1/64
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is an intranet?
A private network that belongs to an organization.
What is an extranet?
A public access network that belongs to an organization.
What is DSL?
Digital Subscriber Line: a connection running over a telephone line.
What is ADSL?
Asymmetric Digital Subscriber Line: a connection running over a telephone line, where the download speed is faster than the upload speed.
What are the three primary requirements of network security?
Confidentiality, integrity, and availability.
What is a public cloud?
Cloud-based applications and services offered to the general public, sometimes free or sold as a pay-per-use model.
What is a private cloud?
Cloud-based applications and services offered to specific organizations or entities. Can be set up on the organizations private network or provided through a third party.
What is a hybrid cloud?
Made up of two or more clouds (part private, part public), under one architecture. Access is defined by user rights.
What is a community cloud?
A community cloud is created for exclusive use by specific organizations or entities. Similar to a public cloud, but includes the necessary security, privacy, and regulatory compliance needed by the organization.
What are zero-day attacks?
Attacks that occur on the first day that a vulnerability becomes known.
What are threat actor attacks?
An attacker targets user devices or network resources.
What is the difference between a virus and a worm?
A virus targets a single computer (through a fake download, phish, etc.). A worm replicates itself through network vulnerabilities, spreading to unsecure computers on the network.
What is ACL?
Access Control List: used to filter access and traffic forwarding based on IP addresses and applications.
What is IPS?
Intrusion Prevention System: used to identify fast-spreading threats, such as zero-day/zero-hour attacks.
What is spyware?
Software that is installed on a network device and collects information.
What is a shell?
The user interface that allows the user to request tasks from the computer. Can be a CLI or GUI.
What is a kernel?
Core of the operating system. Communicates between the hardware and software, as well as manages how hardware resources are used to meet software requirements.
What is user EXEC mode?
Cisco CLI mode that allows access to only a limited number of basic monitoring commands.
What is privileged EXEC mode?
Cisco CLI mode that allows access to all commands and features.
What is the purpose of Line Configuration Mode in Cisco CLI?
Used to configure console, SSH, Telnet, or AUX access.
What is the purpose of Interface Configuration Mode in Cisco CLI?
Used to configure a switch port or router network interface.
What command is utilized to enter privileged EXEC mode in Cisco CLI?
enable
What command is utilized to enter global configuration mode in Cisco CLI?
configure terminal
What shortcut is used to abort DNS lookups, traceroutes, pings, etc.?
Ctrl+Shift+6
What is the default SVI on a Cisco switch?
VLAN1
Which functionality is provided by DHCP?
Automatic assignment of an IP address to each host.
What is the purpose of message encoding?
Converting information into the proper form for transmission.
What is the purpose of message formatting?
Properly identifying the adderss of the sender and receiver.
What is the purpose of message encapsulation?
Ensure secure delivery, check for errors, and segmentation.
What is flow control (message timing)?
The process of managing the rate of data transmission.
What is response timeout (message timing)?
The set amount of time hosts will wait for a response, and what action to take if a response timeout occurs.
What is access method (message timing)?
Determines when a host can send a message to prevent collisions.
BGP and OSPF are examples of which type of protocol?
Routing
What is the purpose of the sequencing function in network communication?
To label transmitted segments of data for proper reassembly by the receiver.
This protocol is responsible for guaranteeting the reliable delivery of information.
TCP
What are protocol suites?
Sets of rules that work together to help solve a problem.
What is a protocol stack?
A set of hierarchical communication protocols.
What are the layers of the TCP/IP Model?
Application, Transport, Internet, Network Access.
UDP and TCP belong to which layer of the TCP/IP model?
Transport
DNS and DHCP belong to which layer of the TCP/IP model?
Application
Ethernet operates at which layer of the TCP/IP model?
Network Access
What is the importance of the IETF organization?
Develops, updates, and maintains internet and TCP/IP technologies, as well as for RFC documents.
What is the importance of the ICANN and IANA organizations?
Coordinating IP address allocation, domain name management, and other information used in TCP/IP protocols.
What is the importance of the EIA organization?
Developing electric wiring and connectors standards.
What are the layers of the OSI Model?
Application, Presentation, Session, Transport, Network, Data Link, Physical
What is Layer 7 of the OSI Model?
Application
What is Layer 6 of the OSI Model?
Presentation
What is Layer 5 of the OSI Model?
Session
What is Layer 4 of the OSI Model?
Transport
What is Layer 3 of the OSI Model?
Network
What is Layer 2 of the OSI Model?
Data Link
What is Layer 1 of the OSI Model?
Physical
What is a PDU?
Protocol Data Unit: the form that a piece of data takes at any layer.
What is the term given to a PDU used at the Application Layer?
Data
What is the term given to a PDU used at the Transport Layer?
Segment
What is the term given to a PDU used at the Network Layer?
Packet
What is the term given to a PDU used at the Data Link Layer?
Frame
What is the term given to PDUs used at the Physical Layer?
Bits
What is the purpose of segmentation?
Dividing a large data stream into smaller pieces prior to transmission.
What is the purpose of encapsulation?
Adding protocol information to data as it moves down the protocol stack.
In computer communication, what is the purpose of message encoding?
To convert information to the appropriate form for transmission.
What process is used to receive transmitted data and convert it into a readable message?
Decoding
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a Layer 2 frame.
What process is used to place one message inside another message for transfer from the source to the destination?
Encapsulation
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet