Terms Definitions
Network is a group of computers and possibly other devices (ex.
printers) connected by some type of transmission media (ex.
wire, fiber optic, wireless)
Why are networks used? (1) Networks are mechanisms for sharing resources
(2) Allow multiple users and/or applications to share a
common set of data
(3) Networks can also be used to manage resources (install
software, resolve problems, etc.) from a central location.
What is a resource? Devices (ex. printers or disk drives), data and programs
accessed via a network
What is a stand-alone When a computer IS NOT attached to a network.
computer?
Local computer is the computer you are working on
Remote Computer is the computer or device you are accessing via the network
What is a peer-to-peer A peer-to-peer network is a group of individual computers
network? that can communicate with each other in an environment in
which :
(1) each computer manages itself
(2) no computer is in charge of network functions
Understand how an account is On a P2P network. Because each computer manages its own
required on each computer resources, then changes made on one computer (ex.
that a user wishes to access changing passwords) would have to be repeated on every
via the network. other computer if the changes were to effect all of the
computers
Rights what a user can and cannot do
Permissions what resources a user can access and what the user can do
with these resources
Advantages of a P2P network (1) Easy to configure (if the network is small - 5 or less
computers)
(2) Less expensive then Client/Server based networks
Disadvantages of a P2P (1)Becomes difficult to manage as the network grows
network (2) Difficult to fully secure due to variations in capabilities of
various O/S and inconsistencies in how security is
implemented
(3) Not considered to be highly scalable due to technical
limitations and problems relating to managing each
computer individually
(4) Limited application support - many network applications
do not support the use of a peer-to-peer network
Workgroups personnel computers or notebook computers. Refers back
to peer-to-peer network
Homegroups home and personnel computers or notebook computers.
Refers back to peer-to-peer network.
what is a client/server is a network in which one or more computers (network
network? servers) perform the network management functions for all
computers on the network. a client/server based network
uses network servers to manage network operations. NOT
THE SAME AS client/server application
What is the role of network to utilize a special operating system known as a Network
server? Operating System or NOS that is capable of managing
networks
What is a Network Operating capable of managing networks. Windows 200x Server, ((ex.
System (NOS)? 2008 Server), UNIX, LINUX, and MAC OS X Server are
examples of network operating system)
Why do network servers only are responsible for network management and utilize a
exist on a server based common network security database that contains security
network? information (accounts, user names, passwords, rights,
permissions, etc. ) for the entire network
Why are network servers NOT because network servers perform the network management
used on a P2P network? functions for all computers on the network and P2P
networks don't function off of a network.
What is a network client? Computers that are attached to a client/server based
network but DO NOT provide network management
functions
What is the role of client manages the operation of the client (ex. starting programs,
operating system? allocating memory and accessing disk drives on the client)
and interfaces with the network operating system for
network operations
(1) Windows XP and Windows 7 are examples of client O/S in
Windows
(2) Windows Server is also a client operating system when it
is running on a computer that is not a network server (a
server that is not performing network management
functions)
What is a member server? are computers that provide services via a network (ex.
database servers or web servers) but DO NOT perform
network management functions
Advantages of server based (1) Higher level of security
network (2) Highly scalable due to (a) use of a common database to
store network management information and (b) ability of
network operating system software to support large
complex networks
(3) Supports a wider range of network based applications
due to the ability of NOS to provide more extensive support
to these applications
Disadvantages of a server (1) Cost of the hardware (network server) and software
based network (network operating system)
(2) Complex to install and maintain
(3) Specialized expertise is required to manage client/server
based networks
What is a domain based a term used by microsoft to refer to client/server based
network? networks
What is the difference Topic addresses how the data is processed on a network as
between client opposed to topic 5 which dealt with how the network is
processing based application managed
and server
processing based application?
client/server application and The terms client/server application and distributed
distributed processing (when processing, when used in the context of applications, refers
used in the context of to a design that combines clients and servers in order to
applications) process data
What is the difference LAN is confined to a relatively small area and WAN spans a
between LAN and WAN? large area.
What is a metropolitan area is sometimes used to refer to a network that connects
network (MAN)? multiple closely located buildings
Addressing A unique identifier assigned to each node on a network.
When communicating on the Internet, you must know (1) the
address of the network you are communicating with AND (2)
the address of the node within the network
Backbone A single connection between multiple segments of a
network.
Client In a general context (without any qualifications) a
client is a computer on a network that requests
resources or services from other computers on the
network
connectivity device A specialized device that allows multiple nodes
or multiple networks to connect and communicate with each
other
node or host Client, server or other device that is directly
connected via a network and can communicate over
the network
segment A part of a network that consists of a group of nodes
that is connected to the remainder of the network via
the same connectivity device
server In a general context (without any qualifications) a
server is any computer or software that provides
services to users (clients) on a network
topology The physical layout of a network. The most commonly used
topologies are:
Bus topology and star topology
transmission media The means through which data is transmitted and received.
Can be physical (wire or fiber optic) or atmospheric
(microwave or radio)
workstation A personal computer that may or may not be connected to a
network
What is a packet? Unit of data that is transmitted across a network. The actual
data that is sent across a network (ex. an entire
file) is usually too big to be transmitted as a single unit and
must be broken up into smaller units known as packets.
What is a NIC (also known as Device that enables a computer or other device
Network on a network to connect to the network. NICs can be
Interface Card or Network circuitry on the computers system board, a card or board
Adapter) that is plugged into the computer or an external NIC such a
USB NIC
communication services allows users on a network to communicate using various
mechanisms
file services provide the ability to share disk storage (folders, files,
etc.) that are stored and managed on a network file server
database services provide the ability to maintain, update and query a
database
internet services provides access to features such as WWW and FTP
via an Internet server
mail services (email) is a form of communications services
management services supports the centralized control and administration of the
network
print services allow clients on a network to utilize printers that are
attached to the network. Print server stores the material on
disk until a printer becomes available
Multiple Choice Questions
1. Network
1. is the computer or device you are accessing via the network
2. Device that enables a computer or other device
on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC
3. A personal computer that may or may not be connected to a network
4. is a group of computers and possibly other devices (ex. printers) connected by some type
of transmission media (ex. wire, fiber optic, wireless)
b. What is a peer-to-peer network?
1. A personal computer that may or may not be connected to a network
2. A peer-to-peer network is a group of individual computers that can communicate with
each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions
3. A part of a network that consists of a group of nodes
that is connected to the remainder of the network via
the same connectivity device
4. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for
the entire network
b. Understand how an account is required on each computer that a user wishes to access via the network.
1. A personal computer that may or may not be connected to a network
2. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
3. On a P2P network. Because each computer manages its own resources, then changes made
on one computer (ex. changing passwords) would have to be repeated on every other computer if the
changes were to effect all of the computers
4. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
b. Addressing
1. Device that enables a computer or other device
on a network to connect to the network. NICs can be circuitry on the computers system board, a card or
board that is plugged into the computer or an external NIC such a USB NIC
2. supports the centralized control and administration of the network
3. A unique identifier assigned to each node on a network. When communicating on the
Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network
4. allows users on a network to communicate using various mechanisms
b. Local computer
1. is the computer you are working on
2. When a computer IS NOT attached to a network.
3. what a user can and cannot do
4. is a form of communications services
b. Advantages of a P2P network
1. (1) Easy to configure (if the network is small - 5 or less computers)
(2) Less expensive then Client/Server based networks
2. LAN is confined to a relatively small area and WAN spans a large area.
3. A single connection between multiple segments of a
network.
4. A personal computer that may or may not be connected to a network
b. What is a NIC (also known as Network
Interface Card or Network Adapter)
1. is the computer or device you are accessing via the network
2. A personal computer that may or may not be connected to a network
3. Device that enables a computer or other device
on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC
4. When a computer IS NOT attached to a network.
b. file services
1. provide the ability to maintain, update and query a
database
2. provide the ability to share disk storage (folders, files,
etc.) that are stored and managed on a network file server
3. provides access to features such as WWW and FTP
via an Internet server
4. is the computer or device you are accessing via the network
b. What is the difference between LAN and WAN?
1. is the computer or device you are accessing via the network
2. is the computer you are working on
3. LAN is confined to a relatively small area and WAN spans a large area.
4. A single connection between multiple segments of a
network.
b. What is a network client?
1. supports the centralized control and administration of the network
2. a term used by microsoft to refer to client/server based networks
3. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
4. Computers that are attached to a client/server based network but DO NOT provide network
management functions
b. Permissions
1. what a user can and cannot do
2. supports the centralized control and administration of the network
3. what resources a user can access and what the user can do with these resources
4. is the computer or device you are accessing via the network
b. Remote Computer
1. supports the centralized control and administration of the network
2. is the computer you are working on
3. is the computer or device you are accessing via the network
4. When a computer IS NOT attached to a network.
b. Rights
1. is the computer you are working on
2. what a user can and cannot do
3. When a computer IS NOT attached to a network.
4. is a form of communications services
b. Disadvantages of a P2P network
1. (1)Becomes difficult to manage as the network grows
(2) Difficult to fully secure due to variations in capabilities of various O/S and inconsistencies in how
security is implemented
(3) Not considered to be highly scalable due to technical limitations and problems relating to managing
each computer individually
(4) Limited application support - many network applications do not support the use of a peer-to-peer
network
2. (1) Networks are mechanisms for sharing resources
(2) Allow multiple users and/or applications to share a
common set of data
(3) Networks can also be used to manage resources (install software, resolve problems, etc.) from a
central location.
3. provides access to features such as WWW and FTP
via an Internet server
4. is sometimes used to refer to a network that connects multiple closely located buildings
b. Client
1. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
2. In a general context (without any qualifications) a
client is a computer on a network that requests
resources or services from other computers on the
network
3. In a general context (without any qualifications) a
server is any computer or software that provides
services to users (clients) on a network
4. A personal computer that may or may not be connected to a network
b. What is the role of network server?
1. are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions
2. A unique identifier assigned to each node on a network. When communicating on the
Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network
3. to utilize a special operating system known as a Network Operating System or NOS that is
capable of managing networks
4. (1) Cost of the hardware (network server) and software
(network operating system)
(2) Complex to install and maintain
(3) Specialized expertise is required to manage client/server based networks
b. server
1. In a general context (without any qualifications) a
client is a computer on a network that requests
resources or services from other computers on the
network
2. In a general context (without any qualifications) a
server is any computer or software that provides
services to users (clients) on a network
3. A personal computer that may or may not be connected to a network
4. provides access to features such as WWW and FTP
via an Internet server
b. Disadvantages of a server based network
1. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for the
entire network
2. Device that enables a computer or other device
on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC
3. A single connection between multiple segments of a
network.
4. (1) Cost of the hardware (network server) and software
(network operating system)
(2) Complex to install and maintain
(3) Specialized expertise is required to manage client/server based networks
b. print services
1. A personal computer that may or may not be connected to a network
2. When a computer IS NOT attached to a network.
3. allow clients on a network to utilize printers that are
attached to the network. Print server stores the material on disk until a printer becomes available
4. allows users on a network to communicate using various mechanisms
b. What is a domain based network?
1. is the computer or device you are accessing via the network
2. a term used by microsoft to refer to client/server based networks
3. A personal computer that may or may not be connected to a network
4. When a computer IS NOT attached to a network.
b. mail services (email)
1. is the computer you are working on
2. what a user can and cannot do
3. is a form of communications services
4. When a computer IS NOT attached to a network.
b. Homegroups
1. home and personnel computers or notebook computers. Refers back to peer-to-peer
network.
2. A personal computer that may or may not be connected to a network
3. is the computer or device you are accessing via the network
4. personnel computers or notebook computers. Refers back to peer-to-peer network
b. What is a metropolitan area network (MAN)?
1. allows users on a network to communicate using various mechanisms
2. a term used by microsoft to refer to client/server based networks
3. is sometimes used to refer to a network that connects multiple closely located buildings
4. A personal computer that may or may not be connected to a network
b. topology
1. A single connection between multiple segments of a
network.
2. The physical layout of a network. The most commonly used topologies are:
Bus topology and star topology
3. A personal computer that may or may not be connected to a network
4. allows users on a network to communicate using various mechanisms
b. management services
1. When a computer IS NOT attached to a network.
2. is the computer you are working on
3. is the computer or device you are accessing via the network
4. supports the centralized control and administration of the network
b. What is the difference between client
processing based application and server
processing based application?
1. The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)
2. A unique identifier assigned to each node on a network. When communicating on the
Internet, you must know (1) the address of the network you are communicating with AND (2) the
address of the node within the network
3. Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed
4. allows users on a network to communicate using various mechanisms
b. client/server application and distributed processing (when used in the context of applications)
1. The terms client/server application and distributed processing, when used in the context
of applications, refers to a design that combines clients and servers in order to process data
2. supports the centralized control and administration of the network
3. LAN is confined to a relatively small area and WAN spans a large area.
4. is the computer or device you are accessing via the network
b. Workgroups
1. personnel computers or notebook computers. Refers back to peer-to-peer network
2. is the computer or device you are accessing via the network
3. home and personnel computers or notebook computers. Refers back to peer-to-peer
network.
4. A personal computer that may or may not be connected to a network
b. node or host
1. A specialized device that allows multiple nodes
or multiple networks to connect and communicate with each other
2. Client, server or other device that is directly
connected via a network and can communicate over
the network
3. is the computer or device you are accessing via the network
4. A personal computer that may or may not be connected to a network
b. database services
1. provide the ability to maintain, update and query a
database
2. is a form of communications services
3. A single connection between multiple segments of a
network.
4. is the computer or device you are accessing via the network
b. connectivity device
1. Client, server or other device that is directly
connected via a network and can communicate over
the network
2. Device that enables a computer or other device
on a network to connect to the network. NICs can be circuitry on the computers system board, a card
or board that is plugged into the computer or an external NIC such a USB NIC
3. A specialized device that allows multiple nodes
or multiple networks to connect and communicate with each other
4. A single connection between multiple segments of a
network.
b. Why do network servers only exist on a server based network?
1. A peer-to-peer network is a group of individual computers that can communicate with
each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions
2. provide the ability to maintain, update and query a
database
3. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for
the entire network
4. A single connection between multiple segments of a
network.
b. Why are networks used?
1. A part of a network that consists of a group of nodes
that is connected to the remainder of the network via
the same connectivity device
2. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
3. (1) Networks are mechanisms for sharing resources
(2) Allow multiple users and/or applications to share a
common set of data
(3) Networks can also be used to manage resources (install software, resolve problems, etc.) from a
central location.
4. (1)Becomes difficult to manage as the network grows
(2) Difficult to fully secure due to variations in capabilities of various O/S and inconsistencies in how
security is implemented
(3) Not considered to be highly scalable due to technical limitations and problems relating to
managing each computer individually
(4) Limited application support - many network applications do not support the use of a peer-to-
peer network
b. What is a stand-alone computer?
1. what a user can and cannot do
2. is the computer or device you are accessing via the network
3. When a computer IS NOT attached to a network.
4. is the computer you are working on
b. workstation
1. is the computer you are working on
2. A personal computer that may or may not be connected to a network
3. When a computer IS NOT attached to a network.
4. is the computer or device you are accessing via the network
b. what is a client/server network?
1. supports the centralized control and administration of the network
2. is a network in which one or more computers (network servers) perform the network
management functions for all computers on the network. a client/server based network uses network
servers to manage network operations. NOT THE SAME AS client/server application
3. Computers that are attached to a client/server based network but DO NOT provide network
management functions
4. personnel computers or notebook computers. Refers back to peer-to-peer network
b. What is a Network Operating System (NOS)?
1. allows users on a network to communicate using various mechanisms
2. LAN is confined to a relatively small area and WAN spans a large area.
3. capable of managing networks. Windows 200x Server, ((ex. 2008 Server), UNIX, LINUX, and
MAC OS X Server are examples of network operating system)
4. a term used by microsoft to refer to client/server based networks
b. What is the role of client operating system?
1. provide the ability to maintain, update and query a
database
2. manages the operation of the client (ex. starting programs, allocating memory and
accessing disk drives on the client) and interfaces with the network operating system for network
operations
(1) Windows XP and Windows 7 are examples of client O/S in Windows
(2) Windows Server is also a client operating system when it is running on a computer that is not a
network server (a server that is not performing network management functions)
3. Devices (ex. printers or disk drives), data and programs accessed via a network
4. LAN is confined to a relatively small area and WAN spans a large area.
b. What is a packet?
1. is the computer or device you are accessing via the network
2. what resources a user can access and what the user can do with these resources
3. supports the centralized control and administration of the network
4. Unit of data that is transmitted across a network. The actual data that is sent across a
network (ex. an entire
file) is usually too big to be transmitted as a single unit and must be broken up into smaller units
known as packets.
b. Advantages of server based network
1. are responsible for network management and utilize a common network security database
that contains security information (accounts, user names, passwords, rights, permissions, etc. ) for the
entire network
2. LAN is confined to a relatively small area and WAN spans a large area.
3. (1) Higher level of security
(2) Highly scalable due to (a) use of a common database to store network management information
and (b) ability of network operating system software to support large complex networks
(3) Supports a wider range of network based applications due to the ability of NOS to provide more
extensive support to these applications
4. provide the ability to maintain, update and query a
database
b. What is a member server?
1. Computers that are attached to a client/server based network but DO NOT provide network
management functions
2. are computers that provide services via a network (ex. database servers or web servers) but
DO NOT perform network management functions
3. is the computer or device you are accessing via the network
4. A personal computer that may or may not be connected to a network
b. communication services
1. allows users on a network to communicate using various mechanisms
2. is a form of communications services
3. is the computer you are working on
4. is the computer or device you are accessing via the network
b. Why are network servers NOT used on a P2P network?
1. In a general context (without any qualifications) a
client is a computer on a network that requests
resources or services from other computers on the
network
2. because network servers perform the network management functions for all computers on
the network and P2P networks don't function off of a network.
3. supports the centralized control and administration of the network
4. is sometimes used to refer to a network that connects multiple closely located buildings
b. Backbone
1. A single connection between multiple segments of a
network.
2. A personal computer that may or may not be connected to a network
3. When a computer IS NOT attached to a network.
4. is the computer or device you are accessing via the network
b. internet services
1. is the computer or device you are accessing via the network
2. When a computer IS NOT attached to a network.
3. provides access to features such as WWW and FTP
via an Internet server
4. provide the ability to maintain, update and query a
database
b. What is a resource?
1. is the computer or device you are accessing via the network
2. Devices (ex. printers or disk drives), data and programs accessed via a network
3. When a computer IS NOT attached to a network.
4. A personal computer that may or may not be connected to a network
b. transmission media
1. Topic addresses how the data is processed on a network as opposed to topic 5 which dealt
with how the network is managed
2. what resources a user can access and what the user can do with these resources
3. LAN is confined to a relatively small area and WAN spans a large area.
4. The means through which data is transmitted and received. Can be physical (wire or fiber
optic) or atmospheric (microwave or radio)
b. segment
1. A personal computer that may or may not be connected to a network
2. allow clients on a network to utilize printers that are
attached to the network. Print server stores the material on disk until a printer becomes available
3. A peer-to-peer network is a group of individual computers that can communicate with
each other in an environment in which :
(1) each computer manages itself
(2) no computer is in charge of network functions
4. A part of a network that consists of a group of nodes
that is connected to the remainder of the network via
the same connectivity device
Intro to networking concepts
Terms Definitions
4G Cellular technology that focuses on real time multimedia
10.134.12.9 Private IP Address
127.0.0.1 Most popular Loopback Address
128.211.0.16/28 CIDR Notation
802.11g Wireless standard that specifies a data rate of 2.4Ghz
802.11i Wireless standard that specifies enhanced security such as
WPA2
802.11n wireless standard that specifies a data rate over 100 Mbps
802.11 WiFI standard
802.15 Pan standards
A wireless WAN technology WiFi
Access Delay Time needed to obtain access to the transmission medium
access point Home base for wireless stations
ACK A small message that reports successful reception of a frame
Anycast Address that corresponds to a set a computer that share a
common prefix
ARP Protocol that converts between IP protocol and hardware
adddress
ARP Cache Small table of address bindings held in memory.
ARPANET The first Internet backbone
BGP Commonly used External Gateway Control used in the Internet
Bluetooth Personal area wireless technology for exchanging data over
short distances
BOOTP Predecessor to DHCP
Bridge Connects two LAN segments and forward frames
Broadcast Address Address that consist of all 1 bits and is sent across a network
Buffer allocated by the sliding windows technique as a place to hold
incoming data
Can do hierarchical routing OSPF
CDMA Cellular technology commonly used in US
Cypher Text A message after it has been ecrypted
Datagram Packet sent across TCP/IP Internet
DHCP Protocol that converts between IP protocol and hardware
address
Digital Certificates Provides sender authentication
Digital Signatures Provides message authentication
Distance Vector Routing algorithm where each link is assigned a weight and
distance
DoS Making a copy of packets as they traverse the internet to
obtain information
Dotted Decimal Notation Conversion of a binary IP Address to a convention where each
octet is expressed in decimal
Echo Used by Ping
EGP Used by router to exchange routing information w/ a router in
a different autonomous system
Encapsulation Placing IP Datagram in the Payload of a frame for transmission
across physical network
Encryption Provides privacy
Firewall Helps protect an organization's network from unwanted
Internet traffic
Forwarding Table A set of values that specify a destination and the next hop
used to reach that destination.
GPS System of satellites that provide accurate time and location
information.
GSM Cellular technology commonly used in Europe
Hashing Provides data integrity
HTTPS Uses port 443 to provide authenticated, confidential
communication over the web
Hub analog device, provides multiple ports to attach computers,
handles signals not packets
ICANN An organization established to handle Internet Address
assignment
ICMP Protocol that is used to report errors in transmission back to
the original sender
IGMP Protocol that allows a host to join or leave a multicast group
IGP Used by routers within an autonomous system to exchange
routing information
InfraRED Line of sight communication between a small device and
nearby system
IPv4 Uses 32 bit addresses
IPv6 Uses 128 bit addresses
ISM wireless "Areas of the electromagnetic spectrum that can be used by
Industrial, Scientific and Medical groups and are broadly
available for products"
Jitter The changes in delay that occur and the duration of the
changes
LAN Spans a building or campus
Latency Time required to transfer data across a network
Layer 3 of the TCP/IP model Layer at which a router functions
Layer 4 of the TCP/IP model Specifies messages and procedures used to reliable transfer
Link State "Also known as shortest path first, based on Dijkstra's
algorithm and can detect link failures"
Loopback Address Used to test network applications
MAC Address Used by link Layer of the TCP/IP model
MTU Maximum amount of data a frame can carry
Multicast Address corresponds to a set of computers
NAT Mechanism to allow computer to share a single globaly valid IP
address
One of the original IGP RIP
protocols uses
OSPF a commonly used Internal Gateway Control.
Packet Filter A mechanism that examines fields in each packet header and
decides to allow it to pass or not
Packet Switching Uses Store and Forward
PAN Spans region near an individual
payload data area of the packet
PGP Developed at MIT a system applications can use to encrypt
data before transmission
Phishing Masquerading as a well-know site to obtain personal
information
ping None of the above
Plaintext An original message before it has been encrypted
Port number A part of the IPv6 header
Privated Key encryption Uses a single key shared by communication entities
Propagation Delay The time required for a signal to travel across a transmission
medium
Public Key encryption uses a pair of keys
QoS Mechanisms that are used to implement service quarantees
Queuing Delay Time a packet spends in memory of a switch or router waiting
to be selected for transmission
Radius A protocol used to centralize authentication, authorization and
accounting
Repeater Analog device used to propagate LAN signals over long
distances - simply amplifies the signal
RFID Used to pull information from tags on merchandise
RIP Uses Hop Count Routing Metric
Router "Can interconnect networks w/ different technologies, media,
addressing"
Routing Protocol that uses OSPF
Link State
RSVP Fine Grain QoS
RTP Provides the mechanism to transmit real-time data across the
Internet
Sliding Window Technique used for flow control by TCP
SMS A message service used for texting
Spanning Tree Protocol that allows bridges to work in a circular configuration
Spread Spectrum Can help wireless LAN's function in noisy environments
Transmission
SSL Fits between the application and socket API and encrypts data
before transmission
Static Routing Has the advantages of simplicity and low overhead
Subnet Mask Marks the boundary between the network prefix and host
prefix
Switch Digital device, provides multiple ports to attach computer,
forward packets
SYN Flood Sending a stream of random segments to exhaust a receiver's
set of TCP Connections
TCP Full Duplex
Three-way handshake Used by TCP to guarantee a connection is established and
terminated properly
Throughput Amount of data that can be transferred per unit of time
Time to Live Value decremented by each router that processes a datagram -
which is discarded when the value reaches 0
Type of address a bridge MAC
uses for forwarding?
UDP Best effort
Unicast Address corresponds to a single computer
VLAN Switch Divides computers into separate broadcast domains
VoIP Replaces traditional telephone switches with IP routers
VSAT Short distances protocol used in PANS
WAN Spans multiple cities or countries
WEP Original security for Wi-Fi has weakness such as a short static
key
Wiretapping Making a copy of packets as they traverse the Internet to
obtain information
Zigbee technology Wireless standard for remote control, not data
Multiple Choice Questions
1. Specifies messages and procedures used to reliable transfer
1. Time to Live
2. Layer 3 of the TCP/IP model
3. Layer 4 of the TCP/IP model
4. Packet Filter
b. WiFi
a. Wiretapping
b. ISM wireless
c. A wireless WAN technology
d. Packet Switching
a. a commonly used Internal Gateway Control.
a. QoS
b. OSPF
c. WEP
d. GPS
a. Connects two LAN segments and forward frames
a. Router
b. Bridge
c. RIP
d. ARP
a. Personal area wireless technology for exchanging data over short distances
a. Bluetooth
b. BOOTP
c. Switch
d. Buffer
a. analog device, provides multiple ports to attach computers, handles signals not packets
a. DHCP
b. BGP
c. PAN
d. Hub
a. Used to test network applications
a. Packet Filter
b. Link State
c. MAC Address
d. Loopback Address
a. None of the above
a. PAN
b. ping
c. IGP
d. PGP
a. The time required for a signal to travel across a transmission medium
a. Router
b. Plaintext
c. Repeater
d. Propagation Delay
a. Value decremented by each router that processes a datagram - which is discarded when the value
reaches 0
a. Time to Live
b. access point
c. Firewall
d. IPv6
a. Wireless standard that specifies a data rate of 2.4Ghz
a. 802.11
b. 802.11n
c. 4G
d. 802.11g
a. The changes in delay that occur and the duration of the changes
a. VSAT
b. IPv4
c. Router
d. Jitter
a. Routing algorithm where each link is assigned a weight and distance
a. VLAN Switch
b. Static Routing
c. Distance Vector
d. Link State
a. Packet sent across TCP/IP Internet
1. Datagram
2. Jitter
3. NAT
4. IGP
b. Cellular technology that focuses on real time multimedia
1. BGP
2. NAT
3. 4G
4. EGP
b. Divides computers into separate broadcast domains
1. VLAN Switch
2. Latency
3. Switch
4. LAN
b. Protocol that allows a host to join or leave a multicast group
1. PGP
2. GSM
3. IGMP
4. IGP
b. Pan standards
1. 802.11n
2. PGP
3. MTU
4. 802.15
b. A message after it has been ecrypted
1. Repeater
2. Plaintext
3. InfraRED
4. Cypher Text
b. Uses port 443 to provide authenticated, confidential communication over the web
1. TCP
2. HTTPS
3. MTU
4. GPS
b. MAC
1. Can do hierarchical routing
2. One of the original IGP protocols uses
3. Broadcast Address
4. Type of address a bridge uses for forwarding?
b. Time a packet spends in memory of a switch or router waiting to be selected for transmission
1. Hashing
2. Queuing Delay
3. ping
4. Link State
b. Line of sight communication between a small device and nearby system
1. ARPANET
2. Anycast
3. InfraRED
4. Repeater
b. OSPF
1. Link State
2. Time to Live
3. Digital Certificates
4. Routing Protocol that uses Link State
b. Short distances protocol used in PANS
1. QoS
2. WEP
3. PAN
4. VSAT
b. Provides data integrity
1. ping
2. Hashing
3. Radius
4. PAN
b. Protocol that converts between IP protocol and hardware adddress
1. RIP
2. ARP
3. RTP
4. IGP
b. Uses Store and Forward
1. Phishing
2. Packet Filter
3. VLAN Switch
4. Packet Switching
b. Uses 128 bit addresses
1. GPS
2. RIP
3. IPv6
4. RSVP
b. Digital device, provides multiple ports to attach computer, forward packets
1. Switch
2. RTP
3. DHCP
4. RFID
b. Wireless standard that specifies enhanced security such as WPA2
1. 802.15
2. 802.11i
3. 802.11n
4. IGMP
b. Provides the mechanism to transmit real-time data across the Internet
1. TCP
2. RIP
3. RTP
4. WEP
b. Best effort
1. PGP
2. RIP
3. ARP
4. UDP
b. Layer at which a router functions
1. Public Key encryption
2. Zigbee technology
3. ARP Cache
4. Layer 3 of the TCP/IP model
b. Technique used for flow control by TCP
1. SYN Flood
2. Sliding Window
3. Switch
4. Queuing Delay
b. Protocol that is used to report errors in transmission back to the original sender
1. ICMP
2. Echo
3. ICANN
4. IGMP
b. data area of the packet
1. Anycast
2. payload
3. VSAT
4. SYN Flood
b. "Areas of the electromagnetic spectrum that can be used by Industrial, Scientific and Medical groups
and are broadly available for products"
1. Firewall
2. Cypher Text
3. GSM
4. ISM wireless
b. Original security for Wi-Fi has weakness such as a short static key
1. EGP
2. RIP
3. WEP
4. PGP
b. Time required to transfer data across a network
1. TCP
2. Latency
3. NAT
4. LAN
b. An organization established to handle Internet Address assignment
1. PAN
2. ARP
3. ICANN
4. Unicast
b. Helps protect an organization's network from unwanted Internet traffic
1. SSL
2. Jitter
3. ICANN
4. Firewall
b. Provides message authentication
1. MAC Address
2. Digital Signatures
3. Link State
4. Wiretapping
b. Sending a stream of random segments to exhaust a receiver's set of TCP Connections
1. InfraRED
2. RFID
3. payload
4. SYN Flood
b. Placing IP Datagram in the Payload of a frame for transmission across physical network
1. Unicast
2. VSAT
3. LAN
4. Encapsulation
b. Conversion of a binary IP Address to a convention where each octet is expressed in decimal
1. Zigbee technology
2. Public Key encryption
3. Dotted Decimal Notation
4. Time to Live
b. "Can interconnect networks w/ different technologies, media, addressing"
1. Router
2. Repeater
3. BOOTP
4. RTP
b. Uses a single key shared by communication entities
1. Dotted Decimal Notation
2. Packet Switching
3. Privated Key encryption
4. Packet Filter
Answer Key
Multiple Choice Questions
1. Specifies messages and procedures used to reliable transfer (No Answer)
a. Time to Live
b. Layer 3 of the TCP/IP model
c. CORRECT: Layer 4 of the TCP/IP model
d. Packet Filter
a. WiFi(No Answer)
a. Wiretapping
b. ISM wireless
c. CORRECT: A wireless WAN technology
d. Packet Switching
a. a commonly used Internal Gateway Control. (No Answer)
1. QoS
2. CORRECT: OSPF
3. WEP
4. GPS
b. Connects two LAN segments and forward frames (No Answer)
1. Router
2. CORRECT: Bridge
3. RIP
4. ARP
b. Personal area wireless technology for exchanging data over short distances (No Answer)
1. CORRECT: Bluetooth
2. BOOTP
3. Switch
4. Buffer
b. analog device, provides multiple ports to attach computers, handles signals not packets (No Answer)
1. DHCP
2. BGP
3. PAN
4. CORRECT: Hub
b. Used to test network applications (No Answer)
1. Packet Filter
2. Link State
3. MAC Address
4. CORRECT: Loopback Address
b. None of the above(No Answer)
1. PAN
2. CORRECT: ping
3. IGP
4. PGP
b. The time required for a signal to travel across a transmission medium (No Answer)
1. Router
2. Plaintext
3. Repeater
4. CORRECT: Propagation Delay
b. Value decremented by each router that processes a datagram - which is discarded when the value
reaches 0(No Answer)
1. CORRECT: Time to Live
2. access point
3. Firewall
4. IPv6
b. Wireless standard that specifies a data rate of 2.4Ghz (No Answer)
1. 802.11
2. 802.11n
3. 4G
4. CORRECT: 802.11g
b. The changes in delay that occur and the duration of the changes(No Answer)
1. VSAT
2. IPv4
3. Router
4. CORRECT: Jitter
b. Routing algorithm where each link is assigned a weight and distance (No Answer)
1. VLAN Switch
2. Static Routing
3. CORRECT: Distance Vector
4. Link State
b. Packet sent across TCP/IP Internet(No Answer)
1. CORRECT: Datagram
2. Jitter
3. NAT
4. IGP
b. Cellular technology that focuses on real time multimedia (No Answer)
1. BGP
2. NAT
3. CORRECT: 4G
4. EGP
b. Divides computers into separate broadcast domains (No Answer)
1. CORRECT: VLAN Switch
2. Latency
3. Switch
4. LAN
b. Protocol that allows a host to join or leave a multicast group (No Answer)
1. PGP
2. GSM
3. CORRECT: IGMP
4. IGP
b. Pan standards(No Answer)
1. 802.11n
2. PGP
3. MTU
4. CORRECT: 802.15
b. A message after it has been ecrypted(No Answer)
1. Repeater
2. Plaintext
3. InfraRED
4. CORRECT: Cypher Text
b. Uses port 443 to provide authenticated, confidential communication over the web (No Answer)
1. TCP
2. CORRECT: HTTPS
3. MTU
4. GPS
b. MAC(No Answer)
1. Can do hierarchical routing
2. One of the original IGP protocols uses
3. Broadcast Address
4. CORRECT: Type of address a bridge uses for forwarding?
b. Time a packet spends in memory of a switch or router waiting to be selected for transmission (No
Answer)
1. Hashing
2. CORRECT: Queuing Delay
3. ping
4. Link State
b. Line of sight communication between a small device and nearby system (No Answer)
1. ARPANET
2. Anycast
3. CORRECT: InfraRED
4. Repeater
b. OSPF(No Answer)
1. Link State
2. Time to Live
3. Digital Certificates
4. CORRECT: Routing Protocol that uses Link State
b. Short distances protocol used in PANS(No Answer)
1. QoS
2. WEP
3. PAN
4. CORRECT: VSAT
b. Provides data integrity(No Answer)
1. ping
2. CORRECT: Hashing
3. Radius
4. PAN
b. Protocol that converts between IP protocol and hardware adddress (No Answer)
1. RIP
2. CORRECT: ARP
3. RTP
4. IGP
b. Uses Store and Forward(No Answer)
1. Phishing
2. Packet Filter
3. VLAN Switch
4. CORRECT: Packet Switching
b. Uses 128 bit addresses(No Answer)
1. GPS
2. RIP
3. CORRECT: IPv6
4. RSVP
b. Digital device, provides multiple ports to attach computer, forward packets (No Answer)
1. CORRECT: Switch
2. RTP
3. DHCP
4. RFID
b. Wireless standard that specifies enhanced security such as WPA2 (No Answer)
1. 802.15
2. CORRECT: 802.11i
3. 802.11n
4. IGMP
b. Provides the mechanism to transmit real-time data across the Internet (No Answer)
1. TCP
2. RIP
3. CORRECT: RTP
4. WEP
b. Best effort(No Answer)
1. PGP
2. RIP
3. ARP
4. CORRECT: UDP
b. Layer at which a router functions(No Answer)
1. Public Key encryption
2. Zigbee technology
3. ARP Cache
4. CORRECT: Layer 3 of the TCP/IP model
b. Technique used for flow control by TCP(No Answer)
1. SYN Flood
2. CORRECT: Sliding Window
3. Switch
4. Queuing Delay
b. Protocol that is used to report errors in transmission back to the original sender (No Answer)
1. CORRECT: ICMP
2. Echo
3. ICANN
4. IGMP
b. data area of the packet(No Answer)
1. Anycast
2. CORRECT: payload
3. VSAT
4. SYN Flood
b. "Areas of the electromagnetic spectrum that can be used by Industrial, Scientific and Medical groups
and are broadly available for products" (No Answer)
1. Firewall
2. Cypher Text
3. GSM
4. CORRECT: ISM wireless
b. Original security for Wi-Fi has weakness such as a short static key (No Answer)
1. EGP
2. RIP
3. CORRECT: WEP
4. PGP
b. Time required to transfer data across a network (No Answer)
1. TCP
2. CORRECT: Latency
3. NAT
4. LAN
b. An organization established to handle Internet Address assignment (No Answer)
1. PAN
2. ARP
3. CORRECT: ICANN
4. Unicast
b. Helps protect an organization's network from unwanted Internet traffic (No Answer)
1. SSL
2. Jitter
3. ICANN
4. CORRECT: Firewall
b. Provides message authentication(No Answer)
1. MAC Address
2. CORRECT: Digital Signatures
3. Link State
4. Wiretapping
b. Sending a stream of random segments to exhaust a receiver's set of TCP Connections (No Answer)
1. InfraRED
2. RFID
3. payload
4. CORRECT: SYN Flood
b. Placing IP Datagram in the Payload of a frame for transmission across physical network (No Answer)
1. Unicast
2. VSAT
3. LAN
4. CORRECT: Encapsulation
b. Conversion of a binary IP Address to a convention where each octet is expressed in decimal (No
Answer)
1. Zigbee technology
2. Public Key encryption
3. CORRECT: Dotted Decimal Notation
4. Time to Live
b. "Can interconnect networks w/ different technologies, media, addressing" (No Answer)
1. CORRECT: Router
2. Repeater
3. BOOTP
4. RTP
b. Uses a single key shared by communication entities (No Answer)
1. Dotted Decimal Notation
2. Packet Switching
3. CORRECT: Privated Key encryption
4. Packet Filter