Terms Flashcards

To memorize definitions of terms.

1
Q

A network protocol and software program used to access remote computers and terminals over the internet.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer 7 of OSI Model. Network processes to applications. Provides access for users.

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 6 of OSI Model. Ensures data is readable by receiving systems. Data representation/Syntax.

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 5 of OSI Model. Inter-host communication. Examples include Net-bios, PPTP.

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 4 of OSI Model. End to end connections. Message segmentation. Handles transportation issues between host. Examples: TCP/IP and UDP.

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 of OSI Model. Data Delivery. Switches. Selects the best path to deliver data. OSPF, BGP, IS-IS. IP addresses.

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 2 of OSI Model. Access to media. Defines how data is formatted for transmission and how access to the network is controlled. Ethernet. Mac Address.

A

Datalink Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 1 of OSI Model. Binary Transmission. All 1’s and 0’s Bits level.

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The language a computer uses to access the internet. A transport layer protocol that is used to create connection between remote computers by transporting and ensuring the delivery of messages over supporting networks and the Internet. One of the most used protocols.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An addressing device that acts as a hardware identifier.

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A cryptographic protocol and interface for executing network services, shell services, and secure network communication with a remote computer.

A

SSH (secure shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Part of the Internet Protocol suite used by programs running on different computers on a network. It is used to send short messages called datagrams but overall is unreliable and connectionless.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

has a Binary range of 0.0.0.0 to 127.255.255.255 Network address is its first 8 bits. Starts with Binary 0.

A

Class A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

has a Binary range of 128.0.0.0 to 191.255.255.255 Network address is first 8 bits. Starts with Binary 1 0

A

Class B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

has a Binary range 192.0.0.0 to 223.255.255.255 Network address is first 24 bits. Starts with Binary 1 1 0

A

Class C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

multicast with a Binary range of 224.0.0.0 to 239.255.255.255 Starts with a Binary 1 1 1 0

A

Class D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

has a binary range of 240.0.0.0 to 255.255.255.255 Starts with Binary 1 1 1 1. Is reserved for broadcasts.

A

Class E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a connectionless protocol used in packet-switched layer networks, such as Ethernet. It provides the logical connection between network devices by providing identification for each device.

A

IPv4 (Internet Protocol Version 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

an Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks. Is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4. It allows for 2128 possible node, or address, combinations.

A

IPv6 (Internet Protocol Version 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

host sends data to all devices on a specific network. Binary 1’s in the entire host partition of the address. 172.31.255.255

A

Directed Broadcast Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

used to let a system send a message to itself for testing. This is very useful to make sure that the TCP/IP stack is correctly installed on a machine.

A

Local Loopback Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

a way to forward traffic between different VLAN by implementing a router in the network.

A

interVLAN Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a group of devices on one or more LANs that are configured to communicate as if they were attached to the same wire.

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Command line mode that has the least amount of commands available and does not need authentication. Notated by a > symbol - Router>

A

User Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Command line mode that allows you to use many show commands, debugging, and is required to configure the device. Notated by a # symbol - Router#

A

Enable/Privilege Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Command line mode that allows you to change global parameters of the configuration of the device including hostname and banner motd(message of the day). Notated by a (config)# - Router(config)#

conf t

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Command line mode that allows you to change the interface configuration (IP Address or enable/disable interface). Notated by a (config-if)# - Router(config-if)#

int

A

Interface Mode

28
Q

Command line mode that allows you to configure option on console, auxiliary, or vty ports. Notated by a (config-line)# - Router(config-line)#

line console 0

A

Line Mode

29
Q

a command line interface created in a router and used to facilitate a connection to the daemon via Telnet, a network protocol used in local area networks.

A

Virtual Teletype (VTY)

30
Q

Command prompt command that searches queries all MAC addresses in the same IP range as the endpoint running the command.

A

arp -a

31
Q

Uses a single cable where each device taps into by using either a vampire tap or a T-connector. Ex. LAN party

A

Bus Topology

32
Q

Uses a cable in a circular loop. However, it can cause packet collision

A

Ring Topology

33
Q

Circular topology that uses permission based transmission. Ex - the talking ring in grade school.

A

Token Ring Topology

34
Q

New standard of token ring.

A

FDDI Ring

35
Q

Most popular physical LAN topology. All devices connect to a single point.

A

Star Topology

36
Q

similar to star topology but w/ WAN links instead of LAN connections. Is used to connect multiple sites.

A

Hub and Spoke Topology

37
Q

The most optimal network topology due to optimal routing always being available because every node connects to every other node.

A

Full-mesh Topology

38
Q

A hybrid of Full-mesh Topology and Hub and Spoke Topology. It provides optimal fail over for main traffic but not for less important connections.

A

Partial Mesh Topology

39
Q

This uses a WAP as a centralized point and supports wireless security controls.

A

Infrastructure Mode

40
Q

A de-centralized wireless network which creates peer to peer connecting and does not require a router or AP

A

Ad-hoc Mode

41
Q

Interconnection of different types of nodes, devices, and radios.

A

Wireless Mesh Topology

42
Q

Data name for Layer 1(Physical Layer) of the OSI Model

A

Bits

43
Q

Data name for Layer 2 (Datagram Layer) of the OSI Model

A

Frames

44
Q

Data name for Layer 3 (Networking Layer) of the OSI model

A

Packets

45
Q

Data name of Layer 4 (Transport Layer) of the OSI model

A

Segments(TCP), Datagrams(UDP)

46
Q

Data name for Layer 5 (Session Layer), Layer 6 (Presentation Layer), and Layer 7 (Application Layer)

A

Data

47
Q

Start stop transmission similar to morris code.

A

Asynchronous

48
Q

Uses a reference clock to coordinate transmissions by both sender and receiver

A

Synchronous

49
Q

Provides connection services and allows ack of receipt of messages.

A

LLC (Logical Link Control)

50
Q

Connection oriented protocol that uses a three-way handshake to create a reliable way to transport segments across a network.

A

TCP (Transmission Control Protocol)

51
Q

Connection-less protocol that is an unreliable way to transport segments across the network. Used for streaming audio and video.

A

UDP (User Datagram Protocol)

52
Q

Allows the clients to adjust the amount of data in each segment

A

Windowing

53
Q

Used to setup, maintain, and tear down voice and video connections.

A

H.323

54
Q

Where the outer WAN ends and your LAN begins.

A

Demarcation Point

55
Q

Central point of a network hub

A

Backbone switch

56
Q

Uses HSRP to create virtual IP and MAC addresses to provide to active and sturdy routers

A

First Hop Redundancy

57
Q

Combines multiple physical connections into a single logical connection to minimize or prevent congestion

A

Link Aggregation (IEEE 802.3ad)

58
Q

Forwards traffic based on different priority markings

A

QoS(Quality of Signal)

59
Q

Permits redundant links between switches and prevents looping of network

A

STP (Spanning Tree Protocol)

60
Q

Allows different logical networks to share the same physical hardware and provides added security and efficiency

A

VLAN

61
Q

Multi-vlan transmission over the same physical cable

A

VLAN trunking (802.1q)

62
Q

The default subnet mask for a given IP

A

Classful Mask

63
Q

Allows for the borrowing of the host bits and reassigning them to the net portion.

A

CIDR (Class-less Inter-Domain Routing)

64
Q

Allows for the use of a classless subnet mask to create smaller networks with fewer hosts in each network

A

Subnetting

65
Q

Prevents a route learned on one interface from being advertised back out of that same interface.

A

Split Horizon

66
Q

Causes a route received on one interface to be advertised back out of that same interface w/ a metric considered to be infinite(very high cost)

A

Poison Reverse