Networking Essentials Flashcards

1
Q

what does ARP stand for

A

Address resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IP traffic is managed based on the characteristics and devices associated with each of the three layers of the hierarchical network design model

A

Access, Distribution and Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

access layer

A

ethernet switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ipv6 version of arp is

A

neighbor discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

distribution layer

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LAN

A

local area network or group of interconnected local networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To make the IPv4 address easier to understand, each octet is presented as its decimal value, separated by a decimal point or period.

A

This is referred to as dotted-decimal notation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
the comparison of two bits that produce the results shown here: 
1 and 1 = 1
1 and 0 = 0
0 and 0 = 0
0 and 1 = 0
A

logical AND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

classful system

A
class a 0-127 binary 0
255.0.0.0
class b 128-191 binary starting with 10
255.255.0.0
class c 192-223 binary starting with 110
255.255.255.0
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

iana

A

internet assigned numbers authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IANA

A

internet assigned numbers authority manages and allocates blocks of IP addresses to the Regional Internet Registries (RIRs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIR’s

A

regional internet registries allocates ip addresses to isps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ARIN

A

American registry for internet numbers manages and maintains ipv4 and ivp6 addresses for north america.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AFRINIC

A

African network info centre manages and maintains ipv4 and ivp6 addresses for africa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

APNIC

A

Asia pacific network info centre manages and maintains ipv4 and ivp6 addresses for the Asia and Pacific regions including Australia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RIPE

A

Reseaux ip european manages and maintains ipv4 and ivp6 addresses for Europe the middle east and central asia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

LACNIC

A

Regional Latin-American and Caribbean IP address registry manages and maintains ipv4 and ivp6 addresses for Latin American and some Caribbean Islands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

private ip address

A

begin with 10, 172, 192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

3 types of cast from a host with ip addresses

A

unicast, broadcast, multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NAT

A

Network Address Translation The process used to convert private addresses to Internet-routable addresses is called

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IETF

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

first ipv6 1995

A

RFC1883 superseded by RFC2460

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ipv6 compression

A

leading zeros can be omitted and contiguous zeros can be replaced with a colon, for example 00fc would be fc and 99:0000:00tf would be 99::tf the double colon can only be used once in an address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Stateless Address Autoconfiguration (SLAAC

A

allows a host to create its own Internet routable address (global unicast address or GUA) without the need for a DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ipv4
set of 32 binary bits 1's and 0's grouped into 4 8 bit bytes called octets 2 parts network and host subnet mask further demonstrates the network and host portions
26
network of servers is called a
server farm
27
is a facility used to house computer systems and associated components.
A data center
28
url
uniform resource locater
29
Domain Name System (DNS) -
Resolves Internet names to IP addresses.
30
Secure Shell (SSH) -
Used to provide remote access to servers and networking devices.
31
Simple Mail Transfer Protocol (SMTP) -
Sends email messages and attachments from clients to servers and from servers to other email servers.
32
Post Office Protocol (POP) -
Used by email clients to retrieve email and attachments from a remote server.
33
Internet Message Access Protocol (IMAP)
- Used by email clients to retrieve email and attachments from a remote server.
34
Dynamic Host Configuration Protocol (DHCP) -
Used to automatically configure devices with IP addressing and other necessary information to enable them to communicate over the Internet.
35
Web Server -
Transfers the files that make up the web pages of the World Wide Web using Hypertext Transfer Protocol (HTTP).
36
File Transfer Protocol (FTP) -
Used for interactive file transfer between systems.
37
four different levels of the TCP/IP model are:
Application Layer Protocol Transport Layer Protocol Internetwork Layer Protocol NetworkAccess Layer Protocol
38
Application Layer Protocol -
Hypertext Transfer Protocol (HTTP) governs the way that a web server and a web client interact. HTTP defines the format of the requests and responses exchanged between the client and server. HTTP relies on other protocols to govern how the messages are transported between client and server.
39
Transport Layer Protocol -
Transmission Control Protocol (TCP) ensures that IP packets are sent reliably and any missing packets are resent. TCP provides proper ordering of packets received out of order.
40
internetwork Layer Protocol -
The most common internetwork protocol is Internet Protocol (IP). IP is responsible for taking the formatted segments from TCP, assigning the logical addressing, and encapsulating them into packets for routing to the destination host.
41
Network Access Layer -
The specific protocol at the network access layer depends on the type of media and transmission methods used in the physical network.
42
TCP
Transmission Control Protocol
43
UDP
User Datagram Protocol
44
ICANN
the Internet Corporation for Assigned Names and Numbers. Ports are assigned and managed by this organization
45
Ports have 3 categories and range in number from 1 to 65,535
Well known ports Registered ports Private ports
46
Well-Known Ports -
Destination ports that are associated with common network applications are identified as well-known ports. These ports are in the range of 1 to 1023.
47
Registered Ports -
Ports 1024 through 49151 can be used as either source or destination ports. These can be used by organizations to register specific applications such as IM applications.
48
Private Ports -
Ports 49152 through 65535, often used as source ports. These ports can be used by any application.
49
source port
The source port number is associated with the originating application on the local host.
50
destination port
The destination port number is associated with the destination application on the remote host:
51
port 53
dns server request
52
port 21
ftp server control connection requests
53
port 20
ftp data transfer
54
tcp port 23
telnet servers listen for client request on this port
55
port 25
smtp server requests
56
port 110
clients contact pop3 servers on this port pop3 deletes messages from servers once they are accessed by the client
57
port 143
imap4 keeps messages on servers until user deletes
58
IEEE
The main organization responsible for the creation of wireless technical standards
59
network name (ssid)
service set identifier. The SSID is a case-sensitive, alpha-numeric string that is up to 32-characters
60
csma/ca
Wireless technology uses an access method called Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). CSMA/CA creates a reservation on the channel for a specific conversation between devices. While a reservation is in place, no other device may transmit on the channel thus possible collisions are avoided.
61
ap
access point
62
two types of dos attacks
syn(synchronous) flooding and ping of death
63
synchronous flooding
SYN (synchronous) Flooding - a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.
64
ping of death
Ping of death - a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.