4. Networking Infrastructure Flashcards

1
Q

2 ways to connect with a LAN

A

Ethernet and WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standard Ethernet cable

A

RJ 45 (8 pin connecter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Landline phone cable

A

RJ 11 (6 pin connecter)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WAN

A

a collection of LANs not tied to one specific location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a PAN is a

A

Personal Area Network - designed to support a single person (Bluetooth - main purpose is to connect peripherals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NFC uses

A

inductive coupling - for payment and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadband connections are

A

always on (as opposed to dial-up) and measured in Mbps or Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A modem converts

A

Digital computer signals to analog for copper wires (and back)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fiber optic modems use a

A

laser to convert digital signals to pulses of light to travel through glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

6 types of internet connections

A

DSL (Digital Subscriber Line); Cable (coaxial), Fiber Optic (glass); Wireless for Mobile; Fixed Wireless (RF), Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5G has speeds

A

up to 20 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4G has speeds

A

up to 14 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP (2 main things)

A

Assigns IP addresses (addresses used by the internet) and breaks data into packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP (2 main things)

A

(Transmission Control Protocol) establishes network connections between systems and tracks/requests new packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The 2 addresses for a computer

A

IP and MAC (media access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 ways to assign an IP address

A

Static (manual) and DHCP (Dynamic Host Configuration Protocol - creates a pool of IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Usually, Static IP addresses are for ______ and DHCP addresses are for ______

A

Servers; End Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IP addresses are used to

A

address network packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

MAC addresses are assigned by the manufacturer of the device and use

A

12 hexidecimal digits (first 6 identify the manufacturer and the last 6 are a unique identifier assigned by the manufacturer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

3 rules for valid IP address octets

A

never higher than 255, never start with 127 (loop back), never start with a number greater than 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IP address that start from 224 - 239 are for

A

multicast systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IP address that start from 240 - 255

A

are for experimental use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Switches connect

A

all of the devices on a LAN to each other using MAC addresses

24
Q

Routers manage

A

traffic to/from the internet and to all of the switches using IP addresses

25
Firewalls use
rules to allow/block traffic between 2 or more networks
26
Border Firewalls sit
between LANs and the Internet (most common - protects the overall network)
27
WiFi uses these items
a radio transceiver, antenna, and wireless access points
28
WiFi is a
set of rules for interaction for all wireless devices and wireless access points, governed by the IEEE (Institute of Electrical and Electronics Engineers). Different versions of the 802.11 standard
29
2 major differences between wireless networking versions are
maximum speed and radio frequency range
30
2.4 GHz networks have
longer range but slower speeds
31
5 GHz networks have
higher speeds but reduced range (need more wireless access points
32
802.11
2.4 GHz / 2 Mbps (1997)
33
802.11b
2.4 GHz / 11 Mbps
34
802.11a
5.0 GHz / 54 Mbps
35
802.11g
2.4 GHz / 54 Mbps
36
802.11n
2.4 or 5 GHz / 600 Mbps (2009) - uses MIMO antenna (Multiple Input/Multiple Output)
37
802.11ac
5 GHz / 1 (3?) Gbps - uses beam forming antenna scheme
38
802.11ax
2.4 and 5 GHz (WiFi 6) / 9.6 Gbps
39
when objects weaken a signal
attenuation
40
2 basic categories of antennas
Omnidirectional (rubber ducks) -doughnut shaped waves, and directional - increases range by focusing power
41
beamforming
the access point uses multiple antennas to detect and steer the signal towards the connecting device (virtual directional antenna)
42
best way to set up a wireless network is to
conduct site survey - measure signal strength, detect electromagnetic interference, and use heat maps to show dead spots
43
different radio frequencies are known as
channels
44
the ‘name’ of the wireless network visible to users
SSID (Service Set Identifier) - broadcasted by default - disable SSID broadcasting to hide your network
45
3 methods of wireless authentication
Pre Shared Keys; Enterprise Authentication (server w/username & password); Captive Portals (redirected - must ‘escape’ the portal to access the internet)
46
WEP is
(Wired Equivalent Privacy) insecure
47
WPA is
(WiFi Protected Access) insecure (uses TKIP - Temporal Key Integrity Protocol, which changes the encryption key for each packet)
48
WPA2 is
secure (uses the protocol CCMP - based on AES (advanced encryption standard) )
49
WPA3
secure (supports CCMP protocol and adds new technology SAE (Simultaneous Authentication of Equals) - a secure key exchange protocol)
50
The protocol used for web content
HTTP - sever uses this protocol to send content, and the web browser re-assembles the content
51
The secure protocol for web content
HTTPS - adds encryption ("s" is for "secure")
52
used to SEND messages between email servers
SMTP (used if the recipient does not already have an account on the senders server) - use SMTPS (secure)
53
When you check your email, your email client reaches out to your email server and requests your messages. This connection can use 3 different protocols
HTTPS (for web based clients - connection takes place over the web, gmail), POP3, and IMAP
54
POP3
Post Office Protocol (downloads/deletes from server - traditional email clients like Outlook) - older protocol. Used to RECEIVE messages. Secure version is POP3 over TLS
55
IMAP(S)
Internet Message Access Protocol (messages remain on the server, can access from any device - traditional email clients like Outlook). Used to RECEIVE messages
56
A subnet mask _______
reveals how many bits in the IP address are used by the network by masking the network portion of the IP address