1.2 Flashcards

(33 cards)

1
Q

What are some examples of networking functions happening behind the scenes?

A

Remote access, traffic management, and protocol support. | OBJ 1.3 | Networking infrastructure handles many unseen functions, including secure access, traffic flow control, and protocol support to ensure availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is remote access important in networking?

A

It enables secure access to important data from anywhere in the world. | OBJ 1.3 | Remote access allows employees and systems to connect securely over the internet, ensuring productivity regardless of location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is traffic management used for?

A

To prioritize important applications over less critical ones. | OBJ 1.3 | Traffic shaping ensures bandwidth is available for mission-critical applications while managing congestion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is protocol support critical for uptime and availability?

A

It ensures networks can handle communication standards reliably. | OBJ 1.3 | Protocol support enables continuous operation by allowing diverse devices and services to interoperate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main purpose of a CDN?

A

To speed up content delivery to users. | OBJ 1.3 | CDNs reduce latency by caching content closer to users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does a CDN speed up data delivery?

A

By caching content across geographically distributed servers. | OBJ 1.3 | Distributed caches ensure requests are served locally rather than from distant servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of geographically distributed caching servers in a CDN?

A

They duplicate content across multiple locations for faster access. | OBJ 1.3 | Replicated data allows users to connect to the closest server, minimizing delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is a CDN often invisible to the end user?

A

Because the user simply receives faster data without noticing backend routing. | OBJ 1.3 | CDNs work seamlessly behind the scenes, improving speed without requiring user awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a VPN?

A

To provide secure communication over a public network. | OBJ 1.3 | VPNs encrypt data, protecting private information as it travels across insecure mediums like the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a VPN secure communication over a public network?

A

By using encrypted tunnels. | OBJ 1.3 | Encryption ensures data confidentiality and integrity between endpoints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a VPN concentrator or head-end device?

A

A device that handles encryption and decryption for VPN traffic. | OBJ 1.3 | VPN concentrators often act as gateways, sometimes integrated into firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How are VPNs often deployed (hardware vs. software)?

A

Through specialized cryptographic hardware or software-based options. | OBJ 1.3 | Hardware accelerates encryption, while software VPNs are cost-effective and flexible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How do users typically connect to a VPN?

A

Using client software, sometimes built into the OS. | OBJ 1.3 | Clients initiate encrypted tunnels to the VPN concentrator for secure access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is traffic shaping (packet shaping)?

A

A method of controlling network traffic to optimize performance. | OBJ 1.3 | Traffic shaping regulates bandwidth to ensure smoother communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does QoS control bandwidth usage or data rates?

A

By allocating available bandwidth based on traffic type. | OBJ 1.3 | QoS settings can prioritize critical applications while limiting non-essential traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why would some applications be set to higher priority than others?

A

To ensure important applications, like VoIP, receive the necessary resources. | OBJ 1.3 | Prioritization avoids service degradation for real-time or mission-critical apps.

17
Q

What does TTL stand for in networking?

A

Time to Live. | OBJ 1.3 | TTL is a value that limits how long data remains active in the network.

18
Q

Why is TTL needed in networking systems?

A

To prevent data from circulating indefinitely. | OBJ 1.3 | Without TTL, misrouted packets could loop forever and consume resources.

19
Q

How can TTL be measured (time vs. hop count)?

A

By elapsed time or number of router hops. | OBJ 1.3 | TTL can count seconds or decrease each time a packet passes through a router.

20
Q

What happens when TTL expires?

A

The data or packet is dropped. | OBJ 1.3 | Expired TTL ensures packets don’t stay in the network indefinitely.

21
Q

What are common uses of TTL?

A

To stop routing loops, clear caches, and regulate packet lifetimes. | OBJ 1.3 | TTL is versatile, used for both routing safety and cache expiration.

22
Q

What is a routing loop?

A

A situation where routers continuously send packets back and forth. | OBJ 1.3 | Misconfigured routes can cause packets to cycle endlessly.

23
Q

Why are routing loops easy to misconfigure?

A

Because static routes can be incorrectly set to point to each other. | OBJ 1.3 | Without dynamic routing safeguards, static configurations may create loops.

24
Q

How does TTL help prevent routing loops?

A

By dropping packets once their TTL reaches zero. | OBJ 1.3 | TTL ensures loops eventually end instead of consuming resources forever.

25
Why would loops cause packets to live forever without TTL?
Because routers would keep forwarding them indefinitely. | OBJ 1.3 | TTL is the mechanism that stops this by setting a finite lifespan.
26
What is a 'hop' in networking?
A pass through a router. | OBJ 1.3 | Each router traversal reduces TTL by one.
27
What is the default TTL value for macOS/Linux?
64 hops. | OBJ 1.3 | Different OS defaults determine maximum packet lifespan.
28
What is the default TTL value for Windows?
128 hops. | OBJ 1.3 | Windows uses a higher default TTL than Unix-based systems.
29
How does a router handle the TTL field?
By decreasing it by one for each hop. | OBJ 1.3 | When TTL reaches zero, the router drops the packet.
30
What is the function of DNS?
To resolve hostnames into IP addresses. | OBJ 1.3 | DNS translates human-friendly names (like www.example.com) into IP addresses.
31
What is an example of a DNS lookup result?
www.professormesser.com = 172.67.41.114. | OBJ 1.3 | A lookup provides the IP address associated with a fully-qualified domain name.
32
Why do devices cache DNS lookups?
To speed up repeated requests for the same domain. | OBJ 1.3 | Cached entries avoid repeated DNS queries, reducing latency.
33
How long is a DNS lookup cached?
For the duration of the TTL assigned to the record. | OBJ 1.3 | TTL values determine how long DNS information remains valid in cache.