Module 2: Networking Flashcards

1
Q

What is a computer network?

A

A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do networks exist?

A

Networks exist to transfer data at literal lightning speeds. They improve daily life, business, and even warfare. They also facilitate even the most mundane office tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a router do?

A

A router sends traffic between different networks. It’s a computer with software on it that is capable of routing traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a switch do?

A

A switch sends traffic between different hosts on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a wireless access point?

A

A wireless access point allows hosts to connect to the network wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an IP address?

A

A unique ID for devices connecting to a network, used to send and receive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the structure of an IPv4 address?

A

It is made up of four sections, each called an “octet”. Each octet, in binary, is comprised of eight bits, making a total of 32 bits for the IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does binary counting work?

A

Binary counting uses multiples of two, from right to left: 1’s, 2’s, 4’s, 8’s, 16’s, etc., based on electrical signals being “ON” (1), or “OFF” (0).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a subnet mask and how does it work?

A

A subnet mask identifies which portion of the IP address is the Network ID; the remainder is considered the Host ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is CIDR notation?

A

CIDR Notation is a shorthand way of representing any given IP address with its Subnet Mask. (Ex. 192 . 168 . 0 . 0 / 24) (The /24 represents the number of bits in the Subnet Mask. That is:)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an APIPA?

A

Automatic Private IP Addressing (APIPA) is a DHCP failover mechanism used by all Microsoft Windows Operating Systems which assigns an address when a DHCP server is not available. This allows hosts on the same network to be able to communicate with each other in spite of not being assigned an address by a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Loopback Addresses?

A

The address range 127.0.0.0 to 127.255.255.254 are referred to as “loopback” addresses. They allow a computer to confirm that it can use TCP/IP and allow for different programs running on the same machine to communicate with each other using IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Private IP Addresses?

A

A specific set of IP addresses used for private network use. You’ll likely see these assigned to your personal devices whenever you are working from home or an office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Ports?

A

Ports are essentially endpoints where network connections can start and or end. Ports can be considered the “apartment number” or “suite number” in an apartment building where the apartment building is the “IP Address”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Protocols?

A

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TCP?

A

(Transmission Control Protocol)
TCP is considered a “connection oriented” protocol and is used when it’s absolutely imperative that all data is successfully transmitted (for example, when sending files) at the cost of speed.

17
Q

What is UDP?

A

(User Datagram Protocol)
UDP offers best-effort delivery of data but is much quicker with less overhead.

18
Q

What is HTTP?

A

(Hypertext Transfer Protocol)
HTTP is a protocol used by your computer usually when browsing the internet. The port for HTTP is 80 (TCP).

19
Q

What is HTTPS?

A

(Hypertext Transfer Protocol Secure)
HTTPS is a secure version of HTTP. The port for HTTPS is 443 (TCP).

20
Q

What is DHCP?

A

(Dynamic Host Configuration Protocol)
DHCP is a protocol used to assign an IP address to devices when they are first connected to the network. The ports for DHCP are 67 and 68 (UDP).

21
Q

What is DNS?

A

(Domain Name System)
DNS is a protocol whose primary goal is to convert human readable domain names (such as www.google.com) to IP addresses, which computer can use and understand. The port for DNS is 53 (Both TCP and UDP).

22
Q

What is RDP?

A

(Remote Desktop Protocol)
RDP is used when remotely connecting from one computer to another to gain a remote desktop GUI. The port for RDP is 3389 (TCP).

23
Q

What is SSH?

A

(Secure Shell)
SSH is used when remotely connecting from one computer to another and spawning a command line. The port for SSH is 22 (TCP).

24
Q

What is ICMP?

A

(Internet Control Message Protocol)
ICMP is the protocol that “ping” uses. Ping is a command tool used to check if another computer is reachable on the network line. ICMP does not have a port.

25
Q

What is a MAC address?

A

A MAC (Media Access Control) address is a unique hardware identifier assigned to network interface cards (NICs) in devices like computers, smartphones, and routers, used for communication within a network.

26
Q

How is a MAC address represented?

A

MAC addresses are 48-bit hexadecimal numbers, typically represented in six pairs of characters separated by colons or hyphens (Ex: 01:23:45:67:89:AB).

27
Q

How is a MAC address assigned?

A

The first 24 bits of a MAC address (called the Organizationally Unique Identifier, or OUI) are assigned to specific manufacturers, while the remaining 24 bits are assigned by the manufacturer to each individual NIC they produce.

28
Q

At which layer of the OSI model do MAC addresses operate?

A

MAC addresses operate at Layer 2 (the Data Link Layer) of the OSI model, facilitating communication between devices on the same local network segment.

29
Q

Are MAC addresses static or dynamic?

A

While MAC addresses are typically static and permanently assigned to a NIC, they can be changed manually or programmatically using software (a process known as MAC spoofing) for various reasons, such as increased privacy or bypassing network restrictions.

30
Q

What is the OSI Model?

A

The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a communication system into seven distinct layers. Each layer plays a role in delivering content to your device.

31
Q

What is the first layer in the OSI Model?

A

Physical Layer
It involves physical mediums like fiber and twisted pair.

32
Q

What is the second layer in the OSI Model?

A

Data Link Layer
It handles communication between local devices and involves MAC Addresses.

33
Q

What is the third layer in the OSI Model?

A

Network Layer
It manages communication between separate networks and involves IP Addresses.

34
Q

What is the fourth layer in the OSI Model?

A

Transport Layer
Involves TCP/UDP ports.

35
Q

What is the fifth layer in the OSI Model?

A

Session Layer
It helps manage and maintain individual connections between a web browser’s multiple tabs and their respective web servers.

36
Q

What is the sixth layer in the OSI Model?

A

Presentation Layer
It translates data formats between applications and the network, ensuring compatibility. It handles tasks like data encryption/decryption, compression/decompression, and character encoding.

37
Q

What is the seventh layer in the OSI Model?

A

Application Layer
It facilitates communication between user applications and network services. It uses protocols like HTTP or HTTPS to request and receive data from web servers.