• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
What is a router?
A device responsible for forwarding data packets along networks.

p. 7
What does the router have to do on networks with a mesh configuration?
Multiple paths exist so the router has to look for the best possible path (via packet headers and forwarding tables) on behalf of its users.

p. 7
For a router to be useful, it has to be connected to at least _______ networks.
two. This is why routers are typically located at gateways where the networks connect.

p. 7
What are switches?
Data link layer devices that enable multiple physical LAN segments to be interconnected. Simply put, a larger LAN can be built through switching. A big LAN may be segmented into smaller ones through switching.
p. 7
What layer does routing take place on?
layer 3

p. 7
What layer does switching usually take place at?
Switching in general takes place at layer 2, although Cisco now supports multi-layer switching on certain devices.

p. 7
Formally speaking, networks are made up of four basic components. What are they?
Protocols, Transmission media, NOS (Network Operating System) and Shared resources.
p.7
What are the two major types of networks?
Peer-to-peer networks and Server based networks.
p. 7
Where are peer-to-peer networks commonly used?
Peer-to-peer networks are used in many households and in small companies.
p. 7
What can a peer-to-peer network do?
Each computer in a peer-to-peer network can both share and use resources like files and printers.
p.7
How is a Server based network different from a peer-to-peer network?
A Server based network allows for more hosts, it has a solid security model and is scalable. It revolves around a model that the end users attach to a security domain that allows control over centralized resources.
p. 7-8
What does the OSI model define?
The OSI model actually defines a framework for implementing protocols in seven layers in such a way that control is passed from one layer to the next, station to station.
p.9
What is the OSI Application Layer responsible for?
The Application layer is responsible for identifying and establishing the availability of desire communication partner and verifying sufficient resources exist for communication. Protocols such as HTTP, SMTP and FTP work in this layer. This is layer 7.
p. 9
Protocols such as HTTP, SMTP and FTP work in what OSI Layer?
The Application Layer, layer 7.

p. 9
What is the OSI Presentation Layer responsible for?
Also known as the syntax layer, the Presentation Layer is responsible for presenting the data in standard formats and proveds services such as data compression, encryption, and decryption. Some of the well-known standards at this layer are JPEG, MPEG, MIDI, PICT, Quick Time, and TIFF. Layer 6.
p.9
In the OSI model, what is the Session Layer responsible for?
In the OSI model, the Session Layer is responsible for coordinating communication between network nodes. Simply put, it deals with session and connection coordination. Well known session layer protocols and interfaces include NFS, SQL and RPC. Layer 5
p. 9
What well known standards are found at the Session Layer?
NFS, SQL and RPC.
p. 9
What is the responsibility of the Transport Layer of the OSI model?
The Transport Layer is responsible for flow control, with the primary aim of maintaining data integrity. Simply put, it works to ensure complete data transfer. Layer 4.
p. 9
What is the primary responsibility of the Network Layer in the OSI model?
The Network Layer has the primary responsibility of sending data packets from source network to the destination network using a pre-specified routing method. Most routers work at this layer. Layer 3.
p.9
Most routers work at what layer of the OSI model?
Most routers work at the Network Layer, Layer 3.
p. 9
The Data Link Layer of the OSI model is divided into what sub-layers?
The Data Link Layer is divided into the sub-layers of Logical Link Control (LLC) and Media Access Control (MAC). The LLC sub-layer handles tasks such as error control, flow control and framing, while the MAC sub-layer handles access to shared media.
p. 9
What does the sub-layer, Logical Link Control (LLC) do?
The LLC sub-layer handles task such as error control, flow control and framing.
p. 9
What does the sub-layer, Media Access Control (MAC) do?
The MAC sub-layer handles access to shared media.
p. 9
What layer of the OSI model is the Data Link Layer?
Layer 2.

p. 9
What does the OSI model Physical Layer do?
The Physical Layer is where the actual flow of signals is taking place. At this layer, the physical interface between the DTE and DCE is determined. Layer 7. Note that the protocols such as Fast Ethernet, RS232, and ATM all include components that function at this level.
p.9
WAN protocols such as Frame Relay operate at what Layer of the OSI model?
Layer 2, the Data Link Layer.

p. 10
Routers operate at what layer of the OSI model?
Layer 3, Network Layer

p. 10
Who developed SSL?
Netscape

p. 10
What is the purpose of SSL?
Netscape developed SSL for transmitting private documents over the Internet.

p. 10
How does the SSL technology work?
SSL technology works by using a private key to encrypt data that is transferred over the secured connection. Since a secure connection is established between the client and the server, any amount of data may be sent securely through the connection.
URLs that require an SSL connection start with _______.
"https:"

p. 10
Web applications run mostly through what two protocols?
HTTP and SSL

p. 10
The most commonly used protocols for establishing connectivity from the console to the remote device are:
Telnet, FTP, and TFTP

p. 10
Telnet, FTP and TFTP are all considered as __________- ___________ protocols.
client-server

p. 10
What is one major problem with Tenet?
One major problem with Telnet is security - the password is transmitted in clear text and is therefore subject to security attack of different kinds
p. 10