Section 1 Flashcards

1
Q

What are the layers of the TCP/IP Model

A

Application, Transport, Network, Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Application Layer of the TCP/IP Model for

A

responsible for the communication protocols between nodes. The protocols in this layer include hypertext transfer protocol (HTTP and HTTPS), Secure Shell (SSH), and network time protocol (NTP), among many others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Transport Layer of the TCP/IP Model for

A

responsible for the end-to-end transport of data. The protocols that live in this layer are transmission control protocol (TCP) and user datagram protocol (UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Network Layer of the TCP/IP Model for

A

defines the logical transmission protocols for the whole network. The main protocols that live in this layer are internet protocol (IP), internet control message protocol (ICMP), and address resolution protocol (ARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Network Interface Layer of the TCP/IP Model for

A

establishes how data should be physically sent through the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the layers of the OSI Model

A

physical, data link, network, transport, session, presentation, and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Physical Layer of the OSI Model for

A

responsible for the physical connections of the devices in the network. This layer is implemented through the use of devices such as hubs, repeaters, modem devices, and physical cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Data Link Layer of the OSI Model for

A

responsible for the error-free delivery of data to the receiving device or node. This layer is implemented through the use of devices such as switches and bridge devices, as well as anything with a network interface, like wireless or wired network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the Network Layer of the OSI Model for

A

responsible for the transmission of data between hosts in different networks as well as routing of data packets. This layer is implemented through the use of devices such as routers and some switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Transport Layer of the OSI Model for

A

provides services to the application layer and receives services from the network layer. It is responsible for the reliable delivery of data. It segments and reassembles data in the correct order for it to be sent to the receiving device. It may also handle the reliable delivery of data and any retries of data that are lost or corrupted (for example, TCP does this). This layer is often called the heart of OSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Session Layer of the OSI Model for

A

responsible for connection establishment, session maintenance, and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Presentation Layer of the OSI Model for

A

responsible for translating data from the application layer into the format required to transmit the data over the network as well as encrypting the data for security if encryption is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Application Layer of the OSI Model for

A

responsible for network applications (like HTTP or FTP) and their production of data to be transferred over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What number is each layer of the OSI model

A

physical 1, data link 2, network 3, transport 4, session 5, presentation 6, application 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of network devices are found at layer 1

A

modem, hub, repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What types of network devices are found at layer 2

A

modem, switch, repeater

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What types of network devices are found at layer 3

A

switch, router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the different types of Cat cables and what are their speeds and lengths

A

Cat3 supports up to 10 Mbps (Megabits per second) for up to 100 meters and is commonly used for phone lines today.
Cat4 supports 16 Mbps for up to 100 meters and is not commonly used today.
Cat5 is used in Ethernet LANs containing two twisted pairs allowing for up to 100 Mbps up to 100 meters between the device and the switch, hub, or router. This has been practically replaced by the Cat5e specification.
Cat5e doubles the number of twisted pairs to four for up to 1 Gbps (Gigabits per second) over up to 100 meters.
Cat6 is also used in Ethernet LANs and data centers. Cat6 is made up of four tightly woven twisted pairs (more twists per linear foot) and supports 1 Gbps for up to 100 meters or 10 Gbps for up to 55 meters.
Cat6a is an improvement of the Cat6 standard, supporting the same standards and lengths (with the ability to run 10 Gbps over 100 meters maximum), but using a higher quality cable that is more resistant to interference. This is most commonly used in wired networks today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the different types of Cat connectors and what are they for

A

RJ11: A connector that supports two pairs of wires (four total); typically used in telephones.
RJ45: This is an end connector typically used with Ethernet cables and supports four pairs (eight wires).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the types of fiber cables

A
  1. Single-mode cables are made up of one single glass or plastic fiber. The benefit of a single fiber cable is the ability to carry higher bandwidth for 50 times the distance of a multimode cable. This requires higher cost electronics to create the light and thus is typically used for longer distances (hundreds or thousands of kilometers) and higher bandwidth applications.
  2. Multimode cables are wider in diameter due to light modes being sent across the cable. Multimode fibers are highly effective over medium distances (500 meters or less at higher speeds) and are generally used within a LAN. They are also less expensive than single-mode fiber due to the potential for use with LEDs and other lower-cost options for creating the light.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the primary connectors for fiber cables

A

ST: This stands for a straight tip connector. This was the most commonly used connector with multimode fiber until the mid-2000s. It was used on campuses, corporate networks, and for military purposes. Today, LC connectors are usually used instead, as they are denser and more convenient at almost the same cost.

LC: This stands for lucent connector. This is a smaller version of the standard connector (SC). This supports more ports to be used in the same space. This is probably the most common type used in corporate data centers today and is usually used with SFP (small form-factor pluggable) transceivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are crossover cables used for

A

to connect 2 computing devices of the same type directly to each other. accomplished via their NIC or switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are patch cables used for

A

used to connect a device to a wall outlet, which is wired to the patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is ‘ping’ used for and how does it work

A

for testing connectivity to other hosts. sends an ICMP echo request and listens to a reply. Displays the time it took and the TTL left.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is ‘traceroute/tracert’ used for and how does it work

A

displays the route an IP packet takes to a destination and the time it takes. traceroute for Linux and tracert for Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is ‘tracepath’ used for and how does it work

A

similar to traceroute but does not need superuser privileges. used on Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is ‘ipconfig’ used for and how does it work

A

displays IP, subnet mask, default gateway for each network adapter by default with the /all option which displays MAC address, DHCP status, and lease information. /release all connections /renew adapters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is ‘ifconfig’ used for and how does it work

A

similar to ipconfig but for linux.

29
Q

What is ‘arp’ used for and how does it work

A

displays the IP to physical (MAC) address mappings for hosts that have been discovered in the ARP cache. ARP can be used to add, remove, or modify entries in the ARP cache. The hosts need to be on the local network, as these addresses are discovered by broadcasting to everyone on the network and noting the reply from the owner; broadcast traffic is not allowed through a router so that the system will maintain the MAC address of the router.

30
Q

What is ‘netstat’ used for and how does it work

A

displays information about active ports and their state and can be useful in troubleshooting and capacity management. The command netstat -r displays routing information for network adapters. It is available in Windows, MacOS, and Linux.

31
Q

What is ‘nslookup’ used for and how does it work

A

displays information for displaying DNS information and troubleshooting DNS problems. It is useful in displaying names to IP address mappings. nslookup -type=a www.example.com

32
Q

What is ‘dig’ used for and how does it work

A

used to query the DNS name servers. It is helpful in troubleshooting DNS problems. It is also used for lookups and will display answers from the query. It is a replacement for nslookup.

33
Q

What is ‘whois’ used for and how does it work

A

look up who owns a domain or block of IP addresses on the internet, including name, email address, and physical address. However, there are many privacy options that hide this information from being returned. It is primarily used in Linux.

34
Q

What is ‘route’ used for and how does it work

A

display the current route tables on a host. Route can also be used to add or remove routes. This is used by the local host to determine where to send traffic (0.0.0.0 means the default gateway, where the router sends things if it is not otherwise defined in the routing table).

35
Q

What is ‘scp’ used for and how does it work

A

SCP (Secure Copy Protocol) command is used to securely copy files between servers, leveraging SSH (secure shell) for authentication and encryption.

36
Q

What is ‘ftp’ used for and how does it work

A

in the clear copying of files from one host to another using TCP

37
Q

What is ‘tftp’ used for and how does it work

A

transfers a file from either a client to a server or from a server to a client using UDP instead of TCP

38
Q

What is ‘finger’ used for and how does it work

A

isplays information about a user or users on a remote system, including things such as last log-in time and username. It is used in Linux.

39
Q

What is ‘nmap’ used for and how does it work

A

scans networks to see what it can find in terms of hosts and open ports (including well-known ones for many applications). It is commonly used to determine what is deployed on a network for vulnerability analysis, security scans, and related activities. Nmap is not native to either Linux or Windows but can be downloaded for free and used with both.

40
Q

What is ‘tcpdump’ used for and how does it work

A

displays TCP/IP packets and other network packets that are being transmitted over the network. sniffer that can be used on Linux and Windows

41
Q

What is ‘telnet/ssh’ used for and how does it work

A

allows user to manage accounts and devices remotely. SSH is encrypted and telnet is not

42
Q

What is a client-server network model

A

a distinct server and a distinct client. The server is the system that stores data and information. The client is the machine that needs access to that data.

43
Q

What is peer-to-peer P2P model

A

Each machine on the network can act as both server and client, sometimes requesting data from other nodes and sometimes answering requests from others. Bitcoin and Tor are examples of peer-to-peer networks.

44
Q

What is a bus topology

A

a single line of devices connected together by one shared network cable. the computers communicate in half-duplex mode. all computers receive all traffic sent.

45
Q

What is a ring topology

A

uses a token ring or FDDI thats passed around so only who has it can communicate to avoid collisions.

46
Q

What is a star topology

A

most common topology composed of a central network device such as a switch which is connected to network devices by individual network cables.

47
Q

What is a mesh topology

A

either a full mesh, where every node has access to all other nodes, or a partial mesh network, where each node is only able to connect to a subset of the other nodes. mostly connected using Wi-Fi, radio signals, or VPNs

48
Q

What is centralization

A

connecting to a central server for computing and networking power. give instructions or commands on your end and the server computes it, returning the results to your display. This was used in old mainframe computers and now used in cloud computing

49
Q

What is decentralization

A

Computers do not rely on each other and there is no central data center. everything is done on individual computers

50
Q

What are the differences between wired and wireless networks?

A

wireless networks allows for portability but you may encounter dead spots and interference. Wired networks are much more stable and can exceed the bandwidth of the wireless network

51
Q

What is virtualization

A

allows a single host to host many different virtual machines or to create network devices on demand, such as virtual routers and firewalls

52
Q

What is a hypervisor

A

uses software to create virtual hardware.

53
Q

What do you call an OS on a VM and an OS on the main hardware

A

guest OS. the underlying OS is called the host OS

54
Q

How do you allow VMs to communicate with each other

A

by installing virtual network adapters

55
Q

What are the 2 types of hypervisors

A

Type 1 (bare metal) and Type 2 (hosted).

56
Q

What are type 1 hypervisors

A

VMware ESXi or KVM. They are OSs that natively run virtual machines and are intended to be installed on a dedicated bare metal server. They have complete access to the underlying hardware. You must use a web browser on a separate machine to administer the hypervisor

57
Q

What are type 2 hypervisors

A

VMware Workstation. installed as an application within the existing OS. does not have direct access to the physical hardware but instead has to send all requests through the host OS

58
Q

What are some common cloud providers

A

Amazon (AWS), Google (GCP), and Microsoft (Azure)

59
Q

What are the characteristics of cloud computing

A

on-demand, self-service, resource pooling, elastic, accessible, and measurable

60
Q

What is IaaS

A

the CSP maintains physical servers, storage, and network infrastructure that is required to create VMs

61
Q

What is a Virtual Private Cloud (VPC)

A

virtual networks that allow VMs to communicate with each other that are isolated from others. may also have routers and firewalls that allow your VMs access to the internet or other data centers.

62
Q

What is PaaS

A

CSP is responsible for the virtual servers and sometimes the services that run on top of them such as a database engine.

63
Q

What is SaaS

A

pretty much anything that you consume over the internet like Office 365, Facebook, Salesforce, WGU courses

64
Q

What is a private cloud deployment model

A

where the resources are owned by a single customer or organization. The company may lease space in a commercial data center and operate the equipment there. This is usually referred to as co-locating, or a “co-lo” solution, because the company is co-locating its equipment with the commercial data center’s equipment.

65
Q

What is a public cloud deployment model

A

CSP is responsible for maintaining the hardware and repairing the infrastructure instead of the customer

66
Q

What is multi-tenancy in cloud

A

when multiple customers share the same physical resource

67
Q

What is a community cloud deployment model

A

uncommon model in which data centers are jointly owned and operated by multiple entities.

68
Q

What is a hybrid cloud deployment model

A

refers to a combination of private cloud and public cloud and is most commonly associated with companies that extend their applications and services between their own data center and that of a public cloud provider’s.

69
Q

What is a multi-cloud deployment model

A

the concept of leveraging the services of multiple public cloud providers, such as hosting your website at AWS and GCP and balancing the users between these providers. This concept, in practice, can add redundancy and flexibility.