IP Systems and Network Models Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which IP-related system is associated with the severity levels provided in the table?

  • Server Message Block (TCP 445)
  • Syslog (UDP 514) (correct)
  • RSyslog (TCP 515)
  • RARP (513)

The sequence number in a TCP header is 24 bits.

False (B)

What network preceded the Internet?

ARPAnet

The DoD/Network model's Process/Application layer includes the ______ layer.

<p>Application</p> Signup and view all the answers

Match the following services with their corresponding DoD/Network Layer:

<p>Internet = ICMP, ARP Process/Application = FTP, SMTP, X Windows Network Access = Ethernet Host-to-Host = TCP-UDP</p> Signup and view all the answers

How many layers are in the DoD/Network Model?

<p>4 (C)</p> Signup and view all the answers

LDAP is a protocol that tracks network resources.

<p>True (A)</p> Signup and view all the answers

TCP/IP was authorized as the official standard in the ______ and it replaced ______.

<p>Early 1980s: Network Control Protocol (NCP)</p> Signup and view all the answers

Which of the following contains the correct fields in a TCP header?

<p>source port, destination port, length, checksum (C)</p> Signup and view all the answers

A DHCP client performs a three-step process to receive an IP address from a DHCP server.

<p>False (B)</p> Signup and view all the answers

What is the length in bits of a data field in a TCP header?

<p>32</p> Signup and view all the answers

The IP address range for APIPA is from ______ to ______.

<p>169.254.0.1, 169.254.255.254</p> Signup and view all the answers

Match the following DHCP messages with their correct order:

<p>DHCP Discover = 1 DHCP Offer = 4 DHCP Request = 2 DHCP Acknowledgment = 3</p> Signup and view all the answers

Which cryptographic protocols are used for secure online data-transfer activities?

<p>Secure Sockets Layer (SSL) (B), Transport Layer Security (TLS) (C)</p> Signup and view all the answers

POP3 is a protocol used for email delivery in a spooled method.

<p>True (A)</p> Signup and view all the answers

What type of DHCP message is represented by the MAC address FF:FF:FF:FF:FF:FF?

<p>Discover broadcast message</p> Signup and view all the answers

Which statement is true regarding WANs?

<p>All of the listed answers for this question. (A)</p> Signup and view all the answers

All LANs require routers to function.

<p>False (B)</p> Signup and view all the answers

At which layer of the OSI model is the IP protocol located?

<p>Network</p> Signup and view all the answers

On an Ethernet switched network, a computer uses its ______ address to communicate with another computer.

<p>MAC</p> Signup and view all the answers

What is the maximum transmission distance specified by the Ethernet standard for Cat 5 and Cat 6 cables?

<p>100 meters (A)</p> Signup and view all the answers

Match the following items with their definitions:

<ol> <li>Full duplex = A. Simultaneous two-way communication</li> <li>Half duplex = B. Alternating communication in both directions</li> <li>Collision domain = C. Network segment where collisions can occur</li> </ol> Signup and view all the answers

Which of the following binary values corresponds to the decimal number 170?

<p>10101010 (A)</p> Signup and view all the answers

How many wire pairs are utilized with 1000BaseT?

<p>2</p> Signup and view all the answers

What is the standard for Ethernet over UTP?

<p>IEEE 802.3 (D)</p> Signup and view all the answers

How many bits is the MAC address in the WiFi interface?

<p>48 (C)</p> Signup and view all the answers

Ethernet can be transmitted over power lines.

<p>False (B)</p> Signup and view all the answers

Ethernet can be transmitted over HDMI.

<p>False (B)</p> Signup and view all the answers

The three channels to choose for wireless network planning in the 2.4GHz band to avoid overlap are __, __, and __.

<p>1, 6, 11</p> Signup and view all the answers

What term is used for wireless NICs that communicate without needing a wireless access point?

<p>Ad Hoc Mode</p> Signup and view all the answers

Match the following agencies with their purpose:

<p>Wi-Fi Alliance = Promotes and tests for WLAN interoperability Institute of Electrical and Electronics Engineers (IEEE) = Creates and maintains operational standards Federal Communications Commission (FCC) = Regulates the use of radio frequencies in the U.S</p> Signup and view all the answers

What is the speed and frequency range for IEEE 802.11g?

<p>54Mbps - 2.4 GHz (C)</p> Signup and view all the answers

Firewalls operate solely at layer 4 of the OSI model.

<p>False (B)</p> Signup and view all the answers

Which device connects all the segments of the network together in a star topology Ethernet network?

<p>HUB (D)</p> Signup and view all the answers

The device used to configure the complete network and push settings to the Wi-Fi access points is called a ______.

<p>Wireless LAN controller</p> Signup and view all the answers

What command would you use to enable AUTO speed configuration on a switch?

<p>speed</p> Signup and view all the answers

Match the following devices with their functions:

<p>NIC = Connects computer to a network Firewall = Secures a network Bridge = Connects multiple segments of a network HIDS = Monitors host for intrusions</p> Signup and view all the answers

Which of the following is NOT one of the three separate networks, or zones, in a typical firewall design?

<p>Combined (D)</p> Signup and view all the answers

A host-based IDS (HIDS) can monitor your network for signs of an intrusion.

<p>False (B)</p> Signup and view all the answers

What might you implement to handle heavy traffic to a busy website?

<p>Load Balancer</p> Signup and view all the answers

What is the main function of a load balancer in a network?

<p>Distribute network traffic across multiple servers (C)</p> Signup and view all the answers

A DHCP server assigns fixed IP addresses to hosts.

<p>False (B)</p> Signup and view all the answers

What is the primary role of a proxy server?

<p>To forward client requests to other servers.</p> Signup and view all the answers

The ______ record in DNS is used to map a domain name to its corresponding IP address.

<p>A</p> Signup and view all the answers

Match the following networking devices with their primary function:

<p>DHCP Server = Assigns IP addresses to hosts NTP = Provides clock synchronization Load balancer = Distributes network traffic Proxy Server = Forwards requests to other servers</p> Signup and view all the answers

Which of the following describes the latency of a network?

<p>The time taken for a frame to travel from input to output (C)</p> Signup and view all the answers

Industrial control systems (ICS) are solely used in waste management.

<p>False (B)</p> Signup and view all the answers

What does the acronym HIDS stand for?

<p>Host Intrusion Detection System</p> Signup and view all the answers

Flashcards

Syslog Protocol

A system for logging events, especially network events.

TCP Sequence Number (bits)

A 32-bit field used in TCP for tracking data packets.

DoD/Network Model Layers

Process/Application, Host-to-Host, Internet, Network Access.

Precursor to the Internet

ARPAnet was the network that preceded the Internet.

Signup and view all the flashcards

DoD Application Layer equivalent (OSI)

Application, Presentation, and Session layers.

Signup and view all the flashcards

LDAP (protocol)

A directory service protocol for managing network resources.

Signup and view all the flashcards

TCP/IP Authorization

TCP/IP became the standard for ARPAnet in early 1980s, replacing NCP.

Signup and view all the flashcards

UDP Header Fields

A UDP header contains source port, destination port, length and checksum.

Signup and view all the flashcards

DHCP Discover Message

A message broadcast by a client to find a DHCP server.

Signup and view all the flashcards

DHCP Request Message

A message sent by a client to a DHCP server requesting a specific IP address.

Signup and view all the flashcards

DHCP Offer Message

A message from a server to a client offering an IP address.

Signup and view all the flashcards

DHCP Acknowledgment Message

A message from a DHCP server to a client confirming an offer and assigning an IP.

Signup and view all the flashcards

DNS Namespace

A hierarchical system for logically locating systems based on domain identifiers.

Signup and view all the flashcards

Network Access Layer

(in the DoD model) The layer responsible for hardware addressing and data transmission.

Signup and view all the flashcards

POP3 Protocol

A protocol for retrieving email using a spooled mail delivery system.

Signup and view all the flashcards

TCP Header Data Field Length

The length of the data field in a TCP header, measured in bits.

Signup and view all the flashcards

WAN Difference

Wide Area Networks (WANs) use various communication methods, including public and private networks, and cover large geographical areas with routers.

Signup and view all the flashcards

Network Topology Design

Network topology design considers factors like cost, fault tolerance requirements, maintenance, and installation ease.

Signup and view all the flashcards

IP Layer OSI Model

The IP protocol operates at the Network Layer within the OSI model.

Signup and view all the flashcards

SYN/ACK Packet

Host 2 responds to Host 1's SYN packet with a SYN/ACK packet to initiate a connection.

Signup and view all the flashcards

Ethernet MAC Address

Computers on an Ethernet switched network use MAC addresses for local communication.

Signup and view all the flashcards

1000BaseTX

A network standard supporting full-duplex Ethernet communication, achieving 1000Mbps speed, and suitable for Cat6 cables.

Signup and view all the flashcards

Collision Domain Devices

All devices on a collision domain must listen during transmissions from a single device.

Signup and view all the flashcards

Ethernet Cable Distance

The maximum transmission distance for Cat5e/6 cable is 100 meters.

Signup and view all the flashcards

Hub

A device that connects all segments of a network together in a star topology Ethernet network.

Signup and view all the flashcards

Switch

A network device that connects multiple segments of a network together, recognizing frames based on source and destination MAC addresses and the port on which they're received.

Signup and view all the flashcards

Bridge

A device that connects multiple segments of a network together, recognizing frames and paying attention to the source and destination MAC address of the incoming frame as well as the port on which it was received.

Signup and view all the flashcards

NIC

A network interface card, installed in a computer to connect or interface it with a network.

Signup and view all the flashcards

Firewall

A security device that acts as a barrier between a network and the outside world, controlling incoming and outgoing traffic based on predefined rules.

Signup and view all the flashcards

DMZ (Demilitarized Zone)

A separate network segment within a firewall configuration, used to host publicly accessible services while isolating them from the internal network.

Signup and view all the flashcards

Wireless LAN Controller

A central device that manages and configures multiple Wi-Fi access points within a network, providing a unified control point.

Signup and view all the flashcards

HIDS (Host-based Intrusion Detection System)

A security software that monitors a specific host or device for suspicious activity and alerts you.

Signup and view all the flashcards

Ethernet Standard

The standard that defines how Ethernet operates over unshielded twisted-pair (UTP) cable.

Signup and view all the flashcards

MAC Address Size (WiFi)

The number of bits used in a MAC address for a wireless network interface, like the one in your refrigerator.

Signup and view all the flashcards

Ethernet Over Power Lines?

Can Ethernet data be transmitted using electrical power lines?

Signup and view all the flashcards

Ethernet Over HDMI?

Can Ethernet data be transmitted through an HDMI cable?

Signup and view all the flashcards

Ethernet Frame Preamble

The part of an Ethernet frame that helps synchronize the receiver with the sender.

Signup and view all the flashcards

IEEE 802.11g

A wireless communication standard that offers a specific speed and frequency range for communication.

Signup and view all the flashcards

MIMO (Multiple-Input, Multiple-Output)

A technology that uses multiple antennas to improve throughput (data transfer speed) for wireless communication.

Signup and view all the flashcards

Ad Hoc Mode

A wireless connection where devices communicate directly with each other without a central access point.

Signup and view all the flashcards

Load Balancer

A device or software that distributes network traffic across multiple servers, improving performance, reliability, and scalability.

Signup and view all the flashcards

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A method used in Ethernet networks where devices listen for signals before transmitting data, preventing collisions and ensuring data integrity.

Signup and view all the flashcards

DHCP Server

A server responsible for automatically assigning IP addresses to devices on a network, simplifying network management.

Signup and view all the flashcards

IP Exclusions

Specific IP addresses or ranges within a DHCP server's pool that are excluded from being assigned to devices.

Signup and view all the flashcards

DHCP Lease Time

The duration for which a device can use an IP address assigned by a DHCP server before it needs to renew the lease.

Signup and view all the flashcards

Multilayer Switch

A network device that operates at both Layer 2 (data link) and Layer 3 (network) of the OSI model, allowing both switching and routing functionality.

Signup and view all the flashcards

DNS A Record

A record in the Domain Name System (DNS) that maps a domain name to an IP address, enabling the translation of human-readable domain names into machine-readable IP addresses.

Signup and view all the flashcards

Study Notes

  • Syslog (UDP 514) is a likely system for the table
  • The table shows severity levels (0-7) for IP-related issues
  • Level 0 indicates a system is unusable
  • Level 1 requires immediate action
  • Level 2 represents critical conditions
  • Level 3 shows error conditions
  • Level 4 displays warning conditions
  • Level 5 indicates normal but significant conditions
  • Level 6 is for informational messages only
  • Level 7 is for debugging messages only

TCP Header Sequence Number

  • The sequence number in a TCP header is 32 bits

DoD/Network Layer Matching

  • Match the following services with their corresponding DoD/Network Layer
  • Internet Layer
  • Process/Application Layer
  • Network Access Layer
  • Host-to-Host Layer

Preceding Network

  • The network that preceded the internet was ARPAnet

OSI 7-Layer and DoD Layers

  • The DoD Process/Application layer encompasses the OSI Application, Presentation, and Session layers

DoD/Network Model Layers

  • Process/Application Layer
  • Host-to-Host Layer
  • Internet Layer
  • Network Access Layer

Network Resource Tracker

  • LDAP is a system/protocol that tracks network resources (devices and users)
  • The secure version uses port 636

TCP/IP Authorization Date

  • TCP/IP was authorized as the official standard for ARPAnet in the early 1980s, replacing NCP

UDP Header Fields

  • The UDP header includes source port, destination port, length, and checksum

DHCP Client Four-Step Process

  • DHCP Client-Server Interaction (DORA)
    • 1: DHCP Client broadcasts a DHCP Discover message
    • 2: DHCP server, receiving the DHCP Discover message, sends a unicast DHCP Offer message
    • 3: Client broadcasts a DHCP request message
    • 4: Server issues a unicast DHCP Acknowledgment message to the client

DNS Hierarchy

  • DNS namespace (a hierarchy) logically locates systems using domain identifiers

Network Access Layer

  • The network access layer of the DoD model manages hardware addressing and physical data transmission

Email Protocol

  • Simple Mail Transfer Protocol (SMTP) is used for spooled email delivery

TCP Header Data Field

  • The length of a data field in a TCP header can vary

DHCP Protocol Packet Type and Ports

  • DHCP uses UDP ports 67 and 68

APIPA Range

  • The IP address range for APIPA is 169.254.0.1-169.254.255.254

Cryptographic Protocols

  • TLS, SSL are cryptographic protocols for secure data transfer

DHCP Discover Message

  • The broadcast message FF:FF:FF:FF:FF:FF

Network Management System (NMS) in SNMP

  • Polling via MIB (Management Information Base)

Operating System with TCP/IP Support

  • BSD Unix developed at the University of California, Berkeley and incorporated TCP/IP

Secure Communications Session/Port

  • SSH (Secure Shell) uses port 22 for secure communications

TCP/IP Suite Creator

  • The Department of Defense (DoD) created TCP/IP to maintain communications in case of catastrophic warfare events

Network Address Translation (NAT)

  • Static, Dynamic, Overloading are types of NAT

IPv4 Subnetting

  • Subnetting methods are used to allocate IP addresses to companies

Default Gateway, Domain Name and Others

  • A DHCP server can provide default gateway, domain name, network time synchronization, and subnet mask

Subnet Mask Length

  • A subnet mask is 32 bits long

Multicast Address Class

  • Class D is used for multicast addresses

ISP Address Allocation

  • ISPs use Classless Inter-Domain Routing (CIDR) to allocate addresses

Variable-Length Subnet Masking

  • CIDR is the method for variable-length subnet masking

Network/Host Bits for 112.18.13.32/20

  • 20 bits for the network portion and 12 bits for the host portion of an IPv4 address

Subnet Mask and CIDR Notation for 255.255.255.248

  • /29 corresponds to 255.255.255.248

Usable Addresses for 255.255.255.0

  • 254 host addresses

Host Portion Range Reservation

  • The highest address in the host portion is reserved for broadcast purposes

CIDR Notation and Reason for Limitations of /31 or /32

  • /31 and /32 subnet masks are not utilized for host assignments (invalid) because they contain too few host bits

Number of Subnets for 11000000 Binary Mask

  • 2^2 = 4 subnets

Number of Subnets for /27 Subnet Mask

  • 8 subnets are possible with a /27 subnet mask

Network-Testing ICMP Protocol

  • Ping uses ICMP (Internet Control Message Protocol) to test connectivity

Technique for Depleting IP Address Space

  • Classless Inter-Domain Routing (CIDR) maintains a smaller number of public IP addresses

Network Address Translation (NAT) Types

  • Overloading
  • Recursive
  • Static are examples

External vs Internal Addresses

  • NAT translates internal network addresses to external addresses

NAT Overloading Alternate Name

  • Port Address Translation

OSI Model Layer for Addressing End Systems and Data Routing

  • The network layer of the OSI model handles addressing and routing of datagrams

OSI Layer Device Location

  • Routers work at the network layer
  • Switches operate at the data link layer
  • Hubs operate at the physical layer

OSI Model Layer for Dialogue Control

  • The Transport layer of the OSI model handles dialogue control

Network Topology with Redundant Paths

  • The mesh topology offer the most redundant paths

Topology Change for Network Upgrade

  • The change to a star topology is required when upgrading from coax-based ethernet to gigabit ethernet using UTP cable

Network Topology Diagram

  • A mesh topology is shown in the diagram

Workstation Connection Loss

  • In a star topology, only the workstation with the broken connection is affected

Difference between LAN and WAN

  • WANs cover larger geographical areas and use both public and private data transport while LANs cover a smaller area.

Designing Network Topology Factors

  • Cost, fault-tolerance requirements, ease of maintenance, and ease of installation are considerations

OSI Model Layer for IP

  • The network layer of the OSI model contains the IP protocol

Host 1 to Host 2 Communication

  • When Host 1 sends a SYN packet to Host 2, Host 2 responds with SYN/ACK

Layer of Responsibility for Application-Level Issues

  • The application layer is responsible for time-outs related to application issues (like web page load times for example).

Computer Communication Address on Ethernet Switched Networks

  • MAC address

1000Mbps Ethernet and Cable Compatibility

  • 1000BaseTX can run full duplex Ethernet

Collision Domain Transmitters

  • All devices on a collision domain listen when a single device transmits.

Ethernet Cable Transmission Distance.

  • The maximum transmission distance for Cat 5 and 6 cables is 100 meters.

Wire Pairs used for Half Duplex

  • 2 wire pairs

Wire Pairs used in 1000BaseT

  • 4 wire pairs

Decimal Conversion of Binary Number 10101010

  • 170 represents 10101010 in decimal

Binary Conversion of Decimal Number 17

  • 10001 translates from 17 in decimal to binary format.

Ethernet Over UTP Standard

  • The standard for ethernet over UTP cable is IEEE 802.3

Number of bits in a MAC Address

  • 48 bits

Can Ethernet be transmitted through power lines

  • True

Ethernet and HDMI Transmission

  • False - Ethernet cannot be transmitted over HDMI

Ethernet Frame Fields

  • The preamble, source MAC address, and 4-byte frame delimiter are shown

Wi-Fi Alliance, IEEE and FCC Purpose

  • The Wi-Fi Alliance promotes and tests for, operational standards, and the Federal Communications Commission (FCC) regulates radio frequencies.

IEEE 802.11g Speed range

  • 54Mbps - 2.4 GHz

IEEE Protocol with Multiple Antenna Support

  • IEEE 802.11n

2.4GHz Network Channel Avoidance

  • 1, 6, 11

Wireless Communication Type

  • Ad Hoc Mode

Devices Causing 2.4GHz Interference

  • Microwave ovens and Bluetooth devices

Feature that Monitors 5GHz Range

  • Dynamic Frequency Selection

Point-to-Multipoint Antenna Example

  • Yagi antenna

Antenna Type From Image

  • Yagi

Infrastructure Mode and Access Points

  • Basic Service Set or (BSS)

CAPWAP and Rogue Access Points

  • True, CAPWAP is a mitigation technique for rogue access points
  • Bridge connects networks

Network Interface Card (NIC)

  • NIC is used to connect a computer to a network

IP Command output

  • speed command can set the speed

Firewall operation layer

  • Firewalls operate at layer 4 of the OSI model

Security Device in Diagram

  • Firewall
  • Firewall is a security device situated between an internal network and an outside network

Firewall Network Zone Definitions

  • The three zones are external, internal, dmz

Host-Based IDS

  • True, host-based IDS can monitor signs of intrusions on a network

Network Configuration Device

  • Wireless LAN controller

Load Balancing Technique for High Traffic

  • Load balancer

Wired Device Contention Method

  • Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

Server Assignment of IP Addresses

  • DHCP

IP Exclusions or Exclusion Ranges for DHCP

  • Used to set aside addresses from pools

DHCP Server Troubleshooting

  • Check lease time

Layer-2 Networking Device with Routing Capabilities

  • A multi-layer switch

Protocol to Find IP Address of Domain

  • A record

Network Device Synchronization

  • NTP (Network Time Protocol)

Server Function Forwarding Traffic

  • Proxy server

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser