CompTia Network+

¡Supera tus tareas y exámenes ahora con Quizwiz!

What are the main address classes?

A, B, and C

All APIPA addresses begin with

169.254.0.0

Class B private address ranges

172.16.0.0 to 172.31.255.255.255

What are the Class C address class ranges?

192.0.0.0 to 223.255.255.255

Class C private address ranges

192.168.0.0 to 192.168.255.255

Used to refer to a family of protocols which mediate network access

AAA

These records map a FQDN (fully qualified domain name) to an IPv6 address. This is the IPv6 equivalent to the A record.

AAAA

Also known as "IPv6 address record", maps a hostname to a 128-bit IPv6 address in the Domain Name System (DNS)

AAAA Record

A list of permissions attached to an object

ACL

Automatic Private IP Addressing

APIPA

Address Resolution Protocol

ARP

Which syntax is representative of transmission speed of 10 Mbps using UTP?

A single break in the bus disables the network

What is a typical subnet mask for IPv6?

A string of 64 bits

A form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets

ARP Poisoning

Which protocol maps an IP address to a MAC address within a local network?

ARP-Address Resolution Protocol

Autonomous systems

AS

One or more networks, controlled by a single organization (such as an ISP) whose routers are governed by a single dynamic routing policy, and often a single protocol

AS

A set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used

Acceptable Use

ACL

Access Control List

A switch port that connects to a NIC in a PC

Access Port

ACK

Acknowlege

What can wireless devices use when there is no WAP present?

Ad Hoc Mode

A number assigned to a routing protocol to allow routers to prefer one protocol over the other, if a destination network can be reached with multiple routing protocols

Administrative Distance

Device used for analog signals, just increases the voltage and includes all the pops and hisses created by all kinds of interference.

Amplifier

Applied to a group of systems (sharing the same Unicast IP address) providing a service

Anycast

Transmission Method in which data is sent from a server to the nearest node in the group

Anycast Transmission

Which layers of the OSI model are used for upper layer data?

Application Presentation Session

What are the layers of the OSI model?

Application Presentation Session Transport Network Datalink Physical

What are the layers of the TCP/IP model?

Application Transport Internet Network Access

Requires two keys to encrypt and decrypt data

Asymmetric encryption

AAA

Authentication, Authorization and Accounting

AAAA

Authentication, Authorization, Accounting, and Auditing

What are the four major factors of security systems?

Authorization Access control Accountability Auditing

AS

Autonomous System

Any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel

Crosstalk

Problems caused when signals from adjacent cables interfere with each other

Crosstalk

What is it called when two pairs of wires in the same cable interfere with each other?

Crosstalk

Key combination that allows to stop the execution of the current command run in Windows Command Prompt

Ctrl+C

What is the last step in resolving a network problem?

Customer verification

Digital storage directly attached to the computer accessing it, as opposed to storage accessed over a computer network

DAS

Direct-Attached Storage

DAS

Distributed Control System

DCS

Distributed Denial of Service

DDOS

Type of computer attack that uses a number of hosts to overwhelm a server, causing a website to experience a complete system crash

DDOS

Creates buffer overflow on a server

DDoS

Distributes IP addresses and additional IP setting to machines on the network

DHCP

Ports 67, 68

DHCP

Protocol that assigns IP addresses automatically to clients on the network.

DHCP

Protocol that provides automatic host IP address assignment

DHCP

When this is enabled and configured within a router, the router will pass DHCP requests and responses across the router interfaces, by taking DHCP broadcasts and turning the into unicasts

DHCP relay

Network that sits between your internal network and the internet

DMZ

Port 53

DNS

Protocol that maps computer names to IP addresses

DNS

Protocol that provides TCP/IP name resolution

DNS

Translates IP addresses into names that humans can better handle and remember

DNS

Data Over Cable Service Interface Specification

DOCSIS

Protocol used by cable companies

DOCSIS

Telecommunications standard used to provide Internet access via a cable modem

DOCSIS

A standard digital transmission rate for digital telecommunications. Defines a transmission rate of 64 Kbps and can carry either a single voice channel or data

DS0

Digital Signal Zero

DS0

Each 64kbps channel in a DS1 signal is a

DS0

Differentiated Services Code Point

DSCP

A family of technologies that are used to transmit digital data over telephone lines

DSL

Digital Subscriber Line

DSL

An optical technology used to increase bandwidth over existing fiber optic backbones.

DWDM

Dense Wavelength Division Multiplexing

DWDM

Frames reside on which layer of the OSI model?

Data Link

Unit of data transfer between deices that communicate over a network

Data packet

Remote connections that are never disconnected

Dedicated connection

IP address of a router that routes remote traffic from the devices local subnet to remove subnets is known as a

Default Gateway

What device separates the private network from the communications provider?

Demarc

The transmission path originating from the interface of the access provider's side of a demarcation point within a premises and ending at the termination point prior to the interface of the edge Customer Premises Equipment (CPE) is called a

Demarc Extension

DMZ

Demilitarized Zone

Computer software, firmware or hardware that creates and runs virtual machines

Hypervisor or VMM

This protocol that works at layer 3 delivers information and error messages.

ICMP

Intrusion Detection System

IDS

Type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations

IDS

A type of protocol used for exchanging routing information between gateways (commonly routers) within an autonomous system. This routing information can then be used to route network-layer protocols like IP.

IGP

Interior Gateway Protocol

IGP

How is the MAC address sometimes used in IPv6?

In the second half of the link local address as the EUI

Why is IPv6 being introduced?

Increase the number of IP addresses

IEEE

Institute of Electrical and Electronics Engineers

Performs framing of the information from all layers above in the proper format for the physical network. Performs error detection of corrupt or missing bits in the frame.

Layer 2 Function

At which layers of the OSI model does a managed switch perform?

Layer 2 and Layer 3

At which layer of the OSI model do routers work?

Layer 3

Performs routing. Determines the path the information will take to get from the source to the destination device.

Layer 3 Function

Provides end-to-end reliability between end devices. (Achieved by segmentation, synchronization, and flow control mechanisms)

Layer 4 Function

Manages communication between source and destination applications. Establishes, maintains, and terminates logical connections between client and server applications.

Layer 5 Function

Converts the data from the application layer into a format that other layers can understand. Handles formatting, compression, and encryption.

Layer 6 Function

Interacts with the OS or application to provide network services needed to perform the network function that the software needs to do. Ex. transferring files, email, web browsing

Layer 7 Function

Troubleshooting Step 6

Document findings, actions and outcomes

Advantages/Disadvantages of Static Routing tables

Does not cause additional network traffic/Requires manual maintenance

Computers share a pool of public routable IP addresses that number fewer than the computers

Dynamic NAT

Route discovery operations build and update routing tables themselves by using special software is known as

Dynamic Routing

What are the names of the European telephone signal carriers using copper?

E1/E3

Extensive Authentication Protocol

EAP

Protocol used to assist in the authorization process used in wireless networks

EAP

If data has an error, the receiver can rebuild the data using

EDAC-Error Detection and Correction

A now obsolete routing protocol for the Internet originally specified in 1982

EGP

A simple reachability protocol, and, unlike modern distance-vector and path-vector protocols, it is limited to tree-like topologies.

EGP

Extended Gateway Protocol

EGP

Exterior Gateway Protocol

EGP

Any individual or group that circumvents security to access unauthorized data

Hacker

A virtual server without a keyboard or mouse is called

Headless

Refers to a system or component that is continuously operational for a desirably long length of time

High Availability

A decoy network for trapping hackers or tracking unconventional or new hacking methods

Honeynet

A decoy computer system for trapping hackers or tracking unconventional or new hacking methods

Honeypot

Defined as each time a packet goes through a router

Hop

The action of forwarding a packet from one router to the next is a

Hop

A device connected to a network

Host

What does a network topology depend on?

How the signals move

A cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms

Hybrid Cloud

Combination of two or more clouds

Hybrid Cloud

Self sufficient computer that acts as both server and client to other computers on a network

Peer

Each computer acts as both a client and a server

Peer to Peer

PAN

Personal Area Network

Fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords

Phishing

Slang term for hacking into secure telecommunication networks

Phreaking

Bits reside on which layer of the OSI model?

Physical

MAC addresses sometimes referred to as

Physical Addresses

Which layer of the OSI model transmits bits from one device to another and regulates the transmission stream over a medium?

Physical Layer

These cables are slower to burn and produce less smoke than cables using a mantle of materials like PVC

Plenum

An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.

Port Forwarding

Designating a specific local address for various network services

Port Forwarding

Practice of duplicating all traffic on one port in a switch to a second port, effectively sending a copy of all data to the node connected to the second port is known as

Port Mirroring

What function is used to monitor a port during active transmissions of data?

Port Mirroring

What ports do FTP ( File Transfer Protocol) use?

Ports 20 and 21

What is appended to the beginning of the Ethernet frame?

Preamble

A particular model of cloud computing that involves a distinct and secure cloud based environment in which only the specified client can operate

Private Cloud

Cloud infrastructure operated solely for a single organization

Private Cloud

Connection that connects a remote system to a private network via dial up

Private Dial Up

Addresses used by organizations for nodes used within enterprise networks and not connected to the internet are known as

Private IP addresses

A protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector

Syslog Server

Qos

Quality of Service

Remote Authentication Dial-in User Service

RADIUS

Protocol that maps a MAC address to an IP address

RARP-Reverse Address Resolution Protocol

Allows users to see the GUI of another computer as if they were sitting in front of it

RDP

Port 3389

RDP

T-Carrier, 24 channels, 1.544 Mbps

T1

T-Carrier, 672 channels, 44.736 Mbps

T3

Port 49

TACACS

Terminal Access Control Access Cotrol

TACACS+

Protocol that enables connection-oriented communication in networks that use the TCP/IP protocol suite

TCP

What are the two protocol that handle the Transport-layer traffic in TCP/IP networks?

TCP and UDP

What type of cable is used to connect the satellite transmitter and receiver to the modem?

RG-6

Time Division Multiplexing

TDM

Electronic instrument that uses time-domain reflectometry to characterize and locate faults in metallic cables

TDR

Time Domain Reflectometer

TDR

Port 69

TFTP

Protocol that transfers files between servers and clients without requiring any user login

TFTP

Distance Vector Routing Protocols that use router hop counts as their metrics. They support a maximum hop count value of 15. Any router farther than 15 hops away is considered to be unreachable

RIPv2

Protocol that monitors Qos in RTP transmission. Acts as a partner to RTP to package and deliver data but does not transfer data

RTCP-Real Time Transfer Control Protocol

Ports 5004, 5005

RTP

Which protocol transmits audio and video content and defines the packet for delivery?

RTP-Real Time Transport Protocol

Network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points

RTSP

Port 554

RTSP

If it is installed, which of these can be used by the technician when they arrive on site to repair or run maintenance on a distant ICS?

RTU

Which MAC address begins a frame?

Receiving system

RSH

Remote Shell Commands

Connection from a far away computer that enables you to control that computer as if you were sitting in front of it, logged in

Remote Terminal

Device that takes the entire digital signal and recreates it on the other end

Repeater

What is the protocol POP3 used for?

Retrieving email messages from a mailbox on a mail server

What is the protocol IMAP4 used for?

Retrieving messages from a mail server

A zone that resolves the IP address to the FQDN

Reverse lookup

Any wireless access point that has been installed on a network's wired infrastructure without the consent of the network's administrator or owner, thereby providing unauthorized wireless access to the network's wired infrastructure

Rogue Access Point

A form of VPN that can be used with a standard Web browser

SSL VPN

Fiber - Straight Tip or Bayonet Fiber Optic Connector

ST

What feature of switches prevents the problem of switching loops?

STP

Which protocol resolves switching loops?

STP

A virtual LAN (VLAN) of switch ports represented by one interface to a routing or bridging system

SVI

Switched Virtual Interfaces

SVI

A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted

SaaS

Software as as Service

SaaS

Enables a service provider to make applications available over the internet

Saas-Software as a Service

VPN connection that enables two seperate LANs to function as a single network, sharing files and services as if in the same building

Site to site VPN connection

Type of denial of service attack in which a system is flooded with spoofed ping messages

Smurf Attack

VM feature that enables users to save an extra copy of the virtual machine as it is exactly at that moment in time

Snapshot

UDP

User Datagram Protocol

In what manner does a gateway router pass out private IP addresses for the LAN?

Using DHCP

Latest version of DSL to appear, provides speeds of 100+ Mbps in both directions, will only get those speeds if within 300 meters

VDSL

A logical local area network that extends beyond a single traditional LAN to a group of LAN segments, given specific configurations

VLAN

Any broadcast domain that is partitioned and isolated in a computer network at the data link layer

VLAN

Network that uses a single switch to create multiple broadcast domains

VLAN

Virtual Local Area Network

VLAN

Virtual Machine Manager

VMM

SYN

Synchonize

Receive and route calls to appropriate individuals based on callers responses

Virtual PBX- Virtual Private Branch Exchange

Virtual machines that are running a network operating system or other server software are known as

Virtual Servers

A software program that allows one virtual machine (VM) to communicate with another

Virtual Switch

The process of using special software to create a complete environment in which a guest operating system can function as though it were installed on its own computer

Virtualization

Type of malicious software comprised of small pieces of code attached to legitimate programs

Virus

Uses an IP connection to transfer phone calls

VoIP

Where are the most common physical network problems found?

Work Area

What do private IP addresses allow users to do?

Work within their own network

Which command utilizes ICMP?

ping

The most popular virtualization manager for Mac OSX

Parallells Desktop

The syslog tool used with UNIX records errors by level of importance. Which of these is the most important level?

0

Well known ports range

0-1023

IPv6 loopback address

0:0:0:0:0:0:0:1 or ::1

Maximum Length for a Cat 6 cable is

100 meters

What is the cornerstone topology of the current type of network in use today?

1000Base

Registered port ranges

1024-49151

Which syntax is representative of transmission speed of 10 Mbps using UTP?

10Base5

What is the cornerstone topology of the current type of network in use today?

10BaseT

Which syntax is representative of transmission speed of 10 Mbps using UTP?

10BaseT

What is the cornerstone topology of the current type of network in use today?

10Mbps

Horizontal runs are terminated with

110 Blocks

IP loopback address that is used for testing

127.0.0.1

What IP address is used for ping, ping loopback, ping local host, and testing?

127.0.01

IPv6 addresses are how many bits in length?

128-bits

What are the Class B address class ranges?

128.0.0.0 to 191.255.255.255

The networking standard that supports virtual LANs (VLANs) on an IEEE 802.3 Ethernet network

802.1q

What is the maximum distance for a cable run?

90 meters

Record that maps a domain name to the IP address (IPv4) of the computer hosting the domain

A

Why is a host needed for a virtual machine (VM)?

A VM needs the use of hardware

What term refers to a situation where two half duplex nodes send messages at the same time?

Collision

IPv4 addresses contain four octets of decimal numbers from 0 to 255. What does an IPv6 address contain?

Colons and hexadecimal numbers

How is InterVLAN routing used in a managed switch?

Combine several VLANS into one

A collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally

Community Cloud

Multiple organizations form a specific community with common interests to share a cloud

Community Cloud

CIA Triad

Confidentiality Integrity Accountability

The CIA Triad is made up of three parts. What are they?

Confidentiality Integrity Availability

Virtual link between two nodes established for the duration of a communication session

Connection

What type of protocol is TCP?

Connection Orientated

What is the primary purpose of subnetting?

Conserve IP addresses. Also security and performance

Firewall type that monitors activity by applications and micro applications

Context Aware Firewall

A relative value used to determine the importance of the labeled packet

Cost of Service

Occurs when a router or network goes down and one of the other routers does not realize it can no longer reach that route

Count to Infinity Loop

A technology for transmitting data between computer devices at data rates of up to 4 Gbps (and 10 Gbps in the near future). Especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives

Fibre Channel

When a virtual is not running where is it stored?

Files

What is used with DLS to block unwanted noise while using the telephone?

Filter

Network devices that use ACLs to prevent unauthorized access into company systems

Firewall

How many address classes are there?

Five address classes. A, B, C, D, and E.

Technique for optimizing data exchange between systems

Flow Control

Which part of the Ethernet standard has remained the same throughout all revisions?

Frame

Packet switching that switches packets quickly but without any guarantee of data integrity at all.

Frame Relay

A NIC sends data in discrete chunks called

Frames

Gigabit Interface Converter

GBIC

What device provides a flexible interface for different gigabit fiber-optic standards on a switch?

GBIC

Generic Routing Encapsulation

GRE

IP address for the next hop router: where the packet should go

Gateway

Device that acts as the default gateway for a number of client computers

Gateway Router

What two commands are used with FTP?

Get, Put

GAN

Global Area Network

Port 1720

H.323

Protocol that handles the initiation, setup, and delivery of VOIP sessions. Is an alternative of SIP.

H.323

When resolving names which is the first to be consulted?

HOST files

What was used to resolve FQDNs before DNS was deployed?

HOSTS File

When resolving names, what will be consulted first?

HOSTS file

Host Standby Router Protocol

HSRP

Port 80

HTTP

Protocol that accepts connections from and send data to web browsers.

HTTP

Port 80

HTTP (Hypertext Transfer Protocol)

A form of cloud computing that provides virtualized computing resources over the internet

IaaS

Infrastructure as a Service

IaaS

Arrangement where users rent an infrastructure and are billed for it is known as a

IaaS-Infrastructure as a Service

Six Step Troubleshooting Process

Identify the Problem, Establish a theory of probable cause, Test the Theory, Establish a plan of action, Verify system functionality, Document

Troubleshooting Step 1

Identify the problem

Protocol used to assist in the authorization process used in wired networks

Kerberos

A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

L2TP

A tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy

L2TP

Layer 2 Tunneling Protocol

L2TP

Network that is self contained, small, usually limited to a building, room, or floor

LAN

What type of network describes a way for multiple devices to share resources in a single broadcast domain?

LAN

Fiber - Little Connector or Local Connector

LC

Standard for high-speed wireless communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA technologies

LTE

Radio technology for wireless broadband access

LTE-Long Term Evolution

A unique identifier used by MPLS capable routers to determine how to move data

Label

The slow down of network connections between routers

Latency

At which layer of the OSI model don't multilayer switches work?

Layer 1

Defines the physical characteristics of the network such as connectors, cabling, voltage levels, and timing.

Layer 1 Function

At which layer of the OSI model do traditional switches work?

Layer 2

A file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients

NAS

Network Attached Storage

NAS

A computing device or appliance that provides only file based storage services

NAS-Network Attached Storage

Allows an ISP to give one single public IP address to a home or company, private IP addresses to be used on the LAN, and those computers using the private IP addresses to communicate over the internet

NAT

Network Address Translation

NAT

Network Interface Unit

NIU

Which internet protocol synchronizes the clock times of devices in a network by exchanging the signals?

NTP - Network Time Protocol

Network Basic Input/Output System

NetBIOS

Ports 137, 138, and 139

NetBIOS

Provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network

NetBIOS

Used to support functions such as Microsoft File and Print Sharing over TCP/IP protocols

NetBIOS

A group of devices connected together to communicate and share resources is known as a

Network

Packets reside on which layer of the OSI model?

Network

Outlines acceptable network behavior

Network Access Policy

A very high speed transmission path that carries the majority of network data is known as a

Network Backbone

NIC is short for

Network Interface Card

Any device or computer that can connect to a network and generate, process, or transfer data is known as a

Node

Firewall that filters by port numbers

Stateless

Maps a single routable (that is not private) IP addresses to a single machine, enabling users to access that machine from outside the network

Static NAT

Routing that uses table mappings that the network administrator establishes manually in the router prior to routing is known as

Static Routing

DNS zones that contain only the SOA, NS, and A glue records for a domain

Stub Zone

Taking a single network ID and chopping it up into multiple smaller subnets

Subnetting

What device can use the Spanning Tree Protocol (STP)?

Switch

What device forwards packets based on MAC address?

Switch

Which physical topology uses a switch?

Switch

A physical port on a switch that an Ethernet cable plug into

Switch port

Uses the same key to encrypt and decrypt data

Symmetric encryption

What uses the same key to encrypt and decrypt data?

Symmetric encryption

Why are link state protocols more efficient than distance vector routing protocols?

The forward only changes to individual routes instead of forwarding the entire routing table.

Segments reside on which layer of the OSI model?

Transport

TCP

Transport Control Protocol

Which layer of the TCP/IP model controls the assembly and disassembly of data?

Transport layer

A port on a switch configured to carry all traffic

Trunk Port

A switch port that connects to another switch port on a different switch

Trunk Port

802.1q

Trunk Standard

A method for a system to provide network access to many clients by sharing a set of lines or frequencies instead of providing them individually

Trunking

Links are combined to increase bandwidth and reliability

Trunking

The process of transferring VLAN traffic betwwen teo or more switches

Trunking

Used to protect files when they are not originally encrypted

Tunnel

What does a VPN use to connect a remote computer to a local network?

Tunneling

How many IP addresses should a router have?

Two or more

Hypervisors that run directly on the system hardware. They are often referred to as a "native" or "bare metal" or "embedded" hypervisors in vendor literature.

Type 1 Hypervisor

Hypervisors that run on a host operating system

Type 2 Hypervisor

What type of communications protocol do arp and ping use?

UDP

One to One Communication

Unicast

Transmission method of data transfer from one source address to one destination address

Unicast Transmission

UC Gateway

Unified Communications Gateway

A simple switch without any configuration capabilitiy

Unmanaged switch

What do routers do when there is more than one path to a destination?

Use the route with the lowest metric

Model designed to guide policies for information security within an organization

CIA Triad

Classless addressing method that considers a custom subnet mask as a 32-bit binary word.

CIDR-Classless Inter Domain Routing

A type of resource record in the Domain Name System (DNS) used to specify that a domain name is an alias for another domain

CNAME

Canonical Name

CNAME

What is a canonical name in DNS?

CNAME record for alias

Error detection method in which a predefined mathematical operation is used to calculate a CRC code

CRC-Cyclic Redundancy Checking

What names is given to the access method used by wireless devices?

CSMA/CA

What method is used to avoid transmission collisions?

CSMA/CD

When full duplex is enabled on a link, what is disabled?

CSMA/CD

Channel Service Unit/Digital Service Unit

CSU/DSU

Provides an interface between the T1 line and some other device, often a router.

CSU/DSU

ipconfig parameter that allows to view the physical address of a Network Interface Card (NIC)

/all

netstat parameter that allows to display the names of applications and executable file components that are accessing the network

-b

netstat parameter that allows to display the contents of the IP routing table

-r

Examples of Top Level Domains

.net , .edu, .com

ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters

/all

What are the Class A address class ranges?

1.0.0.0 to 126.255.255.255

What is the height of a U?

1.75 in Tall

How big is a U?

1.75in

Class A private IP address ranges

10.0.0.0 to 10.255.255.255

The distance limitation between a switch and a node is ___ meters due to the restrictions of UTP cabling.

100

How many conductors does a coaxial cable have?

2

Fast Ethernet/100BASE-FX Maximum Length

2000m

Teredo addresses start with

2001:0000:/32

Multicast Broadcast Address

224.0.0.0

Multicast address

224.0.0.0

What is the Class A default subnet?

255.0.0.0

What is the class B default subnet?

255.255.0.0

What is the class C default subnet?

255.255.255.0

The current ASN's are how many bits?

32 bits

IPv4 addresses are how many bits in length?

32-bits

How many layers are in the TCP/IP model?

4

Dynamic or private port ranges

49152-65535

10GBASET should not exceed a length of

55 meters

1000BASE-LX Maximum Length

550m

What is the minimum size of an Ethernet frame?

64 bytes

A tunneling protocol that enables IPv6 traffic to use the IPv4 internet without having to set up explicit tunnels

6to4

How many layers are in the OSI model?

7

Standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface (physical layer). It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic net achievable throughput in the mid-20 Mbit/s

802.11a

Standard works on 2.4 and 5GHZ band. Fully backwards compatible with previous WiFi standards. Speeds up to 1300mbps.

802.11ac

What is the new wireless standard that only runs at the 5GHZ range, with a maximum transfer rate of over 3 Gpbs?

802.11ac

Standard has a maximum raw data rate of 11 Mbit/s, and uses the same media access method defined in the original standard

802.11b

Standard works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput

802.11g

Operates on both the 2.4 GHz and the 5 GHz bands. Support for 5 GHz bands is optional. It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s.

802.11n

Bit Error Rate Test

BERT

Test that verifies the T-Carrier connection from end to end

BERT

A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet

BGP

Border Gateway Protocol

BGP

The glue of the internet, connecting all the Autonomous Systems. Implements and supports route aggregation, a way to simplify routing tables into manageable levels.

BGP

What is the primary protocol for the internet?

BGP

Bridge Protocol Data Unit

BPDU

Frames that contain information about the Spanning tree protocol (STP)

BPDU

What advantage does a switch offer that a hub cannot?

Bandwidth

Digital Signals are sent via DC pulses over a single unmultiplexed signal channel

Baseband Transmission

A device hack performed when a wireless, Bluetooth-enabled device is in discoverable mode

Bluesnarfing

A group of computers connected in a coordinated fashion for malicious purposes

Botnet

What is a common accidental cabling problem automatically fixed by STP?

Bridge Looping

Allows users to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch

Bridged Connection

Single medium to carry multiplex channels of data, usually through modulation

Broadband Transmission

Transmission method in which data is sent from one srouce node to all other nodes in a network

Broadcast Transmission

Flow control technique in which data is sorted on a temporary high speed memory location until the main system components are ready for work

Buffering

How can the nslookup command be used to verify a DNS server?

By typing nslookup followed by a space and the IP address

A university with several buildings in close proximity will have what type of network install?

CAN

UTP Cable, 16MHZ, Length up to 100m. Used for telephone

CAT 3

UTP Cable, 100MHZ, length of 100m. Current standard. Used for LAN

CAT 5, 5e

UTP cable, 250MHZ, 100m, Emerging cable standard

CAT 6

What is the cornerstone topology of the current type of network in use today?

Cable runs of 100 meters between switch and node

CAN

Campus Area Network

A standardized twisted pair cable for Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards

Cat 6

Network in which a central mainframe computer controls all network communications and performs data processing and storage on behalf of clents

Centralized Network

Term for all approaches to preparing and supporting individuals, teams, and organizations in making organizational change.

Change Management

A computer or process running on a device that initiates a connection to a server is known as a

Client

Type of network in which servers provide resources to clients

Client/Server

A model for providing or purchasing off premises computing services over the Ethernet

Cloud Computing

Class of Service

CoS

Used for identifying packet priority

CoS

Used on packet-switched networks to automatically calculate route costs and routing table entries

Distance Vector Routing

Uses one of several algorithms to determine the best route to other routers based on the distance (cost) and direction (vector)

Distance Vector Routing Protocol

eDiscovery

Electronic Discovery

What is SNMP (Simple Network Management Protocol) used for? Which ports does SNMP use?

Enables administrators to monitor and manage network devices and traffic. Ports 161 and 162

Process of adding delivery information to the actual data transmitted on each layer

Encapsulation

The best way to protect data transmitted across the internet is

Encryption

The ends of the tunnel where the data is encrypted and decrypted

Endpoints

Process of determining if transmitted data has been received correctly and completely

Error Detection

Troubleshooting Step 4

Establish a plan of action to resolve the problem and implement the solution

Troubleshooting Step 2

Establish a theory to determine the cause

802.3

Ethernet

A rogue or fake wireless access point that appears as a genuine hotspot offered by a legitimate provider

Evil Twin

The -t switch in the MS Windows' ping utility is used for

Executing ping in a loop

Private network that grants controlled access to users outside of the network

Extranet

Fiber - Ferrule Connector or Fiber Channel

FC

Which part of the frame contains information used for checking the validity of the frame?

FCS

A technique for sending two or more signals over the same telephone line, radio channel, or other medium. Each signal is transmitted as a unique range of frequencies within the bandwidth of the channel as a whole, enabling several signals to be transmitted simultaneously.

FDM

Frequency Division Multiplexing

FDM

Which protocol transfers files between clients and servers?

FTP

Port 143

IMAP 4 (Internet Message Access Protocol 4)

Port 143

IMAP4

Protocol that email clients use to access email messages while leaving messages themselves stored on the server.

IMAP4

Port 993

IMAP4 encrypted transmissions

What is the name of the Cisco operating system for managed switches and routers?

IOS

Protocol responsible for the addressing and routing of data to the remote system.

IP

Unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network

IP Address

To implement TCP/IP on a network, administrators must implement three things. What are they?

IP Address Subnet Mask Default Gateway

What is needed to use a graphical interface while configuring a managed router or switch?

IP address

Remote computers need this function so they can be on a VPN using the Internet.

IP encapsulation

Intrusion Protection System

IPS

System that monitors a network for malicious activities such as security threats or policy violations

IPS

A 128 bit address displayed in hexadecimal format and not the dotted decimal notation that is used by IPv4

IPv6

A link state dynamic routing protocol that has great usage in the niche market of ISP backbones. Similar to OSPF

IS-IS

Intermediate System to Intermediate System

IS-IS

Link Sate protocol, IGP, ISP alternative to OSPF

IS-IS

Digital circuit switching technology that carries voice and data over digital phone lines

ISDN

Integrated Services Digital Network

ISDN

Process of sending telephone transmission across fully digital lines end to end

ISDN

The process of making a router work between two VLANs is called

InterVLAN Routing

The single largest global WAN that links virtually every country in the world.

Internet

IPsec

Internet Protocol Security

iSCSI

Internet Small Computer Systems Interface

IoT

Internet of Things

Network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and network connectivity which enables these objects to connect and exchange data

Internet of Things

Private network that uses internet protocols and services to share a company's information with its employees

Intranet

A network protocol suite that authenticates and encrypts the packets of data sent over a network

Ipsec

Which syntax is representative of transmission speed of 10 Mbps using UTP?

It uses BNC and Tee connectors

Ethernet frame with a payload greater than the standard maximum transmission unit of 1500 bytes is known as a

Jumbo Frame

Default authentication protocol used in Windows, Linux, Unix, and Mac OSX

Kerberos

Privileges users and software receive that only give them the minimal level of access required is known as

Least Privilege

An individual who drains resources, bandwidth, or data off a website or a network, often in an unethical manner

Leech

Process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated

Legal Hold

Allows routers to construct their own topology map of the internetwork, after hearing about the state of the links from the actual routers connected to the link themselves.

Link State

What is the first thing to look at when checking for a good physical connection with the switch?

Link and activity lights

Aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource

Load Balancing

LAN

Local Area Network

LTE

Long Term Evolution

What uniquely identifies every NIC?

MAC address

Metro-Ethernet is known as a

MAN

Main Distribution Frame

MDF

Ports 2427, 2727

MGCP

Protocol designed from the ground up to be a complete VOIP or video presentation connection and session controller. Takes over all the work from SIP and H.323.

MGCP

What feature of 802.11n enables devices to use multiple antennas to make multiple simultaneous connections and thus increase throughput?

MIMO

An agreement between two (bilateral) or more (multilateral) parties. It expresses a convergence of will between the parties, indicating an intended common line of action. It is often used in cases where parties either do not imply a legal commitment or in situations where the parties cannot create a legally enforceable agreement.

MOU

Memorandum of Understanding

MOU

Multi-Protocol Label Switching

MPLS

High Performance, multi-service switching technology that is used in packet data networks

MPLS-Multi Protocol Label Switching

Microsoft Challenge Handshake Authentication Protocol

MS-CHAP

An agreement between multiple manufacturers to make products which are compatible across vendors, acting as de facto standards, establishing a competitive market for interoperable products

MSA

Multi-Source Agreement

MSA

Fiber - Mechanical Transfer Registered Jack

MTRJ

Mail Exchanger

MX

Records for mail servers

MX

What record in the primary zone of a DNS server points to the mail server/

MX

Powerful centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices

Mainframe Computer

Any software that brings harm to a computer system

Malware

An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other

Man in the Middle

MITM

Man in the Middle

MTU

Maximum Transmission Unit

MAC is short for

Media Access Control

What network topology is most fault tolerant?

Mesh

MGCP

Message Gateway Control Protocol

Relative value that defines the cost of using the route

Metric

MAN

Metropolitan Access Network

An open source implementation of Teredo for Linux and other UNIX based systems

Miredo

Device that converts the digital signal to analog and back

Modem

Modulator/Demodulator

Modem

What device is used to connect a computer for dial-up communications?

Modem

One to Many Communication

Multicast

A network device that has the ability to operate at higher layers of the OSI reference model, unlike the Data Link Layer (DLL) traditionally used by switches. Can perform the functions of a switch as well as that of a router at incredibly fast speeds

Multilayer Switch

Online Certificate Status Protocol

OCSP

Link State protocol, IGP, fast, popular, uses Area IDs

OSPF

Open Shortest Path First

OSPF

There are two link state dynamic routing protocols:

OSPF and IS-IS

An optoelectronic instrument used to characterize an optical fiber. Is the optical equivalent of an electronic time domain reflectometer.

OTDR

Optical Time Domain Reflectometer

OTDR

What does the base in baseband refer to?

One channel

HOw are the connectors wired on a crossover cable?

One end is T568A, the other end is T568B

What is the most vulnerable part of a computer system that hackers like to exploit?

Open Ports

What does SaaS eliminate the need of?

Optical Drive

What is the color order for a standard TIA/EIA "B" connector

Orange/White-Orange-Green/White-Blue-Blue/White-Green-Brown/White-Brown

Port Address Translation

PAT

Uses port numbers to map traffic from specific machines in the network

PAT

Data that is not synced is carried over fiber using microwave radio systems in this hierarchy

PDH-Plesiochronus Digital Hierarchy

Port 110

POP3

Protocol used to retrieve email from mail servers.

POP3

Port 195

POP3 encrypted transmissions

Port 110

POP3-Post Office Protocol 3

Plain Old Telephone System

POTS

Point to Point Protocol

PPP

Protocol used by modems for making a secure connection to an ISP. Enables two devices to connect directly, authenticate with username and password, and negotiate a network protocol

PPP

A specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices

PPPoE

Requires a username and password to log on and use the internet

PPPoE

An obsolete method for implementing virtual private networks, with many known security issues. Uses a TCP control channel and a GRE tunnel to encapsulate PPP packets.

PPTP

The fastest ISDN connection

PRI

A cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet. A provider hosts the hardware and software on its own infrastructure

PaaS

Platform as a Service

PaaS

Service where users can rent a fully configured system that is already set up is known as

Paas-Platform as a Service

A computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network

Packet Analyzer

Process of intercepting and logging traffic

Packet Capture

A tool that intercepts data flowing in a network

Packet Sniffer

What is WireShark used for when troubleshooting networks?

Protocol Analyzing

What is the protocol HTTP used for?

Provides web services

Cloud based on the standard cloud computing model, in which a service provider makes resources, such as virtual machines (VMs), applications or storage, available to the general public over the internet. Cloud services may be free or offered on a pay-per-usage model.

Public Cloud

Cloud that provides services over a network that is open for public use

Public Cloud

PSTN

Public Swtiched Telephone Network

Which of these tools are used to connect CAT5e cable to a patch panel?

Punchdown Tool

A means of sorting IP packets to provide priority based on header information

QoS

Quality of Service

QoS

Cable type that is used to manage a router or switch rather than send Ethernet frames

Rollover

What kind of cable is used to access the OS through the console port of a managed switch?

Rollover

RTT

Round Trip Time

A path that is used by data packets to reach the specified destination using the gateway as the next hop is known as a

Route

One route in a table represents multiple subnets

Route Aggregation

Which device enables you to connect two networks and discards broadcast traffic?

Router

Devices that connect networks to enable communication and resource sharing among those networks

Routers

Routing process in which two routers discover different routes to the same location but have incorrect information and thereby never reach the end point

Routing Loop

A database created manually or by a route discovery protocol that contains network addresses as perceived by a specific router is known as a

Routing Table

Tells the router exactly where to send the packets

Routing table

Allows for execution of a command if the requested operation in the command-line interface in MS Windows requires elevation

Run as Administrator

A network which provides access to consolidated, block level data storage

SAN

Fibre channel and iSCSI are used in conjunction with

SAN

Storage Area Network

SAN

High speed data transfer network that provides access to consolidated block level storage

SAN-Storage Area Network

What feature of switches keeps track of which MAC address goes to each port?

SAT

Fiber - Subscriber Connector or Squared Connector

SC

Supervisory Control and Data Acquisition

SCADA

Synced data moves on fibers using LED's in this hierarchy

SDH-Synchronous Digital Hierarchy

Software Defined Network

SDN

Technology that allows programmers to write code to control routers and switches

SDN

Protocol that describes the content of a multimedia communication session

SDP-Session Description Protocol

Protocol that handles the initiation, setup, and delivery of VOIP sessions.

SIP

Session Initiation Protocol

SIP

Port 5060

SIP (clear text)

Port 5061

SIP (encrypted)

Defined as an official commitment that prevails between a service provider and a client

SLA

Service Level Agreement

SLA

Port 445

SMB

Port 25

SMTP

Protocol that sends email messages between mail servers

SMTP

What protocol can utilize ports 25 or 587 for formatting and sending emails?

SMTP-Simple Mail Transfer Protocol

Which protocol uses port 465 for encrypted communication?

SMTP-Simple Mail Transfer Protocol.

Static NAT

SNAT

What tool allows us to administer managed devices from a central location?

SNMP on a NMS

What are ports 161 and 162?

SNMP-Simple Network Management Protocol

Protocol that can remotely monitor network devices.

SNMPv3

A style of software design where services are provided to the other components by application components, through a communication protocol over a network

SOA

Record that defines the authoritative system

SOA

Service Oriented Architecture

SOA

Synchronous Optical Network

SONET

The primary standard for long distance, high speed, fiber optic transmission systems.

SONET

Network standard for synchronous data transport over a fiber optic cable

SONET-Synchronous Optical Network

Defines project-specific activities, deliverables and timelines for a vendor providing services to the client

SOW

Statement of Work

SOW

A computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing

SPB

Shortest Path Bridging

SPB

Port 22

SSH

Protocol that is a secure replacement got Telnet, encrypts both login information and data sent over the connection.

SSH

Provides strong authentication and secure communications over a network

SSH

SSH

Secured Shell

Which document is the Security Committee responsible for?

Security Policies

Which document contains the actual implementation details for the security of a network?

Security Procedures

A subdivision of a network that links a number of devices or serves as a connection between nodes is known as a

Segment

What are the four types of network backbones?

Serial Distributed/Hierarchal Collapsed Parallel

Transmission of bits that occurs as one per clock cycle across a single transmission medium

Serial Data Transmission

Network computer or process that shares resources with and responds to requests from computers, devices, and other servers on the network is known as a

Server

SMB

Server Message Block

SIP

Session Initiation Protocol

Which layer of the OSI model keeps track of a systems communications to send the right response to the right computer?

Session layer

Where would you look for problem or error information following a failed Windows install?

Setup log

A method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned

Split Horizon

Fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver

Spoofing

Which of these tools are used to connect CAT5e cable to a patch panel?

TIA/EIA 568A to TIA/EIA 568B

Transport Layer Security

TLS

The practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to is called

Tagging

Port 23

Telnet

Protocol that can execute commands on a remote system unencrypted

Telnet

Which protocol enables a user to log in remotely and execute commands on a remote host?

Telnet

A NAT traversal IPv6 tunneling protocol. Built into Windows

Teredo

Which syntax is representative of transmission speed of 10 Mbps using UTP?

Terminating Resistor

Troubleshooting Step 3

Test the theory to determine the cause

What is the most vulnerable part of a computer system that hackers like to exploit?

The no fragmentation rule setting in a router

How many lines of a routing table does the router read when comparing IP addresses and subnet mask of an incoming packet?

The router reads all the lines and then dtermines the proper route.

A cross-platform free and open-source remote desktop software application

TightVNC

Port 5900

TightVNC

Process of having frames that carry a portion of every channel sent on a regular interval is called

Time Division Mulitplexing

Port 68

Time Protocol

Where does a hub send data?

To all the systems connected to the hub

802.5

Token Ring

What tool is used to locate a single cable in a cable bunch connected to a 24-port patch panel?

Toner and Probe

Used to control the bandwidth used by network traffic

Traffic Shaping

Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network

VPN

Virtual Private Network

VPN

A type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes

VPN concentrator

Eliminates the single point of failure inherent in the static default routed environment

VRRP

Virtual Router Redundancy Protocol

VRRP

A Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network

VTP

Proprietary protocol used by Cisco that automates the updating of multiple VLAN switches

VTP

VLAN Trunking Protocol

VTP

What does the FCS do?

Verifies the data was sent correctly.

Troubleshooting Step 5

Verify full system functionality and if applicable implement preventive measures

When is hash used in transferring a file?

Verify the file

Network that spans a large area network. Often across multiple geographical locations

WAN

What device enables two or more Wi-Fi enabled devices to connect to each other wirelessly and connect to a wired network?

WAP

Wireless LAN

WLAN

Refers to drawing symbols in public spaces to denote an open Wi-Fi wireless network in a public space

Warchalking

Act of locating open Wi-Fi hot spots while driving in a car

Wardriving

What type of software are Apache and IIS?

Web Servers

What type of software are Apache and IIS?

Web servers

Standard an provide at-home or mobile Internet access across whole cities or countries

WiMAX

Worldwide Interoperability for Microwave Access

WiMAX

Packet based wireless telecommunication technology that provides wireless broadband access of long distances

WiMAX-Wireless Interoperability for Microwave Access

WAN

Wide Area Network

802.11

Wireless

Command in MS Windows that is used to display help information related to a specific network command-line utility

[command]/?

Command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token Ring physical addresses

arp-a

The electronic aspect of identifying, collecting and producing electronically stored information (ESI) in response to a request for production in a law suit or investigation

eDiscovery

Command that displays the IP and MAC Addresses on UNIX/Linux/Mac OSX

ifconfig

Linux command used to display TCP/IP configuration settings

ifconfig

An Internet Protocol (IP)-based storage networking standard for linking data storage facilities

iSCSI

Dynamic NAT is also called

pooled NAT

Command that displays the IP and MAC Addresses

ipconfig

Windows command-line utility that can be used to display TCP/IP configuration settings

ipconfig

What command is used to diplay the current DNS assignments>

ipconfig /all

Command used to clear the DNS cache

ipconfig /flushdns

Command lines used for resetting the DHCP configuration settings for all adapters

ipconfig/ release,ipconfig/renew

What Windows utility do you use to find the MAC address for a system?

ipconfig/all

What command can you use to clear the DNS cache?

ipconfig/flushdns

Windows command-line utility designed to be of help in troubleshooting NetBIOS name resolution problems

nbtstat

What command can be used to display the current sessions that are connected?

nbtstat-s

Command used for displaying protocol statistics and current TCP/IP network connections

netstat

Command that will display all open ports in a users network

netstat-a

IaaS provides

network resources

Command used for obtaining a domain name to IP address mapping

nslookup

Command in Windows that combines the features of ping and tracert

pathping

Command that queries if a host is reachable

ping

Command-line utility used for checking the reachability of a remote host

ping

Command that adds static entries

route add

Command that modifies an existing route

route change

Command that removes static entries

route delete

Command that diplays the contents of a routing table

route print

Command that displays routing table entries

route print

Command that clears a routing table of all entries

route-f

The number of running virtual machines on a single host is limited by

the amount of physical RAM

Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as

traceroute

Command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called

tracert

Command in MS Windows that displays the route taken by IPv6 packets on their way to another host

tracert-6


Conjuntos de estudio relacionados

Chapter Fourteen Review + Quiz Questions

View Set

Investments Chp 3,4 market microstructure and investment companies

View Set

Ch. 14: CPT: twist drill, burr holes or trephine, craniectomy, or craniotomy

View Set

CH. 3 Cell Structure and Function

View Set

Principle of Macroeconomics Final Exam: Chapters 14, 15, & 16

View Set

HOMONYMS, HOMOPHONES, HOMOGRAPHS and SYNONYMS, Homophones Homographs Homonyms

View Set

Lending Info and Do Not Call Laws

View Set