Unit 1 Flashcards

1
Q

A ___ covers a small area, such as a single building, a small group of buildings, or a small number of computers.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ___ covers a large area and usually has a substantial number of computers.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A WAN is actually the grouping of ____ LANs that are connected together.

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WANs may be classified as:

A

Metropolitan Area Network (MAN), a Campus Area Network
(CAN), or a Global Area Network (GAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is a group of networks with a sociopolitical boundary.

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a group of interconnected LANs within a small geographical area, such as a school campus.

A

Campus Area Network (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is a single network with connection points spread around the world.

A

Global Area Network (GAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ____ is a large public network and is the largest WAN.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ____ provides a way for people all around the world to share information with others.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ___ is a private Transmission Control Protocol/Internet Protocol (TCP/IP) network that is scaled down for a very specific group of users.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of network is used to share information
internally that needs to be kept secure and under control.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An ___ is a private network accessible to select outside users.

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

While an ___ keeps information within a network, an ___ allows for information to be shared with a specific group
of external users.

A

intranet
extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

External users can access the extranet by utilizing a ___.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All devices that make up a network perform certain functions and have certain roles. Two of these roles are a ___ and a ___.

A

server and a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a computer that shares and manages network resources.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Servers can provide services such as…?

A

E-mail, data storage (known as share drives), and printer
servers, just to name a few.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ____ uses the shared resources that are managed and controlled by servers.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Clients can be…?

A

host computers, printers, or cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Client/Server relationship is where the client software obtains services from a server on behalf of a ___.

A

user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Networks are traditionally classified into ___ and ___ designations, depending on the role played by each computer in the network.

A

Client/Server
Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ___ network classification refers to a large network that has one or more computers acting as a server and the rest as clients.

A

Client/Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ___ network classification contains computers that act as both clients and servers.

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network components allow you to connect a computer to the network. You can connect directly to the LAN via a cable or wireless means. Either method requires a ___.

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

A ___ is a circuit card inside a network-capable device that enables a computer to access a network.

A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The MAC address is a __-bit unique identifier either on the NIC or the motherboard.

A

48-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

___ ___ is the actual path over which a signal travels as it moves from one component to another.

A

Network media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the four types of network media?

A

Coaxial cable, Twisted Pair cable, Optical-Fiber cable, and Wireless media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A ___ cable consists of a center conductor surrounded by an insulating material and a concentric outer conductor.

A

coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

It is the original cable used in Ethernet networking. It is still used
with broadband Internet access.

A

coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The common coax connectors are…?

A

Bayonet Neill-Concelman (BNC) and F-type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The ___ ___ has two lugs, or tabs, that are used to secure the connector. Once the connector is attached, a coupling nut is turned a quarter turn to lock it on the lugs. ___ ___ are often used in RF applications.

A

BNC connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The ___ ___ is a threaded, screw-on connector. When the two sides are connected, a coupling nut is turned multiple turns to tighten and secure the connector. ___ ___ are typically used on televisions and modems used for broadband Internet access.

A

F-type connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

___ ___ media is the most commonly used media in modern Internet Protocol (IP) Ethernet networks.

A

Twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Twisted pair cable consists of ___ insulated copper wires.

A

eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The two wires that make up a pair are twisted together over their length. Pairs are formed based on the ___ if the insulation.

A

color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Typical colors used for the wire insulation are…?

A

blue, orange, green and brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A pair of wires is made up of a wire with a ___ color, such as blue, and a wire that is white with blue ___.

A

solid
stripes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

There are two types of twisted pair media:

A

Unshielded and Shielded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

___ ___ ___ has no metallic shielding around the pair of wires. ___ is more susceptible to interference and gives off more emanations.

A

Unshielded Twisted Pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

___ ___ ___ has metal foil surrounding the pairs of wires to prevent interference and ‘‘crosstalk’’.’

A

Shielded Twisted Pair (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The ___ connector, an eight-pin contact connector, is the modern network’s standard connector.

A

RJ45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

There are two major Ethernet wiring standards for twisted pair cables:

A

T568B and T568A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Both standards provide guidance on how to build a twisted pair cable using an RJ-45 connector.

A

T568B and T568A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The T568B and T568A standards specifically tell us which ___ wire goes into which position in the connector.

A

color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

T568B is the preferred method in the United States. It specifies following order of wires:

A

Pin 1 = White/Orange Wire
Pin 2 = Solid Orange Wire
Pin 3 = White/Green Wire
Pin 4 = Solid Blue Wire
Pin 5 = White/Blue Wire
Pin 6 = Solid Green Wire
Pin 7 = White/Brown Wire
Pin 8 = Solid Brown Wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The T568A specifies a different order. It specifies the wires 2 and 6 are switched, and that wires 1 and 3 are switched. So the T568A order of wires is:

A

Pin 1 = White/Green Wire
Pin 2 = Solid Green Wire
Pin 3 = White/Orange Wire
Pin 4 = Solid Blue Wire
Pin 5 = White/Blue Wire
Pin 6 = Solid Orange Wire
Pin 7 = White/Brown Wire
Pin 8 = Solid Brown Wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

There are four main configurations and uses for a twisted pair cable:

A

Straight Through Cable
Crossover Cable
Rollover Cable
Loopback Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

This cable has the pairs of conductors in the same order on both ends of the cable. Used to connect dissimilar devices, such as connecting a computer to a network switch.

A

Straight Through Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

This cable has the pairs of conductors in a different order at
each of the cable.

A

Crossover Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

___ ___ are used to connect similar devices, such as connecting a computer to a computer or connecting a switch to a switch.

A

Crossover Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

A ___ ___ has the wires at each end in exactly opposite order.

A

Rollover Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

A ___ ___ is used to connect the administrator’s system to the console port of a Cisco router or switch.

A

Rollover Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A ___ ___ has only one connector. It has wires connecting the
transmit pins to the receive pins on the same system.

A

Loopback Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A ___ ___ is used for troubleshooting a system.

A

Loopback Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Twisted pair cable is classified into categories. The categories are:

A

CAT 1
CAT 3
CAT 5
CAT 5e
CAT 6/6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The following describes which twisted pair cable classification?

Supports up to 1 Megabit per second (Mbps) speed and is used for telephone voice, not for data communications.

A

CAT 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

The following describes which twisted pair cable classification?

Supports up to 10Mbps speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 10BaseT. (Ethernet is covered in more detail later in the module.)

A

CAT 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

The following describes which twisted pair cable classification?

Supports up to 100Mbps speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 100BaseT.

A

CAT 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

The following describes which twisted pair cable classification?

Supports up to 1 Gigabit per second (Gbps) speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 1000BaseT.

A

CAT 5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The following describes which twisted pair cable classification?

Supports up to 10Gbps speed

A

CAT 6/6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

___ ___ is expensive to purchase and install because it requires specialized handling and connection techniques. Normally fiber is used for long distances and high speeds, because data is
transmitted using light instead of using electricity like twisted pair cable does.

A

Optical Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

There are two types of fiber optic cables: ___ and ___.

A

Single-mode
Multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When it comes to fiber optic cables, ___ uses a single
ray of light to carry the transmission over long distances.

A

Single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

____ is more commonly used. It uses multiple rays of light simultaneously, with each ray of light running at a different reflection
angle to carry the transmission over short distances.

A

Multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Fiber cables have their own types of connectors:

A

Straight Tip (ST)
Subscriber Connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

This connector is sometimes referred to as a “Stick-and-Twist” connector.

A

Straight Tip (ST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

These connectors have a square molded plastic body and push-pull locking features.

A

Subscriber Connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

There is the ___ ___ connector, which uses a twist locking system and operates much like a BNC coax connector.

A

Straight Tip (ST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

The ___ ___ is sometimes referred to as a “Stick-and-Click” connector.

A

Subscriber Connector (SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Light sources for fiber optic cable can be:

A

Light Emitting Diodes (LED)
Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

A ___ is special type of diode that can generate light.

A

LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

LEDs are typically used with ___ fiber optic cables.

A

multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

A ___ is a device that produces a coherent beam of optical radiation by stimulating electronic, ionic, or molecular transitions to higher energy levels so that when they return to lower energy levels they emit energy.

A

laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Lasers are typically used as light sources for ___ fiber
optic cables.

A

single-mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

There are multiple ways to connect computers into a network. The majority of networks use ___ ___ cabling to connect computers, printers, and some servers to the LAN.

A

twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

There are multiple ways to connect computers into a network. Then fiber optic cables are used to interconnect ___ and ___.

A

LANs and WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

However, a rapidly growing technology for network connectivity is ___ ___. This method utilizes RF or infrared devices to transmit and receive data without the use of wires.

A

wireless media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

The Institute of Electrical and Electronics Engineers (IEEE) ____ committee provides the standard for wireless media. Each of these wireless standards provides a wireless access point to
the network.

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What does IEEE stand for?

A

The Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

___ is the language the machines on the network use.

A

software

82
Q

___ are programs used to accomplish tasks like accessing shared files or web browsing. These can include Microsoft Word, Google Chrome, Calculator, etc.

A

applications

83
Q

In order for network devices to communicate with other devices, they must be connected with different types of network media. The way that these devices are connected is known as a ___.

A

topology

84
Q

A ___ ___ provides a general description of how the devices on the network link to each other physically and logically.

A

network topology

85
Q

A ___ ___ describes precisely how devices connect, such as how the wires run from machine to machine.

A

physical topology

86
Q

A ___ ___ describes how the signals used on the network travel from one computer to another.

A

logical topology

87
Q

There are five principal topologies used in LANs:

A

bus, ring, star, mesh, and hybrid

88
Q

Both ends of the ___ topology must have terminating resistors to prevent signals transmitted on the wire from echoing back and causing interference.

A

bus

89
Q

All devices are connected by one cable. Bus topologies were used in early networks and used ___ ___ for the media.

A

coax cable

90
Q

The ___ topology has multiple single points of failure. If any individual device fails, devices on either side of the failed device lose connectivity to each other. Also, if the cable itself fails, all devices lose connectivity.

A

bus

91
Q

The following is a picture of what topology?

A

Bus

92
Q

All end devices are connected to a single infrastructure device, such as a hub or a switch. However, all end devices have their own individual cables rather than all devices sharing a single cable. A cable break affects only one end device instead of all devices. ___ topologies still have a single point of failure. If the central device fails, all other devices lose connectivity.

A

Star topology

93
Q

The following is a picture of what topology?

A

Star

94
Q

Every computer system is connected in a complete loop. So, ___ topologies are built with two, counter-rotating rings. Note the
dotted lines in the figure. Their arrows point the opposite direction of the arrows on the solid lines. If a device fails, the devices on both sides of the failed device automatically loop the counter-rotating rings together to maintain connectivity for all other devices on the ring.

A

Ring Topology

95
Q

The following is a picture of what topology?

A

Ring

96
Q

Connects each node or device is connected with with multiple links to other devices. This provides multiple paths between any two nodes. Failure to a single device will not cause the entire network
to break. While ___ networks provide the redundancy, they are more costly to implement due to the extra cost of more cabling.

A

Mesh Topology

97
Q

A ___ Topology is the combination of the topologies above.Most of the today’s networks are a ___ topology. They are usually a
combination of a mesh topology and a star topology.

A

Hybrid

98
Q

The following is a picture of what topology?

A

Hybrid

99
Q

The Open Systems Interconnection (OSI) model was created by the…?

A

International Organization ofStandardization (ISO)

100
Q

It standardized common language for hardware/software. This framework provides a means of relating the components and their functions to each other. It also helps standardize some of the components and protocols used in networks.

A

OSI Model

101
Q

The OSI reference model consists of ___ layers.

A

seven

102
Q

What are the seven layers of the OSI model?

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
103
Q

What is the first layer of the OSI model?

A

Physical

104
Q

What is the second layer of the OSI model?

A

Data Link

105
Q

What is the third layer of the OSI model?

A

Network

106
Q

What is the fourth layer of the OSI model?

A

Transport

107
Q

What is the fifth layer of the OSI model?

A

Session

108
Q

What is the sixth layer of the OSI model?

A

Presentation

109
Q

What is the seventh layer of the OSI model?

A

Application

110
Q

What layer of the OSI model is the following describing?

Layer 1, the ___ layer, is the physical media of the network. (Remember, physical media could be wireless.) It determines how data is placed on the network media. This layer includes
cabling, connectors, hubs, and NICs.

A

Physical layer

111
Q

What layer of the OSI model is the following describing?

Layer 2, the ____ layers, defines the rules for gathering and completing all the elements that make up a data frame and putting the whole thing together so it can be passed to the Physical layer.

A

Data Link

112
Q

Bridges and switches operate at this layer of the OSI Model.

A

Data Link Layer

113
Q

The Data Link layer is divided into two sublayers:

A

Logical Link Control (LLC)
Media Access Control (MAC)

114
Q

Which sublayer of the Data Link layer is the following describing?

Responsible for error-correction and flow-control.

A

Logical Link Control (LLC)

115
Q

Which sublayer of the data link layer is the following describing?

Responsible for addressing networking devices by using the physical address (MAC Address).

A

Media Access Control (MAC)

116
Q

Layer 3, the ___ layer, is responsible for routing functions and logical addressing (IP addressing). The ___ layer addresses identify not only a system but also the network on which the system resides. Routers operate at this layer of the OSI Model. ___ layer protocols include Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).

A

Network Layer

117
Q

Layer 4, the ___ layer, breaks data into smaller, manageable chunks for transmission that will fit inside two or more packets. Breaking up data into smaller chunks is known as fragmentation.

A

Transport layer

118
Q

The ___ layer is also responsible for confirming whether transmitted packets have reached their destination intact, and retransmitting any packets that did are delivered. For incoming packets, the ___ layer reassembles the fragmented data, ensuring that received packets are processed in the right order. ___ layer protocols include Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).

A

Transport

119
Q

Layer 5, the ___ layer, is responsible for managing and terminating sessions between programs on devices. ___ layer protocols include Remote Procedure Call (RPC) and Server Message Block (SMB).

A

Session

120
Q

Layer 6, the ___ layer manages and translates between the Session Layer and the Application Layer. Encryption also occurs on this layer. ___ layer protocols include Transport Layer Security (TLS), Secure Socket Layers (SSL), Graphic Interchange Format (GIF), Joint Photographic Experts Group (JPEG), MP3, and MP4.

A

Presentation

121
Q

Layer 7, the ___ layer, represents network-related program code and the functions computers need to initiate or service requests. It refers to the protocols that programs use, not the programs themselves. For example, Post Office Protocol 3 (POP3) and Simple Mail Transfer
Protocol (SMTP) are important application layer protocols for e-mail, but many different end-user applications use those protocols such as Outlook.

A

Application

122
Q

TCP/IP networks have long used the Internet Protocol version 4 (IPv4) protocol for addressing. It is the ___ revision of the Internet Protocol (IP) and a widely used protocol in data communication over different kinds of networks.

A

fourth

123
Q

___ is a connectionless protocol used in packet-switched layer networks, such as Ethernet. It provides a logical connection between network devices by providing identification for each device.

A

IPv4

124
Q

Each TCP/IP host is identified by a logical IP address. IPv4 addresses are a ___-bit binary value.

A

32

125
Q

IPv4 32-bit binary value is broken down into four groups of eight bits called ___.

A

octets

126
Q

The valid range of decimal numbers is:

A

0-255

127
Q

In IPv4 addressing, each octet is separated by:

A

periods or dots

128
Q

What notation does IPv4 use?

A

Decimal Dot Notation

129
Q

___ ___ ___ is simply a shorthand way for people to discuss, identify, and configure the binary IP addresses computers use.

A

Dotted Decimal Notation

130
Q

The class license for an IPv4 address depends on the value in the first octet. IP addresses are broken down into five different classes:

A

Class A
Class B
Class C
Class D
Class E

131
Q

Class A address range:

A

1-126

132
Q

Class B address range:

A

128-191

133
Q

What is the loopback address range?

A

127

134
Q

Class C address range:

A

192-223

135
Q

Class D address range:

A

224-239

136
Q

Class E address range:

A

240-254

137
Q

Knowing the class to which an IP address belongs is important because it tells us what the default ___ ___ for that address.

A

subnet mask

138
Q

In the ___ addressing system, all the IP addresses that are available are divided into the five classes A, B, C, D and E. Each of the IP addresses belongs to a particular class.

A

classful

139
Q

The main disadvantage of classful addressing is that it limits the ___ and number of ___ that can be assigned to any device.

A

flexibility
addresses

140
Q

A subnet mask is the value used in TCP/IP settings to divide the IP address of a host into its component parts:

A

network ID
host ID

141
Q

It is used to help devices distinguish the host’s network. A ___ ___ hides, or “masks,” the network part of a system’s IP address and leaves only the host’s part as the machine identifier.

A

subnet mask

142
Q

Subnet masks are represented in ___ ___ notation like IP addresses.

A

dotted decimal

143
Q

Class A Subnet Mask =

A

255.0.0.0

144
Q

Class B Subnet Mask =

A

255.255.0.0

145
Q

Class C Subnet Mask =

A

255.255.255.0

146
Q

Class D Subnet Mask =

A

255.255.255.255

147
Q

Class E Subnet Mask =

A

255.255.255.255

148
Q

The ___ ___ is one of two pieces that make up an IP Address. The first part of the IP address is the ___ ___ and is provided to you by the Internet Assigned Numbers Authority (IANA).

A

Network ID

149
Q

The subnet mask may also identify the network ID in a ___ IP network.

A

classful

150
Q

It is used to differentiate networks from one another.

A

Network ID

151
Q

What is the class and subnet mask for the given IPv4 address?

202.120.10.15

A

Class License: C (202 falls between the range of 192-223)
Default Subnet Mask for Class C: 255.255.255.0

152
Q

The first three octets of the IPv4 Address represent the Network ID due to a subnet mask value of 255.255.255.0. Simply put, the “255” values will be the ___ ___. No individual Network ID can be assigned to a specific computer or device.

A

Network ID

153
Q

The ___ ___ is the portion of the IP address to get specific host information for that part of the network. It is the portion of an IP address that defines a specific machine in a subnet.

A

Host ID

154
Q

An example is 202.120.10.15, the ___ ___ of the IP address is the Host ID. Example: 202.120.10.1 - This is the 1st host on the 202.120.10.0 network.

A

last octet

155
Q

A ___ IP address is one that uses subnets. ___ networks enable the use of IP addresses with different subnet masks in the same network. This allows for efficient use of IP addresses.

A

Classless

156
Q

A ___ ___ is used for dividing a network into sub-networks.

A

subnet ID

157
Q

With the given IPv4 address, identify the default subnet mask and the provided subnet mask:

10.168.25.202

A

the default subnet mask is: 255.0.0.0
the provided subnet mask is: 255.255.255.0.

158
Q

What does CIDR stand for?

A

Classless Inter-Domain Routing

159
Q

___ is a type of subnetting. It is a shorthand for the subnet mask represented by a “/x” at the end of an IP address.

A

CIDR

160
Q

The __ (in CIDR) represents how many bits are in the “1” position in a provided subnet mask. For example, “/8” would represent 11111111.00000000.00000000.00000000, or 255.0.0.0.

A

x

161
Q

CIDR and ___ are virtually the same thing.

A

subnetting

162
Q

CIDR is done by an ___. The ___ is given a block of addresses, subnets the block into multiple subnets, and then passes out the smaller
individual subnets to customers.

A

ISP

163
Q

A ___ address is a special type of networking address that is reserved for sending messages to all nodes (i.e., devices attached to the network) on a given network or network segment.

A

broadcast

164
Q

It is the address a NIC attaches to a frame when it wants every other NIC on the network to read it.

A

broadcast

165
Q

In TCP/IP, the general broadcast address is ___. In Ethernet, the broadcast MAC address is FF-FF-FF-FF-FF-FF.

A

255.255.255.255

166
Q

___ is an Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks.

A

Internet Protocol Version 6 (IPv6)

167
Q

___ is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4.

A

IPv6

168
Q

IPv6 It allows for ___ possible node, or address, combinations.

A

2^128

169
Q

IPv6 addresses what major issue?

A

A shortage of IPv4 addresses

170
Q

An IPv6 address is a ___-bit address displayed in ___ format and not the dotted decimal notation that is used by IPv4.

A

128
hexadecimal

171
Q

The IPv6 address is divided into eight 16-bit groups that are
separated by a colon (:). These groups are unofficially called “____.”

A

hextets

172
Q

___ are sets of rules that govern the procedures used to exchange information between devices.

A

Protocols

173
Q

Each protocol uses a specific ___ ___. These port numbers are used by servers in order to determine the specific protocol being used. For example, a web browser on a client computer would contact the server through TCP port 80, the specific port number for Hypertext Transfer Protocol (HTTP). This informs the server the client is requesting a web page. Specific application/internet protocols will be discussed later in this objective.

A

port number

174
Q

There are two main ____ protocols that handle the traffic in the transport layer of the TCP/IP model. Both of these protocols serve a specific purpose in network communications. These protocols are:

A

Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)

175
Q

___ is the connection-oriented protocol.

A

TCP

176
Q

It requires a stable connection between the client and the server before a message is sent. When the destination host receives data, it sends an acknowledgement message to the sender. ___ guarantees data delivery.

A

TCP

177
Q

___ is the connectionless protocol.

A

UDP

178
Q

In some cases, an application might want to send a quick message without needing to sequence the data or receive an acknowledgment. This system will send information without verifying someone is on the other end to receive it. There is no guarantee
of data delivery.

A

UDP

179
Q

___ ___ ___ uses port 21 to transfer files between clients and servers. The data that is sent using the FTP is in cleartext. Data in clear text is a potential security risk.

A

File Transfer Protocol (FTP)

180
Q

___ protocol is a TCP protocol that uses port 23 to allow users to log in remotely to UNIX/Linux host. Used to configure network devices. ___ sends usernames and passwords as clear text and is a potential security risk.

A

Telnet

181
Q

___ ___ protocol is a TCP protocol that uses port 22 and is a direct replacement for Telnet. ___ ___ added the ability to encrypt the login and data sent over the connection.

A

Secure Shell (SSH)

182
Q

___ ___ is a TCP protocol that uses port 22 to add encryption (from the SSH protocol) to securely transfer files between network hosts.

A

Secure Copy (SCP)

183
Q

___ ___ ___ protocol uses port 53 to map computer names to IP addresses. ___ uses with both TCP and UDP. The TCP 53 is used for zone transfers, which are updates between ___ servers. UDP 53 is used for ___ queries and replies between ___ servers and client end devices.

A

Domain Name System (DNS)

184
Q

___ ___ ___ protocol is used to assign IP addresses automatically to
clients on the network. ___ is a UDP protocol that uses two ports, 67 and 68. When a client sends information to a ___ server, ___ uses UDP port 67. When a ___ server sends data to a client, ___ uses UDP port 68.

A

Dynamic Host Configuration (DHCP)

185
Q

___ ___ ___ uses port 69. This UDP protocol transfers files between
servers and clients without requiring a login. ___ ___ ___ is commonly used to send files to routers or workstations that don’t have a disk drive.

A

Trivial File Transfer Protocol (TFTP)

186
Q

___ ___ ___ uses port 80. This TCP protocol is used by clients using a
web browser such as Internet Explorer, Mozilla Firefox, and Google Chrome to request information from web servers.

A

Hypertext Transfer Protocol (HTTP)

187
Q

____ ____ ___ ____ uses port 25. This TCP protocol is used for sending e-mail messages between mail servers.

A

Simple Mail Transfer Protocol (SMTP)

188
Q

___ ___ ___ ___ uses port 110. This TCP protocol is used for retrieving e-mail traffic from mail servers.

A

Post Office Protocol V3 (POP3)

189
Q

___ ___ ___ uses port 123. This UDP protocol is used to synchronize timing within the network.

A

Network Time Protocol (NTP)

190
Q

___ ___ ___ ___ uses port 143. This TCP protocol is used to access and manage your e-mail messages while leaving the messages stored on the e-mail server.

A

Internet Message Access Protocol (IMAP)

191
Q

___ ___ ___ ___ uses ports 161 and 162. This UDP protocol is
used by applications to monitor network devices remotely.

A

Simple Network Management Protocol (SNMP)

192
Q

___ ___ ___ ___ uses port 443. This TCP protocol is a secured HTTP version providing an encrypted connection between a web server and a web client.

A

Hypertext Transfer Protocol Secure (HTTPS)

193
Q

___ ___ ___ uses port 3389. This TCP protocol is a Microsoft proprietary protocol that enables remote connections to other computers over an encrypted channel.

A

Remote Desktop Protocol (RDP)

194
Q

The ____ model was developed to address limitations of the OSI model and eventually became the communications model of choice.

A

TCP/IP

195
Q

The TCP/IP model is often referred to as the ___ ___.

A

Internet model

196
Q

The TCP/IP Model consists of only four layers:

A

Link, Internet, Transport, and Application

197
Q

The ___ ___ Layer corresponds to the Physical and Data Link layers in the OSI model. Physical/MAC Addressing, NICs, Switching, Cabling are at this layer.

A

The Link/Network Interface

198
Q

The ___ Layer corresponds to the Network layer in the OSI model. IP Packets, Logical/IP Addressing, and Routers are at this layer.

A

Internet

199
Q

The ___ Layer corresponds to the Transport (Layer 4) and the Session Layer (Layer 5) in the OSI model.

A

Transport

200
Q

The Transport layer is responsible for transporting data and setting up communications between the Application layer and the lower layers. Since this layer establishes a connection, it carries out some of the functions of the OSI Session layer. The two core protocols
used at the Transport layer are:

A

TCP (connection-oriented)
UDP (connectionless)

201
Q

The ___ Layer combines the functions of the top three layers…Application, Presentation, and Session…of the OSI Model. It uses ports to give each application a unique number that
identifies the protocol it uses. Common Application Layer protocols were covered above.

A

Application

202
Q
A