• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/76

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

76 Cards in this Set

  • Front
  • Back
What ports does FTP use?
20, 21
What port does SSH use?
22
What port does Telnet use?
23
What port does SMTP use?
25
What port does DNS use?
53
What port does HTTP use?
80
What port does POP3 use?
110
What port does NNTP use?
119
What port does NTP use?
123
What port does IMAP4 use?
143
What port does HTTPS use?
443
What port does DHCP use?
67
What port does TFTP use?
69
What port does BOOTP use?
68
What port does SNMP use?
161
What is the IPv4 loopback address?
127.0.0.1
What is the IPv6 loopback address?
0:0:0:0:0:0:0:1 or ::1
What are the IPv4 private network addresses?
10.0.0.0, 172.16.0.0, and 192.168.0.0
What are the IPv6 private network addresses?
Site local address ranges (FEC0:)
What are IPv4 auto configured addresses?
169.254.0.0
What are IPv6 auto configured addresses?
Link local addresses (FE80:)
What does OSI stand for and what are its layers?
Open System Interconnection. Layers: Application (7), Presentation (6), Session (5), Transport (4), Network (3), Data Link (2), and Physical (1).
What are the layers of the TCP/IP model?
Application (4), Transport (3), Internet (2), Data Link/Network Interface (1).
What is the range and subnet mask for Class A addresses?
Range is 1 to 126
Mask is 255.0.0.0
What is the range and subnet mask for Class B addresses?
Range is 128 to 191
Mask is 255.255.0.0
What is the range and subnet mask for Class C addresses?
Range is 192 to 223
Mask is 255.255.255.0
What are the steps of network troubleshooting?
(1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, (6) Verify full system functionality and if applicable implement preventative measures, and (7) Document findings, actions, and outcomes.
What is the difference between link state and distance vector routing protocols?
Link state protocols, such as OSPF, build a map of the entire network and store it in memory. Distance vector protocols, such as RIP, only know the state of their neighbors.
What is PoE and what feed (cabling) does it use?
Power of Ethernet and it uses twister pair Ethernet cable.
What does DHCP do and what is a common issue in systems without DHCP?
DHCP automatically assigns IP addressing information. Systems without DHCP may have duplicate IP addresses.
What is APIPA?
Automatic Private IP Addressing is a Windows service that automatically self assigns an IP address in the range of 169.0.0.0 in the absence of DHCP.
What is UTP and its common range? What connector is used with this type of cabling?
Unshielded twisted pair, most categories are 100 meters. RJ-45 are common connectors for UTP.
What connector types are associated with fiber?
ST, SC, LC, and MT-RJ. All are push-on connectors except for ST which is a twist type attachment.
What is MDF and IDF?
Main Distribution Frame and Intermediate Distribution Frame are wiring closets. MDFs typically hold the majority of the network gear.
What is a demarcation point?
The point that separates the ISPs side of the network from the client's side of the network.
What is the standard for Wi-Fi and what is its access method?
802.11, uses CSMA/CA.
What is the frequency, max speed, and max range of 802.11a?
5 GHz, 54 Mbps, 75 feet.
What is the frequency, max speed, and max range of 802.11b?
2.4 GHz, 11 Mbps, 150 ft.
What is the frequency, max speed, and max range of 802.11g?
2.4 GHz, 54 Mbps, 150 ft.
What is the frequency, max speed, and max range of 802.11n?
5 GHz/2.4 GHz, 600 Mbps, 175 ft.
Which network topology gives maximum reliability and redundancy?
Mesh.
What is LLC and what standard defines its specifications?
Logical Link Control, 802.2.
What is the standard for Ethernet networks and what access method does it use?
802.3, CSMA/CD.
What is attenuation?
The weakening of data signals as they traverse their medium.
Which wires are crossed in a standard crossover cable?
Wires 1 & 3 and wires 2 & 6.
What is the difference between physical and logical network design?
Physical topology refers to how a network physically is constructed. Logical topology refers to how a network functions.
Describe RAID 0, 1, and 5.
RAID 0: No fault tolerance, improves I/O, minimum of 2 disks.
RAID 1: Fault tolerant, disk mirroring, minimum of 2 disks.
RAID 5: Fault tolerant, disk stripping, minimum of 3 disks.
How do the three backup schemes effect the archive bit?
Full backup does not use it but clears it, incremental back up uses and clears is, and differential back up uses it but does not clear it.
What are TDRs and OTDRs used for?
Used to send a signal down a media to test its continuity. OTDR is the same but for optical wires.
What does a firewall do?
Monitors and controls the flow of network data between two network interfaces.
What two protocols does IPSec use for security?
Authentication Header (AH) and Encapsulating Security Payload (ESP).
What is Kerberos?
Provides secure authentication services to users, applications, and network devices. Eliminates insecurities caused by passwords being stored or transmitted across the network.
What system is netstat used on and what does it show?
Windows. Shows port status information such as protocol, address, and state.
What system is tracert used on and what does it show?
Windows. Allows you to view the route from your host to another host with hops and times.
What system is traceroute used on and what does it show?
Unix. Shows the same as tracert on Windows.
What does ARP stand for and what does it do?
Address Resolution Protocol. ARP resolved IP addresses to MAC addresses.
What system is nbtstat used on and what does it show?
Windows. Shows protocol statistics using NetBIOS over TCP/IP.
What system is ipconfig used on and what does it show?
Windows. Shows all IP configuration information for all NICs.
What system is ifconfig used on and what does it show?
Unix. Same as ipconfig on Windows.
What system is nslookup used on and what does it show?
Windows. Shows server and address. Used to troubleshoot DNS problems.
What system is dig used on and what does it show?
Unix. Same as nslookup on Windows.
What is CIDR?
Classless Inter Domain Routing.
In 192.168.1.1/24, what does the /24 bits mean?
The /24 means that 24 bits are being used for the network, leaving 8 bits for the hosts.
What are 5 common record types of DNS?
A (for IPv4), AAAA (for IPv6), CNAME (canonical/alias names), MX (mail servers), and PTR (reverse of A or AAAA)
Describe the different Base-XX standards.
-T is twisted pair, -TX is faster, -FX is fiber, -X is fiber, -SR is short range fiber 300m, -LR is long range fiber 25km, -ER is extended range fiber 40km, -SW -LW -EW are short long and extended fiber for WAN.
What is CSU/DSU?
Channel Service Unit/Data Service Unit sits between the router and circuit.
What are VPN concentrators used for?
Device used to encrypt and decrypt traffic for VPNs.
What are environmental monitors used for?
Monitors temperature, humidity, water, and power in an environment such as an MDF.
What is EAP and what standard defines it?
Extensible Authentication Protocol, 802.1X.
What factors are used in multi-factor authentication?
Something you know, something you have, and something you are.
What is the difference between IGP and EGP?
Interior Gateway Protocol is used to route within a single Autonomous System. Exterior Gateway Protocol is used to route between Autonomous Systems.
What is a NAT?
Network Address Translation, converts one IP address to another at layer 3.
What is WEP and WPA?
Wired Equivalent Privacy and Wi-Fi Protected access are wireless encryption standards. WPA is stronger.
What is CHAP?
Challenge Handshake Authentication Protocol uses a 3-way handshake to authenticate across a network.
What is IDS and IPS?
Intrusion Detection System and Intrusion Prevention System. These can be behavior, signature, network, or host based.
What is RDP and what port does it use?
Remote Desktop Protocol, 3389.