Module 14 - Networking Flashcards

1
Q

What is a LAN?

A

Local Area Network: A computer network that covers only a small area, usually within one building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WLAN?

A

Wireless Local Area Network: A Type of LAN that does not use wires or cables to create connections, but instead transmits data over radio or infrared waves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a WAN?

A

Wide Area Network: A network or group of networks that span a large geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a MAN?

A

Metropolitan Area Network: A network that covers a large campus or city. A small MAN is sometimes called a Campus Area Network (CAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a PAN?

A

A Personal Area Network: A Network centered around one individual, consisting of personal devices at close range typically within a few meters.

  • Wireless PAN uses technologies such as Bluetooth and Infrared (IrDA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a SOHO?

A

Small Office / Home Office: Refers to a small business or business-at-home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a WAP?

A

Wireless Access Point: A device that allows wireless communication devices to connect to a wireless network using Wi-Fi, bluetooth, or related.

  • WAP usually connets to a router and can relay data between the wireless devices and wired devices on the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VPN?

A

Virtual Private Network: Uses a public network, such as the internet, to carry encrypted traffic between two points, such as between two remote offices.

  • VPN is typically used to provide remote offices or individual users with secure access to their organization’s network.
  • VPN can be contrasted wtih an expensive system of owned or leased lines.
  • VPN provides the same capabilities at a much lower cost.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a NIC?

A
  • Network Interface Card
  • Connects the networking device to the media
  • Converts signal used on the media to the type used by the networking device and vice-versa.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between link lights and activity lights?

A
  • Link light remains steady to indicate connectivity.
  • Activity light blinks to indicate activity (network traffic passing through the NIC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a MAC?

A

Media Access Control (MAC) Address:

  • Unique address burned-in to the card by the manufacturer, sometimes called the hardware address or physical address.
  • Address is 48 bits long, or 6 pairs of Hex digits.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do the first three Hex pairs of a MAC Address represent?

A

The vendor

  • The last three hex pairs represent the ID for the card itself.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an uplink port?

A

The connection between switches, when switches are combined to make a larger network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you find the MAC address?

A

Revealed with the command ipconfig/all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Repeater?

A
  • Allow a cabling system to extend beyond its maximum allowed length by amplifying the network voltages so signals travel farther.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Hub?

A
  • A Data Concentrator
  • A broadcast-based device (1 to many), when one host transmits, all hosts connected recieve.
  • Inefficient and allow many collisions on the network.
  • Link lights i ndicate connectivity and activity lights indicate traffic passing through.
  • All activity lights light up whenever a host starts to transmit.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a Switch?

A
  • A Data concentrator like a hub
  • Unlike hub, it is unicast-based (1 to 1).
  • One host transmits, only the destination host receives.
  • Eliminates ethernet collisions
  • Provides full duplexing, meaning two hosts can send and receive at the same time.
  • A switch will light the 2 LED’s for the ports of two communicating hosts.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of port does a hub and switch both have?

A

Several RJ45 ports, typically in multiples of 4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a proxy server?

A
  • Sits between an organizations’s LAN and the internet
  • “listens” for internet traffic, caches what is idnetified so that other requests to the same place could come from cache, thus speeding things up.
  • Can also block traffic to the internet to to specific sites.
  • Can provide caching, filtering, and monitoring of network traffic.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a Router?

A

A device that connects two different networks.

  • Connects the LAN to the internet or to other internal/external networks
  • Has at least 2 ports, one on the LAN side and one on the network side (often called WAN side)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Gateway?

A
  • A router that interconnects two netwroks that use two different network protocols.
  • Could connect a TCP/IP to a IPX/SPX.
  • A gateway can translate between hots on two networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are routing protocols?

A
  • Specifies how routers communicate with one another
  • Can use several Network transmission methods on a single device to communicate with other routers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

T/F - Many routers allow you to connect to a configuration page via a browser and an IP address

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a firewall?

A

A device and/or software that analyzes incoming/outgoing data packets and makes an allow or deny decision.

  • Can look into the data packet and make decisions based on:
    • Port number (80 = http, 25 = SMTP, etc)
    • Source or destination IP address
    • Type of protocol (TCP, UDP, etc)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is NAS?

A

Network Attached Storage

  • Device used to store data on a network
  • Convenient method of sharing files among multiple computers on a network
  • Benefits over file serves include faster data access and easier configuration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is VOIP?

A

Voice Over Internet Protocol

  • Allows voice to be sent over data lines
  • Benefits from Quality of Service (QoS), which assigns higher priorities to voice traffic.
  • Phones use an RJ-45 connection
  • Power over Ethernet (PoE) is used to provide power to VoIP phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the DMZ?

A

Demilitarized Zone

  • Provides a buffer zone that separates an internal network from the internet
  • Firewalls separate internet from DMZ, and the DMZ from the internal network
  • Types of serves typically placed in DMZ’s include:
    • web servers
    • front-end email servers
    • gaming servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the max cable length for 802.3 ethernet?

  1. 33 feet (10 meters)
  2. 100 feet (30 meters)
  3. 328 feet (100 meters)
  4. 1200 feet (366 meters)
A
  1. 328 feet (100 meters)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is Peer-to-Peer networking model?

A
  • Computers act as both clients and servers
  • Difficult to administer - highly decentralized
  • Works with 10 or less computers
  • Called a Workgroup in Windows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the Client-Server Networking Model?

A
  • Centralized server functions as repository for files and resources.
  • Easy to administer
  • Works well in large networks (10 + computers)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Domain Controller?

A
  • In Windows Domain network, a Domain Controller is a server used to store domain useraccounts that users can login with.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are cached credentials?

A
  • When a users logs into a domain, the user’s computer caches locally the domain account information.
  • This allows the user to log into the domain even if they can’t connect to the Domain Controller server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of the following will allow a user account to logon to Windows Vista when a Windows domain name needs to be specified (Select TWO):

  1. domain\username
  2. username@domain
  3. username-domain
  4. domain-username
  5. domain username
A
  1. domain\username
  2. username@domain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does physical topology refer to?

A

The layout of cable that connects computers and other devices together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What does Logical Topology refer to?

A

How data moves among network hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Bus Topology?

A
  • All nodes connect on a single coaxial cable
  • Each end of network must be terminated
  • Faulty terminators, connectors, or cables can disable part or whole network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Star Topology?

A
  • All nodes connect to a central point, typically a hub or switch
  • Uses different cable types, including twisted pair, fiber optic, wireless
  • Failure of cable affects just one node
  • Failure of concentrator (hub or switch) downs the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is Ring Topology?

A
  • Ring of cable, one end connected to another
  • Signals travel around the ring
  • Token Ring and Fiber Distributed Data Interface (FDDI) are two popular examples
  • Typical speed is either 4 or 16 Mbps
  • Concentrator is called a Multi-Station Access Unit (MAU)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is Mesh Topology?

A
  • Every node is connected to every other mode
  • Advantage is redundancy, disadvantage is cost
  • Not practical for LANs
  • Primarily used in WAN’s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Name Three Media Access Methods:

A
  1. Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
  2. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
  3. Token Passing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Describe CSMA/CD:

A
  • Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
    • Computer first listens to the wire.
    • If no traffic detected, computer transmits its data
    • If another computer transmits at the same time, a collision occurs and no data can be transmitted for either machine.
    • Part of the IEEE 802.3 standard
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Describe CSMA/CA:

A

Computer Sense Multiple Access with Collision Avoidance (CSMA/CA):

  • Computer first listens to wire, if no traffic detected the computer sends a signal that it is rady to transmit data.
  • If the ready signal transmits without a problem, computer than transmits its data.
  • Used in IEEE 802.11 wireless networks and in AppleTalk
  • Slower and less popular than CSMA/CD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Describe Token Passing:

A
  • Special packet of data, called a token is passed from co mputer to computer.
  • Any computer that has data to transmit must wait for the token
  • Part of IEEE 802.5 standard, also known as Token Ring network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is Full Duplex?

A

Can carry data in both directions at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is half duplex?

A

Can carry data in both directions, but only one direction at a time.

  • Network hubs can run in this mode by design.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

List 5 Different Connectors for Coaxial Cable:

A
  1. RG-8 (known as Thicknet 10base5) 15-pin AUT Attachment Unit Interface
  2. RG-58 (known as Thinnet 10base2) or BNC T - British Naval Connector
  3. RG-6 - used to carry audio/visual signals from devices such as cable boxes and satellite dishes to television displays. Used mainly with digital cable and satellite signals
  4. RG-59 - used mainly for analog cable TV
  5. F Connectors - typical coax connector seen in homes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Describe elements of Coaxial Cable:

A
  • Single copper wire down the middle
  • Braided shield around it
  • Cable is stiff and difficult to work with
  • Becoming increasingly rare in networks these days
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What are the two types of Twisted Pair Cable:

A
  1. UTP - Unshielded Twisted Pair - Least expensive and most popular for Local Area Networks
  2. STP - Shielded Twisted Pair - metallic foil shielding around the pairs of wires protects from electromagnetic interference caused by electrical motors, transmitters, et. STP is more expensive, so it’s only used when situation demands.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What connectors are used in Twisted Pair Cables?

A
  1. RJ45 - for networking
  2. RJ11 - for telephones and dial-up modems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How many wires in UTP/STP cables?

A

Eight wires (four twisted pairs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

How many wires in Plain Old Telephone Service (POTS)?

A

Four wires - POTS uses RJ11 connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are the wires twisted in UTP/STP?

A

Reduces crosstalk and resistance to outside interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What are the seven grades of UTP Cable?

A
  1. Cat 1 - Voice grade (VG), not for data
  2. Cat 2 - VG and low speed data
  3. Cat 3 - VG, 10 Mbps Ethernet, 4 Mbps Token Ring (most often found in POTS)
  4. Cat 4 - 16 Mbps Token Ring
  5. Cat 5 - 100 Mbps Ethernet (aka Fast Ethernet)
  6. Cat 5e - 1000 Mbps Ethernet
  7. Cat 6 - 1000 Mbps or higher Ethernet (thicker cable)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is straight-through UTP cable used for?

A
  • Used to connect two dissimilar devices to one another, such as a computer to a switch.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is crossover UTP cable used for?

A
  • Used to connect two similar devices to one another, such as computer direct to computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are plenum rated cables?

A
  • cables that do not give off toxic fumes when burned.
  • Used inside plenums (spaces between floors of buildings)
  • More expensive then PVC (polyvinyl chloride), but safer in the event of a fire
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

List five elements of Fiber Optic Cable:

A
  1. Signals transmitted as pulses of light through glass or plastic
  2. Immune to EMI (electromagnetic interference)
  3. Signals can travel much farther than on copper
  4. More expensive than copper
  5. Needs special tools, is fragile and more difficult to work with.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is singlemode fiber?

A
  • One frequency, light source is a laser
  • Used for long hauls, up to 24 miles/40km
  • More expensive than multimode
  • More fragile than multimode, cannot be bent as much as multimode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is multimode Fiber?

A
  • Multi wavelengths, light source is LED
  • Travels shorter distances than singlemode (up to 3000 feet)
  • Cheaper and less fragile than singlemode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

List Four Types of Fiber Optic Connectors:

A
  1. SC (Standard Connector)
  2. ST (Straight Tip)
  3. LC (Local Connector)
  4. MT-RJ (Mechanical transfer RJ)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the transfer speed and max length of ThinNet Cable (10Base2)?

A
  • 10 Mbps
  • 185 meters
  • Uses BNC connector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the transfer speed and max length of ThickNet cable (10Base5)?

A
  • 10 Mbps
  • 500 Meters
  • Uses an AUI 15-pin D-shaped connector
63
Q

What is the transfer speed and max length of 10BaseT (Twisted Pair) Cable?

A
  • 10 Mbps
  • 100 meters (328 feet)
  • Uses an RJ-45 connector
  • 100 BaseT = 100 Mbps
  • Gigabit Ethernet = 1 Gbps
  • 10-Gigabit Ethernet = 10 Gbps
  • “T” denotes Twisted Pair
64
Q

What is the transfer speed and max length of 10BaseF Cable?

A
  • 10 Mbps
  • Up to 2 kilometers
  • Uses ST or SC connectors, or LC and MT-RJ connectors
  • 100BaseFL = 100 Mbps
  • 1000BaseFX = 1 Gbps
  • 1000BaseX = 10 Gbps
65
Q

T/F - When transferrring data between two network devices with different transfer speeds, data is transferred at speed of slower device.

A
  • True.
  • Example - If you connect a 10/100 NIC to a 10/100/1000 switch, the maximum transfer rate is 100 Mpbs
66
Q

What is a Cable Tester used for?

A
  • Test the integrity of the cable (ie. the ability for the cable to carry an electrical signal)
  • Testers are available for twisted pair, fiber optic, and coaxial
  • For twisted pair, can determine if cable is straight-through or crossover.
67
Q

What is an Induction Toner (aka Toner Probe) used for?

A
  • Can be used to trace a cable that begins in one area, such as a user’s work space, to another area such as a wiring closet.
  • Consists fo two units, one puts the tone on the wire and the other is a proble that locates the cable with the tone on it. (sometimes referred to as the “fox and hound”)
68
Q

What is a Loopback Plug used for?

A
  • A connector for diagnosing transmission problems
  • For testing the port/interface inside the computer or device.
  • Could use to troubleshoot a NIC that is not receiving an IP address
  • Plugs into a port, such as a serial or parallel port, and crosses over the transmit line to the receive line so that outgoing signals can be redirected back into computer.
69
Q

What is a Time Domain Reflectometer (TDR) used for?

A
  • To detect faults in metallic cables
  • Sends pulse down line and listens for reflected pulse from a break or short
  • Uses time to estimate the distance where the fault lies
  • Optical Time Domain Reflectometer (OTDR) is used to locate faults in fiber optic cables.
70
Q

What is a Crimper Tool used for?

A
  • To fasten a connector to the cabling of a twisted pair cable.
  • Sometimes called “terminating a UTP cable”
71
Q

What is a Punch Down Tool used for?

A
  • Used to make sure network wires are securly fastened in a wall jack
  • Used to insert network wires into RJ-45 jacks and patch panels
  • Most are impact type which push the wire into the slot, cuts the insulation, and secures the wire.
72
Q

What are the differences in the T568A vs T568B Wiring Standards for Twisted Pair Cable?

A
  • T568A - Starts with two green wires in 1 & 2 positions
  • T568B - Starts with two orange wires in 1 & 2 positions
  • All other wires in same spots (blue pair in 4&5, brown pair in 7&8)
73
Q

Place the following cable types into increasing max distance:

  • Coax
  • UTP (CAT)
  • Fiber
A
  1. CAT (Max 328 ft / 100 meters)
  2. Coax (Max 550 ft)
  3. Fiber (Max 25 miles)
74
Q

Which of the following cable types uses a BNC?

  1. Fiber
  2. CAT6
  3. Coaxial
  4. UTP
A
  • Coaxial
75
Q

What are the seven layers in Open System Interconnection (OSI) Networking Model?

A
  1. Physical Layer
  2. Data Link Layer
  3. Network Layer
  4. Transport Layer
  5. Session Layer
  6. Presentation Layer
  7. Application Layer
76
Q

What is in the Physical Layer of OSI (Layer 1)?

A
  • Hubs, Repeaters, Network Adapters Exist Here
  • Defines the elctrical and mechanical characteristics used to access bits over a physical medium (including, pins, voltages, and cable specs)
77
Q

What is in the Data Link Layer (Layer 2) in OSI?

A
  • Switches, Bridges, MAC Addresses operate at this layer
  • Ethernet (IEEE 802.2)
  • Bits from the physical layer are “framed” in the data link layer
  • Responsible for reliable delivery at the lowest levels, including framing of data
78
Q

What is in the Network Layer (Layer 3) of OSI?

A
  • IP, IMCP, and ARP operate at this level
  • Routers operate at this layer
  • Provides network addressing and routing of data
79
Q

What is in the Transport Layer (Layer 4) of OSI?

A
  • TCP Transmission Control Protocol (connection-oriented, guaranteed deliver)
  • UDP User Datagram Protocl (connectionless, faster, delivery not guaranteed)
  • Provides error detection, correction, and end-to-end communications between devices
80
Q

What is in the Session Layer (Layer 5) of OSL?

A
  • Controls dialogs/connections (sessions) between computers
  • Establishes, manages, and terminates sessions between computers
  • Provides for
    • Full Duplex
    • Half Duplex
    • Simplex Communications
81
Q

What is in the Presentation Layer (Layer 6) of OSL?

A
  • Provides data transformation and conversion
  • Data encryption, compression, EBCDIC to ASCII
82
Q

What is in the Application Layer (Layer 7) of OSL?

A
  • Provides network services for user applications
    • HTTP
    • FTP
    • Email (SMPT, POP3, IMAP)
    • SNMP, etc
83
Q

What is Networking Protocol?

Identify four Networking Protocols:

A

The specifications defining procedures for transmitting and receiving data, such as data format, timing, sequence, and error-checking.

  1. ARP - Address Resolution Protocol
  2. ICMP - Internet Control Messaging Protocol
  3. Internet Protocol IPv4
  4. Internet Protocol IPv6
84
Q

What does OSI stand for?

  1. Open Source Inspection
  2. Open Source Interconnection
  3. Open System Interconnection
  4. Optical Systemic Inspection
A

Open System Interconnection (OSI) Networking Model

85
Q

What is ARP?

A

Address Resolution Protocol

  • ARP results a known IP address to an unknown MAC (physical address).
  • All communications between two hosts on the same LAN require that each host knows the other’s MAC address before data transmission can beging.
  • ARP-a command displays IP addresses resolved to associated MAC addresses. Values are memory resident and disappear when the host is shut down.
86
Q

What is ICMP?

A

Internet Control Messaging Protocol

  • Informs a source host about errors in packet processing
  • Probe the network with request and reply messages to determine general network characteristics
  • PING command uses ICMP
  • Often restricted by network admins as it offers a way for malicious attacks on a network
87
Q

How many bits long is an IPv4 address?

A
  • 32 bits
  • Represented as w.x.y.z, each of which is an octet
88
Q

What is the purpose of IPv4?

A

Responsible for routing data from the source to the final destination.

Located in the Network Layer of the OSI model.

89
Q

What is the Subnet Mask within IPv4?

A
  • Each IP address has two parts, the network section and the host section.
  • The subnet mask determines which part of the IP address is the network portion and which part is the host portion.
90
Q

What are the three IP address classes in IPv4?

A
  • Class A - Starts 1-127. 8 bits Network ID, 24 bits Host ID
  • Class B - Starts 128-191. 16 bits Network ID, 16 bits Host ID
  • Class C - Starts 192-223. 24 bits Network ID, 8 bits Hosts ID
91
Q

What is multicasting?

A
  • When one network device sends data to a set or group of devices using an IP address in the Class D Range (224-239).
  • In contrast, unicast communications occur when one network device sends data to one recipient device (as in a switch).
92
Q

What is a Loopback Address?

A
  • An IPv4 address that begins with 127.
  • An IPv6 address that is 0:0:0:0:0:0:0:7, or ::1
  • The commands PING 127.0.0.1 and PING Localhost do not generate any network traffic, and simply test that TCP/IP is installed correctly on a computer.
93
Q

What is an APIPA?

A

Automatic Private IP Address

  • An IP address in the range of 169.254.0.1 - 169.254.255.254
  • In the event that a Windows computer is to receive an IP address from a DHCP server, but the server is unavailable, Windows will assign itself an IP address in the 169 range.
94
Q

What is a Broadcast Address?

A

An IP address of 255.255.255.255

  • Occurs when a computer needs to contact another computer on a network but does not know the target computer’s IP address.
  • Sends the message to ALL computers using the broadast address.
95
Q

What is a Public IP Address?

A

Addresses that are accessible from the internet.

  • When a company applies for a Class A, B, or C address, it is assigned a public address that is different from all other public IP addresses.
96
Q

What is a Private IP Address?

A

Addresses that are not accessible from the internet.

97
Q

Which of the following are valid private IP addresses (Select Three):

  1. 10.0.0.0 through 10.255.255.255
  2. 172.16.0.0 through 172.31.255.255
  3. 172.1.0.0 through 172.15.255.255
  4. 192.168.0.0 through 192.168.255.255
  5. 192.1.0.0 through 192.167.255.255
A
    1. 10.0.0.0 through 10.255.255.255
    1. 172.16.0.0 through 172.31.255.255
    1. 192.168.0.0 through 192.168.255.255
98
Q

Name Three IPv4 Rules:

A
  1. The largest number that can appear in any octet of an IP address is 255 decimal (which is equivalent to 8 binary one’s).
  2. A host on a network cannot be assigned an IP address that starts with 0, 127, or 255 in the first octet.
  3. The entire Host ID portion of an IP address cannot be equal to all binary zeroes (0 decimal) or ones (255 decimal)
99
Q

How many bits long is an IPv6 address?

A

128 bits

  • Represented by 8 groups of 16-bit hexadecimal values separated by colons:
    • 2001 : 0db8 : 85a3 : 0000 : 0000 : 8a2e : 0370 : 7334
100
Q

Is IPv6 supported by all routers?

A
  • Not yet
  • Can exist on the same network
  • IPv6 does not implement interoperability with IPv4, modern OS’s use dual-protocol for transparent access to either v4 or v6.
101
Q

What are the abbreviation rules for IPv6?

A
  1. Leading zeroes within a 16-bit value may be omitted.
  2. One or more groups of consecutive zeroes within an address may be replaced by a double colon. A double colon can only appear once in an address.
102
Q

What is slash notation in IPv4 addresses?

A

Indicates the number of leftmost bits representing the network ID.

  • Class A = /8
  • Class B = /16
  • Class C = /24
103
Q

What is NAT?

A

Network Address Translation

  • The mapping of private IP addresses to a public IP address
  • Prevents incoming (public) session initiation
104
Q

What is TCP?

A

Transmission Control Protocol

  • Provides reliable delivery of data between hosts on a network
  • Connection-oriented, meaning that the communicating hosts on a network first establishes the connection between them.
105
Q

What is UDP?

A

User Datagram Protocol:

  • Provides unreliable delivery of data between hosts
  • Connectionless, meaning that data can be transmitted without first establishing a connection between them.
106
Q

Identify four Protocol Suites:

A
  1. TCP/IP - Required to access the internet
  2. IPX/SPX - Default for Novell Netware OS before Netware 5
  3. Appletalk - Protocol and proprietary network architecture for Macs
  4. NetBIOS - very simple and very fast protocol that requires little setup. Used by a Windows Networking protocol called NetBEUI, which cannot be routed and thus cannot be used on a WAN.
107
Q

What is Port 20 used for?

A

Port 20:

  • File Transfer Protocol (FTP) data channel
  • Used for transmitting files between two computers
108
Q

What is Port 21 used for?

A

Port 21:

  • FTP control channel
  • Used for exchanging commands and responses by FTP connected systems.
109
Q

What is Port 22 used for?

A

Port 22:

  • SFTP (Secure File Transfer Protocol)
  • SSH (Secure Shell), a client/server application used primarily on Linux/Unix based systems to access shell accounts on an SSH server.
110
Q

What is Port 25 used for?

A

Port 25:

  • SMTP (Simple Mail Transfer Protocol) used to send email messages
111
Q

What is Port 53 used for?

A

Port 53:

  • Domain Name System, resolves friendly host/domain names to IP addresses.
112
Q

What is Port 80 used for?

A

Port 80

  • HTTP (Hypertext Transfer Protocol)
  • Used by web servers to receive requests from client browsers.
113
Q

What is Port 110 used for?

A

Port 110:

  • POP3 - Post Office Protocol 3, used to receive email requests from clients.
114
Q

What is Port 143 used for?

A

Port 143:

  • IMAP4 (Internet Message Access Protocol)
  • Used to receive email requests from clients.
  • Allows mailboxes to be synchronized, so that changes from one device will be reflected on the other.
115
Q

What is Port 119 used for?

A

Port 119

  • NNTP Network News Transfer Protocol, used to host newsgroups
116
Q

What is Port 161 used for?

A

Port 161

  • SNMP - Simple Network Management Protocol
  • Used to monitor network-attached devices (computers, switches) for conditions that warrant administrative attention
  • Can also be used to configure the status and features of network devices.
117
Q

What is Port 443 used for?

A

Port 443:

  • HTTPS (Hypertext Transfer Protocol Secure)
  • A combination of HTTP with Secure Sockets Layer (SSL) to make for a secure connection
118
Q

What is Port 3389 used for?

A

Port 3389:

  • Remote Desktop Protocol
  • Allows access to a remote computer’s desktop
119
Q

What is Port 8080 used for?

A

Port 8080:

  • HTTP - Alternate
  • This port is a popular alternative to port 80 for offering web services.
  • 8080 was chosen since it is two 80’s and
120
Q

What is DHCP?

A

Dynamic Host Configuration Protocol

  • Automatically assigns IP addresses to hosts on a network
121
Q

What is a static IP address assignment?

A

When a user manually types in an IP address.

122
Q

What is scope and exclusion scope in DHCP?

A

Scope = a specific range of IP addresses which a DHCP server can assign to hosts on a network.

Exclusion Scope = Specifies addresses within the scope which should not be given out by the DHCP server.

123
Q

What is DNS?

A

Domain Name Service

  • Resolves friendly host names to IP addresses
  • Preferred DNS server - server your computer will always use
  • Alternate DNS server - will use if Preferred is unavailable.
124
Q

What is WINS?

A

Windows Internet Naming Service

  • Resolves NetBIOS names to IP addresses on Microsoft networks.
125
Q

Identify Six IPCONFIG commands and uses:

A
  1. IPCONFIG - Displays a computer’s IP address configuration
  2. IPCONFIG / ALL - In addition to IP address, displays MAC (physical address), information about lease duration, IP addresses of DNS & WINS servers
  3. IPCONFIG / Release - Causes a client to contact a DHCP server and release its current IP address
  4. IPCONFIG / Renew - Causes a client to contact a DHCP server to renew its IP address
  5. IPCONFIG / displaydns - Displays the contents of a computer’s DNS cache.
  6. IPCONFIG / flushdns - Deletes any items currently stored in a computer’s DNS cache.
126
Q

What is the PING command used for?

A

Tests connectivity on a network by sending a series of packets to another computer, which in return sends back a response.

  • -a parameter tests for name resolution
  • -t parameter causes pinging to continue until interrupted
  • -l parameter changes the size of the data packet
  • 127 - tests the loopback address to determine if TCP/IP is installed
  • www.mywebsite.com - uses host name to find IP address of a remote computer
127
Q

What is the NSLOOKUP command used for?

A

Name Server Lookup

  • Allows you to verify entries on a DNS server.
128
Q

What is the TRACERT command used for?

A

Displays the IP address of each router between the client and a target.

129
Q

What is the PATHPING command used for?

A

A route tracing command that combines the features of Ping and Tracert with additional information that neither of those commands provide.

130
Q

What is the NETSTAT command used for?

A

Displays protocol statistics and current TCP/IP network connections. Also shows which ports are active, listening or not connected.

131
Q

What is the NBTSTAT command used for?

A

Displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP)

132
Q

What is the NETVIEW command used for?

A

Displays a list of shared resources on a specified host or workgroup/domain.

133
Q

What is the NETUSE command used for?

A

Maps a drive letter to a shared folder on a network or displays a list of current network connections.

134
Q

What is the GETMAC command used for?

A

Displays MAC addresses for all network adapters in a computer.

135
Q

What are the classes of Bluetooth?

A
  • Class 1 = 100 meter range
  • Class 2 = 10 meter range (most popular)
  • Class 3 = 5 meter range (least popular)
136
Q

What is Bluetooth?

A
  • Standard for short-range wireless communication between devices such as cell phones, PDA’s, wireless headsets, mice, keyboards, etc.
  • Commonly used to create a Personal Area Network (PAN).
  • Enables devices to communicate wirelessly through short-range, ad-hoc networks known as piconets.
137
Q

What is the max number of devices in a piconet?

A

7 devices

138
Q

What is the data transfer speed of Bluetooth?

A

3 Mbps

139
Q

What is the radio spectrum used for Bluetooth?

A

2.4 GHz frequency range

140
Q

What happens in discoverable mode in bluetooth?

A

The device transmits information about itself, such as the device name, device class, and list of services it provides.

141
Q

What occurs during Bluetooth pairing?

A
  • Two bluetooth devices agree to communicate with each other and establish a connection.
  • In order to pair two Bluetooth devices, a passcode has to be exchanged.
142
Q

What is the maximum range and data transfer speed for Infrared?

A
  • 1 meter max range
  • 16 Mbps
143
Q

What is IrDA?

A

Infrared

  • Short-range, point-to-point wireless communication
  • Requires line-of-sight between devices
  • Being replaced by bluetooth technology
  • Security is not an issue given the max range and the signal does not go through walls
144
Q

What is the frequency and throughput of 802.11a?

A
  • Frequency: 5 GHz
  • Throughput: 54 Mbps
  • No longer widely used.
  • NOT compatible with 802.11b/g because of frequency difference.
145
Q

What is the frequency, throughput, and range of 802.11b?

A
  • Frequency: 2.4 GHz
  • Throughput: 11 Mbps
  • Range: 100 meters
  • Can be interfered with by other devices that operate at 2.4 GHz, such as cordless phones, microwaves ovens, and Bluetooth devices
146
Q

What is the frequency, throughput, and range of 802.11g?

A
  • Frequency: 2.4 GHz
  • Throughput: 54 Mbps
  • Range: 100 meters
  • Can be interfered with by other devices that operate at 2.4 GHz, such as cordless phones, microwaves ovens, and Bluetooth devices
147
Q

What is the frequency, throughput, and range of 802.11n?

A
  • Frequency: 2.4 GHz & 5GHz
  • Throughput: up to 600 Mbps
  • Range: Typcially greater than 802.11 b/g
  • multiple input / multiple ouput (MIMO) allows two or more antennas to be used at both ends of transmission.
  • Backwards compatible with 802.11 a/b/g
148
Q

What is Mixed Mode in Wifi?

A
  • Wireless routers can be configured to broadcast in mixed mode because there is a mixture of 802.11 a/b/g/n network devices.
  • Resulting speed is th slowest speed, for example when communicating between g and n devices, the resulting speed is 54 Mbps.
149
Q

What is ad-hoc mode?

A
  • Two wireless computers communicate directly with one another.
  • Does not require a Wireless Access Point (WAP)
150
Q

What is Infrastructure Mode?

A
  • Computers connect to one anothe rvia a common Wireless Access Point (WAP)
  • All wirelss clients must be configured to use the same SSID (Service Set Identifier),the name given to the wireless network.
151
Q

What is Disable SSID broadcasting?

A
  • The WAP stops broadcasting its name so that anyone with a wireless computer can see it.
  • Forces the user that wants to connect to type the name of the SSID.
152
Q

What is MAC filtering?

A
  • Allows the user to specify the MAC addresses able to use the access point.
  • Essentially creates an Access Control List (ACL) of those allowed to connect to the wireless network.
153
Q

What are the three types of 802.11 encryption?

A
  • WEP (Wired Equivalent Privacy) - Least secure
  • WPA (Wi-FI Protected Access) - Stronger than WEP
  • WPA 2 - stronger than WEP and WPA