Network Configurations 2.1, 2.5, &2.6 Flashcards

1
Q

Responsible for putting frames in the physical network’s transmission media

A

Link / Network Interface Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used to address packets and route them across the network

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shows how to send the packets

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contains all the protocols that perform higher level functions

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A logical identifier for a group of hosts in a computer network

A

Multicast Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allows for borrowing some of the host bits and reassigning them to the network portion

A

Classless Inter-Domain Routing (CIDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Default subnet mask for a given class of IP addresses

A

Classful Mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

can be accessed over the internet and is assigned to the network by an internet service provider

A

Public (Routable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Can be used by anyone any time, but only within their own local area network

Private IP ranges include those that start with either 10,172, or 192

A

Private (Non-Routable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system

A

Loopback Address (127.0.01)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

manually type the IP address for the host, its subnet mask, default gateway, and DNS server

A

Static Assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Used when a device doesn’t have a static IP address or cannot reach a DHCP server

A

Automatic Private IP Addresses (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to the network

A

Bootstrap Protocol (BOOTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Assigns an IP based on an assignable scope or addresses and provides the ability to configure other options

A

Dynamic Host Control Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Manages the IPs being assigned and returned over time

A

IP Address Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used when a device does not have a static IP address or cannot reach a DHCP server

A

Automatic Private IP Addressing (APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

New technology that provides the same features as APIPA

A

Zero Configuration (ZeroConf)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provides an IP address to every machine on the network and eliminates configuration errors

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List of valid IP addresses available for assignment or lease to a client computer or endpoint device on a given subnet

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Excludes some IP address from being handed to devices unless they meet a certain condition

A

DHCP Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Helps network clients find a website using human-readable hostnames instead of numeric IP addresses

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain name under a top level provider

A

Fully Qualified Domain Name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contains the FQDN with the method of accessing inf

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS record that identifies the host authorized to send mail for domain

A

Sender Policy Framework (SPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Provides the cryptographic authentication mechanism for mail using a public key published as a DNS record

A

DomainKeys Identified Mail (DKIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Framework that is used for proper application of SPF and DKIM, utilizing a policy that’s published as a DNS record

A

Domain-based Message Authentication, Reporting & Conformance (DMARC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Allows cloud instances on the same network access each other using internal DNS names

A

Internal DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Records created around the domain names from a central authority and used on the public internet

A

External DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Types of DNS server that stores all the DNS records for a given domain

A

Nameserver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tells the DNS resolver how long to cache a query before requesting a new one

A

Time to Live (TTL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Makes a local copy of every DNS entry it resolves as connected to websites

A

DNS Resolver/DNS Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DNA server communicates with several other DNS servers to hunt down the IP address and return to the client

A

Recursive Lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Each DNS server responds directly to the client with an address for another DNS server that may have the correct IP address

A

Iterative Lookup

24
Q

Allows different logical networks to share the same physical hardware and provides added security and efficiency

A

Virtual Local Area Network (VLAN)

25
Q

Extends a private network across a public network and enables sending and receiving data across shared or public networks

A

Virtual Private Network (VPN)

26
Q

Routes and encrypts all network requests through the VPN connection back to the headquarters

A

Full Tunnel VPN

27
Q

Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular internet

A

Split Tunnel VPN

28
Q

Creates a secure remote-access VPN tunnel using a web browser without requiring a software or hardware client

A

Clientless VPN

28
Q

Provides cryptography and reliability using the upper layers of the OSI model

A

Secure Socket Layer

29
Q

Provides secure web browsing over HTTPS

A

Transport Layer Security (TLS)

30
Q

IPv4=2*32

A

4.2 billion addresses

31
Q

IPv6=2*128

A

340 undecillion addresses

32
Q

Simultaneously runs both the IPv4 and IPv6 protocols on the same network devices

A

Dual Stack

33
Q

Allows an existing IPv4 router to carry IPv6 traffic

A

Tunneling

34
Q

Used to identify a single interface

A

Unicast Address

35
Q

similar to IPv4’s unicast class A, B, and C addresses and begins with 2000-3999

A

Globally-Routed

36
Q

Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80

A

Link-Local/ Local Use

37
Q

Eliminates the need to obtain address or other configuration information from a central server

A

Stateless Address Autoconfiguration (SLAAC)

38
Q

Used to identify a set of interfaces and begins with FF

A

Multicast address

39
Q

Allows a host to assign itself a unique 64 bit IPv6 Interface identifier

A

Extended Unique Identifier (EUI)

39
Q

Used to identify a set of interfaces so that a packet can be sent to any member of a set

A

Anycast address

39
Q

Used to determine the layer 2 addresses that are on a given network

A

Neighbor Discovery Protocol (NDP)

40
Q

Logical communication endpoint that exists on a computer or server

A

Port

40
Q

Logical communication opening on a server that is listening for a connection from a client

A

Inbound Port

40
Q

Allows DHCP to automatically assign addresses from a DHCPv6 server

A

DHCPv6 Protocol

41
Q

Logical communication opening created on a client in order to call out to a server that is listening for a connection

A

Outbound Port

42
Q

Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)

A

Well-Known Ports

43
Q

Ports 1024 to 49151

A

Registered Ports

44
Q

Ports 49152 to 65535 can be used by any application without being registered with IANA

known for gaming, instant messaging, and chat

A

Dynamic or private Ports

44
Q

Ports 20, 21

provides insecure file transfers

A

File Transfer Protocol (FTP)

44
Q

Port 22

Provides secure remote control of another machine using a text-based environment

A

Secure Shell (SSH)

45
Q

Port 23

Provides insecure remote control of another machine using a text based environment

A

Telnet

46
Q

Port 22

provides secure file transfers

A

Secure File Transfer Protocol (SFTP)

47
Q

Port 25

provides the ability to send emails over the network

A

Simple Mail Transfer Protocol (SMTP)

47
Q

Port 53

Converts domain names to IP addresses, and IP address to domain names

A

Domain Name Service (DNS)

48
Q

Ports 67, 68

Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server

A

Dynamic Host Control Protocol (DHCP)

48
Q

Port 80

Used for insecure web browsing

A

Hypertext Transfer Protocol (HTTP)

48
Q

Port 143

A newer method of retrieving incoming emails which improves upon the older POP3

A

Internet Mail Application Protocol (IMAP)

48
Q

Port 110

Used for receiving incoming emails

A

Post Office Protocol Version 3 (POP3)

48
Q

Ports 137, 139

Used for file or printer sharing in a Windows network

A

Net Basic Input/ Output System (NetBIOS)

49
Q

Port 443

Used as a secure and encrypted version of web browsing

A

Hypertext Transfer Protocol - Secure (HTTPS)

49
Q

Ports 161, 162

Used to collect data about network devices and monitor their status

A

Simple Network Management Protocol (SNMP)

49
Q

Port 3389

Provides graphical remote control of another client or server

A

Remote Desktop Protocol (RDP)

49
Q

Port 389

Used to provide directory services to your network

A

Lightweight Directory Access Protocol (LDAP)

50
Q

Port 445

Used for Windows file and printer sharing services

A

Server Message Block (SMB)

51
Q

Unreliable and it transmits segments called data grams

A

User Datagram Protocol (UDP)

51
Q

Audio, video streaming, DHCP, and TFTP

A

UDP (Connectionless)

51
Q

Connection-oriented protocol = reliable way to transport segments across the network

A

Transmission Control Protocol (TCP)

51
Q

SSH, HTTP, or HTTPS are

A

TCP (Connection-Oriented)

52
Q

Ports 67, 68

Automatically provides network parameters such as assigned IP address, subnet mask, default gateway, and the DNS server

A

Dynamic Host Control Protocol (DHCP)

52
Q

Ports 69

a connectionless protocol that uses UDP as its transport

A

Trivial File Transfer Protocol (TFTP)