Networks - D325

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

88 Terms

1
New cards

1 to 126

Class A address range

2
New cards

128 to 191

Class B address aange

3
New cards

192 to 223

Class C address range

4
New cards

10.0.0 to 10.255.255.255

Class A private address range

5
New cards

172.16.0.0 to 172.31.255.255

Class B private address range

6
New cards

192.168.0.0 to 192.168.255.255

Class C private address range

7
New cards

The router translates between the private and public addresses using a process called ________________ ________________ ________________.

Network Address Translation (NAT)

8
New cards

Internet access can be facilitated for hosts using a private addressing scheme in two ways:

NAT (Network Address Translation) or Proxy Server

9
New cards

An intermediate server that retrieves data from an Internet source, such as a webpage, on behalf of a user. They act as additional security boundaries protecting users from malicious activity on the internet.

Proxy Server

10
New cards

Developed by Microsoft as a means for clients that could not contact DHCP server to communicate on the local network. If a Windows host does not receive response from a DHCP server within a given time frame, if selects an address at random from the range 169.254.1.1 to 169.254.254.254.

APIPA (Automatic Private IP Addressing)

11
New cards

224.0.0.0 to 239.255.255.255

Class D address range

12
New cards

240.0.0.0 to 255.255.255.255

Class E address range

13
New cards

Class ___ are used for multicasting

Class D

14
New cards

Class ___ are reserved from experiments use and testing

Class E

15
New cards

127.0.0.0 to 127.255.255.255

Loopback address range

16
New cards

Used when a specific address unknown. This is typically used as a source address by a client seeking a DHCP lease.

0.0.0.0/8

17
New cards

Used to broadcast to the local network when the local network address is not known.

255.255.255.255

18
New cards

Set a side for a variety if special prupose

100.64.0.0/10

192.0.0.0/24

192.88.99.0/24

198.18.0.0./15

19
New cards

Set a side for use in documentation and examples

192.0.2.0/24

198.51.100.0/24

203.0.113.0/24

20
New cards

The _______ table tracks layer 2 and implements it as content addressable memory (CAM). It is a special type of memory, optimized for searching, rather than random access.

CAM

21
New cards

IEEE 802.3x ________ _______________ allows a server to instruct the switch to pause traffic temporarily to avoid overwhelming its butter and causing it to drop frames.

Flow control

22
New cards

What is the purpose of subnetting?

Layer 3 segments

23
New cards

A ________ _____________ configuration validates the MAC address of end systems that connect to switch port. In most scenarios, the MAC address of servers and workstations does not change often.

Port Security

24
New cards

________ are useful to divide a network into logically distinct zones for security and administrative control.

VLANs

25
New cards

IPv4 ____________________ allows one host on the Internet (or private network) to send content to other hosts that have identified themselves as interested in receiving the originating host's content.

multicasting

26
New cards

________ ____: 255.0.0.0(/8). The first octet for _________ ____ is from 1 - 126. The default masks reengineer the classful scheme but allow network designers to create subnets of different numbers.

Class A

27
New cards

________ ____: 255.255.0.0 (/16). The first octet for ________ ____ is from 128 - 191. The Only remaining use of classful terminology is to describe the default subnet masks.

Class B

28
New cards

________ ____: 255.255.255.0(/24). The first octet for ________ ____ is from 192 - 223.

Class C

29
New cards

________ ____ refers to a group of hosts configured with the same IP address

Anycast

30
New cards

One method of addressing multiple hosts is to perform a ____________. An administrator performs a ____________ by sending a packet to the network or subnet's ____________ address

Broadcast

31
New cards

When an IPv4 host wants to send a packet to a single recipient, it uses a ____________ packet addressed to the IP address of the destination host.

Unicast

32
New cards

Implemented broadcasts occur at layer 2 by sending them to MAC address ______________________________. All hosts connected to the switch (or in the same VLAN) will receive them.

ff:ff:ff:ff:ff:ff

33
New cards

Nodes within each subnet can address one another directly since they are in the same broadcast domain, but they can only communicate with nodes in other subnets via the ____________.

Router

34
New cards

Most hosts are configured to obtain an address automatically, using a service called the ____________ ____________ ____________ ____________.

Dynamic Host Configuration Protocol (DHCP)

35
New cards

A command line utility that allows you to configure and display status of various network communications server roles and components after they are installed on computers running Windows Server.

* You can use ____________ to report the IP configuration.

* ____________ is implemented in the legacy command prompt interface. Script-based configuration is now more likely to use PowerShell cmdlets.

netsh (network shell)

36
New cards

IP:MAC address mappings held in the ARP cache of a Linux host

ip neigh

37
New cards

Utility to display and modify contents of host's cache of IP to MAC address mappings, as resolved by ____________ ____________ ____________ replies.

Address Resolution Protocol (ARP)

38
New cards

Command tool used to gather information about the IP configuration of a Windows host

IPConfig

39
New cards

Parameter assigned by a host to distinguish ambiguous interface addresses within a link local scope

zone index

40
New cards

Mechanism used in IPv6 for hosts to assign addresses to interfaces without manual intervention.

SLAAC (stateless address autoconfiguation)

41
New cards

A method of tunneling IPv6 packets over an IPv4 network

6to4

42
New cards

____________ ____________ means that hosts and routers process both IPv4 and IPv6 traffic simultaneously.

Dual statck

43
New cards

____________ ____________ ____________ is a measure of the latency or delay between the host sending the probe and receiving a reply. ping will report minimum, maximum and average ________ values

Round Trip Time, RTT

44
New cards

Linux command tool used to gather information about IP configuration of the network adapter or to configure the network adapter.

IP

45
New cards

IPv6 protocol used to identify link local nodes

Neighbor Discover (ND) protocol

46
New cards

Cross-platform command tool for testing IP packet transmissions

ping

47
New cards

Display the current configuration of TCP/IP on a given workstation - including the current IP address, DNS configuration, Windows Internet Naming Service (WINS) configuration, and default gateway

ipconfig(Windows), ifconfig (Linux/Unix/Mac)

48
New cards

An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?

A. 802.1Q

B. STP

C. Flow control

D. CSMA/CD

B. STP (Spanning Tree Protocol)

49
New cards

The ____________ ____________ ____________ is used by hosts to determine which MAC address is associated with an IP address on the local network.

Address Resolution Protocol (ARP)

50
New cards

In the Linux, the ____________ ____________ command shows entries in the local ARP cache (replacing the old ________ command).

ip neigh, ARP

51
New cards

The ____________ ____________ ____________ ____________ is used to report errors and send messages about the delivery of packet. ____________ messages are generated under error conditions in most types of unicast traffic, but not for broadcast or multicast packets

Internet Control Message Protocol (ICMP), ICMP

52
New cards

____________ can also be used to test and troubleshoot connectivity issues on IP networks. The ____________ utility sends a configurable number and size of ____________ request packets to destination host. ____________ is implemented on both Windows and Linux hosts.

ICMP, ping ICMP, ping

53
New cards

Connectivity issue - Performing tests using ping

Ping loopback

Ping local host

Ping gateway

Ping remote host

Ping host name

Establish session

54
New cards

Ping the ____________ ____________ to verify TCP/IP installed and loaded correctly. If this fails, reinstall the network protocol stack.

Loopback address (ping 127.0.0.1)

55
New cards

Ping the Ip address of ____________ ____________ to verify it was added correctly and to verify that the network adapter is functioning properly. If you cannot ping your own address, there might have been a configuration error, or the network adapter or adapter driver could be fault.

local host

56
New cards

ping the IP address of ____________ ____________ to verify it is up and running and that you can communicate with another host on the local network.

default gateway

57
New cards

Ping the IP address of a ____________ ____________ to verify you can communicate through the router.

remote host

58
New cards

If you can successfully perform all connectivity tests by IP address but cannot ping be host name, then this suggests a ____________ ____________ problem.

name resolution

59
New cards

The ____________ command is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the queried name server(s).

The command ____________ is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux or Macintosh OS X operating system. The most typical use of ____________ is to simply query a single host.

dig (domain information groper)

60
New cards

A ____________ ____________ ____________ is a Simple Network Management Protocol (SNMP) flat file, nonrelational database that describes devices being monitored. Network management platforms monitor nodes by reading value of the managed resources in the ____________ .

MIB (Management Information Base)

61
New cards

A ____________ is a multihomed intermediate system with links and network topology information to facilitate forwarding packets between subnets or around internetwork.

router

62
New cards

Information about the location of IP networks and hosts is stored in the ____________ _________. Each entry in the ____________ _________ represents an available route to a destination network or host.

routing table

63
New cards

____________ network routes, for subnets to which the router is directly attached.

Direct

64
New cards

____________ network routes, for subnets and IP networks that are not directly attached.

Remote

65
New cards

____________ routes, for routes to specific IP address. A ____________route has a /32 network prefix.

Host

66
New cards

____________ routes, which are used when an extra match for a network or host route is not found.

67
New cards

The IP network or subnet for each active router interface is automatically added to the routing table.

directly connected routes

68
New cards

A ____________ route is manually added to the routing table and only changes if edited by the administrator. It can be problematic if the routing topology changes often, as each route on each affected route needs to be updated manually. ____________ routes can be configured either as non-persistent or persistent/permanent.

static

69
New cards

A ____________ route is removed from the routing table if the route is rebooted.

A ____________ route might be added as troubleshooting action, for instance. If a static route is not reachable, it will be disabled.

non-persistent

70
New cards

A ____________ route is special type of static route that identifies the next hop router for a destination that cannot be matched by another routing table entry. The destination address ____________(IPv4) or ____________(IPv6) is used to present the default route.

* Entry in the routing table to represent the forwarding path that will be used if no other entries are matched.

default, 0.0.0.0/0, ::/0

71
New cards

Fragmentation

Mechanism for splitting a layer 3 datagram between multiple frames to fit the maximum transmission unit (MTU) of the underlying Data Link network.

72
New cards

Entry in the routing table that has been learned from another router via a dynamic routing protocol.

Dynamic routing

73
New cards

Process whereby routers agree on routes through the network to establish the same network topology in their routing tables (steady state). The time taken to reach steady state is a measure of a routing protocol's convergence performance.

Convergence

74
New cards

Distance vector-based routing protocol that uses a hop count to determine the least-cost path to a destination network.

RIP (Routing Information Protocol)

75
New cards

The ____________ ____________ ____________ is designed to be used between routing domains in a mesh internetwork and as such is used as the routing protocol on the internet, primarily between ISPs.

Border Gateway Protocol (BGP)

76
New cards

Combines multiple physical connections into a single logical connection to minimize or prevent congestion.

Link Aggregation (IEEEE 802.2ad)

77
New cards

PoE 802.3af

Supplies 15.4 watts of DC power

78
New cards

PoE+ 802.3at

Supplies 25.5 watts of DC power

79
New cards

802.1x

User authentication

80
New cards

Permits or denies traffic based on a device's MAC address

MAC Filtering

81
New cards

Uses Hot Standby Router Protocol (HSRP) to create a virtual IP and MAC addresses to provide active and standby routers

First-Hop Redundancy

82
New cards

Permits or denies traffic based on a device's MAC address

MAC Filtering

83
New cards

Permits or denies traffic based on IP addresses or application ports

Port Filtering

84
New cards

Forwards traffic based on priority markings

Quality of Service (QoS)

85
New cards

802.1d

Spanning Tree Protocol (STP)

Permits redundant links between switches and prevents looping of network traffic

86
New cards

802.1q

VLAN Trunking: Multiple VLANs transmitted over the same physical cable

87
New cards

Allows an existing IPv4 router to carry IPv6 traffic

Tunneling

88
New cards

Running both IPv4 and IPv6 protocols by your network devices simultaneously

Dual Stack