Terms Flashcards

To memorize definitions of terms.

1
Q

A network protocol and software program used to access remote computers and terminals over the internet.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer 7 of OSI Model. Network processes to applications. Provides access for users.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 6 of OSI Model. Ensures data is readable by receiving systems. Data representation/Syntax.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 5 of OSI Model. Inter-host communication. Examples include Net-bios, PPTP.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 4 of OSI Model. End to end connections. Message segmentation. Handles transportation issues between host. Examples: TCP/IP and UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 of OSI Model. Data Delivery. Switches. Selects the best path to deliver data. OSPF, BGP, IS-IS. IP addresses.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 2 of OSI Model. Access to media. Defines how data is formatted for transmission and how access to the network is controlled. Ethernet. Mac Address.

A

Datalink Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 1 of OSI Model. Binary Transmission. All 1’s and 0’s Bits level.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The language a computer uses to access the internet. A transport layer protocol that is used to create connection between remote computers by transporting and ensuring the delivery of messages over supporting networks and the Internet. One of the most used protocols.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An addressing device that acts as a hardware identifier.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cryptographic protocol and interface for executing network services, shell services, and secure network communication with a remote computer.

A

SSH (secure shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Part of the Internet Protocol suite used by programs running on different computers on a network. It is used to send short messages called datagrams but overall is unreliable and connectionless.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

has a Binary range of 0.0.0.0 to 127.255.255.255 Network address is its first 8 bits. Starts with Binary 0.

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

has a Binary range of 128.0.0.0 to 191.255.255.255 Network address is first 8 bits. Starts with Binary 1 0

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

has a Binary range 192.0.0.0 to 223.255.255.255 Network address is first 24 bits. Starts with Binary 1 1 0

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

multicast with a Binary range of 224.0.0.0 to 239.255.255.255 Starts with a Binary 1 1 1 0

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

has a binary range of 240.0.0.0 to 255.255.255.255 Starts with Binary 1 1 1 1. Is reserved for broadcasts.

A

Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a connectionless protocol used in packet-switched layer networks, such as Ethernet. It provides the logical connection between network devices by providing identification for each device.

A

IPv4 (Internet Protocol Version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks. Is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4. It allows for 2128 possible node, or address, combinations.

A

IPv6 (Internet Protocol Version 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

host sends data to all devices on a specific network. Binary 1’s in the entire host partition of the address. 172.31.255.255

A

Directed Broadcast Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

used to let a system send a message to itself for testing. This is very useful to make sure that the TCP/IP stack is correctly installed on a machine.

A

Local Loopback Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a way to forward traffic between different VLAN by implementing a router in the network.

A

interVLAN Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Command line mode that has the least amount of commands available and does not need authentication. Notated by a > symbol - Router>

A

User Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Command line mode that allows you to use many show commands, debugging, and is required to configure the device. Notated by a # symbol - Router#
Enable/Privilege Mode
26
Command line mode that allows you to change global parameters of the configuration of the device including hostname and banner motd(message of the day). Notated by a (config)# - Router(config)# conf t
Global Configuration Mode
27
Command line mode that allows you to change the interface configuration (IP Address or enable/disable interface). Notated by a (config-if)# - Router(config-if)# int
Interface Mode
28
Command line mode that allows you to configure option on console, auxiliary, or vty ports. Notated by a (config-line)# - Router(config-line)# line console 0
Line Mode
29
a command line interface created in a router and used to facilitate a connection to the daemon via Telnet, a network protocol used in local area networks.
Virtual Teletype (VTY)
30
Command prompt command that searches queries all MAC addresses in the same IP range as the endpoint running the command.
arp -a
31
Uses a single cable where each device taps into by using either a vampire tap or a T-connector. Ex. LAN party
Bus Topology
32
Uses a cable in a circular loop. However, it can cause packet collision
Ring Topology
33
Circular topology that uses permission based transmission. Ex - the talking ring in grade school.
Token Ring Topology
34
New standard of token ring.
FDDI Ring
35
Most popular physical LAN topology. All devices connect to a single point.
Star Topology
36
similar to star topology but w/ WAN links instead of LAN connections. Is used to connect multiple sites.
Hub and Spoke Topology
37
The most optimal network topology due to optimal routing always being available because every node connects to every other node.
Full-mesh Topology
38
A hybrid of Full-mesh Topology and Hub and Spoke Topology. It provides optimal fail over for main traffic but not for less important connections.
Partial Mesh Topology
39
This uses a WAP as a centralized point and supports wireless security controls.
Infrastructure Mode
40
A de-centralized wireless network which creates peer to peer connecting and does not require a router or AP
Ad-hoc Mode
41
Interconnection of different types of nodes, devices, and radios.
Wireless Mesh Topology
42
Data name for Layer 1(Physical Layer) of the OSI Model
Bits
43
Data name for Layer 2 (Datagram Layer) of the OSI Model
Frames
44
Data name for Layer 3 (Networking Layer) of the OSI model
Packets
45
Data name of Layer 4 (Transport Layer) of the OSI model
Segments(TCP), Datagrams(UDP)
46
Data name for Layer 5 (Session Layer), Layer 6 (Presentation Layer), and Layer 7 (Application Layer)
Data
47
Start stop transmission similar to morris code.
Asynchronous
48
Uses a reference clock to coordinate transmissions by both sender and receiver
Synchronous
49
Provides connection services and allows ack of receipt of messages.
LLC (Logical Link Control)
50
Connection oriented protocol that uses a three-way handshake to create a reliable way to transport segments across a network.
TCP (Transmission Control Protocol)
51
Connection-less protocol that is an unreliable way to transport segments across the network. Used for streaming audio and video.
UDP (User Datagram Protocol)
52
Allows the clients to adjust the amount of data in each segment
Windowing
53
Used to setup, maintain, and tear down voice and video connections.
H.323
54
Where the outer WAN ends and your LAN begins.
Demarcation Point
55
Central point of a network hub
Backbone switch
56
Uses HSRP to create virtual IP and MAC addresses to provide to active and sturdy routers
First Hop Redundancy
57
Combines multiple physical connections into a single logical connection to minimize or prevent congestion
Link Aggregation (IEEE 802.3ad)
58
Forwards traffic based on different priority markings
QoS(Quality of Signal)
59
Permits redundant links between switches and prevents looping of network
STP (Spanning Tree Protocol)
60
Allows different logical networks to share the same physical hardware and provides added security and efficiency
VLAN
61
Multi-vlan transmission over the same physical cable
VLAN trunking (802.1q)
62
The default subnet mask for a given IP
Classful Mask
63
Allows for the borrowing of the host bits and reassigning them to the net portion.
CIDR (Class-less Inter-Domain Routing)
64
Allows for the use of a classless subnet mask to create smaller networks with fewer hosts in each network
Subnetting
65
Prevents a route learned on one interface from being advertised back out of that same interface.
Split Horizon
66
Causes a route received on one interface to be advertised back out of that same interface w/ a metric considered to be infinite(very high cost)
Poison Reverse