Security Plus Chapter 2

Security Plus Chapter 2

memorize.aimemorize.ai (lvl 286)
Section 1

Preview this deck

Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?

Front

Star 0%
Star 0%
Star 0%
Star 0%
Star 0%

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Active users

0

All-time users

0

Favorites

0

Last updated

6 years ago

Date created

Mar 1, 2020

Cards (128)

Section 1

(50 cards)

Which approach to bandwidth usage consumes all the available frequencies on a medium to transmit data?

Front

Baseband.

Back

What is a channel?

Front

A pathway.

Back

How are the upper layers of the OSI stack grouped?

Front

Bits are grouped together, into what is known as protocol data unit or a data service unit.

Back

What does PDU stand for?

Front

Protocol Data Unit.

Back

Identify the well-known UDP port number for Network Time Protocol or NTP.

Front

Port 123. User Datagram Protocol or UDP

Back

What is state transition modulation?

Front

Where the transition between voltage or the presence of light indicates a binary value.

Back

Which layer uses Bits?

Front

Physical layer or layer 1.

Back

Which layer uses segments?

Front

Transport layer or layer 4.

Back

What type of multiplexing supports different communications sessions on the same physical medium by causing the sessions to take turns.

Front

Time-division multiplexing or TDM.

Back

What are the color codes for the RJ-45?

Front

1-orange/white, 2-orange, 3-green/white, 4-blue, 5-blue/white, 6-green, 7-brown/white, 8-brown.

Back

Layer 5 is known as what?

Front

Session Layer. Function: Establish and close communication between two nodes and coordinates communication. Hardware: Gateways. Protocols: NFS, DSN, SQL, RPC, NetBIOS, X.25, SMB. Keywords: Establish and terminate a communication session, log on, user name, password, authentication, assign services through port number.

Back

What is this a picture of?

Front

OSI Model and TCP/IP stack DoD Model.

Back

Which layer is concern with package data in to frames and transmitting those frames on the network, performing error detection/correction, uniquely ID network devices with an address, and handling flow control?

Front

Data Link Layer or Layer 2.

Back

What strategy allows multiple communications session to share the same physical medium.

Front

Multiplexing Strategy.

Back

What base should the RJ-45 wired?

Front

100BaseSE-TX Ethernet network.

Back

The physical layer is represented by what?

Front

Binary expressions. A single bit is a single 1 or 0.

Back

Windowing is provided at what layer of OSI reference model?

Front

Transport Layer or Layer 4.

Back

Layer 2 is known as what?

Front

Data Link Layer. Function: Prepares data for media access and defines frame format. Hardware: Bridges, switches, Wireless access points, network interface cards (NIC). Protocols: CSMA/CD, CSMA/CA, LLDP. Keywords: MAC address, hardware address, LLC, CRC, frames types, frames, topologies, contention.

Back

What is Asynchronous?

Front

Not at at the same rate or timing is not required. The sender places a start bit at the beginning of each data frame and stop bit a the end of each data frame.

Back

Identify the four layers of the TCP/IP stack (bottom up).

Front

Network interface layer, Internet layer, Transport layer, Application layer.

Back

What is current state modulation?

Front

The presence or the absence of voltage (on copper) or light (on fiber) representing 1 or 0.

Back

What is broadband?

Front

Divides the bandwidth available on a medium into different channels. Example: Cable Modem.

Back

What does the mnemonics Please Do Not Throw Sausage Pizza Away stand for?

Front

The OSI stack starting with layer 1. Physical, Data Link, Network, Transport, Session, Presentation, Application.

Back

Layer 3 is known as what?

Front

Network Layer. Function: Navigates outside of the LAN. Hardware: Router (layer 3 Switches), Protocols: IP, IPX, AppleTalk, ICMP, RIP, RIPv2, ARP, OSPE, IGRP, RARP, BGP, NLSP, IS-IS, EIRGP. Keywords: IP address, routing, packets, datagrams, network address, packet switching, logical address, best and shortest route.

Back

What does OSI stand for?

Front

Open Systems Interconnection.

Back

What are the two fundamental approaches to bandwidth usage on a network?

Front

Broadband and Baseband.

Back

What type of multiplexing divides a medium's frequency range into channels, and different communication sessions transmit their data over different channel. Also known as broadband.

Front

Frequency-division multiplexing or FDM

Back

What is baseband?

Front

Uses all the available frequencies on a medium to transmit data. Example: Ethernet.

Back

Layer 6 is known as what?

Front

Presentation Layer. Function: Convert to common format such as ASCII, data encryption, and compression. Hardware: Gateways. Protocols: MPEG, WAV, MIDI, QuickTIme. Keywords: ASCII, Unicode, EBCDIC, CODEC, and bit order.

Back

Layer 4 is known as what?

Front

Transport Layer. Function: Sequence packets, ensure error free delivery, takes over after the session has been established. Hardware: Gateway (layer 4 switches). Protocols: TCP, UDP, SPX. Keywords: Segments, windowing, flow control, transport packets, error checking, port numbers.

Back

What is the range of well-know TCP and UDP ports?

Front

Below 1024.

Back

What is the standard for RJ-45 connector?

Front

TIA/EIA-568-B.

Back

The control under layer 2 is known as what?

Front

Data Link Control or DLC.

Back

How many pairs are in a RJ-45 connector?

Front

4 pair, 8 wire.

Back

What type of multiplexing makes more efficient use of available bandwidth by dynamically assigns time slots to communications session on an as needed basis.

Front

Statistical time-division multiplexing or StatTDM.

Back

Which layer uses frames?

Front

Data Link layer or layer 2.

Back

What does the mnemonics Some People Fear Birthdays?

Front

Segments, Packets, Frames, Bits.

Back

IP addresses reside at which layer of the Open Systems Interconnection or OSI reference model?

Front

Network Layer or Layer 3.

Back

Which of the following is a connectionless transport layer protocol?

Front

UDP. User Datagram Protocol.

Back

Layer 1 is known as what?

Front

Physical layer. Function: The physical aspect of the network. Hardware: Media. Protocol: NA. Keywords: Bit, byte, cable, media, topology, transmission, voltage, digital signal.

Back

Layer 7 is known as what?

Front

Application Layer. Function: User Interface. Hardware: Gateways. Protocols: HTTP, FTP, WWW, SNAP, SMB, SMTP, Telnet, POP, IMAP. Keywords: Browser, e-mail, network appications.

Back

What is the Physical layer?

Front

Concerned with the transmission of bits on the network along with the physical and electrical characteristics of the network.

Back

Which layer of the Open Systems Interconnection or OSI reference model contain the Media Access Control or MAC and Logic Link Control or LLC sublayers?

Front

Data Link Layer or Layer 2.

Back

The TCP/IP stack is also know as what?

Front

DoD model which focuses on IP communications.

Back

Which protocol supports a secure connection to a remote host via terminal emulation software?

Front

SSH or Secure Shell.

Back

In the physical layer what two approaches are used to synchronize bits?

Front

Asynchronous and Synchronous.

Back

Identify three e-mail protocols.

Front

SMTP, POP3, IMAP4.

Back

Which layer uses packets?

Front

Network layer or layer 3.

Back

What is Synchronous?

Front

At the same rate or timing is required. Ensure that they agree on when bits begin and end.

Back

How many layers in the OSI model?

Front

Seven.

Back

Section 2

(50 cards)

What task does buffering perform in the layer 4?

Front

Allocates a chunk of memory to store segments if bandwidth is not currently available to transmit those segments. A queue has a finite capacity and can overflow in the event of sustained network congestion.

Back

What does ICMP stand for?

Front

Internet Control Message Protocol.

Back

Which layer is responsible for setting up, maintaining, and tearing down sessions?

Front

Session Layer or layer 5.

Back

In the Network layer/layer 3 what does the connection service task perform?

Front

Connection services at the network layer can improve the communication reliability in the event that the data link's LLC sublayer is not performing connection services.

Back

What is flow control?

Front

Limits the amount of data a sender can send at one time to prevents the receiver from being overwhelmed with too much information.

Back

Which layer acts as dividing line between the upper layers and lower layers of the OSI model?

Front

Transport layer or layer 4.

Back

In the Network layer or layer 3 (Routers) what does the switching perform?

Front

Makes decision about how data should be forward.

Back

In the session layer what is involved in maintaining a session?

Front

Transferring data, Reestablishing a disconnected session, acknowledging receipt of data.

Back

Which layer has its own sublayers?

Front

Data Link Layer or Layer 2 (Bridges, Switches, Wireless Access Points, NIC).

Back

What does the TCP do in the layer 4?

Front

Connection oriented transport protocols provide reliable transport in that if a segment is dropped the sender can detect that drop and retransmit that dropped segment. Receiver acknowledges segments that it receives.

Back

What are the characteristics of the Media Access Control or MAC?

Front

Physical addressing.

Back

What are the sublayers in the Data Link Layer or Layer 2 called?

Front

MAC and LLC.

Back

What two services are provided by the connection services in the layer 3 or the Network Layer (routers).

Front

Flow control and Packet recording.

Back

In the Network layer/layer 3 what does the message switching task perform?

Front

Not well suited for real-time applications because of the delay involved. A data stream is divided into message. Each message is tagged with a destination address, and the messages travel from one network device to another network device on the way to their destination.

Back

What are the two functions of the Presentation layer?

Front

Data formatting and Encryption.

Back

What is the task of encryption in layer 6?

Front

Encryption can be used to scramble up the data in such a way that if the data were intercepted, a third party would not be able to unscramble it.

Back

What are the two common transport layer protocols?

Front

Transmission Control Protocol or TCP and User Datagram Protocol or UDP.

Back

What does LLC stand for?

Front

Logical Link Control. It is a sublayer of layer 2.

Back

What does packet recording at the connection services provide?

Front

Allows packets to be placed in the appropriate sequence as they are sent to the receiver.

Back

In the Network layer/layer 3 what does the packet switching perform?

Front

Data stream is divided in to packets. Each packet has a layer 3 addresses.

Back

In the session layer what is involved in setting up a session?

Front

Checking user credentials, Assigning numbers to session's communications flows to uniquely id each flow, negotiating services required during the session, negotiating which device begins sending data.

Back

What is the main responsibility of the layer 3 (routers) or Network layer?

Front

Logical addressing, switching, route discovery and selection, connection services, bandwidth usage, multiplexing strategy.

Back

What is Isochronous in Logical Link Control or LLC?

Front

Network devices look to a common device in the network as a clock source, which creates fixed-length time slots.

Back

Flow control at the connection services is also known as what?

Front

Congestion control.

Back

Which layer is responsible for the formatting of data being exchanged and securing that data with encryption?

Front

Presentation layer or layer 6.

Back

What is Asynchronous in Logical Link Control or LLC?

Front

Network devices reference their own internal clocks and network devices do not need to synchronize. Instead, the sender places a start bit at the beginning of each data frame and a stop bit at the end of each data frame.

Back

The first 24 bits of the 48 bit address is referred to as what?

Front

Vendor Code.

Back

What is another term for packet switching?

Front

Routing.

Back

What layer provides application services to a network. This layer supports services used by end user applications.

Front

Application layer or layer 7 (user interface).

Back

What task does windowing perform in the layer 4?

Front

TCP communication uses windowing. One or more segments are sent at one time and a receiver can acknowledge the receipt of all the segments in a window with a single acknowledgment.

Back

In the Network layer or layer 3 what does the route discovery and selection task perform?

Front

Needs to know how to reach various net work addresses. A router can maintain a routing table indicating how to forward a packet based on the packet's destination and network address. A router can have its routing table populated via manual configuration via a dynamic routing protocol or simply by the fact the router is directly connected to certain networks

Back

What task does the Internet Control Message Protocol or ICMP do?

Front

Used by utilities such as ping and traceroute.

Back

Layer 2 devices view a network as what kind of topology?

Front

Logical Topology.

Back

In the Network layer/layer 3 what does the logical addressing task perform?

Front

The network layer uses logical addressing to make forwarding decision.

Back

What does the UDP in the transport layer do?

Front

A connectionless transport protocol. Provide unreliable transport in that if a segment is dropped the sender is unaware of the drop and no retransmission occurs.

Back

What is Synchronous in Logical Link Control or LLC?

Front

Two networks devices that want to communicate between themselves must agree on a clocking method to indicate the beginning and ending of data frames.

Back

What is the Session?

Front

A session can be thought of as a conversation that needs to be treated separately from other sessions to avoid intermingling of data from different conversations. Located at Layer 5 of the OSI Model.

Back

In terms of connection services. What are the two main functions provided by acknowledgement messages.

Front

Flow Control and Error Control.

Back

What is the most common layer 3 protocol in use today?

Front

IPv4. IPv6 is beginning to be more common on the networks today.

Back

What is error control?

Front

Allows the recipient of data to let the sender know whether the expected data frame was not received or whether it was received but is corrupted.

Back

In the Network layer or layer 3 what does the circuit switching task perform?

Front

Brings up a dedicated communication link between two parties for those parties to communicate.

Back

What does flow control at the connection services provide?

Front

Help prevents a sender from sending data more rapidly than the receiver is capable of receiving the data.

Back

True or False. Network Interface Card or NIC are not entirely defined at the data link layer because they are partially based on physical layer standards, such as a NIC's network connector?

Front

True.

Back

In the session layer what is involved in tearing down a session?

Front

A session can be disconnected based on mutual agreement of the devices in the session or a session might be torn down because one party disconnects.

Back

MAC address has how many bits?

Front

48 bits address which is assigned to the Network Interface Card or NIC. First 24 bits is known as the vendor code.

Back

What are the three methods of synchronizing transmissions the Logical Link Control or LLC?

Front

Isochronous, Asynchronous, Sychronous.

Back

What is Round trip time or RTT?

Front

It is when the receiver does not acknowledge successful receipt of segment within a certain time period.

Back

How does the Transport layer transmit messages?

Front

Messages from the upper layer are encapsulated into segments for transmission to the lower layers.

Back

What is the task of data formatting in layer 6?

Front

The presentation layer is responsible for formatting the text in a format that allows compatibility between the communicating devices.

Back

What are the two flow control approaches at layer 4 or the Transport layer?

Front

Windowing and Buffering.

Back

Section 3

(28 cards)

In the application layer or layer 7 what kind of protocols and supported by application services?

Front

HTTP, FTP, SMTP.

Back

Dynamic and/or private port (Ephemeral Ports) ranges are and assigned by whom?

Front

Ports 49152-65535 and never assigned.

Back

Domain Name Service or DNS is what destination port number in TCP?

Front

Port 53. Transmission Control Protocol or TCP.

Back

File Transfer Protocol or FTP is what destination port number?

Front

Port 20 and 21. Transmission Control Protocol or TCP.

Back

Secure Shell or SSH is what destination port number?

Front

Port 22. Transmission Control Protocol or Transmission Control Protocol or TCP.

Back

Hypertext Transfer Protocol Secure or HTTPS is what destination port number?

Front

Port 443. Transmission Control Protocol or TCP.

Back

What is the TCP/IP Internet?

Front

The internet layer of the TCP/IP stack maps to layer 3 the network layer. It focuses on IP as the protocol to be routed through a network.

Back

Remote Desktop Protocol or RDP is what destination port number?

Front

Port 3389. Transmission Control Protocol or TCP.

Back

System Ports (Well-Known Ports) ranges are and assigned by whom?

Front

Ports 0-1023 and assigned by IETF.

Back

Internet Message Access Protocol 4 or IMAP4 is what destination port number?

Front

Port 143. Transmission Control Protocol or TCP.

Back

In the presentation layer or layer 6 what kind of data formatting is used?

Front

ASCII, JPG, PNG, BMP.

Back

What is the TCP/IP Network interface?

Front

The TCP/IP stack network interface layer encompasses the technologies addressed layer 1 and 2 the physical and data link layers.

Back

What is application services in a layer 7?

Front

File sharing and e-mail.

Back

Telnet is what destination port number?

Front

Port 23. Transmission Control Protocol or TCP.

Back

What is the TCP/IP Transport?

Front

TCP/IP stack maps to layer 4 the transport layer of the OSI model. The two primary protocols are TCP and UDP.

Back

Domain Name Service or DNS is what destination port number in UDP?

Front

Port 53. User Datagram Protocol or UDP.

Back

What does TTL stand for?

Front

Time-to-Live.

Back

Internet Message Access Protocol or IMAP is what destination port number?

Front

Port 143. Transmission Control Protocol or Transmission Control Protocol or TCP.

Back

What is is the Time-to-Live field in the TCP/IP internet?

Front

The value in this filed is decremented by one every time this packet is routed from on IP network to another. If the TTL value ever reaches zero, the packet is discard from the network.

Back

Simple Mail Transfer Protocol or SMTP is what destination port number?

Front

Port 25. Transmission Control Protocol or TCP.

Back

User ports (Registered Ports) ranges are and assigned by whom?

Front

Ports 1024-49151 and assigned by IETF.

Back

Why is the application layer number as layer 7?

Front

It is consider to be at the top of the OSI stack because its functions are closes to the end user.

Back

Hypertext Transfer Protocol Secure or HTTPS is what destination port number?

Front

Port 443. Transmission Control Protocol or Transmission Control Protocol or TCP.

Back

Trivial File Transfer Protocol or TFTP is what destination port number?

Front

Port 69. User Datagram Protocol or UDP.

Back

What is the TCP/IP Application?

Front

TCP/IP stack addresses the concepts describe by layers 5,6,7 the Session, Presentation, and Application layers.

Back

What are the layers of the TCP/IP stack?

Front

From the top down: Application, Transport, Internet, Network Interface.

Back

What two functions does the application layer provide?

Front

Application services and service advertisement (Browser, E-mail, network applications).

Back

What is service advertisement in a Application layer?

Front

Some application service periodically send out advertisement, making the availability of their service know to other device on the network. Other services however, register themselves and their service with a centralized directory.

Back