C Annex (BCOC)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is a Protocol?

- A set of predetermined rules for a particular type of communication - The term is also used to refer to the software

What are the four layers of the Transport Control Protocol/Internet Protocol (TCP/IP) Model?

- Application - Transport - Internet - Network Access

Difference between Circuit Switching Networks (CSNs) and Packet Switching Networks (PSNs)?

- CSN example is telephony (connection oriented) - PSN example is data (connectionless). PSN has built in redundancy

What is the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) method of MAC?

- Carrier Sense: Each node attempts to listen before transmitting - Collision Avoidance: Each node sends out a warning before transmitting

What is the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) method of MAC?

- Carrier Sense: Each node attempts to listen before transmitting - Collision Detection: Each node listens while transmitting and if they hear another transmission they wait a random period of time and resend

What are the three basic characteristics of Internet Protocol Version 4 (IPv4)?

- Connectionless - A best effort - Media independent protocol

What are the two methods of Media Access Control (MAC)?

- Controlled access - Contention based access

What is the layer 3 switch symbol?

- Core Layer - Distribution Layer

Given a hierarchical network structure, compare the features of the Access Layer, Distribution Layer, and Core Layer switches

- Core Layer is the switch just before the router (highest layer of switches) - Distribution layer is just below the core switch and consists of additional layer 3 switches - Access layer is the layer 2 switches that connects directly to the host devices

What are the four characteristics of network design?

- Fault tolerant - Scalable - Secure - Quality of Service

State in writing the factors affecting convergence

- Network changes - Topology changes - Certain time period has elapsed

Identify methods used to encode digital information onto an analog signal

- Non Return to Zero - Manchester

What are the advantages of physical and logical network topologies?

- Physical topo shows how the devices are physically connected - Logical topo shows how the devices pass data between each other (my own definition)

What are the six functions of Transmissions Control Protocol (TCP)?

- Reliable delivery - Error checking - Flow control - Congestion control - Ordered delivery - Connection establishment

Identify the technical characteristics of Multimode Fiber Optic cabling

- Shorter range than SMF because it relies upon diodes (LEDS) to transmit pulses of light. - It can carry the same amount of bandwidth that SMF can, just not as far

Characteristics of a protocol

- The structure or format of a message. - The process by which network devices pass and share information among themselves. - How error and system messages are passed along and recorded. - Allow for the transfer of data between two end devices over intermediate network devices.

What is the technical characteristics of Single Mode Fiber Optic cabling?

- Used for long haul/high bandwidth data networks. - Segments as long as 80 km. - There is no danger of cross talk or EMI. - Uses lasers to push pulses of light

What are the advantages of Cisco Etherchannel® Technology?

- Uses 802.ad standard - Significantly increases bandwidth - Compatible with UPT, STP, SMF, and MMF - Fault tolerance

What are the four structural elements of a data network?

1) Rules: Govern how messages flow across a network 2) Messages: The Information that travels over the medium 3) Medium: Method in which devices are connected 4) Devices: Items used to communicate with one another

What are the 3 ranges of private IP address? (on test)

10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255

What is a valid Media Access Control (MAC) address?

A 48 bit hexadecimal address that is imprinted on every network interface card

What is Dynamic Multipoint Virtual Private Network (DMVPN)?

A Cisco IOS Software solution for building IPSec VPNs in an easy and scalable manner.

What is the purpose of a Rollover cable?

A Cisco Proprietary pinout that is used to console into a router or a switch to configure it

What is virtual tunnel interface (VTI)?

A Cisco proprietary protocol that is capable of encapsulating only IP traffic while GRE is capable of encapsulating other protocols such as IPX

What is the definition of Radix?

A base 10 number system has a radix of 10. You may see these words used interchangeably on the Cisco exam - Radix means base

What is the definition of Metric?

A calculated number that is used to determine which route to a destination network is best in the event that a router knows about multiple paths to the same network

What is a Network?

A collection of devices that are interconnected by communication channels. Provide for the sharing of resources and information

What is the definition of Virtual Local Area Network (VLAN) Domain?

A collection of switches that fall under the same VTP server and share a common VLAN database

What is the purpose of a Wireless Access Point (WAP)?

A device that terminates wireless signals from users and connects them to an existing copper or fiber infrastructure

Given a definition, name a Protocol Data Unit (PDU)

A generic term from the OSI model that refers to data, headers, and trailers about which a particular networking layer is concerned.

Define Autonomous System (AS)

A group of routers and networks united by a routing policy

What is the purpose of Virtual Local Area Network (VLAN) Trunking Protocol (VTP)?

A management protocol that groups switches into a VTP domain

What is the definition of Interface?

A mechanical or electrical link connecting two or more pieces of equipment together

What is the definition of Anycast (unique to IPv6)?

A network addressing and routing methodology in which datagrams from a single sender are routed to the topologically nearest node in a group of potential receivers, though it may be sent to several nodes, all identified by the same destination address

What is the definition of Convergence?

A network that can carry voice, video, and data over the same media and infrastructure

What is Black Core Routing?

A networking scheme for the interconnection of core network components where all data remains IPSec encrypted (black traffic) as it is transported across the core

What is the definition of Authentication in relation to network security?

A process by which a user proves that they are who they claim to be

What is the definition of Standard?

A process or protocol suite that has been endorsed by the networking industry and ratified by a standard organization

What is generic routing encapsulation (GRE)?

A protocol designed by Cisco and can encapsulate a wide variety of network layer protocol packet types into an IP tunnel

What is the definition of Protocol Suite?

A set of rules that work together to facilitate communication.

What is an Operating System?

A software program that manages the basic operations of a computer - Tells a computer HOW to operate

What are the functions of Address Resolution Protocol (ARP)?

A telecommunication protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks

What is the definition of Goodput?

A term used to describe the amount of useable data that is left after all of the protocol overhead traffic from the OSI layers has been removed

What is the purpose of the Next Generation Enterprise Network (NGEN)?

A transition from contractor owned/contractor operated (CO/CO) to government owned/contractor operated (GO/CO) network hardware and management of the NMCI Network

What is the purpose of the User Datagram Protocol (UDP)?

A very low overhead protocol that works well with higher bandwidth applications like voice and video because of the volume of data being sent across the network. Is known as a connectionless protocol and is useful because it does not add too much overhead to the already congested WAN links

What is a tunnel?

A virtual path across a network that delivers packets that are encapsulated and possibly encrypted to a designated distant end

What is the definition of Static Route?

A way of manually configuring the routing table in routers. A router is programmed by a network administrator with all of the routes that it needs to know about in order to do its job.

What is the purpose of Subnetting?

A way to efficiently use IP address space by subdividing it into smaller networks

What is the function of the Network Layer?

Accept Transport layer segments and adds logical addressing information in the network header. This layer handles the routing of packets - Handles data between networks (Packets)

What is the function of the Presentation Layer?

Accepts Application layer data and then formats it (DATA)

What is the function of the Physical Layer?

Accepts frames from The Data Link Layer and generate voltage, radio waves, or pulses of light to transmit signals (Bits)

What is the layer 2 switch symbol?

Access Layer

What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?

Allows client computers to automatically pull their IP address configuration from a centrally managed server - Port 67 and 68

Identify the benefits of Layer 3 Switching

Allows us to divide devices into VLANs

What is the purpose of a Default Gateway?

An IP address used by a host to forward IP packets that have destination address outside of the local network. Used when the computer/router does not know the destination

What is the definition of Single Point(s) of Failure in relation to network security?

Any cable or equipment through which all data must flow

Given a list of Transport Control Protocol/Internet Protocol (TCP/IP) layers and Protocol Data Units (PDUs), match a PDU to its corresponding TCP/IP layer

Application -> Data Transport -> Segment Internet -> Packet Network Access -> Frame

Closed Standards

Are ones in which the specifications are kept proprietary to prevent third party hardware or software from being used. Only after paying a licensing fee, can one have access to the specifications or use the product

Open Standards

Are vendor independent systems that are designed to interconnect with a wide variety of products. It implies that standards have been determined from a consensus of interested parties rather than one or two vendors

Identify the most common Exterior Gateway Protocol used to connect USMC network to other Autonomous Systems/Routing Domains within the DISN

Border Gateway Protocol 4.0 (BGP)

What is the purpose of Congestion Control in relation to the functions of Transmission Control Protocol (TCP)?

By shrinking/growing the window/overhead, data can be made smaller to prevent this (Capt Beede)

What is the purpose of the Transmission Control Protocol (TCP)?

Can be used for the transport of emails, web pages, and any other applications where speed is not as critical as is ensuring that no information is lost along the way. Is a connection oriented protocol.

What is the definition of Local Area Network (LAN)?

Characterized by high transmission speeds and minimum delay, controlled by the same company or organization.

What is the definition of Connection-Oriented?

Circuit Switching Networks (CSNs)

Define Enhanced Distance Vector Routing Protocol

Combine the best parts of link-state and distance vector protocols - Enhanced Interior Gateway Routing Protocol (EIGRP) - Uses DUAL to calc best route

What are the three characteristics of information that require protection through the implementation of data network security measures?

Confidentiality, Integrity, and Availability (CIA)

State the purpose of Static Routing

Configured by administrator and shows the destination network, its subnet mask, and its next hop

What is the definition of Virtual Local Area Network (VLAN) Trunk?

Connects layer 3 switches to subordinate switches

What is Vulnerability Testing in relation to computer operating systems? (Capt Beede said won't be on exam)

Consists of the tools and techniques used to check how vulnerable your network is to being compromised

What is the purpose of a Routing Table?

Contains the information about adjacent networks that allows the router to make a decision as to which interface to forward the packet down the OSI model

Given an illustrated model of the Transmission Control Protocol (TCP) Three-Way Handshake and a list of TCP functions, sequence the steps of the TCP connection process in chronological order

Device A Sends sync request Device B Sends ack of sync request Device B Sends sync reques Device A Sends ack of sync request

What is the definition of Intermediary Devices?

Devices that - Provide connectivity and ensures data flows across network - May provide security (Confidentiality, Availability, Integrity) - Regenerates signals - Maintains pathway information - QoS

Identify a physical Ring Topology

Each computer is connected to another computer via cable. Shares one collision domain

What is the definition of the Marine Corps Enterprise Information Technology Services (MCEITS)?

Enables collaborative information sharing across the MAGTF via enterprise-level data storage and application hosting

Identify the most common Enhanced Distance Vector Routing Protocol employed within USMC PSN

Enhanced Interior Gateway Routing Protocol (EIGRP)

Compare the purposes of Data Link Layer MAC addressing and Network Layer IP addressing

Ethernet uses Media Access Control (MAC) physical addressing to send data. Ethernet frames are used to send information within the local network. If a frame is destined for a distant network, it will be sent to a Layer three device which will use the destination IP address to form a packet and send it across the network.

Identify a physical Star Topology

Every device in the network is connected to a central device like a switch or a hub. Consist of either multiple collision domains or a single collision domain.

Given a list of physical and logical addresses, select from a list of distracters a valid Internet Protocol Version 6 (IPv6) address

Example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334

What is the definition of Logical Topology?

Focuses not on how devices are physically connected, but on how data actually moves between nodes

Identify a logical Point-to-Point Topology

For a computer to talk across the switch to a server, it will act like a ____________ connection and allow unimpeded full duplex communication (Physical Star topo, utilizing a switch)

What is the definition of Rule in relation to a data network?

Governs how messages flow across network

Identify a physical Bus Topology

Has only one media or cable and all of the computers are connected to it. All of the computers share the same collision domain

What is virtual route?

IP technology that allows multiple instances of a routing table to co-exist on the same router at the same time

Given a decimal number, calculate the equivalent binary number: Convert 102 to binary

In binary (from decimal): 01100110

Given a hexadecimal number, calculate the equivalent binary number Calculate F9 to binary

In binary (from hexadecimal): 011111001

Given a binary number, calculate the equivalent decimal number: Convert 1010 to decimal

In decimal (from binary): 10

Given a hexadecimal number, calculate the equivalent decimal number: Convert 9A to decimal

In decimal (from hexadecimal): 154

What is the definition of Encapsulation?

In order for network communication to take place, headers and, in some cases, trailers are placed in front of and behind the data that is received from the upper layer

What is the definition of Message in relation to a data network?

Information that travels over the medium

What is the two main types of Virtual Local Area Network (VLAN) Tagging Technologies?

InterSwitch Link and 802.1Q

Given a definition, name a Wide Area Network (WAN)

Interconnects two high speed LAN networks over a geographic distance; usually much slower than a LAN. Often found over transmission paths

What is the function of the Application Layer?

Interfaces to the user that enables programs to use network services (DATA)

Identify a physical Point-to-Point Topology

Involves two nodes that are directly connected. collision domain is the same

What is the purpose of the Messaging Application Programming Interface (MAPI) Protocol?

Is a Microsoft propriety protocol used between Microsoft Outlook and Exchange - Port 135

What is the purpose of a Straight-through cable?

Is terminated with both sides using the same pin out. Is used to connect unlike devices together, devices that operate at different levels of the OSI model

What is the purpose of a Crossover cable?

Is terminated with one end using the 586A standard and the other end using the 586B standard. Is used to connect like devices together.

What is the purpose of Connection Establishment in relation to the functions of Transmission Control Protocol (TCP)?

It is established in the three step process known as the TCP three-way handshake. Enables reliability in TCP sessions

What is the purpose of the Telnet Protocol?

It is software that allows you to remotely access network systems - Port 23

What is the preferred intermediary device used to perform Inter-VLAN Routing within USMC PSN?

Layer 3 switch

What is the layer of the Open Systems Interconnect (OSI) Model where network troubleshooting begins?

Layer one

What is the definition of Window Size?

Listed in the header is the length of the segment

What is Command Line Interface?

Mechanism for interacting with a computer operating system or software by typing commands to perform specific tasks

What is the definition of Best Effort?

No overhead is used to guarantee packet delivery

What is flapping?

Occurs when a routing table entry changes too often in a relatively short time

What is the definition of Multicast?

One computer sends out a data stream that multiple computers can receive (sent to a select group)

What is the definition of Broadcast?

One device to all host devices

What is the definition of Unicast?

One to one connection

What is the difference between Open Standards and Closed Standards?

Open Standards are vendor independent - IP, TCP, HTTP Closed Standards are vendor specific - Microsoft EX, Word...

State the purpose of Dynamic Routing

Operate by advertising their networks to other routers in the network to build the whole picture of the network.

What is the difference between Peer-to-Peer (P2P) Networks and Client/Server Networks?

P2P - Small, inexpensive, easy setup, low maint - Scattered data, weak security, No admin control, requires more training Client/Server - More secure, dedicated servers, easy accessibility/control, sync files, easy backup - Dependency on admin, more complicated setup, expensive

What is the definition of Connectionless?

Packet Switching Networks (PSNs)

What is the definition of Decapsulation?

Packet is received by another computer and the headers and trailers must be stripped off the data as it is passed up the OSI model

What is the definition of Well Known Ports?

Ports 0-1023, are reserved for commonly used services and applications

What is the definition of Registered Ports?

Ports 1024-49151, are primarily ports assigned to applications that a user might decide to install

What is the definition of Dynamic/Private Ports?

Ports 49152-65535, are usually assigned dynamically to client applications as they initiate connections

What is the purpose of Flow Control in relation to the functions of Transmission Control Protocol (TCP)?

Prevents the network from getting too cluttered at the receiving end (Capt Beede)

What is the purpose of the Media Access Control sub-layer of the Data Link Layer of the OSI Model?

Process performed by the hardware - Provides data link layer addressing and framing of the data according to the protocol in use

What is the purpose of the Open Systems Interconnect (OSI) Model?

Provide consistency within all types of network protocols and services. - The primary purpose is to aid in a more clear understanding of the functions and processes involved within the network

What is Internet Protocol security (IPsec)?

Provides a method of setting up a secure channel for protected data exchange between two devices. The devices that share this secure channel can be two servers, two routers, a workstation and a server, or two gateways between different networks

What is multipoint generic routing encapsulation (mGRE)?

Provides comparable functionality to GRE but in a multipoint environment

What is the purpose of the Logical Link Control (LLC) sub-layer of the Data Link Layer of the OSI Model?

Provides service to the network layer protocols - Frame information that identifies the network layer protocol - Multiple layer 3 protocols can use the same net interface and media

State the purpose of the Data Distribution System - Modular (DDS-M)

Provides the data communications backbone for tactical data networks

What is the purpose of a Wireless Network Interface Card (NIC) Adapter?

Provides wireless connectivity to each host allowing them to connect to wireless access points

What is the purpose of the Domain Name Service (DNS) Protocol?

Resolves IP addresses to fully qualified domain names - Port 53

What is the function of the Transport Layer

Responsible for ensuring data is transferred reliably, in correct sequence, and without errors. Breaks large data units received from the session layer into smaller pieces called segments

What is the function of the Session Layer?

Responsible for establishing and maintaining communications between nodes on the network (DATA)

What is the definition of Dynamic Routing?

Routers share their networks with other routers to automatically build a complete topology, map of the network, and automatically adjust to traffic changes.

What is the definition of Client/Server Network?

Servers run the network services and clients must request permission for delivery of network resources

What is the purpose of the Consolidated Afloat Networks and Enterprise Services (CANES)?

Shipboard network which enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments

What is a Patch in relation to computer software?

Small addition to the original software code, written to bypass or correct a problem

What is the definition of Maximum Transmission Unit (MTU)?

Some routers can only accept packets of a certain size

What is the definition of Positional Notation?

Sometimes called place-value notation, is a numerical system in which each position is related to the next by a constant multiplier, the base or radix of that numeral system

What is the differences between Switches and Hubs?

Switches - Reduce collision and sending a frame only to its proper destination Hubs - Adds multiple users to one connection, forwards all traffic to everyone (does not separate collision domains)

What is the purpose of Error Checking in relation to the functions of Transmission Control Protocol (TCP)?

Take information inside the header and check it with the information that has been received. To ensure all information that was sent is received in full and intact. (Capt Beede)

What is Next Hop Resolution Protocol (NHRP)?

The "ARP" of your DMVPN cloud, mapping logical IP addresses to physical IP addresses

What is the purpose of the Combined Enterprise Regional Information Exchange System (CENTRIXS)?

The Combatant Commander's network for coalition warfighting. - Designed to be a secure, global, interoperable, interconnected, inexpensive, and easy-to use network to share and exchange intelligence and operations information through reliable communications connectivity, data manipulation, and automated processes

What is the purpose of the Virtual Local Area Network (VLAN) Database (vlan.dat)?

The VLAN information you create on the VLAN Server is stored here. This is the central repository for VLAN information for that VTP Domain. It is stored in the flash memory of the switch

What is the definition of Throughput?

The amount of data that is actually transmitted over the media. Will always be less than the advertised bandwidth

How are ports used to establish a Transmission Control Protocol (TCP) connection?

The client computer will use a unique and random port number as the source port (a dynamic port) and request a web page from a server with the destination port of 80 (a well-known port). The server will establish a connection with its source port being port 80 and the destination port being the same random port that originated the request for a web page

What is the definition of Network Address?

The first available IP address in the range. This is the ID that the routers use when deciding where to route packets.

What is the definition of Broadcast Address?

The last available IP address in the range. This ID is used if the router or other device wants to send traffic to all of the machines in the network.

What is the purpose of the Non-secure Internet Protocol Router (NIPR) Network?

The most common network in the Marine Corps. The majority of the training, administration, and garrison operations information flow on it

Identify a logical Ring Topology

The only logical topology that follows its physical topology

What is Software?

The operating system and the programs running on the computer

What is the definition of the Marine Corps Enterprise Network (MCEN)?

The overarching term for every network and computer within the Marine Corps' domain. It consists of all Marine Corps owned, controlled, and supported Information Systems and Networks

What is the definition of Physical Topology?

The physical construction and connections of a network

What is Hardware?

The physical equipment - Case, storage drives, keyboards, monitors, cables, speakers, and printers.

What is the definition of Availability in relation to network security?

The principle about ensuring that the network itself is always ready for use and is not down, damaged or broken - Firewalls - Redundant networks - Hardware without a single point of failure

What is the definition of Confidentiality in relation to network security?

The principle of ensuring data sent over the network is sent to the right recipient - User Authentication - Data encryption

What is the definition of Integrity in relation to network security?

The principle of ensuring that the data has not been altered as it transits the network - Digital signatures

Define Convergence

The process of developing the topology of a network

What is the definition of Routing?

The process of moving packets through the network

What is the purpose of Inter-VLAN Routing?

The process of routing data between VLANs within a switched LAN

What are the advantages of employing Internet Protocol Version 6 (IPv6) addressing within a Packet Switching Network (PSN)?

The reason that hexadecimal 128 bit addresses were used is because there are more addresses in this format than there are stars visible in the night sky

What is the purpose of a Cyclic Redundancy Check (CRC)?

The receiving station will compare the value in the frame check sequence (FSC) field to the bits that it received from the frame

What is the definition of Host Address?

The rest of the IP addresses that fall between the network and the broadcast ID

What devices operate at the Data Link Layer of the Open Systems Interconnect (OSI) Model?

The switch is the primary device

What is the definition of Bandwidth?

The theoretical capacity of media to transmit data

How does Transmission Control Protocol (TCP) dynamically change Window Size to overcome network congestion?

The window size will flex to fit the quality of the connection and the bandwidth available

What is the definition of Peer-to-Peer (P2P) Network?

There are no dedicated servers, each computer acts as both a client and a server

Identify a logical Bus Topology

There is only one collision domain among devices on the network (Physical Star topo, utilizing a hub)

What is the definition of Dotted-Decimal Notation?

These addresses start as 32 bits of data (ones and zeros). These are separated into 8-bit bytes, called octets. These octets are then written in decimal format, each separated by a decimal point. The values of the octets range from 0 to 255 (inclusive), with each octet representing 8 bits of the 32-bit IP address. The term originates from the fact that each of the four decimal numbers is separated by a period (or dot) - IPv4 addresses use this

What is the purpose of the Internet Message Access Protocol (IMAP)?

Third message delivery type pushes from the server to the client - Port 143

What is the function of the Data link Layer?

This layer adds host-based delivery information to the packet, creating frames. Once this happens, they can then be transmitted by the Physical layer - Handles data within the same network (Frames)

What is the definition of Private Address?

Those IP addresses that are designated for use within a private network and must rely on Network Address Translation to be routable on the internet.

What is the definition of Public Address?

Those remaining IP addresses that are authorized to be routed on the internet and are completely unique

What is the purpose of Ordered Delivery in relation to the functions of Transmission Control Protocol (TCP)?

To ensure no data is lost and the packets can be reconstructed in the correct order

What is the purpose of Reliable Delivery in relation to the functions of Transmission Control Protocol (TCP)?

To receive all of the information without information loss (my own definition)

What is the difference between User Datagram Protocol (UDP) and Transmission Control Protocol (TCP)?

UDP - Fast, low overhead, doesn't require acknowledgement, doesn't resend lost data, delivers data as it arrives TCP - Reliable, acknowledge data, resends lost data, delivers data in order sent

What is the purpose of the Server Message Block (SMB) Protocol?

Used by clients to access shared resources - 445

What is the purpose of the Secure Internet Protocol Router (SIPR) Network?

Used for documents and information classified up to the Secret level

What is the purpose of the File Transfer Protocol (FTP)?

Used for interactive file transfer between systems - Ports 20 and 21

What is a Network Operating System (NOS)?

Used on servers to manage network resources as well as network level programs. Runs file servers, email servers, and control access to shared files, printers, and other network devices.

What is the definition of Device in relation to a data network?

Used to communicate with one another

State the purpose of Exterior Gateway Protocols (EGP)

Used to connect different autonomous systems and ensure traffic is able to enter and exit the AS

State the purpose of Interior Gateway Protocols (IGP)

Used to enable communication between different networks; they establish the common routing policy that defines the AS

Identify Interior Gateway Protocols (IGP)

Used to enable communication between different networks; they establish the common routing policy that defines the AS.

What is the purpose of Post Office Protocol Three (POP3)?

Used to pull messages from an email server - Port 110

What is the purpose of Virtual Local Area Networks (VLANs)?

Used to separate one broadcast domain into multiple networks

What is the purpose of the Simple Mail Transfer Protocol (SMTP)?

Used to transfer emails from client computers to email servers and to transfer mail between two email servers - Port 25

What is the purpose of the Hyper Text Transfer Protocol (HTTP)?

Used to transfer files that make up the Web pages of the World Wide Web - Port 80

What is prefix list?

Uses route maps and route filtering to control routing behavior, such as avoiding recursive routing

What is the purpose of Network Address Translation (NAT)?

Was developed to maximize public IP space

What is the purpose of Spanning Tree Protocol (STP)?

Was developed to prevent loops from forming on the LAN (Layer 2 devices).

What is the purpose of Variable Length Subnet Masking (VLSM)?

We can use the subnet mask to further divide up the address space in a class C to tailor networks to our specific circumstances and avoid wasting IP address space

What is a Graphical User Interface?

What we are most familiar with. It is a method of controlling software using onscreen icons, menus, dialog boxes, and objects that can be moved or resized, usually with a pointing device such as a mouse.

What is the definition of Medium in relation to a data network?

how the devices are connected together


संबंधित स्टडी सेट्स

Chapter 20: Population and Urbanization, Chapter 22: Social Change and the Environment

View Set

Vocabulary Rows of ア・カ・サ・タ・ガ・ザ・ダ

View Set

Ap world history : Modern Learning objectives

View Set

Wordly Wise 3000, Book 4 Lesson 12

View Set

Refraction occurs when light passing from one medium to another

View Set

Systems Theory and Family Therapy

View Set

Exam 3 Study Guide Chapters 8,9,10, 11,12

View Set