week 2 networking Flashcards

1
Q

sneakernet

A

moved the file by putting it on a disk and then moving that disk into another system (no network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

xerox invented first ethernot

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.3

A

ethernet commite thjat controls the ethernet standard still today

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.3i

A

10mbps ethernet usuing twisted pair cableing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.3ab

A

gigabit ehernet over twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.3by

A

25 Gigabit Ethernet over fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

sending computers can resend damaged frames

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

preamble

A

a 7-byte series of alternating ones and zeroes followed by a 1-byte start frame
delimiter, always precedes a frame. The preamble gives a receiving NIC time to realize a
frame is coming and to know exactly where the frame starts. The preamble is added by
the sending NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PAD

A

a frame has minnimum 64 bits of data if smaller the frame will (pad) the shortage with data too hit the 64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

frame check sequence

A

enables ethernet nodes to recognize when bad things happen too good data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CRC

A

cyclic redundancy chek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cycle redundancy check

A

a mathmatical equation that has to nequal from the sent machine and reciving maching optherwise the frame is dropped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

baseband

A

the cable only carries one type of signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what cable did 10BaseT use ?

A

unshielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

10BaseT summary

A
  • Speed 10 Mbps
  • Signal type Baseband
  • Distance 100 meters between the hub and the node
  • Node limit No more than 1024 nodes per hub
  • Topology Star-bus topology: physical star, logical bus
  • Cable type Cat 3 or better UTP cabling with RJ-45 connector
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

how does fiber optic send data?

A

puleses of light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

10BaseFL

A

fiber optics cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

10BaseFL summary

A
  • Speed 10 Mbps
  • Signal type Baseband
  • Distance 2000 meters between the hub and the node
  • Node limit No more than 1024 nodes per hub
  • Topology Star-bus topology: physical star, logical bus
  • Cable type Multimode fiber-optic cabling with ST or SC connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what does a media converter do?

A

connects different ethernet types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

csma/cd

A

carrier sense mutiopple access/ collision detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

carrier sense

A

each node usuing the network examines thew cable before sending a data frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

EXAM TIP CSMA/CD is a network access method that maps to the IEEE 802.3
standard for Ethernet networks.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

mutiple access means

A

all machines have equal access otoo the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what happens if there is a collision?

A

both senders know that a collision ahppend they will wait arandom amount of tinme and check if the cable is free before resending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EXAM TIP Adding another hub or two to an early Ethernet network
enabled you to add more devices, but also compounded the problem with
collisions. In such a scenario, you could connect networks using a bridge.
A bridge acted like a repeater to connect two networks, but then went a
step further—filtering and forwarding traffic between those segments
based on the MAC addresses of the computers on those segments. This
placement between two segments preserved bandwidth, making larger
Ethernet networks possible. You’ll see the term “bridge” applied to modern
devices, primarily in wireless networking. The interconnectedness of
network segments is similar, but the devices are fundamentally different.
See Chapter 14 for the scoop on wireless.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

switch

A

come with extra smarts that enable
them to take advantage of MAC addresses, effectively creating point-to-point connections between two conversing computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

SAT

A

Source ADDRESS TABLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

once a switch gets an address what does it do

A

ity stores the address in the source address table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

EXAM TIP One classic difference between a hub and a switch is in the
repeating of frames during normal use. Although it’s true that switches
initially forward all frames, they filter by MAC address in regular use. Hubs
never learned and always forwarded all frames.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

what happens when 2 computers connect too a switch at the same time?

A

Each port on a switch is in its own collision domain, plus the switch can buffer incoming frames. That means that two nodes connected to the switch can send data at the same
time and the switch will handle it without any collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

uplink port

A

enables the connection of 2 swqitches usuing straight through cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

bridging lopp[s or switching loops

A

redudent connections between switches on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

STP

A

spanning trree proocal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

spanning tree protocal

A

sensinsin loops before they hapopen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

BPDU

A

Bridge protocal data units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bridge protocal data units

A

switches communicate with other switches too stop bridges from happening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

VPN

A

Virtual private network

38
Q

virtual private network

A

l standards use encrypted tunnels between a computer or a remote network and a private network through the Internet

39
Q

endpoints

A

the end of the tunnel where data is encrypted and decrypted

40
Q

vpn creatyes a virual nic on your system to make a connection with the other network which gratns 2 ipv4 addresses

A
41
Q

PPP

A

Point to Point Protocoal

42
Q

RRAS

A

Routing and Remote access server

43
Q

how to set up a virual connection

A

On the Windows client side, you run Add a VPN connection in Settings in the Control Panel. (With older versions of Windows, you’d run the Create a new connection
option in the Network and Sharing Center applet.) This creates a virtual NIC that, like
any other NIC, does a DHCP query and gets an IP address from the DHCP server on
the private network (Figure 11-5)

44
Q

When your computer connects to the RRAS server on the private network, PPTP
creates a secure tunnel through the Internet to the private LAN

A
45
Q

l2tp

A

layer 2 tunneling protocol

46
Q

vpn concectrator

A

a vpn capable router

47
Q

site to site vpn connection

A

two local lans connecting as one single network

48
Q

ifference between l2tp and pptp l2tp has no encrytpion

A

l2tp has no encryption

49
Q

ssl vpn

A

dont require client software

50
Q

what are the 2 different types of ssl vpns

A

ssl portal and ssl tunnel

51
Q

ssl portal vpn

A

clien gains access too anything on that webpage

52
Q

ssl tunnel vpns

A

creates a more typical hos to site connectino

53
Q

dtls vpn

A

datagram tls vp

54
Q

datagram tls vpn

A

optimize connection for delay sensative applications

55
Q

dmvpn

A

dynamic multipoint vpn

56
Q

dynamic multipoint vpn

A

direct vpn connection between multiple locations

57
Q

managed switching

A

have programming and logic to handle switching security and more

58
Q

3 ways to connect to a mangaed switch

A

Directly plug into a serial interface and use a virtual terminal program to connect
to a command-line interface.
* Get the switch on the network and then use a virtual terminal over SSH to
connect to the same command-line interface.
* Get the switch on the network and use the switch’s built-in Web interface

59
Q

how to connect to a manged switch

A

First, many managed switches have a special serial port called a console port. Plug a laptop into the console port on the back of the switch (Figure 11-7). Then, run a terminal
program like PuTTY to access the command-line interface on the switch. As long as you
speak the language of the switch’s command prompt, you’re good to go. It’s very common
to use a console port for initial configuration of a new managed switch.
The second and third methods require the managed switch to be connected to the
network and have an accessible IP address. Connect to the switch over the network and
run some sort of software—either PuTTY or a Web browser—to manage the switch.

60
Q

A managed switch enables you to configure every port on the switch
in a lot of different ways, depending on the purpose and complexity of the
switch. For example, it’s easy to set the speed and duplexing of a port to
match the client.

A
61
Q

You configure a default gateway on a switch by telling the
switch the IP address of the router. For most implementations, type in the
IP address of your Internet connection box, such as a fiber-optic or cable
modem

A
62
Q

managment port

A

a port soley for doing interface configuration

63
Q

EXAM TIP You’ll find out-of-band management options—management
URL, modem connection, console port—on switches and on routers.
CompTIA uses the term console router to describe a router with out-of-band
management capabilitie

A
64
Q

vlan

A

virtual local are network

65
Q

virtual lan

A

allows you too segment a phyusical network into mutiple discreet networks without additional hardware.

66
Q

setup a vla and then assign ports to those vlans and have computers access it through those ports

A
67
Q

trunking

A

the proccess of transferring vlan traffic between two or more switches

68
Q

EXAM TIP Expect a question or two on segmentation and interface properties
of VLANs and 802.1Q. These will ask you about what each accomplishes and
perhaps how a configuration screen should function.

A
69
Q

NOTE VLANs based on ports are the most common type of VLAN and are
commonly known as static VLANs. VLANs based on MAC addresses are called
dynamic VLANs. The latter method is never used these days

A
70
Q

tagging

A

assins the traffic with the approrpriate vlans when frames enter the switch

71
Q

EXAM TIP Expect a question or two on the CompTIA Network+ exam that
checks your knowledge of tagging and untagging ports on VLAN switches.
Also, you’ll get a question on why you would want to change a native VLAN
(to mitigate against double-tagging attacks).

A
72
Q

vlan tp

A

vlantrunking protocol

73
Q

vlan trunking protocol

A

autotmate the updating of multiple vlan switches

74
Q

NOTE VTP offers VTP pruning, a tool for minimizing broadcast traffic. This
can be a very useful tool on larger-scale networks.

A
75
Q

NOTE Clients can update servers the same way servers update clients. The
difference is that VLAN information can only be changed on servers.

A
76
Q

intervlan routing

A

te use ofa switch in order to make a router work between 2 or more vlans

77
Q

router on a sitck configuration

A

used a single router interface to connefct to mutiple vlans on a switch

78
Q

layer 2 switch fowards based on

A

mac address

79
Q

layer 3 switch fowards based on

A

i.p address

80
Q

NOTE Any device that works at multiple layers of the OSI seven-layer model,
providing more than a single service, is called a multifunction network device.

A
81
Q

load balencing

A

making a buch of servers look like a single server

82
Q

traffic shapping

A

control the flow of packets in and out off your network

83
Q

traffic shapping

A

control the flow of packets in and out off your network

84
Q

EXAM TIP Several companies enable signature management in the cloud,
to help monitor and protect network traffic from malicious code, picking
out known and suspect malware signatures with continuously updating
definition files. Check out www.threatconnect.com for a prototypical
example. And look for a signature management question on the CompTIA
Network+ exam.

A
85
Q

EXAM TIP The CompTIA Network+ exam can refer to an IDS system by either
its location on the network—thus NIDS or HIDS—or by what the IDS system
does in each location. The network-based IDS scans using signature files,
thus it is a signature-based IDS. A host-based IDS watches for suspicious
behavior on systems, thus it is a behavior-based IDS

A
86
Q

EXAM TIP Expect a question on the appropriate placement of a multilayer
switch such as an IPS or IDS within a network. This tackles the differences
among HIDS, NIDS, HIPS, and NIPS. Some of these devices might have
routing functions as well as switching functions, so be prepared for either
word to be used in the description.

A
87
Q

port mirroring

A

copy all daya on a swithc too a physical port

88
Q

proxy server

A

takes reques from client and makes them itsellf to the external server

89
Q

NOTE If a proxy server caches a Web page, how does it know if the cache
accurately reflects the real page? What if the real Web page was updated?
In this case, a good proxy server uses querying tools to check the real Web
page to update the cache.

A
90
Q

reverse poroxy server

A

gets data from the servers and gives it too the clients the client only seees the prixyh serever