1.1 Flashcards

(62 cards)

1
Q

What is the OSI model?

A

The OSI model is a conceptual framework that describes how network communication occurs in seven layers. | OBJ 1.1 | The OSI (Open Systems Interconnection) reference model standardizes networking functions into seven layers, helping technicians understand where problems occur and how protocols interact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does OSI stand for?

A

Open Systems Interconnection. | OBJ 1.1 | OSI stands for ‘Open Systems Interconnection,’ which is the international standard framework for networking communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is the OSI model considered a guide rather than a strict protocol suite?

A

Because it provides a theoretical model of communication, not an actual protocol stack. | OBJ 1.1 | The OSI model serves as a guideline for how communication should occur. It isn’t tied to real-world protocol stacks like TCP/IP, which is why most OSI-specific protocols were never widely adopted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Did most OSI protocols gain widespread adoption?

A

No, most OSI protocols did not catch on. | OBJ 1.1 | While the OSI model is widely used for teaching and troubleshooting, the actual OSI protocol suite was largely unsuccessful, and TCP/IP became the de facto protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What mnemonic phrase helps remember the OSI layers in order?

A

All People Seem To Need Data Processing. | OBJ 1.1 | This mnemonic helps recall the OSI layers from top (Application) to bottom (Physical): Application, Presentation, Session, Transport, Network, Data Link, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main function of the Physical layer in the OSI model?

A

The Physical layer defines the hardware transmission of raw data, including signaling, cabling, and connectors. | OBJ 1.1 | The Physical layer ensures that binary signals are transmitted over a medium such as copper, fiber, or wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of problems are usually associated with the Physical layer?

A

Cabling, punch-down issues, connectors, or adapter failures. | OBJ 1.1 | Common issues include faulty cables, mis-punched connections, or bad NICs, all of which prevent successful transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are examples of troubleshooting actions at the Physical layer?

A

Running loopback tests, testing/replacing cables, or swapping adapter cards. | OBJ 5.1 | Physical layer troubleshooting is hands-on, focusing on verifying that hardware components are functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary role of the Data Link layer?

A

To provide the basic ‘language’ of communication between directly connected devices. | OBJ 1.1 | The Data Link layer establishes reliable communication over a physical medium, handling frames and addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What protocol or address type is used at the Data Link layer on Ethernet?

A

Media Access Control (MAC) addresses. | OBJ 1.1 | Each device on an Ethernet network has a unique MAC address used to deliver frames locally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is the Data Link layer often called the ‘switching’ layer?

A

Because switches forward traffic based on Data Link (MAC) addresses. | OBJ 1.1 | Switches operate at Layer 2 and make forwarding decisions using MAC address tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main function of the Network layer?

A

Routing data packets between different networks. | OBJ 1.1 | The Network layer uses logical addresses (IP) to determine the best path across multiple networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why does the Network layer fragment frames?

A

To allow packets to traverse networks with different maximum transmission units (MTUs). | OBJ 1.1 | Fragmentation ensures packets fit within the size constraints of each network segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the Transport layer?

A

To ensure reliable or best-effort delivery of data through segmentation and reassembly. | OBJ 1.1 | The Transport layer manages communication reliability, error checking, and flow control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which two protocols operate at the Transport layer?

A

Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). | OBJ 1.1 | TCP provides reliable, connection-oriented delivery, while UDP is faster but connectionless and unreliable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main role of the Session layer?

A

To manage communication sessions between devices, including start, stop, and restart functions. | OBJ 1.1 | The Session layer keeps track of ongoing conversations, ensuring data streams remain organized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What types of protocols are associated with the Session layer?

A

Control protocols and tunneling protocols. | OBJ 1.1 | Protocols at this layer establish, maintain, and tear down communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the responsibilities of the Presentation layer?

A

Data translation, character encoding, and encryption/decryption. | OBJ 1.1 | This layer ensures that application data is readable and secure across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why is the Presentation layer often combined with the Application layer?

A

Because data formatting and encryption are closely tied to application processes. | OBJ 1.1 | In many implementations, layers 6 and 7 functions are bundled into the application itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the Application layer provide to users?

A

Direct interaction with network services and applications. | OBJ 1.1 | This layer is where protocols like HTTP, FTP, and DNS allow users to access network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name four common protocols that operate at the Application layer.

A

HTTP, FTP, DNS, and POP3. | OBJ 1.1 | These protocols enable web browsing, file transfer, name resolution, and email retrieval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

At the Application layer, what protocol is used when accessing Gmail?

A

HTTPS. | OBJ 1.1 | HTTPS provides web application access with encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

At the Presentation layer, what technology is used to secure Gmail?

A

SSL/TLS encryption. | OBJ 1.1 | SSL/TLS ensures confidentiality and integrity of transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

At the Session layer, how is communication linked to the transport layer?

A

The Session layer establishes and maintains the link between presentation data and transport encapsulation. | OBJ 1.1 | Sessions keep the HTTPS connection alive across multiple requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
At the Transport layer, which protocol encapsulates Gmail data?
TCP. | OBJ 1.1 | TCP ensures reliable delivery of Gmail packets across the internet.
26
At the Network layer, which protocol encapsulates the transport segment?
Internet Protocol (IP). | OBJ 1.1 | IP addresses and routes the TCP segment to its destination.
27
At the Data Link layer, which technology encapsulates the IP packet?
Ethernet. | OBJ 1.1 | Ethernet frames carry the IP packet across the local network.
28
At the Physical layer, how is Gmail data transmitted?
As electrical signals, light pulses, or radio waves. | OBJ 1.1 | The Physical layer converts binary data into physical signals for transmission.
29
Why are networking devices considered difficult to remove once installed?
Because they are deeply integrated into the network infrastructure. | OBJ 1.2 | Once a device like a router or switch is in place, removing it can disrupt critical operations.
30
Why is there always something new to learn about networking devices?
Because new technologies and implementations are constantly emerging. | OBJ 1.2 | Networking evolves quickly, requiring ongoing learning for administrators.
31
What is the main function of a router?
To route traffic between IP subnets. | OBJ 1.2 | Routers determine the best path for packets between different networks.
32
At which OSI layer does a router primarily operate?
Layer 3 – Network layer. | OBJ 1.2 | Routers use logical addresses (IP) to forward packets.
33
How can routers connect diverse network types?
By linking LANs, WANs, copper, and fiber networks. | OBJ 1.2 | Routers handle interconnections across multiple media types.
34
How does a switch perform bridging in hardware?
Using an application-specific integrated circuit (ASIC). | OBJ 1.2 | ASICs allow switches to forward frames efficiently in hardware.
35
At which OSI layer does a traditional switch operate?
Layer 2 – Data Link. | OBJ 1.2 | Switches forward traffic based on MAC addresses.
36
What are two advanced features enterprise switches may provide?
Power over Ethernet (PoE) and Layer 3 routing. | OBJ 1.2 | Modern switches often include additional features beyond Layer 2 switching.
37
How do firewalls filter network traffic?
By port number or application. | OBJ 1.2 | Firewalls inspect packets to allow or block traffic.
38
How do firewalls support secure site-to-site communication?
By using VPNs. | OBJ 1.2 | Firewalls can encrypt traffic between two sites using VPN tunnels.
39
Why are firewalls often considered Layer 3 devices?
Because they make filtering decisions using IP addresses. | OBJ 1.2 | Many firewalls act as routers, controlling traffic at the network layer.
40
What additional functions can modern firewalls perform (beyond filtering)?
NAT, dynamic routing, and application inspection. | OBJ 1.2 | Next-generation firewalls provide multiple services beyond traditional filtering.
41
What is the purpose of IDS and IPS systems?
To monitor and protect networks against intrusions. | OBJ 1.2 | IDS/IPS watch for exploits against operating systems and applications.
42
What types of intrusions do IDS/IPS detect?
Buffer overflows, cross-site scripting, and other vulnerabilities. | OBJ 1.2 | IDS/IPS systems detect malicious activity in network traffic.
43
What is the difference between intrusion detection and intrusion prevention?
Detection raises alerts; prevention blocks traffic. | OBJ 1.2 | IDS notifies admins, while IPS actively stops attacks.
44
What is the primary purpose of load balancing?
To distribute traffic across multiple servers. | OBJ 1.2 | Load balancing improves performance and redundancy.
45
How does a load balancer improve fault tolerance?
By redirecting traffic when servers fail. | OBJ 1.2 | Users don’t notice server outages because load balancers reroute sessions.
46
What is TCP offload in the context of a load balancer?
Handling TCP processing instead of backend servers. | OBJ 1.2 | Offloading reduces overhead on application servers.
47
What is SSL offload in the context of a load balancer?
Performing encryption/decryption instead of backend servers. | OBJ 1.2 | SSL offload accelerates HTTPS performance.
48
How does content switching work in a load balancer?
By routing requests based on application content. | OBJ 1.2 | Load balancers can direct traffic depending on application type or request.
49
What is the role of a proxy server?
To sit between users and external networks, forwarding requests on behalf of clients. | OBJ 1.2 | Proxies hide internal networks and add control over outbound connections.
50
What security and performance features can a proxy provide?
Caching, URL filtering, and content scanning. | OBJ 1.2 | Proxies improve performance and enforce security policies.
51
What is the difference between explicit and transparent proxies?
Explicit proxies require user configuration, while transparent proxies work invisibly. | OBJ 1.2 | Transparent proxies intercept traffic without user awareness.
52
What is the primary characteristic of Network Attached Storage (NAS)?
File-level access over the network. | OBJ 1.2 | NAS provides shared storage to clients via protocols like NFS or SMB.
53
How does Storage Area Network (SAN) storage differ from NAS storage?
SAN provides block-level access, appearing as local storage to the OS. | OBJ 1.2 | SAN is faster and more efficient for high-performance workloads.
54
What is the difference between file-level access and block-level access?
File-level access shares whole files; block-level access allows reading/writing raw storage blocks. | OBJ 1.2 | Block-level access is more flexible and efficient for databases and large-scale apps.
55
Why does a SAN require significant bandwidth?
Because block-level transfers are bandwidth-intensive. | OBJ 1.2 | SANs often use dedicated high-speed networks like Fibre Channel.
56
What is the difference between a wireless router and an access point?
A wireless router combines routing and AP functions; an AP is just a bridge to extend the wired network. | OBJ 1.2 | APs don’t perform routing—they only provide wireless connectivity.
57
At which OSI layer does an access point operate?
Layer 2 – Data Link. | OBJ 1.2 | APs forward wireless traffic at the MAC address level.
58
Why is wireless networking considered pervasive in modern environments?
Because wireless access is deployed in nearly every building and site. | OBJ 1.2 | Users expect seamless wireless access regardless of location.
59
What is the goal of wireless network access from a user perspective?
To provide seamless and invisible connectivity. | OBJ 1.2 | Users shouldn’t need to worry about roaming or access policies.
60
What is the main purpose of a wireless LAN controller?
To provide centralized management of multiple access points. | OBJ 1.2 | Controllers allow admins to configure, monitor, and manage APs from a single console.
61
What functions can a wireless LAN controller perform across access points?
Deployment, monitoring, security enforcement, and reporting. | OBJ 1.2 | Controllers streamline enterprise wireless management.
62
Why are wireless controllers usually proprietary to their access points?
Because they are vendor-specific systems paired with APs. | OBJ 1.2 | Manufacturers design controllers to work only with their hardware.