Network Basics Flashcards

1
Q

A node that serves as the beginning or ending point of communication

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The physical path connecting the nodes

A

Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The information carried by the media

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The network of interface cards, network hardware, cables, and so on that you can see when you look around the building

A

Physical Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The information carried by the physical network, and the paths the information follows

A

Logical Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A port-based, or static assignment creating a broadcast domain in a switch

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carry traffic from multiple VLANs between 2 or more switches

A

Trunk Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Each VLAN needs it’s own router to communicate with other VLANs or the anything outside the LAN (True/False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Four types of Network Security appliances

A

Firewalls
Intrusion detection and prevention systems
VPN endpoints
Unified threat management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Controls incoming and outgoing traffic, preventing unauthorized access to or from your network

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Specialized firewall network device that sits between your internal computer network and the Internet

A

hardware firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Firewall traffic control software that you install on an individual device

A

Software Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Designed to monitor network traffic to look for signs of intrusion or other unwanted activities, evaluated by rules based on the signatures of known attacks, or by heuristic analysis which can recognize unusual or suspicious activities

A

Intrusion detection systems (IDS) and intrusion prevention systems (IPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passive monitoring systems designed to alert administrators when something suspicious happens, but take no action on their own

A

IDS Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active protection systems which can block traffic, disconnect users, or take other corrective actions against an attack

A

IPS Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describes a network scenario where a secure connection is created between multiple computers or LANs across an insecure external network

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A networking device, such as a router, server, firewall, or similar device with Internetworking and data transmission capabilities that sits at the external edge of a secure internal network and requires an external device to identify and authenticate itself before the gateway creates a connection allowing access to internal network resources.

A

VPN Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Communications protocols that provide secure data transmission over an unsecured network. Data is commonly secured using an encryption protocol such as IPsec or a tunneling protocol such as SSL/TLS.

A

Secure transport protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A simple network device that connects multiple nodes in a star configuration

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A device that prevents collisions by ensuring not to send the data to a segment that is already busy

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A device that can read packets on the Internet layer to view their IP addresses and can communicate with others to find the best path through the network to any given host or subnet

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A device that enables the traffic to flow in and out of the network

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internet connection that uses analog phone lines @ speeds <56 Kbps

A

Dialup

24
Q

Internet connection that uses digital phone lines @ speeds 64-128Kbps

A

ISDN (Integrated Services for Digital Network)

25
Q

Internet connection that carries data as a secondary signal on analog phone lines @ speeds 128Kbps-100Mbps

A

DSL

26
Q

Internet connection that carries data over cable television lines @ speeds 384Kbps-400Mbps

A

Broadband Cable

27
Q

Internet connection that uses optical cables @ speeds up to 1GBps

A

Fiber-Optic

28
Q

The original analog cellular networks used from the early 1980s to the early 1990s.

A

1G

29
Q

Early digital cellular networks, used in the 1990s and early 2000s.

A

2G

30
Q

Later 2G services designed for a faster and more efficient data operation, deployed in the early 2000s

A

2.5G - 2.9G

31
Q

This generation of cellular networks was designed from the start for mobile data networks & support at least 200 kbps data rates, but many are faster

A

3G

32
Q

Cellular networks handle both voice and data using TCP/IP protocols, and data speeds can reach 1 Gbps downstream and 500 Mbps upstream

A

4G LTE (Long Term Evolution)

33
Q

Cellular network that relies heavily on large numbers of directional transmitters, allowing a much greater number of high−speed connections in a given area

A

5G

34
Q

Created by an industry consortium, requiring interoperability between carriers. Customer information is stored on a SIM card which can be freely exchanged between devices.

A

GSM (Global System for Mobiles)

35
Q

Networks use a device whitelist instead of a SIM card: a user’s individual device must be registered with the carrier

A

CDMA

36
Q

2 websites to test ping, traceroute, DNS lookups, or port checks

A

http://network-tools.com http://ping.eu

37
Q

A public server that provides BGP routing information for a given network

A

Looking glass site

38
Q

It allows a network cabling system to extend beyond its maximum allowed length and reduces distortion by amplifying or regenerating network signals.

A

Repeaters

39
Q

Frequently serve as the demarc, though sometimes they’re on the ISP side. They’re typically ISP property. Commonly they have loopbacks or diagnostic alarms that the ISP can use to find problems without sending a technician in person

A

NIUs and Smartjacks

40
Q

Units used by leased lines (or more broadly, broadband modems like for cable and DSL) might belong to the customer or the ISP, and found on either side of the demarc

A

CSU/DSU

41
Q

A virtual representation of a network that appears to the user as an entirely separate and self-contained network even though it might physically be only a portion of a larger network or a local area network

A

Logical network

42
Q

A device which joins segments using different link layer protocols, by translating frames from one format into the other, such as from Ethernet to Token Ring or Wi-Fi.

A

Translating bridge

43
Q

A simple network device that lets you connect multiple nodes in a star configuration.

A

Hub

44
Q

A device that connects different physical networks and actively works to prevent collisions by making sure not to send data to a segment that’s already busy. Distributes traffic based on MAC address

A

Bridge (wireless access point)

- bridges wired Ethernet to wireless

45
Q

One of the fastest widely deployed 3G technologies is _________, which supports data rates up to 84Mbps downstream and 22Mbps upstream using MIMO transmission

A

Evolved High Speed Packet Access (HSPA+)

46
Q

What is used to monitor and analyze network traffic to protect a system from network-based threats?

A

NIDS

47
Q

An all-in-one security appliance that provides a good foundation. It provides intrusion prevention, antivirus, content filtering, etc.

A

UTM - unified threat management

48
Q

An authentication service that is based on a time-sensitive ticket granting system

A

Kerberos

49
Q

Name the 4 TCP/IP layers

A

Application
Transport
Networking
Datalink

50
Q

What protocols are associated w/ the Datalink layer?

A

Ethernet, ARP, NDP, OSPF, MAC

51
Q

What protocols are associated w/ the Networking layer?

A

IP, ICMP, ECN, EGMP, IPsec

52
Q

What protocols are associated w/ the Transport layer?

A

TCP, UDP, DCCP, SCTP, RSVP

53
Q

What protocols are associated w/ the Application layer?

A

HTTP, FTP, IMAP, LDAP, POP3, SMTP, SNMP, SSH, SNMP, Telnet, TLS/SSL, RIP, DNS

54
Q

A high-speed data transfer network that provides access to consolidated block-level storage. It moves storage resources off the network and reorganizes them into an independent, high-performance network

A

SAN (storage area network)

55
Q

Connects the storage to the TCP/IP network and enables users to access storage resources using both Common Internet File System (CIFS) and Network File System (NFS) protocols over the familiar TCP/IP networks. has its own IP address and hence can be accessed by users directly over the network to store files as well as retrieve them when required.

A

network attached storage (NAS)