Section 14: Network Configurations Flashcards

OBJ 2.1, 2.5, 2.6

1
Q

TCP/IP

A

Transmission Control Protocol / Internet Protocol Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Link/Network Interface Layer

A

Responsible for putting frames in the physical network’s transmission media
Media could be twisted pair cable, fiber optic, or radio waves
In this layer, data can only travel through the LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Internet Layer

A

“Where to send those packets”
Used to address packets and route them across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer

A

“How to send the packets”
Shows how to send the packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Application Layer

A

Contains all the protocols that perform higher level functions, such as email, file transfers, encryption, and others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transmission Control Protocol (TCP)

A

can have a connection oriented method of sending packets but slower than UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

User Datagram Protocol (UDP)

A

connectionless protocol with lower overhead so its faster than TCP, but the delivery is not guaranteed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layers of TCP/IP

A
  1. Application Layer : what to do with the data
    3.Transport Layer: how to send the data (TCP or UDP)
  2. Internet Layer: where to send the data
  3. Link/Network Interface Layer: sends data across the LAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet Protocol version 4 (IPv4)

A

formed out of 4 numbers (each called an octet), in a dotted-decimal notation from 0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Subnet Mask

A

Formatted like an IPv4 address.
A portion is the network bits, other portion is the host bits

Example:
192.168. 1 .4
192.168. 1 .50
255.255.255.0
Because the first 3 octets in the subnet mask are 255, it tells us the last octet contains the host bit for the IPv4 addresses, so 1 and 50 are the host bits. That means they are on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv4 Classes

A

To identify the class for a IPv4, look at the first octet

Class| 1st Octet | Default Subnet Mask | Possible Hosts
___________________________________________________________
A | 1-127 | 255.255.255.0 N.H.H.H | 16.7 million (256^3)
B | 128-191 | 255.255.0.0 N.N.H.H | 65,536 (256^2)
C | 192-223 | 255.255.255.0 N.N.N.H | 256
D | 224-239 | N/A Multicast Address | N/A
E | 240-255 | N/A R&D purposes | 268 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multicast Address

A

A logical identifier for a group of hosts in a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Classful Mask

A

Default subnet mask for a given class of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Classless Inter-Domain Routing (CIDR)

A

Allows for borrowing some of the host bits and reassigning them to the network portion

CIDR Notation:
The number of consecutive 1s
192.168.1.4 255.255.255.0 -> 192.168.1.4/24
192.168.1.4 255.255.255.192 -> 192.168.1.4/26
24 turns into 26 because 2 bits borrowed from host bits

CIDR Notation for classes:
A: /8
B: /16
C: /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Subnetting

A

Allows you to use a classless subnet mask to create smaller networks with fewer hosts in each of those networks than you could if you had a classful subnet mask by itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Public IP (Routable)

A

Can be accessed over the internet and is assigned to the network by an ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Private IP (Non-routable)

A

Can be used by anyone any time, but only within their own LANs
Start with either 10, 172, or 192

A | 10 | 10.0.0.0 - 10.255.255.255 | 16.7 million
B | 172.16-172.31 | 172.16.0.0 - 172.31.255.255 | 1.05 million
C | 192.168 | 192.168.0.0 - 192.168.255.255 | 65,536

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Address Translation (NAT)

A

allows for routing of private IPs through a public IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Loopback Address (127.0.0.1)

A

Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system
All IPs in the range of 127.0.0.0 to 127.255.255.255 are loopback addresses
localhost always resolves to 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Automatic Private IP Addresses (APIPA)

A

Used when a device does not have a static IP address or cannot reach a DHCP server
Looks like 192.254.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Static Assignment

A

Manually type the IP address for the host, its subnet mask, default gateway, and DNS server
Impractical on large scale intranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Dynamic Assignment

A

Dynamic allocation of IP addresses
Done automatically by the network’s DHCP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Domain Name System (DNS)

A

Used to convert human readable web addresses into machine readable IP addresses
The internet’s version of a phone book

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Windows Internet Name Service (WINS)

A

Identifies NETBIOS systems on a TCP/IP network and converts those NETBIOS names to IP addresses
Used in LANs, like a DNS but only works in a Windows domain system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Bootstrap Protocol (BOOTP)

A

Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to network
Oldest system
When a client booted up their system, it would send its MAC address to the server and it would receive its preassigned IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Dynamic Host Configuration Protocol (DHCP)

A

Assigns an IP based on an assignable scope or addresses and provides the ability to configure other options
Each IP is leased for a period of time and returns to the pool when the lease expires
Automatically configures the IP address, subnet mask, default gateway, and DNS/WINS server.
Eliminates configuration errors

27
Q

Zero Configuration (ZeroConf)

A

New technology that provides the same functionality as APIPA but has more features, such as:
Assigning an IPv4 link-local address, a form of non-local IP, but can now resolve computer names to IP addresses without the need for DNS using mDNS (multicast DNS). It can also perform service discovery on the network to find systems available for use.

Bonjour on Apple
Link-Local Multicast Name Resolution (LLMNR) on Windows
SystemD on Linux

28
Q

Scope

A

list of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet

29
Q

DHCP Reservation

A

excludes some IP addresses from being handed to devices unless they meet a certain condition

30
Q

DHCP steps

A

D-O-R-A
Discover an IP address
Offer an address from a scope
Request to take the IP
Acknowledge the IP will be taken

31
Q

Fully-Qualified Domain Name (FQDN)

A

Domain name under a top-level provider
(service).(domain name).(top level domain)
www.diontraining.com
ftp.diontraining.com

32
Q

DNS Heirarchy

A

Root: Answers requests in the root zone
Top-Level Domain: ex: .uk .com .net
Second-Level domain: ex: diontraining
Subdomain: ex: support.diontraining.com
Host: refers toa specific machine server

33
Q

Uniform Resource Locator (URL)

A

contains the FQDN with the method of accessing information

34
Q

DNS Records

A

A | Address | Links a hostname to an IPv4 address
AAAA | Address | Links a hostname to an IPv6 address
CNAME| Canonical Name| Points a domain to another domain or subdomain
MX | Mail Exchange | Directs emails to a mail server
TXT | Text | Adds text into the DNS
NS | Nameserver | Indicates which DNS nameserver has the authority

35
Q

Sender Policy Framework (SPF)

A

DNS record that identifies the host authorized to send mail for the domain

36
Q

DomainKeys Identified Mail (DKIM)

A

Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record

37
Q

Domain-based Message Authentication, Reporting & Conformance (DMARC)

A

Framework that is used for proper application of SPF and DKIM, utilizing a policy that’s published as a DNS record
can use SPF or DKIM or both

38
Q

Nameserver

A

Type of DNS server that stores all the DNS records for a given domain

39
Q

Internal DNS

A

allows cloud instances on the same network to access each other using internal DNS names

40
Q

External DNS

A

Records created around the domain names from a central authority and used on the public internet

41
Q

Time to Live (TTL)

A

tells the DNS resolver how long to cache a query before requesting a new one
basically telling a computer how long to remember a DNS record before requesting it again

42
Q

DNS Resolver/DNS Cache

A

Makes a local copy of every DNS entry it resolves when connecting to websites

43
Q

Recursive Lookup

A

DNS server communicates with several other DNS servers to hunt down the IP address and return it to the client

44
Q

Iterative Lookup

A

Each DNS server responds directly to the client with a DNS server that may have the correct IP address

45
Q

Virtual Local Area Network (VLAN)

A

Allows different logical networks to share the same physical hardware and provides added security and efficiency

46
Q

VLAN Trunking (802.1q)

A

Multiple VLANs transmitted over the same physical cable
Each VLAN is identified using a 4 byte identifier

47
Q

4-byte Identifier

A

Tag Protocol Identifier (TPI)
Tag Control Identifier (TCI)

48
Q

Virtual Private Network (VPN)

A

Extends a private network across a public network and enables sending and receiving data across shared or public networks

Site to site: connect two offices together
Client to site: connect a remote user to a corporate network
Clientless: used for web browsing

49
Q

Full Tunnel VPN

A

Better security
Routes and encrypts all network requests through the VPN connection back to the headquarters

50
Q

Split Tunnel VPN

A

Better performance
Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet

51
Q

Clientless VPN

A

Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client

52
Q

Secure Socket Layer (SSL)

A

provides cryptography and reliability using the upper layers of the OSI model (Layers 5, 6, 7)

53
Q

Transport Layer Security (TLS)

A

provides secure web browsing over HTTPS

54
Q

Address Exhaustion

A

Running out of network addresses in IPv4

55
Q

IPv6

A

Larger address space
Removes IPv4’s broadcast data flow type
No packet or datagram fragmentation
Simplified header

Uses hexadecimal digits to allow the use of shorthand notation
made up of eight segments separated by a colon

56
Q

Dual Stack

A

simultaneously runs both the IPv4 and IPv6 protocols on the same network devices

57
Q

Tunneling

A

Allows an existing IPv4 router to carry IPv6 traffic

58
Q

Unicast Addresses

A

Used to identify a single interface

Globally-routed: similar to IPv4’s unicast Class A, B, and C addresses and beings with 2000-3fff
Link-local: Used like a private IP in IPv4 that can only be used on the LAN and begins with FE80

59
Q

Stateless Address Autoconfiguration (SLAAC)

A

Eliminates the need to obtain addresses or other config information from a central server
Uses a process called Extended Unique Identifier (EUI) to allow a host to assign itself a unique 64-bit IPv6 interface identifier called a EUI-64

60
Q

Multicast Addresses

A

Used to identify a set of interfaces and begins with FF

61
Q

Anycast Address

A

Used to identify a set of interfaces so that a packet can be sent to any member of a set

62
Q

DHCPv6 Protocol

A

Allows DHCP to automatically assign addresses from a DHCPv6 server

63
Q

Neighbor Discovery Protocol

A

Used to determine the Layer 2 addresses (MAC addresses) that are on a given network