Key words Flashcards

(95 cards)

1
Q

What is Layer 1 of the OSI model?

A

Physical layer - Signalling, Cabling, Connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens at Layer 1 (Physical layer) of the OSI model?

A

Packets are converted into electrical, radio, or optical pulses and transmitted as bits (the smallest possible units of information) over wires, radio waves or cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a layer 1 (Physical) issue look like?

A

Issues with cabling, Punch downs, Electrical signals, Bad ports - Solutions can involve replacing cables, Swapping adapter cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Layer 2 of the OSI model?

A

Data link Layer - The basic network ‘language’ - Foundation layer of connection - Uses MAC address on ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What happens at Layer 2 (Data link) of the OSI model?

A

Handles communications between devices on the same network. If Layer 3 is like the address on a piece of mail, then layer 2 is like indicating the office number or apartment of that address. Ethernet is the protocol most used here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DLC protocol and what does it do?

A

Data link control protocol - Provides functions such as flow control, error detection and error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Layer 3 of the OSI model?

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens at Layer 3 of the OSI model?

A

Handles the routing and sending of data between different networks. The most important protocols at this layer are IP and ICMP. IP addresses (Logical Address) operates at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Layer 4 of the OSI model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens at Layer 4 of the OSI model?

A

Provides the means for transmitting data between the two connected parties, as well as controlling the quality of service. The main protocols used are TCP and UDP - Assembling and Disassembling data happens here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is TCP?
What is the connection type?
Does it sequence data?
Does it allow for data retransmission?
Is delivery guaranteed?
Does it check for errors?
Does it support broadcasting?
Is it fast or slow?

A

Transmission Control Protocol:
Connection type - Requires an established connection before transmitting data
Data Sequence - Can sequence data (send in a specific order)
Data retransmission - Can retransmit data if packets fail to arrive
Delivery - Delivery is guranteed
Check for errors - Thorough error-checking guarantees data arrives in its intended state
Broadcasting - Not supported
Speed - Slow but complete data delivery

TCP is the only protocol that can retransmit lost data packets - When reliability is critical, TCP is the best option.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is UDP?
What is the connection type?
Does it sequence data?
Does it allow for data retransmission?
Is delivery guaranteed?
Does it check for errors?
Does it support broadcasting?
Is it fast or slow?

A

User Datagram Protocol:
Connection type - No connection is needed to start and end a data transfer
Data Sequence - Cannot sequence or arrange data
Data retransmission - No data retransmitting. Loss data can’t be retrieved
Delivery - Delivery is not guaranteed
Check for errors - Minimal error-checking covers the basics but may not prevent all errors
Broadcasting - Supported
Speed - Fast, but at risk on incomplete data delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some use cases that TCP is better suited to?

A

Email or Texting
File transfers
Web browsing
Remote device or network administration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some use cases that UDP is better suited to?

A

Live streaming
Online gaming
Video chatting/ Conferencing
VOIP
Domain Name Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does TCP work?

A

Uses the 3 way hand shake

Client device initiating contact will send a sequence number (SYN) to the server. Tells the server the number that the data packet transfer should begin with.
The server acknowledges the client SYN and sends its own SYN number. This step is referred to as SYN-ACK (SYN acknowledgement)
The client then acknowledges(ACK) the server’s SYN-ACK, which forms a direct connection and begins the data transfer.

The connection between the sender and receiver is maintained until the transfer is successful. Every time a data packet is sent, it requires an acknowledgment from the receiver. So, if no acknowledgment is received, the data is resent.

If an error is acknowledged, the faulty packet is discarded and the sender delivers a new one. Heavy traffic or other issues may also prevent data from being sent. In that case, the transmission is delayed (without breaking the connection).Thanks to these controls, successful data delivery is guaranteed with TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does UDP work?

A

UDP works by sending data immediately to the receiver who made a transmission request until the transmission is completed or terminated. Sometimes called a “fire and forget” protocol, UDP fires data at a recipient without confirming delivery or checking if packets arrived as intended.

Does not perform a handshake. Speeds up transfer data by sending packets without making an agreement with a receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is layer 5 of the OSI model?

A

Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What happens at layer 5 of the OSI model?

A

Controls connections between computers (this can also be handled at layer 4 by the TCP protocol) - Part of the host that makes connection to the remote host i.e. a web browser to a web server or an email client to to an email server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is layer 6 of the OSI model?

A

Presentation Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is EMI?

A

Electromagnetic Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is CSMA/CD?

A

Carrier Sense Multiple Access/Collision Detection Is a technology used for devices to listen and see who is communicating. Collision detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is ARP?

A

Address resolution protocol - ARP is a method used to get the MAC address of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is full duplex?

A

Is a communication mode where two devices can talk at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is CSMA/CA?

A

Is for collision avoidance rather than detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a SFP(Small form-factor Pluggable)?
SFP is a type of transceiver that connects to a MSA module slot on the motherboard to allow any fiber connector to be used with any switch
26
What is a Punchdown tool?
27
What is a 110-block?
28
What is the MDF?
Main Distribution Frame
29
What is the IDF?
Intermediate Distribution Frame
30
What is the first thing to check if your machine cannot ping anything on the network including another machine on your subnet?
Check if the NIC has a link light
31
How many inches is a U?
1.75
32
Which type of Radio grade is the most common for Coaxial cable?
RG^
33
What is the broadcast address for ARP?
FF:FF:FF:FF:FF:FF
34
Which command will show the ARP cache?
arp -a
35
Name the different IP class ranges and the ranges?
Class A = 0-126 Class B=128-191 Class C = 192-223 Class D = 224-239
36
Many users are complaining that they cannot get on the Internet. You arrive at one user’s computer and ping the company’s Router and it’s successful. What would be the next command you should type? netstat nslookup net use tracert
netstat nslookup net use tracert
37
You are using netstat, and you want to show all Active Ports. What would you type? netstat -n netstat -o netstat -b netstat -a
A netstat -a Explanation: -n = Will show Foreign Addresses in a Numerical Format (Cleans up the Report) -b = Shows the executable for every connection. -o = Will show the Process ID column. -a = Shows all ACTIVE/OPEN Ports.
38
What port does HTTP use? 20 80 143 443
80
39
What is the proper name for a DNS server that can respond to a query with their own DNS information? Authoritative Administrative Authenticated Admissible
Authoritative
40
Which type of record is used with IPv4? AAAA Record CNAME MX A Record
A record A=IPv4 AAAA=IPv6 CNAME=Alias MX=Mail Exchange Servers
41
Which of the following is NOT part of the Structured Cabling System? Horizonal Runs Wall Jacks Equipment Room Work Area
Wall Jacks
42
You type www.google.com and you receive an error. However, if you type a known IP address for Google, it works. What might be the problem? DHCP Scope Issue Misconfigured IP Address Incorrect Default Gateway DNS
DNS (Domain Name System) Explanation: DNS = Resolves FQDN to IP Addresses
43
Which tool is used for testing DNS using a third-party tool? dig nslookup ping netstat
DIG - Used on Apple Mac and Linux
44
What is an example of Authentication? Accessing a Folder you were granted rights to? Showing an ID Proving through Credentials that you have rights to a System. Using a Retinal Scanner
Proving through credentials that you have rights to a system
45
What are the 3 Methods of Security Access to a System? Identification, Authentication, Authorization Identification, Automating, Authorization The “Three Ps” - Proof, Proper Rights, and Proper Access Authorization, Authentication, Accessibility
Identification, Authentication, Authorization
46
Which would be an example of Role-Based Access control? Logging in with a Username and Password to Access a System Assigning Rights to a Folder based on a User Labeling a Resource with a specific Name that would provide Access Placing an “Owner” Label on a User Account
A Assigning Rights to a Folder based on a User Explanation: Role Based is assigning users and groups specific rights to specific resources. Authentication is Logging in with a Username and Password Mandatory Access Control is Labeling a Resource with a Specific Name that would provide Access Discretionary Access Control is placing an “Owner” Label on a User Account
47
Which of the following is a benefit of Virtualization? It allows you to create more efficient VPNs Hardware consolidation It’s very expensive, but worth the price It can run on very low-end computers
Hardware consolidation
48
What is Network Function Virtualization (NFV)?
network functions virtualization replaces the functionality provided by individual hardware networking components. This means that virtual machines run software that accomplishes the same networking functions as the traditional hardware
49
You have an application that you are developing, but you don’t want the hassle of setting up servers, ACLs, backups, and managing them. Which type of cloud service would you use? Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Infrastructure as Code (IaC)
Platform as a Service (PaaS)
50
When discussing Infrastructure as Code (IaC), what does automation mean? Using code to provision and maintain systems in a consisten manner. Creating pipelines that automate using longer sequences. Automatically updating services using Windows Update Running several instances of an application automatically.
Using code to provision and maintain systems in a consistent manner
51
Big Corp’s data center has a fiber and cable ISP. What aspect of security does this represent? Active-Passive Multipathing Redundancy Clustering
Redundancy
52
What is a VLAN?
53
What is an SSID?
A service set identifier (SSID) is a sequence of characters that uniquely names a Wi-Fi network.
54
With VoIP, which Port does Session Initiation Protocol (SIP) use? 3389 5060/5061 143 80
5060/5061
55
Which policy describes what users can and cannot do with company equipment? Acceptable Use Policy (AUP) Non-Disclosure Agreement (NDA) BYOD Policy (Bring Your Own Device) Memorandum of Understanding (MOU)
Acceptable Use Policy
56
The CIA Model is a basic model for security. What does CIA stand for? Confidentiality, Integrity, and Availability Central Intelligence Agency Confidentiality, Intelligence and Accessibility Computers, Intelligence, Adaptibility
Confidentiality, Integrity and Availability
57
Which would be an example of a Denial of Service (DoS) Attack? Masquerading Opening tons of Web Browser pages on a Computer VLAN Hopping Ping Flood
Ping Flood
58
What is SNMP?
Simple Network Management Protocol
59
What is an ethernet frame composed of?
FCS, Data, ACK, Sequence, Source Port, Destination Port, Source IP Address, Destination IP Address, Source Mac, Destination
60
What is an IP packet composed of?
Data, Ack, Sequence, Source Port, Destination, Source IP Address, Destination IP Address - Everything an ethernet frame is composed of minus the FCS and the MAC Addresses
61
What does PDU stand for?
Protocol Data Units
62
What does BGP stand for?
Border Gateway Protocol
63
What does CRC stand for and what does it do?
64
What are the first 3 pairs of numbers of MAC addresses known as?
OEM numbers - Original Equipment Manufacturer
65
What is a MAC Address?
It is a 48-bit identifier for a NIC
66
How do NICs decide whether or not to process a frame?
They use MAC addresses to identify if the frame is for them
67
How many values of an IP address will definitely apply to all machines on a network?
The first 3 values
68
When a router receives an ethernet frame, what does it strip?
The MAC addresses and the FCS - Leaving the IP Packet
69
What does a Router use to know where to send data?
Routing Table
70
What does a router do?
Connects multiple Local Area Networks
71
What are the first 1024 port numbers known as?
Well known ports
72
What is Port 80?
HTTP
73
What is Port 20+21?
FTP
74
Why are port numbers used?
They help direct packet traffic between the source & destination - To ensure data goes to the correct application
75
Why do packets have sequence numbers?
So that the network software can reassemble the file correctly
76
What are the advantages of coaxial cable?
Highly resistant to electromagnetic interference - (EMI) Highly resistant to physical damage
77
What are the disadvantages of Coaxial cable?
Inflexible Expensive
78
What does the Radio Grade specify?
The thickness of the conductors, insulation & shielding
79
What does UTP stand for?
Unshielded Twisted Pair
80
What is the maximum distance of a UTP cable?
100 Metres (325 feet)
81
What is the standard max bytes of an ethernet frame?
1522 bytes
82
What is the max bytes that a jumbo frame can contain?
9000 bytes
83
What cable type has the least amount of fire resistance?
PVC
84
What is plenum and plenum rate cable?
Plenum is the gap between the drop ceiling and actual ceiling - Plenum rated cable is designed to be run in plenum - Has the highest fire rating cladding on cable and highest fire rating
85
What is riser rated cable?
Cable designed to run between the different floors in a building, less fire rating than plenum-rated cable but more fire protection than PVC
86
What are the most commonly used cables in networks?
Straight through cables
87
What do switches use to forward packets or frames?
MAC addresses/MAC table
88
What is S.O.A?
Start of Authority - Is the primary DNS server for a particular zone
89
What is CNAME?
Canonical name - Alias
90
What does a reverse lookup zone do?
Used to resolve IP addresses to FQDN's - Primarily used for Mail servers
91
What does a domain name server do?
Resolve IP addresses to FQDN's
92
What is VRRP and what does it do?
93
What is FHRP and what does it do?
94
What is interior routing and what does it do?
95