Midterm 2 Flashcards
Associated with CSMA/CD
Ethernet
Assigns IP addresses to computers
DHCP
Always floods received “messages” out all ports
hub
The exit point where all packets leaving a compuer are sent
default gateway
128 bits in length
IPng
IP Tunnelling
Encapsulating IPv6 datagrams within IPv4 datagram
10101100 in decimal
172
01000011in decimal
67
133 in decimal
10000101
In computer networks, a type of message sent to a group of (not all) nodes at the same time is called
multicast
Which protocol is used to access a file shared on a Windows network directory [acronym only]
SMB
Physical access in Networking
- Server rooms should be well cooled and have redundant source of power.
- Where possible remove keyboards, mice, and screens/monitors from server rooms. Instead use remote access or KVM switches.
- Disable ports on devices, e.g., USB ports or CD/DVD drives
- Similar processes should be applied for active devices.
Ping uses Answer ____ Echo packets to request a response from another computer to verify whether it’s available for communication
ICMP
What is the subnet mask of a class B address with prefix /15.
255.254.0.0
A network administrator subnets a 192.168.10.0 private address using a /27 prefix. What are 3 valid address blocks within the newly formed subnetworks?
192.168.10.1 - 192.168.10.31,
192.168.10.97 - 192.168.10.127,
192.168.10.33 - 192.168.10.63
a type of address that is automatically assigned when no DHCP server can be contacted
APIPA
resolves an IP address to a MAC address
ARP
resolves names to IP addresses
DNS
dynamically assigns IP addresses
DNS
the unit of information used by UDP in the Transport layer
datagram
Transport layer protocol that is connection-oriented and reliable
TCP
What type of packets are transmitted between a DHCP client and server when the client is initially leasing an IP address
Broadcast
Two common tools for diagnosing network connectivity which run on the ICMP protocol are
PING
TRACERT
Network security measures include
MAC Address Filtering,
Keeping ingress and egress logs,
Use of multi-factor authentication
Which of these messages helps TCP determine if a packet has been duplicated or lost
ACK
Where of these protocols are associated with emails
POP3,
SMTP,
IMAP4
time taken to examine a packet’s header and determine the exit interface
→ processing delay
the time required to “load” packets onto a communication medium/channel
→ transmission delay
the time a packet spends in a router waiting to be processed
→ queueing delay
time taken to transmit a packet across a communication channel or medium
→ propagation delay
A document that spells out the regulations governing access and use of network resources within an institution is called
Network Security Policy