Networking Flashcards

(101 cards)

1
Q

What is the most common network layer protocol

A

IP (internet protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer of the TCP / I model deals with cabling and connectors

A

The physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What level of the TCP/IP-5 layer model does a router operate on

A

The network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch

A

Allows connections for many devices and inspects the contents of Ethernet physical data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LAN

A

Local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Router

A

Connects independent networks by forwarding data between them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Server

A

Something that provides data to something requesting the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Client

A

Something receiving data from a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nodes

A

Devices connected to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of wiring is in cables that communicate in voltage changes that are received by the receiving device as ones and zeros

A

Copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What modulation type is used for computer networks

A

Line coding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between full duplex and half duplex

A

Full duplex allows communication in two different directions at the same time; half duplex means that only one side can communicate at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer consists of devices and means of transmitting bits across computer networks

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most common type of cabling used for connecting computing devices

A

Twisted pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the category types of twisted pair Ethernet cable

A

1) Unshielded twisted pair
2) Foiled twisted pair
3) Shielded twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unshielded twisted pair cable

A

The most common and least expensive type of ethernet cable found in business and home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Foiled twisted pair cables

A

An FTP cable uses a thin foil shield that wraps around the bundle of twisted pair wires underneath the outer jacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Shield twisted pair

A

An STP cable uses a braided aluminum and/or copper shielding to encase the four twisted pairs underneath the outer jacket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many octets are in a Mac address?

A

Six octets consisting of 48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an ethernet frame

A

A highly structured collection of information presented in a specific order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Preamble

A

The buffer between different frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SFD ( start frame delimiter)

A

A signal to the receiver that the actual frame contents will commence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Ether type field

A

Used to describe the protocol of the contents in the frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Data payload

A

The actual data being transferred in an Ethernet frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
FCS ( frame check sequence)
A number that represents the checksum value of the entire frame
26
Cycle redundancy check
A mathematical calculation used to ensure that all data arrived intact
27
Unicast
When one device turns data to another device
28
Multicast
When multiple devices on a local network received data at once
29
Broadcast transmission
When all devices on a LAN receive data being transmitted
30
Ethernet
The protocol most widely used to send data across individual links
31
Career sends multi access with collision domain (CSMA CD)
Used to determine when the communication channels are clear and when a device is free to transmit data
32
Mac address (media access control address)
A globally unique identifier attached to an individual network interface
33
Octet
Any number that can be represented by 8 bits
34
Hexadecimal
A way to represent numbers using 16 digits
35
Organizationally unique identifier (OUI)
The first three octets of a MAC address
36
Which protocol provides mechanisms ensuring data is reliably delivered
Transmission control protocol (TCP)
37
What is the first layer of the TCP/IP 5 layer network model
Physical layer
38
Which layer of the TCP/IP model is responsible for defining a common way to interpret signals so network devices can communicate?
Data link layer
39
Which protocol do routers use to determine the optimal path to forward traffic
Border gateway protocol (BGP)
40
Registered Jack 45
The most common plug used for twisted pair network cables
41
In the OSI network model ________ is responsible for facilitating the communication between actual applications and the transport layer
The session layer
42
The transport layer us _______ to handle multiplexing and demultiplexing
Ports
43
Which field in the transmission control protocol header is chosen from ephemeral ports
Source port
44
The sequence of SYN, SYN/ACK, and ACK packets is known as the
Three way handshake
45
If a TCP packet is ready and listening for incoming connections, it is in the ________ state
LISTEN
46
If the checksum doesn't compute for packet sent at the internet protocol level, what will happen to the data?
It is discarded
47
What port does the file transfer protocol typically listen on?
Port 21
48
A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a ____ number
Sequence
49
What transport layer protocol does DNS normally use
UDP
50
A DNS TTL determine what?
How long a DNS entry is allowed to be cached.
51
How many root servers are there?
13
52
The process of using a DNS to turn a domain name into an IP address is known as_______.
Name Resolution
53
And A record contains what?
An IPv4 address
54
An MX record stands for _____.
Mail exchange
55
How many characters can a fully qualified domain name contain
255
56
What technique is used to balance traffic across multiple IPs for the same domain?
Round robin
57
NS record, SOA, and an A record are all part of a _____.
Zone file
58
What is used to determine a computer's IP address when using fixed allocation DHCP
A MAC address
59
The process by which a client, configured to use DHCP, attempts to get network configuration information is known as _______.
DHCP Discovery
60
DCP is a protocol of which layer?
Application layer
61
What technique allows for specific destination ports to be configured to always deliver to specific nodes
Port forwarding This is a technique that allows for inbound traffic through a router configured to nat
62
What is the approximate number of IPv4 addresses
4.2 billion
63
What regional internet registry (RIR) serves the US and Canada
ARIN
64
What is the solution to IP exhaustion that will create more public IP addresses as it is implemented
IPv6 This uses a 128-bit addresses and can provide a nearly infinite number of addresses
65
What allows a gateway to rewrite the source IP of an outgoing datagram
NAT (Network address translation)
66
A method where users are required to verify their credentials to a combination of hardware and/or software. Usually a username, password, and a short lived token
Two-factor authentication
67
VPNs are known as a _____ protocol
Tunneling
68
What are some of the first technologies to commonly utilize two-factor authentication?
VPNs
69
What does a web proxy do?
It inspects the website being requested and allows or denies access to that site
70
One to many NAT
Allows hundreds of computers all to have their outbound traffic translated to a single IP
71
NAT it's typically implemented on what hardware device?
Routers
72
A baud rate is a measurement of the number of
Bitch that can be sent across the telephone line every second
73
What system did Duke grads build that is still in use today
Usenet
74
What device is used to transfer data across a dial-up connection
Modem
75
T1 is short for ______.
Transmission system 1
76
How fast does a t1 line?
1.54 megabits per second
77
What are the subprotocols for PPP (point to point protocol)
LCP (link control protocol) NCP (network control protocol)
78
What do you call a demarcation point for fiber technologies?
ONT (optical network Terminator)
79
How many address fields does an 802.11 header have?
4
80
What are wireless channels?
Individual smaller sections of the overall frequency band used by a wireless network
81
What frequencies do wireless networks typically work on?
2.4 GHz 5 GHz
82
What protocol did WPA3 replace?
WPA2
83
What field describes what version of 802.11 is being used in an 802.11 frame
Frame control
84
The protocol used to communicate network errors is known as _____.
ICMP
85
The ping utility sends what message type?
Echo request
86
What is one of the tools you can use to verify connectivity to a specific port on Windows OS?
Test net connection
87
A piece of software that runs and manages virtual machines is known as a what?
Hypervisor
88
What is office 365 Outlook an example of?
SAAS software as a service
89
A hybrid cloud is _________________.
A combination of a public cloud and a private cloud
90
What cloud service provides access to things like virtual machines, containers, networks, and storage
IAAS infrastructure as a service
91
What is the very first field in an IPv6 header?
Version field
92
Which IPv6 header field indicates how many routers can forward a packet before it is discarded?
Hop limit field
93
The IPv4 mAft address space with an IPv6 always starts with ____ zeros.
80
94
For IPv6 traffic to travel on an IPv4 network which two technologies are used?
IPv6 tunnels and IPv4 datagrams
95
The ability for a protocol or program to determine that something went wrong is known _______.
Error detection
96
The Linux and Mac OS program Trace route is known by slightly different name on Windows. It's referred to as _______.
Tracert
97
While in an interactive NSlookup session you'd use the _______ keyboard to change the DNS server using
Server
98
Most public domain name servers are available globally through which technology?
Any cast
99
A company runs sensitive technologies locally while interesting less sensitive technologies to a broader user base. Which cloud delivery model is being used?
Hybrid
100
What is the IPv6 loopback address?
31 zeros with a 1 at the end 0000:0000:0000:0000:0000:0000:0000:0001
101
Which internet protocol V6 header field is used to determine the quality of service level for a diagram
Flow label field