Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
114 Cards in this Set
- Front
- Back
What is IEEE 802.11i used for? |
Provides strong encyption, replay protection, integrity protection. Not for network authentication. |
|
What is IEEE 802.1x used for? |
Network Authentication. Uses different EAP types for different environments. |
|
What is WPA and WPA2? |
Wi-Fi Protected Acess is emprovement over WEP and old hardware (TKIP) |
|
What data is at byte 9 of the IP header? |
Protocol |
|
What type of Technology is used at the Application layer? |
Gateways |
|
What type of Technology is used at the Presentation layer? |
Gateways |
|
What type of Technology is used at the Session layer? |
Gateways |
|
What type of Technology is used at the Transport layer? |
Gateways |
|
What type of Technology is used at the Network layer? |
Virtual circuits (ATM), routers |
|
What type of Technology is used at the Data link layer? |
Bridges, switches |
|
What type of Technology is used at the Physical layer? |
ISDN, Hubs, Repeaters, Cables |
|
Which OSI layer uses these protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET |
Application Layer - Layer 7 |
|
Which OSI layer uses these protocols: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF |
Presentation Layer - Layer 6 |
|
Which OSI layer uses these protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP, NFS, NetBIOS |
Session Layer - Layer 5 |
|
Which OSI layer uses these protocols: TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP |
Transport Layer - Layer 4 |
|
Which OSI layer uses these protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25 |
Network Layer - Layer 3 |
|
Which OSI layer uses these protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI |
Data Link Layer - Layer 2 |
|
Which OSI layer uses these protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23 |
Physical Layer - Layer 1 |
|
Which layer of the OSI model provides file transmission, message exchange, terminal sessions, etc |
Application Layer |
|
Which layer of the OSI model provides encryption/decryption, compression, and virtual terminal emulation |
Presentation Layer |
|
Which layer of the OSI model provides setup of the links, maintaining of the link, and the link tear-down between applications. Controls application to application communication |
Session Layer |
|
Which layer of the OSI model provides delivery of user information. It is also responsible for error detection, correction, and flow control. Handles computer to computer communication |
Transport Layer |
|
Which layer of the OSI model inserts info into packet headers so it can be properly addressed and routed. Then route the packet to their proper destination. |
Network Layer |
|
Which layer of the OSI model provides error detection, frame ordering, and flow control. Translate data to binary format for proper line transmission over LAN or WAN. |
Data Link Layer |
|
Which layer of the OSI model converts bits into voltage for transmission. |
Physical Layer |
|
What are the 4 layers of the TCP/IP model? |
Application Layer |
|
What are the protocols for the TCP/IP Model's Host to Host Layer? |
TCP and UDP |
|
What is a Class A range of IP addresses? |
1.0.0.0 to 127.255.255.255 |
|
What is a Class B range of IP addresses? |
128.0.0.0 to 191.255.255.255 |
|
What is a Class C range of IP addresses? |
192.0.0.0 to 223.255.255.255 |
|
What is Classless Interdomain Routing (CIDR) used for? |
Class B address range is usually too large for most companies and Class C is too small. CIDR provides flexibility to increase or decrease the class sizes |
|
Describe the protocol IP (Internet Protocol) |
All hosts on a network have an IP address |
|
Describe the protocol ARP (Address Resolution Protocol) |
Use the IP Address to get the MAC Address |
|
Describe the protocol RARP (Reverse Address Resolution Protocol) |
Use the MAC Address to get the IP Address |
|
Describe the protocol ICMP (Internet Control Message Protocol) |
Management Protocol and messaging service provider for IP. |
|
What is TCP/IP protocol Telnet used for? |
Terminal Emulation (No File Transfer) |
|
What is TCP/IP protocol LDP used for? |
Line Printer Daemon – with LPR enables print spooling |
|
What is TCP/IP protocol X-Windows used for? |
For writing graphical interface application |
|
What is TCP/IP protocol Simple Network Management Protocol (SNMP) used for? |
Provides the collection of network information by polling the devices on the network from a management station. |
|
What OSI model protocol supports authentication, compression, confidentiality, and integrity; uses DES encryption; used for Encrypted File Transfer |
SSH-2 |
|
What OSI model protocol uses symmetric encryption and public key for authentication and MAC (message authentication code) for integrity |
SSL - Secure Socket Layer |
|
Compare asynchronous and synchronous transmission types. |
Asynchronous used when 2 devices not synchronized |
|
Describe Broadband transmission. |
Divides the communication channel into individual channels so different type of data an be transmitted simultaneously |
|
Give examples of Broadband medium. |
Coaxial Cable TV (CATV), ATM, DSL, ISDN |
|
Describe Baseband transmission. |
Uses entire communication channel for transmission |
|
Give examples of Baseband medium. |
Ethernet - entire wire for one channel |
|
What technology is used for the Bus network topology? |
Ethernet |
|
What technology is used for the Ring network topology? |
FDDI |
|
What technology is used for the Star network topology? |
Local bus (Ethernet) and ring topologies (Token Ring) |
|
What technology is used for the Tree network topology |
Ethernet |
|
What technology is used for the Mesh network topology |
Internet |
|
Describe 10Base2, ThinNet. |
Coaxial |
|
Describe 10Base5, ThickNet. |
Coaxial |
|
Describe 10BaseT. |
UTP |
|
Describe 100BaseT, Fast Ethernet. |
UTP |
|
Describe 1000BaseT, Gigabit Ethernet. |
UTP |
|
What type of LAN implementation does this describe: |
Ethernet |
|
What type of LAN implementation does this describe: |
Token Ring |
|
What type of LAN implementation does this describe: |
FDDI |
|
Describe Coaxial Cable. |
Copper core surrounded by shielding layer & grounding wire encased in outer jacket |
|
Describe Twisted Pair Cable. |
Insulated copper wires surrounded by outer protective jacket |
|
Describe UTP Category 3 cable. |
10 Mbps for Ethernet and 4 Mbps for Token Ring |
|
Describe UTP Category 4 cable. |
16 Mbps |
|
Describe UTP Category 5 cable. |
100 Mbps for 100Base-TX and CDDI networks, has high twisting and low crosstalk |
|
List 4 Media Access technologies. |
Token Passing |
|
Describe the two kinds of CSMA (Carrier Sense Multiple Access) |
CSMA/CD - Carrier sense multiple access with collision detection - |
|
Define Collision Domains |
A collision domain is a group of computers that are competing for same shared communication medium |
|
Define Polling |
Media access technology |
|
What is Address Resolution Protocol (ARP)? |
LAN protocol |
|
What is Dynamic Host Configuration Protocol (DHCP)? |
LAN protocol |
|
What are Distance Vector Routing Protocols? |
Make routing decision based on distance or number of hops and vector or direction. Example: RIP |
|
What are Link State routing protocols? |
Build more accurate routing table because build a topology db of the network. |
|
What is a Repeater? |
Amplifies electrical signals between cable segments which enables it to extend a network |
|
What is a Hub? |
On Physical layer of OSI model. |
|
What is a Bridge? |
Data Link Layer |
|
What is a Switch? |
Data Link Layer |
|
What is a Router? |
Network Layer |
|
What is a Gateway? |
Application Layer |
|
Describe Packet Filtering Firewalls. |
1st Generation |
|
Describe Application level proxy firewalls. |
2nd Generation |
|
Describe Circuit level proxy firewalls. |
2nd Generation |
|
Describe Stateful firewalls. |
3rd Generation |
|
Describe Dynamic packet filtering firewalls. |
Dynamic ports are high numbers above well known ports starting at 1023 |
|
Describe Kernel proxy firewalls |
5th Generation |
|
What is a bastion host firewall? |
Locked down or hardened system |
|
What is a dual homed firewall? |
Two interfaces - one facing the external and one facing the internal network |
|
What is a screened host firewall? |
Router filters (or screens) traffic before passing it to firewall |
|
What is a screened subnet? |
External router filters (or screens) traffic before it enters the subnet. Traffic headed toward internal network goes through 2 firewalls |
|
What is Network Information System (NIS)? |
Like a telephone book for locating network resources |
|
What is Network Address Translation (NAT)? |
Enables a network that does not follow the internet's addressing scheme to communicate over the internet. |
|
What is Port Address Translation (PAT)? |
Used by NAT |
|
What is Asynchronous Transfer Mode (ATM)? |
Encapsulates data in fixed cells & can be used to deliver data over SONET network. |
|
What is circuit switching? |
Sets up virtual connection that acts like a dedicated link between 2 systems |
|
What is packet switching? |
Packets from one connection can pass through number of individual devices instead of following one another through the same device |
|
Describe Frame Relay. |
High performance WAN protocol that uses packet switching technology which works over public networks |
|
Describe X.25. |
First packet switching technology developed over public networks |
|
Describe ISDN |
Communication protocol provided by phone companies and ISPs |
|
Describe DSL |
High speed connection technology to connect to service providers CO |
|
What is PPP - Point to Point Protocol? |
Encapsulation protocol meaning an extra header and possibly trailer added to a frame |
|
What are tunneling protocols? |
Tunnel is a virtual path across a network that delivers packets that are encapsulated and possibly encrypted |
|
What is PPTP? |
A tunneling protocol |
|
What is IPSec? |
Tunneling protocol |
|
What is L2TP? |
Hybrid of L2F and PPTP |
|
What is Frequency Hopping Spread Spectrum (FHSS)? |
Takes total amount of bandwidth and splits it into smaller sub channels. |
|
What is Direct Sequence Spread Spectrum (DSSS)? |
Applies sub bits to the message |
|
Describe the 802.11b wireless standard |
Transfer up to 11 Mbps |
|
Describe the 802.11a wireless standard |
Transfer up to 54 Mbps |
|
Describe the 802.11g wireless standard |
Higher data transfer rates 0 up to 54 Mbps. |
|
What is WAP |
Not a standard but a de facto market and industry driven protocol stack |
|
What is Traceroute? |
Shows you the path a packet took to get to its destination. |
|
What is Asymmetrical digital subscriber line (ADSL)? |
Higher download rates than upload |
|
What is Single-line digital subscriber line (SDSL)? |
Symmetrical download and upload rates |
|
What is High Rate Digital Subscriber Line (HDSL)? |
Symmetrical download and upload rates |
|
What is Very High Data Rate digitals subscriber line (VDSL)? |
Downstream data range 13 mbps to 52 mbps |