Other Questions Flashcards
(162 cards)
What is ARP?
Address Resolution Protocol
Used to map IP network addresses to the MAC addresses used by a data link protocol
Given the following network address: 192.168.1.0/25, what is the last usable IP address in this subnet?
Also explain why?
192.168.1.126
/25 means 128 IP addresses
Minus 2 for the network address and the broadcast address
A network engineer needs to create subnets within a Class A network. The engineer decides to use a certain subnet mask. How many possible hosts are available per subnet if the subnet mask is 255.255.0.0?
Also explain why?
65534 possible hosts
Class A network with a subnet mask 255.255.0.0 means /16 subnet. This means there are 16 bits available for host addresses (32 total bits - 16 network bits = 16 host bits). The formula to calculate the number of hosts is 2^n - 2, where n is the number of host bits. In this case, 2^16 - 2 = 65536 - 2 = 65534 hosts. The ‘-2’ accounts for the network and broadcast addresses
What is traffic shaping?
AKA Packet Shaping
A congestion management method that controls bandwidth usage by network traffic. It can be used to prioritize, limit, or guarantee bandwidth to specific traffic types to prevent network congestion
delaying certain packet types—based on their content—to ensure that other packets have a higher priority. This can help to ensure that latency is reduced for critical applications.
Which topology provides the highest redundancy?
Mesh
Each network node is connected to every other node. If one connection fails, there are still multiple paths for data to take.
What is the ‘dig’ command?
Domain Information Grouper
Used in Linux to troubleshoot DNS related issues. It can be used to pull up a wealth of DNS record information, which can help determine where a problem might lie.
True or False:
The “ping” command uses the ICMP protocol to test network connectivity
True
The ping command does use the Internet Control Message Protocol (ICMP). It works by sending ICMP Echo Request packets to the target host and waiting for an Echo Reply, testing network connectivity and response time.
What is IPSec?
Internet Protocol Security
Provides security at the network layer, including data encryption and secure communication between hosts
What is CRC?
Cyclical Redundancy Check
These errors usually indicate a problem with the cabling or a faulty port, as they are generally related to physical layer issues
nslookup
Command-line tool is best used to diagnose DNS servers. It can help find DNS details, like IP addresses of a particular computer, or the domain name and IP address of the DNS server for a particular organization.
MPLS
Multiprotocol Label Switching
Uses label-switching routers and label-edge routers to forward packets.
MPLS is a protocol-agnostic routing technique designed to speed up and shape traffic flows across enterprise wide area and service provider networks
QoS
SLA
Service Level Agreement
Define the level of service expected by a customer from a supplier, laying out the metrics by which that service is measured, and the remedies or penalties, if any, should the agreed-upon levels not be achieved
APIPA
Automatic Private IP Addressing
-when a DHCP server can’t be contacted.
169.254.0.1 - 169.254.255.254
Troubleshooting Methodology
Identify the problem
Establish a theory of probable cause
Test the theory to determine the cause
Establish Plan of Action
Implement Solution
Verifying full system functionality Document findings
OSI Model Layers
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
What is the purpose of the Time-to-Live (TTL) field in an IP packet?
The TTL field in an IP packet is decremented by one each time the packet passes through a router. If the TTL field reaches zero, the packet is discarded, preventing it from looping indefinitely around the network.
What is the purpose of Spanning Tree Protocol (STP) in a local area network (LAN)?
Spanning Tree Protocol (STP) is a network protocol that prevents switching loops (also known as bridge loops), which can cause broadcast radiation, by creating a spanning tree within networks that have redundant paths.
Port 53
DNS
(query and zone transfers)
Port 443
HTTPS
What is a typical function of a load balancer?
Load balancers distribute network traffic across multiple servers to ensure no single server becomes overwhelmed with too much traffic.
OSPF
Open Shortest Path First
An interior gateway protocol used to exchange routing information within a single Autonomous System (AS).
BGP
Border Gateway Protocol
An exterior gateway protocol typically used to route traffic between different AS.
Port 25
SMTP
Simple Mail Transfer Protocol
Port 161
SNMP
System Network Management Protocol