Network Configurations (2.1, 2.5 and 2.6) Flashcards

1
Q

Where is the data limited to travelling in the link/network interface layer?

A

The local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the link/network interface layer responsible for?

A

Putting frames in the physical network’s transmission media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the internet layer used for?

A

Addressing packets and routing them across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the transport layer do?

A

Shows how to send the packets (using protocols e.g. TCP and UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the application layer contain?

A

All the protocols that perform higher-level functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define multicast address

A

A logical identifier for a group of hosts in a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a classful mask?

A

Default subnet mask for a given class of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does classless inter-domain routing (CIDR) allow?

A

Borrowing some of the host bits and reassigning them to the network portion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a public (routable) IP?

A

Can be accessed over the Internet and is assigned to the network by an ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a private (non-routable) IP, including the numbers it could start with.

A

Can by used by anyone at any time but only within their own LAN. Ranges include those IPs that start with 10, 172 or 192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you route private IPs through a public IP?

A

By using network address translation (NAT).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a loopback address? Give the IP.

A

An address that creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system. 127.0.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When would automatic private IP addresses (APIPA) be used?
Give the IP range.

A

When a device does not have a static IP address or cannot reach a DHCP server.
169.254.0.0 to 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the acronym for the process of obtaining an address from a DHCP server?

A

DORA: Discover, offer, request, acknowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you statically assign an IP address?

A

Manually type the IP address for the host, its subnet mask, default gateway and DNS server (impractical on large enterprise networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does DNS do?

A

Converts the domain names used by a website to the IP address of its server (the internet version of a phonebook)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does Windows Internet Name Service (WINS) do?

A

Identifies NetBIOS systems on a TCP/IP network and converts those names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does Bootstrap Protocol (BOOTP) do?

A

Dynamically assigns IP addresses and allows a workstation to load a copy of a boot image to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does DHCP do?
Give the IP range.

A

Assigns an IP based on an assignable scope of addresses and provides the ability to configure other options. Each IP is leased and returned to the pool when lease expires
192.168.1.100 to 192.168.1.200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the modern implementation of BOOTP?

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name a positive and negative of APIPA.

A
  • Allows for quick configuration of a LAN without the need for a DHCP server
  • APIPA-assigned devices cannot communicate outside the LAN or with non-APIPA devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does ZeroConf do?
(Name three things.)

A
  • Assigns IPv4 link-local addresses to a client
  • Resolves computer names to IP addresses using mDNS
  • Performs service discovery on a network (essentially the same features as APIPA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is ZeroConf called on Windows and Linux?

A

Windows: Link-local Multicast Name Resolution (LLMNR)
Linux: SystemD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is scope (in context of DHCP)?

A

The list of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet. There are 254.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does DHCP do?

A

Provides an IP address to every machine on the network and eliminates configuration errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is DHCP reservation?

A

Excluding some IP addresses from being handed to devices unless they meet a certain condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does DNS help network clients find a website?

A

By using human-readable hostnames instead of numeric IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define a fully-qualified domain name (FQDN).

A

A domain name under a top-level provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does the Uniform Resource Locator (URL) contain?

A

The FQDN with the method of accessing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What can CNAME records be used for?

A

To point to another domain or subdomain (not to an IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What DNS record has the function of linking a hostname to an IPv6 address?

A

AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define Sender Policy Framework (SPF).

A

A DNS record that identifies the host authorised to send mail for the domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What does DKIM do?

A

Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is DMARC?

A

A framework that is used for proper application of SPF and DKIM, utilising a policy that is published as a DNS record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a nameserver?

A

A type of DNS server that stores all the DNS records for a given domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What does internal DNS do?

A

Allows cloud instances on the same network to access each other using internal DNS names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is external DNS?

A

Records created around the domain names from a central authority and used on the public Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the function of Time to Live (TTL)?

A

It tells the DNS resolver how long to cache a query before requesting a new one

39
Q

What does the DNS cache do?

A

Makes a local copy of every DNS entry it resolves

40
Q

How does a recursive lookup work?

A

A DNS server communicates with several other DNS servers to hunt down the IP address and return to the client

41
Q

How does an iterative lookup work?

A

Each DNS server responds directly to the client with an address for another DNS server that may have the correct IP address

42
Q

What is VLAN trunking?

A

Where multiple VLANS are transmitted over the same physical cable

43
Q

Name two benefits of a VLAN.

A
  • Allows different logical networks to share the same physical hardware
    (switch ports can be in different VLANs)
  • Provides added security and efficiency
44
Q

Name two 4-byte identifiers.

A
  • Tag Protocol Identifier (TPI)
  • Tag Control Identifier (TCI)
45
Q

What is the name given to the untagged VLAN?

A

The native VLAN

46
Q

What does a VPN do?
Name the two different types.

A

Extends a private network across a public network and enables sending and receiving data across shared or public networks.
Site to site or Client to site

47
Q

How does a full tunnel VPN work?

A

Routes and encrypts all network requests through the VPN connection back to the headquarters

48
Q

What does a split tunnel VPN do?

A

Routes and encrypts only the traffic bound for the headquarters over the VPN and sends the rest of the traffic to the regular Internet

49
Q

Why would you use a clientless VPN?

A

When you want a secure remote-access VPN tunnel using a web browser, without using a software or hardware client

50
Q

What does secure socket layer (SSL) do?

A

Provides cryptography and reliability using the upper layers of the OSI model (5, 6 and 7)

51
Q

What does transport layer security (TLS) do?

A

Provides secure web browsing over HTTPS

52
Q

How many addresses are there in each of IPv4 and IPv6?

A

IPv4: 4.2 billion (2^32)
IPv6: 340 undecillion (2^128)

53
Q

List five concepts from the experimental protocol IPv5 that have been incorporated into IPv6.

A
  • Larger address space
  • No broadcasts
  • No fragmentation
  • Can coexist with IPv4
  • Simplified header
54
Q

When would you need a dual stack?

A

When you need to run both IPv4 and v6 protocols on the same network devices

55
Q

How can you get an existing IPv4 router to carry IPv6 traffic?

A

By creating a tunnel

56
Q

Which IP version uses hexadecimal digits and allows the use of shorthand notation?

A

IPv6

57
Q

Which IP version includes the TTL, payload and header checksum in its header?

A

IPv4

58
Q

What is a unicast address used for?

A

To identify a single interface

59
Q

Describe globally-routed unicast address.

A

Similar to IPv4’s unicast class A, B and C addresses; begins with 2000-3999

60
Q

Describe link-local/local use unicast address

A

Used like a private IP in IPv4 that can only be used on the LAN and begins with FE80

61
Q

What does stateless address autoconfiguration (SLAAC) do?

A

Eliminates the need to obtain addresses or other configuration information from a central server

62
Q

What is a multicast address used for, and what does it begin with?

A

Used to identify a set of interfaces; begins with FF

63
Q

What is the purpose of an anycast address?

A

To identify a set of interfaces so that a packet can be sent to any member of a set

64
Q

What does an Extended Unique Identifier (EUI) do?

A

Allows a host to assign itself a unique 64-bit IPv6 interface identifier called EUI-64

65
Q

What does the DHCPv6 protocol do?

A

Allows DHCP to automatically assign addresses from a DHCPv6 server

66
Q

Define a port.

A

A logical communication endpoint that exists on a compouter or server

67
Q

Define an inbound port.

A

A logical communication opening on a server that is listening for a connection from a client

68
Q

Define an outbound port.

A

A logical communication opening created on a client in order to call out to a server that is listening for a connection

69
Q

What number can ports have?

A

Any number between 0 and 65535

70
Q

What are well-known ports?

A

Ports 0 to 1023; they are assigned by the Internet Assigned Numbers Authority (IANA)

71
Q

Which ports are considered registered and usually assigned to proprietary protocols?

A

1024 to 49151

72
Q

Which port numbers would you be able to use without them being registered with IANA? What are these ports called?

A

49152 to 65535
Dynamic/private ports

73
Q

What protocol uses ports 20 and 21, and what does it do?

A

FTP; provides insecure file transfers

74
Q

What port does SSH use and what does it do?

A

Port 22; provides secure remote control of another machine using a text-based environment

75
Q

What port does SFTP use and what does it do?

A

Port 22; provides secure file transfers

76
Q

Give the protocol and port from this description:
“Provides insecure remote control of another machine using a text-based environment.”

A

Telnet, port 23

77
Q

Give the protocol and port from this description:
“Converts domain names to IP addresses and IP addresses to domain names.”

A

DNS, port 53

78
Q

What port does SMTP use?

A

Port 25

79
Q

What ports does DHCP use?

A

Port 67 and 68

80
Q

Which port does HTTP use for insecure web browsing?

A

Port 80

81
Q

Which port does Post Office Protocol Version Three (POP3) use, and for what?

A

Port 110; used for receiving incoming emails

82
Q

Give the port/s and use for the NetBIOS

A

Ports 137 and 139; used for file or printer sharing in a Windows network

83
Q

What protocol improves upon POP3 and what port does it use?

A

Internet Mail Application Protocol (IMAP); port 143

84
Q

Name the protocol that uses these ports (and what it is used for): Ports 161 and 162

A

Simple Network Management Protocol (SNMP); it is used to collect data about network devices and monitor their status

85
Q

Name the protocol that uses this port and what it is used for: Port 389

A

LDAP; used to provide directory services to the network

86
Q

Which port does HTTPS use?

A

Port 443

87
Q

What security measures does HTTPS use?

A

Secure Socket Layer and Transport Layer Security

88
Q

What port does Server Message Block use and what is it used for?

A

Port 445; used for Windows file and printer sharing services

89
Q

Give the protocol and the port from the below description:
“Provides graphical remote control of another client or server.”

A

Remote Desktop Protocol (RDP); port 3389

90
Q

Is TCP or UDP more reliable, and why?

A

TCP is more reliable because it requires a three-way handshake before transmitting any data

91
Q

Which protocols are TCP (connection-oriented)?

A
  • SSH
  • HTTP
  • HTTPS
92
Q

Which protocols are UDP (connectionless)?

A
  • Audio
  • Video streaming
  • DHCP
  • TFTP
93
Q

Which protocol, TCP or UDP, enables segment retransmission and flow control (windowing)?

A

TCP

94
Q

Port 69 supports what protocol?

A

Trivial File Transfer Protocol (TFTP), a connectionless protocol that uses UDP as its transport.