AP networking test

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:23 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

100 Terms

1
New cards

cd~

takes to home directory

2
New cards

cd /

takes to root directory

3
New cards

cd home

takes to a home directory

4
New cards

cd ..

moves up one

5
New cards

ls

list files

6
New cards

pwd

working directory

7
New cards

cd

change directory

8
New cards

mkdir

create new directory

9
New cards

cp

copy files

10
New cards

mv

move or rename files

11
New cards

touch

create empty files

12
New cards

cat

view file components

13
New cards

whoami

displays the current user

14
New cards

NIC

Network Interface Cards carries the data such as copper wire

15
New cards

a network node

any device connected to a network

16
New cards

host

devices that send or receive data

17
New cards

8 bits

a bythe

18
New cards

PAN

Personal Area Network like bluetooth to connect mice, keyboards, and tablets

19
New cards

LAN

local area network consists of a switch and network devices in a limited geographical area.

20
New cards

VLAN

virtual LAN extends beyond a traditional LAN and groups uses based on administratively defined boundaries

21
New cards

WLAN

wireless LAN connects multiple wireless access points together to expand a wireless network

22
New cards

WMN

wireless mesh network connects multiple wireless access points together to expand the wireless network

23
New cards

MAN

metropolitan area network a network that spans a city

24
New cards

WAN

wide area network a network that spans a large geographical area.

25
New cards

VPN

Virtual Private Network a method of connecting to a network such as a company network across an unsecured network

26
New cards

twisted pair

(such as cat5 and cat6) is electrical (copper) low cost.

27
New cards

coaxial cable

(shielded) electric (copper) medium cost

28
New cards

Fiber optic

Light (glass or plastic) high cost CAN NOT BE INTERFERED WITH ELECTRIC

29
New cards

layer 1

physical layer

30
New cards

layer 2

data link layer

31
New cards

layer 3

network layer

32
New cards

layer 4

Transport Layer

33
New cards

layer 5

Session Layer

34
New cards

layer 6

Presentation Layer

35
New cards

layer 7

Application Layer

36
New cards

Star Topology

A topology with one central node that has each computer or network device attached to the central node. All data first goes into the central node and then is sent out to its destination. (Think of it like a bicycle wheel with spokes.)

37
New cards

Mesh Topology

Devices are connected with many redundant interconnections between network nodes.

38
New cards

Bus Topology

A network layout in which there is one main trunk, or backbone, that all the various computers and network devices are connected to.

39
New cards

Hybrid Topology

A physical topology that combines characteristics of more than one simple physical topology.

40
New cards

Physical Topology

The physical arrangement of connections between computers.

41
New cards

logical topology

A topology that describes the data-flow

patterns in a network.

42
New cards

Encapsulation

wrapping data with headers as it travels down the OSI layer

43
New cards

decapsulation

Removing a header or trailer from a lower OSI layer.

44
New cards

example of layer 1

physical cables, hubs, or signals

45
New cards

example of a layer 2 device

switch

46
New cards

example of a layer 3 device

router

47
New cards

ifconfig

finds MAC adress

48
New cards

Confidentiality

Only authorized users can access specific assets or data

49
New cards

integrity

protecting data from unauthorized alteration

50
New cards

availability

authorized users ALWAYS have access to

51
New cards

DRM

Digital Rights Management - application of control technologies to limit the use of digital media

52
New cards

IRM

Information Rights Management used with email and other files that are related to communication of an organization

53
New cards

spoofing

a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

54
New cards

flooding

an attack where a malicious actor overwhelms a network switch with a large number of MAC addresses

55
New cards

CAM

Content Addressable Memory table routes where to send traffic

56
New cards

administrative controls

Policies, procedures, security awareness training, contingency planning, and disaster recovery plans

57
New cards

Technical Controls

hardware/software implementad to manage and provide protection

58
New cards

Preventative Controls

can block someone from proforming a malicious action

59
New cards

physical control

designed to protect facilities, systems, and resources and separate people physically from systems

60
New cards

detective controls

controls designed to discover control problems that were not prevented

61
New cards

corrective controls

brings a system back to it's normal state

62
New cards

Deterrent Controls

discourage attackers from preforming malicious acts

63
New cards

Recovery Controls

works with corrective to bring back to normal state

64
New cards

Public IP Address

anyone on the internet can see it, anyone connected to the internet has one, cannot be repeated

65
New cards

ISP

(Internet Service Provider) A company that provides access to the Internet.

66
New cards

Private IP address

An IP address that cannot be routed over the Internet allows devices within the network to talk without using internet

67
New cards

NAT

Network Address Translation is a process that the router uses to act like a translator, takes private IPs and uses public IP to send and receive information from websites

68
New cards

PAT

Port Address Translation. A form of NAT that translates public IP addresses to private IP addresses, and private IP addresses back to public IP addresses. PAT uses a single public IP address. Compare to DNAT.

69
New cards

data path

the specific sequence of devices and physical links that a packet follows from a source to a destination

70
New cards

routing table

A data table stored in a router that lists the routes to particular network destinations

71
New cards

Hop

each time a packet goes through a router

72
New cards

TTL

(Time to Live) every time a packet takes a hop a number in its header gets deleted- this prevents packets from hoping forever

73
New cards

TCP

Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.

74
New cards

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

75
New cards

Subnetting

The act of dividing a network into smaller logical subnetworks.

76
New cards

what does the physical layer do?

media, signal, binary transmission

77
New cards

What does the data link layer do?

The data link layer controls the way messages are sent on the physical media. The data link layer handles three functions: media access control, message delineation, and error control. The data link layer accepts messages from the network layer and controls the hardware that actually transmits them. The data link layer is responsible for getting a message from one computer to another without errors. The data link layer also accepts streams of bits from the physical layer and organizes them into coherent messages that it passes to the network layer.

78
New cards

What does the network layer do?

path determination and IP address

79
New cards

what does the transport layer do?

Responsible for preparing data to be transported across the network

80
New cards

what does the session layer do?

It keeps data from different applications separate, reliably

81
New cards

what does the presentation layer do?

deals with formatting of data and encryption.

82
New cards

what does the application layer do.

Provides access to network resources

83
New cards

what is the PDU of the physical layer?

bits

84
New cards

What is the PDU at the Data Link Layer?

frames

85
New cards

what is the PDU of the network layer

packets

86
New cards

What is the PDU at the Transport layer?

segments

87
New cards

what is the PDU of the session layer

data

88
New cards

what is the PDU of the presentation layer

data

89
New cards

what is the PDU of the application layer

data

90
New cards

what acronym can be used to remember the OSI layers?

please (presentation)

do (data link)

not (network)

throw (transport)

sausage (session)

pizza(presentation)

away (application)

91
New cards

what is HTTPS protocol

Hyper Text Transfer Protocol Secure - encrypts all info sent and received (a more secure version of HTTP)

92
New cards

DNS Protocol

query and reply messages, both with same message format (port 53)

93
New cards

DHCP Protocol

assigns IP addresses

94
New cards

FTP

File Transfer Protocol

95
New cards

Private IP Ranges

10.0.0.0 - 10.255.255.255

172.16.0.0 -172.31.255.255

192.168.0.0-192.168.255.255

96
New cards

router

directs traffic between networks

97
New cards

switch

A device for making, breaking, or changing the connections in an electrical circuit (MAC address)

98
New cards

firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

99
New cards

modem

Communications hardware device that facilitates the transmission of data.

100
New cards

what is the troubleshooting protocol

identify problem

test

fix

verify