1/20
These flashcards cover key concepts, definitions, and functionalities of various network protocols, models, and components discussed in the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What does good customer etiquette dictate when an unexpected change occurs?
Customers should be notified right away about any change.
What is the first Octet Decimal Range for Class A IP addresses?
1-127.
What does the Class B IP address support in terms of the number of hosts?
16,777,214 hosts.
What does Class C IP address support for hosts?
A single IP network can have only 254 hosts.
What protocol is assigned to port 389?
Lightweight Directory Access Protocol (LDAP).
What is the purpose of the Dynamic Host Configuration Protocol (DHCP)?
Automatically assigns IP addresses and network configuration parameters to devices.
What does the HyperText Transfer Protocol (HTTP) define?
How messages are formatted and transmitted over the web.
What is the purpose of the Internet Message Access Protocol (IMAP)?
Allows users to receive and manage email messages from any device.
What layer in the OSI model corresponds with the handling of data encryption?
Application Layer.
What does WPA2 signify in wireless networks?
The strongest wireless encryption standard.
What are peer-to-peer wireless connections?
Direct connections between two devices.
What is the role of the router in a network?
Routes traffic between two networks operating on different protocols.
Which command is used to see if one can connect to a destination's IP address?
Ping.
What is the purpose of NAT in networking?
Maps multiple private IP addresses to a public IP address before transferring information.
What does packet switching involve?
Grouping data into packets for efficient forwarding.
What specifies the normal routine of accepting and distributing packets?
Access ports on a switch.
What does the term 'cut-through switching' refer to?
No error checking is performed against the frame; it forwards faster than store-and-forward.
Which command shows the open and listening ports on a device?
Netstat.
What does a TCP model layer define?
The usage of TCP and UDP connections along with the associated ports.
What is the MAC address used for in networking?
Identifies the physical addresses attached to each port.
What kind of device is typically protected from unauthorized external access?
Intranet.