Network+ Flashcards
OSI model layers
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
which OSI layer handles IP addresses?
Layer 3 - Network
Which OSI layer deals with MAC addresses?
Layer 2 - Data Link
Which OSI layer assembles and disassembles packets?
Layer 4 - Transport
Which OSI layer uses port numbers?
Layer 5 - Session
length of a frame
up to 1500 bytes
where is a game generated and eaten up?
NIC
device that connects host to a central location where they share bandwidth
hub
command to display MAC addresses
ipconfig /a
length of a MAC address
48 bits
device that connects multiple LANs
router
device that connects multiple hosts within the same network
switch
what is the current standard for coaxial cabling?
RG-6
what is the resistance of RG-6?
75 Ohms
most common RG-6 connector
F-type
type of cable where two inner conductors share an outer conductor
twinaxial/twinax cable
advantages of coaxial cable
resistant to EMI
resistant to physical damage
disadvantages of coaxial cable
inflexible
expensive
max distance of UTP
100 meters
difference between multimode and single mode fiber optic cabling
multimode uses LED signals, single mode uses lasers
standard that defines ethernet
IEEE 802.3
components of an ethernet frame
preamble, destination MAC, source MAC, data type, data, pad, FSC (frame check sequence)
ITA/EIA-568A wire order
Brown, Brown/White, Orange, Blue/White, Blue, Orange/White, Green, Green/white
TIA/EIA-568B color order
Brown, Brown/White, Green, Blue/White, Blue/Green/White. Orange, Orange/White
type of port on a switch that allows you to use a straight through cable instead of a crossover cable
uplink port
protocol that delegates one switch to be in charge and prevent switching loops
spanning tree protocol (STP)
netstat -n
presents results numerically
netstat -b
shows executable for every connection
netstat -o
shows executable and process ID for every connection
netstat -a
shows all active ports
netstat -r
shows the local routing table (identical to route print)
tool that lists all open ports and network connections on your computer
netstat
what are the two most popular web server softwares?
Microsoft IIS and Apache (open source)
protocol analyzer that’s integrated with a frame capture tool
wireshark
a command that’s a variant of ping and quicker than tracert
pathping
tool that verifies the upload and download speeds to an individual computer
bandwidth speedtester
protocol analyzer integrated with a frame capture tool
wireshark
netstat -n
presents results numerically
netstat -b
shows executable for every connection; needs admin
netstat -o
shows executable and process ID for every connection
netstat -a
shows all active ports
netstat -r
shows the local routing table
IP version that uses A Record
IPv4
IP version that uses AAAA Record
IPv6
an algorithm that does not encrypt but verifies data, creates a fixed size hash value
cryptographic hash
what are two common hashes?
MD5 and SHA-1
an access control that uses labels
Mandatory Access Control (MAC)
access control that gives creators control over permissions and provides more flexibility
Discretionary Access Control (DAC)
access control that assigns rights and permissions to a group
Role-based Access Control (RBAC)
client that handles authentication requests from supplicants and provides AAA
RADIUS client
a bridging device that connects into an ethernet network and communicates via radio waves to wireless clients
WAP
the method used to prevent wireless collisions
CSMA/CA (carrier sense multiple access with collision avoidance)
what are the current fastest 802.11 standards?
802.11n and 802.11ac
type of antenna used on exterior walls
patch antenna
encryption protocol used with WPA
Temporal Key Integrity Protocol (TKIP)
type of encryption protocol used with WPA2
CCMP-AES
What are three ways to implement wireless security?
- disable SSID broadcast
- use MAC filtering
- limit the number of DHCP-issued addresses
difference between rogue access points and evil twins
evil twins are intentional, rogue access points can be accidental
monitors traffic, sets up various zones or access areas, and define services’ access to specific WAP destination
wireless controller
environmental issues that can affect the wireless signal
interference, reflections, and absorption
what are some sources of interference?
other WAPs, wireless mice and keyboards, and microwaves
enablles virtualization to occur and emulates the physical hardware
hypervisor
disk storage delivered as a service over TCP/IP (file level)
Network Attached Storage (NAS)
specialized LAN that transfers data at block-level with a special protocol
Storage Area Network (SAN)
what two types of connections do SANs use?
Fibre Channel (FC) or iSCSI
lowers cost and relies on configuration that allows jumbo frames over the network
IP Small Computer System Interface (iSCSI)
virtualized storage technology that uses a switched fabric topology and features very high throughput and very low latency
InfiniBand
provides an easy-to-use front end to configure physical and virtual devices throughout the network
software-defined networking (SDN)