Term
How many bits are in an IPv6 address? |
|
Definition
|
|
Term
Which protocol is responsible for determining the Mac addresses associated with each IP address and keeping a table of the results? |
|
Definition
|
|
Term
How many bits are in an IPv4 address? |
|
Definition
|
|
Term
How many hosts addresses are available on a Class C network? |
|
Definition
|
|
Term
How many hosts addresses are available on a Class B network? |
|
Definition
|
|
Term
How many hosts addresses are available on a Class A network? |
|
Definition
|
|
Term
What is the binary number system based on? |
|
Definition
|
|
Term
TCP establishes a connection with the destination device using which process? |
|
Definition
|
|
Term
In which layer does the router operate? |
|
Definition
|
|
Term
Which layer does the NIC operate? |
|
Definition
|
|
Term
Which part of a computer's IP address configuration indicates the portion of the address that specifies the network ID? |
|
Definition
|
|
Term
What are rules and procedures for communication and behavior or etiquette? |
|
Definition
|
|
Term
When a set of protocols works cooperatively, this is known as what? |
|
Definition
Protocol Stack or Protocol Suite |
|
|
Term
The most common protocol suite is what? |
|
Definition
Transmission Control Protocol/Internet Protocol (TCP/IP) |
|
|
Term
What is the unit of information the Application layer works with called? |
|
Definition
|
|
Term
What is the unit of information the Transport layer works with called? |
|
Definition
|
|
Term
What layer do most of the network administrators do most of the network configurations? |
|
Definition
|
|
Term
What are the four main tasks that the Internetwork layer is responsible for? |
|
Definition
- Defines and verifies IP addresses
- Routes packets through an internetwork
- Resolves MAC addresses from IP addresses
- Delivers packets efficiently
|
|
|
Term
What are the two parts that every IP address contains? |
|
Definition
|
|
Term
What are the most commonly used protocols at the Internetwork layer? |
|
Definition
|
|
Term
What are the two protocols of the Transport layer? |
|
Definition
- Transmission Control Protocol (TCP)
- User Datagram Protocol (UDP)
|
|
|
Term
This protocol is connection oriented and designed for reliable transfer of information in complex internetworks. |
|
Definition
Transmission Control Protocol (TCP) |
|
|
Term
This protocol is connectionless and designed for efficient communication of generally small amounts of data. |
|
Definition
User Datagram Protocol (UDP) |
|
|
Term
Both the TCP and UDP protocols perform which tasks mentioned in the book? |
|
Definition
- Work with segments
- Provide a means to identify the source and destination applications involved in a communication
- Protect data in the segment with a checksum
|
|
|
Term
TCP and UDP use what to specify the source and destination Application layer protocols? |
|
Definition
|
|
Term
A role of TCP is to provide what, which prevents a destination from becoming overwhelmed by data, resulting in dropped packets |
|
Definition
|
|
Term
What is the role of the Application layer? |
|
Definition
- Provides network services to user applications that access network resources.
|
|
|
Term
Name some of the functions the Application layer provides. |
|
Definition
- Access by applications to network services
- Client/server data access
- Name resolution
- Dynamic address assignment
- Authentication/user logon
- Data formatting and translation
|
|
|
Term
What are some examples of roles of the Network Access layer? |
|
Definition
- Provides a physical (MAC) address for the network interface.
- Verifies that incoming frames have the correct destination MAC address.
- Defines and follows media access rules
- Receives packets from the Internetwork layer and encapsulates them to create frames.
- De-encapsulates received frames and sends the resulting packets to the internetwork layer.
|
|
|
Term
Examples of roles of the Internetwork layer? |
|
Definition
- Is where administrators usually do the most network configuration.
- This is where the IP protocol operates and is the heart of the TCP/IP protocol suite.
-
Responsible for four main tasks: Defines and verifies IP addresses, Routes packets throught an internetwork, Resolves MAC addresses from IP addresses, and Delivers packets efficiently.
|
|
|
Term
What are the protocols at the Internetwork layer? |
|
Definition
- IPv4
- IPv6
- Address Resolution Protocol (ARP)
- Internet Control Message Protocol (ICMP)
- Internet Protocol Security (IPSec)
|
|
|
Term
This is used to automatically assign IP addresses as needed. |
|
Definition
Dynamic Host Configuration Protocol (DHCP) |
|
|
Term
This is a name-to-address resolution protocol that keeps a list of computer names and their IP addresses. |
|
Definition
|
|
Term
An IP address is how many bits in length? |
|
Definition
|
|
Term
An IP address is divided into what two parts? |
|
Definition
|
|
Term
IP addressing is divided into how many classes and what are each called? |
|
Definition
|
|
Term
What allows an organization to use private IP addresses while connected to the internet? |
|
Definition
Network Address Translation (NAT) |
|
|
Term
This allows several hundred workstations to access the internet with a single public internet address. |
|
Definition
Port Address Translation (PAT) |
|
|
Term
What does CIDR stand for? |
|
Definition
Classless Interdomain Routing |
|
|
Term
This is an addressing scheme that uses all available addresses more efficiently. |
|
Definition
|
|
Term
What is a subnet mask used for? |
|
Definition
It determines what part of the IP address is the host and what is the network ID. |
|
|
Term
Name the layers of the OSI model using this pneumonic. Please Do Not Throw Sausage Pizza Away |
|
Definition
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
|
|
|
Term
Using the corresponding pneumonic Don't, Don't, Don't Steal Pennies From Babies, name the PDU's and the corresponding layer that they match. |
|
Definition
- Data Application
- Data Presentation
- Data Session
- Segments Transport
- Network Packets
- Frames Data Link
- Bits Physical
|
|
|
Term
What is the PDU and Job of the Application Layer? |
|
Definition
- PDU is Data
- Jobs include File Transfer, email, telnet...closest to user
|
|
|
Term
What is the PDU and Job of the Presentation Layer? |
|
Definition
- PDU is Data
- Job is Data syntax, jp, txt
|
|
|
Term
What is PDU and Job of the Session Layer? |
|
Definition
- PDU is Data
- Job is to Establish, Manage, and End Connection
|
|
|
Term
What is the PDU and Job of the Transport Layer? |
|
Definition
- PDU is Segments
- Job is reliability and flow control, windowing.
|
|
|
Term
What is the PDU and Job of the Network Layer? |
|
Definition
- PDU is Packets
- Job is Path Determination and Switching, puts header on each segment (IP Addresses)
|
|
|
Term
What is the PDU and Job of the Data Link Layer?
|
|
Definition
- PDU is Frames
- Job is to put a Header and Trailer on each packet.
|
|
|
Term
What is the PDU and Job of the Physical Layer? |
|
Definition
- PDU is Bits
- Job is to convert frames to bits. Defines electrical and functional specifications.
|
|
|
Term
What equipment do the layers Application, Presentation, Session and Transport use and what is the purpose of the equipment? What protocols are used for each of these layers? |
|
Definition
- Equipment used is computers
- Used to combine networks using different protocols.
- Words to remember are: Browsers for Application Layer, Common Data Format for Presentation Layer, Dialogues and Conversations for Session Layer and Quality of Service and Reliability for the Transport Layer.
- Protocols: Redirector, FTP, Telnet, SMTP, SNMP, Netware Core are used at the Application and Presentation Layer.
- Protocols NFS, SQL, RPC, X-Win for the Session Layer.
- Protocols TCP and UDP for the Transport Layer.
|
|
|
Term
What equipment does the Network layer use and what is the purpose of the equipment? What Protocols are used? |
|
Definition
- Equipment used is Router.
- Purpose of equipment is to Segment Network into Smaller Broadcast Domains.
- Protocols used are Routable Protocols such as IP, IPX, and Apple Talk.
- Words to remember are Path Selection, Routing, and Addressing.
|
|
|
Term
What equipment does the Data Link (LLC, MAC) layer use and what is the purpose of the equipment? What Protocols are used? |
|
Definition
- Equipment used is Bridge (2 ports) or Switch (Multi-port) and NIC
- The purpose of the equipment is to Segment Network into Smaller Collision Domains.
- Protocols used are NDIS, ODI, MAC Address, and Ether Talk.
- Words to Remember are Frames and Media Access Control (MAC)
|
|
|
Term
What equipment does the Physical layer use and what is the purpose of the equipment? What Protocols are used? |
|
Definition
- Equipment used are Repeater (2 Ports), Hubs (multi-port), Cabling.
- Equipment purpose is One Collision and One Broadcast Domain.
- Protocols used are Physical.
- Words to remember are Signals and Media
|
|
|
Term
Name the TCP/IP model that corresponds to the OSI Model Name for all Layers. |
|
Definition
- OSI TCP/IP
- Application Application
- Presentation Application
- Session Application
- Transport Transport
- Network Internet
- Data Link Network Access
- Physical Network Access
|
|
|
Term
|
Definition
Open Systems Interconnection Reference Model |
|
|
Term
What term is used when one computer is communicating on the same layer as another computer. |
|
Definition
|
|
Term
|
Definition
|
|
Term
What are some possible problems associated with the Applications Layer? |
|
Definition
- Missing or Misconfigured client software and incompatible or obsolete commands used to communicate between a client and server.
|
|
|
Term
Which two Layers define how computers attach to a specific network media and specify how more than one computer can access the network without causing interference with other computers on the network. |
|
Definition
The two lowest layers Physical and Data Link. |
|
|
Term
The Data Link Layer is divided into what two sublayers? |
|
Definition
- Logical Link Control (LLC)
- Media Access Control (MAC)
|
|
|
Term
Summary of the OSI model layer functions. |
|
Definition
- Application: Provides access to network resources.
- Presentation: Handles data formatting and translation.
- Session: Manages ongoing conversations between two computers.
- Transport: Breaks long data streams into smaller chunks (segments).
- Network: Provides best path selection and IP addressing
- Data Link: Defines how computers access the media.
- Physical: Converts bits into signals and defines media and connectors.
|
|
|
Term
What are some basic items needed to start writing your security policy? |
|
Definition
- Privacy policy
- Acceptable Use Policy
- Authentication Policy
- Internet use policy
- Access policy
- Auditing Policy
- Data Protection
|
|
|
Term
Before determining the level of security your network needs, what questions must be asked? |
|
Definition
- What must be protected
- From whom should data be protected
- What costs are associated with security being breached and data being lost or stolen
- How likely is it that a threat will occur
- Are the costs to implement security and train personnel to use a secure network outweighed by the need to create an efficient, user friendly environment.
|
|
|
Term
What are the three levels of security? |
|
Definition
- Highly Restrictive Security Policies
- Moderately Restrictive Security Policices
- Open Security Policies
|
|
|
Term
What are some ways to secure data on a network? |
|
Definition
- Authentication and Authorization
- Encryption
- Virtual Private Network (VPN)
- Firewalls
- Virus and Worm Protection
- Spyware Protection
- Wireless Security
|
|
|
Term
How many characters are allowed for a password in Windows 7? |
|
Definition
|
|
Term
This is known as a network connection that uses the internet to give users or branch offices secure access to a company's network resources. |
|
Definition
Virtual Private Network (VPN) |
|
|
Term
VPN's use what type of technology to ensure the communication is secure while traveling through the public internet. |
|
Definition
|
|
Term
What are some of the benefits of using a VPN. |
|
Definition
- Enable mobile users to connect with corporate networks securely wherever an Internet connection is available.
- Allow multiple sites to maintain permanent secure connections via the Internet instead of using expensive WAN links.
- Can reduce costs by using the ISP's support services instead of paying for more expensive WAN support
- Eliminate the need to support dial-up remote access.
|
|
|
Term
This is a hardware device or software program that inspects packets going into or out of a network or computer, then discards or forwards these packets based on a set of rules. |
|
Definition
|
|
Term
Firewalls can attempt to determine a packet's context by using a process called what? |
|
Definition
Stateful Packet Inspection (SPI) |
|
|
Term
What does an Intrusion Detection System (IDS) do? |
|
Definition
- Usually works with a firewall or router
- Detects an attempted security breach and notifies the administrator.
- In some cases IDS takes countermeasures like resetting the connection between source and destination devices.
|
|
|
Term
When a program that spreads by replicating itself into other programs or documents is known as what? |
|
Definition
|
|
Term
This is similar to a virus but does not attach itself to another program. |
|
Definition
|
|
Term
This is a form of a Trojan program that can monitor traffic to and from a computer (capturing passwords and other important information). |
|
Definition
|
|
Term
This is a type of malware that monitors or controls part of your computer at the expense of your privacy. |
|
Definition
|
|
Term
This is known as more of a nuisance than a threat to your computer. |
|
Definition
|
|
Term
What are some of the wireless security options? |
|
Definition
- Service Set Identifier (SSID)
- MAC address filtering
- Wired Equivalency Protocol (WEP)
- Wi-Fi Protected Access (WPA)
- 802.11i (WPA 2)
|
|
|
Term
This scanner is used as an automated method for pinging a range of IP addresses. |
|
Definition
|
|
Term
This scanner determines which TCP and UDP ports are available on a particular computer or device. |
|
Definition
|
|
Term
This resource allows you to capture packets and determine which protocol services are running. |
|
Definition
|
|
Term
This is an attackers attempt to tie up network bandwidth or network services. |
|
Definition
Denial-of-Service attack (DoS) |
|
|
Term
This is a document that describes the rules governing access to a company's information resources. |
|
Definition
|
|