Networking Flashcards
What is the most common network layer protocol
IP (internet protocol)
What layer of the TCP / I model deals with cabling and connectors
The physical layer
What level of the TCP/IP-5 layer model does a router operate on
The network layer
Switch
Allows connections for many devices and inspects the contents of Ethernet physical data
LAN
Local area network
Router
Connects independent networks by forwarding data between them
Server
Something that provides data to something requesting the data
Client
Something receiving data from a server
Nodes
Devices connected to the internet
What type of wiring is in cables that communicate in voltage changes that are received by the receiving device as ones and zeros
Copper
What modulation type is used for computer networks
Line coding
What is the difference between full duplex and half duplex
Full duplex allows communication in two different directions at the same time; half duplex means that only one side can communicate at a time
What layer consists of devices and means of transmitting bits across computer networks
Physical layer
What is the most common type of cabling used for connecting computing devices
Twisted pair cable
What are the category types of twisted pair Ethernet cable
1) Unshielded twisted pair
2) Foiled twisted pair
3) Shielded twisted pair
Unshielded twisted pair cable
The most common and least expensive type of ethernet cable found in business and home networks
Foiled twisted pair cables
An FTP cable uses a thin foil shield that wraps around the bundle of twisted pair wires underneath the outer jacket
Shield twisted pair
An STP cable uses a braided aluminum and/or copper shielding to encase the four twisted pairs underneath the outer jacket
How many octets are in a Mac address?
Six octets consisting of 48 bits
What is an ethernet frame
A highly structured collection of information presented in a specific order
Preamble
The buffer between different frames.
SFD ( start frame delimiter)
A signal to the receiver that the actual frame contents will commence
Ether type field
Used to describe the protocol of the contents in the frame
Data payload
The actual data being transferred in an Ethernet frame
FCS ( frame check sequence)
A number that represents the checksum value of the entire frame
Cycle redundancy check
A mathematical calculation used to ensure that all data arrived intact
Unicast
When one device turns data to another device
Multicast
When multiple devices on a local network received data at once
Broadcast transmission
When all devices on a LAN receive data being transmitted
Ethernet
The protocol most widely used to send data across individual links
Career sends multi access with collision domain (CSMA CD)
Used to determine when the communication channels are clear and when a device is free to transmit data
Mac address (media access control address)
A globally unique identifier attached to an individual network interface
Octet
Any number that can be represented by 8 bits
Hexadecimal
A way to represent numbers using 16 digits
Organizationally unique identifier (OUI)
The first three octets of a MAC address
Which protocol provides mechanisms ensuring data is reliably delivered
Transmission control protocol (TCP)
What is the first layer of the TCP/IP 5 layer network model
Physical layer
Which layer of the TCP/IP model is responsible for defining a common way to interpret signals so network devices can communicate?
Data link layer
Which protocol do routers use to determine the optimal path to forward traffic
Border gateway protocol (BGP)
Registered Jack 45
The most common plug used for twisted pair network cables
In the OSI network model ________ is responsible for facilitating the communication between actual applications and the transport layer
The session layer
The transport layer us _______ to handle multiplexing and demultiplexing
Ports
Which field in the transmission control protocol header is chosen from ephemeral ports
Source port
The sequence of SYN, SYN/ACK, and ACK packets is known as the
Three way handshake
If a TCP packet is ready and listening for incoming connections, it is in the ________ state
LISTEN
If the checksum doesn’t compute for packet sent at the internet protocol level, what will happen to the data?
It is discarded
What port does the file transfer protocol typically listen on?
Port 21
A 32-bit number that’s used to keep track of where you are in a sequence of TCP segments is known as a ____ number
Sequence
What transport layer protocol does DNS normally use
UDP
A DNS TTL determine what?
How long a DNS entry is allowed to be cached.
How many root servers are there?
13
The process of using a DNS to turn a domain name into an IP address is known as_______.
Name Resolution
And A record contains what?
An IPv4 address
An MX record stands for _____.
Mail exchange
How many characters can a fully qualified domain name contain
255
What technique is used to balance traffic across multiple IPs for the same domain?
Round robin
NS record, SOA, and an A record are all part of a _____.
Zone file
What is used to determine a computer’s IP address when using fixed allocation DHCP
A MAC address
The process by which a client, configured to use DHCP, attempts to get network configuration information is known as _______.
DHCP Discovery
DCP is a protocol of which layer?
Application layer
What technique allows for specific destination ports to be configured to always deliver to specific nodes
Port forwarding
This is a technique that allows for inbound traffic through a router configured to nat
What is the approximate number of IPv4 addresses
4.2 billion
What regional internet registry (RIR) serves the US and Canada
ARIN
What is the solution to IP exhaustion that will create more public IP addresses as it is implemented
IPv6
This uses a 128-bit addresses and can provide a nearly infinite number of addresses
What allows a gateway to rewrite the source IP of an outgoing datagram
NAT
(Network address translation)
A method where users are required to verify their credentials to a combination of hardware and/or software. Usually a username, password, and a short lived token
Two-factor authentication
VPNs are known as a _____ protocol
Tunneling
What are some of the first technologies to commonly utilize two-factor authentication?
VPNs
What does a web proxy do?
It inspects the website being requested and allows or denies access to that site
One to many NAT
Allows hundreds of computers all to have their outbound traffic translated to a single IP
NAT it’s typically implemented on what hardware device?
Routers
A baud rate is a measurement of the number of
Bitch that can be sent across the telephone line every second
What system did Duke grads build that is still in use today
Usenet
What device is used to transfer data across a dial-up connection
Modem
T1 is short for ______.
Transmission system 1
How fast does a t1 line?
1.54 megabits per second
What are the subprotocols for PPP (point to point protocol)
LCP (link control protocol)
NCP (network control protocol)
What do you call a demarcation point for fiber technologies?
ONT (optical network Terminator)
How many address fields does an 802.11 header have?
4
What are wireless channels?
Individual smaller sections of the overall frequency band used by a wireless network
What frequencies do wireless networks typically work on?
2.4 GHz
5 GHz
What protocol did WPA3 replace?
WPA2
What field describes what version of 802.11 is being used in an 802.11 frame
Frame control
The protocol used to communicate network errors is known as _____.
ICMP
The ping utility sends what message type?
Echo request
What is one of the tools you can use to verify connectivity to a specific port on Windows OS?
Test net connection
A piece of software that runs and manages virtual machines is known as a what?
Hypervisor
What is office 365 Outlook an example of?
SAAS software as a service
A hybrid cloud is _________________.
A combination of a public cloud and a private cloud
What cloud service provides access to things like virtual machines, containers, networks, and storage
IAAS infrastructure as a service
What is the very first field in an IPv6 header?
Version field
Which IPv6 header field indicates how many routers can forward a packet before it is discarded?
Hop limit field
The IPv4 mAft address space with an IPv6 always starts with ____ zeros.
80
For IPv6 traffic to travel on an IPv4 network which two technologies are used?
IPv6 tunnels and IPv4 datagrams
The ability for a protocol or program to determine that something went wrong is known _______.
Error detection
The Linux and Mac OS program Trace route is known by slightly different name on Windows. It’s referred to as _______.
Tracert
While in an interactive NSlookup session you’d use the _______ keyboard to change the DNS server using
Server
Most public domain name servers are available globally through which technology?
Any cast
A company runs sensitive technologies locally while interesting less sensitive technologies to a broader user base. Which cloud delivery model is being used?
Hybrid
What is the IPv6 loopback address?
31 zeros with a 1 at the end
0000:0000:0000:0000:0000:0000:0000:0001
Which internet protocol V6 header field is used to determine the quality of service level for a diagram
Flow label field