Network Configurations 2.1, 2.5, &2.6 Flashcards

(81 cards)

1
Q

Responsible for putting frames in the physical network’s transmission media

A

Link / Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to address packets and route them across the network

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shows how to send the packets

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contains all the protocols that perform higher level functions

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A logical identifier for a group of hosts in a computer network

A

Multicast Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allows for borrowing some of the host bits and reassigning them to the network portion

A

Classless Inter-Domain Routing (CIDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default subnet mask for a given class of IP addresses

A

Classful Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be accessed over the internet and is assigned to the network by an internet service provider

A

Public (Routable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be used by anyone any time, but only within their own local area network

Private IP ranges include those that start with either 10,172, or 192

A

Private (Non-Routable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system

A

Loopback Address (127.0.01)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

manually type the IP address for the host, its subnet mask, default gateway, and DNS server

A

Static Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used when a device doesn’t have a static IP address or cannot reach a DHCP server

A

Automatic Private IP Addresses (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to the network

A

Bootstrap Protocol (BOOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigns an IP based on an assignable scope or addresses and provides the ability to configure other options

A

Dynamic Host Control Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Manages the IPs being assigned and returned over time

A

IP Address Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used when a device does not have a static IP address or cannot reach a DHCP server

A

Automatic Private IP Addressing (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

New technology that provides the same features as APIPA

A

Zero Configuration (ZeroConf)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provides an IP address to every machine on the network and eliminates configuration errors

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Excludes some IP address from being handed to devices unless they meet a certain condition

A

DHCP Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Helps network clients find a website using human-readable hostnames instead of numeric IP addresses

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain name under a top level provider

A

Fully Qualified Domain Name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contains the FQDN with the method of accessing inf

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS record that identifies the host authorized to send mail for domain

A

Sender Policy Framework (SPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record
DomainKeys Identified Mail (DKIM)
19
Framework that is used for proper application of SPF and DKIM, utilizing a policy that's published as a DNS record
Domain-based Message Authentication, Reporting & Conformance (DMARC)
20
Allows cloud instances on the same network access each other using internal DNS names
Internal DNS
20
Records created around the domain names from a central authority and used on the public internet
External DNS
20
Types of DNS server that stores all the DNS records for a given domain
Nameserver
21
Tells the DNS resolver how long to cache a query before requesting a new one
Time to Live (TTL)
22
Makes a local copy of every DNS entry it resolves as connected to websites
DNS Resolver/DNS Cache
22
DNA server communicates with several other DNS servers to hunt down the IP address and return to the client
Recursive Lookup
23
Each DNS server responds directly to the client with an address for another DNS server that may have the correct IP address
Iterative Lookup
24
Allows different logical networks to share the same physical hardware and provides added security and efficiency
Virtual Local Area Network (VLAN)
25
Extends a private network across a public network and enables sending and receiving data across shared or public networks
Virtual Private Network (VPN)
26
Routes and encrypts all network requests through the VPN connection back to the headquarters
Full Tunnel VPN
27
Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet
Split Tunnel VPN
28
Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client
Clientless VPN
28
Provides cryptography and reliability using the upper layers of the OSI model
Secure Socket Layer
29
Provides secure web browsing over HTTPS
Transport Layer Security (TLS)
30
IPv4=2*32
4.2 billion addresses
31
IPv6=2*128
340 undecillion addresses
32
Simultaneously runs both the IPv4 and IPv6 protocols on the same network devices
Dual Stack
33
Allows an existing IPv4 router to carry IPv6 traffic
Tunneling
34
Used to identify a single interface
Unicast Address
35
similar to IPv4's unicast class A, B, and C addresses and begins with 2000-3999
Globally-Routed
36
Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80
Link-Local/ Local Use
37
Eliminates the need to obtain address or other configuration information from a central server
Stateless Address Autoconfiguration (SLAAC)
38
Used to identify a set of interfaces and begins with FF
Multicast address
39
Allows a host to assign itself a unique 64 bit IPv6 Interface identifier
Extended Unique Identifier (EUI)
39
Used to identify a set of interfaces so that a packet can be sent to any member of a set
Anycast address
39
Used to determine the layer 2 addresses that are on a given network
Neighbor Discovery Protocol (NDP)
40
Logical communication endpoint that exists on a computer or server
Port
40
Logical communication opening on a server that is listening for a connection from a client
Inbound Port
40
Allows DHCP to automatically assign addresses from a DHCPv6 server
DHCPv6 Protocol
41
Logical communication opening created on a client in order to call out to a server that is listening for a connection
Outbound Port
42
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
Well-Known Ports
43
Ports 1024 to 49151
Registered Ports
44
Ports 49152 to 65535 can be used by any application without being registered with IANA known for gaming, instant messaging, and chat
Dynamic or private Ports
44
Ports 20, 21 provides insecure file transfers
File Transfer Protocol (FTP)
44
Port 22 Provides secure remote control of another machine using a text-based environment
Secure Shell (SSH)
45
Port 23 Provides insecure remote control of another machine using a text based environment
Telnet
46
Port 22 provides secure file transfers
Secure File Transfer Protocol (SFTP)
47
Port 25 provides the ability to send emails over the network
Simple Mail Transfer Protocol (SMTP)
47
Port 53 Converts domain names to IP addresses, and IP address to domain names
Domain Name Service (DNS)
48
Ports 67, 68 Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server
Dynamic Host Control Protocol (DHCP)
48
Port 80 Used for insecure web browsing
Hypertext Transfer Protocol (HTTP)
48
Port 143 A newer method of retrieving incoming emails which improves upon the older POP3
Internet Mail Application Protocol (IMAP)
48
Port 110 Used for receiving incoming emails
Post Office Protocol Version 3 (POP3)
48
Ports 137, 139 Used for file or printer sharing in a Windows network
Net Basic Input/ Output System (NetBIOS)
49
Port 443 Used as a secure and encrypted version of web browsing
Hypertext Transfer Protocol - Secure (HTTPS)
49
Ports 161, 162 Used to collect data about network devices and monitor their status
Simple Network Management Protocol (SNMP)
49
Port 3389 Provides graphical remote control of another client or server
Remote Desktop Protocol (RDP)
49
Port 389 Used to provide directory services to your network
Lightweight Directory Access Protocol (LDAP)
50
Port 445 Used for Windows file and printer sharing services
Server Message Block (SMB)
51
Unreliable and it transmits segments called data grams
User Datagram Protocol (UDP)
51
Audio, video streaming, DHCP, and TFTP
UDP (Connectionless)
51
Connection-oriented protocol = reliable way to transport segments across the network
Transmission Control Protocol (TCP)
51
SSH, HTTP, or HTTPS are
TCP (Connection-Oriented)
52
Ports 67, 68 Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server
Dynamic Host Control Protocol (DHCP)
52
Ports 69 a connectionless protocol that uses UDP as its transport
Trivial File Transfer Protocol (TFTP)