Lecture 3 Flashcards

Networking Concepts

1
Q

a set of rules that define a common language two computers use to exchange messages is called what?

A

Communication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 7 layers of the OSI model?

A
Physical
Data link
network
transport
session
presentation
application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ occurs when a header or footer is added to the data of traffic flowing from the application layer down through to the physical layer.

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Protocol Data Unit at each of the PSI layers is called waht?

A
Physical- bit
Data link - frame
network - packet
transport- segment, datagram
Session, presentation, appliction - message, data, datastream
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A router functions at what layer of the OSI model?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The TCPIP Model has 4 layers, what are they?

A

Network interface
Internet
Transport
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The beacon frame in wireless access is used to do what?

A

Broadcast the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When multiple WAPs are used to connect a large area and systems to a wired infrastructure it is called what?

A

Enterprise extended mode infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 most secure methods of securing a wireless network?

A

802.1X authentication

WPA-2 authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a _____ topology, only 1 system can transmits at a time. If a segment within it is broken, all communication stop.

A

Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ____ topology is where several devices are connected to a central device.

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When system are connected to each other with several links to provide redundancy it is called a _____.

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A connection-oriented Transport layer protocol is called what?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This network layer protocol is used to determine the health of a network.

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is DNS used?

A

To resolve a name to an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A perimeter network is also called what? What type of service is usually in the DMZ?

A

DMZ

Public access services, like web sites

17
Q

What type of firewall inspects headers for information on the source and destination of the traffic?
A) Application Level gateway firewall (proxy)
B) Static packet filtering firewall
C) Stateful inspection firewall

A

B) Static packet filtering firewall

18
Q

A ______ firewall is used to establish communication sessions between trusted partners. It is based solely on the endpoint designations of the communiction.

A

Circuit level gatewall (circuit proxy)

19
Q

This type of firewall filters traffic between content and context of the traffic.

A

stateful inspection