CNT 120 Midterm Quiz 1-3 combo

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the MDF?

" MDF (main distribution frame or main distribution facility) Also known as the main cross connect, the centralized point of interconnection between an organization's LAN or WAN and a service provider's facility."

A physical topology in which every node on the network is connected through a central device.

Star

Select the correct name for the topology shown in the above picture.

Star

What is SNAT?

Static Network Address Translation or Source Network Address Translation - A type of address translation in which a gateway assigns the same public IP address to a host each time it makes a request to access the Internet.

23

TELNET

The _______protocol is most commonly used by computers as they are booting up to request configuration files from another computer on the local network.

TFTP

The ____________ Commercial Building Wiring Standard, or structured cabling, describes a uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system.

TIA/EIA-568

this portion of the email address .edu

TLD

A good guideline to follow on network documentation is to label every data jack or port, patch panel or punchdown block, connector or circuit.

TRUE

A good guideline to follow on network documentation is to use color-coded cables for different purposes and record the color schemes in your documentation.

TRUE

The _____ field identifies how long a record should be saved in cache on a server.

TTL

What is the TTL field?

TTL Time to Live - A field that indicates the maximum duration that an IPv4 packet can remain on the network before it is discarded. Although this field was originally meant to represent units of time, on modern networks it represents the number of times a packet can still be forwarded by a router, or the maximum number of router hops remaining.

When dealing with DNS records What is a "TXT Record"? Use?

TXT (Text) record - A type of DNS data record that holds any type of free-form text. It might contain text designed to be read by humans regarding network, server, or accounting issues.

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.

Telnet

Rack systems provide mounting hardware for network equipment to optimize the use of square footage in equipment rooms. Equipment racks are measured in Rack Units or ____, with the industry standard being 42__ tall.

U

FC00:: /7l ;FD00:: /8

Unique local unicast

What is UDP?

User Datagram Protocol - A core protocol in the TCP/ IP suite that does not guarantee delivery because it does not first make the connection before sending data or check to confirm that data is received.

Troubleshooting step 6

Verify the functionality and implement preventive measures

What is VoIP? Equipment needed?

Voice over IP - The provision of telephone service over a packet-switched network running the TCP/IP protocol suite.

covers usually a "city-wide" area

WAN

Wearable equipment such as goggles that might be required in the workplace to increase safety of workers."

Wearable equipment such as goggles that might be required in the workplace to increase safety of workers."

What is a telnet service?

a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network (such as the internet). Using telnet client software on your computer, you can make a connection to a telnet server (that is, the remote host).

patch cable

a relatively short cable (3 to 25 feet) length with connectors at both ends - used to connect user device to a data outlet

What equipment is needed for a VoIP?

an IP phone, a working high-speed internet connection, and a subscription to a business VoIP provider—because VoIP piggy backs on to a users existing infrastructure.

A(n) ________ address can identify multiple destinations, with packets delivered to the closest destination (closet DNS server for example)

anycast

What is a "Data Room"?

are spaces used for housing data, usually of a secure or privileged nature. They can be physical data rooms, virtual data rooms, or data centers. They are used for a variety of purposes, including data storage, document exchange, file sharing, financial transactions, legal transactions, and more.

cable trays

are usually metal trays built into equipment racks, office desks, or even along the ceiling to help collect cables into a single track.

cinch cables loosely - avoid cinching cables tightly - why?

avoid cinching cables so tightly with cable ties that you squeeze their outer covering, a practices that leads to difficult-to-diagnose data errors.

protect cables - avoid laying cables across floor - why?

avoid laying cable across the floor where it might sustain damage from rolling chairs or foot traffic. If you must take this tack, cover the cable with a cable protector or cord cover.

Red Wiring that is between floors/closets - typically fiber optic cabling

backbone or vertical wiring

A topology in which a single cable connects all nodes on a network without intervening connectivity devices.

bus

Whewre is Bus Topology used ?

by Ethernet networks

what is meant by documentation?

cable documentation lable every jack or port use color cables different update documentation"

What makes up an entrance facility?

cables, connecting hardware, protection devices and other equipment needed to connect outdoor cables to indoor cables

MSA - master service agreement

contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangments

A(n) ________ address specifies a single node on a network.

unicast

What is UTP?

unshielded twisted pair- A type of copper-based cable that consists of one or more insulated twisted-pair wires encased in a plastic sheath, which does not contain additional shielding for the twisted pairs.

verify continuity

use a cable tester to verify that each segment of cabling you install transmits data reliably. because it will prevent you from having to deal with problems later onThis practice help track down errors in multiple, long stretches of cable. use a cable tester to verify continuity

patch panels

use patch panels to organize and connect lines.patch panel is a rack-mounted panel of data receptors.-help keep lines organized as they run from walls to racks to network devices, and they make it easy to switch out patch cables of variable lengths when devices are moved or changed.

PTR record

used for reverse lookups - when you know the IP and need the Name

The following are advantages of a Client-Server network:

user accounts and passwords to the network are assigned in one place;access to multiple shared resources can be centrally granted to a single user or groups of users;problems on a network can be monitored, diagnosed, and often fixed from one location;network is scalable

Termination - don't leave more than 1" of stripped cable - why?

when terminating twisted-pair cabling, don't leave more than 1 inch of exposed (stripped) cable before a twisted-pair termination.

What is an NOS? (Network Operating System) What are some examples?

which control access to the entire network. Examples of NOSes are Windows Server 2016, Ubuntu Server, and Red Hat Enterprise Linux (Ubuntu and Red Hat are versions of Linux).

What is a client-server network model?

which is sometimes called the client-server architecture or client-server topology), resources are managed by the NOS via a centralized directory database (see Figure 1-2). The database can be managed by one or more servers, so long as they each have a similar NOS installed.

A ________________, which is a graphical representation of a network's wired infrastructure. In it's most detailed form, it shows every wire necessary to interconnect network devices and the location of those wires.

wiring schematic

MLA - master license agreement

grants a license from a creator, developer, or producer, such as a software producer, to a third party for the purposes of marketing, sublicensing, or distributing the product to consumers as a stand-alone product of as a part of another product

What is a domain name?

hacc.edu

CNAME record

holds alternative names for a host

Blue Wiring from the closets out to the work area - typically copper cabling

horizontal wiring

MX record

identifies a mail server and is used for email traffic

UNIX or Linux command to view and edit the IP information on a computer

ifconfig

The term ____________ refers to the monitoring and maintaining of all the assets that make up a network.

inventory management

On a Windows computer, you can use the ___________ utility in a command prompt window to find out the current TCP/IP settings on that computer.

ipconfig

displays the currently assigned IP address

ipconfig

displays the currently assigned IP address, the address of the DNS server, DHCP leasing information, and the MAC address of the NIC

ipconfig /all

Where can this be located? How can you find IPv6 address of a machine? What command is used?

ipconfig /all Find your Ethernet adapter Ethernet, locate row IPv4 Address and IPv6 Address

any dynamically assigned IP address lease is cleared

ipconfig /release

re-establishes a dynamically assigned IP address lease from the DHCP server

ipconfig /renew

When dealing with setting Static IP Addresses, What is the subnet mask - use/meaning?

is a number that defines a range of IP addresses that can be used in a network. ... A subnet mask hides, or "masks," the network part of a system's IP address and leaves only the host part as the machine identifier. A common subnet mask for a Class C IP address is 255.255.255.0.

What is an interative query?

is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server responds to with the IP address from its zone file cache, if possible. ... Iterative requests are made by both iterative DNS servers and recursive DNS servers.

What is a caching DNS server

is a server that handles recursive requests from clients.

What is the namespace?

is a set of symbols that are used to organize objects of various kinds, so that these objects may be referred to by name. In Java, a namespace ensures that all the identifiers within it must have unique names so that they can be easily identified. In order to manage the namespace Java provides the mechanism of creating Java packages

What are the name servers?

is a specific server tasked with the role of turning internet host names into internet addresses. ... Your computer makes use of DNS to search the name servers for webaddress.com. ns1.webaddress.com and ns2.webaddress.com are retrieved as the nameservers for the domain

What is a use for a Dynamic IP Address?

is a temporary IP address that is assigned to a computing device or node when it's connected to a network. A dynamic IP address is an automatically configured IP address assigned by a DHCP server to every new network node.

What is a Port #?

is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server. For the Transmission Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer that is put in the header appended to a message unit.

What is a plenum?

is an air-distribution box attached directly to the supply outlet of the HVAC equipment that heats or cools the air to make the house comfortable. The ductwork that distributes the heated or cooled air to individual rooms of the house connects to the plenum

What is significant about ..... 255.255.255.255

is the broadcast address for a device that doesn't know (or perhaps just doesn't care) what network it's on. The local TCP/IP stack will convert it to a layer 2 (usually Ethernet) broadcast, so it will go to everyone on the local segment.

bend radius

is the radius of the maximum arc into which you can loop a cable without impairing data transmission. A twisted-pair cable's bend radius is equal to or greater than four times the diameter of the cable. - generally TP cabling bend radius is 4x cable diameter - why?

SLA - service level agreement

legally binding contract that defines in plain language and in measurable terms, the aspects of a service provided to a customer, such as service provided by ISP

A(n) ________ address can be used for communicating with nodes in the same link, and is similar to an autoconfigured APIPA address in IPv4.

link local

The Data Link Layer address is more commonly called the ______ Address.

mac

An NOS is a special type of software designed to:

manage data and other resources for a number of clients;ensure that only authorized users access the network;control which type of files a user can open;restrict when and from where users can access the network;dictate which rules computers will use to communicate;supply applications and data files to clients

What is an MLA? Purpose?

master license agreement - A contract that grants a license from a creator, developer, or producer, such as a software producer, to a third party for the purposes of marketing, sublicensing, or distributing the product to consumers as a stand-alone product or as part of another product.

What is an MSA? Purpose?

master service agreement - A contract that defines terms of future contracts.

slack in cable runs

measure first, and always leave some slack in cable runs. Stringing cable too tightly risks connectivity and data transmission problems.

What is an MOU? Purpose?

memorandum of understanding - A document presenting the intentions of two or more parties to enter into a binding agreement, or contract. The MOU is usually not a legally binding document (although there are exceptions), does not grant extensive rights to either party, provides no legal recourse, and is not intended to provide a thorough coverage of the agreement to come.

A type of network in which several nodes are directly interconnected and no single node controls communications on the network.

mesh

Where is Star Topology used

most common type of topology used in homes and offices. This type of topology is where all of the computers and devices on the network connect to a central device, thus forming a star. The central device that provides a common connection point for nodes on the network is called a hub.

A(n) ________ address is used so that packets are delivered to all nodes in a specific _______ group (all routers for example .. or ... all nodes in a video conference).

multicast

Class "D" IPv4 Addresses begin with octets 224 to 239 and are used for __________ transmissions, in which one host sends a message to multiple participants.

multicast

_______________ are graphical representations of a network's devices and connections.

network diagrams

LAN Adapter?"

network interface card - The device that enables a workstation to connect to the network and communicate with other computers. NICs are manufactured by several different companies and come with a variety of specifications that are tailored to the workstation's and the network's requirements. NICs are also called network adapters.

_______________ is the process of discovering and identifying the devices on a network.

network mapping

The following are disadvantages of a Peer-to-Peer network:

not scalable; not secure; not practical for more than a few computers

Refer to the exhibit. Which of the following command is likely to show the required output?

nslookup

The _______ command allows you to query the DNS database from any computer on a network to find the host name of a device by specifying its IP address, or vice versa.

nslookup

What is nslookup? How is it useful? How do you use?

nslookup (name space lookup - A TCP/IP utility that allows a technician to query the DNS database from any computer on the network and find the host name of a network node by specifying its IP address, or vice versa. This ability is useful for verifying that a host is configured correctly and for troubleshooting DNS resolution problems. "

This is a panel of data receptors which can be mounted to a wall or a rack which provides a central termination point when many patch cables converge in a single location.

patch panel

grounding

pay attention to grounding requirements and follow them religiously. electrical currents is that it protects your appliances, your home and everyone in it from surges in electricity. If lightning was to strike or the power was to surge at your place for whatever reason, this produces dangerously high voltages of electricity in your system.

The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.

physical

The _______ command used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.

ping

ping an IPv6 address from a windows computer

ping -6

continue pinging until interrupted

ping -t

ping the loopback of a node to determine whether your workstations TCP/IP services are running

ping 127.0.0.1

ping a host using its host name to verify you have connectivity between the nodes

ping www.google.com

ping an IPv6 address from a Linux computer

ping6

When installing cable in a building .... if the cable is to be installed in the air space above the ceiling tile or below a raised floor, the cable must be ______-rated cable.

plenum

To conserve its Public IP addresses, a company can use __________ IP addresses on its own personal network - that is, networks that do not directly connect to the Internet.

private

What is a PBX?

private branch exchange - is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines.

What is an installation? Use?

program or installer is a computer program that installs files, such as applications, drivers, or other software, onto a computer

The methods and rules for communication on a network are called _______________.

protocols

Class A, B and C licensed IP addresses are available for use on the Internet and are therefore called ____________ IP addresses.

public

A ________________ shows the devices stacked in a rack system and are typically drawn to scale.

rack diagram

What is meant by cable management?

refers to management of electrical or optical cable in a cabinet or an installation. The term is used for products, workmanship or planning. ... Cable management both supports and contains cables during installation, and makes subsequent maintenance or changes to the cable system easier.

A ___________ is a DNS client that requests information from DNS name servers.

resolver

A network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle. Data is transmitted in one direction around the ring. Each node accepts and responds to packets addressed to it, then forwards the other packets to the next node in the ring.

ring

DNS name servers are organized in a hierarchical structure. A __________ holds information used to locate top-level domain (TLD) servers.

root server

a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet

router

Transport Layer

segments

When dealing with setting Static IP Addresses, What is the default gateway - use/meaning?

serves as an access point or IP router that a networked computer uses to send information to a computer in another network or the internet. Default simply means that this gateway is used by default, unless an application specifies another gateway.

What is an SLA? Purpose?

service-level agreement - A legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer. Specific details might include contract duration, guaranteed uptime, problem management, performance benchmarks, and termination options.

The following are advantages of a Peer-to-Peer network:

simple to configure and less expensive

A _________consists of host's IP address and the port number of an application running on the host, with a colon separating the 2 numbers. (Ex: 10.43.3.87:23)

socket

company standards

standard cable use by organization and maintain lists of approved cabling vendors. besides cabling standards, adhere to company standards on color codes, types

The structured cabling standard describes the best way to install networking media to maximize performance and minimize upkeep. Structured cabling is based on a hierarchical design and assumes a network is based on a ________ topology.

star

What is an SOW? Purpose?

statement of work - A document that details the work that must be completed for a particular project, including specifics such as tasks, deliverables, standards, payment schedule, and work timeline. An SOW is legally binding, meaning it can be enforced in a court of law.

manually assigned by network administrator

static IP address

A record

stores the name-to-address mapping for a host - using IPv4 Addresses

AAAA record

stores the name-to-address mapping for a host - using IPv6 Addresses

The _________ is a 32 Bit number that identifies which portion of the IP address is the network portion, (what portion is subnet - if there is any subnetting), and what portion is host portion.

subnet mask

a network port used to attach a device to a network and allow it to send and receive data on the network

switch

The process of designing, implementing, and maintaining an entire network is called the ______________. A major part of this process is the removal and disposal of outdated assets, and the addition of compatible, updated devices.

system life cycle

backbone cable

the cables or wireless links that provide inter-connection between the entrance facility and MDF, and between MDF and IDF - this is often fiber-optic cable

horizontal cable

this is the cabling used to connect workstations to the closet data room and to switches housed in the room - maximum allowable length is 100 meters

Where is Ring Topology used ?

to as the topology for the backbone (sometimes called a city ring) to connect the customers. In that case the ring is used in both directions to have two distinctive paths to the public switch.

Rack systems provide mounting hardware for network equipment to optimize the use of square footage in equipment rooms. Equipment racks come in standard ____ -inch frame, meaning the front is ______inches wide.

19

Install twisted pair copper cable at least _____ feet away from fluorescent lights, power lines and motors to avoid possible interference caused by these devices.

3

An IPv4 address is a ____ bit number that is commonly written as a dotted decimal number (4 numbers that range from 0 to 255, and each number separated by a decimal point).

32

What is an IPv4 Address? How many bits? Example of ?

32 bits - are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (an octet) of the address

Generally, a twisted-pair cable's bend radius is equal to or greater than _____ times the diameter of the cable.

4

What is a 4-post rack? Typically used for?

4-post racks are made to carry heavier IT equipment, such as full servers, large routers and switches. They feature a frame with four vertical upright rails, often with adjustable depth to work with a variety of IT equipment

This is an older connection block used primarily for telephone connections.

66 block

This is an older connection block used primarily for telephone connections. 66 block

66 block

Extension ID or Device ID

9d:68:16

What is a 2-post rack? Typically used for?

A 2-Post rack, often referred to as a telco rack or a relay rack, is a type of equipment rack that has two vertical upright support beams. They are most commonly used for IT equipment that is not very heavy such as punch down panels, switches, etc.

What is a recursive query?

A DNS query that demands a resolution or the response that the information can't be found.

What is a Root Server?

A DNS server maintained by ICANN and IANA that is an authority on how to contact the top-level domains, such as those ending with .com, .edu, .net, .us, and so on. ICANN oversees the operation of 13 clusters of root servers around the world.

In a LAN, What is a router ?

A Layer 3 device that uses logical addressing information to direct data between two or more networks and can help find the best path for traffic to get from one network to another.

patch

A correction, improvement or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched.

What is a patch? Use?

A correction, improvement, or enhancement to part of a software application, often distributed at no charge by software vendors to fix a bug in their code or to add slightly more functionality.

What is a firewall?

A device (either a router, a dedicated device, or a computer running special software) that selectively filters or blocks traffic between networks.

What is an RFP? Purpose?

A document requesting that vendors submit a proposal for a product or service that a company wants to purchase.

What is a rack diagram?

A drawing that shows the devices stacked in a rack system and is typically drawn to scale.

What is Remote Desktop ?

A feature of Windows Server 2008 and later editions of Windows Server that allows technicians to manage remote applications.

What is Remote Desktop Services?

A feature of Windows Server 2008 and later editions of Windows Server that allows technicians to manage remote applications.

What is fiber optic?

A form of cable that contains one or several glass or plastic fibers in its core. Data is transmitted via a pulsing light sent from a laser or LED (light-emitting diode) through the central fiber or fibers.

What is a network diagram?

A graphical representation of a network's devices and connections.

What is a wiring schematic?

A graphical representation of a network's wired infrastructure.

What is a socket? Example of a socket?

A logical address consisting of a host's IP address and the port of an application running on the host with a colon separating the two values.

What is IMAP4 ?

A mail retrieval protocol that allows users to store messages on the mail server. The most current version of IMAP is version 4 (IMAP4)."

upgrade

A major change to a software package that enhances functionality and features of the software.

What is Structured Cabling?

A method for uniform, enterprise-wide, multivendor cabling systems specified by the TIA/EIA 568 Commercial Building Wiring Standard. Structured cabling is based on a hierarchical design using a high-speed backbone.

What is a peer-to-peer network model?

A network in which every computer can communicate directly with every other computer. By default, no computer on a P2P network has more authority than another.

What is Ring Topology

A network layout in which each node is connected to the two nearest nodes so that the entire network forms a circle. Data is transmitted in one direction around the ring. Each node accepts and responds to packets addressed to it, then forwards the other packets to the next node in the ring.

What is a WAN?

A network that spans a long distance and connects two or more LANs.

What are protocols?

A standard method or format for communication between network devices.

What is TCP/IP?

A suite of networking protocols that includes TCP, IP, UDP, and many others. TCP/IP provides the foundation for data exchange across the Internet.

What is TELNET ?

A terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol.

What is Bus Topology

A topology in which a single cable connects all nodes on a network without intervening connectivity devices.

What is a unicast address? Use?

A type of IPv6 address that represents a single node on a network.

What is a multicast address? Use?

A type of IPv6 address that represents multiple interfaces, often on multiple nodes.

Connection-oriented - what is that?

A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data.

What is Mesh Topology

A type of network in which several nodes are directly interconnected and no single node controls communications on the network.

What is "dual-stacked"?

A type of network that supports both IPv4 and IPv6 traffic.

What is a 110 Block? Typically used for?

A type of punchdown block designed to terminate Cat 5 or better twisted-pair wires and typically used to handle data connections rather than telephone connections. The numeral 110 refers to the model number of the earliest blocks.

What is a 66 Block? Typically used for?

A type of punchdown block designed to terminate telephone connections. The numeral 66 refers to the model number of the earliest blocks. A 66 block is a type of punchdown block used to connect sets of wires in a telephone system. They have been manufactured in three sizes, A, B, and M. A and B have six clips in each row while M has only 4

What is a Patch Panel? Use?

A wall- or rack-mounted panel where cables converge in one location.

What are wall jacks?

A work area often contains wall jacks. The TIA/EIA standard calls for each wall jack to contain at least one voice and one data outlet, as pictured in Figure 2-10. Realistically, you will encounter a variety of wall jacks. For example, in a student computer lab lacking phones, a wall jack with a combination of voice and data outlets is unnecessary.

What is an anycast address? Use?

A+B165:C196 type of IPv6 address that represents a group of interfaces, any one of which (and usually the first available of which) can accept a transmission. At this time, anycast addresses are not designed to be assigned to hosts, such as servers or workstations, but rather to routers.

which type of ip is this 169.254.0.23

APIPA Address

_______________ is the centralized directory database that contains user account information and security for the entire group of computers.

Active Directory

What is Active Directory?

Active Directory stores data as objects. An object is a single element, such as a user, group, application or device, such as a printer. Objects are normally defined as either resources -- such as printers or computers -- or security principals -- such as users or groups.

When dealing with DNS records What is an "A" record? Use?

Address) record - A type of DNS data record that maps the IPv4 address of an Internet-connected device to its domain name.

What is a Dynamic IP Address?

An IP address that is assigned to a device upon request and may change when the DHCP lease expires or is terminated. Dynamic means "constantly changing." The prefix dyna means power; however, dynamic IP addresses aren't more powerful, but they can change (or be changed).

What is a link local address? Use?

An IP address that is automatically assigned by an operating system to allow a node to communicate over its local subnet if a routable IP address is not available.

What is a Static IP Address?

An IP address that is manually assigned to a device and remains constant until it is manually changed. Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.

What is a Public IP Address?

An IP address that is valid for use on public networks, such as the Internet.

What is a global address? Use?

An IPv6 address that can be routed on the Internet. These addresses are similar to public IPv4 addresses. Most global addresses begin with the prefix 2000::/3, although other prefixes are being released.

What are Remote Applications ?

An application that is installed and executed on a server, and is presented to a user working at a client computer.

What is ifconfig?

An interface configuration and management utility used with UNIX and Linux systems.

What is a forwarding DNS server

An optional server that receives queries from local clients but doesn't work to resolve the queries.

In a LAN, what is a hub?

An outdated connectivity device that belongs to the Physical layer of the OSI model and retransmits incoming data signals to its multiple ports.

What is a use for a Static IP Address?

Another way to think of a static IP address is to think of something like an email address, or a physical home address. These addresses don't ever change. They're static, which makes contacting or finding someone very easy. Similarly, a static IP address is useful if you host a website from home, have a file server in your network, are using networked printers, are forwarding ports to a specific device, are running a print server, or if you use a remote access program. Because a static IP address never changes, other devices always know exactly how to contact a device that uses one."

describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)

Application

Layer 7

Application Layer

What is APIPA / address?

Automatic Private IP Addressing - A service available on Windows computers that automatically assigns the computer's NIC a link-local IPv4 address in the range of 169.254.0.1 through 169.254.255.254.

The most popular DNS server software is ________ which is free, open source software that runs on Linux, UNIX and Windows platforms.

BIND

Physical Layer

Bits

which type of ip is this 255.255.255.255

Broadcast

Select the correct name for the topology shown in the above picture.

Bus

67 & 68

DHCP

A _________ Server manages the dynamic distribution of IP addresses to devices on a network.

DHCP

The area between firewalls is called a _______.

DMZ

53

DNS

_____ is an application layer client-server system of computers and databases designed to associate computer names with IP Addresses.

DNS

Application Presenation and Session layer

Data

responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)

Data Link

Layer 2

Data Link Layer

What are Client-server applications?

Data or a service requested by one computer from another.

What is DNAT?

Destination Network Address Translation - A type of address translation in which a gateway has a pool of public IP addresses that it is free to assign to a local host whenever the local host makes a request to access the Internet.

A LAN is defined as a group of computers and other devices that can directly address each other without going through a router. A LAN which consists of all the nodes a broadcast reaches, can be referred to as a broadcast domain. Routers _______________ broadcast messages, thus creating a boundary for a LAN.

Do Not Forward

Troubleshooting step 7

Document findings, actions and outcomes

dbrown.hacc.edu is an example of a __________________.

Domain Name

What is DNS? What is it used for?

Domain Name System or Domain Name Service - A hierarchical way of tracking domain names and their addresses, devised in the mid-1980s.

What is DHCP? What is DHCP used for?

Dynamic Host Configuration Protocol - An Application layer protocol in the TCP/IP suite that manages the dynamic distribution of IP addresses on a network.

Fluorescent lights, power lines and motors can all be sources of interference called ________ that can cause problems if they are too close to twisted pair copper cabling.

EMI

If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.

ESD

Troubleshooting step 2

Establish a theory of probable cause

is an example of a __________________.

FQDN

20 & 21

FTP

______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.

FTP

What is FTP ?

File Transfer Protocol- An Application layer protocol used to send and receive files via TCP/IP."

Data Link Layer

Frames

What is significant about ..... 169.254.x.x

Generally, a 169 IP address means that your computer wasn't able to talk to a DHCP server. Usually that means that your router is wedged and needs to be rebooted, or that your Wi-Fi isn't working at all. A good starting point is to reboot your router and your laptop

What is a rack system?

Generally, racks come in two-post and four-post varieties, though six-post racks are also available. They can also be open-framed, which provides greater accessibility, or enclosed, which provides greater protection

2000:: /3

Global unicast

80

HTTP

The primary protocol used by Web servers and browsers (without a layer of security) is _________.

HTTP

What is HTTP ?

HTTP (Hypertext Transfer Protocol) An Application layer protocol that formulates and interprets requests between web clients and servers.

443

HTTPS

When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.

HTTPS

What is HTTPS ?

HTTPS (HTTP Secure) The URL prefix that indicates a web page requires its data to be exchanged between client and server using SSL or TLS encryption.

What is a logical topology?

Has to do with software and how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources, such as applications and databases, are shared on the network.

dbrown is an example of what part of the address

Host Name

What is a topology?

How the parts of a whole work together.

The organization responsible for tracking the assignment of port #'s, domain names, and IP Addresses is __________.

IANA

Who is the authority on Domain Names?

ICANN

This provides an intermediate connection between the MDF and the end-user equipment on each floor and in each building.

IDF

Closet B

IDF - intermediate distribution frame

The Network Layer address is more commonly called the ______ Address.

IP

a network, an IP Address is required in order for a device to communicate _________ its local network through a gateway device such as a router.

IP Address

What is a Private IP Address?

IP addresses that can be used on a private network but not on the Internet. IEEE recommends the following IP address ranges for private use: 10.0.0.0 through 10.255.255.255; 172.16.0.0 through 172.31.255.255; and 192.168.0.0 through 192.168.255.255.

What type of address is 88:1f::a1:0d:6b:24

IPv4

What is IP?

Internet Protocol - A core protocol in the TCP/IP suite that operates in the Network layer of the OSI model and provides information about how and where data should be delivered. IP is the subprotocol that enables TCP/IP to internetwork.

a query where the local server issues queries to other servers ... and ...other servers only provide information if they have it (there is no demand for an answer)

Iterative

It is impractical to install a console for every device in a rack. Typically. racks have one or more __________, which connects to a single console to provide a central control portal for all devices on the rack.

KVM switch

covers a very large area (between cities and even continents)

LAN

What is LDAP? Used for?

Lightweight Directory Access Protocol - A standard protocol for accessing network directories.

FE80:: /64

Link Local unicast

The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.

Logical

Refer to the exhibit. Which of the following type of diagram is being depicted?

Logical network topology

the following ip 127.0.0.1 is an example of which type

Loopback Address

"Viewing the picture shown below ..... The Red Arrow that is on the bottom 1/2 of the screen is pointing to what type of address?"

MAC

A _______ Address is embedded on every NIC and is assumed to be unique to that NIC. It is 48 Bits in length, written as 6 HEX numbers separated by colons. Nodes on a LAN find each other by using the ______ Address.

MAC

MAC Addresses are used for communication ____________

MAC Address

covers a relatively small area (room, floor, building)

MAN

Also know as the MC (main cross-connect) ... this is the centralized point of interconnection for an organization's LAN or WAN.

MDF

Closet A

MDF - main distribution frame

What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?

MSDS

When dealing with DNS records What is a "MX Record"? Use?

Mail Exchanger record - A type of DNS data record that identifies a mail server and that is used for email traffic.

What is a MAC Address? How many bits? Example of?

Media Access Control) address - A method of access control where resources are organized into hierarchical classifications, such as "confidential" or "top secret," and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user's classification and category match those of a resource, then the user is given access. Media Access Control, address is a globally unique identifier assigned to network devices, and therefore it is often referred to as hardware or physical address. MAC addresses are 6-byte (48-bits) in length, and are written in MM:MM:MM:SS:SS:SS format."

Select the correct name for the topology shown in the above picture.

Mesh

What are the airflow considerations for racks?

Minimizing cable clutter can help prevent airflow blockages and heat buildup. Data rooms are often serviced by HVAC systems that are separate from the rest of the building. The On the Job story at the beginning of this chapter gave a good example of why this is necessary. Specialized products are available that monitor the critical factors of a data room's environment. For example, ITWatchDogs offers several environmental monitoring products that can alert technicians to unacceptable temperature, humidity, or airflow conditions, and can also send text or email alerts when a secure door is left open, when the power supply is compromised, or even when light and sound conditions are unacceptable

What is a physical topology?

Mostly refers to a network's hardware and how computers, other devices, and cables fit together to form the physical network.

FF00:: /8

Multicast

_______ is a technique designed to conserve public IP addresses needed by a network. A gateway device that stands between a private network and other networks substitutes the private IP address used by computers on the private network with its own public IP address when these computers need access to other networks or the Internet.

NAT

receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to to the destination node

NIC

The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)

NOS (Network Operating System)

123

NTP

The _______protocol is used to synchronize clocks on computers throughout a network.

NTP

When dealing with DNS records What is a "NS record"? Use?

Name Server record - A DNS lookup file that indicates the authoritative name server for a domain. It's mostly used for delegating subdomains to other name servers.

responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)

Network

What is NAT

Network Address Translation - A technique in which IP addresses used on a private network are assigned a public IP address by a gateway when accessing a public network.

Layer 3

Network Layer

What is NTP? Used for?

Network Time Protocol - A simple Application layer protocol in the TCP/IP suite used to synchronize the clocks of computers on a network. NTP depends on UDP for Transport layer services.

_______________ is a utility that can assist with discovering and identifying the devices on a network.

Nmap

Electrical and tool safety in workplaces are is generally regulated by______.

OSHA

_______ is a process of assigning a TCP port number to each ongoing session between a local host and Internet host.

PAT

110

POP3

What is POP3 ?

POP3 Post Office Protocol, version 3- An Application layer protocol used to retrieve messages from a mail server. When a client retrieves mail via POP, messages previously stored on the mail server are downloaded to the client's workstation, and then deleted from the mail server. The most commonly used form of POP is POP3."

The recipient's email server delivers the email message to the receiving client by using the _________ protocol.

POP3 or IMAP4

What is ping? How is it useful?

Packet Internet Groper - A TCP/IP troubleshooting utility that can verify TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network. Ping uses ICMP to send echo request and echo reply messages.

Network Layer

Packets

The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.

Peer-to-Peer

simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)

Physical

Layer 1

Physical Layer

When dealing with DNS records What is a "PTR record"? Use?

Pointer record - A type of DNS data record that is used for reverse lookups, to provide a host name when the IP address is known.

A _______ is a number used by the transport layer to find an application. It identifies one application among several that might be running on a host.

Port

What is PAT?

Port Address Translation - A form of address translation that assigns a separate TCP port to each ongoing conversation, or session, between a local host and an Internet host.

____________ ensure that data is transmitted to the correct application among other applications running on a computer.

Port numbers

What "monitoring" should be done in your cable plant?

Power, environment - temp/humidty, etc....)

responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)

Presentation

Layer 6

Presentation Layer

which type of ip is this 10.0.0.35

Private IP Address

which type of ip is this 172.16.0.35

Private IP Address

which type of ip is this 192.168.0.35

Private IP Address

In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.

RDP

What is a "U" or "RU" ?

Rack height is measured in rack units (RU or U) with the industry standard being 42U tall—about 6 feet. Half-racks are usually 18U-22U tall

a query that demands a resolution or the answer "It can't be found"

Recursive

How do you set your PC to get an IPv4 Address from a DHCP Server?

Right Click Windows Start to open the context menu. From the menu, click "Control Panel". Select Network and Sharing Center. Select Change adapter settings. Select Etherent. Select Properties. Tab on Internet Protocol Version 4 (TCP/Ipv4), then click on Properties

Select the correct name for the topology shown in the above picture.

Ring

The _______protocol is a signaling protocol used to make an initial connection between hosts but it does not participate in the data transfer during the session. (Typically used for setting up VoIP calls)

SIP

The _______protocol was used by earlier Windows OS for file sharing on networks. UNIX uses a version of ______ in its Samba software, which can share files with other operating systems, including windows systems.

SMB

25

SMTP

The primary protocol used by clients to send an email message is the _________ protocol.

SMTP

22

SSH

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.

SSH

What is SSL or TLS?

SSL (Secure Sockets Layer) A method of encrypting TCP/IP transmissions—including web pages and data entered into web forms—en route between the client and server using public key encryption technology.

What security should be done in your cable plant?

Security cameras, badge readers, etc.....)

What is SMB? Used for?

Server Message Block - A protocol for communications and resource access between systems, such as clients and server

When dealing with DNS records What is a "SRV Record"? Use?

Service record - A type of DNS data record that identifies the hostname and port of a computer hosting a specific network service besides email, such as FTP or SIP.

describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

Session

What is SIP? Used for?

Session Initiation Protocol - A signaling protocol that is used to make an initial connection between hosts but that does not participate in data transfer during the session.

Layer 5

Session Layer

MAC Address format - What is the OUI (or block ID ... or company ID)?

Short for Organizational Unique Identifier, the first 24 bits of a MAC address for a network-connected device, which indicate the specific vendor for that device. The IEEE assigns OUIs to vendors. (The last 24 bits of the MAC address are the devices unique serial number, assigned to the device by the manufacturer.)

What is SMTP ?

Simple Mail Transfer Protocol - An Application layer protocol responsible for moving messages from one email server to another.

The following number: 192.168.100.50:23 Is an example of which of the following choices?

Socket

What is STP?

Spanning Tree Protocol - A switching protocol defined by the IEEE standard 802.1D that functions at the Data Link layer and prevents traffic loops by artificially blocking the links that would complete a loop.

3 most common domain types

.net .com .edu

What is a MAC Address? Where is it located?

"(Media Access Control) address A method of access control where resources are organized into hierarchical classifications, such as "confidential" or "top secret," and grouped into categories, perhaps by department. Users, then, are also classified and categorized. If a user's classification and category match those of a resource, then the user is given access."

What is a common procedure?

"1. Submit a change request document 2. Follow process 3. Change is project managed 4. Provide documentation 5. Close the change

What is OSHA?

"Occupational Safety and Health Administration The main federal agency charged with regulating safety and health in the workplace."

What is RDP ?

"Remote Desktop Protocol -An Application layer protocol that uses TCP/IP to transmit graphics and text quickly over a remote client-host connection. RDP also carries session, licensing, and encryption information."

What is ARP?

"Resolution Protocol - A core protocol in the TCP/IP suite that belongs in the Data Link layer of the OSI model. ARP works in conjunction with IPv4 to discover the MAC address of a node on the local network and to maintain a database that maps local IP addresses to MAC addresses.

What is SFTP ?

"Secure Hash Algorithm-A hash algorithm originally designed by the NSA to eliminate the inherent weaknesses of the older MD5 hash. The most recent iteration is SHA-3, developed by private designers for a public competition in 2012."

What is SSH ?

"Secure Shell- A connection utility that provides authentication and encryption. SSH is often used to log onto a host, execute commands on that host, and copy files to or from the host."

What is used for protection? What is the danger?What is ESD used for protection? What is the danger?

"Short for electrostatic discharge, ESD is one of the few things you can do to damage or destroy your computer or parts in your computer. Like the shock you receive when rubbing your feet on the carpet and touching something metal, ESD can occur when working in your computer and can cause damage to components.

What is SNMP? Used for?

"Simple Network Management Protocol) - An Application layer protocol in the TCP/IP suite used to monitor and manage devices on a network."

What is TCP and how is it used?

"Transmission Control Protocol) - A core protocol of the TCP/IP suite that makes a connection with the end host, checks whether data is received, and resends it if it is not."

Connectionless - what is that?

"connection-oriented protocol - A type of Transport layer protocol that requires the establishment of a connection between communicating nodes before it will transmit data. connectionless protocol- A type of Transport layer protocol that services a request without requiring a verified session and without guaranteeing delivery of data."

What is the demarc?

"demarcation point) The point of division between a telecommunications service carrier's network and a building's internal network."

What is ESD?

"electrostatic discharge - The transfer of electrical charge between two bodies, such as when a technician touches a computer component."

plenum cabling - if cable is run in a plenum space, use plenum rated cable - why?

"if you run cable in the plenum, the area above the ceiling tile or below the subflooring, make sure the cable sheath is plenum-rated, and consult with local electric installation codes to be certain you are installing it correctly. A plenum rated cables is coated with a flame-resistant jacket that produces less smoke than regular cable coated with PVC (polyvinyl chloride) In the event of a fire, smoke produced by plenum cabling is less toxic than that produced by PVC cabling.

avoid EMI - install cable at least 3 feet from fluorescent lights or sources of EMI - why?

"install cable at least 3 feet away from fluorescent lights or other sources of EMI.

What is an IDF?

"intermediate distribution frame -A junction point between the MDF and concentrations of fewer connections— for example, those that terminate in a data closet."

What is LAN?

"local area network) A network of computers and other devices that typically is confined to a relatively small space, such as one building or even one office. Each node on a LAN can communicate directly with others on the same LAN."

What is a MAN?

"metropolitan area network) - A network of connected LANs within a limited geographical area, such as multiple city government buildings around a city's center."

What is PPE ?

"personal protective equipment -

When dealing with setting Static IP Addresses, What is the DNS Server - use/meaning?

(Domain Name System) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name.

What standard is used to specify Structured Cabling?

(TIA/EIA-568-C)

OUI or Block ID or Company ID

00:0a:95

What is an xample of a TLD?

.com, .org, .net, .gov, .biz and .edu.

What are the dis-advantages of a peer-to-peer network?

1-A computer can be accessed anytime. 2-Network security has to be applied to each computer separately. 3-Backup has to be performed on each computer separately. 4-No centralized server is available to manage and control the access of data. 5-Users have to use separate passwords on each computer in the network. 6-As with most network systems, unsecured and unsigned codes may allow remote access to files on a victim's computer or even compromise the entire network

What are the advantages of a peer-to-peer network?

1-The main advantage of peer to peer network is that it is easier to set up 2-The peer to peer network is less expensive. 3-In peer-to-peer networks all nodes are act as server as well as client therefore no need of dedicated server. 4-It is easier to set up and use this means that you can spend less time in the configuration and implementation of peer to peer network. 5-It is not require for the peer to peer network to use the dedicated server computer. Any computer on the network can function as both a network server and a user workstation.

What is the max distances for horizontal wiring?

1. Copper TP has a max distance of 100m 2. Horizontal Wiring is limited to 90m ... allowing 10m for patch cables

What are some documentation guidelines?

1. Documentation in central location 2. label every data jack, port, patch panel or punchdown block, etc 3. Use color coded cables for different purposes and document 4. update documentation as changes occur

What are some items that should be recorded in documentation?

1. Logical and physical connections 2. Inventory 3. IP Address utilization vendors a. warranty information b. service agreements c. troubleshooting instructions 4. internal procedures, policies and standards

What are the basic steps of the DNS resolving process?

1. The client proposes a domain name resolution request and sends the request to the local domain name server. 2. When the local domain name server receives the request, it first queries the local cache. If there is this record, the local domain name server directly returns the result of the query. 3. If there is no such record in the local cache, the local domain name server will directly send the request to the root domain name server , and then the root domain name serverwill return to the local domain name server for the primary domain name server of the query domain (the subdomain of the root). address. 4. The local server sends a request to the domain name server returned in the previous step, and then the server that accepts the request queries its own cache. If there is no such record, it returns the address of the relevant lower-level domain name server. 5. Repeat step 4 until you find the correct record. 6. The local domain name server saves the returned results to the cache for the next use and returns the results to the client.

Part 2 Grounding Yourself

1. Understand how grounding works. ... 2. Use your computer's case to ground yourself. ... 3. Touch grounded metal objects every couple of minutes 4. Ground yourself with an anti-static wristband. 5. Connect yourself to a grounded metal object via a wire. 6. Work on an ESD mat.

What command is used to verify IP Address on a computer?

1. Windows - ipconfig 2. Linux/Apple - ifconfig

The maximum allowable distance for horizontal wiring is ______ meters.

100

What is significant about ..... 127.0.0.1

127.0.0.1 is the loopback Internet protocol (IP) address also referred to as the localhost. The address is used to establish an IP connection to the same machine or computer being used by the end-user.

An IPv6 address is a _____ bit number that is composed of eight blocks of hexadecimal numbers.

128

What is an IPv6 Address? How many bits? Example of ?

128 Bits - An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets, a group sometimes also called a hextet). The groups are separated by colons (:). An example of an IPv6 address is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.

What are well know ports?

A number from 0 through 1023 used to identify a network service on a private IP network or the public Internet. Residing in a field in the TCP or UDP header, the port number directs packets to the appropriate application in the server

What is a packet capture tool? Used for?

A packet analyzer (also known as a packet sniffer) is a computer program or piece of computer hardware (such as a packet capture appliance) that can intercept and log traffic that passes over a digital network or part of a network. Packet capture is the process of intercepting and logging traffic.

What is a patch cable Used to connect?

A patch cable is a general term for cabling that connects two electronic devices to each other, typically in a network. ... Patch cables are also called patch leads. Horizontal Wiring is limited to 90m ... allowing 10m for patch cables

What is Star Topology

A physical topology in which every node on the network is connected through a central device.

What is a punchdown tool?

A pointed tool used to insert twisted-pair wire into receptors in a punchdown block to complete a circuit.

What is a DNS zone?

A portion of the DNS namespace for which one organization is assigned authority to manage.

What is a patch cable?

A relatively short section (usually between 3 and 25 feet) of cabling with connectors on both ends.

What is nmap?

A scanning tool designed to assess large networks quickly and provide comprehensive, customized information about a network and its hosts.

What is H.323? Used for?

A signaling protocol used to make a connection between hosts prior to communicating multimedia data. H.323 has largely been replaced by SIP, which is easier to use.

What is an upgrade? Use?

A significant change to an application's existing code, typically designed to improve functionality or add new features while also correcting bugs and vulnerabilities.

What is a subnet? Use?

A smaller network within a larger network in which all nodes share a network addressing component and a fixed amount of bandwidth.

What is a protocol analyzer? Used for?

A software package or hardware A software package or hardware-based tool that can capture dbased tool that can capture and analyze data on a network.

Where can this be located? How can you find IPv4 address of a machine? What command is used?

CMD prompt - Type "ipconfig" and press "Enter." Look for "Default Gateway" under your network adapter for your router's IP address. Look for "IPv4 Address" under the same adapter section to find your computer's IP address. If you use a virtual private network for your business, its connection will have its own section and list your proxy IP address under "IPv4 Address."

When dealing with DNS records What is a "CNAME" record? Use?

Canonical Name record - A type of DNS data record that holds alternative names for a host.

What documentation is necessary for change management?

Change Request Form

What icons are traditionally used for network diagrams?

Cisco Icons

the following ip 125.50.83.21 is an example of which class ?

Class A

255.0.0.0 is the default Subnet Mask for what class of IP Address?

Class B

the following ip 128.60.123.201 is an example of which class

Class B

255.255.255.0 is the default Subnet Mask for what class of IP Address?

Class C

The following ip 193.160.223.1 is an example of which class

Class C

What class of fire extinguisher is necessary to put out electrical fires?

Class C

the following ip 224.0.0.10 is an example of which class

Class D

What are the classes of IPv4 Addresses?

Class Theoretical Address Range Binary Start A 0.0.0.0 to 127.255.255.255 0 B 128.0.0.0 to 191.255.255.255 10 C 192.0.0.0 to 223.255.255.255 110 D 224.0.0.0 to 239.255.255.255 1110

How can you find MAC of a machine? What command is used?

Click Windows Start or press the Windows key. In the search box, type cmd. Press Enter. A command window displays. Type ipconfig /all. Press Enter. A Physical Address displays for each adapter. The Physical Address is your device's MAC address.

The ____________ network model, the resources are managed by the NOS via a centralized directory database.

Client-Server

Viewing the picture shown below ..... The Red Arrow that is on the bottom 1/2 of the screen is pointing to what type of address?"

IPv4 Address

what type of address is 10.0.0.10

IPv4 Address

A _______ Address is assigned to nearly every interface, which is a network connection made by a node on a network. An _____ Address has 128 Bits and is written as 8 blocks of hexadecimal numbers separated by colons.

IPv6

Viewing the picture shown below ..... The Red Arrow that is on the bottom 1/2 of the screen is pointing to what type of address?"

IPv6 Address

what type of address is this? fe80::8a1f::a1ff:fe0d:6b24

IPv6 Address

Troubleshooting step 1

Identify the problems and its symptoms

Troubleshooting step 5

Implement the solution or escalate the problem

What is a domain?

In the context of Windows Server NOSes, a group of users, servers, and other resources that share account and security policies.

What is significant about ..... 0.0.0.0

In the context of servers, 0.0.0.0 means all IPv4 addresses on the local machine. If a host has two IP addresses, 192.168.1.1 and 10.1.2.1, and a server running on the host listens on 0.0.0.0, it will be reachable at both of those IPs.

What is IANA? What do they do?

Internet Assigned Numbers Authority - A nonprofit, U.S. government-funded group that was established at the University of Southern California and charged with managing IP address allocation and the Domain Name System. The oversight for many of IANA's functions was given to ICANN in 1998; however, IANA continues to perform Internet addressing and Domain Name System administration.

What is ICMP?

Internet Control Message Protocol - A core protocol in the TCP/IP suite that notifies the sender when something has gone wrong in the transmission process and packets were not delivered.

What is ICMP?

Internet Control Message Protocol) - A core protocol in the TCP/IP suite that notifies the sender when something has gone wrong in the transmission process and packets were not delivered.

What is ICANN? What do they do?

Internet Corporation for Assigned Names and Numbers - The nonprofit corporation currently designated by the U.S. government to maintain and assign IP addresses.

Troubleshooting step 3

Test your theory to determine the cause

Troubleshooting step 4

Test your theory to determine the cause

When dealing with setting Static IP Addresses, What is the IP Address - use/meaning?

The ISP assigns each address to its networked computers via the Dynamic Host Configuration Protocol (DHCP) server, which is configured to allocate static IP addresses to specific computers. The addresses are used for network identification and communication

What are registered ports?

The TCP/IP ports in the range of 1024 to 49,151. These ports can be used by network users and processes that are not considered standard processes. Default assignments of these ports must be registered with IANA.

What is a primary DNS server

The authoritative name server for an organization, which holds the authoritative DNS database for the organization's zones. This server is contacted by clients, both local and over the Internet, to resolve DNS queries for the organization's domains.

What are authoritative servers?

The authority on computer names and their IP addresses for computers in their domains.

What is a secondary DNS server

The backup authoritative name server for an organization.

In a LAN, What is a backbone?

The central conduit of a network that connects network segments and significant shared devices (such as routers, switches, and servers) and is sometimes referred to as "a network of networks."

In a LAN, what is a switch?

The determination of how connections are created between nodes on a network. A network device that cross-connects clients, servers and network devices.

What is a packet analyzer? Used for?

The examination of information contained within packets to identify protocols, errors, and misconfigurations.

What is the entrance facility?

The location where an incoming network service (whether phone, Internet, or long-distance service) enters a building and connects with the building's backbone cabling. the entrance of a telecommunications cable from outdoors into a building

Why do we use a NAT and or need?

The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network

What is an OS? Examples?

The operating system, also known as an "OS," interfaces with the computer's hardware and provides services that applications can use. ... The operating system sits in between the applications you run and the hardware, using the hardware drivers as the interface between the two. Examples: Microsoft Windows (like Windows 10, Windows 8, Apple's macOS (formerly OS X), Chrome OS, BlackBerry Tablet OS, and Linux.

What is a system life cycle?

The process of designing, implementing, and maintaining an entire network.

What is network mapping?

The process of discovering and identifying the devices on a network.

What is name resolution?

The process of discovering the IP address of a host when the FQDN is known

What is inventory management?

The process of monitoring and maintaining all the assets that make up a network.

What is a rollback? Use?

The process of reverting to a previous version of a software application after attempting to patch or upgrade it.

rollback

The process of reverting to a previous version of software.

What is horizontal wiring?

Typically UTP is used for horizontal wiring can be standard inside wiring (IW) or plenum cabling and connects telecommunications rooms to individual outlets or work areas on the floor, usually through the wireways, conduits or ceiling spaces of each floor.

What is ipconfig?

The utility used to display and alter TCP/IP addressing and domain name information in the Windows client operating systems.

What is ICMPv6?

The version of ICMP used with IPv6 networks. ICMPv6 performs the functions that ICMP, IGMP, and ARP perform in IPv4. It detects and reports data transmission errors, discovers other nodes on a network, and manages multicasting.

What is the Work Area?

This area encompasses workstations, printers, and other network devices, and all the patch cables, wall jacks, and horizontal cabling necessary to connect these devices to a data room

How do you set your PC with a static IPv4 Address?

To set a static IP address in Windows 7, 8, and 10: Click Start Menu > Control Panel > Network and Sharing Center or Network and Internet > Network and Sharing Center. Click Change adapter settings. Right-click on Wi-Fi or Local Area Connection. Click Properties. Select Internet Protocol Version 4 (TCP/IPv4). Click Properties. Select Use the following IP address. Enter the IP address, Subnet mask, Default gateway, and DNS server. Click OK. Your computer displays a static IP address.

MAC Address format - What is the device ID?

Traditional MAC addresses are 12-digit (6 bytes or 48 bits) hexadecimal numbers. By convention, they are usually written in one of the following three formats: MM:MM:MM:SS:SS:SS

How many bits is a MAC Address? Example of? Where can this be located?

Traditionally, MAC addresses are made up of 12-digit numbers and are made up of 48 bits, or 8 bytes. However, some types of hardware require a 64-bit MAC address.

What is multicasting? Use?

Transmissions in which one host sends messages to multiple hosts. Multicasting is similar to broadcasting, but only transmits information to specific users. It is used to efficiently transmit streaming media and other types of data to multiple users at one time

responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)

Transport

Layer 4

Transport Layer

What is TFTP? Used for?

Trivial File Transfer Protocol - A TCP/IP Application layer protocol that is seldom used by humans. Computers commonly use it as they are booting up to request configuration files from another computer on the local network. Unlike FTP, TFTP relies on UDP at the Transport layer using port 69."

________ is a method used by IPv6 to transport IPv6 packets through or over an IPv4 network.

Tunneling

What is backbone wiring?

Typically Fiber Optic is used for backbone wiring Also called vertical wiring The central conduit of a network that connects network segments and significant shared devices (such as routers, switches, and servers) and is sometimes referred to as "a network of networks."

What is zenmap?

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.

RFP - request for proposal

a document to vendors to submit an offer for a product or service your company wants to purchase

What are "Racks"?

a framework, typically with rails, bars, hooks, or pegs, for holding or storing things.

What is cross-talk?

a phenomeno cause by transmission interference between wires.

When terminating twisted pair copper cabling, do not leave more than 1 inch of exposed cable before a termination. Doing so would increase the possibility for transmission interference between wires, a phenomenon called __________.

crosstalk

The _________ is the address of a computer, router, or other device that a host uses to access another network.

default gateway

For most situations .... this is the device that marks where a telecommunications service provider's network ends and the organization's network begins.

demarc

What is a DMZ?

demilitarized zone - An area on the perimeter of a network that is surrounded by two firewalls—an external firewall that is more porous to allow more types of access, and an internal firewall that is more hardened to provide greater protection to the internal network.

The _______ utility allows you to query the DNS database from any computer on a network to find the host name of a device by specifying its IP address, or vice versa. The ____ utility is available on Linux and macOS and provides more detailed information than nslookup.

dig

What is a host name? dlbrown

dlbrown

What is a FQDN?

dlbrown.hacc.edu

SOW - statement of work

documents in detail the work that must be completed for a particular project, and includes specifics such as tasks, deliverables, standards, payment schedules and work timeline

MOU - memorandum of understanding

documents the intentions of 2 or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts

When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.

domain

What is dig? How is it useful? How do you use?

domain information groper - A utility available on Linux and macOS that provides more detailed domain information than nslookup. Use dig to query DNS nameservers for information about host addresses and other DNS records.

What are some programs/applications that can be used for creating network diagrams?

draw.io, MS, sio

When a network is configured for both IPv4 and IPv6 protocols, the network is said to be ____________.

dual stacked

automatically assigned by by DHCP server when computer connects to network

dynamic IP address

What is EMI?

electromagnetic interference (EMI) - avoid laying cable across the floor where it might sustain damage from rolling chairs or foot traffic. If you must take this tack, cover the cable with a cable protector or cord cover.

This is the location where an incoming network, such as the Internet, connects with a school or corporate network.

entrance facility

Where the Green Wiring from the ISP is entering the building

entrance facility

A _______ is a dedicated device or software on a computer that selectively filters or blocks traffic between networks.

firewall

Where is Mesh Topology used?

for wireless networks

A(n) ________ address can be routed on the Internet and is similar to public IPv4 addresses.

global


Set pelajaran terkait

Chapter 25 : Convertible Securities (Theories)

View Set

anatomy and physiology chapter 6 test banks

View Set

Neurodevelopment & Cell organization

View Set

Jarvis Ch 24: Male Genitourinary System, Jarvis Ch 25: Anus, Rectum, and Prostate, Jarvis Ch 26: Female Genitourinary System

View Set

ATI Respiratory & Anti-infective Medication Questions

View Set