Network + Guide to Networks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Access port

A sealed hub on an administration set designed for sterile access to the intravenous fluid

IEEE

Institute of Electrical and Electronics Engineers. A professional organization that develops communications and network standards, among other activities.

INT

International Treaty Organization

ICANN

Internet Corporation for Assigned Names and Numbers. Non profit organization charged with setting many policies that guide how the internet works

IIS

Internet Information Services is the second most popular web server application and is embedded in the Windows Server Operating System

IMAP4

Internet Message Access Protocol v4. Used to store e-mail on servers and allow clients to manage their e-mail on the server. IMAP4 uses port 143.

IP

Internet Protocol - adds it own network layer header (OSI Layer 3) and it now called a packet

What protocol is used to accomplish port bonding on an intelligent switch?

LACP

Connected to the switch by way of wired connections

LAN

True

Layer 7; Application, Layer 6; Presentation, Layer 5; Session are often so interwined that in practice it's often difficult to distinguish between them.

LAN

Local Area Network; in a small place, such as an office or building

What are three advantages to using VoIP instead of traditional PSTN phone service?

Lower costs for voice calls, new or enhanced features and applications, centralized voice and data network management

True

MANs and WANs often use different transmission methods and media than LAN

What file must be accessed in order to analyze SNMP logs?

MIB (Management Information Base)

IEEE (Institute for Electrical and Electronics Engineers)

Maintains a database of block IDs and their manufacturers, which is accessible via the web. http://standards.iee.org/regauth/oui/index.stml

Use _______________ in business and professional editions of Windows to create custom user groups

Management Counsole

Apache.org

Most popular Web server Application which primarily runs on UNIX systems

Which VLAN on a switch manages untagged frames?

Native VLANs

NET

Network (such as ISP)

A port number, which identifies an application on a host, exists at what level of the OSI model?​

OSI Layer 4: Transport Layer

The first 24 bits of a MAC address are known as the ____

OUI (Organizationally Unique Identifier) or Block ID or company-ID and identifies the NIC's manufacturer - A manufacturer's OUI is assigned by the Institute of Electrical and Electronics Engineers (IEEE)

15 or less computers

Peer to peer network is the way to go

At what layer of the OSI model do the 802.11 standards vary?

Physical

What port do SNMP agents listen on?

Port 161

POP3

Post Office Protocol version 3- protocol used to transfer mail between a send mail server and microsoft exchange server

UDP (User Datagram Protocol)

Protocol that operates instead of TCP in applications where delivery speed is important and quality can be sacrificed. connectionless protocol or best effor protocol

Quality of Service (QoS)

Quality of Service

When copper cabling is used to carry T-1 traffic, what kind of connector is used?

RJ-48

RDP

Remote Desktop Protocol

Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.

false

ARPANET (Advanced Research Projects Agency Network)

first carnation of the internet, had fewer than 1000 host. whole network relied on one ASCII text file called HOST.TXT to associate names with IP addresses.

Homegroup

for sharing files and printers with other computers in the homegroup, limits how sharing can be controlled for individual users because any user of any computer in the homeroup can access homegroup resources

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

giants

virtual switch

have unlimited ports, so there's no need to connect physical switches by uplinks or crossover circuits.

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

honeynet

Which software below serves as the firewall for Linux systems?

iptables

FTP

is the host name usually given to an FTP server

www

is the typically the host name assigned to a computer running a web server.

What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?

logic bomb

Which software below combines known scanning techniques and exploits to allow for hybrid exploits?

metasploit

What command retrieves the next record in an SNMP log?

nmpgetnext

ORG

noncommercial organization (such as a nonprofit agency)

multicast distribution

one server and many clients (like streaming a football game) one server broadcasting it, but many people are watching.

Remote applications

popular because most of the computing power (memory and CPU Speed) and technical support (for application installations and updates and for backing up data) are focused on the server in a centralized location, which means the client computer require less computer power and desk-side support.

VoIP (Voice over Internet Protocol)

protocol that transmits phone calls over the same data lines and networks that make up the Internet; also called Internet telephony

Personal Area Network (PAN)

provides communication for devices owned by a single user that work over a short distance such as your phone, computer, when you sync them

Transport Layer port numbers

recall that a port number identifies one application among several applications that might be running on a host and is used by the Transport layer to find an application. For example - a web server application is usually configured to listen for incoming request at port 80

unified communications (UC)

refers to the centralized management of multiple network-based communications (Phones, voice mail faxes, text messaging for all users on network)

OSI layer 4

responsible for transporting application layer payloads from one application to another protocols are TCP (transmission control protocol) which guarantees delivery and UDP (User Datagram Protocol) which does not.

ARPA

reverse look up domain (special internet function)

Only one ___________________ exists on a network using STP.

root bridge

Client Server Topology

same as client-server model

Peer to Peer Topology

same as the peer to peer model

What signal propagation phenomena causes the diffusion, or the reflection in multiple different directions, of a signal?

scattering

If the message is too large to transport on the network, transmission control protocol divides it into smaller messages called _. In UDP, the message is called a _.

segments.......datagram

What kind of attack involves a flood of broadcast ping messages, with the originating source address being spoofed to appear as a host on the network?

smurf attack

What kind of phone is a Skype app?

softphone

What Layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface?

split horizon

What utility in Linux provides standards for generating, storing, and processing messages about events on a system?

syslog

EDU

Educational

What are four advantages to using virtualization on a network?

Efficient use of resources Cost and energy savings Fault and threat isolation Simple backups, recovery, and replication

email services

Email is a client-server application t5hat involves two services, the client uses SMTP (simple Mail Transfer Protocol to send an email message to the first server which is sometimes called the SMTP Server. The recipients mail server delivers the message to the receiving client using one of two protocols: POP3 (Post Office Protocol, Version 3) or IMAP4 (Internet Message Access Protocol, Version4).

What kinds of alerts can you program your NMS to send to the IT personnel when it detects specific conditions?

Email, text (SMS), or new support tickets

The last 24 bits of a MAC address make up the ___

Extension identifier/device ID

TCP is preferred over UDP for real time services.

FALSE

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel.

False

Different types of organizations have similar levels of network security risks.

False

T-1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables.

False

FTP service

File Transfer Protocol (unsecured) does not provide encryption. FTP client applications offer more features for file transfer than does a browser

OSI Layer 6: Presentation

Formatting and Encryption - reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read

FQDN or FQHN

Fully Qualified Domain Name / Fully Qualified Distinguished Name or Fully Qualified Host Name - application layer, Every computer on a network is assigned a unique character based name, called the FQDN or FQHN, sometimes called the computer name.

GOV

Government

What federal organization sets strict standards to protect the privacy of patient records?

HIPAA

HTTPS

HTTP Secure - if you see the HTTPS it is a secure website to do $$ business with.

Routers and Switches

Hardware device used to ease the flow of data through the network difference is that a switch belongs only to it local network and the router belongs to two or moer

Computer names are called ____.

Host names

HTTP

Hypertext Transfer Protocol

What is the software that allows you to define VMs and manage resource allocation and sharing among them?

Hypervisor

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

When using public and private keys to connect to an SSH server, where must your public key be placed before you can connect?

In an authorization file on the host where the SSH server is.

Telnet and SSH are called __________________ systems because they use the existing network and its protocols to interface with the switch.

In-band management

OSI Layer 2 - Data Link Layer

Includes Ethernet standard and unique hardware addresses. Defines procedures for operating the comm links, encapsulates data, and detects and corrects packet-transmission errors. Layers 2 and 1 are responsible for interfacing with the physical hardware only o the local network. Must deal with details of wired versus wireless transmission

With which network connection type does the VM obtain IP addressing information from its host?

With which network connection type does the VM obtain IP addressing information from its host?

Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

You pay only for the bandwidth you've used.

node

a computer on a network, needs an address so that other hosts or nodes can find it.

host

a computer on a network, needs an address so that other hosts or nodes can find it. hosts an application or data

client/server model

a distributed approach in which a client makes requests of a server and the server responds

Network Interface Card (NIC)

a hardware component that enables computers to communicate over a network - also called network adapter

network adapter

a hardware component that enables computers to communicate over a network - also called network interface card (NIC)

network port

a port used by a network cable to connect to the wired network.

file server

a server that stores and manages files for network users, in contrast to keeping copies at workstation. Data stored at a central location is typically more secure because administrator can take charge of backing up data instead of relying on individuals

file services

a server's ability to share data files and disk storage space

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.

false

The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.

false

What is the max theoretical throughput of the 802.11ac wireless technology when using Wave 1 devices?

1 Gps

Three types of communication services your network might support

1) Conversational voice, VoIP (Voice of IP) allows two or more people to have voice conversations over a network 2) Streaming live audio and video video teleconfererence (VTC) allows people communicate in video and voice, primarily using the point to point model 3) streaming stored audio and video - when you watch a video on YouTube.com you using the client-server model

disadvantages of peer to peer network

1) they are not scalable, adding or changing significant elements of the network may be difficult 2) they are not necessarily secure, a simple installation, data and other resources shared by network users can be easily discovered and used by unauthorized people 3) not practical for connecting more than a few computers because it becomes too time consuming to manage the resources on the network

Advantages of a peer to peer network

1) they are simple to configure and may be used in environments in which time or technical experience is scarce 2) less expensive to set up- and maintain the other types of networks

TCP three-way handshake

1. It sends a message called a SYN to the target host. 2. The target host opens a connection for the request and sends back an acknowledgment message called an ACK (or SYN ACK). 3. The host that originated the request sends back another acknowledgment, saying that it has received the ACK message and that the session is ready to be used to transfer data.

The best 802.11n signal can travel approximately how far?

1/4 mile

Suppose you have leased two Class C licenses, 115.100.10.0 and 115.100.11.0. You want to use all these Class C IP addresses in one supernet. What is the CIDR notation for this supernet? What is its supernet mask?

115.100.10.0/23, 255.255.254.0

Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

120.10.10.0/25, 255.255.255.128

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?

160 bit

What is the network ID with CIDR notation for the IP address 172.16.32.108 with the subnet mask 255.255.255.0?

172.16.32.0/24

The SSH service listens on what TCP port?

22

How many bits of a Class A IP address are used for host information?

24 BITS

What is the formula for determining the number of possible hosts on a network?

2h - 2 = Z

Subnetting operates at Layer ___ while VLANs function at Layer ___.

3,2

Select below the band that is not one of the four frequency bands used in the 5 GHz range for wireless LANs:

5.9 GHz

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?

5060

How often should administrators and network users be required to change their password?

60 days

What is the maximum amount of throughput provided by an OC-12?

622.08

What percentage of Internet traffic, as estimated by Cisco Systems, will be devoted to video traffic by 2018?

79%

Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?

802.11ac

connectionless protocol

A protocol that a host computer can use to send data over the network without establishing a direct connection with any specific recipient computer.

DHCP relay agent

A DHCP configuration that provides DHCP service to multiple VLANs. The relay agent receives a DHCP-related message, then creates its own message to send the specified DHCP traffic beyond the broadcast domain.

Star Topology

A LAN configuration where all devices connect to one central device (the switch)

star bus topology

A LAN topology wherein two star networks are linked using a bus (or more than one switch)

local account

A Windows access account that works only on that one computer.

physical address

A _________ is an actual location in main memory. A. logical address B. partition address C. base address D. physical address

When you arrive at work one morning, your Inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it with in order to determine what has changed?

A baseline

Application Programming Interface (API)

A block of code in the operating system that software applications need to interact with.

point-to-multipoint model

A communications arrangement in which one transmitter issues signals to multiple receivers.

switch

A computer networking device that connects network segments - receives data and directs it to the to correct computer

TCP (Transmission Control Protocol)

A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network like the Internet. connection-oriented protocol

Point-to-Point Model

A data transmission that involves one transmitter and one receiver. Each computer is independent of each other

MIB (Management Information Base)

A database used in network management that contains a list of objects managed by the NMS and their descriptions as well as data about each object's performance.

Router

A device that transfers data from one network to another in an intelligent way manages traffic between two or more networks and help find the bet path for traffic home network might used a combination of a router and a switch industrial routes can have several network ports, one for each network

Remote Desktop services

A feature of Windows Server 2008 and later editions of Windows Server that allows technicians to manage remote applications.

Terminal Services

A feature of Windows Server editions prior to Windows Server 2008 that allows technicians to manage remote applications.

host table

A list of the mappings of host names to IP addresses.

Virtual terminal

A machine at the technician's location that provides for remote configuration of a switch.

Serial port

A male 9-pin or 25-pin port on a computer system used by slower I/O devices such as a mouse or modem. Data travels serially, one bit at a time, through the port. Serial ports are sometimes configured as COM1, COM2, COM3, or COM4.

Bus Topology

A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to. several switches connected to each other

onboard network port

A network port that is integrated into a computer's motherboard.

DHCP (Dynamic Host Configuration Protocol)

A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.

Wide Area Network (WAN)

A network that connects devices in geographically separated areas. internet is the largest and most varied WAN in the world

client/server network

A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network. store data on their own devices, don't share resources directly with each other, access is controlled by centralized domain database - advantages of p2p network, - user accounts and passwords are assigned in one place, access to multiple shared resources (such as data files or printesrs can be centrally granted to a single user or groups of users, problems on network can be monitored, diagnosed, and often fixed from one location, scalable

logical topology

A network's access method or the way in which data is transmitted between nodes. deals with software and how programs initially gain access to the network

alias

A nickname for a host.

IANA (Internet Assigned Numbers Authority)

A nonprofit, United States government-funded group that was established at the University of Southern California and charged with managing IP address allocation and the domain name system. The oversight for many of IANA's functions was given to ICANN in 1998; however, IANA continues to perform Internet addressing and domain name system administration.

Hexadecimal Number System

A number system consisting of 16 distinct symbols — 0-9 and A-F — which can occur in each place value.

best-effort protocol (see connectionless protocol)

A protocol that a host computer can use to send data over the network without establishing a direct connection with any specific recipient computer.

ICMP (Internet Control Message Protocol)

A protocol used with IP that attempts to report on the condition of a connection between two nodes.

BPDU filter

A software configuration that can be used to disable STP on specific ports, such as the port leading to the network's demarc. A BPDU filter prevents access to network links that should not be considered when plotting STP paths in a network.

Virtual Switch

A software-based switch that provides functionality similar to physical switches, and is used for connecting virtual systems to form a network.

Physical Topology

A topology that describes a network's physical layout and shape.

connection-oriented protocol

A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

hybrid topography

A wired topography combining two or more topography

Management console

A workstation, such as a laptop, that is connected to a switch's console port and allows for changes to be made to a switch's configurations.

What xDSL standard is the most popular?

ADSL

ARP (Address Resolution Protocol)

Address Resolution Protocol. An Internet protocol used to map an IP address to a MAC address.

AERO

Air-transport industry

Network Layer IP Address

An IP address is assigned to every interface, which is a network connection made by a node or host on a network. The IP address can be used to find hosts on any computer on the globe if the IP address is public on the internet. Two types of IP addresses are used on the Internet - IPv4 and IPv6

remote application

An application that is installed and executed on a server, and is presented to a user working at a client computer.

VLAN hopping

An exploit that allows an attacker on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

Campus Area Network (CAN)

An interconnection of networks located in nearby buildings (for example, buildings on a college campus).

electrostatic discharge (ESD)

Another name for static electricity, which can damage chips and destroy motherboards, even though it might not be felt or seen with the naked eye.

RTP and RTCP operate at which layer of the OSI model?

Application layer

remote access server

Because they can be accessed from outside the local network, remote access servers necessitate strict security measures

BIZ

Businesses

Which QoS technique operates at the OSI layer "2.5"?

C. MPLS

What is the difference between circuit switching and packet switching?

Circuit switching establishes a connection between two network nodes before transmitting data. Packet switching breaks data into packets to be transported along the fastest circuit available at any instant.

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Citrix Xen

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need?

DHCP relay agent

Spanning Tree Protocol (STP)

Defined by the IEEE 802.1D standard, it allows a network to have redundant Layer 2 connections, while logical preventing a loop, which could lead to symptoms such as broadcast storms and MAC address table corruption.

The _____________ field in IPv4 packets and the _________________ field in IPv6 packets are used to help prioritize traffic when managing QoS.

DiffServ, Traffic Class

global account

Domain-level accounts assigned by the network or system administrator.

What protocol below only provides the framework for authenticating clients and servers, but relies on other encryption and authentication schemes to verify the credentials of clients or servers?

EAP

What are the two types of forwarding defined by DiffServ?

EF (Expedited Forwarding) and AF (Assured Forwarding)

MAC address

Each Wi-Fi and Ethernet card has a media access control address embedded in the hardware, represented as six two-digit hexadecimal numbers separated by colons, such as "34:5f:01:6d:33:ff". Also knows as they physical address

Remote Desktop

Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local. uses RDP (Remote Desktop Protocol)

Which of the following is NOT an encryption algorithm used by SSH?

SHA-2

You're trying to choose a signaling protocol for your company's network because you're about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?

SIP

On circuit switched portions of a PSTN, what set of standards established by the ITU is used to handle call signaling?

SS7

SFTP

Secure File Transfer Protocol (secured)

SSL

Secure Sockets Layer

SMTP

Simple Mail Transfer Protocol

Hypervisor

Software that enables a single computer to run multiple operating systems simultaneously.

catastrophic failure and upset failure

Static electricity can cause what two types of damage in electronic components?

Fail Open

System default that allows access during a system or network failure.

Fail Close

System default that denies access during a system or network failure.

firmware

System software that controls hardware devices. Software that is permanently stored in a chip. The BIOS on a motherboard is an example of firmware

Which option below is a standard created by the NSA that defines protections against radio frequency emanations?

TEMPEST

What encryption protocol was designed as more of an integrity check for WEP transmissions rather than a sophisticated encryption protocol?

TKIP

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

TRUE

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

TRUE

Telnet Service

Telnet protocol is used by the Telnet client-server command line application to allow an administrator or other user to "remote in" or control a computer remotely. Telnet is included in many operating services, but transmissions in telnet are not encrypted, which has caused Telnet to be largely replaced by other more secure programs

host file

The ASCII text files called HOSTS.TXT that associates host names with IP addresses

Active Directory Domain Services (AD DS)

The Active Directory service that manages the process that allows a user to sign on to a network from any computer on the network and get access to the resources that Active Directory allows.

Expedited Forwarding (EF)

The Expedited Forwarding (EF) model is used to provide resources to latency (delay) sensitive real-time, interactive traffic.

Why is a BPDU filter needed at the demarc point>?

The ISP's STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information.

IPv4 (Internet Protocol version 4)

The Internet Protocol version 4 addresses have 32 bits and are written as four decimal numbers called octets, for example, 92.106.50.200

IP Address (Internet Protocol Address)

The Network layer address assigned to nodes to uniquely identify them on a TCP/IP network. IP addresses consist of 32 bits divided into four octets, or bytes.

OSI Layer 3

The Network layer moves packets between computers on different networks. Routers operate at the Network layer. IP and IPX operate at the Network layer. sometimes called the internet layer

Assured Forwarding (AF)

The assured forwarding (AF) model is used to provide priority values to different data applications

Active Directory (AD)

The centralized directory database that contains user account information and security for the entire group of computers on a network.

TCP/IP

The dominant set of protocols for the transfer of data over the Internet.

ISN (Initial Sequence Number)

The first SYN message in the three-way handshake appears to be random, but in reality, it is calculated by a specific, clock -based algorithm, which varies by OS

OUI (Organizationally Unique Identifier)

The first three bytes of a MAC address that uniquely identify a network device manufacturer. Block ID or Company ID

Protocol Data Unit (PDU)

The name given to data at different layers of the OSI model. Specifically, the PDU for Layer 4 is segment. The Layer 3 PDU is packet, the Layer 2 PDU is frame, and the Layer 1 PDU is bit. Names for a group of bits as it moves from one layer to the next

Topology

The physical and logical design of a computer network; examples include mesh, bus, ring and star; the physical layout of the network devices and the cabling, and how all the components communicate with each other

How can network segmentation protect cardholder data?

The portion of the network containing sensitive information is separated from portions of the network that are more vulnerable to compromise.

Encapsulation

The process of adding a header to the data inherited from the layer above.

ISN (Initial Sequence Number)

The sequence number in the first SYN message in a three-way handshake. The ISN appears to be random, but in reality, it is calculated by a specific, clock-based algorithm, which varies by operating system.

Root Bridge

The single bridge on a network selected by the Spanning Tree Protocol to provide the basis for all subsequent path calculations.

ssh

The ssh command in Linux uses the Secure Shell (shh) which creates a secure channel or tunnel between two computers

How do the OSI layers work together?

The transmission involves a browser and web server on their respective host, a switch, and a router

Console Port

The type of port on a router used to communicate with the router itself, such as when making programming changes to the device.

host name

The unique name given to a network node on a TCP /IP network.

Host name

The unique name given to a network node on a TCP /IP network. Sometimes called computer name

Virtual Switch Manager

To configure a range of MAC addresses that can be dynamically assigned to VMs, you would need to select this button in the Action menu. Then, under the Global Network Settings node, you can enter the desired MAC address range.

Which of the following is not a good reason to subnet a network?

To reduce the number of routing table entries by combining several entries

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

Ring Topology

Topology where the computers are connected on a loop or ring. Data flows in one direction only. seldom used today primarily because of its slow speed

Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?

Traffic policing

TCP/IP

Transmission Control Protocol/Internet Protocol. Protocol that connects computers to the Internet. Tells computers how to exchange information over the Internet. regardless of the os

Loss-tolerant

Transmissions that can tolerate occasional loss of data without compromising the user experience.

TLS

Transport Layer Security

CALEA requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.

True

PPP can support several types of Network layer protocols that might use the connection.

True

Which port on a switch manages traffic for multiple VLANs?

Trunk port

In a VoIP call, what method of transmission is used between two IP phones?

UNICAST

MIL

US Military organization

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

VLAN Hopping

Which protocol assigns a virtual IP to a group of routers?

VRRP

You need to see the physical switch at one of your company's remote locations to see if you can spot any visible reason why a link keeps failing. However, the remote office is three hours' drive away, and you're pretty sure this will be a simple fix if you can just see it. What kind of video service can you use, with the help of an employee at the remote office, to see the switch from your desk?

Videoconferencing

A _______, like its physical counterpart, is a device that functions at layer 2 of the Open Systems Interconnect (OSI) reference model.

Virtual Switch

Using ______ , you can create, manage, and delete virtual switches.

Virtual Switch Manager

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual switch

delay-sensitive

Voice and video transmissions are _______________, meaning you don't want to hear breaks in your conversation or see a buffering message when you watch a movie over the Internet.

Open Systems Interconnection (OSI) model

a seven-layer architecture for defining how data is transmitted from computer to computer in a network, from the physical connection to the network to the applications that users run. It also standardizes interactions between network computers exchanging information. First developed by the ISO (International Organization for Standardization) - this OSI is still in use today

Packet

a single unit of binary data routed through a network

IPv6 (Internet Protocol version 6)

address hae 128 bits and are written as eight blocks of hexadeciml number, for example 2001:0DB8:0B80:0000:0000:00D3:9C5A:00CC

client/server architecture

also call ed client-server network model

Bandwith

amount of traffic , or data transmission activity, on the network.

OSI Layer 7: Application

application programs that provide services to a user such as a browser and wewb server using the HTTP Application layer protocol Utility programs that provide services to the system, such as SNMP(Simple Network Management Protocol) programs that monitor and gather information about network traffic

Which of the following is not a valid wireless network topology?

bus

backbone

central conduit that connects the segments of a network and is sometimes referred to as "a network of networks", might use higher transmission speeds and different calling than network cables connected to computers because of the heavier traffic and the longer distances span

A Windows domain is a type of ____ network, which is a network where resources are managed by a centralized computer.

client-server network

COM

commercial business

peer-to-peer (P2P)

computers, called nodes or hosts on a network, form a logical group of computers and users the share resources. Administration, resources, and security of a computer are controlled by the computer - one computer does not have more authority then the other - if running a Windows OS each computer user has a local account that works only on that one computer. -

Metropolitan Area Network (MAN)

connects LANs in a metropolitan area, An interconnection of networks located in nearby buildings (for example, buildings on a college campus).

header

control information in an area at the beginning of the payload is created to be transmitted to the Network Layer

Windows Server

controls network access to a group of computers, this logical group is called a Windows Domain

COOP

cooperatives

Fragmentation

divide a large packet into smaller packets.

Windows folders and file sharing

each computer maintains a list of users and their right on that particular PC

A SecurID key chain fob from RSA security generates a password that changes how often?

every 60 seconds

network operating systems (NOSs)

examples of NOSs are Windows Server 20012 $R2, Ubuntu Server, and Red Hat (Ubuntu and Red Hat are versions of Linux - controlling how users and programs get access to the resources on a network is a function of the OS uses on the network - manages data and other resources for a number of clients, ensures only authorized users access the network, controlling which types of files a user can open and read, restricting when and from where users can access the network, dictating which rules computes will use to communicate, in some situations, supplying applications and data files to clients - require more memory, processing power, and storage capacity than clients because serves are called on to handle heavy processing loads and requests from multiple clients

Data Link Layer MAC address

the MAC address is also called the physical address, is embedded on every NIC on the globe and is assumed to be unique to the NIC. Nodes on a LAN find each other using their MAC address. However, MAC addresses are not used to find nodes on networks other than the local network.

domain name

the part of a network address that identifies it as belonging to a particular domain/and or company

OSI Layer 1 - Physical Layer

the simplest layer of all and is responsible only for sending bits via a wired or wireless transmission

Print Services

to share printers across a network saves time and money.

TLD

top-level domain

In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer.

tru

A bus topology WAN is often the best option for an organization with only a few sites and the capability to use dedicated circuits.

true

A firewall typically involves a combination of hardware and software.

true

All wireless signals are carried through the air by electromagnetic waves.

true

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

true

Multipath signaling is a significant cause of fading.

true

The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE).

true

The simplest type of firewall is a content filtering firewall.

true

The term malware is derived from a combination of the words malicious and software.

true

Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.

true

INFO

unrestricted use

OSI Layer 5: Session

used to control connections that are established between systems (1.) TCP (2.) IPC (3.) SIP (Session Initiation Protocol) (4.) RPC (Remote Procedure Call) (5.) NetBIOS used during skype etc.

convergence

using the same network to deliver multiple types of communications sevices, such as video, voice, and fax is known as a convergence

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

​SaaS

Switch port security

• IEEE 802.1X • Port-based Network Access Control (PNAC) • Makes extensive use of EAP and RADIUS • Extensible Authentication Protocol • Remote Authentication Dial In User Service • Disable your unused ports • Enable duplicate MAC address checking / spoofing


Ensembles d'études connexes

Genitourinary System Review questions

View Set

Nissan Addressing Customer Concerns About ProPILOT™ Assist

View Set

Project Management Exam 1 quizzes

View Set

Chapter 13: Bipolar and Related Disorders

View Set

Introduction to Entrepreneurship; Chapter 6; Assignments

View Set