredation
Routing Protocols
Go forth to collect data about the current network status and to contribute to the selection of best paths
DHCP
Dynamic Host Configuration Protocol (Application Layer)
OSI Layer 7
Application Layer
Last part of FQDN (com)
TLD Top Level Domain
nslookup
Allows you to query the DNS database from any computer on the network and find the host name of a device by specifying the IP address and vice versa
FQDN
Fully Qualified Domain Name (www.site.com)
Layer 3
Network Layer - adds its own header which identifies IP address of destination most and message is called a packet
Port 80
HTTP
What is Multiplexing?
A form of transmission that allows multiple signals to travel over one medium.
Domain Name
Last two parts of hosts name (site.com)
Dual Stacked
When a network uses both IPV4 and IPV6
OSI Layer 5
Session Layer
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don’t have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
peer-to-peer network
Ethernet - Twisted Pair
Twisted-Pair Cable Twisted-pair cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm (approximately the diameter of a sewing pin). Every two wires are twisted around each other to form pairs, and all the pairs are encased in a plastic sheath,
3 Models of Cloud
PaaS
IaaS
SaaS
Largest possible IPV4
255.255.255.255
Wireless con
Attenuation
Which of the following is NOT an email related protocol?
HTML
public key encryption
encryption—Data is encrypted with a private key known only to the user, and decrypted with a mathematically related public key that can be made available through a third-party source, such as a public key server. This ensures data integrity, as the sender’s public key will only work if the data has not been tampered with. Alternatively, data can be encrypted with the public key, and then can only be decrypted with the matching private key. This ensures data confidentiality, as only the intended recipient (the owner of the keys) can decrypt the data. A public key server is a publicly accessible host (such as a server on the Internet) that freely provides a list of users’ public keys, much as a telephone book provides a list of peoples’ phone numbers. The combination of a public key and a private key is known as a key pair. Because public key encryption requires the use of two different keys, one to encrypt and the other to decrypt, it is also known as asymmetric encryption.
OUI
Organizationally Unique Identifier
Ethernet num
802.3
First 28 bits of MAC address
OUI
How many bits is a MAC address?
48
A user device used to access the network and received data from the server is called a _____. These include desktops, laptops, tablets, phones, etc.
Client
Technique designed to conserve the number of public IP addresses needed by the network
NAT
Wireless security risks
.
Router Layer
Layer 3
Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is often used with TV remotes?
scatter infrared
Wireless Pro
Connectivity
Hostname
First part of FQDN (www)
Port 25
SMTP
Which of the following describes this: As data travels down the protocol stack, headers and trailers are wrapped around it so that it knows where to go and how to get there
Encapsulation
Switch Layer
Layer 2
What type of network covers a large geographic area, often composed of leased circuits, and may span hundreds or thousands of miles?
Wide Area Network (WAN)
OSPF
Routing Protocol (Open Shortest Path First)
IP
Internet Protocol - NEtwork Layer - Secifies where data should be delivered, identifying data’s source and destination IP address.
What is a disadvantage of using fiber-optic cabling versus twisted-pair cabling?
more difficult to install
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
physical ring
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
additional costs
OSI Layer 2
Data Link Layer
Default Gateway
Gateway device that nodes on the network turn to first for access to the outside world
What protocol is used for mapping domain names to IP addresses, and what port does it use?
DNS:53
Hex base
16
HTTPS
Port 443
Address Translation
When a gateway takes a private IP and converts it to a public IP for connecting to the internet (PArt of NAT)
HTTP
Port 80
Protocols…
Specifies the rules, functionality, and messages for communication at each layer
OSI Layer 4
Transport Layer
Type 1 Hypervisor
Installs on a computer before any OS and is therefore called a bare metal hypervisor. (VMWARE HYUPERV)
Subnet MAsk
A 32 bit number that helps one computer find another. 32 bits help indicate portios that are the network ID and host ID
ARP
Address Resolution Protocol - works with IPV4 to discover the MAC of node and to maintain a database that maps local IP addresses to MAC addresses
SaaS
Software as a Service- Applications provides through an online user interface
Wireless Number q
802.11
OSI Layer 6
Presentation Layer
What device is needed to convert analog signals to digital signals, and then vice versa?
Modem
NAT
Network Address Translation
most popular DNS server
BIND (Berkeley Internet Name Domain)
Coaxial
Coaxial cable, called “coax” for short, was the foundation for Ethernet networks in the 1980s. You’ll most likely never see a coaxial cable network, as coax has been replaced by twisted-pair cable and fiber; however, a form of coax is still used for cable Internet and cable TV.
The TCP/IP Model has four layers. Which layer of the OSI Reference Model is NOT part of the TCP/IP Model’s Application Layer?
Session (application)
UDP
User Datagram Protocol - Unreliable cnnectionless protocol that provides no handshake and is faster than TCP
Which Protocol does NOT belong in the Application Layer
IP
When two or more devices transmit at the same time, a ______ can occur.
Collision
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
ping IPaddress
any device that requests or transfers data to a client
End users will not physically touch these normally
Server
What is the movement of computer information from one point to another by means of electrical or optical transmission systems?
Data Communications
a device that connects other devices to each other, and allows for data transmission. It’s a dumb device
Hub
ipconfig
Used to find out the current TCP/IP settings
You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
multicore
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
switch
Dynamic IP address
Decive configured to request and recieve a different IP address from DHCP server each time it connects to the network
The OSI Reference Model has seven layers. What is layer three of the OSI Reference Model?
Network
What is attenuation?
The gradual decrease in signal the further it travels.
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
ARP
What protocol is used for moving files between clients and servers?
FTP
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
maximum speed is 100 Mbps
Gateway
Computer, router or other device that a host uses to access another network
Unicast address specifies a
single node on IPV6 network