Udemy-Domain 4 Flashcards
the 3 types of network communication are:
- Simplex (one way)
- Half-Duplex (one way at a time, reciprocating)
- Full-Duplex (simultaneous two-way)
___ networks have one channel, whereas ___ networks have multiple channels that can be used simultaneously
Baseband; Broadband
the ___ is a global collection of peered WAN networks,
the ___ is an organizations private network,
the ___ is a connection between private networks
Internet;
Intranet;
Extranet
data is normally sent over the internet using ___ switching, but ___ switching is a way to guarantee full bandwidth and no delays due to routing
packet; circuit
___ gives specific internet traffic priority so that it will be close to real-time (like VOIP)
QoS (Quality of Service)
a ___ is used for supporting mobile customers across a number of wireless LAN’s, satellite coverage areas, etc.
GAN (Global Area Network)
wire and cable types belong to OSI layer ___
1 (Physical)
network topologies belong to OSI layer ___
1 (Physical)
threats related to EMI, sniffing, interference, etc. belong to OSI layer ___
1 (Physical)
the ___ OSI layer connects nodes in the same network
2 (Data Link)
LLC (Logic Link Detection) error detection belongs to OSI layer ___
2 (Data Link)
the first ___ bits of a MAC address identify the manufacturer (UOI - Unique Organization Identifier)
24 (6 hexadecimal characters)
a devices MAC address is also called its ___
BIA (Burned In Address)
the last ___ bits of a MAC address identify the unique device (UAA - Universally Administered Address)
24 or 40
ARP (Address Resolution Protocol) belongs to OSI layer ___
2 (Data Link) and 3 (Network)
CSMA (Carrier Sense Multiple Access) belongs to OSI layer ___ (CD for ethernet and CA for wireless)
2 (Data Link)
Token Passing belongs to OSI layer ___
2 (Data Link)
most protocols that start with “I” (except IMAP) like IP, ICMP, IPSEC… belong to OSI layer ___
3 (Network)
a large number of protocol attacks (ping floods, smurf, spoofs, etc.) occur on OSI layer ___
3 (Network)
SSL/TLS operate from OSI layer ___ through layer ___
4 (Transport); 7 (Application)
UDP (User Datagram Protocol) flood attacks are called ___ and occur on OSI layer ___
Fraggle; 4 (Transport)
TCP SYN attacks, or SYN floods occur on OSI layer ___
4 (Transport)
Fraggle attacks are often more successful than Smurf attacks because
many networks block ICMP but not UDP
VIOP and other real-time applications use UDP because ___
they cannot afford the overhead of delivery confirmation