2.0 Networking Flashcards

Learn the fundamentals of wired and wireless networking, including protocols, devices, configurations, and connectivity troubleshooting. (109 cards)

1
Q

What two port numbers are commonly associated with FTP?

A
  • tcp/20 (active mode data)
  • tcp/21 (control)

FTP (File Transfer Protocol) transfers files between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What generic protocol is commonly used to transfer files between different operating systems?

A

File Transfer Protocol

(FTP)

FTP (File Transfer Protocol) transfers files between systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol would you use to securely log in to a remote device?

A

Secure Shell

(SSH)

Secure Shell can be used to access computers through an encrypted connection, preventing eavesdropping on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the port number:

Secure Shell

A

22

Secure Shell packets are encrypted, preventing anyone from viewing their contents with packet sniffing software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What protocol would you use to insecurely log into the terminal of a remote device?

A

Telnet

All information sent through Telnet can be seen by packet sniffing software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fill in the blank:

The port number for Telnet is ______.

A

23

All information sent through Telnet can be seen by packet sniffing software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What protocol is used to transfer emails between mail servers?

A

Simple Mail Transfer Protocol

(SMTP)

SMTP is only used to move messages between servers. POP3 or IMAP is used to retrieve mail on an email server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port number is used by SMTP?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What protocol is used to resolve IP addresses from a fully qualified domain name?

(FQDN)

A

Domain Name System

(DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What port number is used by DNS?

A

53

DNS is the Domain Name System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol is used to automatically assign IP addresses?

A

Dynamic Host Configuration Protocol

(DHCP)

DHCP uses both ports 67 and 68.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port numbers are used by DHCP?

A

67 and 68

DHCP is the Dynamic Host Configuration Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What insecure protocol is commonly used to transfer web page information to a browser?

A

Hypertext Transfer Protocol

(HTTP)

HTTP (Hypertext Transfer Protocol) uses port 80.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is HTTP’s port number?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol is used to transfer emails from servers to devices without multi-device synchronization?

A

Post Office Protocol 3

(POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank:

The port number for POP3 is ______.

A

110

POP3 is the Post Office Protocol version 3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What protocol is used to transfer emails from servers to devices with multi-device synchronization?

A

Internet Message Access Protocol

(IMAP)

IMAP (Internet Message Access Protocol) uses port 143.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the port number:

IMAP

A

143

IMAP is the Internet Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name the port number:

LDAP

A

389

LDAP is the Lightweight Directory Access Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the port number:

HTTPS

A

443

HTTPS is Hypertext Transfer Protocol Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What secure protocol is commonly used to transfer data from a web service?

A

Hypertext Transfer Protocol Secure

(HTTPS)

HTTPS (Hypertext Transfer Protocol Secure) uses port 443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What protocol does Windows use to access file shares and network printers?

A

Server Message Block

(SMB)

SMB is a newer version of the CIFS (Common Internet File System) protocol and uses port 445 for direct SMB communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Name the port number:

Direct SMB without NetBIOS transport

A

445

SMB (Server Message Block) is commonly used in Windows for file and printer sharing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name the port number:

Using SMB with NetBIOS

(NetBT)

A

137 and 139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What protocol is used in Windows to **remotely control** a computer’s desktop interface?
Remote Desktop Protocol | (RDP) ## Footnote RDP uses port 3389.
26
What is **RDP's** port number?
3389 ## Footnote RDP is the Remote Desktop Protocol.
27
# True or False: UDP performs checks to ensure that all data sent reaches its destination.
False ## Footnote UDP delivers data without any acknowledgements, making it a good choice for real-time voice or video communication.
28
What protocol is best for applications that require **real-time communication** with no consideration for lost data?
User Datagram Protocol | (UDP)
29
What protocol is best for applications that **require data to be reliably delivered**?
Transmission Control Protocol | (TCP) ## Footnote TCP performs data acknowledgements and identifies any packets that do not make it to their destination.
30
Which **Wi-Fi frequencies** would be most commonly used in a business environment?
* 2.4 GHz * 5 GHz * 6 GHz
31
How are frequencies referenced on a **Wi-Fi network**?
Channels ## Footnote Wi-Fi channels are frequency ranges. The number of channels for Wi-Fi bands depends on the band and government regulations.
32
This wireless characteristic allows for **linking channels to improve throughput**.
Channel bonding ## Footnote Channel bonding increases the available frequency range and overall throughput of the wireless network.
33
What is **IEEE standard** for wireless LANs?
IEEE 802.11 ## Footnote IEEE stands for the Institute of Electrical and Electronics Engineers.
34
What technology uses the **2.4GHz band** to provide **short-range connectivity** to accessory devices?
Bluetooth
35
What short-range technology supports **encryption** and **contactless payment**?
Near-Field Communication | (NFC) ## Footnote NFC is most commonly used in smartphones for digital payment cards.
36
# True or False: NFC is often encrypted to protect data and prevent replay attacks.
True ## Footnote Some NFC standards can use encryption to prevent unauthorized scanning and duplication of NFC information (replay attacks).
37
What technology allows small tags to be **powered and scanned by radio waves**?
Radio-frequency identification | (RFID) ## Footnote Some RFID systems use powered tags for greater range.
38
This service is responsible for **converting fully-qualified domain names** to IP addresses?
Domain Name System | (DNS) ## Footnote While most home networks use an ISP-provided DNS, it is possible to self-host a DNS server.
39
What service provides **automatic assignment of IP addresses**?
Dynamic Host Configuration Protocol | (DHCP) ## Footnote Most home routers come with a built-in DHCP server.
40
What type of **service** would be provided by a NAS?
A NAS provides **network based file storage** and **sharing**. | (Network-Attached Storage)
41
This service is used to **transfer log files** from a network device to a centralized database.
Syslog ## Footnote Syslog is a standard protocol supported by many different network devices.
42
Which service type is commonly accessed by a **browser**?
Web server ## Footnote The web server serves web pages to client browsers.
43
This service is used for managing **security credentials** and **login validation**.
Authentication, Authorization, and Accounting | (AAA)
44
What service would be the best choice for **storing large amounts of data**?
Structured Query Language | (SQL) ## Footnote SQL database servers are commonly used to easily store and retrieve data.
45
What protocol is used for **time synchronization**?
Network Time Protocol | (NTP)
46
What service is the best choice for **preventing unwanted emails** from reaching a user's inbox?
Spam gateway
47
What service can be used to help **direct traffic** between two or more servers?
Load balancer ## Footnote In addition to improving traffic, load balancers can automatically react to the loss of one or more servers to provide redundancy.
48
What service can act as an **intermediary and communicate to a server** on a client's behalf?
Proxy server
49
What describes the **networking of industrial applications** such as factories and power plants?
Supervisory Control and Data Acquisition System | (SCADA)
50
This describes a system which is **old or outdated** by modern standards.
Legacy ## Footnote Legacy systems are not always at risk or in need of an upgrade.
51
A name for purpose-build devices that run on their own **closed operating systems**.
Embedded systems ## Footnote Embedded systems include traffic light controllers and alarm systems.
52
Another name for **"smart" devices** used primarily for households.
Internet of Things | (IoT)
53
# Name the DNS record: Resolves an **IPv4 address** from an FQDN
Address | (A) ## Footnote The A (Address) record is used to translate between an FQDN (Fully Qualified Domain Name) and an IPv4 address.
54
# Name the DNS record: Resolves an **IPv6 address** from an FQDN
AAAA ## Footnote The quad-A (AAAA) Address record is used to translate between an FQDN (Fully Qualified Domain Name) and an IPv6 address.
55
# Name the DNS record: Associate **multiple names** to a single FQDN
CNAME ## Footnote A canonical name is used to associate multiple names to a single FQDN (Fully Qualified Domain Name).
56
# Name the DNS record: Identify the **email server** for a recipient
MX ## Footnote The MX (Mail Exchange) record identifies the email server associated with a recipient's fully qualified domain name (FQDN).
57
# Name the DNS TXT record type: A **public key** used to validate email digital signatures.
DKIM ## Footnote DKIM (DomainKeys Identified Mail) is a text record containing a public key used for email signature validation.
58
# Name the DNS TXT record type: A list of all authorized **outgoing email servers**.
Sender Policy Framework | (SPF)
59
# Name the DNS TXT record type: A policy for handling email messages identified as **spam**.
Domain-based Message Authentication, Reporting, and Conformance | (DMARC)
60
# True or False: SPF requires the use of a TXT record to function.
True ## Footnote SPF (Sender Policy Framework) TXT records contain a list of all authorized outgoing email server IP addresses.
61
This describes an **automatic IP address** assignment provided for a specific **timeframe**.
DHCP lease
62
What is the best way to ensure the same IP address is always **assigned to a device by a DHCP server**?
DHCP reservation
63
This is the list of IP addresses which can be **assigned by a DHCP server**.
DHCP scope
64
This contains a list of IP addresses which should **never be assigned by a DHCP server**.
DHCP exclusions
65
# Fill in the blanks: Segmenting a switched network into separate broadcast domains is called a \_\_\_\_\_\_ \_\_\_\_\_\_.
Virtual LAN | (VLAN)
66
# Fill in the blanks: An encrypted tunnel between two sites or devices is called a \_\_\_\_\_\_ \_\_\_\_\_\_ \_\_\_\_\_\_.
Virtual Private Network | (VPN)
67
# Fill in the blanks: An encrypted link from a device to a centralized concentrator is called a \_\_\_\_\_\_ \_\_\_\_\_\_.
Client-to-site VPN
68
This describes an **encrypted tunnel** between two remote locations.
Site-to-site VPN
69
# Name the network device: This device **forwards traffic** based on the destination IP address.
Router
70
# Fill in the blanks: A switch forwards traffic based on the \_\_\_\_\_\_ \_\_\_\_\_\_ \_\_\_\_\_\_.
destination MAC address | (Media Access Control)
71
# Name the network device: This is an **inexpensive switch** with relatively few configuration options.
Unmanaged switch
72
# Name the network device: This type of switch provides advanced features such as **VLANs**, **redundancy**, and **traffic prioritization**.
Managed switch
73
# Name the network device: This device connects a **wired network** with a **wireless network**.
Access point
74
This component is used to **terminate wire runs** to simplify connectivity.
Patch panel
75
# Name the network device: This device is commonly used to **allow or disallow traffic** through a specific network point or device.
Firewall ## Footnote Many firewalls are installed at the ingress/egress points of a network.
76
What technology is used to both power and connect network devices using a **single Ethernet cable**?
Power over Ethernet | (PoE) ## Footnote PoE is often used on devices such as cameras, phones, and wireless access points.
77
Some of the interfaces on a switch are labeled with **PoE**, **PoE+**, or **PoE++**. What does this specify?
Power over Ethernet standards with different values for maximum watts and current.
78
# True or False: PoE+ devices can be used on PoE++ switches.
True
79
# Name the network device: This is used by a **cable television company** to provide **data connectivity** to the Internet.
Cable modem
80
# Name the network device: This provides digital communication over **analog telephone lines**.
DSL modem | (Digital Subscriber Line)
81
What does an **ONT** provide?
An ONT is used to convert from an ISP's (Internet Service Provider) **fiber connection to a copper Ethernet interface**. | (Optical Network Terminal)
82
# Name the network device: This component connects a device to a network.
Network Interface Card | (NIC)
83
This is a **unique hardware identifier** associated with a network device or connection.
MAC address | (Media Access Control)
84
# True or False: The NIC (Network Interface Card) determines a device's MAC (Media Access Control) address.
True
85
What technology is used to **modify the source or destination IP address** during transport?
Network Address Translation | (NAT)
86
RFC 1918 defines which **IP address ranges as private**?
10.0.0.0 - 
10.255.255.255, 172.16.0.0 - 
172.31.255.255, and 192.168.0.0 - 
192.168.255.255. ## Footnote These ranges are often abbreviated with CIDR-block notation as 10.0.0.0/8, 172.16.0.0/12
, and 192.168.0.0/16.
87
What type of IP addresses are limited to an internal network and **cannot be routed across the Internet**?
Private IP address
88
# True or False: IPv6 can support a maximum of 4 trillion possible addresses.
False ## Footnote IPv6 can support a total of 340,282,366,920,938,463,463,374,607,431,768,211,456 theoretical addresses (340 undecillion!)
89
This IP configuration setting defines the local **IP subnet size**.
Subnet mask
90
What IP configuration setting determines the best path to **communication with external IP subnets**?
Default gateway
91
# Name the Internet connection type: This can be used in remote areas with **limited network infrastructure**. Requires line-of-sight.
Satellite ## Footnote Satellites provide a non-terrestrial network connection from almost any location.
92
# Name the Internet connection type: It supports **high speed data transfers** over long distances. Usually expensive to install and repair.
Fiber optics
93
# Name the Internet connection type: This is originally used to **provide television service** but later adapted to carry Internet services.
Cable ## Footnote The standard for using Internet over copper cables is DOCSIS (Data Over Cable Service Interface Specification).
94
# Name the Internet connection type: It provides Internet connectivity over existing **analog phone lines**.
Digital Subscriber Line | (DSL) ## Footnote DSL has a range limit of around 3 kilometers from the Central Office.
95
# Name the Internet connection type: A home Internet delivered over **wireless antenna** connections
Wireless Internet Service Provider | (WISP) ## Footnote WISP can be delivered through a variety of means. This includes but is not limited to: meshed 802.11, 5G, and proprietary wireless solutions.
96
# Name the network type: A network composed of **802.11 wireless and/or Ethernet** within a building or group of buildings.
Local Area Network | (LAN) ## Footnote A LAN can be as simple as your own home network.
97
# Name the network type: A network connecting sites over **long distances**.
Wide Area Network | (WAN) ## Footnote A WAN provides connectivity between cities, states, or countries.
98
# Name the network type: A small, private network commonly used to wirelessly **connect headphones and other devices**.
Personal Area Network | (PAN) ## Footnote Bluetooth, IR, and NFC are all technologies used in a PAN.
99
# Name the network type: A network connecting locations **within the same city or municipal area**.
Metropolitan Area Network | (MAN)
100
# Name the network type: A network connecting **large-scale drive arrays**.
Storage Area Network | (SAN) ## Footnote SANs require large amounts of bandwidth to move data effectively.
101
# Name the network type: A Local Area Network using **802.11 wireless technology**.
Wireless Local Area Network | (WLAN) ## Footnote WLANs are often composed of several access points for greater area coverage.
102
# Name the network tool: This is used to **add connectors** onto the ends of a wire.
Cable crimper
103
This tool can **remove the plastic sheath of a cable**, exposing the internal wires in preparation for attaching a connector.
Cable stripper
104
# Name the network tool: A portable tool used to **scan and gather information** about wireless networks.
Wi-Fi analyzer
105
# Name the network tool: This is used to pick up signals from a **tone generator**.
Inductive probe ## Footnote Tone generators and probes are used together to help physically locate a specific cable.
106
# Name the network tool: This is used to **attach wires** to a 110 block.
Punch down tool ## Footnote The punch down tool will also trim the wire during the process of punching it into the block.
107
# Name the network tool: This is used to **diagnose simple wiring issues** and continuity of the wires.
Cable tester
108
# Name the network tool: A special cable for performing **diagnostics of a network interface**.
Loopback plug
109
# Name the network tool: This is used with protocol analyzers to **gain access to the network packets** over physical links.
Network tap