Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
114 Cards in this Set
- Front
- Back
What is IEEE 802.11i used for?
|
Provides strong encyption, replay protection, integrity protection. Not for network authentication.
|
|
What is IEEE 802.1x used for?
|
Network Authentication. Uses different EAP types for different environments.
|
|
What is WPA and WPA2?
|
Wi-Fi Protected Acess is emprovement over WEP and old hardware (TKIP)
|
|
What data is at byte 9 of the IP header?
|
Protocol
|
|
What type of Technology is used at the Application layer?
|
Gateways
|
|
What type of Technology is used at the Presentation layer?
|
Gateways
|
|
What type of Technology is used at the Session layer?
|
Gateways
|
|
What type of Technology is used at the Transport layer?
|
Gateways
|
|
What type of Technology is used at the Network layer?
|
Virtual circuits (ATM), routers
|
|
What type of Technology is used at the Data link layer?
|
Bridges, switches
|
|
What type of Technology is used at the Physical layer?
|
ISDN, Hubs, Repeaters, Cables
|
|
Which OSI layer uses these protocols: FTP, SMB, TELNET, TFTP, SMTP, HTTP, NNTP, CDP, GOPHER, SNMP, NDS, AFP, SAP, NCP, SET
|
Application Layer - Layer 7
|
|
Which OSI layer uses these protocols: ASCII, EBCDIC, POSTSCRIPT, JPEG, MPEG, GIF
|
Presentation Layer - Layer 6
|
|
Which OSI layer uses these protocols: Remote Procedure Calls (RPC) and SQL, RADIUS, DNS, ASP, NFS, NetBIOS
|
Session Layer - Layer 5
|
|
Which OSI layer uses these protocols: TCP, UDP, SSL, SSH-2, SPX, NetBios, ATP
|
Transport Layer - Layer 4
|
|
Which OSI layer uses these protocols: IP, IPX, ICMP, OSPF, IGRP, EIGRP, RIP, BOOTP, DHCP, ISIS, ZIP, DDP, X.25
|
Network Layer - Layer 3
|
|
Which OSI layer uses these protocols: L2F, PPTP, L2TP, PPP, SLIP, ARP, RARP, SLARP, IARP, SNAP, BAP, CHAP, LCP, LZS, MLP, Frame Relay, Annex A, Annex D, HDLC, BPDU, LAPD, ISL, MAC, Ethernet, Token Ring, FDDI
|
Data Link Layer - Layer 2
|
|
Which OSI layer uses these protocols: 10BaseT, 100BaseT, 1000BaseT, 10Base2, 10Base5, OC-3, OC-12, DS1, DS3, E1, E3, ATM, BRI, PRI, X.23
|
Physical Layer - Layer 1
|
|
Which layer of the OSI model provides file transmission, message exchange, terminal sessions, etc
|
Application Layer
|
|
Which layer of the OSI model provides encryption/decryption, compression, and virtual terminal emulation
|
Presentation Layer
|
|
Which layer of the OSI model provides setup of the links, maintaining of the link, and the link tear-down between applications. Controls application to application communication
|
Session Layer
|
|
Which layer of the OSI model provides delivery of user information. It is also responsible for error detection, correction, and flow control. Handles computer to computer communication
|
Transport Layer
|
|
Which layer of the OSI model inserts info into packet headers so it can be properly addressed and routed. Then route the packet to their proper destination.
Determines the best path for the packet to take. |
Network Layer
|
|
Which layer of the OSI model provides error detection, frame ordering, and flow control. Translate data to binary format for proper line transmission over LAN or WAN.
Responsible for the physical addressing of the network via MAC addresses. |
Data Link Layer
|
|
Which layer of the OSI model converts bits into voltage for transmission.
Responsible for the physical transmission of the binary digits through the physical medium. |
Physical Layer
|
|
What are the 4 layers of the TCP/IP model?
|
Application Layer
Host to Host Layer Internet Layer Network Access Layer |
|
What are the protocols for the TCP/IP Model's Host to Host Layer?
|
TCP and UDP
|
|
What is a Class A range of IP addresses?
|
1.0.0.0 to 127.255.255.255
For large networks N.H.H.H; 255.0.0.0;/8 Remember 1-127 |
|
What is a Class B range of IP addresses?
|
128.0.0.0 to 191.255.255.255
For medium networks N.N.H.H. 255.255.0.0;/16 Remember 128-191 |
|
What is a Class C range of IP addresses?
|
192.0.0.0 to 223.255.255.255
N.N.N.H; 255.255.255.0;/24 Remember 192-223 |
|
What is Classless Interdomain Routing (CIDR) used for?
|
Class B address range is usually too large for most companies and Class C is too small. CIDR provides flexibility to increase or decrease the class sizes
|
|
Describe the protocol IP (Internet Protocol)
|
All hosts on a network have an IP address
Each data packet is assigned the IP address of the sender and receiver It provides an 'unreliable datagram service'. |
|
Describe the protocol ARP (Address Resolution Protocol)
|
Use the IP Address to get the MAC Address
MAC address is 48 bit IP address is 32 bit Only broadcast to network first time, otherwise stores IP and MAC info in table |
|
Describe the protocol RARP (Reverse Address Resolution Protocol)
|
Use the MAC Address to get the IP Address
RARP Server tells diskless machines IP Address |
|
Describe the protocol ICMP (Internet Control Message Protocol)
|
Management Protocol and messaging service provider for IP.
Sends messages between network devices regarding the health of the network. Ping is ICMP packet Ping checks if a host is up and operational |
|
What is TCP/IP protocol Telnet used for?
|
Terminal Emulation (No File Transfer)
|
|
What is TCP/IP protocol LDP used for?
|
Line Printer Daemon – with LPR enables print spooling
|
|
What is TCP/IP protocol X-Windows used for?
|
For writing graphical interface application
|
|
What is TCP/IP protocol Simple Network Management Protocol (SNMP) used for?
|
Provides the collection of network information by polling the devices on the network from a management station.
Sends SNMP traps (notification) to MIBS Management Information |
|
What OSI model protocol supports authentication, compression, confidentiality, and integrity; uses DES encryption; used for Encrypted File Transfer
|
SSH-2
|
|
What OSI model protocol uses symmetric encryption and public key for authentication and MAC (message authentication code) for integrity
|
SSL - Secure Socket Layer
|
|
Compare asynchronous and synchronous transmission types.
|
Asynchronous used when 2 devices not synchronized
Synchronized if communication takes place between synchronized devices usually sync via a clocking mechanism Larger amount of data transmitted via synchronized |
|
Describe Broadband transmission.
|
Divides the communication channel into individual channels so different type of data an be transmitted simultaneously
Carries several signals over different channels |
|
Give examples of Broadband medium.
|
Coaxial Cable TV (CATV), ATM, DSL, ISDN
|
|
Describe Baseband transmission.
|
Uses entire communication channel for transmission
Permits only one signal to be transmitted |
|
Give examples of Baseband medium.
|
Ethernet - entire wire for one channel
|
|
What technology is used for the Bus network topology?
|
Ethernet
|
|
What technology is used for the Ring network topology?
|
FDDI
|
|
What technology is used for the Star network topology?
|
Local bus (Ethernet) and ring topologies (Token Ring)
|
|
What technology is used for the Tree network topology
|
Ethernet
|
|
What technology is used for the Mesh network topology
|
Internet
|
|
Describe 10Base2, ThinNet.
What is cable type? What is speed? What is max length? |
Coaxial
10 Mbps Max 185 meters |
|
Describe 10Base5, ThickNet.
What is cable type? What is speed? What is max length? |
Coaxial
10 Mbps Max 500 meters |
|
Describe 10BaseT.
What is cable type? What is speed? |
UTP
10 Mps |
|
Describe 100BaseT, Fast Ethernet.
What is cable type? What is speed? |
UTP
100 Mps |
|
Describe 1000BaseT, Gigabit Ethernet.
What is cable type? What is speed? |
UTP
1000 Mps |
|
What type of LAN implementation does this describe:
Shared media Uses broadcast and collision domains Uses CSMA/CD access method Can use coaxial or twisted pair media Transmission speeds 10 Mbps to 1 Gbps |
Ethernet
|
|
What type of LAN implementation does this describe:
All devices connect to a central MAU Token passing media access method Transmission speeds of 4-16 Mbps Uses an active monitor and beaconing |
Token Ring
|
|
What type of LAN implementation does this describe:
Token Passing media access method Dual counter rotation rings for fault tolerance Transmission speeds of 100 Mbps Operates over long distances at high speeds and is used as backbone CDDI works over UTP |
FDDI
|
|
Describe Coaxial Cable.
|
Copper core surrounded by shielding layer & grounding wire encased in outer jacket
Compared with twisted pair, more resilient to EMI, higher bandwidth, supports longer cable lengths. But more expensive 10Base2 (ThinNet) 10Base5 (ThickNet) Can transmit in baseband or broadband |
|
Describe Twisted Pair Cable.
|
Insulated copper wires surrounded by outer protective jacket
If it has outer foil shielding, then referred to as shielded twisted pair (STP) Otherwise Unshielded twisted pair (UTP) Twisting of wires protects the signals from radio frequency and EMI Tighter the twisting, the more resilient Copper makes the signal degrade after certain distance. Copper radiates energy meaning info can be monitored or captured |
|
Describe UTP Category 3 cable.
|
10 Mbps for Ethernet and 4 Mbps for Token Ring
Used in 10Base-T network installations |
|
Describe UTP Category 4 cable.
|
16 Mbps
Usually used in Token Ring networks |
|
Describe UTP Category 5 cable.
|
100 Mbps for 100Base-TX and CDDI networks, has high twisting and low crosstalk
Used in 100Base-TX, CDDI, Ethernet, and ATM installations. Most widely used in new network installations |
|
List 4 Media Access technologies.
|
Token Passing
CSMA (Carrier Sense Multiple Access) Collision Domains Polling |
|
Describe the two kinds of CSMA (Carrier Sense Multiple Access)
|
CSMA/CD - Carrier sense multiple access with collision detection -
Monitor the transmission activity on the wire to determine best time to transmit data Each node monitors the wire and waits until wire is free before it transmits data. With CSMA/CD - if 2 computers try to transmit data at same time, it will abort transmission and alert other stations that a collision took place. Stations will execute a random collision timer to force a delay before attempting to transmit CSMA/CA - Carrier sense multiple access with collision avoidance Computers signals its intent to transmit data before doing it |
|
Define Collision Domains
|
A collision domain is a group of computers that are competing for same shared communication medium
Too many collisions can be caused by highly populated network, damaged cable or conductor, too many repeaters, too long cables Problems can be dealt with by implementing collision domains Can also make network sniffing more difficult |
|
Define Polling
|
Media access technology
Primary and secondary stations At predefined intervals, primary station asks secondary station if it has anything to transmit |
|
What is Address Resolution Protocol (ARP)?
|
LAN protocol
MAC address (Media Access Control) - unique address for each ROM When Frame hits the wire it only knows the MAC address |
|
What is Dynamic Host Configuration Protocol (DHCP)?
|
LAN protocol
If computer IP address is not assigned, it goes to DHCP to get its IP when booting up |
|
What are Distance Vector Routing Protocols?
|
Make routing decision based on distance or number of hops and vector or direction. Example: RIP
|
|
What are Link State routing protocols?
|
Build more accurate routing table because build a topology db of the network.
Look at more variables like packet size, link speed, delay, loading, reliability. Example: OSPF |
|
What is a Repeater?
|
Amplifies electrical signals between cable segments which enables it to extend a network
Work on Physical layer Can be line conditioners |
|
What is a Hub?
|
On Physical layer of OSI model.
Used to connect multiple LAN devices, no added intelligence Multiport repeater |
|
What is a Bridge?
|
Data Link Layer
Forwards Packets and filters based on MAC address. Forwards broadcast traffic, but not collision traffic |
|
What is a Switch?
|
Data Link Layer
Provides a private virtual link between communication devices. Allows for VLANs. Reduces collisions, impedes network sniffing Will only send data to the port where the destination MAC address is Multiport bridge |
|
What is a Router?
|
Network Layer
Separates and connects LANs creating internetworks Routers filter based on IP address Opens packets and look at MAC or IP |
|
What is a Gateway?
|
Application Layer
Connects different types of networks. Performs protocols and format translations |
|
Describe Packet Filtering Firewalls.
|
1st Generation
Network and Transport level Filtering based on network layer information so cannot look too far into the packet Decisions based on header info Routers using ACLs dictate acceptable access to a network |
|
Describe Application level proxy firewalls.
|
2nd Generation
Looks deep into packets and makes granular access control decisions. Requires one proxy per service |
|
Describe Circuit level proxy firewalls.
|
2nd Generation
Network Layer Looks at the header packet info. Protects a wider range of protocols and services, but does not provide the detailed level of control of an application level proxy |
|
Describe Stateful firewalls.
|
3rd Generation
Network layer Looks at the state and context of packets. Keeps track of each conversation using a state table |
|
Describe Dynamic packet filtering firewalls.
|
Dynamic ports are high numbers above well known ports starting at 1023
Dynamic packet firewall builds an ACL Gives option of allowing any type of traffic outbound and permitting only response traffic inbound Mostly used for UDP |
|
Describe Kernel proxy firewalls
|
5th Generation
Faster because processing is done in the kernel. One network stack is created for each packet |
|
What is a bastion host firewall?
|
Locked down or hardened system
Usually highly exposed. Existence known to internet No unnecessary services should be running, unnecessary user accounts disabled… Any system that resides within the DMZ should be installed on a bastion host since it is closer to their internet |
|
What is a dual homed firewall?
|
Two interfaces - one facing the external and one facing the internal network
If software is installed on dual homed device, underlying OS should have packet forwarding and routing turned off Used to divide internal trusted network from external untrusted network |
|
What is a screened host firewall?
|
Router filters (or screens) traffic before passing it to firewall
Firewall that communicates directly with perimeter router and internal network Traffic first filtered via packet filtering firewall. Then moves to this point where more rules are applied Screened host is the only device that receives traffic directly from the router |
|
What is a screened subnet?
|
External router filters (or screens) traffic before it enters the subnet. Traffic headed toward internal network goes through 2 firewalls
Adds another layer of security to the screened host architecture. External firewall screens the data entering the DMZ. Instead of the firewall then redirecting traffic to the internal network an internal firewall also filters the traffic The use of 2 physical firewalls creates a DMZ |
|
What is Network Information System (NIS)?
|
Like a telephone book for locating network resources
When computer boots up, goes to NIS server which provides group files, password files, host tables, port numbers, info on resources on domain Workstations run a client process that identifies NIS services through a broadcast NIS+ improved on performance and security |
|
What is Network Address Translation (NAT)?
|
Enables a network that does not follow the internet's addressing scheme to communicate over the internet.
Enables a company to use private addresses and still be able to communicate transparently on the internet |
|
What is Port Address Translation (PAT)?
|
Used by NAT
Company owns and uses only one public IP address for all systems that need to communicate outside internal network |
|
What is Asynchronous Transfer Mode (ATM)?
|
Encapsulates data in fixed cells & can be used to deliver data over SONET network.
Uses fixed cell size instead of variable frame size used by earlier technologies High bandwidth switching and multiplexing technologies that has low delay |
|
What is circuit switching?
|
Sets up virtual connection that acts like a dedicated link between 2 systems
Traffic travels in predictable and consistent manner Fixed delays Usually used for voice oriented data |
|
What is packet switching?
|
Packets from one connection can pass through number of individual devices instead of following one another through the same device
Examples: the internet, X.25, frame relay Multiple paths to same destination and high degree of redundancy Traffic is "bursty" Variable delays Usually used for data oriented data |
|
Describe Frame Relay.
|
High performance WAN protocol that uses packet switching technology which works over public networks
Shared media among companies Uses SVC and PVCs Fee based on bandwidth use Data link layer |
|
Describe X.25.
|
First packet switching technology developed over public networks
Shared media among companies Lower speed than frame relay because of extra overhead International standard used more in countries other than US |
|
Describe ISDN
|
Communication protocol provided by phone companies and ISPs
Enable data, voice and other traffic to travel over a medium in digital manner Developed to replace the aging telephone analog systems Can be used for anything a modem can be used for, but more functionality and higher bandwidth |
|
Describe DSL
|
High speed connection technology to connect to service providers CO
6 to 30 times higher bandwidth speeds than ISDN and analog Uses existing phone lines 24 hour connections to internet Have to be within 2.5 mile radius of the DSL equipment |
|
What is PPP - Point to Point Protocol?
|
Encapsulation protocol meaning an extra header and possibly trailer added to a frame
Allows TCP/IP and other protocols to be carried across telecommunications lines Used to establish telecomm connections between routers, users to routers or users to users |
|
What are tunneling protocols?
|
Tunnel is a virtual path across a network that delivers packets that are encapsulated and possibly encrypted
Can provide "gateway to gateway" connection between 2 routers Examples: PPTP, IPSec, L2F, L2TP |
|
What is PPTP?
|
A tunneling protocol
Data link layer A Microsoft protocol - only for IP networks Designed for client server connectivity |
|
What is IPSec?
|
Tunneling protocol
Network layer. Provides security on top of IP Can work in tunnel mode (payload and header are protected) or transport mode (payload is protected) More secure authentication and encryption Only supports IP networks Focuses on LAN to LAN communication |
|
What is L2TP?
|
Hybrid of L2F and PPTP
Data link layer Provides functionality of PPTP but can work over non IP networks running other protocols including frame relay, X.25, ATM Provides higher level of security when combined with IPSec Supports TACACS+ and RADIUS while PPTP does not |
|
What is Frequency Hopping Spread Spectrum (FHSS)?
|
Takes total amount of bandwidth and splits it into smaller sub channels.
Sender and receiver work at one of these channels for specific amount of time and then move to another channel Helps prevent interference Helps avoid eavesdropping Uses portion of total bandwidth available |
|
What is Direct Sequence Spread Spectrum (DSSS)?
|
Applies sub bits to the message
Sub bits used by sending system to generate a different format of the data before the data are transmitted. Receiving end uses sub bits to reassemble the signal into the original data format Sequence sometimes called pseudo noise sequence because if you don't know the sequence, it appears as random noise Uses all available bandwidth. Spreads signals over a wider frequency band |
|
Describe the 802.11b wireless standard
|
Transfer up to 11 Mbps
2.4 GHz |
|
Describe the 802.11a wireless standard
|
Transfer up to 54 Mbps
5 GHz |
|
Describe the 802.11g wireless standard
|
Higher data transfer rates 0 up to 54 Mbps.
Backwards compatible with b. Works in 2.4 GHz range |
|
What is WAP
|
Not a standard but a de facto market and industry driven protocol stack
Provides common architecture for wireless devices to communicate over the internet Set of communication protocols used to perform similar functionalities as TCP/IP |
|
What is Traceroute?
|
Shows you the path a packet took to get to its destination.
Normal traceroutes list the routers. |
|
What is Asymmetrical digital subscriber line (ADSL)?
|
Higher download rates than upload
Downstream 1.5 mbps to 9 mbps Upstream 16 kbps to 640 kbps Max distance 18,000 ft |
|
What is Single-line digital subscriber line (SDSL)?
|
Symmetrical download and upload rates
1.544 mbps Single twisted pair in both directions Operating range 10,000 ft |
|
What is High Rate Digital Subscriber Line (HDSL)?
|
Symmetrical download and upload rates
1.544 mbps Two copper twisted pairs Used by local phone companies for T1 Operating range 12,000 ft |
|
What is Very High Data Rate digitals subscriber line (VDSL)?
|
Downstream data range 13 mbps to 52 mbps
Upstream data rate 1.5 to 2.3 mbps upstream Operating range 1000 to 4500 ft |