Key words Flashcards

1
Q

What is Layer 1 of the OSI model?

A

Physical layer - Signalling, Cabling, Connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens at Layer 1 (Physical layer) of the OSI model?

A

Packets are converted into electrical, radio, or optical pulses and transmitted as bits (the smallest possible units of information) over wires, radio waves or cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a layer 1 (Physical) issue look like?

A

Issues with cabling, Punch downs, Electrical signals, Bad ports - Solutions can involve replacing cables, Swapping adapter cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Layer 2 of the OSI model?

A

Data link Layer - The basic network ‘language’ - Foundation layer of connection - Uses MAC address on ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens at Layer 2 (Data link) of the OSI model?

A

Handles communications between devices on the same network. If Layer 3 is like the address on a piece of mail, then layer 2 is like indicating the office number or apartment of that address. Ethernet is the protocol most used here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DLC protocol and what does it do?

A

Data link control protocol - Provides functions such as flow control, error detection and error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Layer 3 of the OSI model?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens at Layer 3 of the OSI model?

A

Handles the routing and sending of data between different networks. The most important protocols at this layer are IP and ICMP. IP addresses (Logical Address) operates at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Layer 4 of the OSI model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens at Layer 4 of the OSI model?

A

Provides the means for transmitting data between the two connected parties, as well as controlling the quality of service. The main protocols used are TCP and UDP - Assembling and Disassembling data happens here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP?
What is the connection type?
Does it sequence data?
Does it allow for data retransmission?
Is delivery guaranteed?
Does it check for errors?
Does it support broadcasting?
Is it fast or slow?

A

Transmission Control Protocol:
Connection type - Requires an established connection before transmitting data
Data Sequence - Can sequence data (send in a specific order)
Data retransmission - Can retransmit data if packets fail to arrive
Delivery - Delivery is guranteed
Check for errors - Thorough error-checking guarantees data arrives in its intended state
Broadcasting - Not supported
Speed - Slow but complete data delivery

TCP is the only protocol that can retransmit lost data packets - When reliability is critical, TCP is the best option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is UDP?
What is the connection type?
Does it sequence data?
Does it allow for data retransmission?
Is delivery guaranteed?
Does it check for errors?
Does it support broadcasting?
Is it fast or slow?

A

User Datagram Protocol:
Connection type - No connection is needed to start and end a data transfer
Data Sequence - Cannot sequence or arrange data
Data retransmission - No data retransmitting. Loss data can’t be retrieved
Delivery - Delivery is not guaranteed
Check for errors - Minimal error-checking covers the basics but may not prevent all errors
Broadcasting - Supported
Speed - Fast, but at risk on incomplete data delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some use cases that TCP is better suited to?

A

Email or Texting
File transfers
Web browsing
Remote device or network administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some use cases that UDP is better suited to?

A

Live streaming
Online gaming
Video chatting/ Conferencing
VOIP
Domain Name Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does TCP work?

A

Uses the 3 way hand shake

Client device initiating contact will send a sequence number (SYN) to the server. Tells the server the number that the data packet transfer should begin with.
The server acknowledges the client SYN and sends its own SYN number. This step is referred to as SYN-ACK (SYN acknowledgement)
The client then acknowledges(ACK) the server’s SYN-ACK, which forms a direct connection and begins the data transfer.

The connection between the sender and receiver is maintained until the transfer is successful. Every time a data packet is sent, it requires an acknowledgment from the receiver. So, if no acknowledgment is received, the data is resent.

If an error is acknowledged, the faulty packet is discarded and the sender delivers a new one. Heavy traffic or other issues may also prevent data from being sent. In that case, the transmission is delayed (without breaking the connection).Thanks to these controls, successful data delivery is guaranteed with TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does UDP work?

A

UDP works by sending data immediately to the receiver who made a transmission request until the transmission is completed or terminated. Sometimes called a “fire and forget” protocol, UDP fires data at a recipient without confirming delivery or checking if packets arrived as intended.

Does not perform a handshake. Speeds up transfer data by sending packets without making an agreement with a receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is layer 5 of the OSI model?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens at layer 5 of the OSI model?

A

Controls connections between computers (this can also be handled at layer 4 by the TCP protocol) - Part of the host that makes connection to the remote host i.e. a web browser to a web server or an email client to to an email server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is layer 6 of the OSI model?

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is EMI?

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is CSMA/CD?

A

Carrier Sense Multiple Access/Collision Detection Is a technology used for devices to listen and see who is communicating. Collision detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is ARP?

A

Address resolution protocol - ARP is a method used to get the MAC address of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is full duplex?

A

Is a communication mode where two devices can talk at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is CSMA/CA?

A

Is for collision avoidance rather than detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a SFP(Small form-factor Pluggable)?

A

SFP is a type of transceiver that connects to a MSA module slot on the motherboard to allow any fiber connector to be used with any switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Punchdown tool?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a 110-block?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the MDF?

A

Main Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the IDF?

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the first thing to check if your machine cannot ping anything on the network including another machine on your subnet?

A

Check if the NIC has a link light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How many inches is a U?

A

1.75

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which type of Radio grade is the most common for Coaxial cable?

A

RG^

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the broadcast address for ARP?

A

FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which command will show the ARP cache?

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Name the different IP class ranges and the ranges?

A

Class A = 0-126
Class B=128-191
Class C = 192-223
Class D = 224-239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Many users are complaining that they cannot get on the Internet. You arrive at one user’s computer and ping the company’s Router and it’s successful. What would be the next command you should type?

netstat
nslookup
net use
tracert

A

netstat
nslookup
net use
tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

You are using netstat, and you want to show all Active Ports. What would you type?

netstat -n
netstat -o
netstat -b
netstat -a

A

A
netstat -a

Explanation:
-n = Will show Foreign Addresses in a Numerical Format (Cleans up the Report)
-b = Shows the executable for every connection.
-o = Will show the Process ID column.
-a = Shows all ACTIVE/OPEN Ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What port does HTTP use?
20
80
143
443

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the proper name for a DNS server that can respond to a query with their own DNS information?

Authoritative
Administrative
Authenticated
Admissible

A

Authoritative

40
Q

Which type of record is used with IPv4?

AAAA Record
CNAME
MX
A Record

A

A record
A=IPv4
AAAA=IPv6
CNAME=Alias
MX=Mail Exchange Servers

41
Q

Which of the following is NOT part of the Structured Cabling System?

Horizonal Runs
Wall Jacks
Equipment Room
Work Area

A

Wall Jacks

42
Q

You type www.google.com and you receive an error. However, if you type a known IP address for Google, it works. What might be the problem?

DHCP Scope Issue
Misconfigured IP Address
Incorrect Default Gateway
DNS

A

DNS (Domain Name System)
Explanation:
DNS = Resolves FQDN to IP Addresses

43
Q

Which tool is used for testing DNS using a third-party tool?

dig
nslookup
ping
netstat

A

DIG - Used on Apple Mac and Linux

44
Q

What is an example of Authentication?

Accessing a Folder you were granted rights to?
Showing an ID
Proving through Credentials that you have rights to a System.
Using a Retinal Scanner

A

Proving through credentials that you have rights to a system

45
Q

What are the 3 Methods of Security Access to a System?

Identification, Authentication, Authorization
Identification, Automating, Authorization
The “Three Ps” - Proof, Proper Rights, and Proper Access
Authorization, Authentication, Accessibility

A

Identification, Authentication, Authorization

46
Q

Which would be an example of Role-Based Access control?

Logging in with a Username and Password to Access a System
Assigning Rights to a Folder based on a User
Labeling a Resource with a specific Name that would provide Access
Placing an “Owner” Label on a User Account

A

A
Assigning Rights to a Folder based on a User

Explanation:
Role Based is assigning users and groups specific rights to specific resources.

Authentication is Logging in with a Username and Password

Mandatory Access Control is Labeling a Resource with a Specific Name that would provide Access

Discretionary Access Control is placing an “Owner” Label on a User Account

47
Q

Which of the following is a benefit of Virtualization?

It allows you to create more efficient VPNs
Hardware consolidation
It’s very expensive, but worth the price
It can run on very low-end computers

A

Hardware consolidation

48
Q

What is Network Function Virtualization (NFV)?

A

network functions virtualization replaces the functionality provided by individual hardware networking components. This means that virtual machines run software that accomplishes the same networking functions as the traditional hardware

49
Q

You have an application that you are developing, but you don’t want the hassle of setting up servers, ACLs, backups, and managing them. Which type of cloud service would you use?

Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Infrastructure as Code (IaC)

A

Platform as a Service (PaaS)

50
Q

When discussing Infrastructure as Code (IaC), what does automation mean?

Using code to provision and maintain systems in a consisten manner.
Creating pipelines that automate using longer sequences.
Automatically updating services using Windows Update
Running several instances of an application automatically.

A

Using code to provision and maintain systems in a consistent manner

51
Q

Big Corp’s data center has a fiber and cable ISP. What aspect of security does this represent?

Active-Passive
Multipathing
Redundancy
Clustering

A

Redundancy

52
Q

What is a VLAN?

A
53
Q

What is an SSID?

A

A service set identifier (SSID) is a sequence of characters that uniquely names a Wi-Fi network.

54
Q

With VoIP, which Port does Session Initiation Protocol (SIP) use?

3389
5060/5061
143
80

A

5060/5061

55
Q

Which policy describes what users can and cannot do with company equipment?

Acceptable Use Policy (AUP)
Non-Disclosure Agreement (NDA)
BYOD Policy (Bring Your Own Device)
Memorandum of Understanding (MOU)

A

Acceptable Use Policy

56
Q

The CIA Model is a basic model for security. What does CIA stand for?

Confidentiality, Integrity, and Availability
Central Intelligence Agency
Confidentiality, Intelligence and Accessibility
Computers, Intelligence, Adaptibility

A

Confidentiality, Integrity and Availability

57
Q

Which would be an example of a Denial of Service (DoS) Attack?

Masquerading
Opening tons of Web Browser pages on a Computer
VLAN Hopping
Ping Flood

A

Ping Flood

58
Q

What is SNMP?

A

Simple Network Management Protocol

59
Q

What is an ethernet frame composed of?

A

FCS, Data, ACK, Sequence, Source Port, Destination Port, Source IP Address, Destination IP Address, Source Mac, Destination

60
Q

What is an IP packet composed of?

A

Data, Ack, Sequence, Source Port, Destination, Source IP Address, Destination IP Address - Everything an ethernet frame is composed of minus the FCS and the MAC Addresses

61
Q

What does PDU stand for?

A

Protocol Data Units

62
Q

What does BGP stand for?

A

Border Gateway Protocol

63
Q

What does CRC stand for and what does it do?

A
64
Q

What are the first 3 pairs of numbers of MAC addresses known as?

A

OEM numbers - Original Equipment Manufacturer

65
Q

What is a MAC Address?

A

It is a 48-bit identifier for a NIC

66
Q

How do NICs decide whether or not to process a frame?

A

They use MAC addresses to identify if the frame is for them

67
Q

How many values of an IP address will definitely apply to all machines on a network?

A

The first 3 values

68
Q

When a router receives an ethernet frame, what does it strip?

A

The MAC addresses and the FCS - Leaving the IP Packet

69
Q

What does a Router use to know where to send data?

A

Routing Table

70
Q

What does a router do?

A

Connects multiple Local Area Networks

71
Q

What are the first 1024 port numbers known as?

A

Well known ports

72
Q

What is Port 80?

A

HTTP

73
Q

What is Port 20+21?

A

FTP

74
Q

Why are port numbers used?

A

They help direct packet traffic between the source & destination - To ensure data goes to the correct application

75
Q

Why do packets have sequence numbers?

A

So that the network software can reassemble the file correctly

76
Q

What are the advantages of coaxial cable?

A

Highly resistant to electromagnetic interference - (EMI)
Highly resistant to physical damage

77
Q

What are the disadvantages of Coaxial cable?

A

Inflexible
Expensive

78
Q

What does the Radio Grade specify?

A

The thickness of the conductors, insulation & shielding

79
Q

What does UTP stand for?

A

Unshielded Twisted Pair

80
Q

What is the maximum distance of a UTP cable?

A

100 Metres (325 feet)

81
Q

What is the standard max bytes of an ethernet frame?

A

1522 bytes

82
Q

What is the max bytes that a jumbo frame can contain?

A

9000 bytes

83
Q

What cable type has the least amount of fire resistance?

A

PVC

84
Q

What is plenum and plenum rate cable?

A

Plenum is the gap between the drop ceiling and actual ceiling - Plenum rated cable is designed to be run in plenum - Has the highest fire rating cladding on cable and highest fire rating

85
Q

What is riser rated cable?

A

Cable designed to run between the different floors in a building, less fire rating than plenum-rated cable but more fire protection than PVC

86
Q

What are the most commonly used cables in networks?

A

Straight through cables

87
Q

What do switches use to forward packets or frames?

A

MAC addresses/MAC table

88
Q

What is S.O.A?

A

Start of Authority - Is the primary DNS server for a particular zone

89
Q

What is CNAME?

A

Canonical name - Alias

90
Q

What does a reverse lookup zone do?

A

Used to resolve IP addresses to FQDN’s - Primarily used for Mail servers

91
Q

What does a domain name server do?

A

Resolve IP addresses to FQDN’s

92
Q

What is VRRP and what does it do?

A
93
Q

What is FHRP and what does it do?

A
94
Q

What is interior routing and what does it do?

A
95
Q
A