Chapter 14

Ace your homework & exams now with Quizwiz!

Are the letters before the dot in xyz.com mean and what do the letters after it mean?

The letters preceding the dot identify the domain name. the letter after the dot are called the top-level domain and tell you the type of domain that it is, ie commercial, .org (nonprofit, .gov (government), etc.

The Operating System level in the OSI model is what layer in the 1-7 layers? What happens here?

The second layer.

What is a subnet mask, what does it do?

The subnet mask identifies which part of an IP address is the network portion and which part is the host portion.

What is Telnet?

The telnet protocol is used by Telnet client/server applications to allow an administrator or other user to control a computer remotely. Telnet is not considered secure!!

What is the name of the protocol used by a DNS server to find IP address for a computer when the fully qualified domain name is known?

A Domain Name System or Domain Name Service

What blocks of PIv4 addresses has IEEE recommended be used for private networks?

10.0.0.0 through 10.255.255.255 172.16.0.0 through 172.31.255.255 192.168.0.0 through 192.168.255.255

How many bits in IPv6 standards?

128-bit

What is a MAC address?

A 48-bit (6-byte) number hard-coded on the card by its manufacturer that is unique for that device, whether it's a network card, network port on a motherboard, onboard wireless, or wireless NIC. MAC = Media Access Control address, hardware address, physical address, adapter address, or ethernet address.

What's a DHCP client?

A computer or any other device that requests an IP address from the DHCP server.

An IP address that is assigned by a server each time the computer or device connects to the network is known as what?

A dynamic IP address

Quality of Servie (QoS)

A feature of a network adapter which allows for control of which applications have priority o the net network.

A network bound by router or other gateway devices is known as what?

A local Area Network (LAN)

What is POP3?

A protocol used by email servers to deliver email messages to recipients. it stands for Post Office Protocol, version 3.

A device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another is known as what?

A router

what is SFTP?

A secure version of FTP which uses SSH.

What is a subnet

A small network within a local network which can form part of an intranet which is any private network that uses TCP/IP protocols.

What is CIDR notation?

A system by which an IP address and subnet mask are written using a shorthand notation like 15.20.212.59/20, where the /20 means that the first 20 bits in the ip address identify the network. sometimes called Slash Notation.

What is port forwarding?

A technique which, when a firewall receives a request for communication from the Internet to the specific computer and port, the request will be allowed and forwarded to that computer on the network. the receiving computer must have a static IP address.

A private address that can travel across subnets within the private network is known as what?

A unique local address

MAC address filtering

Allows you to control access to your network to only certain computers or devices.

What is AFP?

Apple Filing Protocol is a file access protocol used by early editions of the Mac OS and is one protocol in the suite of Apple networking protocols called Apple Talk. TCP/IP has replaced AppleTalk for most networking protocols in the Mac OS.

An IP address that is permanently assigned to the computer or device is known as what?

As a static IP address.

how are the 128 bits in an IPv6 address written?

As eight blocks of hexadecimal numbers separated by colons, like this: 2001:0000:0B80:0000:0000:D3:9C5A:CC.

What does APIPA stand for? What is it?

Automatic Private IP Address. Its the process by which a computer generates it's own IP address (APIPA) if it is unable to lease an IP address from the DHCP server when it first connects to the network that is using dynamic IP addressing. It selects an IP address in the address range 169.254.x.y

Traffic directed to the router's public IP address is forwarded to the computer within the network that is listening at port X. The router uses NAT to translate it's IP address into the private IP address of the LAN computer. What is this known as?

Destination Network Address Translation (DNAT).

Internet Explorer, Google Chrome, or Outlook are what type of applications, server or client?

Client

What is CIFS?

Common Internet File System, also called SMB2, a file access protocol and the cross-platform version of SMB used between Windows, Linux, Mac OS, and other operating systems.

what is Wi-Fi Protected Setup (WPS)?

It is designed to make it easier for users to connect their computers to a wireless network when a hard to remember SSID and security key are used.WPS generates the SSID and security key using a random string of hard-to-guess letters and numbers. The SSID is not broadcasted, so both the SSID and security key must be entered to connect.

True or False? Computer on the internet use MAC addresses to communicate over the internet.

False

IPv6 broadcasting is far more efficient than IPv4 broadcasting. True or False

False. There is no broadcasting with IPv6.

What is FTP?

File Transfer Protocol used to transfer files between two computers. by default, FTP is not secure.

What are Public IP addresses?

IP addresses available to the Internet.

Which Internet protocol version uses 128-bit IP addresses? Which one uses 32-bit IP addresses?

IPv6 IPv4

What are two common tunneling protocols?

ISATAP which stands for Intra-Site Automatic Tunnel Addressing Protocol) and Teredo, which is named after the Teredo worm that bores holes in wood.

What is IP 127.0.0.1 reserved for?

Indicates your own computer and is called the loopback address?

What is iMAP4?

Internet Message Access Protocol., version 4. the tool used by the client application to manage email stored on a mail server.

what is a fully qualified domain name (FQDN)

It identifies a computer and the network to which it belongs. www.cengage.com is an FQDN where the host name is www (a web server), cengage is the domain name, and com is the top-level domain name

What is HTTPS used for?

It is HTTP secure and refers to the HTTP protocol working with a security protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS). It's a connection between a browser and web server.

What does UDP do?

It provides fast transmissions while not guaranteeing delivery. It is called connectionless protocol or best-effort protocol. It's used for broadcasting, such as streaming video or sound over the web. ti stands for User Datagram Protocol)

What is a DMZ? Not the Korean type

It's a computer or network that is not protected by a firewall or has limited protection. Should really be called a sitting duck. Use only as a last resort when you are having trouble with port forwarding or port triggering.

What does a Dynamic Host Configuration Protocol (DHCP) do?

It's a server that gives an IP to a computer when it first attempts to initiate a connection to the network and requests an IP address.

What's the purpose of the % sign in an IPV6 address?

It's a sign followed by a number and it is called the zone ID or scope ID and it's used to identify the interface in a list o interfaces for IPv6 for the node.

What is tunneling?

It's a way to allow IPv6 messages to travel on on an IPv4 network.

that TCP/IP do?

It's the protocol that guarantees message delivery. TCP makes a connection, sends the data, checks whether the data is received, and resends it if it is not. It is called a Connection-oriented protocol and is found in the Transportation layer of the OSI model.

At what level in the OSI model do applications come into play?

Level 3

What is LDAP?

Lightweight Directory Access Protocol (LDAP) is used by various client applications when the application needs to query a database.

What some common IPv6 address prefixes?

Link-local address FE80)::/64 (first 64 bits are always 1111 1110 1000 0000...) Unique Local address FC00::/7 (first 7 bits are always 1111 1100) Loopback address 0::1 , also written as ::1 (127 zeroes followed by1) Unassigned address 0::) (all zeroes)

What is a NAT?

Network Address Translation which is a technique designed to conserve the number of public IP addresses needed by a network. A router or other gateway device stands between a private network and the Internet and substitutes the private IP addresses used by computer on the private network with its own public IP address when these computers need access to the Internet.

What are Neighbors in therms of networks?

Nodes on the same local network.

How many sets of double colons can be used in an IPv6 address?

Only one set

When you notice that an important application is not getting the best performance, how can you configure your router to optimize performance for that application?

Optimize by setting up as having Highest priority within QoS.

List the different ports for different applications.

Port 20 = file transfer protocol (FTP) Port 21 = File transfer Protocol Control Port 22 = Secure Shell (SSH) Secure logins, file transfers Port 23 = Telnet protocol , unencrypted text communications port 25 = Simple Mail Transfer Protocol (SMTP) used for email routing between mail servers Port 53 = Domain Name System (DNS) port 70 = gopher protocol port 80 = Hypertext Transfer Protocol (HTTP) port 109 = Post office protocol, version 2 pop 110 = pop , version 3 port 118 Structured Query Language (SQL) port 143 = Internet Message access protocol 9IMAP0, management of electronic mail messages on a server. port 156 = Structured Query Language (SQL) port 311 = Mac OPS X Server Admin port 350 = Mapping of Airline Traffic over Internet Protocol port 443 = Hypertext Transfer Protocol over TLS/SSL (HHTPS) port 443 = slither.io port port 3389 = RDP apps, remote desktop and remote assistance

Each client and server application installed on a computer listens at a predetermined address that uniquely identifies the application on the computer. These predetermined addresses are unique for each type of application and are known as what?

Ports

what is RDP?

Remote Desktop protocol used by the Windows Remote Desktop and Remote Assistance utilities to connect to and control a remote computer.

What is the speed , distance, and frequency for 802.11g?

Same as 802.11b, but with a speed of up to 54 Mbps.

Web server or email server are what type of applications, server or client?

Server

A wireless network has a name that can be changed by the network administrator and is typically known as what?

Service Set Identifier (SSID)

what is SMTP?

Simple Mail Transfer Protocol. It's used to send an email message to its destination.

What is SNMP?

Simple Network Management Protocol. Used to monitor network traffic.

How can you tell if a computer with a certain IP address is on your network or not?

Take a look at your ip address in binary. Then look at the other IP address in binary. Determine, based on your subnet mask, how many bits in your IP address identify your network. Finally compare, do the first x bits (equals to the number of bits that identify your network) in your IP address match the first 20 bits in the other IP address?

On a 32-bit subnet mask, the leading string of 1's tell what? What do the ending string of 0's say?

The 1's say, On our network, this part of an IP address is the network part, and the group of 0s says "on our network, this part of an ip address is the host part.

What are the types of IP addresses that IPv6 supports?

Unicast address, used to send messages to a single node on a network. Multicast address, used to deliver messages to all nodes in a targeted multicast group, such as when video is streaming from a server to multiple nodes on a network. and Anycast address, used by routers and can identify multiple destinations and a message is delivered only to the closest destination.

What are some of the encryption setups currently available?

WEP - wired Equivalent Privacy WPA Wi-Fi Protected Access WPAW Wif-Fi Protected Access 2

What is port triggering?

When a computer in the LAN tries to connect to the Internet using a certain port which then triggers a response port within the same router. The triggered port will remain open for a while and will close when it detects that data is no longer flowing out through the outgoing port.

Dangers of Port Forwarding.

You are allowing external users directly into your private network. For better security turn on port forwarding only when you know it's being used.

What is a socket?

a connection between a browser and a webserver.

Any device or computer that network traffic can use to leave one network and go to a different network is known as what?

a gateway.

What is SSH?

a protocol that encrypts transmission so they cannot be intercepted by a hacker.

What are Private IP addresses?

blocks of IP addresses that have been designated for use within an organization's private network in order to conserve the number of public IP addresses.

What is IP 255.255.255.255 reserved for?

for broadcast messages by TCP/IP background processes.

What is HTTP used for?

for the World Wide Web and its used by web browsers and web servers to communicate.

What do you do if any of the eight blocks in the IPv6 standards address have all zeros?

the all zero blocks can be written ad double colons (::). so that 2001:0000:0B80:0000:0000:D3:9C5A:CC can be written as 2001::B80:0000:0000:D3:9C5A:CC or 2001:0000:B80::D3:9C5A:CC

How does IPv6 address the Subnets?

the subnet Id that identifies a subnet is part of the IPv6 address. The subnet ID is the 16 bits following the first 48 bits of the address.

Why is there a limitation on how many sets of double colons can be used in IPv6 and how do you select the format to use?

to avoid confusion. The address written with the fewest zeros is selected. Keep in mind that blocks of double zeros adjacent to each other can be grouped as one set of double colons.

What is the speed , distance, and frequency for 802.11b?

up to 11 Mbps, up to 100 meters, 2.4 GHz. can experience interference from cordless phones and microwaves.

What is the speed , distance, and frequency for 802.11a?

up to 54 mbps, short range (50 meters), 5.0 GHZ. 802.11a is no longer used.

What is the speed , distance, and frequency for 802.11n?

up to 600 Mbps, indoor range of up to 70 meters and out door range of up to 250 meters, can use either 5.0 GHz or 2.4 GHz radio frequencies.


Related study sets

*** Question Stems and Conclusion/Evidence Indicators

View Set

Chapter 5: Chronic Illness and Older Adults

View Set

(2)A+ DISPLAY DEVICES PRACTICE EXAM

View Set

PCC Business Law cards 98-216 (Dosson)

View Set

Med Surg I Prep U Chapter 53: Assessment of Kidney and Urinary Function

View Set

Information Systems Ch 1 & 2 study guide questions

View Set