Network Protocols Flashcards Preview

CompTIA A+ > Network Protocols > Flashcards

Flashcards in Network Protocols Deck (144)
Loading flashcards...
1
Q

Convert to Binary Octet = 234

A

11101010

2
Q

Convert to Binary Octet = 168

A

10101000

3
Q

Convert to Binary Octet = 99

A

01100011

4
Q

Convert to Binary Octet = 25

A

00011001

5
Q

Convert to Binary Octet = 189

A

10111101

6
Q

Convert to Digital = 01010101

A

85

7
Q

Convert to Digital = 10011111

A

159

8
Q

Convert to Digital = 00111001

A

57

9
Q

Convert to Digital = 10011100

A

156

10
Q

Convert to Digital = 11011001

A

217

11
Q

How does the network ID in an IP address relate to the host ID?

A

The network ID on the left identifies the subnet the host belongs to, and the host ID on the right identifies its place on that subnet. Each can vary in length, but the two together are always 32 bits.

12
Q

How can classful addresses be used in a classless address system?

A

CIDR is backwards-compatible. Existing class A, B, and C addresses just have subnet prefixes of /8, /16, and /24 respectively.

13
Q

What can you tell about this address: 10.124.1.92

A

It’s a private network address, routable within an organization but not on the Internet.

14
Q

What can you tell about this address: 127.0.0.1

A

It’s a loopback address: packets sent there just return to the local host.

15
Q

What can you tell about this address: 169.254.1.13

A

It’s a self-assigned address, which works on the local segment but can’t be routed.

16
Q

What can you tell about this subnet mask: 255.0.255.0

A

It’s not a valid subnet mask since it doesn’t have contiguous 1s followed by contiguous 0s. The host is improperly configured.

17
Q

Loopback IPv6

A

::1/128 returns to the same interface. Equivalent to 127.0.0.1/8 in IPv4.

18
Q

Link-local IPv6

A

Usable on the local segment, but not routable.

19
Q

Unique local IPv6

A

Routable within a private network, such as one managed by a single organization or group of organizations, but not on the public internet.

20
Q

Global IPv6

A

Routable on public networks such as the Internet

21
Q

Why is IPv6 being adopted?

A

The most pressing reason is the depletion of available IPv4 addresses, but it also makes network configuration easier, routing more efficient, and security stronger.

22
Q

What address scopes can an IPv6 unicast address have?

A

From smallest to largest: loopback, link-local, unique local, and global.

23
Q

What IPv6 address would take the place of 127.0.0.1?

A

::1/128 is the IPv6 loopback address.

24
Q

What can you tell about this IPv6 address: fe80::c2ad:5783:91:12c2

A

It’s a link-local address, self-assigned and only usable on the local network segment.

25
Q

What can you tell about this IPv6 address: fd00:34a0:90d::3001:a0a7

A

It’s a unique-local address, routable within the organization but not on the internet.

26
Q

What can you tell about this IPv6 address: 2001:d18:c34d:0:0:0:0:300

A

It’s a public unicast address, routable on the internet.

27
Q

Your company has two sites, each with its own LAN: both are IPv6 ready, but the WAN link between the two is still IPv4. How can you reach other company servers?

A

You can use IPv6 addresses for hosts on your own LAN. To contact the other site you’ll need an IPv4 address unless there’s a tunneling setup.

28
Q

Top-Level Domain (TLD)

A

The root category of the domain. Originally these were either three-letter functional categories like .com or .edu, or two letter country codes like .uk or .jp.

29
Q

Domain

A

Represents a particular organization. Domain names are registered, or rented, from a registrar: each TLD registrar can set its own fees and eligibility requirements.

30
Q

Subdomain

A

An optional level used for categories within the organization. The organization can allocate and use subdomains as it sees fit.

31
Q

Hostname

A

he name of the specific host within the organization, or its alias.

32
Q

Local host mocha wants to send a packet to remote host kona on its subnet. It knows kona’s address is 192.168.100.20. Describe the address resolution process mocha needs to follow.

A

mocha first will look in its ARP cache to see if it has kona’s MAC address. If not, it will use an ARP request using kona’s IP address to find its MAC address. Afterward, both hosts add each other to their ARP caches.

33
Q

What does each segment of the FQDN mocha.corporate.javatucana.coffee represents, and who assigned it?

A

mocha is the host name, and corporate a subdomain: both can be assigned internally by the company. javatucana is a domain name, and was registered with and aapproved by a public domain registry. .coffee is a top level domain, which was approved by the IANA.

34
Q

You want to connect to mocha.corporate.javatucana.coffee over the Internet. Describe the address resolution process your computer needs to follow

A

Your computer will first look for mocha’s IP address in its DNS cache. Assuming it isn’t, it will send a DNS request to its DNS server. The server will check its own address records, and consult higher level servers if necessary. Finally, it will send mocha’s IP address to your computer, which will make the connection using the default route. Finally, your computer will add mocha to its DNS cache.

35
Q

Static Assignment

A

Manual assignment of address settings on the host itself

36
Q

Dynamic Assignment

A

Automatic assignment of an address by a server on the local network.

37
Q

Stateless Address Configuration

A

A private IP address chosen by the host itself through communication on its local subnet. This method produces private, non-routable addresses, so it’s only useful for local communications.

38
Q

APIPA

A

Automatic Private IP Addressing

39
Q

ARP

A

Address Resolution Protocol

40
Q

NDP

A

Neighbour Discovery Protocol

41
Q

CIDR

A

Classless Interdomain Routing

42
Q

RIR

A

Regional Internet Registry

43
Q

IANA

A

Internet Assigned Numbers Authority

44
Q

What are the 2 types of DHCP?

A

DHCPv4 for IPv4 and DHCPv6 for IPv6

45
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

46
Q

OSPF

A

Open Shortest Path First

47
Q

RIP version 2

A

Routing Information Protocol Version 2

48
Q

What are the Private Address ranges?

A

10.0.0.0 - 10.255.255.255 172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255

49
Q

IP range for Class A private address?

A

10.0.0.0-10.255.255.255

50
Q

IP range for Class B private address?

A

172.16.0.0-172.31.255.255

51
Q

IP range for Class C private address?

A

192.168.0.0-192.168.255.255

52
Q

If windows cannot obtain an IP address, it will automatically assign one. How does the beginning of this IP address always start?

A

169.254

53
Q

How does a link-local address start on IPv6?

A

fe80

54
Q

What problems might you see if a host was configured to use DHCP on a network without a valid DHCP server?

A

An APIPA or link-local address, and an inability to communicate with hosts outside the local network segment.

55
Q

What problems might you see from an invalid or duplicate IP address?

A

Inability to reach any hosts, or unpredictable connectivity.

56
Q

What problems might you see from invalid DNS settings?

A

Inability to reach hosts by name, even when they’re reachable by IP address.

57
Q

Can you assign a static IP address while relying on an automatic DNS server assignment?

A

Not for IPv4; you will need to assign a DNS server manually too. IPv6 allows automatic DNS discovery without DHCP, but only if a local router is providing DNS advertisements.

58
Q

Which protocol is used to find the MAC address of a given IP address?

A

ARP

59
Q

List 3 valid subnet masks?

A
  1. 0.0.0
  2. 255.0.0
  3. 255.255.0
60
Q

What is the range of a site local IPv6 address?

A

fec0-fef0

61
Q

What is the range of a global IPv6 address?

A

2000-3fff

62
Q

What is TCP?

A

Transmission Control Protocol

63
Q

What is UDP?

A

User Datagram Protocol

64
Q

Name 5 Benefits of TCP?

A

Connection Orientated - Reliable - Error Correction - Flow Control - Sequencing

65
Q

What features separate TCP from UDP?

A

TCP is connection-oriented and reliable, while UDP is connectionless and unreliable. TCP has segments, UDP has datagrams. TCP has error correction, sequencing, and flow control, while UDP only has basic error correction via a checksum.

66
Q

Why would an application use UDP rather than TCP?

A

It’s faster and more efficient, so it’s good when speed matters more than accuracy, when only short messages are being sent, or when the application layer is handling error correction and sequencing.

67
Q

What are System Ports?

A

Ports 0-1023 are assigned to the most universal and accepted TCP/IP standard applications, or applications the IANA expects to become standards.

68
Q

What are User Ports?

A

Ports 1024-49151 are assigned to applications that benefit from assigned port numbers, but aren’t so widely used that they need to become a worldwide standard.

69
Q

What are Private Ports?

A

Ports 49152-65535 aren’t assigned by the IANA, and can be used for any purpose without registration.

70
Q

HTTP

A

Hypertext Transfer Protocol - Used to retrieve data from web servers - Port 80

71
Q

HTTPS

A

HTTP over TLS/SSL - Used for secure web pages and sites. included encryption services. - Port 443

72
Q

FTP

A

File Transfer Protocol - Used for transferring files between hosts. Contains basic authentication features - Port 20 (data) + port 21 (control)

73
Q

Telnet

A

Used to log into remote systems via a virtual text terminal interface - Port 23

74
Q

SSH

A

Secure Shell - Encrypted replacement for Telnet and FTP. Includes Secure Copy Protocol (SCP) and Secure Shell FTP (SFTP) - Port 22

75
Q

SMTP

A

Simple Mail Transfer Protocol - Sends email to and between mail servers - Port 25

76
Q

POP3

A

Post Office Protocol Version 3 - Retrieves email from mail servers - Port 110

77
Q

IMAP

A

Internet Message Access Protocol - Retrieves email from mail servers - Port 143

78
Q

SMB

A

Server Message Block - Used to share files and resources like printers - Port 445

79
Q

AFP

A

Apple Filing Protocol - Used to share files on OSX and MacOS networks - Port 548 or 427

80
Q

SLP

A

Service Location Pprotocol - Allows computers to find network services without prior configuration. Most commonly used for network printers. - Port 427

81
Q

LDAP

A

Lightweight Directory Access Protocol - Used for network directory services that centrally manage user accounts and network services. - Port 389 + Port 636 (Secure)

82
Q

RDP

A

Remote Desktop Protocol - Used for remote logins to Windows systems. - Port 3389

83
Q

NetBIOS

A

Network Basic Input/Output System - Provides name, datagram, and session services for networks using the NetBIOS API. NetBIOS used on TCP/IP networks is sometimes called NetBT. SMB often uses NetBIOS functions as well. - Port 137 + Port 139

84
Q

SNMP

A

Simple Network Management Protocol - Used to remotely manage and monitor network devices. - Port 161 + Port 162

85
Q

Syslog

A

Sends system status messages to a central server for monitoring and review. - Port 514

86
Q

DNS

A

Domain Name System - Resolves domain names into IP addresses. - Port 53

87
Q

DHCP

A

Dynamic Host Configuration Protocol - Dynamically assigns IP addresses and other network configuration on joining a network. - Port 67 + Port 68

88
Q

What port on your computer does your web browser use?

A

The source port is from the dynamic port range allocated by the operating system. HTTP uses port 80, but that’s on the remote web server.

89
Q

How do system ports differ from user ports?

A

System ports are only assigned to important or standardized services, and some operating systems only let services with administrative privileges to bind to these ports. User ports can be registered by any valid application creator, and user applications can bind to them.

90
Q

What protocol is used to remotely manage and monitor network devices?

A

SNMP

91
Q

Which of the following protocols sends system status messages to a central server for monitoring and review?

A

Syslog

92
Q

Which port is important for sending an email?

A

Port 25

93
Q

TCP contains a checksum which is used for error detection. True or False?

A

True

94
Q

TCP is faster and efficient, when speed matters more than accuracy or when only short messages are being sent. True or False?

A

False

95
Q

TCP guarantees that all data is successfully delivered to the host. True or False?

A

True

96
Q

TCP sends datagrams without setting up a connection or waiting for an acknowledgment. True or False?

A

False

97
Q

TCP guarantees that the broken segments will be delivered to the upper layers in the correct sequence. True or False?

A

True

98
Q

Authentication Server

A

Controls access to the network and other resources.

99
Q

DHCP Server

A

Provides dynamic IP address configuration to client systems

100
Q

DNS Server

A

Provides domain names lookups for client systems

101
Q

Endpoint Management Server

A

Manages security policies for end user systems such as PCs and mobile devices. An endpoint management server may centrally administer antivirus protection, security logging, and policy compliance enforcement across the entire network.

102
Q

File Server

A

Provides centralized file storage and sharing for network users.

103
Q

Mail Server

A

Receives, stores, and delivers email messages.

104
Q

Print Server

A

Provides central access to a network printer. Today, network enabled printers usually run print server applications and connect directly to the network.

105
Q

Proxy Server

A

Relays communications between LAN hosts and internet hosts. A proxy server may be used for some protocols or all communications; depending on the network it might be designed to improve security or performance.

106
Q

Syslog Server

A

Gathers syslog data from other computers and devices on the network and compiles them into one place. A syslog server commonly includes features that process raw logs then generate reports or alerts which are more useful to human administrators.

107
Q

Web Server

A

Distributes web pages. Internet web servers might be most familiar, but local network applications often use web servers as well, even an embedded appliance like a home router or network printer will typically use a web server for its configuration interface.

108
Q

Remote access protocol: Telnet

A

Allows a command line terminal interface with a remote system.

109
Q

Remote access protocol: SSH

A

Secure shell was developed as a secure alternative to Telnet: it allows stronger authentication and encrypted transmission.

110
Q

Remote access protocol: RDP

A

Remote Desktop Protocol is Microsoft’s proprietary remote access protocol.

111
Q

Remote access protocol: VNC

A

Virtual Network Computing is an open set of standards based on the Remote Frame Buffer (RFB) protocol.

112
Q

Remote access protocol: HTTP

A

Web-based interfaces aren’t that suitable for remote access to a graphic or command-line shell interface, though it’s possible with the assistance of a web-based application.

113
Q

Remote access protocol: SNMP

A

Simple Network Management Protocol is used to remotely manage and monitor network devices like routers and switches.

114
Q

RFB Protocol

A

Remote Frame Buffer

115
Q

Authentication Systems: RADIUS

A

Remote Authentication Dial-In User Service authenticates users when they attempt to connect to the network.

116
Q

Authentication Systems: TACACS+

A

Terminal Access Controller Access-Control System Plus is a proprietary Cisco protocol with similar functions to RADIUS.

117
Q

Authentication Systems: Kerberos

A

Allows a client to access multiple network resources via a single sign-in.

118
Q

Authentication Systems: 802.1X

A

An IEEE standard used to authenticate connections to an ethernet switch or wireless access point.

119
Q

Authentication Systems: LDAP

A

Lightweight Directory Access Protocol manages distributed directory information services across a network.

120
Q

Resource Sharing Protocols: FTP

A

One of the oldest Internet protocols, File Transfer Protocol allows network access to files.

121
Q

Resource Sharing Protocols:SMB

A

Server Message Block allows folders or hard drives to be shared over the network and accessed much like they were local drives.

122
Q

Resource Sharing Protocols: AFP

A

Apple Filing Protocol operates similarly to SMB, but with specific features more tuned to Apple’s file systems.

123
Q

Resource Sharing Protocols: NetBIOS

A

A session-layer API, rather than strictly a protocol, NetBIOS is designed to allow various applications to communicate over the network.

124
Q

What kind of server is used to relay communications between LAN hosts and Internet hosts?

A

A Proxy Server

125
Q

Name a communication protocol for electronic mail transmission?

A

SMTP, IMAP, MAPI, POP3 etc.

126
Q

What protocol is used to share files and resources?

A

SMB

127
Q

HTTPS uses port 443 for accessing any web-based sensitive information over the Internet. True or False?

A

True

128
Q

Which of the following addresses is equivalent to fe80:0000:0000:0000:c249:3765:00c0:9b22?

A

fe80::c249:3765:c0:9b22

129
Q

Which resource sharing protocol allows folders or hard drives to be shared over a network?

A

SMB

130
Q

Which protocol is used to remotely manage and monitor network devices like routers and switches?

A

SNMP

131
Q

Which protocol is designed to provide strong authentication for client/server applications by using secret-key cryptography?

A

Kerberos

132
Q

Which of the following ports is used by the Server Message Block (SMB) protocol?

A

445

133
Q

What is the subnet mask of the address 144.201.5.32?

A

255.255.0.0

134
Q

Which is an Internet service that translates domain names into IP addresses?

A

DNS

135
Q

Which IPv4 address range is reserved for APIPA?

A

169.254.0.0/16

136
Q

Which protocol is used to retrieve email from mail servers?

A

IMAP

137
Q

Which of the following is a non-routable address?

A

0.0.0.0

138
Q

Which of the following WPA options is also known as 802.1x mode?

A

WPA-Enterprise

139
Q

Which of the following WPA options is also called pre-shared key (PSK)?

A

WPA-Personal

140
Q

Which Wi-Fi standard supports speeds up to 54 Mbps over the 2.4 GHz band?

A

802.11g

141
Q

Which technology uses a variety of ISM bands, with 2.4 GHz and 915 MHz bands being the most common?

A

ZigBee

142
Q

Which technology supports throughput up to 40 kbps over distances of 10-100 m?

A

Z-Wave

143
Q

Which wireless technology allows identification and communication between nodes using electromagnetic fields?

A

Radio frequency identification

144
Q

Which Wi-Fi encryption standard encrypts traffic using Temporal Key Integrity Protocol (TKIP)?

A

WPA