ITC 330 Final Review
What part of a MAC address serves as the extension identifier, or device ID?
The last 24 bits of the MAC address
The TCP and UDP protocols both exist at what layer of the OSI model?
Transport (Layer 4)
All wireless signals are carried through the air by electromagnetic waves.
True
IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets
True
T/F: A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.
True
T/F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets
True
T/F: Over a long-distance connection, using SSH keys is more secure than using passwords.
True
T/F: The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.
True
T/F: The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
True
What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?
Vertical Cross Connect
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
Wi-Fi analyzer
Session Layer and API Call
describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application API Call - application makes request to OS
The Group Policy utility can be opened by typing what name into a Run box?
gpedit.msc
Application Layer Examples
interface between two application, each on separate computers HTTP, SMTP, POP3, IMAP4, FTP, Telnet, RDP
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocol?
link-state protocols
Presentation Layer Examples
reformatting, compressing, encrypting data for the receiving application Email Encryption
Data Link Layer
responsible for interfacing with the physical hardware only on the local network Wi-Fi, Ethernet, Switches Adds MAC address info to header and also a trailer to turn the packet into a frame
Network Layer and Examples
responsible for moving messages from one node to another until they reach the destination host Adds IP info to header and creates a packet IP, ICMP, and ARP operate at this layer
Physical Layer
responsible for sending bits via a wired or wireless transmission
Transport Layer
transporting Application layer payloads from one application to another using TCP and UDP Adds port information to the header TCP - Segments UDP - Datagrams
ARP
works with IPv4 to discover the MAC address of a host or node on the local network and maintains a database that maps IP addresses to MAC addresses on the local network Layer 2 protocol that uses IP in Layer 3 Relies on broadcasting
An IP address of 192.168.18.73/28 has what network ID?
192.168.18.64
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet?
255.255.224.0
A network with a CIDR notation of /26 would have what subnet mask?
255.255.255.192
What are the layers of the TCP/IP Model?
4. Application 3. Transport 2. Internet 1. Network Interface
What are the layers of the OSI Model?
7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical
What is NOT one of the ways in which networks are commonly segmented? a. by device manufacturer b. by device types c. by departmental boundaries d. by geographic location
By device manufacturer
Port 53
DNS - name resolution TCP/UDP
At what layer of the OSI model does a network switch normally operate?
Data Link (Layer 2)
What is a defining characteristic of a bus topology based network?
Devices are daisy-chained together in a single line
Port 21
FTP - file transfer - control (server listens at 21) TCP
Port 20
FTP-DATA - File transfer data (send/receives at this port) TCP
An IPv6 address consists of 128 bits that are written 10 blocks of hexadecimal numbers separated by colons
False
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP
False
T/F: A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.
False
T/F: Only Class B and Class C networks can be subnetted
False
T/F: The protocol data unit for the Physical layer of the OSI model is payload, or data.
False
TCP uses a four-step process called a four-way handshake to establish a TCP connection
False - Three way for TCP
T/F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm
False - distance vector routing protocol
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Connection-oriented Protocol b. Flow Control c. Sequencing and checksums d. Framing
Framing
Port 80
HTTP - requests between web servers and web clients TCP/UDP
Port 443
HTTPS - secure HTTP TCP
Port 143
IMAP4 - messages stored on server TCP
How does refraction affect the propagation of a wireless transmission?
It distorts the signal as it travels into and through a different transmission medium
What is the NMAP utility used for?
It is a port scanning utility that can identify open ports on a host
A network TAP serves what purpose on a network?
It provides a mirrored port for monitoring traffic between other ports
A subnet of 255.255.248.0 can be represented by what CIDR notation?
/21
A network with 10 bits remaining for the host portion will have how many usable host addresses?
1022
In the classful addressing scheme, what range of network addresses is considered Class B?
128.x.y.z to 191.255.x.y
What statement regarding denial-of-service (DoS) attacks is accurate? a. A denial-of-service attack is generally a result of a disgruntled employee. b. A denial-of-service attack occurs when a MAC address is impersonated on the network. c. A denial-of-service attack is no longer a major concern due to the increased throughput available on most networks. d. A denial-of-service attack prevents legitimate users from accessing normal network resources.
A denial-of-service attack prevents legitimate users from accessing normal network resources.
Which of the following is not a task handled by a router? A router can connect dissimilar networks. A router can reroute traffic if the path of first choice is down but a second path is available. A router forwards broadcasts over the network. A router can interpret Layer 3 and often Layer 4 addressing.
A router can connect dissimilar networks
Which of the following scenarios represents a phishing attempt? a. An employee at your company has received a malware-infected file in their e-mail. b. A gift was offered to an employee with access to secured information in exchange for details. c. A person posing as an employee tried to access a secured area at your organization. d. An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
Application
You supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Both IPv4 and IPv6 protocols will be used on the network
What routing metric affects a path's potential performance due to delay?
Latency
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
Network (Layer 3)
ICMP
Network Layer protocol that reports on the success or failure of data delivery
Port 110
POP3 - download incoming messages TCP
How does the protocol data unit go through the OSI model?
Payload is sent by the Application, Presentation, and Session layers. Header info containing port info is added to create a Segment or Datagram (depending on if transmission uses TCP or UDP) at the Transport Layer Header info containing IP is added at the Network Layer to make a packet MAC address added as header and other info added as trailer to make a Frame at Data Link Layer Bit or Transmission is placed on the network at the Physical Layer
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
Port Numbers
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
Principle of Least Privilege
Port 3389
RDP - encrypted control of remote computers TCP
What is a router? What can a router do?
Router - joins two or more networks and passes packets from one network to another Routers can: - Connect dissimilar networks (LANs and WANs) - Interpret Layer 3 and often Layer 4 addressing - Determine the best path for data to follow from point A to point B - Reroute traffic if the path of the first choice is down but another path is available
Port 25
SMTP - outgoing email messages TCP
Port 22
SSH - secure communications between computers TCP
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
Which of the following is an example of proxy server software? a. Apache b. Snort c. Squid d. BIND
Squid
If you network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?
Star Topology
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
TCP
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
Tailgating
Port 23
Telnet - unencrypted control of remote computers TCP
What does backbone cabling consist of?
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.