Part 6 Network Configuration Lesson 20 - 22 Flashcards

1
Q

Define network “Interface” and 2 types

A

Any channel through which network data can flow.

1) Hardware network interfaces have a physical connection.
2) Virtual network interfaces are logical that ride on top of hardware interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What’s the purpose of Internet Protocol v4 (IPv4) addresses and subnet masks?

A

IP address identifies the location of a specific network device, the primary identification used by the Internet protocol suite TCP/IP for both local area and wide area networks.
Subnet masks are used by network devices to identify their local network range and to determine whether outgoing data is destined for a network device on the LAN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does IPv4 addressing differ from IPv6 addressing?

A

An IPv4 address is a 32-bit number represented in four groups of three-digit numbers, known as octets, separated by periods. Each octet has a value between 0 and 255.
An IPv6 address is a 128-bit number that’s presented in eight groups of four-digit hexadecimal numbers separated by colons. This allows for a huge range of addresses, and as a result IPv6 addressing essentially includes subnet information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the IP use the MAC address to send messages

between computers on a local area network (LAN)?

A

by addressing the outgoing packets based on the destination device’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the IP transfer messages between computers over a wide area network (WAN)?

A

A network client uses the subnet mask to determine whether the destination IP address is on the LAN. If the destination IP address isn’t on the LAN, it’s assumed that the destination address is on another network, and the client sends the data to the IP address of the local network router. The network router then sends the data, via a WAN connection, to another router that it thinks is closer to the destination. This continues across WAN connections from router to router until the data reaches its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is the Domain Name Service (DNS) used to facilitate network naming?

A

to translate host names to IP addresses via forward lookups and translate IP addresses to host names via reverse lookups. DNS is architected as a hierarchy of worldwide domain servers. Local DNS servers provide name resolution and possibly host names for local clients. These local DNS servers connect to DNS servers higher in the DNS hierarchy to resolve both unknown host names and host local domain names.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s used to identify a Wi-Fi network?

A

SSID (Service Set Identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Wi-Fi authentication protocols are supported by OS X?

A
  1. WEP
  2. WPA/WPA2 Personal
  3. WPA/ WPA2 Enterprise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can an OS X system automatically connect to a Wi-Fi network?

A

When the appropriate information was saved to the Keychain system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Through which mechanism can a standard user configure Wi- Fi settings? What Type can an admin configure?

A

Can connect to any non-WPA Enterprise Wi-Fi network via the Wi-Fi status menu.
Admin configure the WPA Enterprise connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define network “protocol”

A

A set of rules used to describe a specific type of network communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

define network “services”

A

a collection of settings that define a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s a network location? Who can access network locations?

A
A saved state of Network preferences that contains all network interface settings. 
Administrators only  (but if more than one location exists, all users can switch between the various network locations via the Apple menu.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 19 interfaces and protocols that are supported by default in OS X?

A
  1. Ethernet IEEE 802.3
  2. Wireless (Wi-Fi) IEEE 802.11
  3. FireWire IEEE 1394
  4. Thunderbolt
  5. Bluetooth
  6. USB
  7. VPN Vi via PPTP
  8. VPN via L2TP over Internet Protocol Security (IPSec)
  9. VPN via Cisco IPSec
  10. PPPoE
  11. 6 to 4 virtual network interface
  12. VLAN
  13. Link Aggregation
  14. TCP/IP
  15. DHCP
  16. DNS
  17. NetBIOS
  18. WINS
  19. Authenticated Ethernet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What functionality does OS X support with the AppleTalk protocol?

A

AppleTalk works only with Mac OS X v10.5 or earlier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does network service order affect network connectivity?

A

The network service order list is used to determine the primary network service interface if there is more than one active service. All network traffic that isn’t better handled via local connection to an active network service interface is sent to the primary network service interface. So in most cases all WAN traffic, Internet traffic, and DNS resolution is sent through the primary network service interface.

17
Q

In Network preferences, how can you tell which interface is

currently being used for network activities?

A

all network service interfaces with a green status indicator are being used for network activities.
(However, again, all network traffic that isn’t better handled via a local connection is sent to the primary network service interface. The primary network service interface is the topmost active interface in the listing.)

18
Q

What’s the easiest method in OS X to configure VPN settings?

A

by using a configuration profile containing all the relevant VPN setup information.

19
Q

What are the two 802.1X methods configured on OS X systems?

A
  1. Automatic via Wi-Fi network with WPA/WPA2 authentication

2. semiautomatic via 802.1X configuration profile provided by an admin