Udemy-Domain 4 Flashcards
the 3 types of network communication are:
- Simplex (one way)
- Half-Duplex (one way at a time, reciprocating)
- Full-Duplex (simultaneous two-way)
___ networks have one channel, whereas ___ networks have multiple channels that can be used simultaneously
Baseband; Broadband
the ___ is a global collection of peered WAN networks,
the ___ is an organizations private network,
the ___ is a connection between private networks
Internet;
Intranet;
Extranet
data is normally sent over the internet using ___ switching, but ___ switching is a way to guarantee full bandwidth and no delays due to routing
packet; circuit
___ gives specific internet traffic priority so that it will be close to real-time (like VOIP)
QoS (Quality of Service)
a ___ is used for supporting mobile customers across a number of wireless LAN’s, satellite coverage areas, etc.
GAN (Global Area Network)
wire and cable types belong to OSI layer ___
1 (Physical)
network topologies belong to OSI layer ___
1 (Physical)
threats related to EMI, sniffing, interference, etc. belong to OSI layer ___
1 (Physical)
the ___ OSI layer connects nodes in the same network
2 (Data Link)
LLC (Logic Link Detection) error detection belongs to OSI layer ___
2 (Data Link)
the first ___ bits of a MAC address identify the manufacturer (UOI - Unique Organization Identifier)
24 (6 hexadecimal characters)
a devices MAC address is also called its ___
BIA (Burned In Address)
the last ___ bits of a MAC address identify the unique device (UAA - Universally Administered Address)
24 or 40
ARP (Address Resolution Protocol) belongs to OSI layer ___
2 (Data Link) and 3 (Network)
CSMA (Carrier Sense Multiple Access) belongs to OSI layer ___ (CD for ethernet and CA for wireless)
2 (Data Link)
Token Passing belongs to OSI layer ___
2 (Data Link)
most protocols that start with “I” (except IMAP) like IP, ICMP, IPSEC… belong to OSI layer ___
3 (Network)
a large number of protocol attacks (ping floods, smurf, spoofs, etc.) occur on OSI layer ___
3 (Network)
SSL/TLS operate from OSI layer ___ through layer ___
4 (Transport); 7 (Application)
UDP (User Datagram Protocol) flood attacks are called ___ and occur on OSI layer ___
Fraggle; 4 (Transport)
TCP SYN attacks, or SYN floods occur on OSI layer ___
4 (Transport)
Fraggle attacks are often more successful than Smurf attacks because
many networks block ICMP but not UDP
VIOP and other real-time applications use UDP because ___
they cannot afford the overhead of delivery confirmation
the 9 control bit flags in TCP function on OSI layer ___
4 (Transport)
establishing (as well as maintaining and terminating) connections between applications is done in OSI layer ___
5 (Session);
the only OSI layer with no protocols is layer ___
6 (Presentation)
formatting, compressing and file encryption are done on OSI layer ___
6 (Presentation)
data is actually presented to the user on OSI layer ___
7 (Application)
protocols such at HTTP, HTTPS, FTP, SNMP, IMAP and POP all function on OSI layer ___
7 (Application)
non-repudiation, certificates, application proxies, deep packet inspection, content inspection and AD (Active Directory) integration all happen on OSI layer ___
7 (Application)
Viruses, worms, trojans, buffer overflow and application/OS vulnerability attacks all happen on OSI layers ___ through ___
5 (Session); 7 (Application)
in the TCP/IP model, the ___ layer includes all the communication within a single network segment, which corresponds to OSI layer(s): ___
Link; 1 (Physical) and 2 (Data Link)
in the TCP/IP model, the ___ layer includes all the communication between independent networks, which corresponds to OSI layer(s): ___
Internet; 3 (Network)
in the TCP/IP model, the ___ layer includes all host-to-host communication, which corresponds to OSI layer(s): ___
Transport; 4 (Transport)
in the TCP/IP model, the ___ layer includes all processing of data exchanges for applications, which corresponds to OSI layer(s): ___
Application; 5 (Session), 6 (Presentation) and 7 (Application)
the process of sending and receiving packets of data, adding headers to packets, etc. are in the ___ layer of the TCP/IP model
Link and Physical
the process of routing packets to their final destination and resolving addresses is on the ___ layer of the TCP/IP model
Internetwork
the process of establishing data channels and port addressing for applications is on the ___ layer of the TCP/IP model
Transport
the protocols used by applications (user protocols like HTTP, IMAP, etc.) as well as firewalls operate on the ___ layer of the TCP/IP model
Application
an IP address and a Port taken together are called a ___, and one difference between TCP and UDP is that ___
socket; TCP uses a pair of sockets (source and destination)
since IPv6 requires a 64 bit MAC address, when a device has only 48 bits the characters ___ are added to the end
FF:FE
IPv4 only allowed for ___ individual addresses
4 billion
to capture all unicast (client/server) traffic, configure a NIC in ___ mode and configure the switch port being used as a ___
promiscuous; span port
in ___ traffic, data is being sent to a pre-defined list of clients
multicast
Broadcast traffic is sent to ___, if it is layer 3 (IP address) or layer 2 (MAC address) broadcast then ___, and a ___ broadcast sends to everyone logically connected (i.e. VLAN) in a network (the broadcast ID)
everybody in the network;
routers will not pass it on so it won’t go past the Node;
directed