• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/86

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

86 Cards in this Set

  • Front
  • Back

Full-duplex

Method of transmission allows signals to travel in both directions over a medium simultaneously.

Tasks handled by a router?

1. A router can reroute traffic if the path of first choice is down but a second path is available




2.A router can interpret Layer 3 and often Layer 4 addressing.




3.A router can connect dissimilar networks.

Network Time Protocol (NTP)

Is a networking protocol for clock synchronization between computer systems over packet-switched, variable-latency data networks.

Simple Mail Transfer Protocol (SMTP)

Is an Internet standard for electronic mail (email) transmission. First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321—which is the protocol in widespread use today. SMTP by default uses TCP port 25.

Session Initiation Protocol (SIP)

Is a communications protocol for signaling and controlling multimedia communication sessions. The most common applications of SIP are in Internet telephony for voice and video calls, as well as instant messaging, over Internet Protocol (IP) networks.

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritative servers for public access.​

True

Traceroute

By default, sends a sequence ofUser Datagram Protocol (UDP) packets addressed to a destination host; ICMP Echo Request or TCP SYN packets can also be used. The time-to-live (TTL) value, also known as hop limit, is used in determining the intermediate routers being traversed towards the destination.

A standard network switch operates at what layer of the OSI model?

Layer 2

Layer 1


(Physical)

In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first (lowest) layer. The implementation of this layer is often termed PHY. The physical layer consists of the basic networking hardware transmission technologies of a network.


Data unit : Bit

Layer 2

(Data Link)

Layer 2 refers to the Data Link layer of the commonly referenced multilayered communication model, Open Systems Interconnection (OSI). The Data Link layer is concerned with moving data across the physical links in the network.

Data unit : Frame

Layer 3

(Network)

Structuring and managing a multi-node network, including addressing,routing and traffic control.


Data unit : Packet

Layer 4

(Transport)

Reliable transmission of data segments between points on a network, including segmentation, acknowledgement and multiplexing.


Data unit :Segments/Datagram

Layer 5


Session

Managing communication sessions, i.e. continuous exchange of information in the form of multiple back-and-forth transmissions between two nodes

Layer 6


Presentation

Translation of data between a networking service and an application; including character encoding, data compression and encryption/decryption.

Layer 7

High-level APIs, including resource sharing, remote file access,directory services and virtual terminals.

SSH

Is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols. SSH uses the client-server model.

Telnet

Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.

How far away from fluorescent lights or other sources of EMI should cable be installed?

at least 3 feet

Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read:​

Presentation

IPv6 global unicast address:

FE80::10

What is the name for the protocol data unit (PDU) ​of the Data Link layer?

​frame

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

​fail-close

BIND

name of the free, open source software that is by far the most popular DNS server software

Convergence time

Routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage?

​Sliding window

In a TCP segment, the field that indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?

​Material Safety Data Sheet (MSDS)

The proper handling procedures for substances such as chemical solvents.

A hexadecimal number is a number written in the base 16 number system.​

True

​Noise

Type of power flaw that involves a fluctuation in voltage levels caused by other devices on the network or by EMI.

A port number, which identifies an application on a host, exists at what level of the OSI model?

Transport

What two mail delivery protocols below can be used by a client application to receive e-mail from a server?​

IMAP4 (Internet Mail Access Protocol V4)


POP3 (Post Office Protocol 3)

Equipment racks most commonly come in what two widths?​

19 inch frame


23 inch frame

What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission?​

checksum

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

DNS follows a centralized database model.​

False

Domain Name System (DNS)

Is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities.

Static electricity​

A stationary electric charge, typically produced by friction

Transport Layer Security (TLS)
and its predecessor, Secure Sockets Layer (SSL), both of which are frequently referred to as 'SSL', are cryptographic protocols designed to provide communications security over a computer network
SSL (Secure Sockets Layer)
Is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral.

Transmission Control Protocol (TCP)

TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.

User Datagram Protocol (UDP)

The User Datagram Protocol (UDP) is a transport layer protocol defined for use with the IP network layer protocol.

What are the two main Transport Layer protocols?​

TCP​


​UDP

What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?

TTL


​hop limit

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?​

​ping

What mail protocol is used to send mail messages to a server?​

SMTP (Simple Mail Transfer Protocol)

IP is an unreliable, connectionless protocol.​

True

What range of ports is referred to as the "well-known" range of ports?

​0-1023

​The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

Which of the following are types of entries an ARP table contains?

​Static


Dynamic

Three characteristics of TCP in its role as a reliable delivery protocol?​

1. Connection-oriented Protocol


2. Sequencing and checksums


3. ​Flow Control

A power fluctuation that results in a temporary dimming of lights is known as a blackout.​

False

Which of the following options is not a likely source of electromagnetic interference?​

fiber optic cables

If a Network layer protocol is aware that a packet is larger than the maximum size for its network, it will divide the packet into smaller packets in a process known as:​

​fragmentation

A loopback IP address begins with what ​number?

127

​What physical network topology consists of all connected devices connecting to one central device, such as a switch?

star topology

The segment or datagram protocol data unit exists at what layer of the OSI model?

Transport layer

What command below can be used to display ​a complete summary of all network interfaces in a Windows computer?

ipconfig /all

The process of adding a header to the data inherited from the layer above is called what option below?

​encapsulation

The Network Time Protocol service uses what port number?

UDP 123

Which protocol below is used to make an initial connection between hosts for transferring multimedia data, relying on other protocols once a connection is established?

SIP (Session Initiation Protocol)

​What versions of the IP protocol are used on networks today?

IPv4


​IPv6

What happens when a router receives a packet with a TTL of 0?

The router drops the packet and sends an ICMP TTL expired message back to the host.

When viewing the routing table on a UNIX system, what flag indicates if a route is a usable route?

U

​Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.

True

What authentication protocol sends authentication information in cleartext without encryption?

PAP

Which of the following connectors is the most common for multimode fiber?

MT-RJ

What signal propagation phenomena causes a wireless signal to split into secondary waves when it encounters an obstruction?

diffraction

Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options?​

multiplexing

Which software below serves as the firewall for Linux systems?

iptables

Unlike wired signals, wireless signals originate from electrical current traveling along a capacitor.​

False

Wireless signals

Wireless signals are electromagnetic waves travelling through the air

What is the maximum supported throughput of a CAT6 cable?​

10 Gbps

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPSec

Internet Protocol Security (IPsec)

Internet Protocol Security (IPsec) is a protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.

Layer 2 Tunneling Protocol (L2TP)

In computer networking, Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

​A reflective attack can be increased in intensity by combining it with what type of attack?

amplification attack

Smurf Attack

The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address.

What is the minimum category of UTP cable required in order to support Gigabit speeds?​

Cat 5e

What is the maximum distance for 10GBase-ER and 10GBase-EW on a segment of single mode fiber?

40km

Because digital signals do not depend on amplitude or frequency differences to communicate information, they are more vulnerable to EMI noise.​

False

In IEEE terminology, a group of stations that share an access point are said to be part of what option below?

basic service set

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.​

False

A proxy that provides Internet clients access to services on its own network is known as what type of proxy?

reverse proxy

The term malware is derived from a combination of the words malicious and software.​

True

logic bomb

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

boot sector virus

A boot sector virus is a virus that infects the master boot record of a storage device, usually a floppy disk or a hard drive but occasionally a CD.

worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.