Networking Flashcards

1
Q

What is the port number for FTP?

A

tcp/20 for data, tcp/21 for control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the port number for SSH?

A

tcp/22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the port number for Telnet?

A

tcp/23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the port number for SMTP?

A

tcp/25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the port number for DNS?

A

udp/53 for queries, tcp/53 for zone transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the port number for DHCP?

A

udp/67 for servers, udp/68 for clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the port number for HTTP?

A

tcp/80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the port number for POP3?

A

tcp/110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the port number for NetBIOS/NetBT?

A

udp/137 for Name Service, udp/138 for Datagram Service, tcp/139 for Session Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the port number for IMAP?

A

tcp/143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the port number for SNMP?

A

udp/161 for general messages, udp/162 for traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the port number for LDAP?

A

tcp/389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the port number for HTTPS?

A

tcp/443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the port number for SMB/CIFS?

A

tcp/445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the port number for RDP?

A

tcp/3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of FTP?

A

Used for transferring files between a client and a server on a network. Supports authentication and directory operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of SSH?

A

Provides secure remote login and other network services through the command line using encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of Telnet?

A

Allows remote login to network devices using the command line in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the purpose of SMTP?

A

Sends emails between mail servers, and from clients to servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of DNS?

A

Translates FQDNs to IP addresses and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of DHCP?

A

Automatically assigns IP address and other network configs to network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of HTTP?

A

Used for transmitting hypermedia documents such as HTML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the purpose of POP3?

A

Enables email clients to retrieve messages from a mail server and store them on the local device, deleting them from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the purpose of NetBIOS/NetBT?

A

Once used to connect separate computers and devices to communicate over LAN for file and printer sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the purpose of IMAP?

A

Allows email clients to access messages stored on a mail server, allowing management of emails from multiple devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the purpose of SNMP?

A

Used for collecting and organizing information about managed devices on IP networks, and modifying that information to change device behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the purpose of LDAP?

A

Accesses and maintains distributed directory information services over an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the purpose of HTTPS?

A

Used for transmitting encrypted hypermedia documents such as HTML.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the purpose of SMB/CIFS?

A

Allows applications to read and write to files and request services from server programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of RDP?

A

Enables remote access and control of a computer over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How is TCP different from UDP?

A

TCP established a connection before data transfer (connection oriented), ensures all data reaches the destination (reliable delivery), performs error detection and correction (error checking), manages data transmission between sender and receiver (flow control).

UDP sends data without establishing a connection, makes no guarantee that data reach the destination in order or at all, lacks mechanisms for acknowledgement or retransmission, but transmits faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is meant by connectionless?

A

Does not establish a dedicated connection before sending data and each packet independently travels to the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is meant by connection-oriented?

A

Established a session before data transfers, guarantees the delivery and order of the packets, manages flow, and corrects errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the purpose of a router?

A

Forwards packets between different IP subnets. Directs traffic across interconnected networks. Layer 3 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the purpose of a switch?

A

Connects devices withing the same network and forwards data based on the MAC address. Uses Application-Specific Integrated Circuits to perform high-speed forward between ports. Layer 2 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How is a managed switch different from an unmanaged one?

A

Managed switches provide configuration and advanced features such as VLAN, traffic prioritization, redundancy protocols, port mirroring for monitoring, and integration with SNMP.

Unmanaged switches provide basic connectivity without config options. Suitable for simple networking needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is the purpose of a access point?

A

Extends a wired network into a wireless one, making forward decisions based on MAC addressess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the purpose of a patch panel?

A

Serves as a centralized point for cable management. Connects to a punch-down block. Allows permanent cable infrastructure to kept in place while still be able to easily configue and manage network conenctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the purpose of a firewall?

A

Monitors and filters network traffic based on rules. They can filter by port number and application, encrypt traffic between networks, proxy traffic as an intermediary for requests, and act as routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the purpose of a PoE?

A

Allows electrical power to be transmitted over Ethernet cables, so you don’t need additional power connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How is an injector different from a powered switch?

A

An injector is an intermediary device that injects power into a network cable.

A powered switch supplies power to PoE devices without any additional equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What are the PoE standards?

A

802.3af-2003 (PoE) provides up to 15.4 watts of DC power with 350 mA.

802.3at-2009 (PoE+) provides up to 25.5W at 600mA.

802.3bt-2018 (PoE++) Type 3 provides 51W at 600mA. Type 4 provides 71.3W at 960mA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the purpose of a Hub?

A

Connects multiple ethernet devices together, making a network. It repeats all incoming signals to all other ports, leading to collisions and network conjestion. A dumb-switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the purpose of a Cable Modem?

A

Provides internet connectivity over a cable television network using DOCSIS (Data Over Cable Service Interface Specification).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the purpose of a DSL?

A

Provides internet connectivity over phone lines. Offers asymmetric high download, low upload times. Allows for using the phone and internet simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the purpose of a ONT?

A

Terminates the fiber connection and converts to electrical signals for the copper network. The boundary between the ISP and customer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the purpose of a NIC?

A

Enables a device to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the purpose of a SDN?

A

Uses software based controllers or APIs to manage and automate networking. The Data Plane handles the forwarding of data. The Control Plane manages routing decisions. The Management Plane provides interfaces for configuring and managing the network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

How is a 2.4GHz frequency different from a 5GHz frequency?

A

2.4GHz offers a longer range and better penetration, but is in a more crowded frequency, and supports lower data rates and narrower channel bandwidths.

5GHz has lower range and penetration, a less crowded frequency, and higher data rates with wider channel bandwidths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How is a 2.4GHz channel different from a 5GHz channel?

A

2.4GHz normally has three channels (1,6, and 11) that are narrower and more prone to interference.

5GHz can have more, with less chance for interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are the regulations for the channels?

A

Frequency use, power output, and interference requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How does Bluetooth compare to 802.11 connections?

A

Both operate in the 2.4GHz band, but Bluetooth is meant for short-range communication (<10m) that take up less bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How does 802.11a compare to b?

A

A is 5GHz, 54mbps, shorter range, more affected by obstacles, less affected by other devices.

B is 2.4GHz, 11mbps, longer range, less affected by obstacles, more affected by other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

How does 802.11a compare to g?

A

A is 5GHz, shorter range, more affected by obstacles, less prone to interference and incompatible with B.

G is 2.4GHz, longer range, less affected by obstacles, more prone to interference, and compatible with B.

Both are 54mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How does 802.11a compare to n?

A

A has 5GHz only, 54mpbs, doesn’t support MIMO, narrower channel widths.

N can be 5GHz or 2.4GHz, 600mbps, supports MIMO, and has wider channel widths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How does 802.11a compare to ac?

A

A has 54Mbps speeds, narrow channel widths, no MU-MIMO.

AC has 6.9Gbps speeds, wider channel widths, and MIMO.

Both are 5GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How does 802.11a compare to ax?

A

A has 5GHz only, 54mbps, no OFDMA, no MU-MIMO.

AX has 5GHz or 2.4GHz, 9.6Gbps, OFDMA, and MU-MIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

How does 802.11b compare to g?

A

B has 11Mbps speeds.

G has 54Mbps speeds, and is backwards compatible with B.

Both are on the 2.4HZ band, and are susceptible to interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How does 802.11b compare to n?

A

B is on 2.4GHz. 11Mbps. No MIMO. Narrower channel widths.

N can be on 2.4GHz or 5GHz. 600Mbps. MIMO. Wider channel widths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

How does 802.11b compare to ac?

A

B is on 2.4GHz. 11Mbps. NO MU-MIMO.

AC is on 5GHz. 6.9Gbps. MU-MIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How does 802.11b compare to ax?

A

B is on 2.4GHz. 11Mbps. No MU-MIMO. No OFDMA.

AX can be on 2.4GHz or 5GHz. 9.6Gbps. MU-MIMO. OFDMA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How does 802.11g compare to n?

A

G is on 2.4GHz. 54Mbps. No MIMO.

N is on 2.4GHz or 5GHz. 600Mbps. MIMO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How does 802.11g compare to ac?

A

G is on 2.4GHz. 54Mbps. No MU-MIMO.

AC is on 5GHz. 6.9Gbps. MU-MIMO.

64
Q

How does 802.11g compare to ax?

A

G is on 2.4GHz. 54Mbps. No MU-MIMO. No OFDMA.

AX is on 2.4GHz or 5GHz. 9.6Gbps. MU-MIMO. OFDMA.

65
Q

How does 802.11n compare to ac?

A

N is 2.4GHz or 5GHz. 600Mbps. No MU-MIMO.

AC is 5GHz. 6.9Gbps. MU-MIMO.

66
Q

How does 802.11n compare to ax?

A

N is 600Mbps. No MU-MIMO. No OFDMA.

AX is 9.6Gbps. MU-MIMO. OFDMA.

Both can operate at 5GHz or 2.4GHz.

67
Q

How does 802.11ac compare to ax?

A

AC is on 5GHz. 6.9Gbps. No OFDMA.

AX is on 5GHz or 2.4GHz. 9.6Gbps. OFDMA.

68
Q

How does long-ranged fixed wireless compare to Bluetooth?

A

Long range can communicate over miles, requires high power transmitters, and is used for point-to-point network connections.

Bluetooth can communicate less than 10m, requires lower power transmitters, and is used for PANs.

69
Q

How does long-ranged fixed wireless compare to 802.11?

A

Long range can communicate over miles, uses directional antennas, amd require outdoor installation and adherence to regulations.

802.11 can communicate ~40-50ft, used omnidirectional antennas, are plug and play, and used indoors.

70
Q

How does long-ranged fixed wireless compare to NFC?

A

Long range can communicate over miles, and is used to connect networks.

NFC is used to communicate over a few centimeters, and is used for payments and access control.

71
Q

How does long-ranged fixed wireless compare to RFID?

A

Long range can communicate over miles, and is used to connect networks.

RFID can communicate over a few meters, is used for inventory tracking, access control, and ID, and transmits very small amounts of data.

72
Q

How does NFC compare to RFID?

A

RFID is one way, with a tag responding to a reader, is used for identification and tracking, and has a longer range.

NFC is two-way communication between devices, is used for contactless payments, access control, and device pairing, and has a shorter range.

73
Q

How does Bluetooth compare to NFC?

A

Bluetooth communicates around 10 meters, and is used for communication between peripherals.

NFC communicates around 4 centimeters, and is used for payments and device pairing.

74
Q

How does Bluetooth compare to RFID?

A

Bluetooth communicates around 10 meters, is used for active communication, and is used for communication between peripherals.

RFID has less range, communicates passively, and is used to track inventories.

75
Q

How does 802.11 compare to RFID?

A

802.11 is used for networking with high data-throughput, has a range of 40-50ft, and can communicate complex data two ways.

RFID is used for identification and tracking with minimal data transfer, has a shorter range, and communicates simple data one-way.

76
Q

How does 802.11 compare to NFC?

A

801.11 is used for networking, and operates over a few tens of meters.

NFC is used for payments, and operates over a few centimeters.

77
Q

How does licensed long-range fixed wireless compare to unlicensed?

A

Licensed requires regulatory approval, offer less interference and higher reliability, and is costlier.

78
Q

What are the power requirements for long-range fixed wireless?

A

High power that may be subject to regulation.

79
Q

What are the regulatory requirements for long-range fixed wireless?

A

License for your frequency, compliance with spectrum use, power out, and interference mitigation, and meeting installation standards.

80
Q

Summarize the services provided by a DNS server.

A

Translates the human-readable domain names into IP addresses and vice versa. Essential for network communication, allowing users to not have to memorize numerical IP addresses. They form a distributed system with multiple servers to balance the load and improve reliability. Typically managed by ISPs, or enterprise IT departments.

81
Q

Summarize the services provided by a DHCP server.

A

Automatically assigns IP addresses and network config settings to devices on the network. Allows devices to join without manual setup. Common in home routers and enterprise networks, in which multiple servers are deployed for redundancy.

82
Q

Summarize the services provided by a fileshare server.

A

Provides centralized storage for files, allowing users to store and access files from any authorized device on the network. Uses SMB for Windows or AFP for macOS. Users manage files like they are used to.

83
Q

Summarize the services provided by a print server.

A

Connects printers to a network, enabling multiple users to access and use the devices. Can be a dedicated device, a computer running software connected to the printer, or part of the printer’s hardware. Utilize protocols like SMB, Internet Printing Protocol, or Line Printer Daemon to manage print jobs.

84
Q

Summarize the services provided by a mail server.

A

Manages the sending and receiving of emails within an org. It stores incoming mail and sends outgoing mail. Often managed by an ISP, or enterprise IT dept. Requires constant uptime and much support.

85
Q

Summarize the services provided by a syslog server.

A

Collects, stores, and consolidates log messages from various network devices. More efficient to manage from a single location. Often integrated with Security Information and Event Management systems. Require a lot of storage.

86
Q

Summarize the services provided by a web server.

A

Hosts websites and serves web pages to users upon request. It responds to user requests using HTTP or HTTPS. The server delivers HTML or HTML5 content.

87
Q

Summarize the services provided by an AAA server.

A

Authenticates, authorizes, and accounts for users and devices on the network. Manages user credentials and permissions. Critical for network security, and often deployed redundantly.

88
Q

Summarize the services provided by a spam gateway.

A

Filters unsolicited and unwanted email messages. Analyzes incoming email for signs of spam, phishing, and malware. Can be standalone hardware, part of a cloud service, or part of UTM.

89
Q

Summarize the services provided by a UTM.

A

Integreates multiple secuirty features into a single device. Provides firewall capabilities, IDS, IPS, URL filtering, content inspection, malware detection, spam filtering, and even routing or bandwidth management. Simplify security management.

90
Q

Summarize the services provided by a load balancer.

A

Distributes network or application traffic accross multiple servers to improve reliability and performance. Ensures no server becomes a bottleneck. Advanced models can perform SSL offloading, caching content, and traffic prioritization.

91
Q

Summarize the services provided by a proxy server.

A

Acts as an intermediary between clients and external servers. It receives client requests, forwards them to the appropriate server, checks for anything suspicious, and then returns a response to the client. Provides access control, content caching, URL filtering, and content scanning.

92
Q

Summarize the services provided by SCADA.

A

Used for centralized monitoring and control of industrial processes and equipment across multiple locations. Collects data in real time and allows remote equipment management. Secured with extensive network segmentation and strict access controls.

93
Q

Summarize the services provided by IoT devices.

A

Perform various functions, like thermostat, refrigerator, home assistants, etc. Enhance automation and remote control by connecting devices to the network. Due to security risks, they should be isolated from sensitive systems .

94
Q

How do you configure IPv4 private addresses?

A
  1. Disable DHCP.
  2. Manually enter IP address from the private IP address ranges (such as 192.168.x.x, 10.x.x.x, 172.16-31.x.x).
  3. Assign subnet mask, default gateway, and DNS server information.
  4. Ensure that the IP address is unique within the local network.
95
Q

How do you configure IPv4 public addresses?

A
  1. Receive an IP address assignment from your ISP.
  2. Manually enter the IP address, default gateway, and DNS server information.
96
Q

How do you configure IPv6 addresses?

A
  1. Assign IPv6 address to the device. 8 groups of hexadecimal numbers separated by colons.
  2. Use a 64-bit prefix subnet. First 64 bits are network portion, and the last 64 bits are host portion.
  3. Enter the default gateway and DNS server information.
97
Q

How do you configure APIPA addresses?

A
  1. Set device to obtain an IP address via DHCP.
  2. If no DHCP server responds, the device with assign itself an APIPA address from 169.254.1.0 to 169.254.254.255.
98
Q

How do you configure static IP addresses?

A
  1. Disable DHCP.
  2. Manually enter the IP address, subnet mask, default gateway, and DNS server.
99
Q

How do you configure dynamic IP addresses?

A
  1. Enable DHCP with a DHCP server present on the network.
100
Q

How do you configure gateway addresses?

A
  1. Identify the IP address of the default gatway, typically the IP address of the router.
  2. Enter the IP address into the network settings.
101
Q

Describe the DORA process.

A
  1. Discover: The client broadcasts a message on udp/67 to locate any available DHCP servers on the network.
  2. Offer: DHCP servers respond with a DHCP Offer message on udp/68 proposing an IP address lease to the client.
  3. Request: The client selects one offers and sends a DHCP Request message back to the server, indicating its intention to use the offered IP address.
  4. Acknowledge: The server sends a DHCP Acknowledgement message, confirming the IP address lease and providing network config details.
102
Q

How do A DNS addresses compare to AAAA?

A

Both map IP addresses to domain names, but A does it with IPv4, and AAAA does it with IPv6.

103
Q

How does the address of a DNS service compare to the MX?

A

The address points domain requests to IP addresses or vice versa.

An MX specifies the hostname of the mail server responsible for handling email. The hostname is then resolved to an IP address using the A or AAAA record.

104
Q

How does the address of a DNS service compare to the TXT?

A

The address points domain requests to IP addresses or vice versa.

A TXT record contains human-readable text information associated with the domain. Often used for verification and to hold configs for SPF, TKIM, and DMARC.

105
Q

How does the address of a MX service compare to the TXT?

A

An MX specifies the hostname of the mail server responsible for handling email. The hostname is then resolved to an IP address using the A or AAAA record.

A TXT record contains human-readable text information associated with the domain. Often used for verification and to hold configs for SPF, TKIM, and DMARC.

106
Q

How is DKIM different from SPF?

A

SPF allows domain owners to specify which IP addresses are authorized to send email on behalf of their domain. It helps prevent email spoofing by listing authorized sending servers in a DNS TXT record.

DKIM uses cryptographic signatures to verify that an email was sent by an authorized server and has not been altered in transit. The sender’s server attaches a digital signature to the message and the receiver verifies into using the public key in sender’s TXT record.

107
Q

How is DKIM different from DMARC?

A

DKIM uses cryptographic signatures to verify that an email was sent by an authorized server and has not been altered in transit. The sender’s server attaches a digital signature to the message and the receiver verifies into using the public key in sender’s TXT record.

DMARC builds on both SPF and TKIM, and allows domain owners to set policies on how receiving email servers should handle messages that fail SPF or DKIM checks. Published in the TXT records.

108
Q

How is SPF different DMARC?

A

SPF allows domain owners to specify which IP addresses are authorized to send email on behalf of their domain. It helps prevent email spoofing by listing authorized sending servers in a DNS TXT record.

DMARC builds on both SPF and TKIM, and allows domain owners to set policies on how receiving email servers should handle messages that fail SPF or DKIM checks. Published in the TXT records.

109
Q

How is DNS different from DHCP?

A

DNS translates human-readable domains into IP addresses.

DHCP assigns IP addresses, subnet masks, default gateways, and DNS servers to devices on a network.

110
Q

How is a DHCP lease different from a reservation?

A

A lease is a temporary assignment of an IP address from the DHCP server’s pool to a client for a specified duration. The IP address changes as new ones are assigned.

A reservation is a permanent mapping of a specific IP address to a specific device’s MAC address withing the DHCP server. The device always receives the same IP address.

111
Q

How is a DHCP lease different from its scope?

A

A lease is a temporary assignment of an IP address from the DHCP server’s pool to a client for a specified duration. The IP address changes as new ones are assigned.

The scope is the range of IP addresses that the DHCP server is configured to assign to clients.

112
Q

How is a DHCP reservation different from its scope?

A

A reservation is a permanent mapping of a specific IP address to a specific device’s MAC address withing the DHCP server. The device always receives the same IP address.

The scope is the range of IP addresses that the DHCP server is configured to assign to clients.

113
Q

How is a VLAN different from a VPN?

A

VLAN is a method of creating separate isolated networks within the same physical network infrastructure by segmenting devices at OSI Layer 2.

VPNs provide secure, encrypted connection over a public network, allow remote users to access a private network securely.

114
Q

How is DNS different from a VLAN?

A

DNS translates human-readable domains into IP addresses.

VLAN is a method of creating separate isolated networks within the same physical network infrastructure by segmenting devices at OSI Layer 2.

115
Q

How is DNS different from a VPN?

A

DNS translates human-readable domains into IP addresses.

VPNs provide secure, encrypted connection over a public network, allow remote users to access a private network securely.

116
Q

How is DHCP different from a VLAN?

A

DHCP assigns IP addresses and network configs automatically to devices on the network.

VLAN is a method of creating separate isolated networks within the same physical network infrastructure by segmenting devices at OSI Layer 2.

117
Q

How is DHCP different from VPN?

A

DHCP assigns IP addresses and network configs automatically to devices on the network.

VPNs provide secure, encrypted connection over a public network, allow remote users to access a private network securely.

118
Q

How is a satellite internet connection different from fiber?

A

Satellite is non-terrestrial, experiences high latency, is around 50Mbps down/3Mbps up, can be affected by weather, and is costly, but may be the only choice in remote areas.

Fiber uses fiber optic cables, has low latency, is around 1Gbps down and up, is unaffected by weather, and is expensive to install.

119
Q

How is a satellite internet connection different from cable?

A

Satellite is non-terrestial, has higher latency, is around 50Mbps down, can be affected by the weather, and is available in rural/remote areas.

Cable uses coaxial cables, has lower latency, ranges from 50-1000Mbps up, is unaffected by weather, and is typically found in urban and suburban areas.

120
Q

How is a satellite internet connection different from DSL?

A

Satellite is non-terrestrial, has higher latency, is 50Mbps up/3Mbps down, is not limited by distance to the provider, and requires additional equipment to install.

DSL uses existing copper phone lines, has lower latency, is around 200Mbps down/20Mbps up, and has degraded performance the further you are from the Central Office (up to 10,000ft).

121
Q

How is a satellite internet connection different from cellular?

A

Satellite is non-terrestrial, has higher latency, is stationary, is available in remote areas, and has consistent speeds.

Cellular utilizes cell phone towers, has lower latency, is mobile, and has variable speeds depending on the generation.

122
Q

How is a satellite internet connection different from a WISP?

A

Satellite is non-terrestrial, has higher latency, requires a satellite with a clear view of the sky, and is around 50Mbps down.

WISPs use terrestrial antennas, has lower latency, requires an outdoor antenna, and ranges from 10 to 1000Mbps.

Both are affected by the weather.

123
Q

How is a fiber internet connection different from cable?

A

Fiber uses light, has higher data rates, has lower latency, has little signal degradation, and high installation costs.

Cable uses electricity, has lower data rates, higher latency, more signal degradation, but lower installation costs.

124
Q

How is a fiber internet connection different from DSL?

A

Fiber uses light, has higher speeds, is less sensitive to distance, has lower latency, and requires specialized equipment.

DSL uses electricity, has lower speeds, higher latency, is sensitive to distance, and uses exisiting phone lines.

125
Q

How is a fiber internet connection different from cellular?

A

Fiber uses light, has higher, more consistent speeds, is stationary, doesn’t usually have data caps, and requires installation of fiber cables.

Cellular uses radio waves, has slower, less constitent speeds, is mobile, might have data caps and higher data costs, but requires no installation for the user.

126
Q

How is a fiber internet connection different from WISP?

A

Fiber uses light, has higher speeds with lower latency, costlier and more time consuming to install, is unaffected by the weather, and is less available in rural areas.

WISPs use radio waves, have slower speeds with higher latencies, are cheaper and quicker to install, is affected by the weather, and is used to provide internet in rural areas.

127
Q

How is a cable internet connection different from DSL?

A

Cable uses coaxial cables, has higher speeds, shares bandwidth with others, and is less affected by distance.

DSL uses phone lines, has lower speeds, have dedicated lines, and is affected by distance.

Both utilize existing infrastructure.

128
Q

How is a cable internet connection different from cellular?

A

Cable uses electricity, is faster and more stable, is stationary, has higher data allowances, and requires a modem.

Cellular uses radio waves, is slower and affected by signal stength and congestion, is mobile, can have lower data allowances, and requires a device with service plan.

129
Q

How is a cable internet connection different from WISP?

A

Cable uses electricity, uses existing infrastructure, typically has higher speeds, involves indoor installation of equipment, and is used in urban/suburban environments.

WISPs use outdoor radio waves, uses antennas, has varying speeds, and is used in rural/remote areas.

130
Q

How is a DSL internet connection different from cellular?

A

DSL uses electricity, is stationary, offers consistent speeds, requires a modem, and has lower latency.

Cellular uses radio waves, is mobile, has varying speeds, requires a device with cellular capabilities, and has higher latency.

131
Q

How is a DSL internet connection different from a WISP?

A

DSL uses electricity, requires proximity to the central office of the ISP, uses existing phone lines, offers 200Mbps down, and has degraded peformance over distance.

WISPs use radio waves, are used in remote areas, uses specially installed antenna, rangers from 10Mbps to 1000Mbps, and is affected by the weather.

132
Q

How is a cellular internet connection different from a WISP?

A

Cellular uses cell towers, is mobile, has varying speeds with lower latencies, and requires a compatible device.

WISPs use antennas, are stationary, can have higher speeds with higher latencies, and requires the installation of the antenna.

133
Q

How is LAN different from a WAN?

A

LANs cover a small area, are owned by one organization, are higher speed, and use Ethernet and 802.11.

WANs cover massive areas, involve multiple orgs and ISPs, offer lower speeds, and use a variety of technologies.

134
Q

How is LAN different from a PAN?

A

LANs cover a building or campus, connects computers to printers and servers, use Ethernet and WiFi, and facilitate sharing between users.

PANs cover a workspace, connect computers to peripherals, use Bluetooth, NFC, or IrDA, and is used for personal device connectivity.

135
Q

How is LAN different from a MAN?

A

LANs cover a small area, are owned by one org., uses general Ethernet and 802.11 tech, and is used for internal communications.

MANs cover a city, are operated by ISPs or governments, use specialized Ethernet, and connect multiple LANs.

136
Q

How is LAN different from a SAN?

A

LANs connect computers and devices, handle a variety of data and services, use general Ethernet or WiFi, and can have variable bandwidth needs.

SANs are specialized for block storage, focus solely on storage and retrieval, use specialized protocols with high speed connections, and requires high bandwidth.

137
Q

How is LAN different from a WLAN?

A

LANs use physical Ethernet cables, aren’t mobile, are more secure, and less susceptible to interference.

WLANs use 802.11, are mobile, are less secure, and prone to interference.

138
Q

How is WAN different from a PAN?

A

WANs cover a huge area, connect networks, uses MPLS and satellites, and involve many orgs. and service providers.

PANs cover a work space, connect peripherals, use Bluetooth, NFC, or IrDA, and involve a single user.

139
Q

How is WAN different from a MAN?

A

WANs cover a country or continent, invovle multiple service providers, use satellites, and connects multiples MANs or LANs.

MANs cover a city, can involve a single provider, use Metro Ethernet, and connect multiple LANs.

140
Q

How is WAN different from a SAN?

A

WANs connect networks for general communication, handle diverse data and services, use a variety of tech, and have variable bandwidth and latency.

SANs are used to store data at high speeds over a network, use high-speed protocols, amd require high bandwidth with low latency.

141
Q

How is WAN different from a WLAN?

A

WANs cover a huge area, use a variety of wired and wireless tech, connects LANs globally, and uses a variety of standards.

WLANs cover a local area, use 802.11, and connect devices locally.

142
Q

How is PAN different from a MAN?

A

PANs take up a personal space, are owned/used individually, and utilize Bluetooth, NFC, and IrDA.

MANs cover a city, are owned by ISPs or governments, are used by a variety of users, connect multiple LANs, and use Metro Ethernet

143
Q

How is PAN different from a SAN?

A

PANs connect personal devices, operate within a few meters, used Bluetooth, NFC, or IrDA, and serve a single user.

MANs provide centralized storage, operate within a data center, use high-speed storage networking tech, and serve multiple users/apps.

144
Q

How is PAN different from a WLAN?

A

PANs cover a personal space, connect personal devices, use Bluetooth, NFC, or IrDA, and don’t use much bandwidth.

WLANs cover larger areas, connect multiple users, use 802.11, and offer higher bandwidth.

145
Q

How is MAN different from a SAN?

A

MANs connect several LANs within a city, use Metro Ethernet, and handle general use.

SANs provided dedicated storage services for servers within a data center, use high-speed protocols, and are exclusively for storage.

146
Q

How is MAN different from a WLAN?

A

MANs cover a city, use wired connections, connect multiple LANs, and are owened by the government or ISPs.

WLANs, cover a building or campus, use 802.11, connect multiple devices, and are owned by one organization.

147
Q

How is SAN different from a WLAN?

A

SANs provide high-speed storage access to servers, using specialized protocols within a data center.

WLANs provide general networking capabilites to devices, using 802.11 within a building or campus.

148
Q

How do you use a crimper?

A

Used to attach a connector to a cable, like an RJ or F-Type. First, strip the outer sheat of the cable, arrange the wires in the correct order and insert them into the connector. Then, place the connector into the crimper and squeeze the handles to press the prongs through the wire insulation.

149
Q

How do you use a cable stripper?

A

Removes the outer sheath of a cable without damaging the internal wires. Place the cable in the stripping slot, squeeze, and rotate. Then pull off the sheath.

150
Q

How do you use a WiFi analyzer?

A

Used to monitor wireless network frequencies and identify potential issues to better place antennas and select channels. Open the software or use a dedicated device, and scan the WiFi channels, reviewing signal strength, channel usage, and interference.

151
Q

How do you use a toner probe?

A

Consists of a tone generator and an inductive probe used to identify the ends of cables. Connect the tone generator to one end, then mobe the probe along the cable, listening for the sound emitted by the generator.

152
Q

How do you use a punchdown tool?

A

Connects wires to a punchdown block. Put the wire in its slot and use the tool to press the wire into the slot, removing any excess.

153
Q

How do you use a cable tester?

A

Checks the connectivity of cables. Plug both ends into the test and it will check for proper connection, missing pins, or crossed wires.

154
Q

How do you use a loopback plug?

A

Tests ports and interfaces. Plug it into the interface to determine if the port or device is the weak link.

155
Q

How do you use a a network tap?

A

Used to capture network traffic for analysis. The tap goes between two or more devices and makes copies of the data passing through. Active taps need power, passive don’t.