Lesson 5 Flashcards

1
Q

TCP/IP

A

Transport Control Protocol/Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IXPs

A

Internet Exchange Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A physical location through which the internet infrastructure companies connect with each other

A

Internet Exchange Points (IXPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PoP

A

Point of Presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The media, hardware, and protocols used to link the local network at a domestic residence or small office to the Internet Service Providers Point of Presence

A

Internet Connection Type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PSTN

A

Public Switched Telephone Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POTS

A

Plain Old Telephone System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DSL

A

Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ADSL

A

Asymmetric Digital Subscriber Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a type of Direct Subscriber Link that provides a fast downlink, but a slow uplink

A

Asymmetric Digital Subscriber Line (ADSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CATV

A

Cable Access TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DOCSIS

A

Data Over Cable Service Interface Specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTTx

A

Fiber To The X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

FTTC

A

Fiber To The Curb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

FTTP

A

Fiber To The Premesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Means that the service provider’s fiber optic cable runs directly to the customer’s building

A

Fiber To The Premises (FTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Uses fiber optic cables to the main exchange but then uses old copper wires to connect to properties

A

Fiber To The Curb (FTTC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RTT

A

Round Trip Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

VSAT

A

Very Small Aperture Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DVB-S

A

Digital Video Broadcast Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LEO

A

Low Earth Orbit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

WISP

A

Wireless Internet Service Provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The area served by each base station is referred to as a

A

Cell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

GSM

A

Global System for Mobile Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CDMA
Code Division Multiple Access
26
SIM
Subscriber Identity Module
27
With _______, the handset is directly managed by the provider and there is no removable Subscriber Identity Module (SIM) card
Code Division Multiple Access (CDMA)
28
UMTS
Universal Mobile Telecommunications Service
29
EV-DO
Evaluation-Data Optimized
30
HSPA (H/H+)
High Speed Packet Access
31
LTE
Long-Term Evolution
32
MIMO
Multiple Input Multiple Output
33
The role of filtering allowed and denied hosts and protocols is performed by a
Firewall
34
ACL
Access Control Link
35
The rules a basic firewall is controlled by are referred to as a network
Access Control Link (ACL)
36
UTM
Unified Threat Management
37
_____ is used to perform logical addressing and data forwarding functions on most networks
Transmission Control Protocol/Internet Protocol (TCP/IP)
38
A set of rules that allows networked hosts to communicate data in a structured format
Protocol
39
What are protocols that work together referred to as?
Protocol Suite
40
Most networks have converged on the use of the
Transmission Control Protocol/Internet Protocol (TCP/IP) Suite
41
How many layers does the Transmission Control Protocol/Internet Protocol suite have?
Four
42
The four layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) suite starting from the lower layer
(Starting from lower) 1. Link/Network Interface 2. Internet 3. Transport 4. Application
43
Which Transmission Control Protocol/Internet Protocol (TCP/IP) layer is responsible for putting frames onto a physical network? (Uses devices such as ethernet and/or Wi-Fi)
Link/Network Interface Layer
44
A PC, laptop, mobile device, or server that can communicate on an IP network is generally referred to as an
End System Host
45
Allows a host to query (ask) which MAC address is associated with an IP address
Address Resolution Protocol (ARP)
46
ARP
Address Resolution Protocol
47
Which layer determines how each host manages multiple connections for different application layer protocols at the same time
Transport Layer
48
The transport layer is implemented by one of two protocols:
- Transmission Control Protocol - User Datagram Protocol
49
Guarantees connection-oriented forwarding of packets. Can identify and recover from lost or out-of-order packets.
Transmission Control Protocol
50
Provides unreliable, connectionless forwarding. Is faster because it does not need to send extra information to establish reliable connections
User Datagram Protocol (UDP)
51
Which layer contains protocols that perform some high-level function, rather than simply addressing hosts and transporting data
Application Layer
52
The core protocol in TCP/IP is the
Internet Protocol (IP)
53
Provides network and host addressing and packet forwarding between networks.
Internet Protocols (IP)
54
There are two versions of Internet Protocol (IP)
IPv4 IPv6
55
IPv4 is how many bits long?
32
56
The 32 bits can be arranged into four groups of eight bits (one byte) known as
Octets
57
The IP address of a router interface that the host can use to forward packets to other networks
Default Gateway
58
To communicate on the internet, a host must be configured with a unique public or private IP address?
Public
59
NAT
Network Address Translation
60
The router uses _____________ to convert between the private and public addresses
Network Address Translation (NAT)
61
Which type of address configuration requires an administrator to visit each computer to manually enter the configuration conformation for that host?
Static Addressing
62
DHCP
Dynamic Host Configuration Protocol
63
APIPA
Automatic Private IP Addressing
64
A network protocol that is used to configure network devices to communicate on an IP network
Dynamic Host Configuration Protocol (DHCP)
65
What is intended to replace IPv4 completely in the future?
IPv6
66
An IPv6 is a ____-bit number
128-bit
67
While being send from one host to another, frames are transporting what?
IP Packets
68
The Transmission Control Protocol is describes as a ______________ protocol
Connection-Oriented Protocol
69
The Transmission Control Protocol established a connection between the sender and recipient using a handshake sequence of
SYN, SYN/ACK, and ACK packets
70
ACK
Acknowledge
71
NACK
Negative Acknowledgement
72
_____ is suitable for applications that do not require acknowledgement of receipt and can tolerate missing or out-of-order packets.
User Datagram Protocol (UDP)
73
IANA
Internet Assigned Numbers Authority
74
The range of addresses that a DHCP server can offer to client hosts in a particular subnet
Scope
75
TLD
Top-Level Domain
76
FQDN
Fully Qualified Domain Name
77
.COM, .NET, .ORG are examples of
Top-Level Domains (TLDs)
78
www.funny.edibles.com What is the: Resource Record Subdomain Domain Top-Level-Domain
Resource Record: www Subdomain: funny Domain: edibles Top-Level Domain: com
79
MX
Mail Exchanger
80
What type of record is used to identify an email server for the domain so that other servers can send messages to it?
Mail Exchange (MX) record
81
What is used to store any free-form text that may be needed to support other network services
TXT Record
82
Identifies the hosts authorized to send email from that domain
Sender Policy Framework (SPF)
83
SPF
Sender Policy Framework
84
DKIM
DomainKeys Identified Mail
85
Uses cryptography to validate the source server for a given email message
DomainKeys Identified Mail (DKIM)
86
DBMARC
Domain-Based Message Authentication, Reporting, ad Conformance
87
Ensures that SPF and SKIM are being utilized effectively
Domain-Based Message Authentication, Reporting, and Conformance
88
VLAN
Virtual LAN