ITN101 - Intro to Network Concepts - Exam 1 - Review Flashcards

1
Q

DHCP

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Air waves are an example of what type of network component?

A

network medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a device that connects other devices to each other, and allows for data transmission. It’s smarter than a Hub, and is used for LAN transmission

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type 2 Hypervisor

A

Installs in a host OS as an application and is called a hosted hypervisor. (VirtualBox)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A routing protol is either ___ or ___

A

IGP (Interior Gateway Protocols) or EGP (Exterior Gateway Protocols)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When referring to network bandwidth, what is the basic unit of measurement?

A

bits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of transmission is occurring when data flows both ways

A

Full-duplex mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 Main Types of Cabline

A

Fiber, ethernet, coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In wireless networks, what type of media access control is used?

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command would you issue from a command prompt to see a listing of the computers in your workgroup?

A

net view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ipconfig(Windows) / ifconfig(Linux)

A

shows current TCP/IP addressing and domain name information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICMP

A

Internet Control Message Protocol - Network Layer - Reports on the success or failure of data delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSI Layer 3

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is not true of forward error error correction?

A

Always used because it is cheap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Routing Protocols Examples

A

RIP, RIPv2, BGP, ISIS, OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wireless access point is most like which other network device, in that all computers send signals through it to communicate with other computers?

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PaaS

A

Platform as a Service - Developers often require access to multiple platforms during dev process. Rather than purchasing and maintaining a seperate device for each platforkm they can subscribe to PaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Binary base

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many bits is an IPV6 address?

A

128 (8 blocks of 16 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which structured cabling component provides connectivity to computer equipment in the nearby work area?

A

IDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OSI Layer 1

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Layer 2

A

Data Link Layer - Encapsulates the data with header and footer and creates framee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ethernet uses carrier sense multiple access (CSMA) to handle collisions. Wired ethernet uses (1) ______ while Wireless uses (2) ____

A

collision detection

collision avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

PAT

A

Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Ethernet - Twisted Pair
Twisted-Pair Cable Twisted-pair cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm (approximately the diameter of a sewing pin). Every two wires are twisted around each other to form pairs, and all the pairs are encased in a plastic sheath,
26
Fiber Optic
Fiber-optic cable, or simply fiber, contains one or several glass or plastic fibers at its center, or core. Data is transmitted through the central fibers via pulsing light typically sent from one of two possible sources: • laser—An intense, focused light that can travel extremely long distances with very high data throughput • LED (light-emitting diode)—A cool-burning, long-lasting technology used on shorter fiber-optic connections, such as between floors in a building or between a switch and a router
27
Which of the following protocols uses a three-way-handshake to establish a connection before transmitting the payload/message?
TCP
28
ping
Used to verify that =TCP/IP is installed and uses ICMP (Internet Control Message Protocol)
29
dig
provides more detailed information than nslookup
30
Last 24 bits of MAC address
Extension Identifier or Device ID
31
SMTP Port
25
32
Port 443
HTTPS
33
TCP
Transmission Control Protocol - Provides reliable data delivery services (3way handshake)
34
Port
Assigned to a process such as an application or service that can recieve ata.
35
IaaS
Infrastructure as a Service - Hardware services are provides birtually. HVD's (Histed Virtual Desktops) are different desktop operating enviornments on a different computer that require network infrastructure that IaaS provides.
36
Hub Layer
Layer 1
37
There are two dynamic routing algorithms (1) _______ is based on the number of hops between two devices while (2)_______ is based on the number of hops, circuit speed, and traffic congestion - which provide more reliable and up to date paths to destinations.
distance vector link state
38
Public IP addresses
Class A, B and C licensed
39
Layer 1
Phisical Later - on NIC and recieves the frame and places the actual transmission on the network
40
Exhausted DHCP scope
when the IP addresses are used up and no new clients can connect to the network
41
Which of the following is true about collisions?
They can occur on Ethernet half-duplex networks
42
What is middleware?
Software that acts as an intermediary by sitting between client and server applications and provides a standard way of translating between software from different vendors
43
Hypervisor
Creates and manages a VM and manages resource allocation
44
What type of network covers a small geographical area such as a single floor or a single building?
Local Area Network (LAN)
45
any end device that requests or transfers data to a server | Operated by end user (desktop, laptop, tablet, phone, ATM, kiosk, etc.)
Client
46
How boos signal
Repeater
47
What type of transmission is occurring when data can flow in both directions, but only one at a time?
Half-Duplex
48
Which of the following is NOT one of the main differences between the types of network cabling?
the ability to send and receive signals
49
What Layer of the OSI Reference Model does not contain any protocols, and has the job of formatting, encrypting, and compressing the data?
Presentation
50
What does DNS do?
Translates IP
51
In a physical bus topology, both ends of the medium must be terminated in order to prevent what?
signal bounce
52
a device that connects other devices to each other, and allows for data transmission. It’s smarter than a switch, and is used for WAN transmission
Router
53
Each cable type can transport data at a particular speed only so far before its signals begin to weaken past the point that a receiving station can read them accurately What is the term for this phenomenon?
attenuation
54
How many bits is an IPv4 address?
32
55
When a tech refers to a hostname it is assumed they are referring to the ____
FQDN
56
What is attenuation
Signal degredation
57
Routing Protocols
Go forth to collect data about the current network status and to contribute to the selection of best paths
58
DHCP
Dynamic Host Configuration Protocol (Application Layer)
59
OSI Layer 7
Application Layer
60
Last part of FQDN (com)
TLD Top Level Domain
61
nslookup
Allows you to query the DNS database from any computer on the network and find the host name of a device by specifying the IP address and vice versa
62
FQDN
Fully Qualified Domain Name (www.site.com)
63
Layer 3
Network Layer - adds its own header which identifies IP address of destination most and message is called a packet
64
Port 80
HTTP
65
What is Multiplexing?
A form of transmission that allows multiple signals to travel over one medium.
66
Domain Name
Last two parts of hosts name (site.com)
67
Dual Stacked
When a network uses both IPV4 and IPV6
68
OSI Layer 5
Session Layer
69
You have just started a new business. You need to have three to four workstations available for your employees who simply need to share some files and a printer, but you don’t have a large budget. Security is not a major concern, but costs are. What type of network would be the most appropriate for your situation?
peer-to-peer network
70
Ethernet - Twisted Pair
Twisted-Pair Cable Twisted-pair cable consists of color-coded pairs of insulated copper wires, each with a diameter of 0.4 to 0.8 mm (approximately the diameter of a sewing pin). Every two wires are twisted around each other to form pairs, and all the pairs are encased in a plastic sheath,
71
3 Models of Cloud
PaaS IaaS SaaS
72
Largest possible IPV4
255.255.255.255
73
Wireless con
Attenuation
74
Which of the following is NOT an email related protocol?
HTML
75
public key encryption
encryption—Data is encrypted with a private key known only to the user, and decrypted with a mathematically related public key that can be made available through a third-party source, such as a public key server. This ensures data integrity, as the sender’s public key will only work if the data has not been tampered with. Alternatively, data can be encrypted with the public key, and then can only be decrypted with the matching private key. This ensures data confidentiality, as only the intended recipient (the owner of the keys) can decrypt the data. A public key server is a publicly accessible host (such as a server on the Internet) that freely provides a list of users’ public keys, much as a telephone book provides a list of peoples’ phone numbers. The combination of a public key and a private key is known as a key pair. Because public key encryption requires the use of two different keys, one to encrypt and the other to decrypt, it is also known as asymmetric encryption.
76
OUI
Organizationally Unique Identifier
77
Ethernet num
802.3
78
First 28 bits of MAC address
OUI
79
How many bits is a MAC address?
48
80
A user device used to access the network and received data from the server is called a _____. These include desktops, laptops, tablets, phones, etc.
Client
81
Technique designed to conserve the number of public IP addresses needed by the network
NAT
82
Wireless security risks
.
83
Router Layer
Layer 3
84
Which type of wireless technology bounces transmissions off walls and ceilings to deliver signals from sender to receiver and is often used with TV remotes?
scatter infrared
85
Wireless Pro
Connectivity
86
Hostname
First part of FQDN (www)
87
Port 25
SMTP
88
Which of the following describes this: As data travels down the protocol stack, headers and trailers are wrapped around it so that it knows where to go and how to get there
Encapsulation
89
Switch Layer
Layer 2
90
What type of network covers a large geographic area, often composed of leased circuits, and may span hundreds or thousands of miles?
Wide Area Network (WAN)
91
OSPF
Routing Protocol (Open Shortest Path First)
92
IP
Internet Protocol - NEtwork Layer - Secifies where data should be delivered, identifying data's source and destination IP address.
93
What is a disadvantage of using fiber-optic cabling versus twisted-pair cabling?
more difficult to install
94
Which of the following is the physical topology that is daisy-chained like a bus and in which the cabling is brought around from the last device to the first device?
physical ring
95
What is one of the disadvantages of a server-based network compared to a peer-to-peer network?
additional costs
96
OSI Layer 2
Data Link Layer
97
Default Gateway
Gateway device that nodes on the network turn to first for access to the outside world
98
What protocol is used for mapping domain names to IP addresses, and what port does it use?
DNS:53
99
Hex base
16
100
HTTPS
Port 443
101
Address Translation
When a gateway takes a private IP and converts it to a public IP for connecting to the internet (PArt of NAT)
102
HTTP
Port 80
103
Protocols...
Specifies the rules, functionality, and messages for communication at each layer
104
OSI Layer 4
Transport Layer
105
Type 1 Hypervisor
Installs on a computer before any OS and is therefore called a bare metal hypervisor. (VMWARE HYUPERV)
106
Subnet MAsk
A 32 bit number that helps one computer find another. 32 bits help indicate portios that are the network ID and host ID
107
ARP
Address Resolution Protocol - works with IPV4 to discover the MAC of node and to maintain a database that maps local IP addresses to MAC addresses
108
SaaS
Software as a Service- Applications provides through an online user interface
109
Wireless Number q
802.11
110
OSI Layer 6
Presentation Layer
111
What device is needed to convert analog signals to digital signals, and then vice versa?
Modem
112
NAT
Network Address Translation
113
most popular DNS server
BIND (Berkeley Internet Name Domain)
114
Coaxial
Coaxial cable, called “coax” for short, was the foundation for Ethernet networks in the 1980s. You’ll most likely never see a coaxial cable network, as coax has been replaced by twisted-pair cable and fiber; however, a form of coax is still used for cable Internet and cable TV.
115
The TCP/IP Model has four layers. Which layer of the OSI Reference Model is NOT part of the TCP/IP Model’s Application Layer?
Session (application)
116
UDP
User Datagram Protocol - Unreliable cnnectionless protocol that provides no handshake and is faster than TCP
117
Which Protocol does NOT belong in the Application Layer
IP
118
When two or more devices transmit at the same time, a ______ can occur.
Collision
119
What command would you issue from the command prompt to test whether your computer has connectivity to the network?
ping IPaddress
120
any device that requests or transfers data to a client | End users will not physically touch these normally
Server
121
What is the movement of computer information from one point to another by means of electrical or optical transmission systems?
Data Communications
122
a device that connects other devices to each other, and allows for data transmission. It’s a dumb device
Hub
123
ipconfig
Used to find out the current TCP/IP settings
124
You want a fast CPU for the new computer you are building and your motherboard only has one CPU socket. To increase the processing power, you need a CPU that provides more than one processor. What is this CPU called?
multicore
125
When a frame is received, which component reads the source and destination MAC addresses, looks up the destination to determine where to send the frame, and forwards it out the correct port?
switch
126
Dynamic IP address
Decive configured to request and recieve a different IP address from DHCP server each time it connects to the network
127
The OSI Reference Model has seven layers. What is layer three of the OSI Reference Model?
Network
128
What is attenuation?
The gradual decrease in signal the further it travels.
129
Just as a switch keeps records of MAC addresses that it has learned, so does your computer. What protocol does your computer use to learn MAC addresses?
ARP
130
What protocol is used for moving files between clients and servers?
FTP
131
Which of the following is NOT a characteristic of Unshielded Twisted Pair cabling?
maximum speed is 100 Mbps
132
Gateway
Computer, router or other device that a host uses to access another network
133
Unicast address specifies a
single node on IPV6 network