IP Systems and Network Models Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which IP-related system is associated with the severity levels provided in the table?

  • Server Message Block (TCP 445)
  • Syslog (UDP 514) (correct)
  • RSyslog (TCP 515)
  • RARP (513)
  • The sequence number in a TCP header is 24 bits.

    False (B)

    What network preceded the Internet?

    ARPAnet

    The DoD/Network model's Process/Application layer includes the ______ layer.

    <p>Application</p> Signup and view all the answers

    Match the following services with their corresponding DoD/Network Layer:

    <p>Internet = ICMP, ARP Process/Application = FTP, SMTP, X Windows Network Access = Ethernet Host-to-Host = TCP-UDP</p> Signup and view all the answers

    How many layers are in the DoD/Network Model?

    <p>4 (C)</p> Signup and view all the answers

    LDAP is a protocol that tracks network resources.

    <p>True (A)</p> Signup and view all the answers

    TCP/IP was authorized as the official standard in the ______ and it replaced ______.

    <p>Early 1980s: Network Control Protocol (NCP)</p> Signup and view all the answers

    Which of the following contains the correct fields in a TCP header?

    <p>source port, destination port, length, checksum (C)</p> Signup and view all the answers

    A DHCP client performs a three-step process to receive an IP address from a DHCP server.

    <p>False (B)</p> Signup and view all the answers

    What is the length in bits of a data field in a TCP header?

    <p>32</p> Signup and view all the answers

    The IP address range for APIPA is from ______ to ______.

    <p>169.254.0.1, 169.254.255.254</p> Signup and view all the answers

    Match the following DHCP messages with their correct order:

    <p>DHCP Discover = 1 DHCP Offer = 4 DHCP Request = 2 DHCP Acknowledgment = 3</p> Signup and view all the answers

    Which cryptographic protocols are used for secure online data-transfer activities?

    <p>Secure Sockets Layer (SSL) (B), Transport Layer Security (TLS) (C)</p> Signup and view all the answers

    POP3 is a protocol used for email delivery in a spooled method.

    <p>True (A)</p> Signup and view all the answers

    What type of DHCP message is represented by the MAC address FF:FF:FF:FF:FF:FF?

    <p>Discover broadcast message</p> Signup and view all the answers

    Which statement is true regarding WANs?

    <p>All of the listed answers for this question. (A)</p> Signup and view all the answers

    All LANs require routers to function.

    <p>False (B)</p> Signup and view all the answers

    At which layer of the OSI model is the IP protocol located?

    <p>Network</p> Signup and view all the answers

    On an Ethernet switched network, a computer uses its ______ address to communicate with another computer.

    <p>MAC</p> Signup and view all the answers

    What is the maximum transmission distance specified by the Ethernet standard for Cat 5 and Cat 6 cables?

    <p>100 meters (A)</p> Signup and view all the answers

    Match the following items with their definitions:

    <ol> <li>Full duplex = A. Simultaneous two-way communication</li> <li>Half duplex = B. Alternating communication in both directions</li> <li>Collision domain = C. Network segment where collisions can occur</li> </ol> Signup and view all the answers

    Which of the following binary values corresponds to the decimal number 170?

    <p>10101010 (A)</p> Signup and view all the answers

    How many wire pairs are utilized with 1000BaseT?

    <p>2</p> Signup and view all the answers

    What is the standard for Ethernet over UTP?

    <p>IEEE 802.3 (D)</p> Signup and view all the answers

    How many bits is the MAC address in the WiFi interface?

    <p>48 (C)</p> Signup and view all the answers

    Ethernet can be transmitted over power lines.

    <p>False (B)</p> Signup and view all the answers

    Ethernet can be transmitted over HDMI.

    <p>False (B)</p> Signup and view all the answers

    The three channels to choose for wireless network planning in the 2.4GHz band to avoid overlap are __, __, and __.

    <p>1, 6, 11</p> Signup and view all the answers

    What term is used for wireless NICs that communicate without needing a wireless access point?

    <p>Ad Hoc Mode</p> Signup and view all the answers

    Match the following agencies with their purpose:

    <p>Wi-Fi Alliance = Promotes and tests for WLAN interoperability Institute of Electrical and Electronics Engineers (IEEE) = Creates and maintains operational standards Federal Communications Commission (FCC) = Regulates the use of radio frequencies in the U.S</p> Signup and view all the answers

    What is the speed and frequency range for IEEE 802.11g?

    <p>54Mbps - 2.4 GHz (C)</p> Signup and view all the answers

    Firewalls operate solely at layer 4 of the OSI model.

    <p>False (B)</p> Signup and view all the answers

    Which device connects all the segments of the network together in a star topology Ethernet network?

    <p>HUB (D)</p> Signup and view all the answers

    The device used to configure the complete network and push settings to the Wi-Fi access points is called a ______.

    <p>Wireless LAN controller</p> Signup and view all the answers

    What command would you use to enable AUTO speed configuration on a switch?

    <p>speed</p> Signup and view all the answers

    Match the following devices with their functions:

    <p>NIC = Connects computer to a network Firewall = Secures a network Bridge = Connects multiple segments of a network HIDS = Monitors host for intrusions</p> Signup and view all the answers

    Which of the following is NOT one of the three separate networks, or zones, in a typical firewall design?

    <p>Combined (D)</p> Signup and view all the answers

    A host-based IDS (HIDS) can monitor your network for signs of an intrusion.

    <p>False (B)</p> Signup and view all the answers

    What might you implement to handle heavy traffic to a busy website?

    <p>Load Balancer</p> Signup and view all the answers

    What is the main function of a load balancer in a network?

    <p>Distribute network traffic across multiple servers (C)</p> Signup and view all the answers

    A DHCP server assigns fixed IP addresses to hosts.

    <p>False (B)</p> Signup and view all the answers

    What is the primary role of a proxy server?

    <p>To forward client requests to other servers.</p> Signup and view all the answers

    The ______ record in DNS is used to map a domain name to its corresponding IP address.

    <p>A</p> Signup and view all the answers

    Match the following networking devices with their primary function:

    <p>DHCP Server = Assigns IP addresses to hosts NTP = Provides clock synchronization Load balancer = Distributes network traffic Proxy Server = Forwards requests to other servers</p> Signup and view all the answers

    Which of the following describes the latency of a network?

    <p>The time taken for a frame to travel from input to output (C)</p> Signup and view all the answers

    Industrial control systems (ICS) are solely used in waste management.

    <p>False (B)</p> Signup and view all the answers

    What does the acronym HIDS stand for?

    <p>Host Intrusion Detection System</p> Signup and view all the answers

    Flashcards

    Syslog Protocol

    A system for logging events, especially network events.

    TCP Sequence Number (bits)

    A 32-bit field used in TCP for tracking data packets.

    DoD/Network Model Layers

    Process/Application, Host-to-Host, Internet, Network Access.

    Precursor to the Internet

    ARPAnet was the network that preceded the Internet.

    Signup and view all the flashcards

    DoD Application Layer equivalent (OSI)

    Application, Presentation, and Session layers.

    Signup and view all the flashcards

    LDAP (protocol)

    A directory service protocol for managing network resources.

    Signup and view all the flashcards

    TCP/IP Authorization

    TCP/IP became the standard for ARPAnet in early 1980s, replacing NCP.

    Signup and view all the flashcards

    UDP Header Fields

    A UDP header contains source port, destination port, length and checksum.

    Signup and view all the flashcards

    DHCP Discover Message

    A message broadcast by a client to find a DHCP server.

    Signup and view all the flashcards

    DHCP Request Message

    A message sent by a client to a DHCP server requesting a specific IP address.

    Signup and view all the flashcards

    DHCP Offer Message

    A message from a server to a client offering an IP address.

    Signup and view all the flashcards

    DHCP Acknowledgment Message

    A message from a DHCP server to a client confirming an offer and assigning an IP.

    Signup and view all the flashcards

    DNS Namespace

    A hierarchical system for logically locating systems based on domain identifiers.

    Signup and view all the flashcards

    Network Access Layer

    (in the DoD model) The layer responsible for hardware addressing and data transmission.

    Signup and view all the flashcards

    POP3 Protocol

    A protocol for retrieving email using a spooled mail delivery system.

    Signup and view all the flashcards

    TCP Header Data Field Length

    The length of the data field in a TCP header, measured in bits.

    Signup and view all the flashcards

    WAN Difference

    Wide Area Networks (WANs) use various communication methods, including public and private networks, and cover large geographical areas with routers.

    Signup and view all the flashcards

    Network Topology Design

    Network topology design considers factors like cost, fault tolerance requirements, maintenance, and installation ease.

    Signup and view all the flashcards

    IP Layer OSI Model

    The IP protocol operates at the Network Layer within the OSI model.

    Signup and view all the flashcards

    SYN/ACK Packet

    Host 2 responds to Host 1's SYN packet with a SYN/ACK packet to initiate a connection.

    Signup and view all the flashcards

    Ethernet MAC Address

    Computers on an Ethernet switched network use MAC addresses for local communication.

    Signup and view all the flashcards

    1000BaseTX

    A network standard supporting full-duplex Ethernet communication, achieving 1000Mbps speed, and suitable for Cat6 cables.

    Signup and view all the flashcards

    Collision Domain Devices

    All devices on a collision domain must listen during transmissions from a single device.

    Signup and view all the flashcards

    Ethernet Cable Distance

    The maximum transmission distance for Cat5e/6 cable is 100 meters.

    Signup and view all the flashcards

    Hub

    A device that connects all segments of a network together in a star topology Ethernet network.

    Signup and view all the flashcards

    Switch

    A network device that connects multiple segments of a network together, recognizing frames based on source and destination MAC addresses and the port on which they're received.

    Signup and view all the flashcards

    Bridge

    A device that connects multiple segments of a network together, recognizing frames and paying attention to the source and destination MAC address of the incoming frame as well as the port on which it was received.

    Signup and view all the flashcards

    NIC

    A network interface card, installed in a computer to connect or interface it with a network.

    Signup and view all the flashcards

    Firewall

    A security device that acts as a barrier between a network and the outside world, controlling incoming and outgoing traffic based on predefined rules.

    Signup and view all the flashcards

    DMZ (Demilitarized Zone)

    A separate network segment within a firewall configuration, used to host publicly accessible services while isolating them from the internal network.

    Signup and view all the flashcards

    Wireless LAN Controller

    A central device that manages and configures multiple Wi-Fi access points within a network, providing a unified control point.

    Signup and view all the flashcards

    HIDS (Host-based Intrusion Detection System)

    A security software that monitors a specific host or device for suspicious activity and alerts you.

    Signup and view all the flashcards

    Ethernet Standard

    The standard that defines how Ethernet operates over unshielded twisted-pair (UTP) cable.

    Signup and view all the flashcards

    MAC Address Size (WiFi)

    The number of bits used in a MAC address for a wireless network interface, like the one in your refrigerator.

    Signup and view all the flashcards

    Ethernet Over Power Lines?

    Can Ethernet data be transmitted using electrical power lines?

    Signup and view all the flashcards

    Ethernet Over HDMI?

    Can Ethernet data be transmitted through an HDMI cable?

    Signup and view all the flashcards

    Ethernet Frame Preamble

    The part of an Ethernet frame that helps synchronize the receiver with the sender.

    Signup and view all the flashcards

    IEEE 802.11g

    A wireless communication standard that offers a specific speed and frequency range for communication.

    Signup and view all the flashcards

    MIMO (Multiple-Input, Multiple-Output)

    A technology that uses multiple antennas to improve throughput (data transfer speed) for wireless communication.

    Signup and view all the flashcards

    Ad Hoc Mode

    A wireless connection where devices communicate directly with each other without a central access point.

    Signup and view all the flashcards

    Load Balancer

    A device or software that distributes network traffic across multiple servers, improving performance, reliability, and scalability.

    Signup and view all the flashcards

    Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    A method used in Ethernet networks where devices listen for signals before transmitting data, preventing collisions and ensuring data integrity.

    Signup and view all the flashcards

    DHCP Server

    A server responsible for automatically assigning IP addresses to devices on a network, simplifying network management.

    Signup and view all the flashcards

    IP Exclusions

    Specific IP addresses or ranges within a DHCP server's pool that are excluded from being assigned to devices.

    Signup and view all the flashcards

    DHCP Lease Time

    The duration for which a device can use an IP address assigned by a DHCP server before it needs to renew the lease.

    Signup and view all the flashcards

    Multilayer Switch

    A network device that operates at both Layer 2 (data link) and Layer 3 (network) of the OSI model, allowing both switching and routing functionality.

    Signup and view all the flashcards

    DNS A Record

    A record in the Domain Name System (DNS) that maps a domain name to an IP address, enabling the translation of human-readable domain names into machine-readable IP addresses.

    Signup and view all the flashcards

    Study Notes

    • Syslog (UDP 514) is a likely system for the table
    • The table shows severity levels (0-7) for IP-related issues
    • Level 0 indicates a system is unusable
    • Level 1 requires immediate action
    • Level 2 represents critical conditions
    • Level 3 shows error conditions
    • Level 4 displays warning conditions
    • Level 5 indicates normal but significant conditions
    • Level 6 is for informational messages only
    • Level 7 is for debugging messages only

    TCP Header Sequence Number

    • The sequence number in a TCP header is 32 bits

    DoD/Network Layer Matching

    • Match the following services with their corresponding DoD/Network Layer
    • Internet Layer
    • Process/Application Layer
    • Network Access Layer
    • Host-to-Host Layer

    Preceding Network

    • The network that preceded the internet was ARPAnet

    OSI 7-Layer and DoD Layers

    • The DoD Process/Application layer encompasses the OSI Application, Presentation, and Session layers

    DoD/Network Model Layers

    • Process/Application Layer
    • Host-to-Host Layer
    • Internet Layer
    • Network Access Layer

    Network Resource Tracker

    • LDAP is a system/protocol that tracks network resources (devices and users)
    • The secure version uses port 636

    TCP/IP Authorization Date

    • TCP/IP was authorized as the official standard for ARPAnet in the early 1980s, replacing NCP

    UDP Header Fields

    • The UDP header includes source port, destination port, length, and checksum

    DHCP Client Four-Step Process

    • DHCP Client-Server Interaction (DORA)
      • 1: DHCP Client broadcasts a DHCP Discover message
      • 2: DHCP server, receiving the DHCP Discover message, sends a unicast DHCP Offer message
      • 3: Client broadcasts a DHCP request message
      • 4: Server issues a unicast DHCP Acknowledgment message to the client

    DNS Hierarchy

    • DNS namespace (a hierarchy) logically locates systems using domain identifiers

    Network Access Layer

    • The network access layer of the DoD model manages hardware addressing and physical data transmission

    Email Protocol

    • Simple Mail Transfer Protocol (SMTP) is used for spooled email delivery

    TCP Header Data Field

    • The length of a data field in a TCP header can vary

    DHCP Protocol Packet Type and Ports

    • DHCP uses UDP ports 67 and 68

    APIPA Range

    • The IP address range for APIPA is 169.254.0.1-169.254.255.254

    Cryptographic Protocols

    • TLS, SSL are cryptographic protocols for secure data transfer

    DHCP Discover Message

    • The broadcast message FF:FF:FF:FF:FF:FF

    Network Management System (NMS) in SNMP

    • Polling via MIB (Management Information Base)

    Operating System with TCP/IP Support

    • BSD Unix developed at the University of California, Berkeley and incorporated TCP/IP

    Secure Communications Session/Port

    • SSH (Secure Shell) uses port 22 for secure communications

    TCP/IP Suite Creator

    • The Department of Defense (DoD) created TCP/IP to maintain communications in case of catastrophic warfare events

    Network Address Translation (NAT)

    • Static, Dynamic, Overloading are types of NAT

    IPv4 Subnetting

    • Subnetting methods are used to allocate IP addresses to companies

    Default Gateway, Domain Name and Others

    • A DHCP server can provide default gateway, domain name, network time synchronization, and subnet mask

    Subnet Mask Length

    • A subnet mask is 32 bits long

    Multicast Address Class

    • Class D is used for multicast addresses

    ISP Address Allocation

    • ISPs use Classless Inter-Domain Routing (CIDR) to allocate addresses

    Variable-Length Subnet Masking

    • CIDR is the method for variable-length subnet masking

    Network/Host Bits for 112.18.13.32/20

    • 20 bits for the network portion and 12 bits for the host portion of an IPv4 address

    Subnet Mask and CIDR Notation for 255.255.255.248

    • /29 corresponds to 255.255.255.248

    Usable Addresses for 255.255.255.0

    • 254 host addresses

    Host Portion Range Reservation

    • The highest address in the host portion is reserved for broadcast purposes

    CIDR Notation and Reason for Limitations of /31 or /32

    • /31 and /32 subnet masks are not utilized for host assignments (invalid) because they contain too few host bits

    Number of Subnets for 11000000 Binary Mask

    • 2^2 = 4 subnets

    Number of Subnets for /27 Subnet Mask

    • 8 subnets are possible with a /27 subnet mask

    Network-Testing ICMP Protocol

    • Ping uses ICMP (Internet Control Message Protocol) to test connectivity

    Technique for Depleting IP Address Space

    • Classless Inter-Domain Routing (CIDR) maintains a smaller number of public IP addresses

    Network Address Translation (NAT) Types

    • Overloading
    • Recursive
    • Static are examples

    External vs Internal Addresses

    • NAT translates internal network addresses to external addresses

    NAT Overloading Alternate Name

    • Port Address Translation

    OSI Model Layer for Addressing End Systems and Data Routing

    • The network layer of the OSI model handles addressing and routing of datagrams

    OSI Layer Device Location

    • Routers work at the network layer
    • Switches operate at the data link layer
    • Hubs operate at the physical layer

    OSI Model Layer for Dialogue Control

    • The Transport layer of the OSI model handles dialogue control

    Network Topology with Redundant Paths

    • The mesh topology offer the most redundant paths

    Topology Change for Network Upgrade

    • The change to a star topology is required when upgrading from coax-based ethernet to gigabit ethernet using UTP cable

    Network Topology Diagram

    • A mesh topology is shown in the diagram

    Workstation Connection Loss

    • In a star topology, only the workstation with the broken connection is affected

    Difference between LAN and WAN

    • WANs cover larger geographical areas and use both public and private data transport while LANs cover a smaller area.

    Designing Network Topology Factors

    • Cost, fault-tolerance requirements, ease of maintenance, and ease of installation are considerations

    OSI Model Layer for IP

    • The network layer of the OSI model contains the IP protocol

    Host 1 to Host 2 Communication

    • When Host 1 sends a SYN packet to Host 2, Host 2 responds with SYN/ACK

    Layer of Responsibility for Application-Level Issues

    • The application layer is responsible for time-outs related to application issues (like web page load times for example).

    Computer Communication Address on Ethernet Switched Networks

    • MAC address

    1000Mbps Ethernet and Cable Compatibility

    • 1000BaseTX can run full duplex Ethernet

    Collision Domain Transmitters

    • All devices on a collision domain listen when a single device transmits.

    Ethernet Cable Transmission Distance.

    • The maximum transmission distance for Cat 5 and 6 cables is 100 meters.

    Wire Pairs used for Half Duplex

    • 2 wire pairs

    Wire Pairs used in 1000BaseT

    • 4 wire pairs

    Decimal Conversion of Binary Number 10101010

    • 170 represents 10101010 in decimal

    Binary Conversion of Decimal Number 17

    • 10001 translates from 17 in decimal to binary format.

    Ethernet Over UTP Standard

    • The standard for ethernet over UTP cable is IEEE 802.3

    Number of bits in a MAC Address

    • 48 bits

    Can Ethernet be transmitted through power lines

    • True

    Ethernet and HDMI Transmission

    • False - Ethernet cannot be transmitted over HDMI

    Ethernet Frame Fields

    • The preamble, source MAC address, and 4-byte frame delimiter are shown

    Wi-Fi Alliance, IEEE and FCC Purpose

    • The Wi-Fi Alliance promotes and tests for, operational standards, and the Federal Communications Commission (FCC) regulates radio frequencies.

    IEEE 802.11g Speed range

    • 54Mbps - 2.4 GHz

    IEEE Protocol with Multiple Antenna Support

    • IEEE 802.11n

    2.4GHz Network Channel Avoidance

    • 1, 6, 11

    Wireless Communication Type

    • Ad Hoc Mode

    Devices Causing 2.4GHz Interference

    • Microwave ovens and Bluetooth devices

    Feature that Monitors 5GHz Range

    • Dynamic Frequency Selection

    Point-to-Multipoint Antenna Example

    • Yagi antenna

    Antenna Type From Image

    • Yagi

    Infrastructure Mode and Access Points

    • Basic Service Set or (BSS)

    CAPWAP and Rogue Access Points

    • True, CAPWAP is a mitigation technique for rogue access points
    • Bridge connects networks

    Network Interface Card (NIC)

    • NIC is used to connect a computer to a network

    IP Command output

    • speed command can set the speed

    Firewall operation layer

    • Firewalls operate at layer 4 of the OSI model

    Security Device in Diagram

    • Firewall
    • Firewall is a security device situated between an internal network and an outside network

    Firewall Network Zone Definitions

    • The three zones are external, internal, dmz

    Host-Based IDS

    • True, host-based IDS can monitor signs of intrusions on a network

    Network Configuration Device

    • Wireless LAN controller

    Load Balancing Technique for High Traffic

    • Load balancer

    Wired Device Contention Method

    • Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

    Server Assignment of IP Addresses

    • DHCP

    IP Exclusions or Exclusion Ranges for DHCP

    • Used to set aside addresses from pools

    DHCP Server Troubleshooting

    • Check lease time

    Layer-2 Networking Device with Routing Capabilities

    • A multi-layer switch

    Protocol to Find IP Address of Domain

    • A record

    Network Device Synchronization

    • NTP (Network Time Protocol)

    Server Function Forwarding Traffic

    • Proxy server

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on IP-related systems, the TCP header sequence number, and the DoD/Network model layers in this comprehensive quiz. Learn about severity levels in syslog, the evolution of networking from ARPAnet, and the OSI model's relations to the DoD layers.

    More Like This

    1994 Internet Usage Introduction
    9 questions
    نظم المعلومات الشبكية
    23 questions
    Use Quizgecko on...
    Browser
    Browser