Networking Flashcards

1
Q

What are the two types of Fiber?

A

SMF - Single Mode Fiber; light only enters one angle; used for long distances
MMF - Multi Mode Fiber; Shorter Distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 5 types of 802.11 Wireless Standards?

A

A, B, G, N, AC, (AX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the bandwidth for each 802.11 Wireless Frequency?

A
A: 54mb/s
B: 11mb/s
G: 54mb/s
N: 600mb/s
AC: 6,933mb/s
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What frequencies do each of the 802.11 Wireless Standards operate at?

A
A: 5GHz
B: 2.4GHz
G: 2.4GHz
N: 2.4/5GHz
AC: 5GHz
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When were each of the 802.11 Wireless Standards released?

A
A: 1999
B: 1999
G: 2003
N: 2009
AC: 2014
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does IP stand for?

A

Internet Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the differences between IPv4 and IPv6?

A

IPv4 uses a 32 bit numeric address. Each section is an octet and has a range of 0-255. Current gen

IPv6 uses 128 bit hexadecimal, which uses both numbers and the alphabet. This is a next generation standard with realistically limitless combinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of a Network Bridge?

A

It separates data between groups. Uses MAC Addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a NIC?

A

Network Interface Card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Subnet Mask consist of?

A

Two parts. The network address and host address. (173.16)(.0.0). It also operates on binary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the different classes of Subnet masks and their configuration?

A

A: 255.0.0.0
B: 255.255.0.0
C: 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the general IP Classes and their Ranges?

A

A: 1-126 | Default Subnet: 255.0.0.0
B: 128-191 | Default Subnet: 255.255.0.0
C: 192-223 | Default Subnet: 255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the difference between a public and private IP?

A

Private is not publicly registered. Public is, typically from your ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the details ranges for each IP Class?

A

A: 10.0.0.0 - 10.255.255.255 (Sub - 255.0.0.0)
B: 172.16.0.0 - 172.31.255.255 (Sub - 255.255.0.0)
C: 192.168.0.0 - 192.168.255.255 (Sub - 255.255.255.0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DHCP?

A

Dynamic Host Configuration Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What role does DHCP play?

A

It can automatically assign an IP Address and Subnet Mask based on what’s available in the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is APIPA? In regards to IP

A

Automatic Private IP Address Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is TCP and UDP?

A

TCP - Transmission Control Protocol

UDP - User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does TCP connect from receiver to sender?

A

Used a three-way handshake to initiate transfer of information. Guarantees data is transferred. Can resend.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does UDP connect the receiver and sender?

A

UDP is connectionless and sends without verifying of any arrival. This doesn’t guarantee data is sent, but is faster than TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is DNS?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does DNS operate?

A

DNS converts a URL into numbers to locate the specific connection. Think like an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is NAT?

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does NAT achieve?

A

NAT converts a set of IP to another set. Think public to private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is FTP?

A

File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What protocol does FTP use?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is TFTP?

A

Trivial File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What does TFTP achieve?

A

TFTP achieves an unsecured transfer. Typically is reserved for local networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What protocol does TFTP use?

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is SFTP?

A

Secure File Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How does SFTP differ from FTP?

A

SFTP is encrypted, which means data is not sent as text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is SMTP?

A

Simple Mail Transfer Protocol

33
Q

What protocol does SMTP use?

A

TCP

34
Q

What is POP3?

A

Post Office Protocol v3

35
Q

How does POP3 operate?

A

POP3 receives/downloads emails from a server. This DOES NOT sync folders. Removes from server unless specified

36
Q

What is IMAP4?

A

Internet Message Across Protocol v4

37
Q

How does IMAP4 operate?

A

IMAP4 can access and manage emails from a server on a computer/device. This allows synchronizing with the server directly.

38
Q

What is HTTP?

A

HyperText Transfer Protocol

39
Q

What is HTTPS?

A

HyperText Transfer Protocol Secure. (Encrypts data)

40
Q

What is TelNet?

A

Terminal Emulation Program

41
Q

What does TelNet do?

A

TelNet can send commands remotely in an insecure connection.

42
Q

What is SSH?

A

Secure Shell

43
Q

What benefit does SSH have?

A

SSH can send/receive sensitive data because it uses a secure tunnel to transmit information

44
Q

What is SNMP?

A

Simple Network Management Protocol

45
Q

How does a computer access information across the Web from the router and beyond?

A

Computers accept data through Ports. TCP/UDP

46
Q

What range can TCP and UDP operate between?

A

0-65535

47
Q

What is DSL?

A

Digital Subscriber Line; Carries voice and data

48
Q

What is ADSL?

A

Asymmetric Digital Subscriber Line; Download faster than upload

49
Q

What is SDSL?

A

Symmetric Digital Subscriber Line; Download and Upload is synchronized

50
Q

What is VDSL?

A

Very High Bit Rate Digital Subscriber Line; Uses copper. Meant for short distances. Fiber can achieve long distances

51
Q

What is Cable Broadband?

A

CAble Modem that uses Coax; Much faster than DSL

52
Q

What is POTS?

A

Public Switched Tele Network

53
Q

What is PSTN?

A

Public Switched Tele Network

54
Q

What is ISDN?

A

Integrated Services Digital Network; It’s the International Standard which is set to 128kbps

55
Q

What are the cons of Satellite Internet?

A

Lower speeds, more latency, expensive

56
Q

What are the Four main Network Types?

A

PAN - Personal Area Network (think Bluetooth)
LAN - Local Area Network
MAN - Metropolitan Area Network (think between buildings)
WAN - Wide Area Network (Over a large geographical area, the Internet)

57
Q

What are Wire Crimpers used for?

A

Creating custom length network cables by capping the ends with adapters

58
Q

What is the tool used to connect wires to punch down block?

A

Punch Down Tool

59
Q

What tool do you use to test custom cables?

A

Media Tester

60
Q

What tool is used to test electrical circuits?

A

Multimeter

61
Q

What tool is used to identify and isolate custom cables?

A

Tone Generator

62
Q

What is a SOHO router?

A

Small Office/Home Office Routers

63
Q

What is an SSID?

A

Service Set Identifier?

64
Q

What is WEP?

A

Wired Equivalent Privacy; uses 40 bit encryption. not very secure

65
Q

What is WPA?

A

Wi-Fi Protected Access; more secure than WEP

66
Q

What is the encryption used for WPA?

A

TKIP Encryption - Temporal Key Integrity Protocol

67
Q

What is WPA2?

A

Updated Iteration of WPA using an even stronger encryption

68
Q

What encryption is used for WPA2?

A

CCMP Encryption - Chaining Message Authentication Code Protocol; Counter Cipher Mode with block

69
Q

What is WPS?

A

Wifi Protected Setup

70
Q

What is a MAC Filter?

A

Mac Address Hexadecimal “address”; Can prevent/permit other devices based on their MAC

71
Q

What is DMZ?

A

DeMilitarized Zone; Allows device to be full exposed, outside of the Firewall

72
Q

What is Port Forwarding?

A

A custom port service where you can take port requests and direct it

73
Q

What is the Ping tool?

A

It’s a tool that tests issues and name resolutions based on sending a request for an echo reply

74
Q

What is the Traceroute tool?

A

This tool locates the path data is taking. It will report back on each router hop. Find router issues based on which hop is down.

> tracert IP

75
Q

What is the Nbtstat tool?

A

This tool resolves Netbios names to IP. Least common to come across

76
Q

What is the Netstat tool?

A

This tool allows you to see network connections

> netstat -a (Shows active connections)

77
Q

What is the IPconfig tool?

A

This tool display network configurations.

> ipconfig /all

78
Q

What is the IFconfig tool?

A

Mostly used in Linux/Unix, this tool displays config information.

IP, Subnet, packets received/sent, errors, etc.

79
Q

What is the NSLookup/Dig tool?

A

This is a tool that acts as a Name Server Lookup. Used to lookup DNS info.

> nslookup yahoo.com

Dig is the Unix version