• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/58

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

58 Cards in this Set

  • Front
  • Back
A Windows and Unix command used to troubleshoot network connections. It verifies that the host can communicate with another host on the network
Ping (Packet Internet Groper)
A 48-bit hardware address unique to each NIC.
MAC address
The process of associating a NetBIOS name or host name to an IP address
name resolution
a network cable that is used to connect a PC to a hub, switch, or router.
patch cable
Segment of network data that also includes header, destination address, and trailer info that is sent as a unit
packet
term for each of the four 8-bit numbers that make up an IP address
octet
Microsoft's version of the IPX/SPX protocol suite used by Novell NetWare OS
NWLink
A text file located in the Windows folder that contains NetBIOS names and their associated IP address. This file is used for name resolution for a NetBEUI network
LMHosts
An API protocol used by some applications to communicate over a NetBEUI network. Replaced by Windows socket over a TCP/IP network
NetBIOS (Network Basic Input/Output System)
a fast, proprietary Microsoft networking protocol used only by Windows-based systems, and limited to LAN b/c routing isnt supported
NetBEUI (NetBIOS Extended User Interface)
A networking protocol suite first used by Novell Netware, and which corresponds to the TCP/IP protocols
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
a computer or other device that connects networks
gateway
any computer or other device on a network that has been assigned an IP address. AKA a node
host
a host name and a domain name such as jsmith.amazon.com. AKA a domain name
fully qualified domain name (FQDN)
The header and trailer info added to data to form a data packet to be sent over a network
frame
a unique, text-based name that identifies a network
domain name
a name that identifies a computer, printer, or other device on a network
host name
a computer that can find an IP address for another computer when only the domain name is known
DNS server
a distributed pool of info that keeps track of assigned domain names and their corresponding IP addresses
DNS (Domain Name Service)
a service that assigns dynamic IP addresses to computers on a network when they first access the network
DHCP (Dynamic Host Configuration Protocol)
the gateway a computer on a network will use to access another network unless it knows to specifically use another gateway for quicker access to that network
default gateway
a group of four dotted numbers that tells TCP/IP if a computer's IP address is on the same or different newtwork than another computer
subnet mask
Subnet masks that have a mix of zeroes and ones in one octet. Used to segment large corporate networks into subnetworks or subnets using (CIDR)
classless subnet masks
Subnet masks that use all ones or all zeros in an an octet
classful subnet masks
The process by which a protocol is associated with a network card or modem
binding
an IP address in the address range 169.254.x.x, used b a computer when it cannot successfully lease an IP address from a DHCP server
Automatic Private IP Address (APIPA)
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0-192.168.255.255
Private IP address
a server that acts as a intermediary between another computer and the internet. It substitutes its own IP address for the IP address of the computer
proxy server
the suite of protocols that supports communication on the internet. _____ is responsible for error checking, and ____ is responsible for routing.
TCP/IP (Transmission Control Protocol/Internet Protocol)
a data encryption method used on wireless networks that uses either 64-bit ir 128-bit encryption that are static keys
WEP (Wired Equivalent Privacy)
a Microsoft resolution service with a distributed database that tracks relationships between NetBIOS names and IP addresses. Compare to DNS
WINS (Windows Internet Naming Service)
a data encryption method for wireless networks that use the TKIP (Temporary Key Integrity Protocol) encryption method and the encryption keys are changed at set intervals
WPA (WiFi Protected Access)
a data encryption standard compliant with the IEEE802.11i standard that uses the AES (Advanced Encryption Standard) protocol. strongest
WPA2 (WiFi Protected Access 2)
1.Name the three types of Ethernet. What transmission speed does each support. (pg 404)
•10-Mbps
•100-Mbps or Fast Ethernet
•1000-Mbps or Gigabit Ethernet
2.When using dynamic IP addressing, what type of server must be on the network? (pg 419)
•DHCP (Dynamic Host Configuration Protocol) Server
3.Give an example of a classful subnet mask. Give an example of a classless subnet mask. (pg 416)
•Classful: 11111111.11111111.11111111.00000000 (255.255.255.0.)
•Classless: 11111111.11111111.11110000.00000000 (255.255.240.0.)
4.Which is more efficient for network traffic, a switch or a hub? Why?
•Switch, because a switch actively routes data
5.Is 172.16.50.100 intended to a public or private address?
•Private (pg 417)
6.What are the three ways a wireless network can be secured? (pg 452)
•WEP (Wired Equivalent Privacy)
•WPA (WiFi Protected Access)
•WPA2
7.What connecting device do you use for a small LAN? For two or more connected networks?
•For a small LAN network, a switch is best. To connect two or more LAN networks, a router is required.
8.Describe the structure of an IP address. How is it different from MAC address? (pg 414-416)
•IP Address: 32-bits long, made up of 4 bytes, 4 (8-bit) Octets separated by periods
•MAC Address: 48-bit (6-byte) number; six pairs of hex numbers separated by dashes
9.How many potential IP address are there?
•4.3 billion IP Addresses (pg 414)
10.How many networks and addresses are available for class A IP addresses? Class B? Class C? (pg 415)
•Class A: Networks: 127, Addresses: 16 million
•Class B: Networks: 16,000, Addresses: 65,000
•Class C: Networks: 2 Million, Addresses: 254
11.Why are class D and E addresses not available to individuals and companies? (pg 416)
•Class D: multicasting
•Class E: research
12.Which octets are used for the network address and for host addresses in Class A? Class B? Class C? (pg 415)
•Class A: Octet 1: Network Octet 2-4: Host
•Class B: Octet 1-2: Network Octet 3-4: Host
•Class C: Octet 1-3: Network Octet 4: Host
13.In what class is the IP address 185.75.255.10
•Class B (pg 415)
14.In what class is the IP address 193.200.30.5?
•Class C (pg 415)
15.Describe the difference between public and private IP addresses. If a network is using private IP addresses, how can the computers on the network access the Internet? (pg 417-419) proxy server pg 420
•Public address is used to connect to the internet
•Private address is only intended to be used on private intranets
•Uses a DHCP server to lease an IP address
16.Why is it unlikely that you will find the IP address 192.168.250.10 on the internet? (pg 417)
•It is a private IP Address
17.Which windows OS doesn’t automatically include the NetBEUI protocol?
•Windows XP (pg 410)
18.What are the two ways an IP address can be assigned to a PC? What is one advantage of each?
Dynamic
Static
19.What are the Ping, Ipconfig, and Winipcfg utilities used for? (pg 458)
•Ping: is a useful TCP/IP utility to check network connectivity
•Ipconfig/Winipcfg: IP address is assigned and the IP address, subnet mask, and the default gateway appear along with the adapter address
20.Of IPX/SPX, TCP/IP, and NetBEUI, which is routable and which is not? (pg 410)
•NetBEUI is not routable
21.When a PC reports it has used an automatic private IP address, what can you assume about the network configuration and current connectivity?
•That it uses DHCP server and that it can’t connect to the server
22.A network uses a subnet mask of 255.255.255.0 and has a computer on the network with the IP address of 120.12.12.3. Will the IP address 120.12.10.3 be on the network? Explain your answer?
•No because the first three octets don’t match (pg416)
23.What networking protocol was first used by Novell Netware and is not supported on the internet? (pg 410)
•IPX/SPX
24.If you were going to connect two PCs together in a simple network using the network ports on each PC, what type of cable would you use?
•Crossover Cable (pg 404)
25.Which name resolution service is used on the Internet, DNS or WINS? Why?
•DNS and WINS track the relationship between host names and IP addresses