Pass exam take two Flashcards
What names pages on the web, gives location and how to access a web page?
Uniform Resource Locator(URL)
In the OSI model, the hyperlink uses a(n) _____ to name the pages on the web.
- Uniform Resource Locator
- Session Initiation Protocol
- Domain Name System
- Open Systems Interconnection
Uniform Resource Locator
Which of the following is the most accurate description of clients in client/server architecture?
- Desktop computers with a wired connection and laptop computers with a wireless connection
- All devices connected to a network
- Hardware devices which provide end users with access to data and services on the server
- Computers connected to a network used for downloading data from a server
Hardware devices which provide end users with access to data and services on the server
Which layer is the application layer on the Open Systems Interconnect (OSI)?
7
Which layer is the presentation layer on the Open Systems Interconnect (OSI)?
6
Which layer is the session layer on the Open Systems Interconnect (OSI)?
5
Which layer is the physical layer on the Open Systems Interconnect (OSI)?
1
Which layer is the datalink layer on the Open Systems Interconnect (OSI)?
2
Which layer is the transport layer on the Open Systems Interconnect (OSI)?
4
Which layer is the network layer on the Open Systems Interconnect (OSI)?
3
Which layer in the OSI model provides access to available network resources?
7 - Application Layer
Which layer in the OSI model translates, encrypts and compresses data?
6 - Presentation Layer
Which layer establishes, manages and terminates communicative sessions in the OSI model?
5 - Session Layer
Which layer provides reliable proccess-to-process message delivery and error recovery in the OSI model?
4 - Transport Layer
moves packets from source to destination, by providing internetworking capabilities
3 - Network Layer
organizes bits into frames providing node-to-node delivery
2 - Data Link Layer
transmits bits over a medium, establishing mechanical and electrical specifications
1 - Physical Layer
Open Systems Interconnect (OSI)
has seven layers that each perform a specific & supportive commincative task
protocol
presentation layer
a standard set of guidelines under which the network operates
Presentation Layer functions?
- character-code translation
- data conversion data compression
- data encryption and decryption
- data translation
Presentation layer sub layers?
CASE and SASE
1- CASE
sublayer of presentation layer
Common Application Service Element
Provides application layer services and makes service requests of the session layer
2 - SASE
sublayer of presentation layer
Specific Application Service Element
provides application services/protocols
Networking
A grouping of two or more computers being linked together to exchange data
Session Layer (4)
primary responsibilites of session layer protocols are to set up, control, maintain, and close communicative sessions.
Coordinate active applications on various hosts using assigned protocols
Network Basic Input/Output System (NETBIOS)
Common Session Layer API
allows applications on separate computers to communicate and establish sessions to access shared resourcs over a local area network (LAN)
Transfer Control Protocol/Internet Protocol (TCP/IP)
Common Session/Transport Layer API
Standardizes communications
Common Session Layer Protocols
Name 6
- Network File System (NFS)
- Structured Query Lanuguage (SQL)
- Remote Procedure Call (RPC)
- X Window System
- AppleTalk Session Protocol (ASP)
- DEC Session Control Protocol (SCP)
What does layer five of the OSI model do?
* Provides access to available network resources.
* Establishes, manages and terminates communicative sessions.
* Organizes bits into frames providing node-to-node delivery.
* Moves packets from source to destination providing internetworking capabilities.
Session Layer - Establishes, manages and terminates communicative sessions.
The session layer provides communicative support to which two OSI layers?
- Data link and transport
- Application and physical
- Presentation and transport
- Network and application
Presentation and transport
The API that allows applications on separate computers to communicate over a LAN is:
* IP
* NetBIOS
* TCP/IP
* TCP
NetBIOS
Which of the following identifies the protocol or protocols available to the session layer for standardizing communications on a network?
- TCP/IP
- IP/NetBIOS
- OSI
- NetBIOS
TCP/IP
the lowest layer in the OSI model and is used for transmitting data in its basic form: bit-level
Physical Layer (1)
Physical Layer transmission medium is______ or ______
wired or wireless
Physical Layer components in a wired model include ____
Physical Layer
bolts and connectors to carry data from one place to another by using (cables) electromagnetic signals that translates to a stream of bits
NIC - Network interface cards, connectors and interfaces and cables
Physical Layer components in a wireless model include ____
Physical Layer
Cellular Wifi and bluetooth
Types of cables in networking
Physical Layer
- Coaxial
- Sheilded Twisted Pair
- Unsheilded Twisted Pair
Shielded Twisted Pair (STP)
Physical Layer
foil shielding around pairs of twisted wires to prevent electromagnetic interfaces
Acts as a ground to the phone cable to carry data faster
Unshielded Twisted Pair (UTP)
Physical Layer
made the same as a shielded twisted pair but without the extra foil shielding around the wire
Most popular commonly used
A networking cable that is a wire covered by alternative conducting and insulating shields (more reliable):
Physical Layer
Coaxial Cable
hooks up to modem
RJ-45
Physical Layer
8-wire connectors used specifically for connecting LAN or Ethernet cables
Most common UTP connector cable
Fiber ST, SC
Physical Layer
fiber cable connectors that are always used in pairs; one wire is for transmitting data, and the other is for receiving it
used for fiber optic cables and transmission of optical signals
Physical Layer
Fiber LC
Data transmitted in a single direction in the Physical Layer:
Simplex
Half-duplex
Physical Layer
Data can be transmitted in both directions, but not at the same time
Full-duplex
Physical Layer
Data can be transmitted in both directions at the same time
Which connector is NOT used in a network cable?
- RJ-11
- Fiber ST
- RJ-45
- Fiber LC
Physical Layer (1)
Rj-11
An NIC is used for which of the following?
- Connecting a telephone to the network.
- Connecting a computer to a network.
- Securing a computer in a network.
- Using as a telephone wire.
Physical Layer (1)
Connecting a computer to a network
In the OSI physical layer, data is transmitted in the form of _.
* optical signals
- infrared rays
- both optical and electromagnetic signals
- electromagnetic signals
both optical and electromagnetic signals
What does bandwidth mean?
* Bandwidth is the theoretical minimum speed of your data
* Bandwidth is the actual speed of your data
* Bandwidth is the theoretical maximum speed of your data
* Bandwidth does not apply to network speed
Bandwidth is the theoretical maximum speed of your data
What does throughput mean?
* Throughput is the slowest speed your data can travel on the network
* Throughput is the actual amount of data you get in a certain amount of time
- Throughput is the delay between the moment you demand data and the time you eventually get it
- Throughput is the fastest speed your data can travel on the network
Throughput is the actual amount of data you get in a certain amount of time
Which of these statements is true?
* You should rarely expect delays when you ask for data
* Data always travels the same speed on the network
* You can expect to get just as much throughput as you ask for
* You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
You should expect an average throughput which is less than the maximum speed, and you should expect an average delay called latency
What are the 3 basic cable types in networking?
- Twisted pairs
- Coaxial
- Fiber optics
Twisted pair cable types (9)
Networking
- Cat1 - Cat5
- Cat5e
- Cat6
- CAt6a
- Cat7
Cat1 - Cat3
Not standard anymore
Cat4
- Token ring networks
- 16 mbps
- range 100 meters
CAT5
- Ethernet-based Newtorks
- Two twisted pairs
- 100 Mbps
- range up to 100 meters
Most common in homes
Cat 5e
- Four twisted pairs over an ethernet connection
- 1000 Mbps
- up to 100 meters
Cat6, Cat6a, cat7
- four twisted pairs
- future standard
- 10 gbps
- 100 meters
Fiber Optic Cables
the new network connection standard and are so fast that they can carry light speeds, thus allowing for gigabit networks
Over 1000 mbps
More secure than coaxial
thinner, faster, more bandwidth, stays cool, less interference
Fiber Optic Cable Types
- Single - mode
- Multi - mode
- Plastic Optical Fiber
Single-Mode (SMF)
- used to transmit data over much longer distances than the other two types
- high bandwidth/performance
- lighter
- less bulky
- resistance to corrosion
- more secure
- immune to electromagnetic interference
from city to city
- used for sending data over short distances
- larger in diameter
- less expensive
Multi-Mode (MMF)
office building floor to floor
Plastic Optical Fiber
consumer optical fiber cable
** Which of these is the most common cable type to connect a home network to a cable modem using an internet service provider?**
Unshielded twisted pair
Fiber optic
CAT2
Coaxial
Coaxial
** In unshielded twisted pair cables, which category starts being able to push gigabit network speeds (1000+ Mbps)?**
CAT4
CAT5
CAT7
CAT5e
Cat5e
What is the main purpose of having a twisted pair cable?
To cut down on costs
To double the transfer rate of data
To make installation easier
To reduce electromagnetic interference from outside sources
To reduce electromagnetic interference from outside sources
When internet service providers use fiber optic cables, which cable type are they most likely to use for home networks?
Multi-mode
Plastic optical cable
Single-mode
None of these answer are correct
Plastic optical cable
What is the main advantage of using a shielded twisted pair (STP) cable for a network connection?
To focus the network connection in a large room
To cut back on electrical interference
There is no advantage to using one
To enhance the network connection in a small room
To cut back on electrical interference
optical fiber
a very thin strand of plastic or glass that is used to transmit messages via light
The type of fiber used typically for long distance runs is:
Wave-division multiplexing fiber
Serial fiber
Multi-mode
Single-mode
Single-Mode
An advantage of optical fiber over traditional copper wiring is:
Less bulk
Lower cost
You can pull it tighter
It can bend at greater angles than copper
Less bulk
User Datagram Protocol (UDP)
David Reed with RFC 768
Speed over efficiency
Printers, streaming media, Larger files
jenny.myconference.com which is the host name
jenny
URL is an acronym for __________.
Uniform Reference Link
Unique Reference Link
Uniform Resource Locator
Unique Reference Location
Uniform Resource Locator
Access a website by entering the _____ or _____ into the address bar of the Internet browser.
host name, URL
domain name, URI
HTML, network
URL, IP address
URL, IP address
Domain Name System (DNS)
- a unique string associated with an IP address
- a network of directories on the internet used to resolve host names into machine-readable IP addresses
gingername.com
Top name domain servers
.com
.org
.net
Which of the following statements is true?
Recursive name servers respond to queries from authoritative servers
Recursive name servers respond to queries from TLD name servers
Authoritative name servers respond to queries from recursive name servers
Local DNS cache respond to queries from root servers
Authoritative name servers respond to queries from recursive name servers
_____ is an example of a TLD name.
gingernameclub.com
www.gingernameclub.com
www.com
.com
www.gingernameclub.com
DNS servers use _____ servers to help resolve IP addresses to Domain Names
IP servers
Authentication servers
Caching servers
Authoritative servers
Authoritative servers
Which of the following statements is true when a user first makes a DNS query by typing the domain name into the web browser?
A DNS query answer is returned from the authoritative servers
A request is sent to the respective root nameservers
A request is sent to an ISP recursive server
The local DNS cache is queried
The local DNS cache is queried
Prefix identifies what 172.16.254.1
172.16. network
IP address
- unique identifier in the field of networking that identifies the physical coordinates of a device that is connected online
- dotted-decimal notation
- 32 bits total (1 byte = 8 bits)
- 172.16.254.1 = 10101100.00010000.11111110.000000001
Suffix identifies what 172.16.254.1
254.1 device
Routing class A
IP Addresses
0 - 127
examples 10.1.7.242, 10.253.20.17
For large number of hosts
Routing class B
IP Addresses
128-191
172.16.47.18, 172.16.250.241
Medium Sized Networks
Routing class C
IP Addresses
192-223
192.16.1.1, 192.168.45.253
small networks
Routing class D
IP Addresses
224-239
Multi-tasking
227.26.6.173
Routing class E
IP Addresses
240-254
Research and develpment
243.164.89.28
IPv4
- more devices than addresses
- finite number of addresses
- solution non-routable
Network Address Translation (NAT)
IP addresses
is used to provide an alias for the device; the router translates that alias back to the device’s IP.
internet service provider (ISP)
IPv6
gives your home location a physical IP address that can be traced back to your modem via coordinates
IPv6 format
- 128 bits (binary digits)
- hexadecimal format and 0s 1s
- 6e3d:e161:de2a:eb9e:28af:86bc:55a3:e5ce.
Fixed Header
IPv6
- Source address
- Destination address
- Version/IP version
- Traffic class
- Flow label
- Payload length
- Next header
- Hop limit
Source address
IPv6 Header
The original 128-bit source address for an IPv6 node packet.
Destination Address
Ipv6 Header
The 128-bit recipient address from the IPv6 node packet.
Version/IP version
IPv6 Header
The 4-bit identifier for the version that is being used, in the case of IPv6, that number is going to be 6.
Traffic Class
Ipv6 Header
An 8-bit field that is used to determine a packet’s level of priority.
Flow Label
IPv6 Header
A 20-bit field for defining the packets of the flow. This is useful for the router to determine which packets belong to a particular flow of information. This is mainly used for multimedia or video communications etc.
Payload Length
IPv6 Header
A 16-bit field that states the overall length of a packet payload, which can go up to 64 kilobytes if needed.
Next Header
IPv6 Header
This indicates the type of extension header (if exists) or the upper layer PDU (such as TCP).
Hop Limit
IPv6 Header
An 8-bit field that discards the packet after an absolute limit of time has passed.
IPv6 Addressing types
IPv6
- Unicast
- Multicast
- Anycast
- Broadcast
Unicast
IPv6 Addressing Types
A packet is delivered only to one interface.
Multicast
IPv6 Addressing Types
A packet is delivered to multiple interfaces.
Anycast
IPv6 Addressing Types
A packet is delivered to one of the multiple interfaces, but only based on the nearest routing location.
Broadcast
IPv6 Addressing Types
This is used in IPv4 to send a single packet to multiple hosts at once. IPv6 does not make use of this technology, making it an old address type not suitable for the future of networking.
Is a unique identifier assigned to a computer system (host) on a network with which it can be identified and accessed easily. Simply put, it is the computer system’s name or an alias or domain name.
Hostname
Hostname Resolution
Host file
Hostname resolution
Exists in the ‘‘SYSTEM32\DRIVERS\ETC’’ directory under the Windows root directory (i.e., \WINDOWS or \WINNT)
Hostname Resolution
Refers to the process through which an assigned hostname is converted or resolved to its mapped IP Address so that networked hosts can communicate with each other.
What protocol do computer systems (hosts) use when communicating with each other on a network?
OSI Models
URLs
IP Addresses
IP Servers
IP Addresses
How are hostnames resolved?
* Hostnames are resolved through an Internationally designated body saddled with the task.
* Hostnames are resolved locally and remotely on a servers.
* Hostnames are already in-built in the computer systems and hence are resolved on their own.
* Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
Hostnames can be resolved either locally or remotely through the use of hosts file configured on a computer host locally or one designated for that purpose remotely.
- Why is it necessary for computer systems (hosts) to have a hostname or domain name?
- It is necessary because it is an international standard which must be followed.
- It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
- It is necessary because every device has a name and so this should not be different.
- It is necessary because it differentiates it from other people’s computer systems.
It is necessary because it makes managing large numbers of computers located within a big office space or network easier to identify and accessed.
What is a hostname or domain name used for?
* It is a name given to a website and the server.
* It is used for naming a device or computer system.
* It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
* It is a security requirement.
It is used to uniquely identify a computer system (host) located on a computer network for easy referencing.
What is Hostname Resolution?
* It is the process through which hostnames are reserved for use on another network.
* It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
* It is the process through which hosts on a network communicate with another.
* It is the process through which hostnames are separated from each other using a router.
It is the process through which an assigned hostname is resolved to its mapped IP Address for communication purposes.
addresses work along with IP addresses on a network device for communication. The device must have the necessary functioning hardware to communicate on the network. With NIC
Media Access Control (MAC)
MAC address
- NIC 48 bit numbers
- The MAC address is a hardwired number, permanent and unique to a device’s NIC.
- example 00-14-22-01-23-45
How does the MAC Address differ from an IP address?
- The MAC address operates in the Network layer of the TCP/IP stack.
- The MAC address is a hardwired number, permanent and unique to a device’s NIC.
- The MAC address carries only network addressing information.
- The MAC address is dynamically assigned each time a device establishes a new connection in a network.
The MAC address is a hardwired number, permanent and unique to a device’s NIC.
IP Addresses operate within the _ layer of the TCP/IP protocol.
Data Link Layer
Application Layer
Physical Layer
Network Layer
Network Layer
What is an IP address?
- An IP (Internet Protocol) address is used to identify a computer.
- An IP (Internet Protocol) address is used to identify a NIC.
- An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
- An IP (Internet Protocol) address is a series of hardwired numbers which is used to identify a network environment.
An IP (Internet Protocol) address is a series of numbers which is used to identify a device within a network environment.
Which of the following statements is true?
- NICs are hardwired with IP and MAC addresses.
- MAC and IP addresses need to work in parallel for effective communication.
- MAC and IP addresses can both work independently depending on the environment.
- MAC addresses can route data packets over the internet independent of IP addresses.
MAC and IP addresses need to work in parallel for effective communication.
Why are addresses important in networking?
- They identify the layers in the TCP/IP Stack.
- They are used to reveal the name of the device.
- They are used to identify both the network to which the device is connected to as well as the device itself.
- They are used to establish the network layer of the operating environment.
They are used to identify both the network to which the device is connected to as well as the device itself.
IPv4 (Internet Protocol version 4)
Advanced Research Project Agency or ARPA developed ARPANET
(later known as DARPA due to defense contracts) and began working on networking in the late ’60s.
The Network Control Protocol
which was the predecessor to TCP/IP v4, was created by ARPANET and first used in 1971.
TCP/IP v4
was finalized in 1981 as part of RFC 791.
What is variable length subnet masking used for?
- It allows an IP address space to be divided into subnets of different sizes.
- It is used to introduce complexity to networks.
- It is used to issue addresses to systems.
- It is used to make numbers larger.
It allows an IP address space to be divided into subnets of different sizes.
Who was responsible for the creation of IPv4 protocols?
IBM
Lycos
DARPA
DARPA
A class A network has how many network bits set to on?
8
16
24
3
8
**In dotted decimal, which network numbering segment is reserved for loopback?
**
192.168.x.x
172.x.x.x
127.x.x.x
0.x.x.x
127.x.x.x
Network Address Translation (NAT)/Address Translation (AT)
is a system of assigning public and private IP addresses to computers within an internet network system in order to facilitate the transfer of data to and from the internet
Basic NAT
one-to-one mapping (1:1 mapping)
One-to-Many NAT
assigns one private, or internal IP address, to not just one internal host device, but an entire private network of internal host devices.
one-to-one mapping translation. It assigns one private IP address to one public IP address. This will be the permanent address for that device.
Static NAT (SNAT)
Dynamic NAT (DNAT)
eliminates the limitation of only one IP address creation per device. Instead, it collects a pool of pre-created, public IP addresses that a private IP address can be translated into when needed.
most common type of NAT. This type of translation has several different names, such as overloading, NAT overload, or one-to-many mapping, as discussed.
Port Address Translation.
As the name communicates, PAT allows for an overload, or multiple private IP addresses to be translated into a single public IP address.
The different types of Address Translations are ______
- Statin Network Address Translation, Dynamic Network Address Translation. Support Address Translation
- Gateway Network Address Translation, Dynamic Network Address Translation. Web Address Translation
- Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation
- Static Network Address Transformation Dynamic Network Address Transformation. Port Address Translation
Static Network Address Translation, Dynamic Network Address Translation. Port Address Translation
NAT serves which two main purposes?
- Protecting the public network from the Internet and conserving the availability of public IP addresses.
- Protecting the private network from the public domain and conserving the dynamic public IP addresses.
- Protecting the private network from the public domain and conserving the availability of public IP addresses.
- Protecting the public network from the private domain and conserving the availability of static IP addresses.
Protecting the private network from the public domain and conserving the availability of public IP addresses.
In a company setup where users are required to work from home when needed, what is the best address translation?
Port Address Translation
Dynamic NAT
Static NAT
NAT
Static NAT
If a company with a very low budget needs to lease a public IP address to access the Internet what would you advise and why?
- Static NAT would be their best option as it would enable them to access their computers remotely.
- Employing a single ISP would be the best option. they sign up for the public Ip addresses they need
- Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network
- Dynamic NAT would be their best option as they can pay for a single public IP address and share among the nodes within the network. The address would be available to any user on demand.
Port Address Translation would be their best option as they can pay for a single public IP address and share among the nodes within the network
What is Address Translation(AT)?
- AT is converting public IP addresses into private IP addresses
- AT is transposing private IP addresses into public IP addresses
- AT is converting private IP addresses into public IP addresses
- AT is mapping private IP addresses to public IP addresses
AT is mapping private IP addresses to public IP addresses
Routing Information Protocol (RIP)
standard used by routers that dictates how data should be shared between a group of individual networks, otherwise known as Local Area Networks.
Using Hops
hops
the path a data packet travels through to reach each router, as a way to measure which route is most efficient.
routing table
All routers that utilize RIP contain a dynamic list of all the destinations it can send data to.
Routing Information Protocol (RIP) Versions
RIP Version 1 utilizes classful routing whereas RIP Version 2 uses classless routing.
Classful routing
RIP Versions
refers to protocols that do not carry a subnet mask, a set number of available IP addresses available in a network.
classless routing
does carry subnet masks
Which of the following types of routing do NOT carry a subnet mask?
- Classless routing
- Routing tables
- None of these
- Classful routing
Classful routing
Which of the following best defines the Routing Information Protocol?
- It is a standard that determines what information is most valuable to an end user.
- It is a way for computers to manage their hard drives.
- It is a method for preventing hackers from infiltrating a network.
- It is a standard used by routers that dictates how data should be shared between a group of individual networks.
It is a standard used by routers that dictates how data should be shared between a group of individual networks.
Which of the following refers to the path a data packet travels through to reach each router?
Routes
Jumps
Skips
Hops
Hops
What is the difference between RIPv1 and RIPv2?
- RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.
- RIPv1 uses classless routing, but RIPv2 uses classful routing.
- RIPv1 and RIPv2 each have their own routing protocol.
- RIPv1 uses the Routing Information Protocol and RIPv2 does not.
RIPv1 utilizes classful routing whereas RIPv2 uses classless routing.
Select the term that best completes the sentence.
RIP routers contain _, a dynamic list of destinations that it can send data to.
routing tables
routes
hops
classful routing
routing tables
is a device that is used to create a network of computers and other devices.
switch
Central Processing Unit
switch architecture
responsible for handling all of the basic instructions on the device. The CPU is akin to how your brain is responsible for sending signals throughout your body to do things like walking, taking a deep breath, blinking, eating and so on.
Forwarding Engine
switch architecture
component that is responsible for making all of the switching and routing decisions on the device.
Switch Fabric
switch architecture
comprised of hardware and software that work in tandem to ensure that data coming into the network gets sent out via the appropriate port.
Controllers and Buffers
swtich architecture
controller is similar to a CPU, but its main focus is controlling tasks such as clocking.
buffers are used to prevent data packets from clogging up the network path.
ROM and RAM
swtich architecture
ROM is able to store data even without power, whereas RAM cannot.
ROM
swtich architecture
short for Read-Only Memory, is responsible for the switch’s long-term memory.
What type of memory handles the switch’s short-term memory in the switch architecture?.
RAM
Ports
connect devices together
Which two components enable a switch fabric to operate?
CPU and Controller
Controller and Buffers
ROM and RAM
Forwarding and Replication Engines
Controller and Buffers
Which of the following is responsible for the switch’s long-term memory?
CPU
Ports
RAM
ROM
ROM
A _ is a device that is used to create a network of computers and other devices.
CPU
Replication Engine
switch
Switch Fabric
Switch
Which switch component allows for devices to be connected to the switch?
Switch Fabric
Ports
RAM
Forwarding Engine
Ports
Which of the following is NOT a component of a network switch?
CPU
Replication Engine
Bypass Engine
Switch Fabric
Bypass Engine
Internet Message Access Protocol (IMAP)
is a standard internet protocol used for the retrieval of email messages from an email server. I
IMAP Port Access
a logical point of connection to the internet
One of the most common applications of IMAP is:
- Accessing and managing paired sharing platforms.
- Accessing and managing shared and system folders.
- Enabling data communications over a packet switched network on multiple devices.
- Accessing and managing shared and public folders.
Accessing and managing shared and public folders.
multiple people can have access to the same mailbox
IMAP can allow a user with multiple devices to _____
- access their emails simultaneously from any of the devices.
- access the protocol simultaneously from any of the devices.
- consolidate system updates on all devices.
- synchronize playback of multimedia from all devices.**
access their emails simultaneously from any of the devices.
IMAP is the vehicle by which _
- client applications are moved, organized and manipulated between the mail server and the mail client application
- compatibility updates are synchronized between Outlook and other email servers.
- synchronization is achieved between email clients and ISPs.
- messages are moved, organized and manipulated between the mail server and the mail client application.
messages are moved, organized and manipulated between the mail server and the mail client application.
What is IMAP?
- (IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.
- (IMAP) is a standard internet protocol used for data packets and addressing schemes for computers to communicate over the internet.
- (IMAP) is a standard internet protocol used for email packets and addressing schemes.
- (IMAP) is a standard logical connection used for the retrieval of email packets between applications.
(IMAP) is a standard internet protocol used for the retrieval of email messages from an email server.
The secure logical connection to which IMAP is bound to connect to the internet is _
- Port 143
- Logic 993
- Port 993
- Part 143
networking commands
are used at the command prompt to get network information like the IP address of the system (remember that an IP address is the address of your device in a network), MAC address, network route traversed by a packet, and the IP address of the server in which a website or URL is hosted.
Network Command Types (7)
- ipconfig
- ifconfig
- tracert
- ping
- netstat
- nslookup
- getmac
which is used for finding the IP address and default gateway of your network.
Network Command Types (7)
ipconfig command
Network Command Types (7)
ifconfig command
Network Command Types (7)
which is mainly used to find an address to a network interface and to configure or display current network interface configuration information of a system.
tracert command
Network Command Types (7)
which is used to get an insight to the network route followed when a machine connected to a network tries to access a server on which a particular website is hosted.
ping command
Network Command Types (7)
which is typically used for checking the network connectivity from your system to an end device like a server or a printer and also of a website.
netstat command
Network Command Types (7)
which is used for displaying the active connections and ports which are connected to the current machine.
nslookup command
Network Command Types (7)
which is used for diagnosing the Domain Name System (DNS) infrastructure.
** getmac command**
Network Command Types (7)
which is used to find a computer’s MAC address. Remember that a media access control (MAC) address is a unique physical address of a computer, which is assigned specifically by the manufacturers of that computer.
In order to check the nodes that are connected to a system, one can use the command
netstat
ping
nslookup
tracert
netstat
What is the result of entering nslookup command in the command prompt?
IP address of the host server
MAC address of the system
IP address of the system
MAC address of the host server
IP address of the host server
Which command helps to identify whether a given system is connected to a network?
ifconfig
getmac
ping
netstat
ping
refers to the layout patterns of the interconnections between computers in a network. It is also referred to as network architecture.
Network topology
Network topology
Point-to-Point
Network topology
is the** simplest **of all the network topologies. The network consists of a direct link between two computers. This is faster and more reliable than other types of connections since there is a direct connection
Bus
Network topology
uses one main cable to which all nodes are directly connected. The main cable acts as a backbone for the network. One of the computers in the network typically acts as the computer server. The first advantage of bus topology is that it is easy to connect a computer or peripheral device. The second advantage is that the cable requirements are relatively small, resulting in lower cost.
Star
Network topology
each computer is connected to a central hub using a point-to-point connection
Ring
Network topology
the computers in the network are connected in a circular fashion, and the data travels in one direction.
Mesh
Network topology
every node has a direct point-to-point connection to every other node. Because all connections are direct, the network can handle very high-volume traffic. It is also robust because if one connection fails, the others remain intact. Security is also high since data travels along a dedicated connection.
combines multiple star topologies onto a bus. Hub devices for each star topology are connected to the bus. Each hub is like the root of a tree of devices. This provides great flexibility for expanding and modifying the network.
Network topology
Tree
Hybrid
Network topology
combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.
Consider a number of computers are in a network, and one computer crashes. In which of the following network topologies will the entire network also go down?
Star
Ring
Mesh
Tree
Bus
Ring
Topology
arrangement in which various network devices or network systems are connected.
describes the actual or the physical layout of a network, such as the physical arrangement of wires, media (computers), or cables in a network.
- bus
- mesh
- star
- ring
Physical topology
path taken by the various signals in networking
signal topology
Token-based
physical topology
access requires authentication before accessing and sharing data
shared media access
physical topology
requires no authentication, and thus any computer in the network can share data without restrictions, which can cause collisions at various signal nodes.
** Ethernet**
physical topology
is an example of shared media access.
Logical topology
indicates how various hosts within a network communicate across the medium, i.e., it exhibits how data or signals in a network flow.
Broadcast topology
logical topology type
This topology allows a host to send data to all other hosts available in that network. No order or restrictions are observed among the hosts regarding sharing data.
Token-passing topology
logical topology type
This topology only allows the sharing of data to hosts through the access of an electronic token. This token is typically shared with each host in an orderly way. However, if one host has no data to share, the electronic token is passed to the next host in the sequence.
The _ of a network describes how the connections appear to the end user or how signals are passed across the network.
- physical topology
- protocol suite
- signal pattern
- logical topology
logical topology
Ethernet is an example of which kind of signal topology?
- shared media access
- token-based access
- wireless
- switch based
Shared Media Access
The _ topology of a network describes how devices are connected via actual cabling, wireless connectivity, etc.
diagram
electrical
physical
logical
Network switching
is the process of channeling data received from any number of input ports to another designated port that will transmit the data to its desired destination.
Circuit switching
is defined as the establishment of a dedicated communication path between the two parties, or nodes, within a physical network.
Packet switching
is defined as the process of breaking down messages into small components, called packets.
multi-protocol label switching (MPLS)
the ability for the intermediate routers to make these independent decisions are eliminated. MPLS is a network routing mechanism that directs packets to their final destination using an assigned label.
The label in multi-protocol label switching contains _.
- the routers ingress and egress routing information
- information on the predefined path for the packets to reach their destination
- complete routing table information
- the ingress and exit router information
information on the predefined path for the packets to reach their destination
In MPLS switching, the routing decision is made _.
- at each network hop
- by the first routing device and forms the predefined path for subsequent routers
- by the exit routing device and forms the predefined path for ingress
- when the path is set up across the network
by the first routing device and forms the predefined path for subsequent routers
One characteristic of MPLS switching is that it _.
is very inefficient
prevent multiple network hops
prevents network congestion
has little control on network traffic
prevents network congestion
The difference between circuit switching and packet switching is _.
- circuit switching uses destination labels, while packet switching uses routing labels
- with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets
- circuit switching is more vulnerable to network congestion than packet switching
- with circuit switching the message components takes independent paths to their final destination, while with packet switching the message takes one path to the final destination
with circuit switching the whole message is transmitted as one using a dedicated path, while with packet switching the message is broken down into small components called packets
What is network switching?
- The process of labeling network hops from any number of input ports to another designated port
- The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination
- A switching device that controls the volume of network traffic in a system
- The process of channeling network routers received from any number of input ports to another designated port that will transmit the router to its desired destination
The process of channeling data messages or data packets received from any number of input ports to another designated port that will transmit the data to its desired destination
Ethernet
is the most commonly used LAN technology. It dictates the technical specifications of hardware for connectivity; the number of connections permitted, performance thresholds and the overall framework that governs data transmission(types of vehicles, maximum height and speed limit).
Carrier Sense Multiple Access/ Collision Detection (CSMA/CD)
One of the main standards of the Ethernet technology
Fast Ethernet standard
IEEE 802.3u
1. 100 Base - TX
2. 100 Base - FX
3. 100 Base - T
What type of ethernet is the following?
- 10 GBase - SR
- 10 GBase - LX4
- 10 GBase - SW/LW/EW
Gigabit Ethernet
The unit of data which is carried by an Ethernet Link in the Network Access layer
Ethernet Frame
Ethernet Frame header
which contains details of the source and destination MAC addresses,
Frame Check Sequence
The middle section, which contains the packet data and the frames last section
Ethernet is the _.
- Unit of data which is carried by an Ethernet Link by the Network Access layer
- LAN technology that dictates geographical specifications of networks worldwide
- Protocol which which waits for the channel to be idle then transmits data
- LAN technology that dictates the technical specifications of hardware for connectivity
LAN technology that dictates the technical specifications of hardware for connectivity
The Frame Check Sequence (FCS) within an Ethernet frame serves to _
Meet the VoIP needs over the channel
Detect data collision
Detect corrupted data
Identify the transmitting device
Detect corrupted data
Ethernet usually permits each node in the network to transmit data packets at any time which can cause _
Error correction
Data collision
Multiple Access
Data re-transmission
Data collision
What Ethernet Standard Specification is suitable for a network requiring 100 Mbps speed and 2000 max cable distance?
100 Base - FX
10 GBase - SW
100 Base - TX
10 GBase - LX4
100 Base - FX
LAN Card
is the network interface card that is used by the device to communicate with the network. LAN Cards can be classified as wireless or wired. Wired LAN Cards are also called conductive LAN Cards.
Wireless LAN Cards
generally will have some sort of an external antenna and will utilize Wi-Fi protocols to connect to the network
Integrated LAN Cards
Most modern motherboards have a LAN Card integrated into the motherboard circuitry.
PCMCIA
laptops used slots, also known as PC Card slots, that could allow for the connection of a wired or wireless LAN Card.
Integrated Wi-Fi: NIC Card
modern laptops have an integrated LAN Card, and many have both a Wi-Fi and an Ethernet interface.
a computer network describes the material substances that carry energy waves, which include the data being transferred.
transmission media
Repeater
Telecommunications Hardware
a device that receives electronic signals, cleans them and retransmits them at a higher power level. Signals transmitted over cable tend to degrade over long distances
Hub
Telecommunications Hardware
a networking device used to connect multiple devices directly to the network using cables. Each connection is called a ‘port.’ The connections typically consist of a fiber optic Ethernet cable.
Switches
Telecommunications Hardware
contain many ports to connect different network segments. They are similar to hubs, but offer greater performance.
networking devices that divide up the network into different segments to manage the amount of traffic
Telecommunications Hardware
Bridges
Routers
Telecommunications Hardware
communication devices used to connect two different networks
Gateway
Telecommunications Hardware
interfaces networks that use different protocols
What modulates and demodulates data signals?
Modems
is a piece of hardware that allows individual computers to physically connect to a network.
network interface card (NIC)
An NIC contains the electronic circuitry required for a wired connection (Ethernet) or a wireless connection (Wi-Fi).
How does the use of a router differ from a bridge in telecommunication?
- A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
- Routers contain many ports to connect different network segments, while a bridge ensures that requests from within the network for information over the internet are distributed to the correct computer within the network.
- A router receives electronic signals, cleans and retransmits them at a higher power level, while a bridge receives electronic signals, cleans and retransmits them at a lower power level.
- A router contains many ports to connect different network segments, while a bridge sends data it receives only to specific ports.
A router is a communication device that is used to connect two different networks, while a bridge is networking device that divides the network into different segments to manage the amount of traffic.
Which of the following devices can be used to interface computer networks that use different communication protocols?
Router
Repeater
Gateway
Hub
Gateway
Which of the following contains a large number of ports to connect network segments and sends the data it receives only to specific ports?
Gateway
Hub
Router
Switch
Switch
What type of hardware device is a WiFi card?
A special card that gives you free access to WiFi hotspots
A device that encrypts a signal before it is transmitted over a WiFi connection
A port on a computer to plug in a WiFi cable
A network interface card to establish a wireless connection
A network interface card to establish a wireless connection
Wide Area Network, or WAN,
is used to connect physically separated locations on a network. WANs can connect buildings that are across town or across the world on the same network.
- Cost
- Performance
- Reliability
- Resiliency
Hub and Spoke
WAN Design
design technique where remote or branch office locations are all connected to the main location using a single point-to-point connection.
Full Mesh Network Topology
WAN Design
To remedy the deficiencies of the hub and spoke WAN
Common carriers for WAN
- MPLS
- Dedicated Lines
- Frame Relay (discontinued)
- Ethernet
- SD-WAN
- Dark Fiber
Of the options listed, which is the most used WAN (Wide Area Network) carrier?
Dedicated Lines
Frame Relay
MPLS
Dark Fiber
MPLS
What are two common WAN (Wide Area Network) design types?
Main input; Redundant Input
Remote singular; Integrated topology
Hub and spoke; Full mesh topology
MPLS; SD-WAN
Hub and spoke; Full mesh topology
If you wanted to connect a WAN (Wide Area Network) with a high-level of resiliency, what technique would you use?
A hub and spoke design.
A bus design.
A full mesh design.
A star design.
A full mesh design.
Wide Area Network (WAN)
is a communication network of devices, which spans geographical areas. It’s an interconnection across geographical locations, of multiple Local Area Networks (LANs), which are small communication networks in the same locality.
Network topology
describes the arrangement by which the components of networks (LANs or WANs) are organized.
ring topology
Network traffic can be routed in both directions. This makes this topology less vulnerable than the bus topology. If a line connection fails, traffic is rerouted in the opposite direction and communication is not lost.
star topology
the sites are arranged in a star formation. There is a central hub and each site is connected directly to the hub.
mesh topology
every device belonging to the network is connected to every other device in a mesh formation.
tiered topology
entails the interconnection of clusters of star network WANs by the use of concentration routers.
In WANs, which of the following is NOT a characteristic of mesh topology?
- Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
- Implementation incurs high costs
- Data transmissions are carried out via multiple routes
- All sites are connected to each other
Broadcasts are transmitted over a backbone which is accessible and seen by all connected sites
What is a WAN topology?
- WAN topology describes the arrangement concentration routers monitoring the LANs
- WAN topology describes a system by which the components within the WAN are named
- WAN topology describes the arrangement by which components within the WAN are organized
- WAN topology describes the arrangement by which the mesh components within the WAN are distributed
WAN topology describes the arrangement by which components within the WAN are organized.
Four types of WAN topologies are _
- Mesh, star, ring, bus topologies
- Ring, star, teared, mess topologies
- Bus, ring, stay, tiered topologies
- Mesh, rind, star, tiered topologies
Mesh, star, ring, bus topologies
Which network topology uses concentration routers to interconnect star network WANs?
Tiered topology
Mesh topology
Ring topology
Bus topology
Tiered topology
In WANs, what advantage does the ring topology have over the bus topology?
Concentration servers stabilize data transmission
Data transmission is multidirectional
It is hardware intensive and so implementation is expensive
Adding and removing nodes is easy
Data transmission is multidirectional
DSL (Digital Subscriber Line)
- like dial-up, it also used the same phone line connector cable.
- DSL over dial-up is that it offers the user a much higher rate of speed
DSL Asymmetric
(higher download speeds with lower upload speeds)
DSL Symmetric
equal download and upload speeds).
What is one of the major differences between a DSL network and a cable network?
- DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.
- All of these answers are correct.
- DSL was more expensive to implement than cable.
- DSL is more stable and reliable than cable.
DSL only worked well if the modem was close to the main service area, cable does not have such restrictions.
What is a unique downside that consumers face with a traditional cable network connection versus that of DSL?
- Overall network stability and reliability are lower.
- The cost per month of service is higher.
- Surrounding neighbors can affect the network bandwidth during peak hours.
- None of these answers are correct.
Surrounding neighbors can affect the network bandwidth during peak hours.
What are the benefits of a DSL network over the previous method known as dial-up?
- All of these answers are correct.
- Having much higher network speeds overall.
- Being able to talk on the phone and surf the web at the same time.
- Much more stability in terms of network reliability.
All of these answers are correct.
Short-range wireless communication
uses signals that travel very short distances, from a few centimeters to several meters. Examples include Bluetooth, infrared and Zigbee.
Medium-range wireless communication
uses signals that travel up to 100 meters or so. The most widely used type is Wireless Fidelity, or Wi-Fi.
Wide area wireless communication
uses signals that travel quite far, from several kilometers to several thousand kilometers. Examples include cellular and satellite communications.
mobile phone
is an electronic device to make and receive phone calls over a radio link while moving through an area.
tablet computer, or simply a tablet,
is a mobile computer where all components are integrated into a single unit.
personal digital assistant, or PDA,
is a mobile device that is dedicated to managing personal information.
satellite phone
allows you to make a phone call anywhere in the world by using two-way communication with satellites specifically designed for this purpose.
Global Positioning System, or GPS unit,
is an electronic device that receives signals from a collection of GPS satellites and uses this information to calculate your location.
Bluetooth
is a type of wireless communication used to transmit voice and data at high speeds using radio waves.
Infrared (IR) light
is electromagnetic radiation with wavelengths that are just beyond those of visible light.
Zigbee
is a wireless communication technology for short-range, low-power digital radio communications.
Ultra-wideband, or UWB,
is a short-range communication technology that uses extremely short magnetic pulses.
Near field communication, or NFC,
is a very short-range communication technology for things like consumer electronics, mobile phones and credit cards. Devices have to be in very close proximity, typically a few centimeters.
Which of the following is not a typical application of Bluetooth wireless communication?
* Hands-free calling by connecting a mobile phone to a car’s stereo system
* Wireless connection between a computer and peripheral devices (e.g mouse, keyboard, camera, printer)
* Wireless headset for a mobile phone
* Connecting several devices to the wireless Internet.
Connecting several devices to the wireless Internet.
Relative to other technologies such as Bluetooth, WiFi and cellular, Zigbee provides wireless communication that provides _.
Longer battery life
Longer range and lower cost
Lower cost
Lower cost and longer battery life
Lower cost and longer battery life
What is the approximate distance between devices when establishing a connection using short-range wireless communication?
* 1 to 100 meters
* From a few centimeters to approximately 1 kilometer
* 3 to 5 meters
* From a few centimeters to several meters
From a few centimeters to several meters
A set of network devices (for example workstations) that look as though they are connected through the same network and thus share the same broadcast domain.
Virtual Local Area Network (VLAN)
the network administrator must physically set individual ports on a switch to point to a specific VLAN. This provides only a single option - forwarding the ports on a switch to a specific VLAN - which is good for general purposes.
static VLAN environment,
gives the network administrator more flexibility to set up a more advanced network. For example, being able to specify user account names instead of specific ports allows for more finely tuned control over the network.
dynamic VLAN environment
In a _ VLAN, the network administrator must set the ports on a switch to forward the traffic to a specific VLAN.
static
single
double
dynamic
static
A _____ is a group of network devices that look like they are all connected to a single network even if they are not in the same location.
VLAN
All of these answers are correct.
Router
Modem
VLAN
A VLAN is created by multiple _ that forwards all network traffic to other locations.
routers
All of these answers are correct.
modems
switches
switches
is one of the oldest remote access methods, as old as the Internet itself. Telnet dates back to 1969 and was designed for the fledgling ARPANET,
Telnet
makes remote connections more robust over unreliable connections for laptops, tablets smarphones, wifi cellular
Mosh, or Mobile Shell,
VPN, or Virtual Private Network,
is another popular remote access method. It aims to give remote employees access to company resources such as email, wikis, content management systems or customer relationship management systems as if they were on a company intranet.
What access method works best over mobile connections?
SSH.
VPN.
Telnet.
Mosh.
Mosh
What main use does Telnet have in modern IT?
Telnet is often used for embedded devices.
Telnet offers remote access to Intranet resources.
Telnet is used for fun things like games.
Telnet is used for secure access to remote computers.
Telnet is often used for embedded devices.
What makes Mosh an alternative to SSH?
* Mosh is faster than SSH.
* Mosh can reconnect if a wireless connection gets interrupted.
* Mosh is easier to set up than SSH.
* Mosh is more secure than SSH.
Mosh can reconnect if a wireless connection gets interrupted.
Why is Telnet discouraged as an access method?
It’s very old.
Telnet only uses text.
Telnet is slow.
Telnet is unsecure.
Telnet is unsecure.
The countermeasures that are implemented on a network to keep the network and data safe from hackers, fraudsters, criminals, and negligent employees.
network security
Hardware appliances
are special servers or network equipment that perform a specific network security function.
network security software can be installed on
servers or PCs to enable network protection functions.
This type of network security is provided to your company as a service and is often called a
cloud service
If you want to prevent employees from disclosing sensitive company information, which network security type would be best to implement?
IPS/IDS
Web content filter
DLP
DDoS protection
DLP
When can a network security hardware appliance stop threats on the network?
* When it is installed in line.
* It can stop threats whether it is installed in or out of line.
* It can never stop threats.
* When it is installed out of line.
When it is installed in line.
Data loss prevention (DLP)
is a technology that is normally integrated into a firewall or other security systems. It uses pattern recognition to prevent sensitive data from leaving the corporate network.
Business Continuity:
Effective network security measures contribute to business continuity by minimizing the impact of cyberattacks and disruptions. A secure network ensures that critical services and resources remain available even during security incidents.
_______is a technique that allows potentially harmful software to be executed in a controlled, isolated environment. It enables the analysis of the software’s behavior without affecting the main network. Sandboxing helps identify and prevent the spread of malware and zero-day threats by containing them within a safe environment.
Sandboxing
________ involves dividing a network into smaller, isolated subnetworks. Each segment operates independently, limiting the impact of potential security breaches. It enhances network performance, isolates sensitive data, and reduces the attack surface, making it more difficult for attackers to move laterally within the network.
Network segmentation
Which of the following is NOT one of the core elements of network security?
Privacy
Integrity
Availability
Confidentiality
Privacy
In addition to network security operators, who might be involved with network security?
Construction engineers
Lawyers
Locksmiths
All of the answers are correct.
Locksmiths
Which of the following is NOT an element of access in regards to network security?
Accounting
Authorization
Authentication
Availability
Availability
Network security,
as a whole, refers to all attempts to protect the usability, integrity, and safety of your electronic data and network.
repudiate
means to deny or contest something
non-repudiation
must be the ability to ensure that someone cannot deny or contest that thing.
* certified mail
* notary public
* read reciept
* Digital signatures
* Biometrics
* Confirmation services
* Timestamps
* Digital certifcates
* public key infrastructure
__ is a technology that delivers video services from one device to another over a computer network which are connected to the internet.
Video-Over IP
______which describes methods or protocols used to distribute data between two or more devices.
Internet Protocol
The primary transfer protocols of TCP/IP protocol stack are the
- Transmission Control Protocol (TCP) 2. the User Datagram Protocol (UDP).
Characteristics of Video-Over IP
- scalability
- no distance limitations
- cost saving
- provides power over ethernet
- reduce bandwidth for compressoin, transmission and storage
Streaming Video
Live Streaming
On demand Streaming
Download and play
The latest video compression format is _____.
MPEG
JPEG
H.323
H.264
H.264
provide a way to send and receive the voice or video messages from one device to another.
Transport protocols
What is the part of the transport protocol responsible for facilitating the transfer of audio and video components over the internet?
RTP, or Real-Time Transport Protocol,
Without RTP, you have no VoIP.
RTCP, or Real-Time Transport Control Protocol - RTP’s sister.
While RTP does the heavy lifting of moving data, RTCP works alongside her to help with quality control.
Which part of the transport protocol works in conjunction with signaling protocols in VoIP communications?
RTP
REP
RTCP
RIP
RTP
What role do transport protocols play in video or voice over IP communications?
They deliver the audio and video data.
They eliminate wireless noise.
They choose the type of message.
They determine device location.
They deliver the audio and video data.
Why is the role of RTCP important in VoIP communications
- It connects the VoIP service to the local area network.
- It allows video packets to be sent between multiple devices.
- It allows the sender to select what type of message to send.
- It allows adjustments to be made to fine-tune transmissions.
It allows adjustments to be made to fine-tune transmissions.
RTCP as a transport protocol doesn’t deliver any data. Instead, it focuses on _.
Password acceptance
Wi-Fi controls
Quality control
Logistical transfer
Quality control
If a video call lags or buffers, which part of the transport protocol works to report on that to remedy the situation?
RTCP
RTP
REP
RIP
RTCP