Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
86 Cards in this Set
- Front
- Back
Full-duplex |
Method of transmission allows signals to travel in both directions over a medium simultaneously. |
|
Tasks handled by a router? |
1. A router can reroute traffic if the path of first choice is down but a second path is available 2.A router can interpret Layer 3 and often Layer 4 addressing. 3.A router can connect dissimilar networks. |
|
Network Time Protocol (NTP)
|
Is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks. |
|
Simple Mail Transfer Protocol (SMTP) |
Is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25. |
|
Session Initiation Protocol (SIP) |
Is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks. |
|
Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access. |
True |
|
Traceroute |
By default, sends a sequence ofUser Datagram Protocol (UDP) packets addressed to a destination host; ICMP Echo Request or TCP SYN packets can also be used. The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination. |
|
A standard network switch operates at what layer of the OSI model? |
Layer 2 |
|
Layer 1 (Physical) |
In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first (lowest) layer. The implementation of this layer is often termed PHY. The physical layer consists of the basic networking hardware transmission technologies of a network. Data unit : Bit |
|
Layer 2
(Data Link) |
Layer 2 refers to the Data Link layer of the commonly referenced multilayered communication model, Open Systems Interconnection (OSI). The Data Link layer is concerned with moving data across the physical links in the network.
Data unit : Frame |
|
Layer 3
(Network) |
Structuring and managing a multi-node network, including addressing,routing and traffic control. Data unit : Packet |
|
Layer 4 (Transport) |
Reliable transmission of data segments between points on a network, including segmentation, acknowledgement and multiplexing. Data unit :Segments/Datagram |
|
Layer 5 Session |
Managing communication sessions, i.e. continuous exchange of information in the form of multiple back-and-forth transmissions between two nodes |
|
Layer 6 Presentation |
Translation of data between a networking service and an application; including character encoding, data compression and encryption/decryption. |
|
Layer 7 |
High-level APIs, including resource sharing, remote file access,directory services and virtual terminals. |
|
SSH |
Is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols. SSH uses the client-server model. |
|
Telnet |
Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. |
|
How far away from fluorescent lights or other sources of EMI should cable be installed? |
at least 3 feet |
|
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read: |
Presentation |
|
IPv6 global unicast address: |
FE80::10 |
|
What is the name for the protocol data unit (PDU) of the Data Link layer? |
frame |
|
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? |
fail-close |
|
BIND |
name of the free, open source software that is by far the most popular DNS server software |
|
Convergence time |
Routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage? |
|
Sliding window |
In a TCP segment, the field that indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding? |
|
Material Safety Data Sheet (MSDS) |
The proper handling procedures for substances such as chemical solvents. |
|
A hexadecimal number is a number written in the base 16 number system. |
True |
|
Noise |
Type of power flaw that involves a fluctuation in voltage levels caused by other devices on the network or by EMI. |
|
A port number, which identifies an application on a host, exists at what level of the OSI model? |
Transport |
|
What two mail delivery protocols below can be used by a client application to receive e-mail from a server? |
IMAP4 (Internet Mail Access Protocol V4) POP3 (Post Office Protocol 3) |
|
Equipment racks most commonly come in what two widths? |
19 inch frame 23 inch frame |
|
What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission? |
checksum |
|
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs. |
False |
|
DNS follows a centralized database model. |
False |
|
Domain Name System (DNS) |
Is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. |
|
Static electricity |
A stationary electric charge, typically produced by friction |
|
Transport Layer Security (TLS)
|
and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as 'SSL', are cryptographic protocols designed to provide communications security over a computer network
|
|
SSL (Secure Sockets Layer)
|
Is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.
|
|
Transmission Control Protocol (TCP) |
TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. |
|
User Datagram Protocol (UDP) |
The User Datagram Protocol (UDP) is a transport layer protocol defined for use with the IP network layer protocol. |
|
What are the two main Transport Layer protocols? |
TCP UDP |
|
What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network? |
TTL hop limit |
|
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network? |
ping |
|
What mail protocol is used to send mail messages to a server? |
SMTP (Simple Mail Transfer Protocol) |
|
IP is an unreliable, connectionless protocol.
|
True |
|
What range of ports is referred to as the "well-known" range of ports? |
0-1023 |
|
The IP connectionless protocol relies on what other protocol to guarantee delivery of data? |
TCP |
|
Which of the following are types of entries an ARP table contains? |
Static Dynamic |
|
Three characteristics of TCP in its role as a reliable delivery protocol? |
1. Connection-oriented Protocol 2. Sequencing and checksums 3. Flow Control |
|
A power fluctuation that results in a temporary dimming of lights is known as a blackout. |
False |
|
Which of the following options is not a likely source of electromagnetic interference? |
fiber optic cables |
|
If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as: |
fragmentation |
|
A loopback IP address begins with what number? |
127 |
|
What physical network topology consists of all connected devices connecting to one central device, such as a switch? |
star topology |
|
The segment or datagram protocol data unit exists at what layer of the OSI model? |
Transport layer
|
|
What command below can be used to display a complete summary of all network interfaces in a Windows computer? |
ipconfig /all |
|
The process of adding a header to the data inherited from the layer above is called what option below? |
encapsulation |
|
The Network Time Protocol service uses what port number? |
UDP 123 |
|
Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is established? |
SIP (Session Initiation Protocol) |
|
What versions of the IP protocol are used on networks today? |
IPv4 IPv6 |
|
What happens when a router receives a packet with a TTL of 0? |
The router drops the packet and sends an ICMP TTL expired message back to the host. |
|
When viewing the routing table on a UNIX system, what flag indicates if a route is a usable route? |
U |
|
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP. |
True |
|
What authentication protocol sends authentication information in cleartext without encryption? |
PAP |
|
Which of the following connectors is the most common for multimode fiber? |
MT-RJ |
|
What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction? |
diffraction |
|
Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options? |
multiplexing |
|
Which software below serves as the firewall for Linux systems? |
iptables |
|
Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor. |
False |
|
Wireless signals |
Wireless signals are electromagnetic waves travelling through the air |
|
What is the maximum supported throughput of a CAT6 cable? |
10 Gbps |
|
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? |
IPSec |
|
Internet Protocol Security (IPsec) |
Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. |
|
Layer 2 Tunneling Protocol (L2TP) |
In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. |
|
A reflective attack can be increased in intensity by combining it with what type of attack? |
amplification attack |
|
Smurf Attack |
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address. |
|
What is the minimum category of UTP cable required in order to support Gigabit speeds? |
Cat 5e |
|
What is the maximum distance for 10GBase-ER and 10GBase-EW on a segment of single mode fiber? |
40km |
|
Because digital signals do not depend on amplitude or frequency differences to communicate information, they are more vulnerable to EMI noise. |
False |
|
In IEEE terminology, a group of stations that share an access point are said to be part of what option below? |
basic service set |
|
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. |
False |
|
A proxy that provides Internet clients access to services on its own network is known as what type of proxy? |
reverse proxy |
|
The term malware is derived from a combination of the words malicious and software. |
True |
|
logic bomb |
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. |
|
boot sector virus |
A boot sector virus is a virus that infects the master boot record of a storage device, usually a floppy disk or a hard drive but occasionally a CD. |
|
worm |
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. |