Chapter 11 Flashcards

1
Q

Network hardware devices that function at the ____ layer, are network interface cards (NICs), hubs, repeaters, concentrators, and amplifiers.

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switches function at the ___ layer.

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is used to resolve IP addresses into MAC addresses.

A

Address Resolution Protocol (ARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

____ used to resolve MAC addresses into

IP addresses.

A

Reverse Address Resolution Protocol (RARP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The routing protocols are located at the _____ layer and include the following:

Internet Control Message Protocol (ICMP)
Routing Information Protocol (RIP)
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Internet Group Management Protocol (IGMP)
Internet Protocol (IP)
Internet Protocol Security (IPSec)
Internetwork Packet Exchange (IPX)
Network Address Translation (NAT)
Simple Key Management for Internet Protocols (SKIP)
A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______ determine the best logical path for the transmission of packets based on speed, hops, preference, and so on.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

__________ use the destination IP address to guide the transmission of packets.

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_______ routing protocols maintain a list of destination networks along with metrics of direction and distance as measured in hops (in other words, the number of routers to cross to reach the destination).

A

Distance vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ routing protocols maintain a topography map of all connected networks and use this map to determine the shortest path to the destination.

A

Link state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet Exchange (SPX), Secure Sockets Layer (SSL), Transport Layer Security (TLS) operate within the ________ layer

A

Transport layer:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
\_\_\_\_\_\_\_\_\_\_ manages dialogue discipline or
dialogue control (simplex, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last verified checkpoint.
A

The Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The _________ is responsible for establishing, maintaining, and terminating communication sessions between two computers.

A

Session layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ layer is also responsible for encryption and compression.

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______ is a simplex connectionless protocol.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. The client sends a ____ flagged packet to the server.
  2. The server responds with a ______ flagged packet
    back to the client.
  3. The client responds with an ___________ flagged packet back to the server.
A

SYN

SYN/ACK

ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Each side of a conversation will transmit a ___ flagged packet once all of its data is transmitted, triggering the opposing side to confirm with an ___ flagged packet.

A

FIN

ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data flow is controlled through a mechanism called _______ .

A

sliding windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A TCP header is ___ bytes long.

A

20 to 60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

________ offers no error detection or correction, does not use sequencing, does not use flow control mechanisms, does not use a preestablished session, and is considered unreliable.

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A UDP header is ______ long.

A

8 bytes (64 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

________ provides route addressing for data
packets. It is this route addressing that is the foundation of global Internet communications because it provides a means of identity and prescribes transmission paths.

A

Internet Protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Decimal Range of First Octet of Class A

A

0 - 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Decimal Range of First Octet of Class B

A

128 - 191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Decimal Range of First Octet of Class C

A

192 - 223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Decimal Range of First Octet of Class D
224 - 239
26
Decimal Range of First Octet of Class E
240 - 255
27
_____ allows systems to support multicasting.
Internet Group Management Protocol (IGMP)
28
Telnet, TCP port ____
Port 23
29
File Transfer Protocol (FTP), port____
TCP Ports 20 and 21
30
Trivial File Transfer Protocol (TFTP)
UDP Port 69
31
Simple Mail Transfer Protocol (SMTP)
TCP Port 25
32
Post Office Protocol (POP3)
TCP Port 110
33
Internet Message Access Protocol (IMAP),
Port 143
34
Dynamic Host Configuration Protocol (DHCP)
Ports 67 and 68
35
Line Print Daemon (LPD)
TCP Port 515
36
X Window
Ports 6000–6063
37
Bootstrap Protocol (BootP)/Dynamic Host Connfiguration Protocol (DHCP)
UDP Ports 67 and 68
38
Network File System (NFS)
TCP Port 2049
39
Simple Network Management Protocol (SNMP)
UDP Port 161 (UDP Port 162 | for Trap Messages)
40
____________ is a form of network datastorage solution (storage area network [SAN]) or network-attached storage [NAS]) that allows for high-speed file transfers at upward of 16 Gbps.
Fibre Channel over Ethernet (FCoE)
41
______ is a high-throughput high-performance network technology that directs data across a network based on short path labels rather than longer network addresses.
MPLS (Multiprotocol Label Switching)
42
___________ can be used to enable location-independent file storage, transmission, and retrieval over LAN, WAN, or public Internet connections.
Internet Small Computer System Interface (iSCSI)
43
___________ is the IEEE standard for wireless network communications.
802.11
44
Two mthods that wireless clients can use to | authenticate to WAPs before normal network communications can occur across the wireless link are
open system authentication (OSA) and shared key | authentication (SKA).
45
______ encapsulates EAP methods within a | TLS tunnel that provides authentication and potentially encryption.
PEAP (Protected Extensible Authentication Protocol)
46
_______ is a Cisco proprietary alternative | to TKIP for WPA.
LEAP (Lightweight Extensible Authentication Protocol)
47
_______ improvements include a key-mixing function that combines the initialization vector (IV) (i.e., a random number) with the secret root key before using that key with RC4 to perform encryption
TKIP (Temporal Key Integrity Protocol)
48
_______ the preferred standard security protocol of 802.11 wireless networking,the preferred standard security protocol of 802.11 wireless networking uses (Advanced Encryption Standard) with a 128-bit key.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
49
_____ are crafted from a straight bar with cross sections to catch specific radio frequencies in the direction of the main bar. Panel antennas Parabolic antennas Cantennas Yagi antennas
Yagi antennas
50
________ are flat devices that focus from only one side of the panel. Panel antennas Parabolic antennas Cantennas Yagi antennas
Panel antennas
51
________ are constructed from tubes with one sealed end. They focus along the direction of the open end of the tube. Panel antennas Parabolic antennas Cantennas Yagi antennas
Cantennas
52
________ are used to focus signals from very long distances or weak sources. Panel antennas Parabolic antennas Cantennas Yagi antennas
Parabolic antennas
53
An ________ is a section of an organization’s network that has been sectioned off so that it acts as an intranet for the private network but also serves information to the public Internet.
extranet
54
networks are segmented or subdivided into smaller organizational units to :
Boosting Performance Reducing Communication Problems Providing Security
55
____________ filters traffic by examining data from a message header. Usually, the rules are concerned with source, destination, and port addresses. Also known as first- generation firewalls. stateful inspection firewalls Application-Level Gateway Firewalls Static Packet-Filtering Firewalls Circuit-level gateway firewalls
Static Packet-Filtering Firewalls
56
____________ filters traffic based on the Internet service (in other words, the application) used to transmit or receive the data. This type of firewall negatively affects network performance because each packet must be examined and processed as it passes through the firewall. Also known as second-generation firewalls. stateful inspection firewalls Application-Level Gateway Firewalls Static Packet-Filtering Firewalls Circuit-level gateway firewalls
Application-Level Gateway Firewalls
57
____________ permit or deny forwarding decisions based solely on the endpoint designations of the communication circuit (in other words, the source and destination addresses and service port numbers). stateful inspection firewalls Application-Level Gateway Firewalls Static Packet-Filtering Firewalls Circuit-level gateway firewalls
Circuit-level gateway firewalls
58
By examining source and destination addresses, application usage, source of origin, and relationship between current packets and the previous packets of the same session, ________ are able to grant a broader range of access for authorized users and activities and actively watch for and block unauthorized users and activities.users and activities and actively watch for and block unauthorized users and activities. stateful inspection firewalls Application-Level Gateway Firewalls Static Packet-Filtering Firewalls Circuit-level gateway firewalls
stateful inspection firewalls
59
______ are used to control traffic flow on networks and are often used to connect similar networks and control traffic flow between the two.
Routers
60
10Base2 Max Speed ______ Distance ______
10 Mbps 185 meters
61
10Base5 Max Speed ______ Distance ______
10 Mbps 500 meters
62
10Base-T (UTP) Max Speed ______ Distance ______
10 Mbps 100 meters
63
STP Max Speed ______ Distance ______
155 Mbps 100meters
64
100Base- T/100Base-TX Max Speed ______ Distance ______
100 Mbps | 100 meters
65
1000Base-T Max Speed ______ Distance ______
1 Gbps 100 meters
66
Fiber-optic Max Speed ______ Distance ______
2+ Gbps 2+ kilometers
67
________ transmits data in a series while constantly changing the frequency in use. The entire range of available frequencies is employed, but only one frequency at a time is used. As the sender changes from one frequency to the next, the receiver has to follow the same hopping pattern to pick up the signal. Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency-Division Multiplexing (OFDM) Frequency Hopping Spread Spectrum (FHSS)
Frequency Hopping Spread Spectrum (FHSS)
68
_________ employs all the available frequencies simultaneously in parallel and also uses a special encoding mechanism known as chipping code to allow a receiver to reconstruct data even if parts of the signal were distorted because of interference. Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency-Division Multiplexing (OFDM) Frequency Hopping Spread Spectrum (FHSS)
Direct Sequence Spread Spectrum (DSSS)
69
_________ employs a digital multicarrier modulation scheme that allows for a more tightly compacted transmission. The modulated signals are perpendicular (orthogonal) and thus do not cause interference with each other. Direct Sequence Spread Spectrum (DSSS) Orthogonal Frequency-Division Multiplexing (OFDM) Frequency Hopping Spread Spectrum (FHSS)
Orthogonal Frequency-Division Multiplexing (OFDM)
70
IEEE 802.15
Bluetooth
71
_______ allows an attacker to transmit SMS-like messages to your device. Bluebugging bluejacking Bluesnarfing
bluejacking
72
______ allows hackers to connect with your Bluetooth devices without your knowledge and extract information from them. Bluebugging bluejacking Bluesnarfing
Bluesnarfing
73
_______ is an attack that grants hackers remote control over the feature and functions of a Bluetooth device. Bluebugging bluejacking Bluesnarfing
Bluebugging
74
IEEE 802.3 Ethernet Token Ring Fiber Distributed Data Interface
Ethernet
75
______ can be deployed as a physical star using a multistation access unit (MAU).
Token Ring
76
_________ is a high-speed token-passing technology that employs two rings with traffic flowing in opposite directions.
Fiber Distributed Data Interface
77
_________ communications occur through the use of a discontinuous electrical signal and a state change or on-off pulses. Analog Digital
Digital
78
__________ communications occur with a continuous signal that varies in frequency, amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape (as opposed to the square shape of a digital signal). The actual communication occurs by variances in the constant signal. Analog Digital
Analog
79
There are two broad categories of routing protocols: ______ and ____ .
link state distance vector
80
What are the two broad categories of routing protocols ?
distance vector and link state
81
a tunneling mechanism used to transport voice and/or data over a TCP/IP network.
Voice over IP (VoIP)
82
______ allows data transmission paths, communication decision trees, and flow control to be virtualized rather than being handled on the hardware on a per device basis.
Software-Defined Networking (SDN)