Lesson 5: Objectives Flashcards

1
Q

WAN interface is usually what?

How are they connected?

A

Point-to-point meaning there are only two devices connected to the media (unlike ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethernet connections are made using what?
(Hardware)

2

A

NIC’s and Switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAN Interface is typically made by what kind of hardware?

A

Digital Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the 5 links to an internet connection>

A
  1. Hosts attached to a switch port or connected to the access point use ethernet and wi-fi to communicate
  2. SOHO wireless router implements all functions for local network and internet connectivity
  3. digital modem adapter in the router connects to an external line
  4. External line connects to the ISP’s PoP (Point of Presence)
  5. The ISP’s network forwards traffic over the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What establishes the physical connection to the WAN interface?

A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When interconnecting networks, there must be a way to identify each network and forwarding data between them. What performs this function?

A

the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When interconnecting networks, there must be a way to identify each network and forwarding data between them. What is used as identification?

A

IP (Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What “flavors” of DSL are there?
(Digital Subscriber Line)
(3)

A

S(symmetric)
A(Symmetric)
V(ery High Bit Rate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What else is POTS known as?

A

local loop
last mile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ADSL provides what speed downlink and what speed uplink?
(Asymmetric DSL)

fast / slow not numbers

A

fast downlink
slow uplink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of cabling is used for the core of the PSTN?
(Public Switched Telephone Network)

A

Fiber Optic Cable is dominant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What speed uplink and downlink does symmetric DSL offer?

fast / slow, not numeric

A

the same uplink and downlink speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is asymmetric or symmetric DSL more useful for businesses?

A

Symmetric, where more data is transferred upstream than with normal internet use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

On a standalone DSL modem, what kind of port on the modem connects to the phone point?

A

RJ-11 WAN port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What kind of port / interface is used on DSL modems to connect the modem to the router?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

With DSL, what must be installed to each phone socket to separate voice and data signals?

A

Filter / Splitter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A CATV network is often described as what?

A

HFC hybrid fiber coax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

HFC combines what?
(Hybrid Fiber Coax)
(Hardware)
(2)

A

fiber optic core network with copper coaxial cable links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the major obstacle to providing internet access that can perform like a LAN?

A

Bandwidth in the last mile

copper wiring infrastructure is often low-grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the 5 connections on cable modem

A
  1. Cable Modem –> Local Router –> RJ-45
  2. AP’s Network w/short coax –> Threaded F-Type Connector
  3. Coax links all premises in a street with CMTS
  4. Forwards data traffic w/fiber backbone to ISP’s PoP
  5. To the Internet

AP Access Point
CMTS Cable Modem Termination System
PoP Point of Presence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The cable modem is interfaced to the local router with what kind of port?

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CATV / HFC can also be described as what?
Cable Access TV / Hybrid Fiber Coax

A

Broadband cable
cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DOCSIS v3 allows the use of what to achieve higher bandwidth?

A

multiplexed channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What benefit does LEO (Low Earth Orbit) Satellites have over traditional satellites?

A

Lower RTT / Latency time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of DSL achieves the highest bit rates?

A

VDSL
Very High Bit Rate DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What kind of cable / connector is a cable modem connected to the Access Providers network with?

A

Short segment of coax
terminated using threaded F-type connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the ONT do? (Optical Network Terminal)

A

Converts the fiber optic signal to an electrical one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a PON (Passive Optical Network), what kind of cable is run, and from what point to what point?

A

a single fiber cable is run from an OLT (Optical Line Terminal) to a splitter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

In a PON (Passive Optical Network), where does the splitter direct traffic to?

A

Splitter directs each subscribers traffic over a shorter length of fiber to an ONT (Optical Network Terminal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Where is the ONT? (Optical Network Terminal)

A

installed at the customer’s premises.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the ONT connected to? Using What? (Optical Network Terminal)

A

Connected to the customer’s router using an RJ-45 Copper Wire Patch Cord

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is one drawback of satellites placed in a high geostationary orbit?

A

increased latency

because the signal must travel over thousands of miles more than terrestrial connections, giving a greater delay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Where are the orbital satellites located

A

Over the equator
(Pointing south for the northern hemisphere for satellites and pointing north for the southern hemisphere)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How is satellite internet connected?

(3)

A
  1. ISP installs a VSAT (Very small aperture terminal) satellite dish antenna at the customers premises
  2. ISP aligns the VSAT with the orbital Satellite.
  3. Antenna is connected via coaxial cable to DVB-S Modem (Digital Video Broadcast Satellite)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the drawback of LEO (Low Earth Orbit) Satellites?

A

LEO (Low Earth Orbit) Satellites move relative to Earth so the customers antenna must have a motor to periodically realign with the satellite.

Antenna must have a clear view of the whole sky

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

WISP (Wireless Internet Service Provider) uses what kind of wireless technology?

A

ground-based long-range fixed access wireless technology

WISP (Wireless Internet Service Provider) installs and maintains a directional antenna to work as a bridge between the customer’s network and the ISP.

might use Wi-Fi type networking or proprietary equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Do WISP’s (Wireless Internet Service Provider) use licensed or unlicensed frequency bands?

A

Both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is the disadvantages of fixed access wireless (Wisp (Wireless Internet Service Provider))

(2)

A

the actual unobstructed line of sight between the two antennas can be difficult to maintain.

If the ISP uses unlicensed frequencies, there are risks of interference from other wireless networks and devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

All types of microwave radio link can be adversely affected by what?
(3)

A

snow
rain
high winds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

With 3G Cellular Wireless, how does the radio make a connection?

A

to the nearest base station.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

With 3G Cellular Wireless, the area served by ease base station is referred to as what?

A

a “cell”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

With 3G Cellular Wireless, what is the effective range of each cell?

A

5 miles
8 km

though signals can be obstructed by building materials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

With 3G Cellular Wireless, there are two competing formats

A
  1. GSM (Global System for Mobile Communication)
  2. CDMA (Code Division Multiple Access)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

With 3G Cellular Wireless, what is the difference between GSM (Global System for Mobile communication) and CDMA? (Code Division Multiple Access)

A
  1. GSM: Phones allow subscribers to use SIM cards to unlock handset with chosen network provider
  2. CDMA: handset is directly managed by the provider and there is no removable SIM

(Global System for Mobile communication)
(Subscriber Identity Module)
(Code Division Multiple Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

With 3G Cellular Wireless, UMTS (Universal Mobile Telecommunications Service) is used on what format?

A

GSM Global System for Mobile communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

H/H+ / HSPA (High Speed Packet Access) is used with what kind of cellular network?

A

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

With 3G Cellular Wireless, EV-DO (Evolution Data Optimized) is used on what format phone?

GSM VS CDMA

A

CDMA Cell Division Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Is 4G LTE supported by GSM or CDMA network providers?

A

both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

5G uses what?

A

different spectrum bands from low to medium/high.

low bands = greater range and penetrating power
high bands = close range and cannot penetrate walls and windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What makes rolling out 5G wireless complex?

A

Rather than a single large antenna serving a wide area, 5G requires many smaller antennas to form an array that can take advantage of multipath and beamforming to overcome propagation limits of the spectrum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

5G technology is referred to as what?

A

Massive MIMO Multiple Input Multiple Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What serves as both the protocol needed to connect to the internet and the system interface?

Device

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What forwards a MAC (hardware) address?

A

a switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A MAC address identifies what?

A

a hardware port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what forwards packets to the internet using IP addresses?

A

routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does a LAN router do? (Local Area Network)

(2)

A
  1. divides a single physical network into multiple logical subnetworks
  2. each logical network becomes a separate broadcast domain.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

An IP address contains what information? (2)

A
  1. the identity of both the network and
  2. a single host within that network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What kind of interfaces does a LAN router typically have?

A

ethernet only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what kind of interface does a WAN router have? (2)

A
  1. ethernet interface for local network
  2. digital modem interface for the WAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The role of filtering allowed and denied hosts and protocols is performed by what?

A

a network firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a security benefit of a LAN router?

A

traffic passing from one logical network to another can be subject to filtering rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what does a WAN or border Router do?

A

forwards traffic to and from the internet or over a private WAN link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Each entry in a network firewalls ACL (Access Control List) (rules) lists what? (3)

A
  1. the source and/or destination network address
  2. protocol types and
  3. whether or not to allow or block traffic that matches that rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

basic firewall rules is referred to as what?

A

network access control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Most networks use what kind of protocol Suite?

A

TCP / IP
(Transmission Control Protocol / Internet Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

What are the 4 network layers?

A

Application
Transport
Internet
Link/Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Name some examples of the Application Layer: (14)

A
  1. DHCP
  2. DNS
  3. FTP
  4. HTTP/HTTPS
  5. SMTP
  6. IMAP
  7. POP3
  8. SSH
  9. RDP
  10. Telnet
  11. LDAP
  12. SNMP
  13. Syslog
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Name 2 examples of the Transport layer:

A
  1. TCP
  2. UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers

Name an example of the internet layer

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Name 2 examples of the Link / Network Interface Layer

A
  1. Ethernet
  2. Wi-Fi
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Link / Network Interface Layer: What is this layer responsible for?

A

Putting frames onto the physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

What Layer would DSL work under?

A

The Link / Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

What layer would cable modems work at?

A

The Link / Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Link / Network Interface Layer: What protocols are used on this layer?

A

Does not contain TCP/IP Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Link / Network Interface Layer: Where do communications take place on this layer?

A

Only at the local level and not between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Internet Layer: What does the IP provide?

A

packet addressing and routing within a network of networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Internet Layer: For data to be sent from one network to another, it must be forwarded by what?

A

an intermediate system (Router)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Internet Layer: IP provides what?

A

Best effort delivery that’s unreliable and connectionless. a packet might be lost, delivered out of sequence, duplicated, or delayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Transport Layer: What does the transport layer do?

A

determines how each host manages multiple connections for different application layer protocols at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Internet Layer: What does the internet layer deal with

A

Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

The function of each TCP / IP protocol is better understood by dividing network functions into layers.

Regarding the Transport Layer: TCP provides what kind of packet forwarding?

Transmission Control Protocol

A

guarantees connection-oriented forwarding of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Transport Layer: What does TCP do that makes it more reliable than UDP

Transmission Control Protocol
User Datagram Protocol

A

TCP can identify and recover from lost or out of order packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Transport Layer: what kind of applications tend to us UDP

User Datagram Protocol

A

time-sensitive applications such as speech or video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Transport Layer: is TCP or UDP faster?

A

UDP

because it doesn’t need to send extra information to establish reliable connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Application Layer: what is the purpose of the application layer protocols?

A

they perform high-level functions beyond addressing and sending data. Used to configure and manage network hosts and to operate services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What does the IP in the TCP / IP protocol provide?

A

network and host addressing and packet forwarding between networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

The function of each TCP / IP protocol is better understood by diving network functions into layers.

Regarding the Transport Layer: How reliable is UDP Forwarding?

User Datagram Protocol

A

unreliable and connectionless forwarding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How many bits is an IPv4 address?

A

32 bits long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

In an IPv4 address: what two pieces of information are encoded within the same value?

A

The network ID
The host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How can an IPv4 address be arranged?

A

into 4 groups of 8 bits (one byte) eg.
11000000101010000000000000000001
11000000 10101000 00000000 00000001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

IPv4 addresses are made easier to use by putting them in dotted decimal notation. how is this done?

A

by converting each octet into a decimal value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

In an IPv4 address, what identifies a host within a particular IP network?

A

host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

In an IPv4 address what identifies the network common to all hosts on the same IP network?

A

Network ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

When a host attempts to send a packet via IPv4, the protocol compares what?

A

the source and destination IP address in the packet against the sending host’s subnet mask.

if the masked portions of the source and destination IP address match, then the destination interface is assumed to be on the same IP network or subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

On Ethernet, the host would use what to identify the MAC address associated with the destination IP address (In IPv4 forwarding)

Protocol

A

address resolution protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

IPv4 forwarding, If the masked portion does not match the source and destination IP:

A

the host assumes that the packet must be routed to another IP network. It would be forwarded to the a router rather than trying to deliver it locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Public IP Addresses are permitted to do what?

A

Packets with public addresses are permitted to be forwarded over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

The default gateway configured to most hosts must be what?

A

in the same IP network as the host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Packets with private IP addresses should be what?

A

blocked at internet gateways or forwarded using some type of translation mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Public IP addresses are allocated to who by whom?

A

Customer Networks by
ISP’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

There are 3 ranges of private IPv4 addresses that aren’t allowed to route traffic over the public internet. These addresses are confined to what?

A

Private LAN’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What range is the Class A private address IPv4 Range:

A

10.0.0.0 to 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What range is the Class B private address IPv4 Range:

A

172.16.0.0 to 172.31.255.255

68
Q

What range is the Class C private address IPv4 Range:

A

192.168.0.0 to 192.168.255.255

69
Q

IPv4 Class A What is the Dotted Decimal Mask and the Network Prefix?

Specific number

A

255.0.0.0
/8

69
Q

IPv4 Class B What is the Dotted Decimal Mask and the Network Prefix?

A

255.255.0.0
/16

70
Q

Since private IP addresses can’t access the internet directly, some mechanism must be used to allow it to forward packets. Internet access can be facilitated for hosts using private addressing in what two ways:

A
  1. NAT: through a router configured with a single or block of valid public addresses, using the NAT to convert between the private and public addresses
  2. Through a proxy server that fulfills requests for internet resources on behalf of clients
70
Q

IPv4 Class C What is the Dotted Decimal Mask and the Network Prefix?

A

255.255.255.0
/24

70
Q

What are the minimum requirements for a host to be configured with to communicate on an IPv4 Network?

A
  1. IP address
  2. Subnet Mask
71
Q

In the IPv4 address 192.168.0.100 which number is the network ID?

A

192.168.0

71
Q

In the IPv4 address 192.168.0.100, which number is the host ID?

A

.100

72
Q

What is the default gateway parameter?

A

The IPv4 address of a router. This is the IP address to which packets destined for a remote network should be sent by default.

73
Q

Failure to enter a gateway would result in what?

A

This would limit the host to communication on the local network only.

74
Q

Typically the primary DNS server address would be configured as what?

A

the same as the gateway address.

The router would be configured to forward DNS queries to a secure resolver.

74
Q

Often, two DNS server addresses are specified for what reason?

A

redundancy: A preferred DNS server and an alternate

75
Q

What do DNS servers provide?

A

resolution of host and domain names to their IP addresses and are essential for locating resources on the internet.

76
Q

How would a static IP address be configured?

A

manually by the computer admin configuring the IP information on each computer and updating the settings if the host was moved to a different IP network or subnet.

77
Q

Static IP addresses are typically only assigned to what kind of systems?

A

systems with a dedicated functionality such as router interfaces or application servers that require a fixed IP address.

77
Q

DHCP servers would configure what 4 settings with the computer?

A

IP address
Subnet Mask
Default Gateway
DNS server addresses

78
Q

APIPA is also called what?

A

link-local address

79
Q

What IP range is an APIPA address set to ?

A

169.254.x.y

79
Q

When a host is using an APIPA address, who can it contact?

A

other hosts on the same network using APIPA addresses, but cannot reach other networks or communicate with hosts that have managed to obtain a valid DHCP lease.

80
Q

The Router’s public Interface IP address is determined how?

A

by the ISP

81
Q

How many bits is an IPv6 address?

A

128

82
Q

When shortening IPv6 addresses, what can be ignored?

A

a double byte contains leading zeros, the zeros can be ignored
ie:
0db8 = db8
0db8:0000:0000:0abc = db8::abc

82
Q

In IPv6 Addresses, one hex digit can represent what kind of value?

A

a 4-bit binary value

83
Q

Instead of a gateway, IPv6 addresses use a protocol called what?

A

ND
Neighbor Discovery

84
Q

What are the two main parts of an IPv6 address?

A
  1. Network ID (64 bits)
  2. Interface ID (64 bits)
85
Q

What is a global IPv6 address?

A

one that is unique on the internet.

85
Q

In IPv6, what is used to determine whether two addresses belong to the same IP network?

A

the 64-bit network ID, the length of any given network prefix

85
Q

In IPv6 addresses, why is there no need for a subnet mask?

A

because the network and host portions are a fixed size.

86
Q

In hex notations, global addresses start with what?

A

2 or a 3

86
Q

What is a link-local address

A

IPv6 address that is used on the local segment to communicate with neighbor hosts.

87
Q

In hex notation, link-local addresses start with what?

A

fe80

88
Q

ND = what in IPv4

A

Neighbor Discover = ARP in

89
Q

At the link layer, Ethernet allows hosts to send one another frames of data using MAC addresses. What would these frames typically be transporting?

A

IP packets

89
Q

Of the 4 layers of network functions, which layer would the IP provide addressing and routing functionality for a network of networks?

A

The internet layer

89
Q

Of the 4 layers of network functions, which layer identifies each type of network application?

A

The transport layer

89
Q

The transport layer (of network functions) serves to identify each type of network application. How is this accomplished?

A

It assigns each application a port number between 0 and 65,535

90
Q

What port does HTTP web browsing applications use

A

Port 80

90
Q

What is port 80?

A

HTTP web browsing applications

91
Q

Email transmission services uses what port?

A

25

92
Q

What is used by port 25

A

SMTP
Email transmission service

92
Q

If a host is transmitting multiple HTTP and email segments at the same time, which port would be used?

A

The ports would be multiplexed using the port numbers onto the same network link.

93
Q

How does IP transmit streams of application data?

A

as a series of packets

94
Q

TCP is described as what?

A

a connection-oriented protocol

95
Q

TCP protocols are called connection-oriented protocols (which overcomes the lack of IP reliability) with what 5 functions?

A
  1. Establishes a connection between the sender and the recipient using a handshake sequence of SYN, SYN/ACK, and ACK packets
  2. Assigns each packet a sequence number so that it can be tracked
  3. Allows the receiver to acknowledge (ACK) that a packet has been received
  4. Allows the receiver to send a negative acknowledgement (NACK) to force retransmission of a missing or damaged packet
  5. Allows the graceful termination of a session using a FIN handshake
96
Q

What is the main drawback to TCP protocols?

A

the connection information requires multiple header fields.

This can add 20 bytes or more to the size of each packet

96
Q

Name 2 application protocols that must use TCP

A
  1. HTTP/HTTPS
  2. SSH
96
Q

What is HTTP / HTTPS used for?

A

delivers web pages and other resources. The secure version uses encryption to authenticate the server and protect the information being transmitted.

A single missing packet would cause this process to fail entirely.

97
Q

What does SSH protocol do?

A

Used to access the command-line interface of a computer from across the network. it uses encryption to authenticate the server and user and protect the information that’s being transmitted.

98
Q

Using UDP for video or audio, how would missing packets manifest?

A

as glitches in the video or audio

99
Q

Name two protocols that use UDP

A
  1. DHCP (Dynamic Host Configuration Protocol)
  2. TFTP (Trivial File Transfer Protocol)
100
Q

What does DHCP do?

(Dynamic Host Configuration Protocol)

A

Used by clients to request IP configuration information from a server. It uses broadcast transmissions, which aren’t supported by TCP, so it must use UDP.

Protocol is simple, so if response packet isn’t received, the client just restarts the process and tries again repeatedly until timing out.

101
Q

What does the TFTP protocol do?

(Trivial File Transfer Protocol)

A

Protocol is typically used by a network device to obtain a configuration file. The application protocol uses its own acknowledgement messaging so it doesn’t require TCP

101
Q

What Port does the following Protocol Use: FTP Data Connection (File Transfer Protocol)

A

20

102
Q

What Port does the following Protocol Use: FTP Control Connection (File Transfer Protocol)

A

21

102
Q

What Port does the following Protocol Use: SSH (Secure SHell)

A

22

103
Q

What Port does the following Protocol Use: Telnet

A

23

103
Q

What Port does the following Protocol Use: SMTP (Simple Mail Transfer Protocol)

A

25

104
Q

What Port does the following Protocol Use: DNS (Domain Name System)

A

53

104
Q

What Port does the following Protocol Use: DHCP Server (Dynamic Host Configuration Protocol)

A

67

105
Q

What Port does the following Protocol Use: DHCP Client (Dynamic Host Configuration Protocol)

A

68

106
Q

What Port does the following Protocol Use: HTTP (HyperText Transfer Protocol)

A

80

107
Q

What Port does the following Protocol Use: POP ( Post Office Protocol)

A

110

108
Q

What Port does the following Protocol Use: NetBIOS over TCP/IP

A

137-139

109
Q

What Port does the following Protocol Use: IMAP (Internet Mail Access Protocol)

A

143

110
Q

What Port does the following Protocol Use: SNMP (Simple Network Management Protocol)

A

161

110
Q

What Port does the following Protocol Use: HTTPS (HyperText Transfer Protocol Secure)

A

443

111
Q

What Port does the following Protocol Use: SNMP Trap Operation (Simple Network Management Protocol)

A

162

111
Q

Does the following protocol use TCP or UDP: DHCP (Dynamic Host Configuration Protocol)

A

UDP

112
Q

What Port does the following Protocol Use: SMB (Server Message Block)

A

445

112
Q

What Port does the following Protocol Use: LDAP (Lightweight Directory Access Protocol)

A

389

113
Q

Does the following protocol use TCP or UDP: SMTP (Simple Mail Transfer Protocol)

A

TCP

113
Q

Does the following protocol use TCP or UDP: HTTPS (HyperText Transfer Protocol Secure)

A

TCP

113
Q

What Port does the following Protocol Use: RDP (Remote Desktop Protocol)

A

3389

113
Q

Does the following protocol use TCP or UDP: SMTP (Simple Mail Transfer Protocol)

A

TCP

113
Q

Does the following protocol use TCP or UDP: HTTP (HyperText Transfer Protocol)

A

TCP

114
Q

Does the following protocol use TCP or UDP: FTP (File Transfer Protocol)

A

TCP

114
Q

Does the following protocol use TCP or UDP: SMB (Server Message Block)

A

TCP

114
Q

Does the following protocol use TCP or UDP: DNS (Domain Name System)

A

TCP & UDP

114
Q

Does the following protocol use TCP or UDP: LDAP (Lightweight Directory Access Protocol)

A

TCP

115
Q

Does the following protocol use TCP or UDP: SSH (Secure SHell)

A

TCP

115
Q

Does the following protocol use TCP or UDP: Telnet

A

TCP

116
Q

Does the following protocol use TCP or UDP: POP (Post Office Protocol)

A

TCP

116
Q

Does the following protocol use TCP or UDP: RDP (Remote Desktop Protocol)

A

TCP

116
Q

Does the following protocol use TCP or UDP: NetBIOS

A

UDP & TCP

116
Q

Does the following protocol use TCP or UDP: IMAP (Internet Mail Access Protocol)

A

TCP

116
Q

Does the following protocol use TCP or UDP: SNMP (Simple Network Management Protocol)

A

UDP

116
Q

Does the following protocol use TCP or UDP: NETBIOS (Over TCP/IP)

A

UDP

116
Q

What is the purpose of the following protocol: FTP Data Connection (File Transfer Protocol)

A

Make files available for download across a network (Data connection port)

117
Q

Does the following protocol use TCP or UDP: FTP Control Connection (File Transfer Protocol)

A

TCP

117
Q

What is the purpose of the following protocol: DNS (Domain Name System)

A

Facilitate identification of hosts by name alongside IP addressing

117
Q

What is the purpose of the following protocol: Telnet

A

Makes an unsecure connection to the command line interface of a server

117
Q

What is the purpose of the following protocol: DHCP Client (Dynamic Host Configuration Protocol)

A

Request a dynamic IP address configuration from a server

117
Q

What is the purpose of the following protocol: IMAP (Internet Mail Access Protocol)

A

Read and manage mail messages on a server mailbox

117
Q

What is the purpose of the following protocol: HTTP (HyperText Transfer Protocol)

A

Provision unsecure websites and web services

117
Q

What is the purpose of the following protocol: DHCP Server (Dynamic Host Configuration Protocol)

A

Provision an IP address configuration to clients

117
Q

What is the purpose of the following protocol: SSH (Secure SHell)

A

Makes a secure connection to the command line interface of a server

118
Q

What is the purpose of the following protocol: POP (Post Office Protocol)

A

Retrieve email messages from a server mailbox

118
Q

What is the purpose of the following protocol: SNMP (Simple Network Management Protocol)

A

Query Status information from network devices

119
Q

What is the purpose of the following protocol: SNMP Trap Operation (Simple Network Management Protocol)

A

Report status information to a management server

119
Q

What is the purpose of the following protocol: LDAP (Lightweight Directory Access Protocol)

A

Query information about network users and resources

120
Q

What is the purpose of the following protocol: HTTPS (HyperText Transfer Protocol Secure)

A

Provision secure websites and services

120
Q

What is the purpose of the following protocol: SMB (Server Message Block)

A

Implement windows compatible file and printer sharing services on a local network

121
Q

What is SMB (Server Message Block) also sometimes referred to?

A

CIFS (Common Internet File System)

121
Q

What is the purpose of the following protocol: RDP (Remote Desktop Protocol)

A

Make a secure connection to the graphical desktop of a computer

122
Q

What is DHCP scope?

(Dynamic Host Configuration Protocol)

A

The range of addresses that a DHCP server can offer to client hosts in a particular subnet.

123
Q

What should a DHCP Scope exclude?

Dynamic Host Configuration Protocol

A

Should exclude any addresses that have been configured statically.

123
Q

When a DHCP client initializes, what packet does it broadcast to find a DHCP server?

A

DHCPDISCOVER

124
Q

When a DHCP server responds to a client, what is the packet name it sends back containing the address and other configuration information?
(Such as the default gateway and DNS server addresses)
(Dynamic Host Configuration Protocol)

A

DHCPOFFER

125
Q

When DHCP server sends the DHCPOFFER packet, the client may choose to accept the offer using what packet that is also broadcast onto the network?

A

DHCPREQUEST

126
Q

When the DHCP client sends the DHCPREQUEST packet to the DHCP server, assuming the offer is still available, the server will respond with what packet?

A

DHCPACK

126
Q

Once a DHCP client accepts the DHCPACK, what does the client do?

A

Broadcasts the ARP message to check that the address is unused.

If so, it will start to use the address and options,
If not, it declines the address and requests a new one.

126
Q

What is a DHCP Lease?

Dynamic Host Configuration Protocol

A

Address configuration assigned by a DHCP server tp a client for a limited period of time.

126
Q

What is a DHCP reservation?

Dynamic Host Configuration Protocol

A

It’s often useful for IP addresses to be known and to remain the same. While this can be done with a static IP, that can be difficult to maintain.

A DHCP reservation allows you to reserve a particular IP address for each device. the DHCP server is configured with a list of the MAC addresses of hosts that should receive the same IP address.

127
Q

nut.widget.example

nut is what?
widget.example is what?

A

nut = host name
widget.example = domain suffix

127
Q

At the top of the DNS hierarchy is what and how is it represented?

A

root
represented by the null label which is just a period (.)

127
Q

What is a FQDN?

Fully Qualified Domain Name

A

Host names are unique to the local network.
FQDN are language based unique identifiers that are unique to the internet and can be combined with a domain name and suffix.

127
Q

In the DNS hierarchy, what are the 13 root identities?

How are they represented?

A

A–M

128
Q

What do the 13 root identities in the DNS hierarchy represent?

A

1500 individual servers each providing identical information from the root zone to DNS resolvers all over the world

128
Q

What are the 6 layers of the DNS hierarchy?

A
  1. Root
  2. TLD (Top Level Domain)
  3. Country Code Subdomain
  4. Domain
  5. Subdomain
  6. Resource Records
128
Q

In the DNS hierarchy name 3 examples of how TLD are represented?

(Top Level Domain)

A
  1. uk
  2. net
  3. com
129
Q

In the DNS hierarchy name 1 example of how Country Code Subdomains are represented

A

co

129
Q

In the DNS hierarchy name 2 examples of how domains are represented

A

515web
515support

129
Q

In the DNS hierarchy give one example of how subdomains are represented

A

corp

129
Q

In the DNS hierarchy name 2 examples of how resource records are represented

A

www
pc

129
Q

What is an (A) Address record?

(Referring to DNS Records)

A

used to resolve a host name to an IPv4 Address.

129
Q

What is an (AAAA) address record?

(Referring to DNS record types?)

A

resolves a host name to an IPv6 address

129
Q

What is a MX Resource Record?

A

used to identify an email server for the domain so that other servers can send messages to it.

129
Q

In a typical network, multiple servers are installed to provide redundancy, and each one will be represented by what?

(DNS Records)

A

MX Record Number
Mail Exchanger

129
Q

Every MX number is given what?

Mail Exchanger

A

a preference value with the lowest numbered entry preferred.

129
Q

The host name identified in a MX record must have an associated what?

Mail Exchanger

A

A or AAAA record

129
Q

What is a TXT record?

A

used to store any free form text that may be needed to support other network services.

A single domain name may have many TXT records, but they are most commonly used to verify email services and block the transmission of spoofed and unwanted messages / spam

(DNS Spam Management Records)

129
Q

What is a SPF?

Sender Policy Framework?

A

DNS record identifying hosts authorized to send mail for the domain

129
Q

Who publishes an SPF and what does it use?

A

a DNS by an organization hosting email services publishes them

Uses a TXT resource record.

129
Q

How many SPF can be had for each domain?

Sender Policy Framework

A

one per domain

129
Q

What does the SPF issued to a domain indicate?

Sender Policy Framework

A

identifies the hosts authorized to send email from that domain.

can also indicate what to do with mail from servers not on that list.

129
Q

DomainKeys Identified Mail (DKIM) does what?

A

Uses cryptographic authentication mechanism for mail utilizing a public key published as a DNS record

Validates the source server for a given message

129
Q

DomainKeys Identified Mail (DKIM) Can replace or supplement what?

A

SPF Sender Policy Framework

129
Q

How is DomainKeys Identified Mail (DKIM) configured?

A

the organization uploads a public encryption key as a TXT record in the DNS server.

129
Q

What does Domain-Based Message Authentication, Reporting, and Conformance (DMARC) do?

A

It’s framework to ensure that SPF and DKIM are being utilized effectively. (Utilizing a policy published as a DNS record)

Specifies a more robust policy mechanism for senders to Specify how DMARC authentication failures should be treated, plus mechanisms for recipients to report DMARC authentication failures to the sender

Sender Policy Framework
DomainKeys Identified Mail

129
Q

How is a Domain-Based Message Authentication, Reporting, and Conformance (DMARC) Policy published?

A

As a DNS TXT record

129
Q

All hosts connected to the same unmanaged switch are said to be in the same what?

A

broadcast domain

129
Q

VLAN’s are what?

Virtual LAN

A

Logical network segment comprising a broadcast domain established using a feature of managed switches to assign each port a VLAN ID.

Even if hosts on 2 VLANs may be physically connected to the same switch, local traffic is isolated to each VLAN, so they must use a router to communicate

129
Q

VLAN’s Mitigate what problem?

Virtual LAN

A

Placing hundreds or thousands of hosts in the same broadcast domain reduces performance

130
Q

What is the simplest way to assign a node to a VLAN?

A

Configure the port interface on the switch with a VLAN ID in the range of 2 - 4094

130
Q

Can hosts placed in separate VLAN’s communicate with one another directly?

A

No.

130
Q

Each VLAN must be configured with what? (3)

A

-It’s own subnet address
-IP address range
-It’s own DHCP and DNS services

130
Q

How do VLAN’s function from a security standpoint?

A

They are each represented as a separate zone. Traffic passing between VLAN’s can easily be filtered and monitored to ensure it meets security policies.

130
Q

VPN enables hosts to do what?

A

connect to the LAN without being physically installed at the site.

130
Q

In a remote access VPN, what would be located between the VPN client and the Local Network?

3

A

-Remote Access Screened Subnet

-VPN Gateway
-Router / Firewall

130
Q

In remote access VPN network, what devices would be located on the Local Network?

A

Router / Firewall
LAN Servers

130
Q

In a VPN remote access network, where is the VPN encryption tunnel?

A

With the VPN client over the internet between the VPN client and the remote access screened subnet.

131
Q

What does FTP Protocol do?

A

Make files available for download across a network (Control Connection Port)