Unit 1 Flashcards

1
Q

A ___ covers a small area, such as a single building, a small group of buildings, or a small number of computers.

A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ___ covers a large area and usually has a substantial number of computers.

A

WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A WAN is actually the grouping of ____ LANs that are connected together.

A

multiple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WANs may be classified as:

A

Metropolitan Area Network (MAN), a Campus Area Network
(CAN), or a Global Area Network (GAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ is a group of networks with a sociopolitical boundary.

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a group of interconnected LANs within a small geographical area, such as a school campus.

A

Campus Area Network (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____ is a single network with connection points spread around the world.

A

Global Area Network (GAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ____ is a large public network and is the largest WAN.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ____ provides a way for people all around the world to share information with others.

A

internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An ___ is a private Transmission Control Protocol/Internet Protocol (TCP/IP) network that is scaled down for a very specific group of users.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This type of network is used to share information
internally that needs to be kept secure and under control.

A

intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An ___ is a private network accessible to select outside users.

A

extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

While an ___ keeps information within a network, an ___ allows for information to be shared with a specific group
of external users.

A

intranet
extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

External users can access the extranet by utilizing a ___.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

All devices that make up a network perform certain functions and have certain roles. Two of these roles are a ___ and a ___.

A

server and a client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A ____ is a computer that shares and manages network resources.

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Servers can provide services such as…?

A

E-mail, data storage (known as share drives), and printer
servers, just to name a few.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ____ uses the shared resources that are managed and controlled by servers.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Clients can be…?

A

host computers, printers, or cameras.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Client/Server relationship is where the client software obtains services from a server on behalf of a ___.

A

user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Networks are traditionally classified into ___ and ___ designations, depending on the role played by each computer in the network.

A

Client/Server
Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The ___ network classification refers to a large network that has one or more computers acting as a server and the rest as clients.

A

Client/Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The ___ network classification contains computers that act as both clients and servers.

A

Peer-to-Peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network components allow you to connect a computer to the network. You can connect directly to the LAN via a cable or wireless means. Either method requires a ___.

A

Network Interface Card (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A ___ is a circuit card inside a network-capable device that enables a computer to access a network.
NIC
26
The MAC address is a __-bit unique identifier either on the NIC or the motherboard.
48-bit
27
___ ___ is the actual path over which a signal travels as it moves from one component to another.
Network media
28
What are the four types of network media?
Coaxial cable, Twisted Pair cable, Optical-Fiber cable, and Wireless media.
29
A ___ cable consists of a center conductor surrounded by an insulating material and a concentric outer conductor.
coaxial
30
It is the original cable used in Ethernet networking. It is still used with broadband Internet access.
coaxial cable
31
The common coax connectors are...?
Bayonet Neill-Concelman (BNC) and F-type.
32
The ___ ___ has two lugs, or tabs, that are used to secure the connector. Once the connector is attached, a coupling nut is turned a quarter turn to lock it on the lugs. ___ ___ are often used in RF applications.
BNC connector
33
The ___ ___ is a threaded, screw-on connector. When the two sides are connected, a coupling nut is turned multiple turns to tighten and secure the connector. ___ ___ are typically used on televisions and modems used for broadband Internet access.
F-type connector
34
___ ___ media is the most commonly used media in modern Internet Protocol (IP) Ethernet networks.
Twisted pair
35
Twisted pair cable consists of ___ insulated copper wires.
eight
36
The two wires that make up a pair are twisted together over their length. Pairs are formed based on the ___ if the insulation.
color
37
Typical colors used for the wire insulation are...?
blue, orange, green and brown
38
A pair of wires is made up of a wire with a ___ color, such as blue, and a wire that is white with blue ___.
solid stripes
39
There are two types of twisted pair media:
Unshielded and Shielded
40
___ ___ ___ has no metallic shielding around the pair of wires. ___ is more susceptible to interference and gives off more emanations.
Unshielded Twisted Pair (UTP)
41
___ ___ ___ has metal foil surrounding the pairs of wires to prevent interference and ''crosstalk''.'
Shielded Twisted Pair (STP)
42
The ___ connector, an eight-pin contact connector, is the modern network’s standard connector.
RJ45
43
There are two major Ethernet wiring standards for twisted pair cables:
T568B and T568A
44
Both standards provide guidance on how to build a twisted pair cable using an RJ-45 connector.
T568B and T568A
45
The T568B and T568A standards specifically tell us which ___ wire goes into which position in the connector.
color
46
T568B is the preferred method in the United States. It specifies following order of wires:
Pin 1 = White/Orange Wire Pin 2 = Solid Orange Wire Pin 3 = White/Green Wire Pin 4 = Solid Blue Wire Pin 5 = White/Blue Wire Pin 6 = Solid Green Wire Pin 7 = White/Brown Wire Pin 8 = Solid Brown Wire
47
The T568A specifies a different order. It specifies the wires 2 and 6 are switched, and that wires 1 and 3 are switched. So the T568A order of wires is:
Pin 1 = White/Green Wire Pin 2 = Solid Green Wire Pin 3 = White/Orange Wire Pin 4 = Solid Blue Wire Pin 5 = White/Blue Wire Pin 6 = Solid Orange Wire Pin 7 = White/Brown Wire Pin 8 = Solid Brown Wire
48
There are four main configurations and uses for a twisted pair cable:
Straight Through Cable Crossover Cable Rollover Cable Loopback Cable
49
This cable has the pairs of conductors in the same order on both ends of the cable. Used to connect dissimilar devices, such as connecting a computer to a network switch.
Straight Through Cable
50
This cable has the pairs of conductors in a different order at each of the cable.
Crossover Cable
51
___ ___ are used to connect similar devices, such as connecting a computer to a computer or connecting a switch to a switch.
Crossover Cable
52
A ___ ___ has the wires at each end in exactly opposite order.
Rollover Cable
53
A ___ ___ is used to connect the administrator's system to the console port of a Cisco router or switch.
Rollover Cable
54
A ___ ___ has only one connector. It has wires connecting the transmit pins to the receive pins on the same system.
Loopback Cable
55
A ___ ___ is used for troubleshooting a system.
Loopback Cable
56
Twisted pair cable is classified into categories. The categories are:
CAT 1 CAT 3 CAT 5 CAT 5e CAT 6/6a
57
The following describes which twisted pair cable classification? Supports up to 1 Megabit per second (Mbps) speed and is used for telephone voice, not for data communications.
CAT 1
58
The following describes which twisted pair cable classification? Supports up to 10Mbps speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 10BaseT. (Ethernet is covered in more detail later in the module.)
CAT 3
59
The following describes which twisted pair cable classification? Supports up to 100Mbps speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 100BaseT.
CAT 5
60
The following describes which twisted pair cable classification? Supports up to 1 Gigabit per second (Gbps) speed and is used for voice and data. When the data is transmitted using Ethernet, it is called 1000BaseT.
CAT 5e
61
The following describes which twisted pair cable classification? Supports up to 10Gbps speed
CAT 6/6a
62
___ ___ is expensive to purchase and install because it requires specialized handling and connection techniques. Normally fiber is used for long distances and high speeds, because data is transmitted using light instead of using electricity like twisted pair cable does.
Optical Fiber
63
There are two types of fiber optic cables: ___ and ___.
Single-mode Multimode
64
When it comes to fiber optic cables, ___ uses a single ray of light to carry the transmission over long distances.
Single-mode
65
____ is more commonly used. It uses multiple rays of light simultaneously, with each ray of light running at a different reflection angle to carry the transmission over short distances.
Multimode
66
Fiber cables have their own types of connectors:
Straight Tip (ST) Subscriber Connector (SC)
67
This connector is sometimes referred to as a “Stick-and-Twist” connector.
Straight Tip (ST)
68
These connectors have a square molded plastic body and push-pull locking features.
Subscriber Connector (SC)
69
There is the ___ ___ connector, which uses a twist locking system and operates much like a BNC coax connector.
Straight Tip (ST)
70
The ___ ___ is sometimes referred to as a “Stick-and-Click” connector.
Subscriber Connector (SC)
71
Light sources for fiber optic cable can be:
Light Emitting Diodes (LED) Laser
72
A ___ is special type of diode that can generate light.
LED
73
LEDs are typically used with ___ fiber optic cables.
multimode
74
A ___ is a device that produces a coherent beam of optical radiation by stimulating electronic, ionic, or molecular transitions to higher energy levels so that when they return to lower energy levels they emit energy.
laser
75
Lasers are typically used as light sources for ___ fiber optic cables.
single-mode
76
There are multiple ways to connect computers into a network. The majority of networks use ___ ___ cabling to connect computers, printers, and some servers to the LAN.
twisted pair
77
There are multiple ways to connect computers into a network. Then fiber optic cables are used to interconnect ___ and ___.
LANs and WANs
78
However, a rapidly growing technology for network connectivity is ___ ___. This method utilizes RF or infrared devices to transmit and receive data without the use of wires.
wireless media
79
The Institute of Electrical and Electronics Engineers (IEEE) ____ committee provides the standard for wireless media. Each of these wireless standards provides a wireless access point to the network.
802.11
80
What does IEEE stand for?
The Institute of Electrical and Electronics Engineers
81
___ is the language the machines on the network use.
software
82
___ are programs used to accomplish tasks like accessing shared files or web browsing. These can include Microsoft Word, Google Chrome, Calculator, etc.
applications
83
In order for network devices to communicate with other devices, they must be connected with different types of network media. The way that these devices are connected is known as a ___.
topology
84
A ___ ___ provides a general description of how the devices on the network link to each other physically and logically.
network topology
85
A ___ ___ describes precisely how devices connect, such as how the wires run from machine to machine.
physical topology
86
A ___ ___ describes how the signals used on the network travel from one computer to another.
logical topology
87
There are five principal topologies used in LANs:
bus, ring, star, mesh, and hybrid
88
Both ends of the ___ topology must have terminating resistors to prevent signals transmitted on the wire from echoing back and causing interference.
bus
89
All devices are connected by one cable. Bus topologies were used in early networks and used ___ ___ for the media.
coax cable
90
The ___ topology has multiple single points of failure. If any individual device fails, devices on either side of the failed device lose connectivity to each other. Also, if the cable itself fails, all devices lose connectivity.
bus
91
The following is a picture of what topology?
Bus
92
All end devices are connected to a single infrastructure device, such as a hub or a switch. However, all end devices have their own individual cables rather than all devices sharing a single cable. A cable break affects only one end device instead of all devices. ___ topologies still have a single point of failure. If the central device fails, all other devices lose connectivity.
Star topology
93
The following is a picture of what topology?
Star
94
Every computer system is connected in a complete loop. So, ___ topologies are built with two, counter-rotating rings. Note the dotted lines in the figure. Their arrows point the opposite direction of the arrows on the solid lines. If a device fails, the devices on both sides of the failed device automatically loop the counter-rotating rings together to maintain connectivity for all other devices on the ring.
Ring Topology
95
The following is a picture of what topology?
Ring
96
Connects each node or device is connected with with multiple links to other devices. This provides multiple paths between any two nodes. Failure to a single device will not cause the entire network to break. While ___ networks provide the redundancy, they are more costly to implement due to the extra cost of more cabling.
Mesh Topology
97
A ___ Topology is the combination of the topologies above.Most of the today’s networks are a ___ topology. They are usually a combination of a mesh topology and a star topology.
Hybrid
98
The following is a picture of what topology?
Hybrid
99
The Open Systems Interconnection (OSI) model was created by the...?
International Organization ofStandardization (ISO)
100
It standardized common language for hardware/software. This framework provides a means of relating the components and their functions to each other. It also helps standardize some of the components and protocols used in networks.
OSI Model
101
The OSI reference model consists of ___ layers.
seven
102
What are the seven layers of the OSI model?
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
103
What is the first layer of the OSI model?
Physical
104
What is the second layer of the OSI model?
Data Link
105
What is the third layer of the OSI model?
Network
106
What is the fourth layer of the OSI model?
Transport
107
What is the fifth layer of the OSI model?
Session
108
What is the sixth layer of the OSI model?
Presentation
109
What is the seventh layer of the OSI model?
Application
110
What layer of the OSI model is the following describing? Layer 1, the ___ layer, is the physical media of the network. (Remember, physical media could be wireless.) It determines how data is placed on the network media. This layer includes cabling, connectors, hubs, and NICs.
Physical layer
111
What layer of the OSI model is the following describing? Layer 2, the ____ layers, defines the rules for gathering and completing all the elements that make up a data frame and putting the whole thing together so it can be passed to the Physical layer.
Data Link
112
Bridges and switches operate at this layer of the OSI Model.
Data Link Layer
113
The Data Link layer is divided into two sublayers:
Logical Link Control (LLC) Media Access Control (MAC)
114
Which sublayer of the Data Link layer is the following describing? Responsible for error-correction and flow-control.
Logical Link Control (LLC)
115
Which sublayer of the data link layer is the following describing? Responsible for addressing networking devices by using the physical address (MAC Address).
Media Access Control (MAC)
116
Layer 3, the ___ layer, is responsible for routing functions and logical addressing (IP addressing). The ___ layer addresses identify not only a system but also the network on which the system resides. Routers operate at this layer of the OSI Model. ___ layer protocols include Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).
Network Layer
117
Layer 4, the ___ layer, breaks data into smaller, manageable chunks for transmission that will fit inside two or more packets. Breaking up data into smaller chunks is known as fragmentation.
Transport layer
118
The ___ layer is also responsible for confirming whether transmitted packets have reached their destination intact, and retransmitting any packets that did are delivered. For incoming packets, the ___ layer reassembles the fragmented data, ensuring that received packets are processed in the right order. ___ layer protocols include Transmission Control Protocol (TCP) and User Datagram Protocol (UDP).
Transport
119
Layer 5, the ___ layer, is responsible for managing and terminating sessions between programs on devices. ___ layer protocols include Remote Procedure Call (RPC) and Server Message Block (SMB).
Session
120
Layer 6, the ___ layer manages and translates between the Session Layer and the Application Layer. Encryption also occurs on this layer. ___ layer protocols include Transport Layer Security (TLS), Secure Socket Layers (SSL), Graphic Interchange Format (GIF), Joint Photographic Experts Group (JPEG), MP3, and MP4.
Presentation
121
Layer 7, the ___ layer, represents network-related program code and the functions computers need to initiate or service requests. It refers to the protocols that programs use, not the programs themselves. For example, Post Office Protocol 3 (POP3) and Simple Mail Transfer Protocol (SMTP) are important application layer protocols for e-mail, but many different end-user applications use those protocols such as Outlook.
Application
122
TCP/IP networks have long used the Internet Protocol version 4 (IPv4) protocol for addressing. It is the ___ revision of the Internet Protocol (IP) and a widely used protocol in data communication over different kinds of networks.
fourth
123
___ is a connectionless protocol used in packet-switched layer networks, such as Ethernet. It provides a logical connection between network devices by providing identification for each device.
IPv4
124
Each TCP/IP host is identified by a logical IP address. IPv4 addresses are a ___-bit binary value.
32
125
IPv4 32-bit binary value is broken down into four groups of eight bits called ___.
octets
126
The valid range of decimal numbers is:
0-255
127
In IPv4 addressing, each octet is separated by:
periods or dots
128
What notation does IPv4 use?
Decimal Dot Notation
129
___ ___ ___ is simply a shorthand way for people to discuss, identify, and configure the binary IP addresses computers use.
Dotted Decimal Notation
130
The class license for an IPv4 address depends on the value in the first octet. IP addresses are broken down into five different classes:
Class A Class B Class C Class D Class E
131
Class A address range:
1-126
132
Class B address range:
128-191
133
What is the loopback address range?
127
134
Class C address range:
192-223
135
Class D address range:
224-239
136
Class E address range:
240-254
137
Knowing the class to which an IP address belongs is important because it tells us what the default ___ ___ for that address.
subnet mask
138
In the ___ addressing system, all the IP addresses that are available are divided into the five classes A, B, C, D and E. Each of the IP addresses belongs to a particular class.
classful
139
The main disadvantage of classful addressing is that it limits the ___ and number of ___ that can be assigned to any device.
flexibility addresses
140
A subnet mask is the value used in TCP/IP settings to divide the IP address of a host into its component parts:
network ID host ID
141
It is used to help devices distinguish the host’s network. A ___ ___ hides, or "masks," the network part of a system's IP address and leaves only the host’s part as the machine identifier.
subnet mask
142
Subnet masks are represented in ___ ___ notation like IP addresses.
dotted decimal
143
Class A Subnet Mask =
255.0.0.0
144
Class B Subnet Mask =
255.255.0.0
145
Class C Subnet Mask =
255.255.255.0
146
Class D Subnet Mask =
255.255.255.255
147
Class E Subnet Mask =
255.255.255.255
148
The ___ ___ is one of two pieces that make up an IP Address. The first part of the IP address is the ___ ___ and is provided to you by the Internet Assigned Numbers Authority (IANA).
Network ID
149
The subnet mask may also identify the network ID in a ___ IP network.
classful
150
It is used to differentiate networks from one another.
Network ID
151
What is the class and subnet mask for the given IPv4 address? 202.120.10.15
Class License: C (202 falls between the range of 192-223) Default Subnet Mask for Class C: 255.255.255.0
152
The first three octets of the IPv4 Address represent the Network ID due to a subnet mask value of 255.255.255.0. Simply put, the “255” values will be the ___ ___. No individual Network ID can be assigned to a specific computer or device.
Network ID
153
The ___ ___ is the portion of the IP address to get specific host information for that part of the network. It is the portion of an IP address that defines a specific machine in a subnet.
Host ID
154
An example is 202.120.10.15, the ___ ___ of the IP address is the Host ID. Example: 202.120.10.1 - This is the 1st host on the 202.120.10.0 network.
last octet
155
A ___ IP address is one that uses subnets. ___ networks enable the use of IP addresses with different subnet masks in the same network. This allows for efficient use of IP addresses.
Classless
156
A ___ ___ is used for dividing a network into sub-networks.
subnet ID
157
With the given IPv4 address, identify the default subnet mask and the provided subnet mask: 10.168.25.202
the default subnet mask is: 255.0.0.0 the provided subnet mask is: 255.255.255.0.
158
What does CIDR stand for?
Classless Inter-Domain Routing
159
___ is a type of subnetting. It is a shorthand for the subnet mask represented by a "/x" at the end of an IP address.
CIDR
160
The __ (in CIDR) represents how many bits are in the "1" position in a provided subnet mask. For example, "/8" would represent 11111111.00000000.00000000.00000000, or 255.0.0.0.
x
161
CIDR and ___ are virtually the same thing.
subnetting
162
CIDR is done by an ___. The ___ is given a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers.
ISP
163
A ___ address is a special type of networking address that is reserved for sending messages to all nodes (i.e., devices attached to the network) on a given network or network segment.
broadcast
164
It is the address a NIC attaches to a frame when it wants every other NIC on the network to read it.
broadcast
165
In TCP/IP, the general broadcast address is ___. In Ethernet, the broadcast MAC address is FF-FF-FF-FF-FF-FF.
255.255.255.255
166
___ is an Internet Protocol (IP) used for carrying data in packets from a source to a destination over various networks.
Internet Protocol Version 6 (IPv6)
167
___ is the enhanced version of IPv4 and can support very large numbers of nodes as compared to IPv4.
IPv6
168
IPv6 It allows for ___ possible node, or address, combinations.
2^128
169
IPv6 addresses what major issue?
A shortage of IPv4 addresses
170
An IPv6 address is a ___-bit address displayed in ___ format and not the dotted decimal notation that is used by IPv4.
128 hexadecimal
171
The IPv6 address is divided into eight 16-bit groups that are separated by a colon (:). These groups are unofficially called “____.”
hextets
172
___ are sets of rules that govern the procedures used to exchange information between devices.
Protocols
173
Each protocol uses a specific ___ ___. These port numbers are used by servers in order to determine the specific protocol being used. For example, a web browser on a client computer would contact the server through TCP port 80, the specific port number for Hypertext Transfer Protocol (HTTP). This informs the server the client is requesting a web page. Specific application/internet protocols will be discussed later in this objective.
port number
174
There are two main ____ protocols that handle the traffic in the transport layer of the TCP/IP model. Both of these protocols serve a specific purpose in network communications. These protocols are:
Transmission Control Protocol (TCP) User Datagram Protocol (UDP)
175
___ is the connection-oriented protocol.
TCP
176
It requires a stable connection between the client and the server before a message is sent. When the destination host receives data, it sends an acknowledgement message to the sender. ___ guarantees data delivery.
TCP
177
___ is the connectionless protocol.
UDP
178
In some cases, an application might want to send a quick message without needing to sequence the data or receive an acknowledgment. This system will send information without verifying someone is on the other end to receive it. There is no guarantee of data delivery.
UDP
179
___ ___ ___ uses port 21 to transfer files between clients and servers. The data that is sent using the FTP is in cleartext. Data in clear text is a potential security risk.
File Transfer Protocol (FTP)
180
___ protocol is a TCP protocol that uses port 23 to allow users to log in remotely to UNIX/Linux host. Used to configure network devices. ___ sends usernames and passwords as clear text and is a potential security risk.
Telnet
181
___ ___ protocol is a TCP protocol that uses port 22 and is a direct replacement for Telnet. ___ ___ added the ability to encrypt the login and data sent over the connection.
Secure Shell (SSH)
182
___ ___ is a TCP protocol that uses port 22 to add encryption (from the SSH protocol) to securely transfer files between network hosts.
Secure Copy (SCP)
183
___ ___ ___ protocol uses port 53 to map computer names to IP addresses. ___ uses with both TCP and UDP. The TCP 53 is used for zone transfers, which are updates between ___ servers. UDP 53 is used for ___ queries and replies between ___ servers and client end devices.
Domain Name System (DNS)
184
___ ___ ___ protocol is used to assign IP addresses automatically to clients on the network. ___ is a UDP protocol that uses two ports, 67 and 68. When a client sends information to a ___ server, ___ uses UDP port 67. When a ___ server sends data to a client, ___ uses UDP port 68.
Dynamic Host Configuration (DHCP)
185
___ ___ ___ uses port 69. This UDP protocol transfers files between servers and clients without requiring a login. ___ ___ ___ is commonly used to send files to routers or workstations that don’t have a disk drive.
Trivial File Transfer Protocol (TFTP)
186
___ ___ ___ uses port 80. This TCP protocol is used by clients using a web browser such as Internet Explorer, Mozilla Firefox, and Google Chrome to request information from web servers.
Hypertext Transfer Protocol (HTTP)
187
____ ____ ___ ____ uses port 25. This TCP protocol is used for sending e-mail messages between mail servers.
Simple Mail Transfer Protocol (SMTP)
188
___ ___ ___ ___ uses port 110. This TCP protocol is used for retrieving e-mail traffic from mail servers.
Post Office Protocol V3 (POP3)
189
___ ___ ___ uses port 123. This UDP protocol is used to synchronize timing within the network.
Network Time Protocol (NTP)
190
___ ___ ___ ___ uses port 143. This TCP protocol is used to access and manage your e-mail messages while leaving the messages stored on the e-mail server.
Internet Message Access Protocol (IMAP)
191
___ ___ ___ ___ uses ports 161 and 162. This UDP protocol is used by applications to monitor network devices remotely.
Simple Network Management Protocol (SNMP)
192
___ ___ ___ ___ uses port 443. This TCP protocol is a secured HTTP version providing an encrypted connection between a web server and a web client.
Hypertext Transfer Protocol Secure (HTTPS)
193
___ ___ ___ uses port 3389. This TCP protocol is a Microsoft proprietary protocol that enables remote connections to other computers over an encrypted channel.
Remote Desktop Protocol (RDP)
194
The ____ model was developed to address limitations of the OSI model and eventually became the communications model of choice.
TCP/IP
195
The TCP/IP model is often referred to as the ___ ___.
Internet model
196
The TCP/IP Model consists of only four layers:
Link, Internet, Transport, and Application
197
The ___ ___ Layer corresponds to the Physical and Data Link layers in the OSI model. Physical/MAC Addressing, NICs, Switching, Cabling are at this layer.
The Link/Network Interface
198
The ___ Layer corresponds to the Network layer in the OSI model. IP Packets, Logical/IP Addressing, and Routers are at this layer.
Internet
199
The ___ Layer corresponds to the Transport (Layer 4) and the Session Layer (Layer 5) in the OSI model.
Transport
200
The Transport layer is responsible for transporting data and setting up communications between the Application layer and the lower layers. Since this layer establishes a connection, it carries out some of the functions of the OSI Session layer. The two core protocols used at the Transport layer are:
TCP (connection-oriented) UDP (connectionless)
201
The ___ Layer combines the functions of the top three layers...Application, Presentation, and Session...of the OSI Model. It uses ports to give each application a unique number that identifies the protocol it uses. Common Application Layer protocols were covered above.
Application
202