• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/77

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

77 Cards in this Set

  • Front
  • Back
Into what two categories can you divide the OSI model?
Application (upper) and data transport (lower) layers.
What is the responsibility of the Data Transport layers of the OSI model?
Defining how data is sent across the physical media, through Internetwork devices, to the destination computer, and to the application on the destination machine.
What is physical topology?
It is a “map,” or description, of the layout of the network media that interconnects the devices on a network.
What is logical topology?
It defines the way in which devices communicate and data is transmitted throughout the network.
What is the rule of thumb to distinguish physical from logical topologies?
If you can see it and touch it, it is physical; if you cannot see it or touch it, it is logical.
A topology affects the network's capabilities; what is the impact of choosing one topology over another?
Type of equipment the network needs; capabilities of the equipment; growth of the network; and way the network is managed.
What are the advantages of a bus topology?
Inexpensive to install; easy to add more workstations; requires less cable than other; works well for small networks (2-10 devices).
What are the disadvantages of a bus topology?
It’s no longer a recommended option for new installations; if the backbone breaks, the network is down, only a limited number of devices can be included; it’s difficult to isolate where a problem may be; and sharing the same cable means slower access time.
What are the advantages of a star topology?
It’s easy to add more devices as your network expands; the failure of one cable or one cable break will not bring down the entire network; the hub provides centralized management; it’s easy to find device and cable problems; a star network can be upgraded to faster network transmission speeds; and it’s the most common topology, so many equipment options are available.
What are the disadvantages of a star topology?
A star network requires more media than a ring or bus network; the failure of the central hub can bring down the entire network; and the costs of installation and equipment are higher than for most bus networks.
What are the advantages of a ring topology?
Data packets can travel at greater speeds; there are no collisions; and it is easier to locate problems with devices and cable; and no terminators are needed.
What are the disadvantages of ring topology?
A ring network requires more cable than a bus network; a break in the cable will bring many types of ring networks down when you add devices to the ring, all devices are suspended from using the network; and it’s not as common as the bus topology; so there’s not as much equipment available.
What are the two most common hybrid topologies?
Star-bus and star-ring topologies.
The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at what four layers?
The Data Link layer, the Network layer (also known as the Internet layer in the TCP/IP model), the Transport layer, or the Application layer.
The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network. What standards are these protocols based on?
The standards that have been adopted by the IEEE as the Project 802 standards.
What are the four most important TCP/IP protocols that function within the network layer?
Internet Protocol (IP), Address Resolution Protocol (ARP), Reverse Address Resolution Protocol (RARP), and Internet Control Message Protocol (ICMP).
What are the fields belonging to a TCP segment?
Source port, Destination port, Sequence number, Acknowledgment number (ACK), TCP header length, Reserved, Flags, Sliding-window size (or window), Checksum, Urgent pointer, Options, Padding, and Data.
What are some reasons for implementing DHCP?
To reduce time spent on IP address management, to reduce the potential for errors in assigning IP addresses, and to make IP addressing transparent for mobile users.
What is a group of computers and devices that share a common communication line and resources in a small geographical area?
LAN
A local area network may serve how many users?
As few as 2-3 or as many as thousands of users.
What type of network is also used as a means to interconnect several LANs by bridging them with backbone lines?
Metropolitan Area Network or campus network
What network provides a private tunnel through the internet?
VPN
What is the port used when you do credit card transactions with e-commerce sites?
SSL - port 443
What are the two main parts of an IPv4 address?
Network and host number
Who assigns network numbers?
IANA, ISP, or OSP
Convert 11000000 10101000 01111011 01100100 to dotted decimal notation.
192.168.123.100
What is the reserved IPv4 address for loop back?
127.0.0.1
What is the reserved IPv4 address for a limited broadcast?
255.255.255.255
What is a subnet mask?
It is a mechanism that allows a network device to divide an IP address into a network and host number.
What are two methods of subnet masking?
Classful and classless.
What is the difference between the two methods of subnet masking?
Classful subnet masking is using the default mask to separate the network number, given by IANA, from the host number. Classless subnet masking borrows bits from the host field, extending beyond the default mask assigned by IANA, and creating a subnet field.
What are some benefits to subnetting?
Ease of administration, improve network performance and security.
How long is an IPv6 address?
128 bits or 16 octets long
How is an IPv6 address expressed?
16 byte field, in colon hexadecimal format.
What are two ways to shorten the expression of an IPv6 address?
Leading zero compression and zero compression.
What is a unicast address?
Address identity to a single interface.
What is a multicast address?
An address used to identify a group of interfaces belonging to different nodes starting with an address of FF00::/8.
What is an anycast address?
An address used to identify a set of interfaces; but the packets are sent and accepted by the interface that is closest.
What are the three types of unicast address?
Link, site, and global.
What is an IPv6 loop back address?
0:0:0:0:0:0:0:1 or ::1.
What are some tools available to transition from IPv4 to IPv6?
Dual IP layer / Dual Stack, Configured tunneling of IPv6 over IPv4, IPv4-compatible IPv6 addresses, and automatic tunneling of IPv6 over IPv4.
(201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
A. Physical.
b. Data Link.
c. Network.
d. Transport.
(201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
a. High Level Data Link Control and Synchronous Data Link Control.
B. Logical Link Control and Media Access Control.
c. Distance Vector and Link State.
d. RS–232 and RS–530.
(201) At what Open System Interconnect layer do network switches and bridges operate?
a. Network.
b. Physical.
C. Data Link.
d. Transport.
(201) At what Open System Interconnect layer do routers operate?
A. Network.
b. Physical.
c. Data Link.
d. Transport.
(201) At what Open System Interconnect layer are common data compression and encryption
schemes used?
a. Application.
b. Session.
C. Presentation.
d. Transport.
(201) What Open System Interconnect layer is closest to the end user?
A. Application.
b. Session.
c. Presentation.
d. Transport.
(201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
a. Specification.
b. Standard.
c. Etiquette.
D. Protocol.
(202) What topology defines the layout of a network’s devices and media?
A. Physical.
b. Logical.
c. Star.
d. Hybrid.
(202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
a. Physical.
B. Logical.
c. Star.
d. Hybrid.
(202) What topology consists of devices connected to a common, shared cable?
A. Bus.
b. Ring.
c. Star.
d. Hybrid.
(202) What topology consists of cable segments from each computer connected to a centralized component?
a. Bus.
b. Ring.
C. Star.
d. Hybrid.
(202) What topology combines two or more different physical topologies in a single network?
a. Bus.
b. Ring.
c. Star.
D. Hybrid.
(203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
a. AppleTalk.
b. NetBios Extended User Interface.
C. Transport Control Protocol/Internet Protocol.
d. Internetwork Packet Exchange/ Sequenced Packet Exchange.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
a. Internet Protocol.
B. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
a. Internet Protocol.
b. Address Resolution Protocol.
C. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol.
(203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
D. Internet Control Message Protocol.
(203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
a. Internet Protocol.
b. User Datagram Protocol.
C. Transmission Control Protocol.
d. Internet Control Message Protocol.
(203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
A. File Transfer Protocol.
b. Trivial File Transfer Protocol.
c. Simple Mail Transfer Protocol.
d. HyperText Transfer Protocol.
(204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
a. Local Area Network.
B. Wide Area Network.
c. Virtual Private Network.
d. Metropolitan Area Network.
(204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
a. Local Area Network.
b. Wide Area Network.
C. Virtual Private Network.
d. Metropolitan Area Network.
(204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
A. Port 80.
b. Port 110.
c. Port 443.
d. Port 8080.
(205) How many bits are in an IPv4 address?
a. 16 bits.
B. 32 bits.
c. 64 bits.
d. 128 bits.
(205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
a. Colon Hexadecimal Format.
C. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal.
(205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
A. Class A.
b. Class B.
c. Class C.
d. Class D.
(205) What IPv4 class address is used for networks with about 250 nodes?
C. Class C.
b. Class D.
c. Class E.
d. Class F.
(205) What IPv4 class address is used for multicast addressing?
a. Class C.
B. Class D.
c. Class E.
d. Class F.
(205) What IPv4 reserved address is used for loop back?
a. 0.0.0.0.
B. 127.0.0.1.
c. 207.55.157.255.
d. 255.255.255.255.
(205) What is a mechanism that allows a network device to divide an IP address into a network
and host number?
A. Subnet mask.
b. Broadcast.
c. Multicast.
d. Subnet.
(205) What is the default classful subnet mask on class B networks?
A. 255.255.0.0.
b. 255.255.240.0.
c. 255.255.255.0.
d. 255.255.255.224.
(205) What method borrows bits from the host field of an IP address to create a subnet?
a. Classful Subnet Masking.
B. Classless Inter-Domain Routing.
c. Virtual Private Networking.
d. Virtual Local Area Networking.
(206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
A. Colon Hexadecimal Format.
b. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal.
(206) What notation is expressed in leading zero compression for IPv6?
A. 1234:1234:0:0:1234:0:0:1234.
b. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1.
(206) What notation is expressed in zero compression for IPv6?
a. 1234:1234:0:0:1234:0:0:1234.
B. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1.
(206) What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
a. Site-local.
B. Link-local.
c. Aggregatable Local.
d. Aggregatable Global.
(206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
A. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global.
(206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
D. Aggregatable Global.