Lecture 3 Flashcards
Networking Concepts
a set of rules that define a common language two computers use to exchange messages is called what?
Communication protocol
What are the 7 layers of the OSI model?
Physical Data link network transport session presentation application
____ occurs when a header or footer is added to the data of traffic flowing from the application layer down through to the physical layer.
Encapsulation
The Protocol Data Unit at each of the PSI layers is called waht?
Physical- bit Data link - frame network - packet transport- segment, datagram Session, presentation, appliction - message, data, datastream
A router functions at what layer of the OSI model?
Network Layer
The TCPIP Model has 4 layers, what are they?
Network interface
Internet
Transport
Application
The beacon frame in wireless access is used to do what?
Broadcast the SSID
When multiple WAPs are used to connect a large area and systems to a wired infrastructure it is called what?
Enterprise extended mode infrastructure
What are the 2 most secure methods of securing a wireless network?
802.1X authentication
WPA-2 authentication
In a _____ topology, only 1 system can transmits at a time. If a segment within it is broken, all communication stop.
Ring
A ____ topology is where several devices are connected to a central device.
Star
When system are connected to each other with several links to provide redundancy it is called a _____.
Mesh topology
A connection-oriented Transport layer protocol is called what?
TCP
This network layer protocol is used to determine the health of a network.
ICMP
Why is DNS used?
To resolve a name to an IP address.
A perimeter network is also called what? What type of service is usually in the DMZ?
DMZ
Public access services, like web sites
What type of firewall inspects headers for information on the source and destination of the traffic?
A) Application Level gateway firewall (proxy)
B) Static packet filtering firewall
C) Stateful inspection firewall
B) Static packet filtering firewall
A ______ firewall is used to establish communication sessions between trusted partners. It is based solely on the endpoint designations of the communiction.
Circuit level gatewall (circuit proxy)
This type of firewall filters traffic between content and context of the traffic.
stateful inspection