• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/114

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

114 Cards in this Set

  • Front
  • Back
What is IEEE 802.11i used for?
Provides strong encyption, replay protection, integrity protection. Not for network authentication.
What is IEEE 802.1x used for?
Network Authentication. Uses different EAP types for different environments.
What is WPA and WPA2?
Wi-Fi Protected Acess is emprovement over WEP and old hardware (TKIP)
What data is at byte 9 of the IP header?
Protocol
What type of Technology is used at the Application layer?
Gateways
What type of Technology is used at the Presentation layer?
Gateways
What type of Technology is used at the Session layer?
Gateways
What type of Technology is used at the Transport layer?
Gateways
What type of Technology is used at the Network layer?
Virtual circuits (ATM), routers
What type of Technology is used at the Data link layer?
Bridges, switches
What type of Technology is used at the Physical layer?
ISDN, Hubs, Repeaters, Cables
Which OSI layer uses these protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET
Application Layer - Layer 7
Which OSI layer uses these protocols: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF
Presentation Layer - Layer 6
Which OSI layer uses these protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP, NFS, NetBIOS
Session Layer - Layer 5
Which OSI layer uses these protocols: TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP
Transport Layer - Layer 4
Which OSI layer uses these protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25
Network Layer - Layer 3
Which OSI layer uses these protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI
Data Link Layer - Layer 2
Which OSI layer uses these protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12,  DS1, DS3, E1, E3, ATM, BRI, PRI, X.23
Physical Layer - Layer 1
Which layer of the OSI model provides file transmission, message exchange, terminal sessions, etc
Application Layer
Which layer of the OSI model provides encryption/decryption, compression, and virtual terminal emulation
Presentation Layer
Which layer of the OSI model provides setup of the links, maintaining of the link, and the link tear-down between applications. Controls application to application communication
Session Layer
Which layer of the OSI model provides delivery of user information. It is also responsible for error detection, correction, and flow control. Handles computer to computer communication
Transport Layer
Which layer of the OSI model inserts info into packet headers so it can be properly addressed and routed. Then route the packet to their proper destination.
Determines the best path for the packet to take.
Network Layer
Which layer of the OSI model provides error detection, frame ordering, and flow control. Translate data to binary format for proper line transmission over LAN or WAN.
Responsible for the physical addressing of the network via MAC addresses.
Data Link Layer
Which layer of the OSI model converts bits into voltage for transmission.
Responsible for the physical transmission of the binary digits through the physical medium.
Physical Layer
What are the 4 layers of the TCP/IP model?
Application Layer
Host to Host Layer
Internet Layer
Network Access Layer
What are the protocols for the TCP/IP Model's Host to Host Layer?
TCP and UDP
What is a Class A range of IP addresses?
1.0.0.0 to 127.255.255.255
For large networks
N.H.H.H; 255.0.0.0;/8
Remember 1-127
What is a Class B range of IP addresses?
128.0.0.0 to 191.255.255.255
For medium networks
N.N.H.H. 255.255.0.0;/16
Remember 128-191
What is a Class C range of IP addresses?
192.0.0.0 to 223.255.255.255
N.N.N.H; 255.255.255.0;/24
Remember 192-223
What is Classless Interdomain Routing (CIDR) used for?
Class B address range is usually too large for most companies and Class C is too small. CIDR provides flexibility to increase or decrease the class sizes
Describe the protocol IP (Internet Protocol)
All hosts on a network have an IP address
Each data packet is assigned the IP address of the sender and receiver
It provides an 'unreliable datagram service'.
Describe the protocol ARP (Address Resolution Protocol)
Use the IP Address to get the MAC Address
MAC address is 48 bit
IP address is 32 bit
Only broadcast to network first time, otherwise stores IP and MAC info in table
Describe the protocol RARP (Reverse Address Resolution Protocol)
Use the MAC Address to get the IP Address
RARP Server tells diskless machines IP Address
Describe the protocol ICMP (Internet Control Message Protocol)
Management Protocol and messaging service provider for IP.
Sends messages between network devices regarding the health of the network.
Ping is ICMP packet
Ping checks if a host is up and operational
What is TCP/IP protocol Telnet used for?
Terminal Emulation (No File Transfer)
What is TCP/IP protocol LDP used for?
Line Printer Daemon – with LPR enables print spooling
What is TCP/IP protocol X-Windows used for?
For writing graphical interface application
What is TCP/IP protocol Simple Network Management Protocol (SNMP) used for?
Provides the collection of network information by polling the devices on the network from a management station.
Sends SNMP traps (notification) to MIBS Management Information
What OSI model protocol supports authentication, compression, confidentiality, and integrity; uses DES encryption; used for Encrypted File Transfer
SSH-2
What OSI model protocol uses symmetric encryption and public key for authentication and MAC (message authentication code) for integrity
SSL - Secure Socket Layer
Compare asynchronous and synchronous transmission types.
Asynchronous used when 2 devices not synchronized
Synchronized if communication takes place between synchronized devices usually sync via a clocking mechanism
Larger amount of data transmitted via synchronized
Describe Broadband transmission.
Divides the communication channel into individual channels so different type of data an be transmitted simultaneously
Carries several signals over different channels
Give examples of Broadband medium.
Coaxial Cable TV (CATV), ATM, DSL, ISDN
Describe Baseband transmission.
Uses entire communication channel for transmission
Permits only one signal to be transmitted
Give examples of Baseband medium.
Ethernet - entire wire for one channel
What technology is used for the Bus network topology?
Ethernet
What technology is used for the Ring network topology?
FDDI
What technology is used for the Star network topology?
Local bus (Ethernet) and ring topologies (Token Ring)
What technology is used for the Tree network topology
Ethernet
What technology is used for the Mesh network topology
Internet
Describe 10Base2, ThinNet.
What is cable type? What is speed? What is max length?
Coaxial
10 Mbps
Max 185 meters
Describe 10Base5, ThickNet.
What is cable type? What is speed? What is max length?
Coaxial
10 Mbps
Max 500 meters
Describe 10BaseT.
What is cable type? What is speed?
UTP
10 Mps
Describe 100BaseT, Fast Ethernet.
What is cable type? What is speed?
UTP
100 Mps
Describe 1000BaseT, Gigabit Ethernet.
What is cable type? What is speed?
UTP
1000 Mps
What type of LAN implementation does this describe:
Shared media
Uses broadcast and collision domains
Uses CSMA/CD access method
Can use coaxial or twisted pair media
Transmission speeds 10 Mbps to 1 Gbps
Ethernet
What type of LAN implementation does this describe:
All devices connect to a central MAU
Token passing media access method
Transmission speeds of 4-16 Mbps
Uses an active monitor and beaconing
Token Ring
What type of LAN implementation does this describe:
Token Passing media access method
Dual counter rotation rings for fault tolerance
Transmission speeds of 100 Mbps
Operates over long distances at high speeds and is used as backbone
CDDI works over UTP
FDDI
Describe Coaxial Cable.
Copper core surrounded by shielding layer & grounding wire encased in outer jacket
Compared with twisted pair, more resilient to EMI, higher bandwidth, supports longer cable lengths. But more expensive
10Base2 (ThinNet)
10Base5 (ThickNet)
Can transmit in baseband or broadband
Describe Twisted Pair Cable.
Insulated copper wires surrounded by outer protective jacket
If it has outer foil shielding, then referred to as shielded twisted pair (STP)
Otherwise Unshielded twisted pair (UTP)
Twisting of wires protects the signals from radio frequency and EMI
Tighter the twisting, the more resilient
Copper makes the signal degrade after certain distance.
Copper radiates energy meaning info can be monitored or captured
Describe UTP Category 3 cable.
10 Mbps for Ethernet and 4 Mbps for Token Ring
Used in 10Base-T network installations
Describe UTP Category 4 cable.
16 Mbps
Usually used in Token Ring networks
Describe UTP Category 5 cable.
100 Mbps for 100Base-TX and CDDI networks, has high twisting and low crosstalk
Used in 100Base-TX, CDDI, Ethernet, and ATM installations. Most widely used in new network installations
List 4 Media Access technologies.
Token Passing
CSMA (Carrier Sense Multiple Access)
Collision Domains
Polling
Describe the two kinds of CSMA (Carrier Sense Multiple Access)
CSMA/CD - Carrier sense multiple access with collision detection -
Monitor the transmission activity on the wire to determine best time to transmit data
Each node monitors the wire and waits until wire is free before it transmits data.
With CSMA/CD - if 2 computers try to transmit data at same time, it will abort transmission and alert other stations that a collision took place. Stations will execute a random collision timer to force a delay before attempting to transmit

CSMA/CA - Carrier sense multiple access with collision avoidance
Computers signals its intent to transmit data before doing it
Define Collision Domains
A collision domain is a group of computers that are competing for same shared communication medium
Too many collisions can be caused by highly populated network, damaged cable or conductor, too many repeaters, too long cables
Problems can be dealt with by implementing collision domains
Can also make network sniffing more difficult
Define Polling
Media access technology
Primary and secondary stations
At predefined intervals, primary station asks secondary station if it has anything to transmit
What is Address Resolution Protocol (ARP)?
LAN protocol
MAC address (Media Access Control) - unique address for each ROM
When Frame hits the wire it only knows the MAC address
What is Dynamic Host Configuration Protocol (DHCP)?
LAN protocol
If computer IP address is not assigned, it goes to DHCP to get its IP when booting up
What are Distance Vector Routing Protocols?
Make routing decision based on distance or number of hops and vector or direction. Example: RIP
What are Link State routing protocols?
Build more accurate routing table because build a topology db of the network.
Look at more variables like packet size, link speed, delay, loading, reliability.
Example: OSPF
What is a Repeater?
Amplifies electrical signals between cable segments which enables it to extend a network
Work on Physical layer
Can be line conditioners
What is a Hub?
On Physical layer of OSI model.
Used to connect multiple LAN devices, no added intelligence
Multiport repeater
What is a Bridge?
Data Link Layer
Forwards Packets and filters based on MAC address.
Forwards broadcast traffic, but not collision traffic
What is a Switch?
Data Link Layer
Provides a private virtual link between communication devices. Allows for VLANs. Reduces collisions, impedes network sniffing
Will only send data to the port where the destination MAC address is
Multiport bridge
What is a Router?
Network Layer
Separates and connects LANs creating internetworks
Routers filter based on IP address
Opens packets and look at MAC or IP
What is a Gateway?
Application Layer
Connects different types of networks. Performs protocols and format translations
Describe Packet Filtering Firewalls.
1st Generation
Network and Transport level
Filtering based on network layer information so cannot look too far into the packet
Decisions based on header info
Routers using ACLs dictate acceptable access to a network
Describe Application level proxy firewalls.
2nd Generation
Looks deep into packets and makes granular access control decisions.
Requires one proxy per service
Describe Circuit level proxy firewalls.
2nd Generation
Network Layer
Looks at the header packet info. Protects a wider range of protocols and services, but does not provide the detailed level of control of an application level proxy
Describe Stateful firewalls.
3rd Generation
Network layer
Looks at the state and context of packets.
Keeps track of each conversation using a state table
Describe Dynamic packet filtering firewalls.
Dynamic ports are high numbers above well known ports starting at 1023
Dynamic packet firewall builds an ACL
Gives option of allowing any type of traffic outbound and permitting only response traffic inbound
Mostly used for UDP
Describe Kernel proxy firewalls
5th Generation
Faster because processing is done in the kernel.
One network stack is created for each packet
What is a bastion host firewall?
Locked down or hardened system
Usually highly exposed. Existence known to internet
No unnecessary services should be running, unnecessary user accounts disabled…
Any system that resides within the DMZ should be installed on a bastion host since it is closer to their internet
What is a dual homed firewall?
Two interfaces - one facing the external and one facing the internal network
If software is installed on dual homed device, underlying OS should have packet forwarding and routing turned off
Used to divide internal trusted network from external untrusted network
What is a screened host firewall?
Router filters (or screens) traffic before passing it to firewall
Firewall that communicates directly with perimeter router and internal network
Traffic first filtered via packet filtering firewall. Then moves to this point where more rules are applied
Screened host is the only device that receives traffic directly from the router
What is a screened subnet?
External router filters (or screens) traffic before it enters the subnet. Traffic headed toward internal network goes through 2 firewalls
Adds another layer of security to the screened host architecture.
External firewall screens the data entering the DMZ. Instead of the firewall then redirecting traffic to the internal network an internal firewall also filters the traffic
The use of 2 physical firewalls creates a DMZ
What is Network Information System (NIS)?
Like a telephone book for locating network resources
When computer boots up, goes to NIS server which provides group files, password files, host tables, port numbers, info on resources on domain
Workstations run a client process that identifies NIS services through a broadcast
NIS+ improved on performance and security
What is Network Address Translation (NAT)?
Enables a network that does not follow the internet's addressing scheme to communicate over the internet.
Enables a company to use private addresses and still be able to communicate transparently on the internet
What is Port Address Translation (PAT)?
Used by NAT
Company owns and uses only one public IP address for all systems that need to communicate outside internal network
What is Asynchronous Transfer Mode (ATM)?
Encapsulates data in fixed cells & can be used to deliver data over SONET network.
Uses fixed cell size instead of variable frame size used by earlier technologies

High bandwidth switching and multiplexing technologies that has low delay
What is circuit switching?
Sets up virtual connection that acts like a dedicated link between 2 systems
Traffic travels in predictable and consistent manner
Fixed delays
Usually used for voice oriented data
What is packet switching?
Packets from one connection can pass through number of individual devices instead of following one another through the same device
Examples: the internet, X.25, frame relay
Multiple paths to same destination and high degree of redundancy
Traffic is "bursty"
Variable delays
Usually used for data oriented data
Describe Frame Relay.
High performance WAN protocol that uses packet switching technology which works over public networks
Shared media among companies
Uses SVC and PVCs
Fee based on bandwidth use
Data link layer
Describe X.25.
First packet switching technology developed over public networks
Shared media among companies
Lower speed than frame relay because of extra overhead
International standard used more in countries other than US
Describe ISDN
Communication protocol provided by phone companies and ISPs
Enable data, voice and other traffic to travel over a medium in digital manner
Developed to replace the aging telephone analog systems
Can be used for anything a modem can be used for, but more functionality and higher bandwidth
Describe DSL
High speed connection technology to connect to service providers CO
6 to 30 times higher bandwidth speeds than ISDN and analog
Uses existing phone lines
24 hour connections to internet
Have to be within 2.5 mile radius of the DSL equipment
What is PPP - Point to Point Protocol?
Encapsulation protocol meaning an extra header and possibly trailer added to a frame
Allows TCP/IP and other protocols to be carried across telecommunications lines
Used to establish telecomm connections between routers, users to routers or users to users
What are tunneling protocols?
Tunnel is a virtual path across a network that delivers packets that are encapsulated and possibly encrypted
Can provide "gateway to gateway" connection between 2 routers
Examples: PPTP, IPSec, L2F, L2TP
What is PPTP?
A tunneling protocol
Data link layer
A Microsoft protocol - only for IP networks
Designed for client server connectivity
What is IPSec?
Tunneling protocol
Network layer. Provides security on top of IP
Can work in tunnel mode (payload and header are protected) or transport mode (payload is protected)
More secure authentication and encryption
Only supports IP networks
Focuses on LAN to LAN communication
What is L2TP?
Hybrid of L2F and PPTP
Data link layer
Provides functionality of PPTP but can work over non IP networks running other protocols including frame relay, X.25, ATM
Provides higher level of security when combined with IPSec
Supports TACACS+ and RADIUS while PPTP does not
What is Frequency Hopping Spread Spectrum (FHSS)?
Takes total amount of bandwidth and splits it into smaller sub channels.
Sender and receiver work at one of these channels for specific amount of time and then move to another channel
Helps prevent interference
Helps avoid eavesdropping
Uses portion of total bandwidth available
What is Direct Sequence Spread Spectrum (DSSS)?
Applies sub bits to the message
Sub bits used by sending system to generate a different format of the data before the data are transmitted. Receiving end uses sub bits to reassemble the signal into the original data format
Sequence sometimes called pseudo noise sequence because if you don't know the sequence, it appears as random noise
Uses all available bandwidth. Spreads signals over a wider frequency band
Describe the 802.11b wireless standard
Transfer up to 11 Mbps
2.4 GHz
Describe the 802.11a wireless standard
Transfer up to 54 Mbps
5 GHz
Describe the 802.11g wireless standard
Higher data transfer rates 0 up to 54 Mbps.
Backwards compatible with b.
Works in 2.4 GHz range
What is WAP
Not a standard but a de facto market and industry driven protocol stack
Provides common architecture for wireless devices to communicate over the internet
Set of communication protocols used to perform similar functionalities as TCP/IP
What is Traceroute?
Shows you the path a packet took to get to its destination.
Normal traceroutes list the routers.
What is Asymmetrical digital subscriber line (ADSL)?
Higher download rates than upload
Downstream 1.5 mbps to 9 mbps
Upstream 16 kbps to 640 kbps
Max distance 18,000 ft
What is Single-line digital subscriber line (SDSL)?
Symmetrical download and upload rates
1.544 mbps
Single twisted pair in both directions
Operating range 10,000 ft
What is High Rate Digital Subscriber Line (HDSL)?
Symmetrical download and upload rates
1.544 mbps
Two copper twisted pairs
Used by local phone companies for T1
Operating range 12,000 ft
What is Very High Data Rate digitals subscriber line (VDSL)?
Downstream data range 13 mbps to 52 mbps
Upstream data rate 1.5 to 2.3 mbps upstream
Operating range 1000 to 4500 ft