Networking Flashcards
is the unique identifier number for transmission control and direction.
A port
is a set of rules that govern communications.
A protocol
is used to manipulate files. can copy files, list and manipulate directories, and view file contents.
File transfer protocol FTP
FTP runs on ports
20
21
FTP Port 21 is mainly used for ______ and port 20 is used for _______
File management
Data transfer
FTP is not secure and transmits in plain text
True
is a connection-oriented protocol used to set up secure Telnet connections for remote logins.
Secure Shell (SSH)
SSH is secure and runs on port
22
is a terminal emulation program that allows for remote access to text on another computer.
Telnet
Telnet is not secure and transmits plaintext. Telnet uses port
23
is used to send email only and is a push protocol.
Simple Mail Transfer Protocol (SMTP)
SMTP uses port
25
is used to resolve hostnames to IP addresses
Domain Name System (DNS)
Domain Name System (DNS) uses port
53
assigns IP addresses dynamically to network clients.
Dynamic Host Configuration Protocol (DHCP)
DHCP uses port ___for the server and port ___for the client.
67
68
manages communications between a web server and a client to view internet content.
Hypertext Transfer Protocol (HTTP)
HTTP is not secure and transmits in plain text. HTTP uses port
80
is used for downloading email.
Post Office Protocol 3 (POP3)
POP3 uses port
110
is an API for communication between computers over a network. _____ works over OSI layer 4 and needs to work with a layer 5 protocol, namely TCP/IP, to function properly.
Network Basic Input/Output System (NetBIOS)
NetBIOS runs on ports
137
139
NetBIOS over TCP/IP is called
NetBT
is currently in its fourth version, or_____ and is used for downloading email.
Internet Message Access Protocol (IMAP) or IMAP4
IMAP4 is secure and runs over port
143
is used for network management.
Simple Network Management Protocol (SNMP)
SNMP uses port ___for sending and receiving requests and port ___ for receiving transmissions from managed devices.
161
162
is used for accessing information stored in an information directory.
Lightweight Directory Access Protocol (LDAP)
LDAP uses port
389
is the secure version of HTTP
Hypertext Transfer Protocol Secure (HTTPS)
HTTPS uses port
443
is primarily a Microsoft protocol used for shared file access. Common Internet File System (CIFS) is an enhanced version of ____
Server Message Block (SMB)/Common Internet File System (CIFS)
SMB/CIFS use port
445
allows for remote connection to computers.
Remote Desktop Protocol (RDP)
RDP uses port
3389
is a connection-oriented protocol used to send and receive data over a network. Before data is sent, a connection is established with the receiving host. It is considered a reliable protocol because the receiving host acknowledges that it received the data. ____is used in cases where receiving the proper data is more important than speed.
Transmission Control Protocol (TCP)
is a connectionless protocol. Data is sent without any assurance that the receiving host is actually receiving the data. For that reason, it is considered an unreliable protocol. The advantage of ___over TCP is that it is faster.
User Datagram Protocol (UDP)
Connectionless protocols allow for data to flow without guaranteeing an established connection. This allows for faster data flow but does not guarantee reliable data flow. UDP is connectionless.
True
Connectionless protocols
DHCP—Dynamic Host Configuration Protocol
TFTP—Trivial File Transfer Protocol
Dynamic Host Configuration Protocol (DHCP) is used to dynamically assign IP configuration information to clients through a lease and uses UDP as its transport protocol. DHCP runs on port 67/68.
True
is a faster version of FTP that uses UDP rather than TCP as its transport protocol.
TFTP—Trivial File Transfer Protocol (TFTP)
TFTP uses port
69
Connection-oriented communication establishes a set connection before data flow begins between two devices. TCP is connection-oriented.
True
Connection-oriented :
HTTPS—Hypertext Transfer Protocol Secure
Secure Shell (SSH)
Hypertext Transfer Protocol Secure (HTTPS) is a connection-oriented protocol that uses TCP as its transport protocol. HTTPS uses port 443.
True
Secure Shell (SSH) is a connection-oriented protocol that uses TCP as its transport protocol. SSH uses port 22.
True
is a device that connects multiple network devices and determines the best path for reaching a specified device using routing tables.
A router
Routers are OSI Layer 3 devices and make decisions based on logical addresses. Key functions of a router include
connecting multiple network devices to one another, breaking up broadcast domains, and connecting one LAN to another LAN on a WAN.
is a device that works at OSI Layer 2, examines the header of incoming packets for the MAC address, and forwards the packet to the correct location. _____can be managed or unmanaged.
A switch
is one that allows for port configuration, traffic management, and traffic monitoring. offer quality of service (QoS), redundancy, port mirroring, and VLANs.
A managed switch
does not allow for configuration and passes on all data for a MAC address to its ports.
An unmanaged switch
is technically any device to which a host can connect in order to access a network. ________ include hubs and switches. However, the term usually refers to a wireless access point (WAP) that allows Wi-Fi devices to connect to a network.
Access point
is a dumb device that is essentially a large rack-mounted HUB whose sole purpose is to connect cables together.
Patch panel
A _______ is a device that broadcasts all data coming in through the input port out over all output ports. A ______ like a patch panel, makes no logical decisions and simply serves as a connection and relay point.
Dumb device
is a security appliance, either hardware or software, that filters network traffic based on a preconfigured set of rules.
Firewall
is a technology that delivers power to devices over data lines, such as an ethernet cable, rather than having a separate power cord.
Power over Ethernet (PoE)
is a midspan device that sits between the switch and the access point and supplies power via an ethernet connection.
Injector
sits in front of the midspan injector device and provides power to the ethernet cable.
Switch
PoE standards are the IEEE 802.3 standards that define PoE specifications.
True
PoE- 802.3af-15.4 W—WAPs, static surveillance cameras, VoIP phones
True
PoE+- 802.3at-30W—alarm systems, PTZ cameras, video IP phones
True
PoE++- 802.3bt (Type 3)-60 W—multi-radio WAPs, video conferencing equipment
True
PoE++- 802.3bt (Type 4)-100 W—laptops, flat-screen monitors
True
PoE-
802.3af-15.4 W—WAPs, static surveillance cameras, VoIP phones
PoE+-
802.3at-30W—alarm systems, PTZ cameras, video IP phones
PoE++-
802.3bt (Type 3)-60 W—multi-radio WAPs, video conferencing equipment
PoE++-
802.3bt (Type 4)-100 W—laptops, flat-screen monitors
is a dumb Layer 1 device that sends all incoming data to all connected devices as a broadcast. are also known as multiport repeaters.
Hub
is a device that connects to a cable line to provide connectivity. A ______is technically no longer a modem, however, since it does not modulate and demodulate analog signals.
Cable modem
provides connectivity via a telephone line.
Digital subscriber line (DSL)
is one that provides connectivity via a fiber-optic line.
Optical Network Terminal (ONT)
also known as a network adapter card, is used to provide the physical interface between a computer and the cabling used for connectivity.
Network interface card (NIC)