Networking Flashcards

1
Q

What is the most common network layer protocol

A

IP (internet protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer of the TCP / I model deals with cabling and connectors

A

The physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What level of the TCP/IP-5 layer model does a router operate on

A

The network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

Allows connections for many devices and inspects the contents of Ethernet physical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAN

A

Local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Router

A

Connects independent networks by forwarding data between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server

A

Something that provides data to something requesting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client

A

Something receiving data from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nodes

A

Devices connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of wiring is in cables that communicate in voltage changes that are received by the receiving device as ones and zeros

A

Copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What modulation type is used for computer networks

A

Line coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between full duplex and half duplex

A

Full duplex allows communication in two different directions at the same time; half duplex means that only one side can communicate at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer consists of devices and means of transmitting bits across computer networks

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most common type of cabling used for connecting computing devices

A

Twisted pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the category types of twisted pair Ethernet cable

A

1) Unshielded twisted pair
2) Foiled twisted pair
3) Shielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unshielded twisted pair cable

A

The most common and least expensive type of ethernet cable found in business and home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Foiled twisted pair cables

A

An FTP cable uses a thin foil shield that wraps around the bundle of twisted pair wires underneath the outer jacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Shield twisted pair

A

An STP cable uses a braided aluminum and/or copper shielding to encase the four twisted pairs underneath the outer jacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many octets are in a Mac address?

A

Six octets consisting of 48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an ethernet frame

A

A highly structured collection of information presented in a specific order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Preamble

A

The buffer between different frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SFD ( start frame delimiter)

A

A signal to the receiver that the actual frame contents will commence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ether type field

A

Used to describe the protocol of the contents in the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data payload

A

The actual data being transferred in an Ethernet frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

FCS ( frame check sequence)

A

A number that represents the checksum value of the entire frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cycle redundancy check

A

A mathematical calculation used to ensure that all data arrived intact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Unicast

A

When one device turns data to another device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Multicast

A

When multiple devices on a local network received data at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Broadcast transmission

A

When all devices on a LAN receive data being transmitted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Ethernet

A

The protocol most widely used to send data across individual links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Career sends multi access with collision domain (CSMA CD)

A

Used to determine when the communication channels are clear and when a device is free to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Mac address (media access control address)

A

A globally unique identifier attached to an individual network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Octet

A

Any number that can be represented by 8 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Hexadecimal

A

A way to represent numbers using 16 digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Organizationally unique identifier (OUI)

A

The first three octets of a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which protocol provides mechanisms ensuring data is reliably delivered

A

Transmission control protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the first layer of the TCP/IP 5 layer network model

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which layer of the TCP/IP model is responsible for defining a common way to interpret signals so network devices can communicate?

A

Data link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which protocol do routers use to determine the optimal path to forward traffic

A

Border gateway protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Registered Jack 45

A

The most common plug used for twisted pair network cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

In the OSI network model ________ is responsible for facilitating the communication between actual applications and the transport layer

A

The session layer

42
Q

The transport layer us _______ to handle multiplexing and demultiplexing

A

Ports

43
Q

Which field in the transmission control protocol header is chosen from ephemeral ports

A

Source port

44
Q

The sequence of SYN, SYN/ACK, and ACK packets is known as the

A

Three way handshake

45
Q

If a TCP packet is ready and listening for incoming connections, it is in the ________ state

A

LISTEN

46
Q

If the checksum doesn’t compute for packet sent at the internet protocol level, what will happen to the data?

A

It is discarded

47
Q

What port does the file transfer protocol typically listen on?

A

Port 21

48
Q

A 32-bit number that’s used to keep track of where you are in a sequence of TCP segments is known as a ____ number

A

Sequence

49
Q

What transport layer protocol does DNS normally use

A

UDP

50
Q

A DNS TTL determine what?

A

How long a DNS entry is allowed to be cached.

51
Q

How many root servers are there?

A

13

52
Q

The process of using a DNS to turn a domain name into an IP address is known as_______.

A

Name Resolution

53
Q

And A record contains what?

A

An IPv4 address

54
Q

An MX record stands for _____.

A

Mail exchange

55
Q

How many characters can a fully qualified domain name contain

A

255

56
Q

What technique is used to balance traffic across multiple IPs for the same domain?

A

Round robin

57
Q

NS record, SOA, and an A record are all part of a _____.

A

Zone file

58
Q

What is used to determine a computer’s IP address when using fixed allocation DHCP

A

A MAC address

59
Q

The process by which a client, configured to use DHCP, attempts to get network configuration information is known as _______.

A

DHCP Discovery

60
Q

DCP is a protocol of which layer?

A

Application layer

61
Q

What technique allows for specific destination ports to be configured to always deliver to specific nodes

A

Port forwarding
This is a technique that allows for inbound traffic through a router configured to nat

62
Q

What is the approximate number of IPv4 addresses

A

4.2 billion

63
Q

What regional internet registry (RIR) serves the US and Canada

A

ARIN

64
Q

What is the solution to IP exhaustion that will create more public IP addresses as it is implemented

A

IPv6
This uses a 128-bit addresses and can provide a nearly infinite number of addresses

65
Q

What allows a gateway to rewrite the source IP of an outgoing datagram

A

NAT
(Network address translation)

66
Q

A method where users are required to verify their credentials to a combination of hardware and/or software. Usually a username, password, and a short lived token

A

Two-factor authentication

67
Q

VPNs are known as a _____ protocol

A

Tunneling

68
Q

What are some of the first technologies to commonly utilize two-factor authentication?

A

VPNs

69
Q

What does a web proxy do?

A

It inspects the website being requested and allows or denies access to that site

70
Q

One to many NAT

A

Allows hundreds of computers all to have their outbound traffic translated to a single IP

71
Q

NAT it’s typically implemented on what hardware device?

A

Routers

72
Q

A baud rate is a measurement of the number of

A

Bitch that can be sent across the telephone line every second

73
Q

What system did Duke grads build that is still in use today

A

Usenet

74
Q

What device is used to transfer data across a dial-up connection

A

Modem

75
Q

T1 is short for ______.

A

Transmission system 1

76
Q

How fast does a t1 line?

A

1.54 megabits per second

77
Q

What are the subprotocols for PPP (point to point protocol)

A

LCP (link control protocol)
NCP (network control protocol)

78
Q

What do you call a demarcation point for fiber technologies?

A

ONT (optical network Terminator)

79
Q

How many address fields does an 802.11 header have?

A

4

80
Q

What are wireless channels?

A

Individual smaller sections of the overall frequency band used by a wireless network

81
Q

What frequencies do wireless networks typically work on?

A

2.4 GHz
5 GHz

82
Q

What protocol did WPA3 replace?

A

WPA2

83
Q

What field describes what version of 802.11 is being used in an 802.11 frame

A

Frame control

84
Q

The protocol used to communicate network errors is known as _____.

A

ICMP

85
Q

The ping utility sends what message type?

A

Echo request

86
Q

What is one of the tools you can use to verify connectivity to a specific port on Windows OS?

A

Test net connection

87
Q

A piece of software that runs and manages virtual machines is known as a what?

A

Hypervisor

88
Q

What is office 365 Outlook an example of?

A

SAAS software as a service

89
Q

A hybrid cloud is _________________.

A

A combination of a public cloud and a private cloud

90
Q

What cloud service provides access to things like virtual machines, containers, networks, and storage

A

IAAS infrastructure as a service

91
Q

What is the very first field in an IPv6 header?

A

Version field

92
Q

Which IPv6 header field indicates how many routers can forward a packet before it is discarded?

A

Hop limit field

93
Q

The IPv4 mAft address space with an IPv6 always starts with ____ zeros.

A

80

94
Q

For IPv6 traffic to travel on an IPv4 network which two technologies are used?

A

IPv6 tunnels and IPv4 datagrams

95
Q

The ability for a protocol or program to determine that something went wrong is known _______.

A

Error detection

96
Q

The Linux and Mac OS program Trace route is known by slightly different name on Windows. It’s referred to as _______.

A

Tracert

97
Q

While in an interactive NSlookup session you’d use the _______ keyboard to change the DNS server using

A

Server

98
Q

Most public domain name servers are available globally through which technology?

A

Any cast

99
Q

A company runs sensitive technologies locally while interesting less sensitive technologies to a broader user base. Which cloud delivery model is being used?

A

Hybrid

100
Q

What is the IPv6 loopback address?

A

31 zeros with a 1 at the end
0000:0000:0000:0000:0000:0000:0000:0001

101
Q

Which internet protocol V6 header field is used to determine the quality of service level for a diagram

A

Flow label field