Midterm Review Flashcards

1
Q

What is ARP and what does it do?

A

Address Resolution Protocol - used to resolve IP addresses to MAC Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give two examples of link-state protocols.

A

OSPF (Open Shortest Path First)

IS-IS (Intermediate System to Intermediate System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What port is commonly used for DNS?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DNS caching?

A

DNS caching - the process in which a server learns the address and retains that information for a certain amount of time designated by the TTL (time to live) of the record configured at the residing DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a VPN do?

A

Allows access to a private network over the public Internet in a secure way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify the TCP 3-way Handshake.

A

SYN
SYN ACK
ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Identify the following subnet masks?

/16
/24

A

The number indicates the number of bits that are used for the subnet mask. /16 indicates that 16 bits are used, so all 8 bits for the first octet and 8 bits for the second:
255.255.0.0

/24 indicates that the first 24 bits are used and therefore:
255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is CSMA/CD?

A

Carrier Sense Multiple Access/Collision Detection - a set of rules determining how network devices will respond when a collision occurs on the network. This can occur when two devices are attempting to use a single data channel simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two most common wireless frequencies?

A

2.4 GHz and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port is commonly used for the HTTP protocol?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is decapsulation?

A

The process in which a data packet is unwrapped to be used in higher layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a firewall?

A

Firewall - a device that sits on the edge of the network that is used to filter incoming and outgoing Internet traffic packet by packet. It will apply a set of rules to the packet based on the order of the rules. Once a decision has been made on a packet, the decision is done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port is commonly used for SSH?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False?

A packet is being filtered by a firewall. The firewall processes each rule for the packet and applies that last rule that it matches to the packet.

A

False.

Firewall rules are processed in order and once a match has been made, the decision is complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a root server?

A

One of 13 name servers that are spread across the globe that are used for name resolution. DNS servers use these root servers in order to resolve names that are not in their own DNS database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is encapsulation?

A

A process that involves the wrapping the higher layer protocol data unit for use by the lower layers. The goal is to keep each layer simple, logically separate, but remain interoperable with the other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name two devices that operate at Layer 2 of the OSI Model.

A

Bridge

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name Layer 4 of the OSI Model.

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What port is commonly used for SMTP?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an RIR and what is its purpose?

A

Regional Internet Registry - distributes the IP address block around the world, North American ARIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is DHCP and what is it used for?

A

Dynamic Host Configuration Protocol - The Dynamic Host Configuration Protocol is used in order to assign IP addresses to clients on the network automatically. A device that acts as a DHCP server can provide the IP address, the subnet mask, the default gateway, and DNS Name Servers to clients that request this information to allow the client to communicate on the network. DHCP belongs to the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are two routing protocols that are examples of distance vectors?

A

RIP

EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port is commonly used for Telnet?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is an “A” record?

A

A host record that consists of an IP Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Give an example of a Layer 1 device.

A

Hub

Repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Name Layer 7 of the OSI Model

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Of the following protocols, identify which ones are considered to be “reliable”:

Ethernet
ARC
IP
UDP
TCP
A

TCP

28
Q

What port is commonly used for HTTPS?

A

443

29
Q

What is an NS record?

A

Name Server

30
Q

True or False.

The EIGRP protocol is a proprietary protocol that is used exclusively by Cisco manufactured devices.

A

True

31
Q

How many bits are contained in an IP Address?

A

An IP Address consists of 4 octets for a total of 32-bits.

32
Q

What is Layer 1 of the OSI Model?

A

Physical

33
Q

What port is commonly used for FTP?

A

21

34
Q

What is an MX record?

A

Mail Exchange

35
Q

What is Layer 3 of the OSI Model?

A

Network

36
Q

What is an advantage of using Fiber over Copper?

A

Faster, more bandwidth
Smaller, weighs less
Raw materials are abundant (sand)
Not susceptible to Electro-Magnetic Interference

37
Q

What is Layer 6 of the OSI Model?

A

Presentation

38
Q

What is an advantage of the OSI Model being separated into layers?

A

Allows protocol designers to focus on each layer independently
A given protocol layer can easily be replaced with a different implementation

39
Q

What is a CNAME record?

A

An alias

40
Q

What is Layer 2 of the OSI Model?

A

Data Link

41
Q

What is the receive window size used for?

A

The amount of data that can be sent without acknowledgement, the receiver will tell the sender the size of the window

42
Q

What is Layer 5 of the OSI Model?

A

Session

43
Q

What are some disadvantages of the OSI Model being separated into layers?

A

Higher layers are sometimes unable to optimize data transfers based on the characteristics of underlying layers

Each layer can potentially impose overhead both in terms of processing time and control information stored in the protocol headers

The more layers that are available the better chance of things breaking down

44
Q

What is the OSI Model?

A

Open Source Interconnection Model.

A clear and standardized reference model used to establish communication between the layers.

45
Q

What is NAT?

A

Network Address Translation. Allows the use of a single public IP address to be used by several clients on the network. Maintains a translation table in order to keep track of its clients to determine which packet belongs to which client.

46
Q

Differences between a Hub and a Switch.

A

Hub - Layer 1. Transmits to all ports regardless of the destination.

Switch - a “smart” hub that operates at Layer 2. It maintains a table of MAC addresses in order to determine the intended recipient rather than broadcast over the entire network segment.

47
Q

Differences between a Switch and a Router.

A

A Switch uses MAC addresses to find the proper recipient and operates at Layer 2.

A router operates at Layer 3 and uses IP addresses. A router is used to connect multiple networks together.

48
Q

Who is credited with inventing Ethernet?

A

Bob Metcalfe and Dave Boggs

49
Q

What is BGP?

A

Border Gateway Protocol.

A standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet.

50
Q

The traditional OSI Model can easily be identified by using the expression: Please Do Not Throw Sausage Pizza Away. Using this expression, identify the layers.

A

1) Physical
2) Data Link
3) Network
4) Transort
5) Session
6) Presentation
7) Application

51
Q

Give an example of a component that operates at each level of the OSI Model.

A

1) Physical - wire
2) Data Link - Ethernet
3) Network - IP (Internet Protocol)
4) Transport - TCP (Transmission Control Protocol)
5) Session - OS Kernel
6) Presentation - OS Libraries
7) Application - Internet Explorer

52
Q

Match the following types of Addresses:

1) www.selu.edu
2) 147.174.1.24
3) 00-15-C5-49-04-A9

A) MAC Address
B) Host Name
C) IP Address

A

1) B
2) C
3) A

53
Q

What is a path vector?

A

Used in BGP, this is an extension of distance vector routing, the key idea is to advertise the entire path.

54
Q

How many hosts are available in network that contains a /24 subnet mask?

A

There are 256 IP Addresses for this subnet. However, the first address (0) is used to identify the network. The last address (255) is used as a broadcast. This leaves a total of 254 addresses that can be used by devices.

55
Q

What is a distance vector?

A

Distance Vector - defines the distance at each node (x) and updates the distances based on its neighbors, used in RIP and EIGRP (Cisco)

56
Q

What does the TCP Flag ‘FIN’ mean?

A

Exit nicely.

57
Q

What does the TCP Flag ‘RST’ mean?

A

Don’t exit nicely.

58
Q

An category 5e cable consist of how many unshielded twisted pairs of copper wire?

A

4

59
Q

What will happen during a TCP transmission if a packet is lost?

A

TCP will notice that it has not received the ACK associated with the packet and will resend it.

60
Q

Which best explains UDP?

A) Best effort
B) Guaranteed Delivery

A

A) Best effort.

UDP is best used when transmitting audio and/or video.

61
Q

What is the ping of death?

A

A malicious attack in which oversized ping packets are sent to a client in hopes of creating a crash.

62
Q

What is the purpose of networking?

A

To communicate

63
Q

What type of address is hardcoded into each network adapter?

A

MAC Address

64
Q

What are some examples of protocols that operate at Layer 2?

A

Ethernet, ADSL, DOCSIS

65
Q

What is a common protocol that operates at Layer 3?

A

IP (Internet Protocol)

66
Q

If you were designing a network, but wanted to include a higher level of redundancy, which topology would best suit your needs?

A) Star
B) Ring

A

B) Ring