Quiz Let Flashcards

1
Q

osi model Application

A

Provides access to the network for applications and certain end-user functions. Displays incoming information and prepares outgoing information for network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

osi model presentation layer

A

Converts data from the application layer into a format that can be sent over the network. Converts data from the session layer into a format that the application layer can understand. Encrypts and decrypts data. Provides compression and decompression functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

osi model session layer

A

Synchronizes the data exchange between applications on separate devices. Handles error detection and notification to the peer layer on the other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

osi model transport layer

A

Establishes, maintains, and breaks connections between two devices. Determines the ordering and priorities of data. Performs error checking and verification and handles retransmissions if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

osi model network layer

A

Provides mechanisms for the routing of data between devices across single or
multiple network segments. Handles the discovery of destination systems and
addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

osi model data link layer

A

Has two distinct sublayers: LLC and MAC. Performs error detection and handling for the transmitted signals. Defines the method by which the medium is accessed. Defines hardware addressing through the MAC sublayer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

osi model physical layer

A

Defines the network’s physical structure. Defines voltage/signal rates and the physical connection methods. Defines the physical topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP/IP Model Compared to OSI Model

A

Application layer: Application, Presentation and Session layer of the osi model

Transport layer:Transport layer

Internet layer: Network layer

Network interface layer: Data link layer
Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Loopback address

A

IPv4 127.0.0.1

IPv6 0:0:0:0:0:0:0:1 (::1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Networkwide addresses

A

IPv4 public address

Global unicast IPv6 address ranges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Private network addresses

A

IPv4

  1. 0.0.0
  2. 16.0.0
  3. 168.0.0

IPv6

Site-local address ranges (FEC0::)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Autoconfigured addresses

A

IPv4

Automatic private IP addressing (169.254.0.0)

IPv6

Link-local addresses of FE80:: prefix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTP

A

20 data transfres and 21 for listen to commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH

A

22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Telnet

A

23 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP

A

25 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS

A

53 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POP3

A

110 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NNTP

A

119 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NTP

A

123 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

IMAP4

A

143 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

HTTPS

A

443 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DNS

A

udp port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TFTP

A

UDP port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

BOOTPS/DHCP

A

UDP port 67 for sending data to the server, and UDP port 68 for data to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SNMP 161

A

UDP Port 161

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

MAC address

A

A MAC address is a 6-byte hexadecimal
address that enables a device to be uniquely identified on the network. A MAC address combines numbers and the letters A to F. An example of a MAC address is 00:D0:59:09:07:51.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

CLASS A Address

A

A Class A TCP/IP address uses only
the first octet to represent the network
portion,

Class A addresses span from 1 to 126, with
a default subnet mask of 255.0.0.0.

and a Class C address uses three octets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CLASS B Address

A

A Class B address uses two octets.

Class B addresses span from 128 to 191,
with a default subnet mask of 255.255.0.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

CLASS C Address

A

Class C address uses three octets.

Class C addresses span from 192 to 223, with a default subnet mask of 255.255.255.0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

local loop back

A

local loop backThe 127 network ID is reserved for the IPv4

local loopback.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Steps 1 in Troubleshooting Methodology

A
Identify the problem:
. Gather information.
. Identify symptoms.
. Question users.
. Determine if anything has changed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Steps 2 in Troubleshooting Methodology

A

Establish a theory of probable cause:. Question the obvious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Steps 3 in Troubleshooting Methodology

A

Test the theory to determine cause:

After theory is confirmed, determine next steps to resolve problem.

If theory is not confirmed, re-establish new theory or escalate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Steps 4 in Troubleshooting Methodology

A
  1. Establish a plan of action to resolve the problem and identify potential effects.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Steps 5 in Troubleshooting Methodology

A

Implement the solution or escalate as necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Steps 6 in Troubleshooting Methodology

A

Verify full system functionality and if applicable

implement preventative measures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Steps 7 in Troubleshooting Methodology

A

Document findings, actions, and outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Virtualization

A

Virtualization makes it possible to take a
single physical device and make it appear
as if it is a number of stand-alone entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

virtual switch

A

A virtual switch works the same as a physical

switch but enables multiple switches to exist on the same host, saving the implementation of additional hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Network as a Service (NaaS)

A

Network as a Service (NaaS) is a cloud
computing model offered by many telecom
providers provided on demand in a pay as-
you-go model. OpenStack is the open source NaaS project.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

NAT

A

NAT translates private network addresses

into public network addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Link State routing protocols

A

A router that uses a link-state protocol
differs from a router that uses a distance vector
protocol because it builds a map of the entire network and then holds that map in memory. Link-state protocols include Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What do Hop mean in routers

A

Hops are the means by which distance vector
routing protocols determine the shortest way to reach a given destination. Each router constitutes one hop, so if a router is four hops away from another router, there are three routers, or hops, between itself and the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

RIP

A

Routing Information Protocol (RIP) is a distance-vector routing protocol used for TCP/IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Example of distance vector routing protocols

A

Distance-vector protocols in use today include Routing Information Protocol (RIP and RIPv2), Enhanced Interior Gateway Routing Protocol (EIGRP), and Border Gateway Protocol (BGP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Switch improvement over a HUB

A

Switches introduce micro segmentation,
by which each connected system effectively
operates on its own dedicated network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

PoE

A

Power over Ethernet (PoE) is a technology
that enables electrical power to be transmitted over twisted-pair Ethernet cable. The power is transferred, along with data, to provide power to remote devices. These devices may include
remote switches, wireless access points,
VoIP equipment, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Default gateways

A

Default gateways are the means by which a device can access hosts on other networks for which it does not have a specifically configured route.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Internet Protocol

A

IP is a network protocol responsible for providing addressing and routing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

TCP/IP

A

The TCP/IP suite is used by all major operating systems and is a routable protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

DHCP/BOOTP

A

DHCP/BOOTP is a network service that automatically assigns IP addressing information.

In a network that does not use DHCP, you need to watch for duplicate IP addresses that prevent a user from logging on to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Subnetting

A

Subnetting is a process in which parts of the host ID portion of an IP address are used to create more network IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

APIPA

A

APIPA is a system used on Windows to automatically self-assign an IP address in the 169.254.x.x range in the absence of a DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DNS

A

DNS resolves hostnames to IP addresses.

56
Q

PAT

A

Port Address Translation (PAT) is a variation on NAT in which all systems on the LAN are translated into the same IP address but with different port number assignment.

57
Q

Quality of Service

A

Quality of Service (QoS) enables administrators to predict bandwidth use, monitor that use, and control it to ensure that bandwidth is available to applications that need it.

58
Q

Half-duplex

A

Half-duplex mode enables each device to both transmit and receive, but only one of these processes can occur at a time.

59
Q

Full-duplex

A

Full-duplex mode enables devices to

receive and transmit simultaneously.

60
Q

UTP

A

UTP cabling is classified by category.
Categories 5/5e and 6/6a offer transmission
distances of 100 meters.

61
Q

F-type connectors

A

F-type connectors are used with coaxial
cable, most commonly to connect cable
modems and TVs. F-type connectors are
a screw-type connector.

62
Q

fiber connectors

A

SC, ST, LC, and MT-RJ connectors are
associated with fiber cabling. ST connectors
offer a twist-type attachment, and SC, LC, and MT-RJ connectors are push-on.

63
Q

RJ-45/11

A

RJ-45 connectors are used with UTP cable and are associated with networking applications. RJ-11 connectors are used with telephone cables.

64
Q

Plenum-rated cables

A

Plenum-rated cables are used to run cabling through walls or ceilings.

65
Q

horizontal cabling

A

The horizontal cabling extends from the telecommunications outlet, or network outlet with RJ-45 connectors, at the client end. It includes all cable from that outlet to the telecommunication room to the horizontal cross-connect.

66
Q

Vertical cable

A

Vertical cable, or backbone cable, refers to the media used to connect telecommunication
rooms, server rooms, and remote locations and offices.

67
Q

MDF/IDF

A

Main Distribution Frame (MDF) and Intermediate Distribution Frame (IDF) define types of wiring closets. The main wiring closet for a network typically holds the majority of the network gear,
including routers, switches, wiring, servers, and more.

68
Q

demarcation point

A

A network’s demarcation point refers to the connection point between the ISP’s part of the network and the customer’s portion of the network.

69
Q

802.11a

A

5GHz
Up to 54Mbps
25 to 75 feet
CSMA/CA

70
Q

802.11b

A

2.4GHz
Up to 11Mbps
Up to 150 feet
CSMA/CA

71
Q

802.11g

A

5Ghz/2.4GHz
Up to 600Mbps
175+ feet
CSMA/CA

72
Q

Bus network topology

A

The bus network topology is also known as a linear bus because the computers in such a network are linked using a single cable called a trunk or backbone.
If a terminator on a bus network is loose, data communications might be disrupted. Any other break in the cable cause the entire network segment to fail.

73
Q

Star configuration

A

In a star configuration, all devices on the network connect to a central device, and this central device creates a single point of failure on the network.

74
Q

wired mesh topology

A

The wired mesh topology requires each computer on the network to be individually connected to every other device. This configuration provides maximum reliability and redundancy for the network.

75
Q

wireless infrastructure/ ad hoc

A

A wireless infrastructure network uses a centralized device known as a wireless access point (AP). Ad hoc wireless topologies are a peer-to-peer configuration and do not use a wireless access point.

76
Q

802.2

A

802.2, the LLC sublayer, defines specifications for the Logical Link Control (LLC) sublayer in the 802 standard series.

77
Q

802.3

A

802.3 defines the carrier sense multiple access with collision detection (CSMA/CD) media access method used in Ethernet networks. This is the most popular networking standard used today.

78
Q

EMI

A

Many factors cause EMI, including computer monitors and fluorescent lighting fixtures.
Copper-based media are prone to EMI, whereas fiber-optic cable is immune to it.

79
Q

Crosstalk

A

Data signals might also be subjected to crosstalk, which occurs when signals from two cables, or from wires within a single cable, interfere with each other.

80
Q

Attenuation

A

The weakening of data signals as they

traverse the media is called attenuation.

81
Q

straight-through cable

A

A straight-through cable is used to connect systems to the switch or hub using the MDI-X ports.

82
Q

Cross over cable

A

In a standard crossover cable, wires 1 and 3 and wires 2 and 6 are crossed.

83
Q

T1 crossover cable

A

A T1 crossover cable is used to connect two T1 CSU/DSU devices in a back-to-back configuration.

84
Q

media converter

A

When you have two dissimilar types of network media, a media converter is used to allow them to connect.

85
Q

Shaping by application

A

Shaping by application: Administrators can control traffic based on the types of network traffic and assigning that category a bandwidth limit.

86
Q

Documentation

A

Documentation should also include diagrams of the physical and logical network design. The physical topology refers to how a network is physically constructed—how it looks.

The logical topology refers to how a network
looks to the devices that use it—how it functions.

87
Q

RAID 0

A

RAID 0 offers no fault tolerance and improves I/O performance. It requires a minimum of two disks.

88
Q

RAID 1

A

RAID 1, disk mirroring, provides fault tolerance

and requires two hard disks. Separate disk controllers can be used—a strategy known as disk duplexing.

89
Q

RAID 5

A

RAID 5, disk striping with distributed parity,

requires a minimum of three disks—the total size of a single disk being used for the parity calculation.

90
Q

full backup

A

In a full backup, all data is backed up. Full
backups do not use the archive bit, but they
do clear it.

91
Q

Incremental backups

A

Incremental backups back up all data that
has changed since the last full or incremental
backup. They use and clear the archive bit.

92
Q

Differential backups

A

Differential backups back up all data since
the last full or differential backup. They use
the archive bit but do not clear it.

93
Q

GFS (grandfather, father, son)

A

GFS (grandfather, father, son) is a commonly

implemented backup strategy

94
Q

wire crimper

A

A wire crimper is a tool that you use to attach media connectors to the ends of cables.

95
Q

Wire strippers

A

Wire strippers come in a variety of shapes
and sizes. Some are specifically designed to strip the outer sheathing from coaxial cable, and others are designed to work with UTP cable.

96
Q

Punchdown tools

A

Punchdown tools are used to attach twisted-pair network cable to connectors within a patch panel. Specifically, they connect twisted-pair wires to the IDC.

97
Q

Voltage event recorders

A

Voltage event recorders are used to monitor

the quality of power used on the network or by network hardware.

98
Q

Temperature monitors

A

Temperature monitors keep track of the
temperature in wiring closets and server
rooms.

99
Q

Toner probes

A

Toner probes are used to locate cables hidden in floors, ceilings, or walls and to track cables from the patch panel to their destination.

100
Q

Protocol analyzers

A

Protocol analyzers can be hardware- or software-based. Their primary function is to analyze network protocols such as TCP, UDP, HTTP, FTP, and more.

101
Q

TDR

A

A TDR is a device used to send a signal through a particular medium to check the cable’s continuity

102
Q

OTDR

A

An OTDR performs the same basic function

as a wire media tester but on optical media.

103
Q

Packet sniffers

A

Packet sniffers are either a hardware device
or software that eavesdrop on transmissions
that are traveling throughout the network.

104
Q

Throughput testers

A

Throughput testers identify the rate of data

delivery over a communication channel.

105
Q

Port scanners

A

Port scanners are a software-based utility.
They are a security tool designed to search
a network host for open ports on a TCP/IP-based network.

106
Q

netstat -a

A

The netstat -a command can be used on a Windows-based system to see the status of ports.

107
Q

ping 127.0.0.1

A

You can ping the local loopback adapter by
using the command ping 127.0.0.1. If this command is successful, you know that the TCP/IP suite is installed correctly on your system and is functioning.

108
Q

tracert

A

tracert reports how long it takes to reach each router in the path. It’s a useful tool for isolating bottlenecks in a network. The traceroute command performs the same task on UNIX and Linux systems.

109
Q

ARP

A

ARP is the part of the TCP/IP suite whose
function is to resolve IP addresses to MAC
addresses.

110
Q

netstat

A

netstat is used to view both inbound and outbound TCP/IP network connections.

111
Q

nbtstat

A

nbtstat is used to display protocol and statistical information for NetBIOS over TCP/IP connections.

112
Q

ipconfig

A

ipconfig shows the IP configuration information
for all NICs installed in a system.

ipconfig /all is used to display detailed TCP/IP configuration information

ipconfig /renew is used on Windows operating systems to renew the system’s DNS information.

When looking for client connectivity problems using ipconfig, you should ensure that the gateway is set correctly.

113
Q

ifconfig

A

The ifconfig command is the Linux equivalent of the ipconfig command.

114
Q

nslookup /dig

A

The nslookup command is a TCP/IP diagnostic tool used to troubleshoot DNS problems. dig can be used for the same purpose on UNIX and Linux systems.

115
Q

firewall

A

A firewall is considered a logical security measure and is one of the cornerstone concepts of network security.

At its most basic, a firewall is a device that has more than one network interface and manages the flow of network traffic between those interfaces.

116
Q

DMZ

A

A DMZ is part of a network on which you place servers that must be accessible by sources both outside and inside your network.

117
Q

IDS

A

An IDS can detect malware or other dangerous

traffic that may pass undetected by the firewall. Most IDSs can detect potentially dangerous content by its signature.

118
Q

IPS

A

An IPS is a network device that continually
scans the network, looking for inappropriate
activity. It can shut down any potential threats.

119
Q

access control list

A

An access control list (ACL) typically refers to specific access permissions assigned to an object or device on the network. For example, wireless routers can be configured to restrict who can and cannot access the router based on the MAC address.

120
Q

When a port is blocked

A

When a port is blocked, you disable the capability for traffic to pass through that port, thereby filtering that traffic.

121
Q

VPN

A

A VPN extends a LAN by establishing a remote connection, a connection tunnel, using a public network such as the Internet.

122
Q

PPTP

A

PPTP creates a secure tunnel between two points on a network, over which other connectivity protocols, such as PPP, can be used. This tunneling functionality is the basis for VPNs.

123
Q

VPNs created and managed

A

VPNs are created and managed by using
protocols such as PPTP and L2TP, which
build on the functionality of PPP. This makes it possible to create dedicated point-to-point tunnels through a public network such as the Internet.

124
Q

L2TP authenticates

A

L2TP authenticates the client in a two-phase process. It authenticates the computer and then the user.

125
Q

IPSec uses two separate protocols

A

To create secure data transmissions, IPSec
uses two separate protocols: Authentication
Header (AH) and Encapsulating Security Payload (ESP).

126
Q

PPPoE

A

PPPoE (Point-to-Point Protocol over Ethernet) is a protocol used to connect multiple network users on an Ethernet local area network to a remote site through a common device.

127
Q

RDP

A

The RDP and ICA protocols allow client systems to access and run applications on a remote system, using that system’s resources. Only the user interface, keystrokes, and mouse movement are transferred between the client and server computers.

128
Q

AAA

A

AAA defines a spectrum of security measures, policies, and procedures that re combined to create a secure network.

129
Q

Authentication

A

Authentication refers to the mechanisms used to verify the identity of the computer or user attempting to access a particular resource. This includes passwords and biometrics.

130
Q

Authorization

A

Authorization is the method used to determine
if an authenticated user has access to a particular resource. This is commonly determined through group association—a
particular group may have a specific level of
security clearance.

131
Q

Accounting

A

Accounting refers to the tracking mechanisms

used to keep a record of events on a system.

132
Q

Terminal Access Controller Access Control System+ (TACACS+)

A

Terminal Access Controller Access Control
System+ (TACACS+) is a security protocol
designed to provide centralized validation
of users who are attempting to gain access
to a router or Network Access Server (NAS).

133
Q

Kerberos

A

Kerberos is one part of a strategic security solution that provides secure authentication services to users, applications, and network devices. It eliminates the insecurities caused by passwords being
stored or transmitted across the network.

134
Q

public key infrastructure (PKI)

A

A public key infrastructure (PKI) is a collection of software, standards, and policies that are combined to allow users from the Internet or other unsecured public networks to securely exchange data.

135
Q

A public key

A

A public key is a nonsecret key that forms
half of a cryptographic key pair that is used
with a public key algorithm. The public key
is freely given to all potential receivers

136
Q

A private key

A

A private key is the secret half of a cryptographic key pair that is used with a public
key algorithm. The private part of the public
key cryptography system is never transmitted
over a network

137
Q

A certificate

A

A certificate is a digitally signed statement that associates the credentials of a public key to the identity of the person, device, or service that holds the corresponding private key.