• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/121

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

121 Cards in this Set

  • Front
  • Back
This network layer protocol translates numeric IP addresses into the equivalent MAC layer addresses necessary to transfer frames from one machine to another on the same cable segment or subnet. (1)
Address Resolution Protocol (ARP)
What method is used to assign a unique numerical identifier to an individual network interface on a network segment to make every such interface uniquely identifiable? (1)
Addressing
What is the uppermost layer of the ISO/OSI network reference model, where the interface between the protocol suite and actual applications resides? (1)
Application Layer
What is the name of the experimental network designed to test the feasibility of a platform-neutral, long-distance, robust, and reliable internetwork that provided the foundation for what we know today as the Internet? (1)
ARPANET
A specific type of network transmission that is meant to be noticed and read by all recipients on any cable segment. (1)
Broadcast
A special mathematical value that represents the contents of a message so precisely that any change in the contents will cause a change in the ______. (1)
Checksum
A _____ is a computer process whose job is to listen for connection attempts for one or more specific network services. (1)
Daemon
The basic protocol data unit at the TCP/IP Network Access layer. (1)
Datagram
What type of filter is applied to packets that reside in the trace buffer for the purpose of viewing only the packets of interest? (1)
Display Filter
A temporary TCP or UDP port number allocated to permit a client and server to exchange data with each other only as long as their connection remains active. (1)
Dynamically Assigned Port Address
The basic PDU at the Data Link layer of the ISO/OSI reference model is known as which of the following? (1)
Frame
The enclosure of data from an upper-layer protocol between a header and an (optional) trailer for the current layer to identify sender and receiver. (1)
Encapsulation
What organization sets standards for all kinds of electrical and electronic equipment, including network interfaces and communications technologies? (1)
Institute of Electrical and Electronic Engineers (IEEE)
What organization governs the actions of both the IETF and IRTF; and has final approval authority for Internet Standards? (1)
Internet Architecture Board (IAB)
What organization within the Internet Society is responsible for proper assignment of all domain names and numeric IP addresses for the global Internet? (1)
Internet Corporation for Assigned Names and Numbers (ICANN)
What is a TCP/IP-based messaging protocol that allows users to maintain customized message stores on an e-mail server? (1)
Internet Message Access Protocol (IMAP)
What is the forward-looking research and development arm of the Internet Society? (1)
Internet Research Task Force (IRTF)
What is the parent organization under which the rest of the Internet governing bodies fall? (1)
Internet Society (ISOC)
The biggest single chunk of data that can be transferred across any particular type of network medium is known as which of the following? (1)
Maximum Transmission Unit (MTU)
What network address is handled by a sublayer of the Data Link layer that is normally preassigned on a per-interface basis to uniquely identify each such interface on any network cable segment? (1)
Media Access Control (MAC) address
The management of data transmission rates between two devices across a local network medium that guarantees the receiver can accept and process input before it arrives from the sender is known as which of the following? (1)
Media Flow Control
The arm of the University of Illinois at Urbana-Champaign, where supercomputer research is undertaken and where the first graphical Web browser, Mosaic, was developed. (1)
National Center for Supercomputing Applications (NCSA)
A network in which data packets may take any usable path between sender and receiver, and there is no requirement that all packets follow the same path in transit. (1)
Packet-Switched Network
What is a generic term for a special network interface driver designed specifically to permit capture of all network traffic in promiscuous mode? (1)
PCAP (protocol capture)
The TCP/IP Internet layer protocol that’s used to determine the reachability of a remote host and to measure round-trip travel time when sending data from a sender to a receiver. (1)
Packet Internetwork Groper (PING)
Analogous layers in the protocol stacks on a sender and a receiver. (1)
Peer Layer
The Layer 2 or TCP/IP network Interface layer protocol that permits a client and a server to establish a communications link that can accommodate a variety of higher-layer protocols. (1)
Point-To-Point Protocol (PPP)
The type of network communication where pairs of devices establish the communication link to exchange data with one another. (1)
Point-to-Point Transmission
The ____ layer of the OSI model is where generic network data formats are translated into platform-specific data formats for incoming data and vice versa for outgoing data? (1)
Presentation
A synonym for the TCP/IP Application layer, where high-level protocols and services, such as FTP and Telnet, operate is _______. (1)
Process Layer
Network interface card and driver operation used to capture broadcast packets, multicast packets, packets sent to other devices, as well as error packets. (1)
Promiscuous Mode Operation
A(n) ____ represents a package for data at that layer, including a header and a payload, and in some cases, a trailer. (1)
Protocol Data Unit (PDU)
An IETF standard document that specifies or describes best practices, provides information about the Internet, or specifies an Internet protocol or service. (1)
Request for Comments (RFCs)
An RFC that has reached standard designation, but that is no longer current, and has been replaced by a newer RFC . (1)
Retired Standard
The process whereby a packet makes its way from a sender to a receiver based on known path from the sending network to the receiving network. (1)
Routing
An IP-only serial line protocol still used to access some UNIX systems.
Serial Line Internet Protocol (SLIP)
Which layer of the OSI model handles setup, maintenance, and tear-down of ongoing exchanges of messages between pairs of hosts on a network? (1)
Session Layer
A TCP/IP Application layer protocol that provides basic network device registration and management capabilities. (1)
Simple Network Management Protocol (SNMP)
A numeric TCP/IP address that concatenates a network host’s numeric IP address with the port address for some specific process or service on that host. (1)
Socket Address
Short- or long-term historical information regarding network communications and performance is known as which of the following? (1)
Statistics
A TCP/IP Application layer protocol and service that permits a client on one network host to interact with another network host as if the machine were a terminal attached to the other machine. (1)
Telnet
An area of memory on the hard disk space set aside for the storage of packets captured off the network by a protocol analyzer. (1)
Trace Buffer
A packet sent to a single device on the network. (1)
Unicast Packet
A network connection between a specific sender and receiver in which the information sent is often encrypted is known as which of the following? (1)
Virtual Private Network (VPN)
A 16-bit number that identifies a pre-assigned value associated with some well-known Internet protocol or service is known as which of the following? (1)
Well-Known Port Number
A synonym for a recognizable TCP/IP protocol or service. (1)
Well-Known Service
Which layer of the OSI model handles the delivery of data from sender to receiver? (1)
Transport Layer
Packets pointed to a(n) ____ are delivered to the holder of that address nearest to the sender in terms of routing distance. (2)
Anycast Address
A special purpose form of integrated circuit. (2)
Application Specific Integrated Circuit (ASIC)
The all-ones address for a network or subnet. (2)
Broadcast Address
A method of mapping many internal non-routable addresses to a single external IP address for the purpose of sharing a single Internet connection. (2)
Address Masquerading
A form of subnet masking that does away with placing network and host address portions precisely on octet boundaries, but instead uses the /n prefix notation. (2)
Classless Inter-Domain Routing (CIDR)
A symbolic name used for a TCP/IP network resource. (2)
Domain Name
A TCP/IP Application layer protocol and service that manages the Internet-wide distributed database of symbolic domain names and numeric IP addresses. (2)
Domain Name Service
The name of the format used to denote numeric IP addresses. (2)
Dotted Decimal System
A network connection in which the original sending and receiving IP addresses may not be altered, and where communications connections extend all the way from sender to receiver while that connection remains active. (2)
End-to-End Connection
A network boundary device that sits between the public and private sides of a network, and provides a variety of screening and inspection services. (2)
Firewall
A(n) _____ is a single transfer of data from one network to another, through some kind of network device. (2)
Hop
The rightmost bits in an IP address allocated to identify hosts on a supernetwork, network, or subnetwork. (2)
Host Portion
What acronym refers to: The arm of the ISOC originally responsible for registering domain names and allocating public IP addresses. (2)
Internet Assigned Numbers Athority (IANA)
An organization that provides Internet access to individuals or organizations as a primary line of business. (2)
Internet Service Provider (ISP)
TCP/IP terminology for a router that provides access to resources outside the local subnet network address. (2)
IP Gateway
A type of networking device that combines hub, router, and network management functions within a single box. (2)
Layer-3 Switch
An address that points directly back to the sender. (2)
Loopback
A sublayer of the Data Link layer. (2)
Media Access Control (MAC) Layer
A(n) ____ is one of a block of addresses reserved for use in sending the same message to multiple interfaces or nodes. (2)
Multicast Address
A(n) ____ is the portion of an IP address that consists of the network prefix for that address. (2)
Network Address
A special type of networking software that manages network connections on behalf of multiple clients on an internal network and translates the source address for all outbound traffic from the original source to the address of the outbound network interface. (2)
Network Address Translation (NAT)
The leftmost octets or bits in a numeric IP address. (2)
Network Portion
TCP/IP terminology for an 8-bit number? (2)
Octet
The unique identifier assigned by IANA or ICANN that is used as the first three bytes of a NIC’s MAC layer address to identify its maker or manufacturer. (2)
Organizationally Unique Identifier (OUI)
Any of a series of Class A, B, and C IP addresses reserved by IANA. (2)
Private IP Address
A special type of network boundary service that interposes itself between internal network addresses and external network addresses. (2)
Proxy Server
A(n) ____ refers to any TCP/IP address allocated for the exclusive use of some particular organization. (2)
Public IP Address
A specific level of service guarantee associated with Application layer protocols in which time-sensitivity requirements for data require that delays be controlled within definite guidelines to deliver viewable or audible data streams. (2)
Quality of Service (QOS)
The technique whereby a proxy server presents an internal network resource as if it were present on the proxy server itself so that external clients can access internal network resources without seeing internal network IP address structures. (2)
Reverse Proxying
A form of IP address analysis that permits routers to indicate general interest in a particular network prefix that represents the “common portion” of a series of IP network addresses. (2)
Route Aggregation
A(n) ____ is a special bit pattern that masks off the network portion of an IP address with all 1s. (2)
Subnet Mask
The operation of using bits borrowed from the host portion of an IP address to extend and subdivide the address space that falls beneath the network portion of a range of IP addresses. (2)
Subnetting
A form of specialized IP network address that identifies the “common portion” of a series of IP network addresses used when route aggregation is in effect. (2)
Summary Address
The technique of stealing bits from the network portion of an IP address and lending those bits to the host part, creating a larger address space for host addresses is known as which of the following? (2)
Supernetting
A human-readable name for an Internet resource, such as www.course.com is. (2)
Symbolic Name
A subnetting scheme for IP addresses that permits containers of various sizes to be defined for a network prefix. (2)
Variable-Length subnet masking (VLSM)
A temporary table in memory that consists of recent ARP entries. (3)
ARP Cache
A variable-speed, long-haul broadband networking technology that supports extreme bandwidth in its fastest versions. (3)
Asynchronous Transfer Mode (ATM)
An inter-domain routing protocol that replaced the Exterior Gateway Protocol. (3)
Border Gateway Protocol (BGP)
A method of communications wherein a temporary or permanent connection between a sender and a receiver is created within a communications carrier’s systems. (3)
Circuit Switching
A technique whereby higher-level protocol data is enclosed within the payload of a lower-layer protocol unit and labeled with a header so that the protocol data unit may be safely transmitted from a sender to a receiver. (3)
Data Encapsulation
The address of a local machine based on the hardware address. (3)
Data Link Address
The ____ is also referred to as the MAC address. (3)
Data Link Address
The name given to the router through which a machine attached to a local network must pass outbound traffic to reach beyond the local network. (3)
Default Gateway
A special bit-stream (string) or character that marks some boundary in a PDU - be it at the beginning or end of a PDU, or at the boundary between the header and the payload. (3)
Delimiter
A workstation that does NOT contain a hard drive or floppy disk drive from which to boot or read host configuration information. (3)
Diskless Workstation
A group of DSCP traffic types that are organized based on the likelihood that this traffic type may be dropped by a router during highly congested times on the network when higher-priority traffic requires handling. (3)
Drop Probability Classification
An IP host must perform a(n) ____ task upon bootup to ensure that the address is NOT already assigned to another IP host. (3)
Duplicate IP Address
The de facto standard frame type for TCP/IP communications is: (3)
Ethernet II Frame Type
In terms of IP networking, a(n) ____ is a piece of a larger set of data that must be divided to cross a network that supports a smaller MTU than the original packet size. (3)
Fragment
The field that defines where a fragment should be placed when the entire data set is reassembled. (3)
Fragment Offset Field
The process of retransmitting the original unfragmented packet due to transmission error, or fragment packet loss. (3)
Fragment Retransmission Process
Name two synchronous communication protocols. (3)
Synchronous Data Link Control (SDLC)
High-Level Data Link Control (HDLC)
A route table entry that matches all four bytes of the desired destination. (3)
Host Route Entry
The IEEE-defined standard for a carrier sense, multiple access method with collision detection. (3)
IEEE 802.3
The IEEE-defined standard for the token-passing ring Media Access Control method. (3)
IEEE 802.5
A(n) ____ is the transmission path used by token ring networks, where packets are repeated back onto a ring and passed in a methodical (logical), sequential order from one ring station to the next. (3)
Logical Ring Transmission Path
A(n) ____ is a sub-optimal condition on an internetwork that results in a packet crossing a network segment more than once. (3)
Looped Internetwork
The process of obtaining an IP address based on a symbolic name. (3)
Name Resolution Process
The local router that is used to route a packet to a future network along a particular path. (3)
Next-Hop Router
What designs refers to the physical layer topology of a token ring network, where all devices on the network are connected via cable back to a central device? (3)
Physical Star Design
A type of Data Link layer connection, in which a link is established between exactly two communications partners so the link extends from one partner to the other is ______. (3)
Point-To-Point
The initial sequence of values that precedes all Ethernet packets. (3)
Preamble
The process of replying to ARP requests for IP hosts on another network. (3)
Proxy ARP
The process that a host undergoes to determine whether a desired destination is local or remote and, if remote, which next-hop router to use. (3)
Route Resolution Process
A router buffering system used to hold packets when the router is congested. (3)
Router Queues
Local host tables maintained in memory. These tables are referenced before forwarding packets to remote destinations in order to find the most appropriate next-hop for the packet. (3)
Routing Tables
digital signaling link whose name stands for trunk level 1. (3)
T1
A digital signaling link, whose name standard for trunk level 3. (3)
T3
An indication of the remaining distance that a packet can travel. (3)
Time to Live (TTL)
A special sequence of fields that indicates a token ring device has the right to transmit a frame of data onto the network media. (3)
Token
Name a token-passing ring Media Access Control protocol. (3)
Token Ring
The format of the 802.2 LLC packet that is connectionless. (3)
Unnumbered Format
A Windows-based utility used to identify the local host’s data link address and IP address. (3)
WINIPCFG