WGU C172 Network and Security - Foundations; PA and OA set***

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/232

flashcard set

Earn XP

Description and Tags

233 Terms

1
New cards
It is a network of users that share computer resources in a limited area.
LAN
2
New cards
Local Area Network
LAN
3
New cards
How are Local Area Networks defined?
In terms of protocol and the topology used for accessing the network.
4
New cards
A set of rules established for users to exchange information
Protocol
5
New cards
The network architecture used to interconnect the networking equipment.
Topology
6
New cards
What are the most common topologies for LANs?
Ring, Bus, and Star
7
New cards
Uses a token that is placed in the data channel and circulates around the ring.
Token Ring topology
8
New cards
A deterministic network
Token Ring Topology
9
New cards
Each station connected to the network ensures access for transmission of its messages at regular or fixed time intervals
Deterministic
10
New cards
What are the disadvantages of the Token Ring system?
1. If an error changes the token pattern, it can cause the token to stop circulating.
11
New cards
What is a disadvantage of the Token Ring system from the troubleshooting and maintenance?
The token ring path must be temporarily broken or interrupted if a computer or any device on the network is to be removed or added to the network.
12
New cards
What is a solution to the troubleshooting and maintenance disadvantages of the Token Ring system?
Connect each computer or device on the network to a central token ring hub.
13
New cards
A device that manages the passing of the token instead of relying on individual computers to pass it.
Token ring hub
14
New cards
How does the token ring hub improve the network?
It improves the reliability of the network.
15
New cards
Topology whereas the computers share the media or coaxial cable for data transmission.
Bus topology
16
New cards
The coaxial cable that is looped through each networking device to transmit data in a bus topology
ThinNet
17
New cards
In this topology, all devices on the network can see each other's data traffic.
Bus topology
18
New cards
Topology whereas each computer must wait for pauses in transmission or until the transmission from one device is complete before initiating a new transmission onto the network.
Bus topology
19
New cards
What are the disadvantages of a bus topology?
"1. Data can be corrupted if ore than one device on the network transmits at the same time and will have to be resubmitted.
2. The use of the shared coaxial cable prevents data transmission from being very bandwidth-efficient."
20
New cards
Which topology is seldomly used in modern networks?
Bus topology
21
New cards
What is the most common topology used in today's LANs?
Star topology
22
New cards
Topology that uses twisted-pair cables with modular plugs to connect computers and other networking devices.
Star topology
23
New cards
Topology whereas each device is connected to a switch or hub
Star
24
New cards
A switch or hub facilitates the transfer of data between networking devices in this topology
star
25
New cards
Transmits data to all the devices connected in the star network
hub
26
New cards
Also called a multiport repeater
hub
27
New cards
Not meant for large networks, but are still used in some smaller, slower speed LANs
hub
28
New cards
A transmission from a hub in a star network to all the devices in the network connected to the hub
broadcast
29
New cards
Stores the hardware or physical address for each device connected to its ports in a star network
switch
30
New cards
Sends data transmissions directly to the port of the destination device on the network
switch
31
New cards
The physical input/output interfaces to the networking hardware
port
32
New cards
Where the cables physically connect to each other or a central switch or hub
Port
33
New cards
Only the intended destination device on this network will see the data traffic
star
34
New cards
What is an advantage of the star topology?
It improves the efficiency of the available bandwidth of the network
35
New cards
What is an advantage of the star topology from the troubleshooting and maintenance?
A device can be removed or added without disrupting other devices on the network
36
New cards
All devices are connected to each other
mesh topology
37
New cards
What is an advantage of the mesh network?
It provides full redundancy in the network data paths
38
New cards
What is a disadvantage of the mesh network?
The additional data paths increase the cabling cost and the network hardware cost. It is also very complex.
39
New cards
What type of applications is the mesh topology suited for?
high-reliability applications
40
New cards
What type of applications is the mesh topology not suited for?
general networking applications
41
New cards
Open systems interconnect reference model
OSI
42
New cards
Who was the OSI model developed by?
The International Organization for Standardization
43
New cards
What year was the OSI model developed?
1984
44
New cards
What is the purpose of the OSI model?
to enable different types of networks to be linked together
45
New cards
What is OSI meant for?
To provide a framework for networking devices that ensure compatibility in the network hardware and software.
46
New cards
What is the OSI model meant to accelerate?
The development of new networking technologies.
47
New cards
What is layer 1 of the OSI model?
Physical
48
New cards
The layer of the OSI model that provides the electrical and mechanical connection to the network.
physical
49
New cards
UTP, fiber, and network interface cards are examples of which layer of the OSI model?
physicaL
50
New cards
What is layer 2 of the OSI model?
Data link
51
New cards
Layer of the OSI model that handles error recovery, flow control (synchronization), and sequencing (which terminals are sending and which are receiving)
data link
52
New cards
Also called the media access control layer
data Link
53
New cards
The layer of the OSI model where the Media Access Control or MAC, addressing is defined
data lInk
54
New cards
Where is the Ethernet 802.3 standard defined?
In the MAC or media access control
55
New cards
Also called the Ethernet address
MAC or media access control
56
New cards
MAC addresses are an example of which layer of the OSI model?
data linK
57
New cards
What is layer 3 of the OSI model?
Network
58
New cards
layer of the OSI model that accepts outgoing messages and combines messages or segments into packets, adding a header that includes routing information.
network
59
New cards
Acts as the network controller
network layer of the OSI model
60
New cards
Internet Protocol (IP) and internetwork packet exchange (IPX) are examples of which layer of the OSI model?
networK
61
New cards
What is layer 4 of the OSI model?
Transport
62
New cards
layer of the OSI model that is concerned with message integrity between source and destination
transport
63
New cards
layer of the osi model that also segments/reassembles the packes and handles flow control
tRansport
64
New cards
Transmission control protocol (TCP) and User Datagram Protocol are examples of which layer of the OSI model?
transporT
65
New cards
What is layer 5 of the osi model?
Session
66
New cards
layer of the osi model that provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user request
session
67
New cards
Network File system (NFS) and Structured Query Language (SQL) are examples of which osi model layer?
sessioN
68
New cards
What is layer 6 of the osi model?
Presentation
69
New cards
layer of the osi model that accepts and structures the messages for the application. If necessary, it will translate one code to another
presentation
70
New cards
layer of the osi model that is also responsible for data compression and encryption
pResentation
71
New cards
American Standard Code for Information Interchange (ASCII) and Joint Photographic Experts Group (JPEG) are examples of which layer of the OSI model?
presentatioN
72
New cards
What is layer 7 of the osi model?
Application
73
New cards
layer of the osi model that interacts with application programs that incorporate a communication component such as your internet browser and email
application
74
New cards
layer of the osi model that is also responsible for logging the message in, interpreting the request, and determining what information is needed to support the request
aPplication
75
New cards
Hypertext Transfer Protocol (HTTP) for web browsing, File Transfer Protocol (FTP) for transferring files, and Simple Mail Transfer Protocol (SMTP) for email transmission are examples of which osi model layer?
applicatioN
76
New cards
What is step one of the three basic steps in the process of isolating a network problem?
Is the connection to the machine down (layer 1)
77
New cards
What is step two of the three basic steps in the process of isolating a network problem?
Is the network down? layer 3
78
New cards
What is step three of the three basic steps in the process of isolating a network problem?
Is a service on a specific machine down? layer 7
79
New cards
A reply from" response from a ping indicates whate?"
A connection to the server is up
80
New cards
A request timed out" response from a ping indicates what?"
the network connection is down
81
New cards
What is the function of the data link layer of the osi model?
to provide for the flow of data MAC addresses
82
New cards
What is the function of the network layer?
to provide routing decisions IP, IPX
83
New cards
What is the function of the transport layer of the osi model?
to ensure error free packets
84
New cards
What is the function of the session layer of the osi model?
to establish, manage, and terminate NFS, SQL sessions
85
New cards
What is the function of the presentation layer of the osi model?
to ensure protocol conversion, data transactions ASCII, JPEG
86
New cards
What is function of the application layer of the osi model?
to support applications HTTP, FTP, and SMTP(email)
87
New cards
Which networking protocol is used in most modern computer networks?
Ethernet
88
New cards
A carrier sense multiple access with collision detection protocol for local area networks
Ethernet
89
New cards
Must have the capability to detect data collisions (collision detection) to avoid two or more computers from attempting to broadcast a message at the same time.
Ethernet systems
90
New cards
Provide grouping of information for transmission
packet
91
New cards
What does the header of a packet consist of?
The preamble, start frame delimiter, destination and source addresses, and length/type field
92
New cards
Preamble, start frame delimiter, destination mac address, source address, length/type, data, pad, and frame check sequence.
The structure of the Ethernet frame
93
New cards
An alternating pattern of 1s and 0s used for synchronization
The preamble of an Ethernet packet
94
New cards
A binary 8 bit sequence of 10101011 that indicates the start of the frame
The start frame delimiter of an Ethernet packet
95
New cards
The MAC address associated with the network adapter or Ethernet network interface card (NIC)
The destination and source MAC addresses of an Ethernet packet
96
New cards
An indication of the number of bytes in the data field if this value is less than 1500, or if the number is greater than 1500, and indication of the type of data format such as IP and IPX
The length/type of the Ethernet packet frame
97
New cards
The variable length of data being transferred from the source to the destiontion
The data of the Ethernet packet frame
98
New cards
A field used to bring the total number of bytes up to the minimum of 46 if the data field is less than 46 bytes
The pad of the Ethernet packet frame
99
New cards
A 4 byte CRC value used for error detection
The frame check sequence of the Ethernet packet frame
100
New cards
What is the minimum length of the Ethernet frame from destination MAC address through the frame check sequence?
64 bytes