Short Definitions Flashcards

Become Familiar with common terms

1
Q

Private Cloud

A

A cloud infrastructure operated solely for a single organisation that can be managed internally or by a third party and host internally or externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public Cloud

A

When the cloud is rendered over a network that is open for public use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Community Cloud

A

Shares infrastructure between several organisations from a specific community that can be managed internally or by a third party and hosted internally or externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hybrid Cloud

A

Two or more clouds (private, public or community) that retain unique names but are bound together, offering the benefits of multiple deployment models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMP

A

Simple Network Management Protocol is a protocol that governs network management. The protocol reports on whether a device is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS - reflective/amplified

A

Uses potentially legitimate thridparty component to send the attack traffic to a victim, hiding the attackers identity. The attackers send packets to the reflector servers with a source IP address set to their victim’s IP, indirectly overwhelming the victim with the response packets. DNS and NTP servers are particularly susceptible to this attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DoS - Smurfing

A

a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. The target of the attack is flooded with packets, causing performance to decline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS - Friendly/Unintentional

A

a DoS attack that is carried out by devices that have legitimate access to the attacked server. This can occur as part of a DDoS where the legitimate device is a botnet. It could also occur when a user inadvertently causes a DoS attack due to initialising multiple requests that hang up the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS - Physical Attack

A

an attack where an attacker attacks a device in such a way as to permanently put it out of commission. Also referred to as permanent DoS, this attack may involve affecting the firmware or infecting the device with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cable tester

A

Verifies that a cable is good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Crimper

A

Attaches media connectors to the ends of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loopback Plug

A

Echoes signals over a port to ensure it is working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multimeter

A

Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current and resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Punchdown Tool

A

Attaches cable to a patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Toner Probe

A

Includes a tone generator and a tone locater to locate the ends of a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shorts

A

Shorts occur when two copper connectors touch each other, resulting in current flowing through that short because the short has lower resistance. Use a cable tester to determine if a short has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Opens

A

Opens occur when there is a break or improper termination in the cabling that prevent current from flowing through a circuit. Use a cable tester to determine if an open has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bad Connector

A

A bad connector will cause a connection to be unsuccessful. You can either replace the entire cable or replace the connector depending on the length of run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bad Wiring

A

Bad wiring, like a bad connector, will cause a connection to be unsuccessful. If the wiring is the problem, it is best to replace the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Split Pairs

A

A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs. It most commonly occurs when a punch-down block is wired incorrectly or when RJ-45 connectors are crimped onto the wrong wires. In both these situations, you will need to rewrite the block or connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tx/Rx reversed

A

A straight-through cable has the same transmit (Tx) or receive (Rx) leads at each end, while they are reversed at one end in a crossover cable. A straight-through cable connects dissimilar devices, while a crossover cable connects like devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MDIX (Medium dependent interface crossover)

A

Allows a switch port to properly configure its leads as Tx or Rx. If a network device does not support MDIX you MUST use the appropriate cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bad SFP/GBIC module (Cable or Transceiver)

A

Switches can include Gigabit interface converter (GBIC) and small form-factor pluggable (SFP) modules. If one of these modules goes bad, you can either replace it if possible. Otherwise the switch will have to be replaced. To determine if the module has failed you need to use an LC loopback tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What can effect copper cabling transmissions?

A

EMI/RFI, crosstalk, cable misplacement, signal attenuation and distance limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Physical Network Diagram
Includes cable lengths and types, server names, IP addresses, server roles, network equipment locations and number of network users. Also referred to as network maps.
26
Network Baseline
Includes performance statistics for your network. Without a baseline you cannot determine if performance improvements have occurred
27
Logical Network Diagram
Includes server roles, domain architecture, protocols used and trust relationships
28
Wiring Schematic
The wiring schematic emphasises the flow of the network. It includes equipment symbols and lines that indicate the flow
29
Procedures
Set forth steps that must be taken to enforce the network owner's policies
30
Policies
Set forth the network rules, including the who, what and when of the rules. Policies tell what the rules are, who is covered by the rule and when the rule applies
31
Regulations
Governmental guidelines that a re written by federal or state agencies based on the laws passed by a federal or state government
32
Service Legal Agreement (SLA)
Defines the minimum level of service that will be provided. An SLA is often implemented between an Internet Service Provider (ISP) and the company obtaining services from the ISP
33
Memorandum of Understanding (MOU)
Defines the roles and parameters of an agreement between two parties. It is often not a legally binding document. Some companies will use MOUs to define services within the organisation such as the services that will be provided by the IT department
34
Master Service Agreement (MSA)
Specifies payment terms, product warranties, intellectual property ownership, dispute resolution and other aspects between two parties. It will be used to govern all future statements of work (SOWs) between the two parties
35
Disaster Recovery Plan (DRP)
A document that sets forth the policies, tools and procedures designed to enable the recovery or continuation of vital infrastructure and systems that are needed to support critical business functions. DRPs are often seen as subsets of business continuity plans
36
Business Continuity Plan (BCP)
A plan that is designed to ensure that the business can produce their products or continue their work at acceptable levels following a disruptive incident. Unlike a DRP a BCP targets incidents such as the loss of a key member of an organisation or how the organisation responds in the event of a device failing or something that would cause a similar network disruption
37
VDSL
Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate at 51 to 55 megabits per second over cable lengths of up to 1000ft or 300 metres
38
ADSL
Asymmetric DSL (ADSL) up to 6.1Mbps downstream, up to 640Kbps upstream
39
HDSL / SDSL
High bit rate DSL (HDSL) and Symmetric DSL (SDSL) both provide data transmission rates up to 1.544Mbps in North America and 2.048Mbps in Europe
40
DSL
DSL lines use UTP/STP cabling. The maximum length for ADSL is 18,000ft. The maximum length for HDSL is 12,000ft. The maximum length for VDSL is 4,000ft. DSL is a packet-switched network
41
UTP Category 1 Cable
Up to 4 Mbps
42
UTP Category 2 Cable
Up to 4 Mbps
43
UTP Category 3 Cable
Up to 10 Mbps
44
UTP Category 4 Cable
Up to 16 Mbps
45
UTP Category 5 Cable
Up to 100Mbps up to 100m
46
UTP Category 5e Cable
Up to 1000 Mbps
47
UTP Category 6 Cable
Up to 1000 Mbps or 1Gbps up to 100m
48
UTP Category 6a Cable
Up to 10Gbps up to 100m
49
UTP Category 7 Cable
Up to 10Gbps up to 100m
50
UTP Category 8 Cable
Up to 40 Gbps and 30m, 100m when supporting 10Gbps
51
Types of Media Converters
- Single-mode fibre to Ethernet - Multi-mode fibre to Ethernet - Fibre to coaxial - Single-mode fibre to Multi-mode fibre
52
DHCP Term - Lease
A single IP address that is being used by a DHCP client
53
DHCP Term - Option
A parameter that can be used to assign router, DNS server and other information to DHCP clients
54
DHCP Term - Scope
A range of possible IP addresses that a DHCP server can assign
55
DHCP Term - Reservation
An allocation of a single IP address to a MAC address
56
Loopback Interface
Allows you to test to ensure that the local network interface is working properly. The IPv4 address for the locate loopback is 127.0.0.1, and the IPv6 address for the loopback is ::1.
57
Routing Loop
A network problem that happens when a data packet continually loops through the same routers over and over. This is a problem associated with Distance Vector Protocols, such as RIP and RIPv2. Methods for dealing with loops include maximum hop count, split horizon, route poisoning and hold down times
58
Routing Table
A data table that lists the routes to particular network destinations. They can be stored on a router or a computer.
59
Default Route
The route that takes effect when no other route can be determined for a given destination. All pacKets for destinations not established in the routing table are sent via the default route. In most cases the default route is the router closest to the computer.
60
Interior Gateway Routing protocols versus Exterior Gateway Protocols
Protocols that route between autonomous systems or routing domains are referred to as Exterior Gateway Routing Protocols. Interior Gateway Protocols discover paths between networks within the same organisational boundary.
61
Autonomous Numbers Authority (AS)
Numbers assigned to network operators by the Internet Assigned Numbers Authority (IANA) and the Regional Internet Registries (RIRs)
62
Route Distribution
When you take a route from one routing protocol and distribute it to another protocol. By default routers only advertise and share routes with other routers running the same protocol.
63
Hot Standby Router Protocol (HSRP)
A Cisco proprietary first-hop redundancy protocol (FHRP) designed to allow for transparent fail-over of the first-hop IP router
64
Route Aggregation
Minimises the number of routing tables required in an IP network organising network layer IP addresses in a hierarchical way so that addresses are topologically significant.
65
Shortest Path Bridging (SPB)
A routing protocol that identifies loop-free shortest paths to help with traffic engineering.
66
Role Separation
Involves dividing server duties amongst two or more servers to reduce an attack profile.
67
Penetration Testing
Using hacking methodologies and tools to test the security of a clients network on behalf of the client
68
File Integrity Monitoring
Helps to identify unauthorised changes to files
69
Honeypot
A file or object on a network designed to lure in a hacker, often to divert attention from other resources
70
PAT
Port Address Translation provides port address translation. When using PAT you are able to share a single public IP address among multiple computers on the same network
71
NAT
Network Address Translation provides network address translation. This is based on the individual private IP addresses of the NAT clients
72
APIPA
Automatic Private IP Addressing is a private addressing scheme. In APIPA clients that are configured to obtain a dynamic IP address and cannot locate a DHCP server will assign themselves an IP address in the APIPA range (169.254.x.x)
73
DHCP
Dynamic Host Configuration Protocol is a dynamic IP addressing scheme whereby DHCP servers assign IP addresses based on the DHCP client requests
74
RFC 1918
RFC 1918 was used to create the standards for assigning IP address within a private network to various pieces of networking equipment. It facilitated the expansion of usable IP addresses under IPv4 to prevent the exhaustion of public addresses available
75
T1
1.544Mbps, 650ft, UTP/STP/Coaxial
76
T3
44.736Mbps, 450 ft, Coaxial
77
E1
2.048Mbps, 650ft, UTP/STP/Coaxial
78
E3
34.368Mbps, 450 ft, Coaxial
79
802.11a
5GHz, up to 54Mbps
80
802.11b
2.4GHz, up to 11Mbps
81
802.11g
2.4GHz, up to 54Mbps
82
802.11n
2.4/5GHz, up to 600Mbps
83
802.11ac
5GHz, up to 1.3Gbps
84
802.11ax
2.4/5/6GHz, up to 9.6Gbps
85
UTM
Unified threat Management - This device bundles multiple security functions into a single physical or logical device. Features included could be IPS, IDS, anti-virus, anti-malware, anti-spam, NAT and other functions
86
FTP
File Transfer Protocol - 20, 21
87
SSH, SFTP
Secure Shell, Secure File Transfer Protocol - 22
88
TELNET
23 - Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines. It follows a user command TCP/IP networking protocol that creates remote sessions.
89
SMTP
Simple Mail Transfer Protocol - TCP 25, Application Layer
90
DNS
Domain Name Server - 53
91
DHCP
Dynamic Host Configuration Protocol - 67, 68
92
TFTP
69 - Trivial File Transfer Protocol (TFTP) is a simple protocol that provides basic file transfer function with no user authentication.
93
HTTP
HyperText Transfer Protocol - 80
94
POP3
110 - Post Office Protocol version 3 is an email message retrieval protocol that uses TCP 110. Application layer
95
NTP
Network Time Protocol - UDP 123
96
NetBIOS
NetBIOS provides three distinct services: Name service for name registration and resolution (ports: 137/udp and 137/tcp) Datagram distribution service for connectionless communication (port: 138/udp) Session service for connection-oriented communication (port: 139/tcp)
97
IMAP
TCP port 143 - Internet Message Access Protocol is an internet protocol for e-mail retrieval. IMAP4 works at the application layer of the OSI model
98
SNMP
Simple Network Management Protocol - 161/162
99
LDAP
The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information or devices within a network. Whether you want to build a central authentication server for your organization or want to simplify access to internal servers and printers, LDAP is the answer. - 389
100
HTTPS
HyperText Transfer Protocol Secure - 443
101
SMB
Server Message Block - 445 - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.
102
Syslog
System Log - 514 - a type of logging that allows a system administrator to monitor and manage logs from different parts of the system. It can be used to track events and errors, as well as provide information about system performance.
103
SMTP TLS
Simple Mail Transport Protocol Transport Layer Security - 587 - encrypts data as it traverses a network.
104
LDAPS
Lightweight Directory Access Protocol Secure - 389 - uses TLS/SSL as a transmission protocol.
105
IMAP over SSL
IMAP traffic travel over a secure socket to a secure port, typically TCP port 993.
106
POP3 over SSL
The POP3S protocol over port 995 provides for secure email downloads by using SSL/TLS encryption.
107
SQL Server
Structured Query Language Server - 1433 - is a programming language for storing and processing information in a relational database.
108
SQLnet
The SQLNET protocol is used by Oracle SQL servers to execute SQL commands from clients, including load balancing and application-specific services. Support of stateful firewall and NAT services requires that you configure the SQLNET ALG for TCP port 1521.
109
H.323
H. 323 is one of the oldest standards which are generally used for VoIP telephony and video conferencing. It is a system of various protocols and elements that allows transferring media data over packet networks. - 1720
110
MGCP
The Media Gateway Control Protocol (MGCP) is a telecommunication protocol for signaling and call control in hybrid voice over IP (VoIP) and traditional telecommunication systems. - 2427/2727
111
MySQL
MySQL is a relational database management system - 3306
112
RDP
The Remote Desktop Protocol (RDP) is a protocol, or technical standard, for using a desktop computer remotely. - 3389
113
RTP
Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data. - 5004/5005
114
SIP
5060/5061 - The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications. SIP is used in Internet telephony, in private IP telephone systems, as well as mobile phone calling over LTE (VoLTE).
115
Gateway
A gateway is used to connect networks that use different protocols
116
CSU/DSU
A Channel Service Unit/Digital Service Unit is a device typically required by leased lines, such as T1 lines, to terminate their media connection to your LAN
117
Wireless NIC
Wireless Network Interface Card is designed specifically for wireless networks. It is the piece of hardware that enables wireless communication for a computer
118
Device Density
The ratio of users to access points
119
Wireless Controller
A centralised device that can be used to manage multiple wireless access points
120
VLAN pooling
assigns IP addresses to wireless clients from a pool of IP subnets and their associated VLANs
121
Antenna Properties
Gain, Beamwidth, Transmission angle
122
ICMP
Internet Control Message Protocol sends error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. It operates on the Internet layer of the Internet protocol suite (TCP/IP)
123
UDP
User Datagram Protocol sends messages, called datagrams, to other hosts on an internet protocol (IP) network without prior communications to set up special transmission channels or data paths. It operates on the Transport Layer of the internet protocol suite (TCP/IP model)
124
TCP
Transmission Control Protocol provides reliable, ordered and error-checked delivery of data between applications running on hosts communicating over an IP network. It operates on the Transport Layer of the internet protocol suite (TCP/IP). TCP is the protocol used by the World Wide Web, Email, Remote administration and file transfer applications
125
CoS
Class of Service implements packet tagging in a local area network. It tags the different types of traffic, such as video streaming or VoIP. the tag is a value between 0 and 8, with 0 being the highest priority
126
QoS
Quality of Service uses the CoS tag to determine which traffic gets priority but Qos does not implement the tags. Layer 3 technology that allows the network to provide increased levels of service based on the type of traffic. Can provide dedicated bandwidth and control jitter
127
Traffic Shaping
The overall mechanism that encompasses Cos, QoS and differentiated services
128
Differentiated services (Diffserv)
Uses CoS classifications for identification and subsequently utilises the QoS parameters to differentiate traffic. It is the term used for end-to-end QoS model
129
X.25
A WAN protocol that is used to create a continuous link between two offices. It employs switches, routes and circuits to produce the best route to transfer data at any given time
130
MTBF
MTBF - Mean Time Between Failures is the average, or mean time between failures on a device or system. It is an expression of reliability
131
MTTR
Mean Time To Recover is the average, or mean, time that it takes to recover or restore a system. In terms of a backup the term would refer to the time needed to restore a system from a full, full+incremental, or full+differential backup. The term can also be applied to full system failure or hardware component failure such as hard drive, RAM or power supply
132
SLA
Service Level Agreement requirements determine what the vendor who provides technology services is obligated to provide to the customer. Items that are outlined in the SLA can include response time, repair time, network reliability expectations, escalation protocols, dispute resolution and more. Often the terms MTBF and MTTR may be included in an SLA
133
RADIUS
RADIUS server provides authentication, authorisation and accounting, may also be referred to as AAA server
134
TACACS
Terminal Access Controller Access Control System is the CISCO implementation of RADIUS.
135
XTACACS
The second generation of TACACS and separates the authentication, authorisation and auditing processes
136
TACACS+
The third generation of TACACS, provides all features of XTACACS along with extended two-factor user authentication.
137
ipconfig /flushdns
Flushes the contents of the client computer's DNS cache
138
ipconfig /all
Displays all the TCP/IP settings for the computers
139
ipconfig /registerdns
registers the computer's DNS hostname with the DNS server
140
ipconfig /displaydns
displays the contents of the computer's DNS cache
141
ipconfig /renew
command will renew the client's DHCP lease
142
ipconfig /release
will release the client's DHCP lease
143
ipconfig /showclassid
will display the DHCP class ID assigned to the client computer
144
ipconfig /setclassid
will configure the DHCP class ID for the client computer
145
Physical Network Diagram
Contains cable lengths and types, server names, IP addresses, server routes, server roles, network equipment locations and number of network users
146
Logical Network Diagram
Contains server roles, Domain architecture, protocols used and trust relationships. NOT IP addresses and server names
147
Wiring Schematic
Emphasises the flow of the network. It includes equipment symbols and lines that indicate the flow
148
BNC Connector
Coaxial Cable, can also use F connector
149
SC Connector
Fibre-optic cable, can also use an ST or LC connector
150
RJ-45 Connector
Twisted Pair Cable, RJ-45 in networks, RJ-11 in telephone deployments
151
IPv6 APIPA
fe80::/10
152
Private IPv6
fc00::/7
153
Loopback IPv6
::1/128
154
Multi-mode Fibre
Up to 10Gbps and 500m
155
Single-mode Fibre
Up to 10Gbps and 40km
156
Thicknet
Uses RG-6 coaxial cabling, up to 10Mbps and 500m
157
Thinnet
uses RG-59 coaxial cabling, up to 10Mbps and 185m
158
WEP
Wired Equivalent Privacy - Uses a 40-bit or 104-bit key
159
WPA/WPA2 Personal
Wifi Protected Access - Uses a 256-bit pre-shared key
160
WPA/WPA2 Enterprise
Wifi Protected Access - Requires a RADIUS server, For large networks
161
TDMA
TDMA - Time Division Multiple Access is obsolete. A 2G technology decommissioned in 2007-2009
162
CDMA
Code-division Multiple Access - refers to a multiplexing technique, applies to 2G and 3G, still used today
163
EDGE
Enhanced Data Rates for GSM Evolution is three times faster than GSM (but based on GSM technologies), Still in use
164
GSM
Global System for Mobile communications is the world's most widely used cellphone technology. Still widely used today
165
LTE
Long Term Evolution is an IP-based 4G cellular technology rolled out in 2012
166
UTM
Unified Threat Management appliance provides multiple security functions in a central location. Some services/functions include load balancing, email security, URL filtration and wireless security
167
VoIP PBX
A Voice over IP Private Branch Exchange allows a company to use a single public-facing telephone number while having individual (extensions) for employees in a VoIP phone system
168
NTP
Network Time Protocol is used to synchronise the clocks of computers on the network
169
iptables
The iptables Linux command allows you to control a firewall and filter packets
170
tcpdump
The tcpdump command allows you to analyse wired or wireless network traffic on a Linux system
171
nslookup
The nslookup command (Linux) is used to query the DNS server. nslookup with a domain name will return the A record. nslookup with an IP address will return the ptr record
172
ifconfig
ifconfig (Linux) is the counterpart to the Windows ipconfig command and provides information about the network interface card
173
MPLS VPN
Multiprotocol Label Switching Layer 3 Virtual Private Network. This will allow all offices to connect to the same single-routed network and connect directly to the cloud
174
Fast Ethernet 100Base-Tx network
100 Mbps data-transmission rate, Maximum segment length of 100m, Two pairs of wires with a Cat5 UTP cabling
175
ESD
Electrostatic Discharge
176
FTP (port)
21
177
POP3 (port)
110
178
IMAP (port)
143
179
HTTPS (port)
443
180
RDP (port)
3389
181
SMTP (port)
25
182
LDAP (port)
389
183
APIPA IPv6
fe80::/10
184
Private IPv6
fc00::/7
185
Loopback IPv6
::1/128
186
VPN concentrator
Terminates VPN tunnels
187
LC - Lucent Connector, Fibre-optic, Small
188
A (DNS)
Maps a host name to an IPv4 address
189
AAAA (DNS)
Maps a host name to an IPv6 address
190
CNAME (DNS)
Maps an additional host name to an existing host record
191
MX (DNS)
Maps a mail server name to a domain
192
PTR (DNS)
Maps an IP address to a host name
193
CIDR values for class A
/8 - /15
194
CIDR values for Class C
/24 - /30
195
CIDR values for Class B
/16 - /23
196
You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with SONET network. Which of the following should you implement?
10GBase-SW - for use with Synchronous Optical Networking (SONET) networks.
197
Network Cable (OSI Layer)
Physical -
198
FDDI (OSI Layer)
Data Link (Fibre Distributed Data Interface)
199
IPsec (OSI Layer)
Network
200
TCP (OSI Layer)
Transport
201
RPC (OSI Layer)
Session (Remote Procedure Call)
202
MIME (OSI Layer)
Presentation (Multipurpose Internet Mail Extensions, allows users to send a variety of file types in an email inc images, videos, audio and apps)
203
DHCP (OSI Layer)
Application (Dynamic Host Configuration Protocol, Operates layer 7 but sends data relating to layers 2 and 3)
204
ping -i
enables you to specify the size of the messages sent to the target. eg - ping 10.0.0.1 -I 2048 -n 11 sends 2048 bytes
205
ping -n
enables you to specify the number of messages the ping tool should transmit eg - ping 10.0.0.1 -l 2048 -n 11 will send 11 messages
206
ping -t
causes the ping tool to transmit messages until manually halted
207