MTA Networking Fundamentals, MTA Networking Fundamentals-Final, MTA Network Fundamentals- OSI/TCP, MTA Networking Fundamentals Test 1, MTA Networking Fundamentals Test 2, MTA Networking Fundamentals Test 3, MTA Networking Fundamentals, MTA Networking...
Aero Requirements
-Windows Vista -1Ghz processor -1GB RAM -128 MB graphics card -DirectX 9 compatible graphics processor widows display driver model driver (WDDM) pixel shader 2.0 in hardware 32-bits per pixel
NETSTAT Options
-a -e -n -o -p [protocol] -r -s [interval]
NBTSTAT Options
-a [remoteName] -A [IPAddress] -c -n -r -R -S
User Account Control
-credentials are elevated to administrator when necessary -configure windows firewall -install applications -schedule tasks -change user information
Control UAC
-enable/disable in user accounts
The hash of a drive (partition) may change. Even when write blocked. File carving is harder.
.
Which one of the following is a second-level domain?
.edu
The subnet mask 255.255.255.240 can be written in slash notation as _______________ /30 /26 /28 /24
/28
Digits: 0, 1
0 False Off Cleared 1 True On Set
unmasked
0 in binary
Notation - Prefix 0b
0b1100 1101 = 127 + 126 + 025 + 024 + 123 + 122 + 021 + 1 20 = 128 + 64 + 8 + 4 + 1 =
masked
1 in binary
Bluetooth class 3
1 mW, range of 1 meter (3 feet).
1.The type of network is 2. The solution is
1. Ethernet 2. Replace the hub with a switch
1. Application Layer 2. Network Layer 3. Data Link Layer 4. Physical Layer
1. FTP 2. Router 3. Network Interface Card 4. Hub
1. Attenuation 2. Attenuation 3. Crosstalk 4. TrafficCollisions
1. Radio waves affected by weather, walls, and other obstructions 2. Loss of signal intensity or integrity over long cables 3. Hearing two radio broadcasts on the same station 4. Primary problem with Ethernet
1. PPTP 2. L2TP 3. SSTP
1. TCP/UDP port 1723 2. UDP port 1701 3. TCP port 443
How many B channels does an ISDN PRI support?
23
Class C
255.255.255.0 - IP range 192-239
A replication group can have up to BLANK members
256
Each server can manage up to BLANK replication groups.
256
Using nslookup you can verify that:
1. The system is configured w/ the correct DNS server. 2. The server is responding to requests. 3. The entries on the server are correct. 4. The DNS server can communicate w/ other servers in the DNS hierarchy to resolve names.
APIPA
169.254.x.x
proxy server
A computer that intercepts requests that a client (for example, browser) makes of a server (for example, a web server) and can serve up the request from a cache it maintains to improve performance or can filter requests to secure a large network.
Client
A computer that uses resources on the server. Depending on the network OS, they can be separate machines, or the client can act as a server and vice versa. Clients can refer to servers either by assigning drive letters to shared folders or by using a Universal Naming Convention (UNC) path name to refer to the server.
Group Policy
A console (gpedit.msc) available only in Windows professional and business editions that is used to control what users can do and how the system can be used.
folder
A container used for organizing files into manageable groups.
diskpart
A fully functioning command-line partitioning tool.
location independence
A function of cloud computing whereby customers generally are not aware of where the physical devices providing cloud services are located geographically.
Static vs. server-assigned gateway
A gateway identifies the IP address of a device that connects the computer to the Internet or other LAN. Static: IP address for gateway has to be entered, same value for all comps. on network. Server-assigned: automatically assigned by DHCP server.
Internet Protocol version 6 (IPv6)
A group of TCP/IP standards that uses IP addresses that have 128 bits.
Internet Protocol version 4 (IPv4)
A group of TCP/IP standards that uses IP addresses that have 32 bits.
subnet
A group of local networks when several networks are tied together in a subsystem of the larger intranet.
What is a shadow group?
A group that contains the same users as an OU and these users meet a certain criterion. Cannot maintain membership dynamically.
Attribute
A predefined designation that a file or directory may or may not have. Examples: Hidden System File and directory attributes are usually assigned by system, but can be changed by user.
Private IP address
A private IP address is hidden from sight on the Internet, and are usually behind a firewall. Computers within a LAN network are usually given a private IP.
default program
A program associated with a file extension that is used to open the file.
Public IP address
A public IP address is the one that faces the Internet and can be seen by any computer that connects to the Internet. Servers connecting to the Internet are usually given a public IP.
driver roll back
A recovery feature in Windows 8.1 that will let you reinstall the last device driver that was functioning
System restore
A recovery option for your computer that saves information about your drives, registry settings, programs, and files in the form of restore points.
Last Known Good Configuration (LKGC)
A recovery option used to restore registry and driver settings that were in place the last time your system started successfully.
USB drive
A removable disk that you plug into a USB port on your computer.
Command
A request, typed from a terminal or embedded in a file, to perform an operation or to execute a particular program.
data source
A resource on a network that includes a database and the drivers required to interface between a remote computer and the data. Also see Open Database Connectivity (ODBC).
swap
A swap file system is used as virtual memory (the portion of the hard disk used to temporarily store portions of main memory) by the operating system. (A recommended practice is to make the swap file equal in size to the amount of memory on the computer.)
call tracking software
A system that tracks the dates, times, and transactions of help-desk or on-site IT support calls, including the problem presented, the issues addressed, who did what, and when and how each call was resolved.
MSconfig
A system utility used to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters.
contextual tab
A tab on the Ribbon that appears only when you are performing certain tasks, and contains options related to your current task.
SIM (Subscriber Identification Module) card
A small flash memory card that contains all the information a device needs to connect to a GSM or LTE cellular network, including a password and other authentication information needed to access the network, encryption standards used, and the services that a subscription includes.
Hardware Loopback plug
A special connector used for diagnosing transmission problems such as redirecting electrical signals back to itself. It plugs into a port and crosses over transmit/receive lines. The plug directly connects Pin 1 to 3 and Pin 2 to 6.
ARP cache
A table used for maintaining the correlation between each MAC address and its corresponding IP address.
crossover cable
A special network cable used in Ethernet UTP installations, which enable you to connect devices without using a hub or a switch. The transmit and receive lines are crossed to make them work like a loopback. Pins 1 and 2 connect to Pins 3 and 6.
channel
A specific radio frequency within a broader frequency.
File System
A specification of how files and directories are organized and managed in secondary storage. Essential functions: Storage Dynamic size Retrieval Deletion Naming -Ancillary functions: Sizes Dates and times Permissible uses (Security)
Address
A specification of the location of data.
Guests group
A type of user group in Windows. User accounts that belong to this group have limited rights to the system and are given a temporary profile that is deleted after the user logs off.
Administrators group
A type of user group. When a user account is assigned to this group, the account is granted rights that are assigned to an administrator account.
A VPN is a/an: A. Encrypted connection across the Internet. B. Virtual network within your local area network (LAN). C. Communication tunnel between VLANs. D. Personal network for your use only.
A. Encrypted connection across the Internet. VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
Which of the following is a Layer 2 WAN protocol? A. Point-to-Point Protocol (PPP) B. Simple Network Management Protocol (SNMP) C. Transmission Control Protocol (TCP) D. Internet Protocol (IP)
A. Point-to-Point Protocol (PPP) Data Link Layer: WAN Protocols: HDLC, PPP, Frame Relay, Ethernet WANs, MPLS VSAT, Broadband
Authenticated Users group
All user accounts that have been authenticated to access the system except the Guest account. Compare with anonymous users.
Location Aware Printing
Allows you to choose different default printers for different networks
Time to Live (TTL)
Also known as "hop limit", is a mechanism that limits the lifespan or lifetime of data in a computer or network. This mechanism may be implemented as a counter or timestamp attached to or embedded in the data.
Wireless Ethernet
Also known as IEEE 802.11. The collective name for a group of wireless technologies compatible with wired Ethernet, referred to as wireless LAN (WLAN) standards. Wireless Ethernet is also known as Wi-Fi. Supports both star and mesh topologies. (check table of Wireless Ethernet types)
Ethernet connection
Also known as IEEE-802.3. The most common and oldest network still in use today. Most recent wired Ethernet networks use UTP cables, but older versions use types of coaxial cable. (check table)
System Configuration utility
Also known as MSCONFIG.
Active directory
An infrastructure (directory) that stores information and objects. An object can be a file, a printer, a computer, a user account, or other entities.
Spectrum Analyzer
An instrument that displays the variation of signal strength against the frequency.
Octet
An octet is the name for each number in an IP address. An octet is an eight-bit byte; this means that in binary, the number can range from 00000000-11111111. Example: 255 is actually 11111111 when converted to binary.
GSM (Global System for Mobile Communications)
An open standard for cellular networks and cell phones that uses digital communication of data and is accepted and used worldwide.
Anything as a Service or Everything as a Service (XaaS)
An open-ended cloud computing service that can provide any combination of functions depending on a customer's exact needs.
library
An organizational tool for folders and files that displays similar types of files together, no matter where they are stored on the computer.
dynamic IP address
An IP address assigned by a DHCP server for the current session only, and is leased when the computer first connects to a network. When the session is terminated, the IP address is returned to the list of available addresses.
loopback address
An IP address that indicates your own computer and is used to test TCP/IP configuration on the computer.
Parts of an IPv4 address
An IPv4 address consists of 4 groups of numbers which each range from 0 to 255; example: 192.168.1.1. IP addresses are divided into two sections: the network portion (the number of the network the computer is on) and the host portion (the number of the individual computer). In the above example, 192.168.1 is the network number, and .1 is the host number.
In addition to switching, multilayer switches also: A. Provide Layer 3 routing functions. B. Interface with CAT3, CATS, CAT5e, and fiber optics. C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports. D. Operate by using only Layer 1 and 2 protocols.
A. Provide Layer 3 routing functions.
what is the best practice for group nesting called?
AGDLA - Accounts- are members (users and computers of Global groups- represent business roles and are members of Domain Local - groups that represent management rules and these rule groups are added to ACLs- which provide the level of access required by the rule
Which protocol is used to translate IP addresses to MAC addresses?
ARP
arp -s inet_addr OR arp -s eth_addr
Add a host. The internet address is set by adding an inet_addr value and the physical address is set by adding an eth_addr value
What is nesting
Adding groups to other groupsg
NETSTAT -a
All connections and listening ports
Root Directory Region
Area for the root directory. Usually follows FAT region. FAT12, FAT16 root directory not part of data region. FAT32 root directory is within data region (but normally starts in cluster 2).
Data Region
Area where files and directories are actually stored. Area organized in clusters.
escalate
Assigning a problem to someone higher in the support chain of an organization. This action is normally recorded in call tracking software.
ADSL
Asynchronous DSL. Always has higher downstream speeds than upstream. It supports an existing phone line, as a user installation option; typical downstream speeds of 384Kbps-24Mbps; typical upstream speeds of 128Kbps-3.3Mbps.
Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? Get scope registered Authorized the server Get clients registered Get DNS IP registered
Authorized the server
You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals
B: Web Server D: Wi-Fi network
In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? Blue, Orange, Green, Black Black, Orange, Green, Brown Blue, Orange, Green, Brown Brown, Orange, Green, Black
BOGB Blue Orange Green Brown
Which of these is an application layer protocol? A. TCP B. FTP C. IP D. UDP
B. FTP BGP-DHCP- DNS- FTP- HTTP- IMAP- LDAP- MGCP- NNTP- NTP- POP- RTP- RTSP- RIP- SIP SMTP- SNMP- SSH- Telnet- TLS/SSL
Which of the following are features of DHCP? (Choose two.) A. IP address resolution to canonical names B. Secure shell connections C. Address reservation D. Network file transfer E. IP address exclusion
C. Address reservation E. IP address exclusion
You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6
CAT 5e The Cat 5e standard provides performance of up to 100 MHz and can be used up to a maximum length of 100 meters It was made to support 1000 Mbps
Setting up network share in XP using default simple file-sharing option
Check "share this folder on the network" to enable sharing. You must name the shared resource under "share name." Check "allow network users to change my files" to enable full read/write access.
format
Command line tool for creating a volume (usually in a partition). Establishes a file system. O.S. has defaults (for differing media) FAT12, FAT16, FAT32, exFAT (in this course), NTFS Cluster size (No. of sectors per cluster) May also be done from Windows Explorer
nslookup
Command-line program in Windows used to determine exactly what information the DNS server is providing about a specific host name.
Windows Powershell
Command-line tool included with Windows 7 and available for earlier versions from Microsoft. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.
ipconfig
Command-line utility for Windows servers and workstations that displays the current TCP/IP configuration of the machine. Similar to winipcfg and ifconfig Important Options: /all /release /renew /flushdns
tracert
Command-line utility used to follow the path a packet takes between two hosts.
sfc (System File Checker)
Command-prompt program (sfc.exe) that scans, detects, and restores Windows system files, folders and paths.
Half duplex
Communication between two devices whereby transmission takes place in only one direction at a time.
Full duplex
Communication that happens in two directions at the same time.
One of the computers on your network cannot connect to the network. You have reason to suspect the twisted pair cable. What tool should you used to test for problems with the cable?
Community tester.
NETSTAT -p [protocol]
Connections for the protocol specified in place of [protocol] in the command syntax. The value of the [protocol] variable may be TCP, UDP, TCPv6 or UDPv6.
Loopback plug
Connects directly to RJ-45 port on PC's network adapter. Simulates network & tests whether network adapter & TCP/IP are functioning properly.
If an 802.llg Internet connection has connectivity problems, what may be the cause? A. A cordless phone B. A cellular phone C. Incandescent lights D. Electromagnetic interference (EMI)
D. Electromagnetic interference (EMI) The 802.11g specification is a standard for (WLANs) that offers transmission over relatively short distances at up to 54(Mbps), 2.4 GHz
In a physical star topology, the central device is referred to as a: A. Bridge B. Server C. segmenter D. Hub
D. Hub In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.
Mac Flooding
Description: An attacker can overflow the switches with fake MAC address forcing it to act like a hub, sending packets to all devices Security Defense: Use a Switch that can close ports with too many MAC Address
Type of attack: Network tap
Description: A network tap is connected to the network to intercept frames. Security defense: Keep network connections secure by restricting physical access.
Type of attack: Port mirroring
Description: An attacker connects his device to the switch's mirror port Security defense: Secure the switch in a locked room.
Type of attack: MAC address impersonation
Description: If two devices have the same MAC address, a switch may send frames to each device. An attacker can change the MAC address on her device to match the target device's MAC address. Security defense: Configure the switch so that only one port can be assigned per MAC address
Type of attack: ARP poisoning
Description: The attacker sends a forged ARP packet to the source device, substituting the attacker's computer MAC address. Security defense: Use an ARP detection appliance
Global groups are used to primarily to?
Define collections of domain objects based on business roles
Layer 1: Physical Layer
Defines the physical network device, and cables. Measurement: Bits
What is Dsrm used for?
Delete a group or any AD object
arp -d
Deletes a single host entry if followed by if_addr. Deletes all host entries if followed by *
DMZ
Demilitarized zone. An area that isn't quite on the Internet, but it's also not a part of your LAN. It's a middle ground that's mostly protected by a firewall, but particular traffic will be let through. It's a good place for web, email, and FTP servers because these are services required by people on the Internet, and this way, if it's configured correctly, external clients cannot connect to the LAN such as if the server was directly in the LAN.
Partitioning
Divides medium into logical volumes, (may also format). At least one partition on device. Logical volumes may reside within partitions. Rarely done by users. Doesn't destroy all disk contents, but may make contents hard to access.
Step 7 of The Network + Troubleshooting Model
Document findings, actions and outcomes.
netstat -n
Does not resolve hostnames. Instead displays addresses and port numbers in numerical form.
Reverse proxy
Does not serve clients but routes incoming requests to correct server Reverse proxy's IP address visible to outside users Internal server's IP address hidden
DIG utility
Domain Internet Groper: Unix/Linux command line tool that can be used to display name server information. Easier to use than nslookup. It is included with the BIN version of DNS and can be downloaded from many UNIX and Linux resource sites on the Internet.
DNS
Domain Name System. The network of servers on the Internet that translates domain names and host names into their matching IP addresses. If you manually configure an IP address, you typically provide the IP addresses of one or more DNS servers as part of the configuration process.
Downstream & Upstream
Downstream = download speed, upstream = upload speed.
Which of the following is a member of the IPsec protocol suite and provides origin authenticity, integrity, and confidentiality protection of packets?
ESP
Security Through Network Design Elements
Elements of a secure network design Demilitarized zones Subnetting Virtual LANs Remote access
EFI
Extensible Firmware Interface (officially UEFI - Unified Extensible Firmware Interface): Intel ("Tiano") developed, since standardized firmware-op. sys. interface. Includes boot services and partition specifications.
Frame Relay is associated with FECN / BECN, what does FECN stand for________________ Frame Elastic Check Notification Forward Explicit Congestion Notification Frame Explict Compression Notification Forward Explict Compression Notification
FECN: Forward Explicit Congestion Notification tells the receiving device that the path is congested so that the upper layer protocols should expect some delay. BECN: backward explicit congestion notification tells the transmitting device that the Frame Relay network is congested and that it should "back off" to allow better throughput.
Which if the below is a valoid MAC for broadcast? FFFF FFFF FFFF EEEE EEEE EEEE ABAB ABAB ABAB ABCD ABCD ABCD
FFFF FFFF FFFF When a device sends a packet to the broadcast MAC address (FF:FF:FF:FF:FF:FF), it is delivered to all stations on the local network. It needs to be used in order for all devices to receive your packet at the datalink layer. For IP, 255.255.255.255 is the broadcast address for local networks.
Port 21
FTP=File Transfer Protocol
___ is a wireless communication problem caused by electromagnetic waves
Fading
T/F You can use CSVDE to import and modify group objects
False -It can be used to create objects, not modify existing objects ( LDIFDE can be used to modify group objects
The IEEE standard 802.3j is used for Thin Coaxial Fiber Optic Thick Coaxial Twisted Pair
Fiber Optic 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic
FTP
File Transfer Protocol. Used by both web broswers & specialized FTP programs to access dedicated file transfer servers. An FTP site has the prefix "ftp://". FTP sites w/ downloads availbable to any user support anonymous FTP; if any credentials are needed, it's usually the user's email as a password with the username preset to be anonymous. Some FTP sites require the user to log in with a username and password. Though you can use the FTP client built into Windows, it's better to download third party software and customize it.
inode table
File size Modification, access, and creation times Permissions Ownership
superblock
File system type (e.g., ext2 and ext3) Size (e.g., 10GB and 360GB) Status
FAT File System
File system which uses a FAT to keep track of clusters' allocation and the linking of clusters for a file.
Wireless Connection Issues
Interference Incorrect encryption levels Channel congestion Incorrect frequency SSID mismatches Standard mismatches Distance Bounce Incorrect antenna placement Configuration Incompatibilities Incorrect channel Latency Incorrect switch placement
Inbound—block all. Outbound—permit all
Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?
Volume Boot Record (VBR) Boot Sector
First sector of a primary or secondary FAT file system partition which contains information about the file system and possibly boot code. A floppy disk only has a VBR (no MBR). First sector of volumes with other file systems also have file system information.
Master Boot Record (MBR):
First sector on hard disk, zip disk, flash drive contains MBR. 446 bytes: Boot code
802.11n
Frequency of 2.4GHz (standard) or 5GHz (optional). Max speed of 600Mbps, though the typical cap is 300Mbps. Works with 802.11b and 802.11g; if operating at 5GHz, works with 802.11a as well.
802.11b
Frequency of 2.4GHz, max speed of 11Mbps, works with 802.11g.
802.11g
Frequency of 2.4GHz, speed of 54Mbps, works with 802.11b and 802.11n.
802.11a
Frequency of 5GHz, max speed of 54Mbps, requires dual-mode (802.11a/b or 802.11a/g) hardware; works with 802.11n networks with 5GHz frequency.
In Windows to configure VPN which options do you need to go to? CLI command -> start vpn Control Panel VPN From Administrative Tools Routing and Remote Access None of the above
From Administrative Tools Routing and Remote Access
You need to connect a network adapter to a switch. You need the connection to be able to send and receive data at the same time. What type of connection should you use?
Full duplex
GPT
GUID* Partition Table. Can replace the partition table of the MBR when EFI is utilized. Suitable for larger partitions (over 2 TB). * Globally Unique IDentifier MBR is present at sector 0. Partition code of 0xEE in MBR partition table entry indicates GPT. GPT follows MBR. * Globally Unique IDentifier
SA - Security Association
Generates the encryption and authentication keys that are used by IPsec
Network Class C
IPv4 address class with address range of first octet between 192 and 223; provides a large number of unique networks and a small number of unique hosts per network
Network Class A
IPv4 address class with first octet ranging between 1 and 126; provides small number of unique networks and a large number of unique hosts per network
Global Unicast Address
IPv6 addresses that start with 2000:: /3
The three main types of IPv6 addresses are _________________ Unicast Anycast Multicast Broadcast
IPv6 has three types of addresses, which can be categorized by type and scope: Unicast addresses. A packet is delivered to one interface. Multicast addresses. A packet is delivered to multiple interfaces. Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of routing distance).
IPv6 tunneling
IPv6 packets can be encapsulated inside IPv4 datagrams
connection-oriented protocol
In networking, a TCP/IP protocol that confirms a good connection has been made before transmitting data to the other end, verifies data was received, and resends it if it is not.
Proxy server advantages:
Increased speed (requests served from the cache) Reduced costs (cache reduces bandwidth required) Improved management - Block specific Web pages or sites Stronger security: Intercept malware Hide client system's IP address from the open Internet
IrDA protocol
Infrared Data Association protocol. Allows for short-range, low-speed, line-of-sight infrared networks. Some laptops have an integrated IrDA port, and sometimes printers have a port so you can connect using infrared.
ISDN
Integrated Services Digital Network. Developed to provide an all-digital method for connecting multiple phone devices to a single line to provide faster access.
An example of a physical _____ topology would be hubs connected to s single switch.
Star
Sidebar Settings
Start > All Programs > Accessories > Windows Sidebar
Startup File Maintenance
Start > All Programs > Startup -drag apps into group and they will autorun at startup
change UAC Configuration
Start > Control Panel > Administrative Tools > Local Security Policy
Index Settings
Start > Control Panel > Indexing Options
Static vs. server-assigned IP address
Static IP: unique value for each computer. Server-assigned: automatically assigned by DHCP server.
Secondary Storage
Storage for data and program instructions using magnetic devices (disk, tape), optical devices (CD) or electronic devices (solid state drives, flash drive, memory card).
Classless Inter-domain Routing requires which one of the following:
Subnet mask
Category 5 cabling
Supports 10BASE-T and 100BASE-T networking. Supports up to 100Mbps. Uses UTP and STP, four wire pairs.
Category 7 cabling
Supports 10BASE-T, 100BASE-T and 1000BASE-T networking. Supports up to 1000Mbps. Uses 12-connector GG45 connector (backwards compat. w/ RJ-45), uses UTP and STP.
Category 5e cabling
Supports 10BASE-T, 100BASE-T, and 1000BASE-T networking. Supports up to 1000Mbps (1000BASE-T). Enhanced version of Cat5, uses UTP and STP, four wire pairs.
Category 6 cabling
Supports 10BASE-T, 100BASE-T, and 1000BASE-T networking. Supports up to 1000Mbps. Handles higher frequencies than Cat5/5e, uses UTP and STP.
Category 3 cabling
Supports 10BASE-t and Ethernet networking. Supports up to 10Mbps. Uses UTP, is obsolete, four wire pairs.
Category 4 cabling
Supports token ring networking. Supports up to 16Mbps. Uses STP, one wire pair.
Which is an industry-standard transport layer protocol enabled on most routers today?
TCP/IP
TRUE/FALSE: SSIDs are case sensitive.
TRUE
Load Balancing
Technology to help evenly distribute work across network. Allocate requests among multiple devices. Load balancing achieved through software or hardware device
You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this information?
Terminal Services is running
IMAP
Internet Message Access Protocol. An email protocol that enables messages to remain on the email server so they can be retrieved from any location.
IPv4
Internet Protocol version 4, is the most frequently used communications protocol and resides on the network layer of the OSI model, IP addresses consist of 4 numbers each between 0-255.
Internet Content Filters
Internet content filters - Monitor Internet traffic and block access to preselected Web sites and files Unapproved sites can be restricted based on: Uniform Resource Locator (URL filtering) Searching for and matching keywords such as sex or hate (content inspection) Looking for malware (malware inspection)
Network Address Translation (NAT)
Internet routers normally drop packet with private address Network address translation (NAT) - Allows private IP addresses to be used on public Internet Replaces private IP address with public address as leaves network and vice versa when returns Port address translation (PAT) - Variation of NAT that outgoing packets given same IP address but different TCP port number
To install IPv6 on your windows computer you need to _____________ LAN connection Properties-> Check IPv6 using CLI : enable ipv6 From Web Browser Properties using CLI: ipv6 enable
LAN connection Properties-> Check IPv6
What type of communication is defined at the physical and data link layers of the OSI model?
LAN protcols
Which print services roles enable UNIX clients running the LPR program to send their print jobs to windows printers?
LPD Service
Internet
Largest public network that supports the world wide web, email, gaming, etc.
mmc
Launches an extensible common presentation service for management applications.
Virtual Lan (VLAN)
Layer 2 switching allows VLAN to be implemented to segment the network,reduce collisions, organize the network, boost performance, and hopefully, increase security.
Virtual LAN (VLAN)
Layer 2 switching that allows for segmenting/organizing of networks.
A _____ switch uses logical addressing to determine data paths.
Layer 3
Difference between layer 2 & 3
Layer 3 switches forward packets like a router, used in busy environments, and layer 2 switches forward frames like an advanced bridge.
TCP maps to which layer of the OSI Model
Layer 4
What Layer are Ports apart of?
Layer 4 - Transport Layer 0-65535
L2TP uses port ________________ 443 500 89 1723
Layer Two Tunneling Protocol (L2TP) uses TCP port 1701 and is an extension of the Point-to-Point Tunneling Protocol. L2TP is often used with IPSec to establish a Virtual Private Network (VPN). Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP port 47 Generic Routing Encapsulation (GRE)
Little-endian
Least significant bytes first Stored: 12 34 (two bytes) Interpreted: 34 12 Hex Value: 0x34 12 Stored: 56 78 9A BC (four bytes) Interpreted: BC 9A 78 56 Hex: 0x BC 9A 78 56 PCs (WINTEL) use little endian for integers (which may represent other data, e.g., Unicode).
Little Endian
Least significant bytes occur first. E.g. Two bytes Stored: 12 34 → Value: 0x34 12 Four bytes Stored: 56 78 9A BC → Value: 0xBC 9A 78 56 WINTEL machines use little endian.
LDAP
Lightweight Directory Access Protocol. Used to access and maintain distributed directory information services, like email and Microsoft Active Directory.
Types of LED Indicators
Link Indicators - indicate signal reception from the network. Activity - Flickers when data packets are received or sent. Speed - whether the adapter is operating at 10Mbps, 100Mbps or at 1Gbps. Dual color - Indicate different network states.
You are troubleshooting a server that needs to connect directly to the Internet. After you run an ipconfig/all, you discover the problem. The server has been auto assigned the IPv6 address fe80::260:8ff:fec0:984. The server won't connect to the Internet because this is a _____ address.
Link Local
nbtstat -S
Lists NetBIOS connections and their state with destination IP addresses.
nbtstat -s
Lists NetBIOS connections and their state, converting destination IP addresses to computer NetBIOS names.
nbtstat -n
Lists local NetBIOS names.
nbtstat -r
Lists the NetBIOS names resolved by broadcast and via WINS.
nbtstat -n
Lists the local NetBIOS name table along with the service code, type and status.
nbtstat -A <IP address>
Lists the remote machine's name table given its IP address
nbtstat -a <device name>
Lists the remote machine's name table given its name
LAN
Local Area Network. Two or more computers connected together in the same office.
defrag
Locates and consolidates fragmented files on local volumes to improve system performance. Only to be used on platter-based hard drives. Do not use on SSD!
chkdsk /r
Locates bad sectors and recovers readable information Implies /f
Logon/Logoff
Logon/Logoff events track attempts to log on to a computer interactively or over a network. These events are particularly useful for tracking user activity and identifying potential attacks on network resources.
Switch
Looks like a hub, but each port works independently, allowing for more than one concurrent session. The computer sending information identifies the MAC address of the specific computer it wants to send info to, and sends it only to them.
I/O Input/Output
Means of transferring data between user & machine.
Qualification tester
Measure the speeds at which a network can transmit data. Used to troubleshoot a network but not to test networks. It tests the continuity of UTP/STP cables and verifies the adherence to 10BASE-T, 100BASE-T, TIA568A, TIA-568B and Token ring wiring standards. Verifies ring wiring standards and shield integrity.
Voltmeters
Measures voltage and resistance b/t two points in a circuit.
The physical environment through which data travels as it moves from one computing device to another is called:
Media
In a ____ top logy, Every single computer is connected to every other computer on the network.
Mesh
In a ____ topology, every single computer is connected to every other computer on the network.
Mesh
Network Firewall Filtering
Methods of firewall packet filtering: Stateless packet filtering - Inspects incoming packet and permits or denies based on conditions set by administrator Stateful packet filtering - Keeps record of state of connection and makes decisions based on connection and conditions
MAN
Metropolitan/Municipal Area Network. When two different networks in two different offices in the same city want to connect. Similar to a WAN, but on a smaller scale. Still need a telecoms company to provide a high-speed connection.
The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. WINS DHCP Network Address Translation FTP
Network Address Translation It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.
Network Access Control (NAC)
Network access control (NAC) - Examines current state of system or network device before allowing network connection Device must meet set of criteria If not met, NAC allows connection to quarantine network until deficiencies corrected
Privilege Use
Privilege Use events track the use of certain privileges on one or more computers.
Cable testing tool
Test the cable's functionality. The best option is a proper network cable tester. It'll have a LAN testing unit that you can plug into a port on the patch panel and a terminator you plug in on the other end in the RJ-45 wall jack. Tests each individual wire to make sure it's wired up correctly.
Step 3 of The Network + Troubleshooting Model
Test the theory to determine cause: Determine next step to resolve the problem
Network cable certifier
Test transmission speed and performance
LAN tester
Test transmission speed, cable skew, cable propagation delay, cable typing (CAT3, 5,5e,6), attenuation, and cable verification. Carries out a cable conduction test and a miswiring detection test.
Patch tester
Tests patch cables. Has 2 RJ-45 jacks, plug either end of the cable in, tests each wire to make sure they're all properly wired up.
Command Prompt
Text prompt for entering commands.
Which of these protocols is not a Network Layer Protocol? IP ICMP HTTP ARP
The Hypertext Transfer Protocol is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Standard port: 80
When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?
No, this is the system's recovery partition.
To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect your user's data files. Will this configuration adequately protect your system in the even of a hard disk failure?
No, you need to create an image of your Windows system as well.
Repackage the software for Windows Installer.
Not all software on the market provides .msi support. What is your best option to use Windows Installer to assign and publish the software?
NetWare
Novell's network OS designed for client/server networks
FATs
Number of the first cluster used to store a file (or directory) is in the directory entry for the file. The entry in the FAT for a cluster used to store a file contains either the number of next cluster or an end of file marker.
TRIM Command
O. S. command to notify SSD that cluster (or sector) is unallocated, i.e. ready to be erased.
The transmission rate of an Optical Carrier OC-24 is 51.84 Mbps 1.244 Gbps 9.953 Gbps 2.488Gbps
OC Data Rate OC-1 51.84 Mbps OC-3 155.52 Mbps OC-12 622.08 Mbps OC-24 1.244 Gbps OC-48 2.488 Gbps
You have been tasked with installing a routing protocol that monitors the network for router that have changed their link state. Which routing protocol will accomplish this?
OSPF
Which of the below is a Link state routing protocol? Choose the best fit RIP IGRP EIGRP OSPF
OSPF Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system.
Which of the following three protocols use dynamic routing?
OSPF RIP IGRP
Cable stripper
Often part of a wire crimper, allowing the user to strip wires of their protective coating and then use the crimping tool to attach a media connector.
To configure a DHCP server in Windows which of the below is a correct step. On Server Manager Roles Add RolesSelect DHCP Server and Click Next ipconfig /dhcp On control Panel DHCP Server None of the above
On Server Manager Roles Add RolesSelect DHCP Server and Click Next
How do you protect an object from accidental deletion?
On. The Object Tab in the properties box, check 'Protect object from accidental Deletion'
network share
One computer (the client) on the network appears to have a hard drive, such as drive E:, that is actually hard drive space on another host computer (the server). Also see mapping.
Hub
Original connecting device for computers on LAN. Creates a simple shared physical plant that all computers use to send data. Device broadcasts data out to all computers on network, but only the computer that needs it accepts it; the rest drop the information. This means only 2 computers can communicate at a time (the one sending the info and the one receiving it). It's not common anymore.
Cable modem & cable TV installation
PC connects to cable modem either by an RJ-45 cable on both ends, or a USB type A port on the PC and a USB type B port on the cable modem. A coaxial cable plugs into the cable modem and connects to a splitter. A separate coaxial cable on the splitter connects it to the TV's set-top box.
Port 110
POP3=Post Office Protocol Version 3
___ is a connection that uses the public switched analog telephone natwork rather than a dedicated circuit or some other type of private network
POTS
inherited permissions
Permission assigned by Windows that are attained from a parent object.
Proxy
Person who authorized to act as substitute or agent on behalf of another human
PAN
Personal Area Network. Smaller computer network used for communication between smartphones. Add wireless standards like Bluetooth, and you get a wireless PAN (WPAN). No-one is controlling the device or server (ad-hoc, a peer-to-peer/mesh network - no single sever in control.)
Policy Change
Policy change events track changes to important security policies on a local system or network.
Non-interactive mode w/in nslookup utility
Prints only the name and requested details for one host or domain. Useful for a single query.
Windows Boot Manager (BootMgr)
The Windows 7/Vista program that manages the initial startup of Windows. The BootMgr program file is stored in the C:\ root directory and has no file extension.
Ntldr
The Windows XP program responsible for starting Windows XP, called the boot loader program.
gpresult
The Windows command to find out group policies that are currently applied to a system for the computer or user.
xfs
The XFS file system was developed for Silicon Graphics IRIX operating system. An XFS file system is proficient at handling large files, offers smooth data transfers, and provides journaling. It also can reside on a regular disk partition or on a logical volume.
file association
The association between a data file and an application to open the file that is determined by the file extension.
file type (file format)
The characteristic of a file that determines the type of data it contains.
mapping
The client computer creates and saves a shortcut, called a network drive, to a folder or drive shared by a remote computer on the network. The network drive has a drive letter associated with it, which points to the network share.
TIMED_WAIT socket state
The client enters this state after FIN_WAIT_1
FIN_WAIT_2 socket state
The client just received an acknowledgement of its FIN_WAIT_1 from the server.
ESTABLISHED socket state
The client received the server's SYN and the session is established.
RJ-45
RJ stands for "registered jack". RJ-45 has 8 contacts that accept 8 wires, a.k.a. pins. Looks like a bigger version of RJ-11 (used for telephones).
Straight-through
RJ45 cable that is commonly used for network connectivity. Pins 1 and 2 transmit and Pins 3 and 6 receive.
Customer Relationship Management (CRM)
Refers to practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention and driving sales growth.
DMZ (demilitarized zone)
Refers to removing firewall protection from a computer or network within an organization of protected computers and networks.
Layer 2 switch
Resides on the data link layer, most common type of switch used on a LAN. Hardware based and use MAC address, but security is a concern.
ping -a
Resolves address to hostnames
Which of the below is not a process in the DHCP DORA? Discover Offer Response Acknowledge
Response Discovery Offer Request Acknowledgement
hard boot
Restart the computer by turning off the power or by pressing the Reset button. also called a cold boot.
Which protocol is responsible for generating encryption keys used by IPsec?
SA
what is the group pre Windows2000 name?
SAMAccountName attribiute
Types of fiber-optic connectors
SC (square connectors), LC (square connectors, similar to SC), ST (round connectors), and FC (uses a single round connector).
TCP/IP based programs
SMTP and FTP
ping -f
Sets Don't fragment flag in packet (IPv4 only)
Reason organizations need networks
Sharing, Communication, Organization, Money
STP Cabling
Shielded twisted pair. Originally only available in Category 4 (Cat4), which was used by the now outdated IBM Token-Ring Networks. It uses the same RJ-45 connector as a UTP, but includes a metal shield for electrical insulation between wire pairs and the outer jacket. It's durable, but more expensive, and hard to bend into tight spaces. STP cabling is also available in Cat5, Cat5e, and Cat6 for use with Ethernet networks. It's used where electromagnetic interference prevents the use of a UTP cable; STP protects itself against interference with metal shielding and a grounding wire.
TCP/IP
Short for "Transport Control Protocol/Internet Protocol." It's the most common multiplatform protocol used for both Internet access and LANs. It is a suite of protocols used on the Internet to route and transport information.
Bluetooth
Short-range low-speed wireless network designed for peer-to-peer communication between PCs, printers, and handheld devices. (check table of classes & ranges)
Static vs. server-assigned WINS configuration
Static: IP addresses for one or more WINS servers must be entered if enabled. Server-assigned: can use DHCP to resolve WINS if necessary.
Static vs. server-assigned DNS configuration
Static: IP addresses of one or more DNS servers, host name, and domain name have to be entered Server-assigned: Automatically assigned by DHCP server.
NETSTAT -s
Statistics grouped by protocol -IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP and UDPv6
Apply consistent, scalable, and reproducible security settings throughout an enterprise.
What are the key benefits of security templates?
Unrestricted, Disallowed, and Basic User
What are the three default security levels within software restriction policies?
Application, Security, and System
What are the three primary event logs?
User AND Computer
What are the two categories of security settings within Group Policy? Select two answers.
User Accounts control panel and the Local Users and Groups snap-in for MMC
What are the two interfaces available for creating and managing user accounts in Windows Server 2012?
User Accounts control panel and the Local Users and Groups snap-in for MMC
What are the two interfaces for creating and managing local user accounts a computer joined to the domain?
User Account Control (UAC)
What did Microsoft introduce in Windows Server 2012 to ensure users with administrative privileges still operate routine tasks as standard users?
Switch
What do you use to create VLAN?
VLAN
What do you use to isolate a group of computers within your organization?
Network intrusion attempts, such as a denial of service attack
What does a firewall protect your company against?
16,384 KB
What is the default size for each of the three Event logs?
RJ45
What is the most common adapter or connector used to connect a computer to a wired network?
switch
What is the most common central device used today to connect computers to a network?
Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously
What is the most common way to implement software restriction policies?
To permit traffic in and out for legitimate users, and to block the rest
What is the primary objective of a firewall?
Administrators can log successful and failed security events, such as loss of data, account access, and object access.
What is the purpose of the Audit Policy section of a local GPO?
Importing the security template into a GPO
What is the simplest way to deploy a security template on several computers simultaneously?
80
What is the typical incoming port number for a web server?
IP Address
What is used to uniquely identify a host on a TCP/IP network?
Session
What layer in the OSI model is responsible for logging on and off?
Presentation
What layer in the OSI model is used to encrypt data?
Setting up network share in XP when simple file-sharing option is disabled
What makes it different from simple share is: you can comment on the name to give more detail; you can set a max number of users that can see the doc; more specific permissions configuration; and control of caching of offline files to their computers by other users.
CSMA/CA
What mechanism do wireless networks used to access the network?
OSI Reference Model
What model is used to describe how data communication occurs between host?
Distributive Computing
What model promises the most processing power?
Scope
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies?
Protocol and Ports
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the exact type of traffic at the network or transport layer, which the firewall can block or allow?
Action
What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule?
Program
What parameter in the Windows Firewall New Inbound Rule Wizard specifies whether the rule applies to all programs, to one specific program, or to a specific service?
Restricted Groups policy
What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?
1701
What port does L2TP use?
DHCP
What protocol automatically configures IP configuration for a client?
IPSec
What protocol is used with L2TP to provide encryption?
Application Identity
What service does AppLocker require running to function properly?
Windows Installer
What service works with Group Policy to install, upgrade, patch, or remove software applications?
802.3
What standard describes CSMA/CD (collision detection)
VPN
What technology can you use temporarily to connect networks from two different companies?
Stateful
What technology used in firewalls keeps track of connections so that it knows what to allow back into the network?
User Accounts Control Panel
What tool for creating new users is only valid while the Windows Server 2012 computer is part of a workgroup and not joined to an AD DS domain?
Local Users and Groups snap-in
What tool for user creation provides full access to all local user and group accounts on the computer?
Windows Firewall With Advanced Security snap-in for the Microsoft Management console
What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?
Unicast
What type of communication is sent to a single designated host?
Circuit-level gateway
What type of firewall works on the session layer that creates a connection and allows packets to flow between the two host without further checking?
network controller
What type of server does Active Director run on?
DMZ
What zone is used to publish external websites for an organization?
permission propagation
When Windows passes permissions from parent objects to child objects.
DNS client
When Windows queries the DNS server for a name resolution, which means to find an IP address for a computer when the fully qualified domain name is known.
address reservation
When a DHCP server assigns a static IP address to a DHCP client. For example, a network printer might require a static IP address so that computers on the network can find the printer.
measured service
When a cloud computing vendor offers services that are metered for billing purposes or to ensure transparency between vendors and customers.
Start up folder
Windows Vista~ contains a list of programs that open automatically when you boot the computer.
Last Known Good Configuration
Windows, registry settings and device drivers that were in effect when the computer last booted successfully. These settings can be restored during the startup process to recover from errors during the last boot.
Most popular Lan
Wired-computers and other devices are wired together using copper-based twisted-pair cables RJ45 plugs on each end.
WAP
Wireless Access Point. A device that enables connectivity between computers with wireless network adapters to create a wireless network. The WAP is basically a switch, but for wireless connectivity rather than wired networks.
WEP
Wireless Equivalent Privacy. An older wireless network security standard, succeeded by WPA. It prevents unauthorized users from getting into the network, and is only used today if the hardware of a computer isn't compatible with WPA. Without it, if someone knows the SSID, they can join the network. It is encrypted with a WEP Key, which is basically a password with either 10 (64-bit encryption) or 26 (128-bit encryption) alphanumeric characters.
You need to connect three wireless networks together. An 802.11a, and 802.11g, and and 802.11n. Which wireless toll should you use to accomplish this task.
Wireless bridge
Give an example of two Network Analyzers
Wireshark Microsoft Network Monitor.
Which of the below two tools can be used to capture and analyze traffic? Wireshark Kiwi syslog dumpster diving tcpdump
Wireshark/tshark /dumpcap can use tcpdump filter syntax as capture filter. As tcpdump is available on most *NIX system I usually use tcpdump. Depending on the problem I sometimes use tcpdump to capture traffic and write it to a file, and then later use wireshark to analyze it.
TCP/IP Configuration when manual configuration is used
With manual configuration under the general tab of Internet Protocol Properties, you have to manually input the iP address and DNS server addresses. Under IP address, you must input the IP address, subnet mask, and default gateway. Under the DNS server addresses, you must input the preferred DNS server and the alternate DNS server.
Traceroute Utility
You can use it to determine where the communication fails. Issue the cmd from the local machine to see how far the trace gets before you receive an error message. Using the IP address of the last successful connection you will know where to begin troubleshooting the problem.
You can disable the setting area that is not configured for faster processing.
You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?
network documentation
You have a key network administrator leave a company. Therefore what does the company depend on to continue to use the network?
You use a laptop and tablet that sync with your OneDrive repository. You were working late one night, and you decided to do a little cleanup of your files. A few days later, you realized that you deleted a couple of reports that were in your sync folder for OneDrive. Describe how to recover those files.
You need to log on to the OneDrive website and access the Recycle Bin. The files will be kept in the Recycle Bin for 30 days. You can then review the documents and select which ones to restore.
In which of the following situations would restoring from a system image be the best option?
You need to restore a Windows system after a catastrophic hard drive failure.
Connecting a LAN network to the Internet
You need two things: an Internet access device, and a router. The Internet access device uses a broadband connection to connect to the Internet (i.e. cable, DSL phone line, etc.). A router is then connected to the Internet access device, and it routes data requests from each PC in order to give the correct data back to the PC that requested it.
Given that you are using a Windows 10 system, in which of the following situations would reverting to a System Restore point be the best option?
You recently installed a new application and now the system behaves erratically.
file system
The hierarchy of folders and files an operating system uses to organize files.
Network topology
The physical arrangement of computers in a network.
NETSTAT -r
The routing table
ext2
The second extended file system supports Access Control Lists to control individual permissions, but it does not support journaling.
LAST_ACK socket state
The server is in this state when it sends its own FIN.
LISTEN socket state
The server is ready to accept a connection
SYN_RECEIVED socket state
The server just received the synchronize flag set (SYN) from the client
CLOSED socket state
The server received an acknowledgement (ACK) from the client and the connection is closed.
Group policy
a collection of settings (policies) stored in Active Directory on a Windows network.
bcdedit
a command used to manually edit the BCD (Boot Configuration File)
bootsect
a command used to repair a dual boot system.
bootrec
a command used to repair the BCD (Boot Configuration Data) and boot sectors.
Stand-alone operating systems
a complete OS that works on a desktop computer, notebook, or mobile device. Some are client operating systems bc they work in conjunction with a network OS
client machine
a computer that is normally used by a company's end users
VPN - Virtual private network
a connection between two or more computers or devices that are not on the same private network.
router
a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another
system repair disc
a disc you can create using Windows 7 that can be used to launch Windows RE. (Windows Recovery Environment)
name resolution
a fully qualified domain name must be associated with an IP address before this computer can be found. This process of associating a character-based name with an IP address is called
object
a general term for a virtual thing in computing, such as user accounts, group accounts, folders, etc.
Ethernet
a group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices.
Network Interface Card (NIC)
a hardware component used to connect computers or other devices to the network to allow machines to communicate with each other
Media Center PC
a home entertainment personal computer that includes mid to high end processor, larger capacity hard disk, CD and DVD drives, remote control and advanced graphics and audio capabilities.
Windows Recovery Environment (Windows RE)
a lean operating system installed on the Windows 7/Vista setup DVD and also on a Windows 7 hard drive that can be used to troubleshoot problems when Windows refuses to start.
link (local link)
a local area network (LAN) or wide area network (WAN) bound by routers
domain
a logical grouping of objects into a distributed database within an organization
server
a machine that users connect to so they can access resources located on that machine
dual stack implementation
a means of transitioning to IPv6 that simply has both IPv4 and IPv6 installed
Teredo
a mechanism for transitioning to IPv6 that allows users behind a NAT to access the IPv6 address space by tunneling IPv6 packets
6to4
a mechanism to transition to IPv4 which treats the IPv4 address space as a logical link layer and creates a point-to-point connection
L2TP
a more secure VPN that is gaining in popular due to the inclusion of IPsec
local area network (LAN)
a network bound by routers or other gateway devices
Open System Interconnection (OSI) model
a network model in which communications are divided into seven layers; each layer performs a specific task or tasks and builds upon the preceding layer until the communications are complete
hexadecimal
a notation used with IPv6 to represent 8 bits using the values 0 to 9 and A to F
intranet
a private computer network or single Web site that an organization implements in order to share data with employees around the world.
If the error count is high, it could be....
a problem with the card, or could indicate generally high network traffic.
Spyware
a program placed on a computer without the users knowledge that secretly collects info about the user often enters when a user installs a new program
Search utility
a program that attempts to locate a file on your computer based on criteria you specify.
Application
a program that runs "on top" of the operating system or from a server, and helps a user perform a specific task, such as word processing, appointment scheduling, or accounting. Some applications are included with Windows—such as Notepad for simple text editing or Internet Explorer for browsing the Web.
driver
a program that tells operating system how to communicate with a device
trust
a relationship between a parent and child domain that allows users to be granted access to resources in the larger domain
soft boot
To restart a PC without turning off the power, for example, in Windows 7, by clicking Start, pointing to Shut down, and clicking Restart. also called warm boot.
Voltage Event Recorders
Tool used in conjunction with or in addition to a voltmeter to test and verify that the electrical signals transmitting through the network cables are within the required specifications.
phishing
a scam in which a perpetrator attempts to obtain your personal and/or financial info. Phishing filters warn or blocks you from potentially fraudulent websites
buffer
a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
Layer 6: Presentation
Translates data format from sender to receiver in the OS Data compression and encryption operate on this layer
Layer 3: Network
Translates logical addresses to physical addresses. Routers/IP switches operate at this layer IP addresses & subnets are Network Layer components Measurement: packets
POST (power-on self test)
a self-diagnostic program used to perform a simple test of the CPU, RaM, and various I/O devices. The POST is performed by startup BIOS when the computer is first turned on, and is stored in ROM-BIOS.
DHCP server
a server running a service to automatically assign TCP/IP information to your computers
domain controller
a server that contains a copy of the Active Directory database
DNS server
a server that has a service running on it to resolve hostnames to TCP/IP addresses (forward lookup) and vice versa (reverse lookup)
standalone server
a server that is not a member of a domain; may be used for virtualization
member server
a server that is part of domain-based network, but which does not contain a copy of the Active Directory
Network Discovery
a setting that determines whether your Windows 10 system can locate other computers and devices on the network and if other computers on the network can see your computer
DMZ or perimeter network
a small network that is set up separately from a company's private LAN and the Internet, allows users outside a company LAN to access specific services located on the DMZ
printer driver
a small software program that prepares application data to print to a specific printer
NetBIOS
a software specification used for identifying computer resources by name as opposed to IP address
multicast address
a special IPv4 address that one or more devices will listen for by joining this type of group; first octet will be between 224 and 239
Folder
a specific named location on a storage medium that contains related documents
Long Term Evolution (LTE)
a standard for wireless communication of high-speed data for mobile phones and data terminals
PAT - Port address translation
a subset of NAT which translates both IP address and port numbers
TCP/IP
a suite of protocols that had evolved into the industry standard for network, internetwork, and Internet connectivity
NAT (Network Address Translation)
a technique designed to conserve the number of public IP addresses needed by a network
netsh
a tool that administrators can use to configure and monitor Windows computers from the command prompt.
TCP
Transmission Control Protocol. TCP sessions are known as connection-oriented sessions. Basically, it constantly checks that every data packet sent from one computer to another. If the receiving computer never receives the data packet, this protocol tells the sending computer to send it again. (check table)
Fiber-optic cabling
Transmits signals with light instead of electricity - no interference. Two types: single mode (thin core between 8-10 microns, carries single ray of light long distances) and multi mode (thicker core of 62.5 microns, carries multiple rays shorter distances).
TLS
Transport Layer Security. The successor to SSL.
Gateways
Web security gateway - Can block malicious content in real time Enable higher level of defense by examining content through application-level filtering Examples of blocked web traffic: ActiveX objects Adware, spyware Peer to peer file sharing Script exploits TCP/IP malicious code attacks
Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security
What GPO node presents the interface with which to configure Windows Firewall properties?
classful network architecture
What IPv4 classification system is known as class A,B,C,D,E
Windows 7 and Windows Server 2008 R2 or later
What Windows versions support the use of AppLocker polices, which poses a disadvantage compared to using software restriction policies?
Guest
What account is created during Windows Server 2012 installation with the account disabled by default?
Proxy Server
What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?
110 Block Type of punch down block
aka Cable Termination block used for structured wiring systems. Supports higher bandwidth than 66 block and is suitable for use in data applications.
Butt set
aka Lineman's test set: A special type of telephone handset used by telecom technicians when installing and testing local lines.
Cable Tester
aka Media Tester: An electrical instrument that verifies if a signal is transmitted by a cable.
Perimeter network
aka as demilitarized zone DMZ-Small network that is set up separately from a company's private LAN and the internet.
Network Analyzers
aka packet or protocol analyzer or packet sniffer: a software or hardware tool that integrates diagnostic and reporting capabilities to provide a comprehensive view of an organizations network.
Stateless packet inspection SPI
aka pure packet filter, does not retain memory of packets that have passed through the firewall, more vulnerable to spoofing attacks
Tone Locator
aka tone probe: a device that emits an audible tone when it detects a signal in a pair of wires.
Multimeters
aka volt/ohm meter: An electronic measuring instrument that takes electrical measurements such as voltage, current and resistance. Can be analog (AMM) or digital (DVOM)
Mac OS X
available only for computers manufactured by apple, macintosh operating system has been model for most GUI's
You must also install the blank when installing the internet printing role service
both a and b
netsh
built in command line scripting utility that enables you to display and modify the network configurations of the local computer.
network location
collection of security settings that's appropriate for the type of network a user wants to connect to; Windows 7 offers three broad categories of these: Home, Work, and Public
ipconfig
command can be used to show the IP addresses assigned to all network connections
ipconfig
command displays information pertaining to your network adapter, namely TCP/IP configurations.
arp -a
command prompt that will show IP addresses and corresponding MAC addresses of remote computers.
ipconfig/release
command releases any IP configurations received from DHCP server
X.25
communications protocol was one of the first implementations of packet switching.
CTI-based server
company's telephone system meets its computer system, PBXs, and VOIP
diagnostic utility
compiles technical information about hardware and some software, prepares report outlining problems. Windows Vista~ Problem Reports and Solutions
stateless configuration
configuration that is a newer option with IPv6; means that the clients create their own IP information based on information from the router
stateful configuration
configuration that is currently used with IPv4 and is an option for IPv6; means that the DHCP is going to give clients on the network all of their TCP/IP data
infrastructure mode connection
connecting to a network through a wireless access point or router
ad hoc connection
connecting two PC's together directly rather than through an access point or router
UDP (User Datagram Protocol)
connectionless TCP/IP protocol that works at the OSI Transport layer and does not require a connection to send a packet or guarantee that the packet arrives at its destination. The protocol is commonly used for broadcasting to multiple nodes on a network or the Internet
multiuser operating system
enables two or more users to run programs simultaneously. Networks, servers, mainframes, and supercomputers allow thousands of users to connect at the same time.
defragmenting
eorganizes files and unused space on hard disk so that programs run faster
Layer 2 - Data Link Layer
establishes, maintains, and decides how transfer is accomplished over the physical layer. Think-MAC address UOM= Frames
Mesh topology
every computer connects to every other computer; no central connecting device is needed
extranet
extended to users outside a company and possible to entire organizations tat are separate from or lateral to the company
Windows XP
fast, reliable windows operating system, available in five editions
you must add the blank role to use a WINDOWS server 2008 computer as a fax server.
fax server
Global routing prefix
first three groups of numbers and it defines the network of the address
Embedded operating system
found on most smart phones and small devices, resides on a ROM chip.
folder permissions
full control modify - read& execute list folder contents read write
file permissions
full control modify read & execute read write
by defualt what topology do replication groups use?
full mesh
what are the ways you can change group scopes?
global to universal, domain local to universal, universal to global, universal to domain local
to whom should always assign security permissions?
groups
Arp Options
inet_addr eth_addr if_addr -a -g -N if_addr -d -s inet_addr eth_addr
header
information at the beginning of an IP packet which contains information about IP version, source IP address, destination IP address, etc.
Packet filtering
inspects each packet that passes through the firewall and accepts or rejects it based on a set of rules.
Back-to-back configuration
involves DMZ situated between two firewall devices, which could be black box appliances or Microsoft Internet Security.
ntfs explicit move to same nfts partition
keeps explicit permission plus will inherit permissions assigned to parent volume or folder
Stateful packet inspection
keeps track of the state of network connections by examining the header in each packet, is able to distinguish between legitimate and illegitimate packets.
Upper layers of OSI model
layers 4-7, transport, session, presentation, and application, deals with protocols, compression, encryption, and session creation.
OSPF - Open Shortest Path First
link-state protocol that monitors the network for routers that have a change in their link state,meaning they were turned off, on and restarted, used in large networks
name the group scopes
local, Domain Local, Global and Universial
the simplest print architecture consists of one print device that is connected to one computer. this print devices si also know as a ?
locally attached print device
LED Indicators
located on network adapters, switches, routers, and cable and DSL modems can give you information about the status of the network connection.
workgroup
logical grouping of networked computers that can "see" each other on a network
Library
looks like an ordinary folder, but it is a virtual folder that simply points to files and folders in different locations on a hard disk, network drive, or external drive.
ntfs copy or move to fat 32
loose permission settings
Peer-to-Peer (P2P)
means each computer has an equal ability to serve data and to access data, just like any other computer on the network.
memory resident
means it remains in memory while the computer is running. The kernel is memory resident.
synchronous
means that there is a clocking circuit that controls the timing of communications between the different routers.
mapping a drive
method of creating a logical drive letter that allows easy access to a shared folder or drive on a computer
PPTP - Point-to-point tunneling protocol
more common VPN (virtual private network) but is a less secure option.
special permissions
more granular
Star topology
most common topology, each computer is individually wired to a central connecting device with twisted-pair cabling.
Straight through cable
most common type of patch cable, used to connect a computer to the central connecting device like a switch, usually a 568B on each end.
host name (computer name)
name of a computer (ex. www)
Which server is responsible for maintaining the list of DFS shared folders and responding to user request of those folders>
namespace server.
Which of the below command will help remove IP address from CLI? ipconfig removeIP netdom netsh
netdom Netdom is a command-line tool that is built into Windows Server 2008 and Windows Server 2008 R2.
File manager
performs functions related to file management. Windows Vista includes Document Explorer, Pictures Explorer, and Music Explorer.
PVCs are associated with Frame Relay, what does PVC stand for _________________________ Permanent Virtual Circuit Permanent Virtual Class Preferable Volunteer Circuit Passive Virtual Circuit
permanent virtual circuit (PVC) is a connection that is permanently established between two or more nodes in frame relay and asynchronous transfer mode (ATM) based networks. It enables the creation of a logical connection on top of a physical connection between nodes that communicate frequently or continuously.
effective permissions
permissions for an object, such as a folder, granted to a user or group based on the permissions granted through group membership and any permissions inherited from the parent object; Windows does not include share permissions as part of these
standard permissions
permissions grouped together for easy assignment
NTFS permissions
permissions that apply to users who log on locally or from across a network; these are set using the options on the Security tab in the Properties dialog box
explicit permission
permissions that are set by default when the object is created, or by user action.
Layer 1 - Physical layer
physical and electrical medium for data transfer, includes but is not limited to cables, jacks, patch pannels, punch blocks, hubs, and MAUs. UOM=Bits
Linux
popular,free,multitasking UNIX-type operating system. it is open source software- its code is provided for use, modification, and redistribution.
Nmap
port scanner, to scan for open ports on a computer
Virus
potentially damaging computer program, affects computer without user's knowledge. Programmer of the virus called virus author Malware
The most common use of a file screen is to
prevent users from storing unauthorized file types on the server
Firewalls
primarily used to protect a network from malicious attacks and unwanted intrusions
what hardware actually produces hard-copy documents on paper or other print media?
print device
BLANK is the only role service that is required when you add the Print services role?
print server
Which print service role installs the print managment console for (MMC) that enables administrators to deploy, monitor and manage printers throughout the enterprise?
print server
A computer communicates with a print device through which software interface?
printer
What converts the print jobs generated by applications into an appropriate string of commands for a specific print device/?
printer spooler
Propriety software
privately owned and limited to a specific vendor or computer model.
what is the first step in designing a file sharing stratdgey
projecting anticipated storage needs and percuring the correct server hardware and disk arrays to meet your needs
IGRP - Interior Gateway Routing Protocol
proprietary protocol used in large networks to overcome the limitations of RIP
Encryption
protects the contents of files and folders from unauthorized access.
IPsec - Internet Protocol Security
protocol within the TCP/IP suite tat encrypts and authenticates IP packets.
AH - Authentication Header
provides connectionless integrity and the authentication of data
ESP - Encapsulating security payload
provides connectionless integrity and the authentication of data but also confidentiality when sending data
Windows server system
provides developers with dynamic development tools that allow businesses and customers to connect via the internet
Web filtering software
restricts access to certain material o the web
restore program
reverses the process and returns backed up files to their original form
mke2fs -b
specifies the block size of the file system in Bytes (valid sizes are 1024, 2048 and 4096 bytes per block)
mkfs -b
specify block size (1024, 2048, 94 4096)
mke2fs -t
specify the file system type (i.e., ext2, ext3, ext4, etc.) that is to be created
File server
stores files for computers to share
child domain
subdomain of another domain
Live CD, Live USB
the CD or USB flashdrive is bootable.
3-leg perimeter configuration
the DMZ is usually attached to a seperate connection of the company firewall- 1 to company LAN -1 to the DMZ -1 to the Internet.
virtual memory
the OS allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. Slower than RAM
Plug and Play
the OS automatically configures new devices as you install them.
foreground
the active program, the one you are currently using.
Be aware of the categories of the 53 new auditing policy settings
• Account Logon • Account Management • Detailed Tracking • DS Access • Logon/Logoff • Object Access • Policy Change • Privilege Use • System • Global Object Access Auditing
Detailed Tracking, be aware of the following
• Process Creation- audits events generated when a process is created or starts. The name of the application or user that created the process is also audited. • Process Termination- audits events generated when a process ends. • DPAPI Activity- audits events generated when encryption or decryption request are amde to the Data Protection Application Interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. • RPC Events- audits inbound Remote Procedure Call (RPC) connections.
page
the amount of data and program instructions that can swap at a given time. The technique of swapping items between memory and storage is called paging- a time consuming process.
Swap file
the area of the hard disk that is used for virtual memory; swaps data, info, and instructions between memory and storage.
Communications subnetwork
the guts of OSI model transmission, consisting of layers 1 thru 3. Physical, data, network
unicast address
the type of IPv4 address that identifies a computer or device on a network; divided into network portion and host portion
A collection of setting in a quota template defines all of the following accept>
the user credentials under FSRM operates
Wireless access point (WAP)
this device acts as a router, firewall, and IP proxy, allows connectivity of various wireless devices such as laptops, PDAs, and tablets.
subnet mask
this identifies which part of an IP address is the network portion and which part is the host portion.
inherit
to method of gaining permissions in a file system; a folder with subfolders is considered the parent folder; the subfolders are considered child folders; after permissions are set on a parent folder, new files and subfolders that are created in the folder inherit these permissions
Uninstall application
to remove an application from your computer or network.
File Conversion utility
transforms the contents of a file or data from one format to another.
cold boot
turing on computer that has been powered off
swapon
turns on swap partition
Local Area Network (LAN)
two or more computers that exchange data, confined to a small geographic area usually one building.
Neighbors
two or more nodes on the same link
broadcast address
type of IPv4 address that is read by all hosts that hear it; since it won't go across a router, will be heard by only local devices; 255.255.255.255
Automatic Private IP Addressing (APIPA)
type of private range that was developed by Microsoft for use on small peer-to-peer Windows networks. Uses class B, auto assigns IP addresses.
Fiber Optic cable
used in longer distance runs, high data rate transfer, transmits light instead of electricity over glass or plastic.
Crossover cable
used to connect like devices to each other, computer to computer, or switch to switch. 568B on one side and 568A on the other
Wireless repeater
used to extend the coverage of a wireless network extends the signal out further, usually placed on the perimeter of the wireless network
subnet mask
used to specify which portion of the unicast IPv4 address defines the network value and which portion defines the unique host value; can be shown either as a dotted decimal (255.255.255.0) or as a slash notation (/24)
telnet
used to take control of a remote computer.
NSlookup Utility
used to test and troubleshoot domain name servers. it has 2 nodes. Interactive mode and non-interactive mode. It's available in UNIX and all Windows systems except Win9x and Win ME.
Universal groups contain?
users, Computers, Universal groups, Global groups from same domain and users, computers global groups and Universial groups from another domain in the same forest
global groups contain?
users, Computrs, Global groups from same domain
Ping
verify connectivity to other computers.
read
view folder details and attributes view file attributes open a file
when you have multiple circuits connected to a site, the entire circuit is known as a
virtual circuit
ntfs copy or move to same or differnt ntfs partition
will inherit permissions assigned to parent volume or folder
How do you establish an internet connection?
windows vista includes connect to a network wizard that guides user through setting up connection between computer and internet service provider
single user/multitasking
working on two or more programs that reside in memory at the same time
Circuit-level gateway
works on the session layer of the OSI model when a TCP or UDP connection is established, and hides information about a private network, but they do not filter individual packet
DHCP
works on two ports 67 and 68
Internet
worldwide system of connected computer networks, largest WAN in the world.
Assign
you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.
Publish
you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.
application file
A necessary file for running an application.
Port number 88 is used for which of the below protocols? NetBIOS Kerberos IMAP POP3
Kerberos Is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.
Symbian OS
an open source, multitasking operating system designed for smart phones.
Windows Server 2008
an upgrade to Windows server 2003 -For Itanium based systems- for computers with 64-bit processors that function as a web server -Standard- for the typical small-sized business network -Enterprise- for medium to large size businesses, including those with e-commerce operations -Datacenter- for businesses with huge volumes of transactions and large scale data bases Web Server 2008- for web server and web hosting businesses
Bitlocker Drive Encryption
another method of protecting data stored on a fixed drive in a Windows computer. BitLocker encrypts the entire drive, rather than individual files and folders. The complementary BitLocker To Go protects data on removable data drives, such as an external flash drive.
node
any device that connects to a network
intranet
any private network that uses TCP/IP protocols
mkfs -j
appends a journal to an ext2 file system
Private IP address
are hidden from the Internet and any other networks. usually behind a IP proxy or firewall device
Public IP address
are ones that are exposed to the internet; any computers on the Internet can potentially communicate with them.
Inherited permissions
are permissions that are given to an object because it is a child of a parent object.
Group Policy Object
are used by administrators to control users and computers on a network and to deploy applications, software updates, and security.
performance monitor
assesses and reports information about system resources and devices
Anycast address
assigned to a group of interfaces and are also most likely on separate host, but packets sent to such an address are delivered to all the interfaces in the group.
Boot drive
drive from which your personal computer boots. Drive C ( the hard disk) in most computers.
What is the command to add a group?
dsadd group GroupDN
What command can you use to retrieve a list of group members?
dsget group GroupDN
What command can be used to change group type and scope?
dsmod group GroupDN
What command can you use to move or rename a group?
dsmove ObjectDN
RIP - Routing Info Protocol
dynamic protocol tat uses distance-vector routing algorithms to decipher which route to send data packets.
Which of the following is the default windows server 2008 printing sharing configuration?
each client uses its own printer and printer driver
Ring Topology
each computer is connected to the network using a closed loop; done with coaxial cable. This is a pretty outdated concept
Install application
either at the local level or the network level. A local installation results in the software files running directly from a computer. Installing over a network generally means the software files are made available from an application server on a network. The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.
Messaging Server
email servers, but also fax, instant messaging, collaborative, and other types of messaging servers.
ipconfig/flushdns
empties the DNS cache
list folder content
includes all read actions adds ability to view folder content
ASCII
"As-key" American Standard Code for Information Interchange Seven bit encoding of Latin (English) alphabet, decimal digits, punctuation and control characters. Usually stored in one byte.
emergency repair disk
(1) In Windows 2000, a record of critical information about your system that can be used to fix a problem with the OS. The ERD enables restoration of the Windows 2000 registry on your hard drive. (2) In Windows XP, a bootable floppy disk that can boot the system, bypassing the boot files stored in the root of drive C.
ATA
(Advanced Technology Attachment): ANSI name for IDE standard. ATA-1, ATA-2, ATA-..
The below protocol is used to automatically assign or configure an IP address to a client. DNS ARP RIP DHCP
(DHCP) is a network management protocol used on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks
EIDE
(Enhanced IDE, also Expanded IDE) Adopted by ANSI in 1994 as ATA-2. A.K.A. Fast ATA
IDE
(Integrated Drive Electronics, also Intelligent Drive Electronics) Parallel interface with the controller embedded in device. ATA
CPU, Central Processing Unit, Processor
(Intel, AMD) - The semiconductor device that controls the system, does arithmetic and logic.
Low-level Format
(Physical Format): Format done by manufacturer to establish tracks and sectors on disk. Physical size for sector is larger, includes synchronization bits, error correcting codes,... ZBR: Zoned bit recording Provide LBA
Memory, Main Memory, RAM
(Random Access Memory) - Storage for data and program instructions using semiconductor devices.
Application-Aware Firewalls
(next-generation firewall or NGFW) - More "intelligent" firewall operates at higher level Identifies applications that send packets through firewall and then make decisions about application (vs. granular rule settings like destination port or protocol)
extend the schema
(v.) to change or expand the attributes of objects in a database, such as user's first name, last name, employee number, etc.
Zoned-Bit Recording (ZBR)
(zone-density recording, multiple-zone recording, ...)
BIT
- Binary Digit Place Values: 1 = 20, 2 = 21, 4 = 22, ...
Electrical Safety Rules
- Professionals should service high-power equipment. - Always disconnect b/f servicing - Work with a partner - Never bypass safety devices. - Use anti-static devices - Perform only the work for which you have sufficient training. - Do not attempt repair work when you are tired. - Do not assume anything w/o checking it out for yourself. -Do not wear jewelry or other articles that could accidentally contact circuitry and conduct current. - Wear rubber-soled shoes to insulate yourself from ground. - Suspend work during an electrical storm. - Do not handle electrical equipment when your hands or feet are wet or when you are standing on a wet surface. - Prevent static electricity from damaging components by standing on a totally insulated rubber mat to increase the resistance of the path to ground.
Demilitarized Zone (DMZ)
- Separate network located outside secure network perimeter Untrusted outside users can access DMZ but not secure network Most secure approach is have two firewalls
Background Processes
-Task Manager
NETSTAT Utility has several functions
- Use it to find out if TCP/IP based program is listening on the expected port. - Check statistics to see if the connection is good. -Use statistics to check network adapter error counts - Use it to display routing tables and check for network routing problems.
Time Domain Reflectometers (TDR)
- Used for detecting cable problems. -Sends an electrical signal out onto the wire and analyzes the signal on its return. -Can detect: bends, short circuits, connector problems, termination problems on coax networks. -Optical TDR
1. PPTP 2. L2TP 3. SSTP
1. MPPE 2. IPSec 3. HTTPS
1. Cat5e 2. Cat3 3. Cat5
1. 1 Gbps 2. 10 Mbps 3. 100 Mbps
1. 1 Kbps 2. 10 Mbps 3. 1 Gbps 4. 1000 Kbps
1. 1,000 bits per second 2. 10,000,000 bits per second 2. 1,000 Megabits per second 4. 1 Mbps
You must manually configure a computer with an IP address on the same network as a router. The router's interface is configured as 192.168.1.100 with a subnet mask of 255.255.255.0. Which two are valid IP addresses you could assign the computer?
1. 192.168.1.254 2. 192.168.1.5
1. The number of hops a packet must take from the source network to the destination network is...... 2. ...... is a common routing protocol that uses hop count
1. 4 2. RIP
1. Public network addresses 2. Multicast addresses 3. Private network addresses
1. 75.0.0.0 - 75.255.255.255 2. 244.0.0.0 - 239.255.255.255 3. 192.168.0.0 - 192.168.255.255
Network Technician's Hand Tools
1. A variety of screwdrivers and spare screws 2. Long-nose pliers 3. Small diagonal cutting pliers. 4. A small adjustable wrentch 5. A variety of wrenches or nut drivers. 6. A small AA or AAA flashlight 7. An anti-static wrist strap with clip
1. Proxy Server 2. Domain Name Server 3. DHCP 4. Remote Access Server
1. Caches web pages 2. Resolves a host name to an IP addresses 3. Distributes IP addresses 4. Authenticates a user from an external network
Types of Cable Testers and Certifiers
1. Certification Tester 2. Qualification Tester 3. LAN tester 4. Network cable certifier
1. 10.123.12.1 2. 130.34.3.223 3. 199.11.221.4 4. 224.2.200.35
1. Class A 2. Class B 3. Class C 4. Class D
What are three common forwarding methods used by LAN switches?
1. Cut-Through 2. Store-and-Forward 3. Fragment-Free
Which two of the following can be obtained from a DHCP server?
1. DNS serve address 2. IP address
Which two of the following WAN technologies are most commonly used to connect home devices to the Internet?
1. DSL 2. CATV
1. 802.11b 2. 802.11g 3. 802.11n 4. 802.11a
1. Frequency: 2.4 Ghz Data rate: 11 Mbps 2. Frequency: 2.4 Ghz Data rate: 54 Mbps 3. Frequency range: 2.4 Ghz or 5 Ghz Data rate: 65 - 600 Mbps 4. Frequency range: 5Ghz Data rate: 54 Mbps
The Network + Troubleshooting Model (7 steps)
1. ID the problem 2. Establish a theory of probable cause 3. Test the theory of determine cause 4. Establish a plan of action to resolve the problem and ID potential effects. 5. Implement the solution or escalate as necessary 6. Verify full system functionality and if applicable implement preventative measures. 7. Document finding, actions and outcomes.
The 4 monitoring levels supported by SNIPS are:
1. Info 2. warning 3. error 4. critical
What are two advantages of using mesh topology in a network?
1. It is self-healing and can still operate when one node breaks down 2. It is considered more reliable than other networks
In which directions can communications occur between layers of the OSI model?
1. Layer directly above 2. Peer layer in other networked computer systems 3. Layer directly below
1. The IP address tested in this ping is the ... 2.The equivalent IPv6 is .....
1. Loopback 2. ::1
1. 117.225.33.121/255.255.0.0 2. 117.225.33.121/255.225.255.0 3. 117.225.33.121/255.255.255.224 4. 117.225.33.121/255.255.240.0
1. Network: 117.255.0.0 Broadcast: 117.255.255.255 2. Network: 117.255.33.0 Broadcast: 117.255.33.255 3. Network: 117.255.33.96 Broadcast: 117.255.33.127 4. Network: 117.255.32.0 Broadcast: 117.255.47.255
1. A VLAN is typically configured on a router 2. A router is used to separate multiple networks 3. NAT is the mapping of a private LAN IP address to a public IP address
1. No 2. Yes 3. Yes
1. RARP resolves logical addresses to MAC addresses 2. DNS resolves host names to IP addresses 3. ARP resolves logical addresses to MAC addresses
1. No 2. Yes 3. Yes
1. The domain in-addr.arpa uses exchange records to perform revers name lockups 2. A secondary name server gets its data from another name server using a zone transfer 3. Entries in s HOSTS file on a local computer take precedence over DNS
1. No 2. Yes 3. Yes
Ping Responses
1. Normal - the computer responds w/ requested data 2. Destination unreachable - target computer was ID'd but unreachable by the default gateway. 3. Unknown host - target computer is unknown and is not reachable. 4. Destination does not respond - there is no response to the ping. 5. Network or host unreachable - routing table does not contain an entry for the network or host.
1.You must select .... to receive an IP address from the DHCP service on the router. 2. The DHCP service on the router can assign
1. Obtain an IP address automatically 2. the DNS server address
1. Leased Line 2. Circuit Switching 3. Packet Switching 4. Packet Switching 5. Packet Switching
1. PPP 2. ISDN 3. X.25 4. DSL 5. Frame Relay
What are three common LAN problem
1. Packet Collision 2. Incorrect Software Configuration 3. Media Issues
The ping Utility steps:
1. Ping the loopback address 127.0.0.1 2. Ping a specific system: to verify that is is running and is connected to the network. 3. Ping by IP address: to determine if is is a problem related to name resolution 4. Localize the problem: ping the local loopback address; ping the systems' own IP address; ping the address of the default gateway; ping the address of a remote host.
1. Hub 2. Layer 2 Switch 3. Router
1. Same as a Repeater 2. Uses MAC addressing to determine which port to forward a frame 3. Connects two networks using different protocals
1. Keeps conversation separate 2. User interface to the network 3. Specific voltage, media speeds, connector pin outs 4. ASCII, .jpg, mp3 5. Determines reliable or unreliable delivery 6. Combines bytes into frames; uses MAC addressing 7. Determines data route using logical addressing
1. Session Layer 2. Application Layer 3. Physical Layer 4. Presentation Layer 5. Transport Layer 6. Data Link Layer 7. Network Layer
1.You should use a ...... to connect each computer to the hub. 2. You should use a ...... to connect each hub to the switch
1. Strait Through cable 2. Crossover cable
1. The access you will use to securely connect your home computer to your company intranet is a ..... 2. What two things will ensure your connection is secure?
1. VPN 2. Authorization and Encryprtion
What is the primary advantage of implementing a dynamic routing protocol versus using static routing?
Adaptation
1. 64 Kbps 2. 128 Kbps 3. 45 Mbps 4. 622 Mbps
1. X.25 2. ISDN 3. Frame Relay T1 4. ATM
1. ipconfig/release is the command that deletes an IP address bound to an interface 2. dhcp renew is the command that acquires an IP address from a DHCP server 3. dhcp release is the command that deletes an IP address bound to an interface 4. ipconfig/renew is the command that acquires and IP address from a DHCP server
1. Yes 2. No 3. No 4. Yes
1.In a star topology, a bad cable affect only two interfaces. 2.In a star topology, failure of a central connectivity device does not bring down the entire network. 3.In a star topology, a central connection point allows for flexibility and scalability.
1. Yes 2. No 3. Yes
1. SMTP is a service that supports email 2. WINS resolves NETBIOS names to IP addresses 3. DNS and WINS perform the same service
1. Yes 2. Yes 3 No
1. A Firewall can be a hardware device 2. A Firewall can be a software package 3. A Firewall is a special room to protect servers
1. Yes 2. Yes 3. No
1. A layer 2 switch is also called a bridge 2. A switched floods ports if it does not know where to send a packet 3. A layer 2 switch uses routing tables
1. Yes 2. Yes 3. No
1. IPSec supports data integrity 2. IPSec supports data confidentiality 3. IPSec performs data compression
1. Yes 2. Yes 3. No
1. Layer 2 switches use MAC addresses 2. Layer 3 switches use IP addresses 3. Layer 3 switches can user MAC addresses
1. Yes 2. Yes 3. No
1. TCP is connection-oriented and reliable 2. UDP is connectionless and unreliable 3. IP is connection-oriented and reliable
1. Yes 2. Yes 3. No
1. ping n 2. ping t 3. ping l 4. ping 127.0.0.1
1. assigns a specific number of packets to transmit 2. Continuously pings a remote host until stopped 3. Specifies the size of the packet to transmit 4. Sends four packets to the local loopback dress
1. The security options shown are methods of wireless. 2. 3. 4.
1. authentication 2. WEP 3. WPA 4. WPA2
1. The name of the DNS server is ... 2. The IP address of the DNS Server is .....
1. hsd1.ut.comcast.net 2. 75.75.76.76
1.The command used to generate these results was ... 2.To solve the connectivity problem, you should clear the computer's memory by executing the ... command
1. ipconfig/displaydns 2. ipconfig/flushdns
192.168.1.0 1. The problem is ... 2. The solution is ...
1. no Default Gateway is configured 2. Assign a Default Gateway
1. The TCP/IP tool used to generate these results was ... 2. The results of shown indicate that the DNS server is ...
1. ping 2. unavailable
1. The physical topology of this network is a ... 2. The logical topology of this network is a ...
1. star 2. ring
ipconfig 1. The problem is ... 2. The solution is ...
1. the Default Gateway is incorrect 2. Change the Default Gateway
1. The TCP/IP tool used to generate these results was ... 2. The results of this contact indicate that the packet made ... hops to each the Louvre Museum website.
1. tracert 2. 15
Your ISP recently installed a T1 line. What is the maximum throughput in a T1 line?
1.544
Your ISP installed a T1 line. What is the maximum throughput of a T line
1.544 Mbps
1.Layer switches use routing tables 2.Layer switches use logical addresses 3.Layer switches use MAC addresses
1.No 2.Yes 3.Yes
1. Unsecured websites are accessed through port 80 by default 2. Public websites are accessed through port 25 3. Secured websites are accessed through port 443 by default
1.Yes 2.No 3.Yes
1.Crossover cable is used to connect similar devices: compute-to-computer, hub-to-hub, switch-to-switch, router-to-router 2.Strait through cable is used to connect dissimilar devices: computer-to-switch, hub-to-router 3. Rollower cable is another name for a crossover cable
1.Yes 2.Yes 3.No
1.The physical top logy of this network is a ... 2.An example that typically uses this topology is ...
1.star 2.ethernet
802.3
10 Mbps - 10Base5 - Thick coaxial
You need to set up computers on a Class A private network. Which of the following network IDs meet all of Class A private network?
10.0.0.0
802.3u
100 Mbps - 100Base-TX, 100Base-T4, 100Base-FX = TP using 2 pairs, TP using 4 pairs, Fiber optic
A cable that meets the 1000BaseT standard has a maximum length of ___.
100 meters
802.3Z
1000 Mbps or 1Gbps - 1000BASE-X - FIBER OPTIC
802.3ab
1000 Mbps or 1Gbps - 10GBASE-T - TWISTED PAIR
Bluetooth class 1
100mW, range of 100 meters (328 feet).
802.3AE
10Gbps - 10GBASE-SR, 10GBASE-LR, 10GBASE-ER, AND SO ON - FIBER OPTIC
This cable is a ... If the blue/blue white wire positions were swapped with the brown white/brown wire in the opposite connector, the cable would be a ...
10baseT/ 100baseTX Crossover Cable 10baseT/ 100baseTX/ 1000baseTXT4 Crossover Cable
802.11b
11 Mbps - 2 GHz
Using this kind of block system, multi-pair station cables are terminated allowing cross connection to other punch down locations.
110 Block
You need to subnet a 192.168.1.0 networking using a 255.255.255.248 subnet mask. What is 248 equal to in binary?
11111000
diagnostic loopback address
127.0.0.1
Which if the below are loopback addresses. Choose all that apply. 128.0.0.1 127.0.0.1 127.31.0.1 192.127.0.0
127.0.0.1 127.31.0.1 The IP address range 127.0.0.0 - 127.255.255.255 is reserved for loopback, i.e. a Host's self-address, also known as localhost address. This loopback IP address is managed entirely by and within the operating system.
Which of the following IP addresses is not routable?
127.0.10.4/8
How many bits is an IPv6 address?
128
IPv4 is a 32 bit system, allowing for approximately four billion addresses. IPv6 is a _______ bit system, allowing for 3.4 X 10^38 addresses.
128
An IPv6 address is __________ in length 32 bit 64 byte 128 bts 128 bytes
128 bts Larger address space. The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4.
Bluetooth class 2
2.5 mW, range of 10 meters (33 feet).
Class A
255.0.0.0 - IP range 0-127
You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:0000:2001:0000:0000:0000:0068 would be _______.
2001:4860:0:2001::68
___ is a valid IPv6 address that could be assigned to a host computer.
2003:dead:beef:4dad:23:46:bb:101
Class B
255.255.0.0 - IP range 128-191
FAT Directory Entry
32 Bytes File Name and Extension Attributes Creation Date & Time Access Date Update (Modified) Date & Time First Cluster File Size (in bytes)
Master, Slave
40 Pin Ribbon Cable, Separate Power Supply
MAC (Media Access Control) address
48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device
802.11g
54 Mbps - 2.4GHz
802.11a
54 Mbps - 5 GHz
802.11n
600 Mbps - 5GHz and 2.4GHz
2 main Types of punch down blocks
66 Block 110 Block
OSI model
7 layers which house different protocols within one of several protocol suites, how data communicates occur on computer networks.
Which of the below is a standard for Wireless devices? IEEE 802.1 q IEEE 802.3 IEEE 802.11 IEEE 802.3ab
802.11 IEEE 802.11 is a set of media access control and physical layer specifications for implementing wireless local area network computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.
Your boss has asked you to connect three new laptops to the wireless network WLAN42. It runs at a frequency of 2.4 GHz, with a speed of Mbps. What IEEE 802.11 standard should you implement when connecting the laptops to the Wireless Access Point.
802.11g
The 802.3an Ethernet network runs at a speed of ____________ 10Mbps 100 Mbps 10 Gbps 1 Gbps
802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded twisted pair (UTP)
System Partition
: Partition with O.S. These may not be the same. There may be more than one boot partition (to allow dual (or more) booting). There may be more than one system partition.
Track
: A circle on a disk below (or above) one read/write head (disk rotating, head fixed)
DHCPv6 server
A DHCP server that serves up IPv6 addresses.
DHCP client
A computer or other device (such as a network printer) that requests an IP address from a DHCP server.
Microfilter
A DSL filter that prevents interference between the DSL connection and other devices within the circuit, such as a telephone or fax machine.
Component Services (COM+)
A Microsoft Management Console snap-in that can be used to register components used by installed applications.
PC Reset
A Windows 8.1 feature that enables you to return your PC back to the original state it was in when you purchased it or first set it up
PC refresh
A Windows 8.1 reinstall option that allows you to keep your personal data, your Windows Store apps, your basic settings (mapped drives, drive letter assignments), and your personalization settings.
map
A Windows Recovery Console command used to display all drive letters, partition sizes, file system types, and relationships to actual physical hard drives on your computer.
bootrec
A Windows Recovery Environment troubleshooting and repair tool that repairs the master boot record, boot sector, or BCD store. It replaces the fixboot and fixmbr Recovery Console commands used in Windows XP and earlier operating systems.
Microsoft Terminal Services Client (mstsc)
A Windows command that allows you to start Remote Desktop Connection to remote in to your host computer using Remote Desktop.
tasklist
A Windows command that returns the process identifier (PID), which is a number that identifies each running process.
taskkill
A Windows command that uses the process PID to kill a process.
Network File System (NFS)
A Windows component that is a distributed file system used to manage shared files on a network.
Advanced Options menu
A Windows menu that appears when you press F8 when Windows starts. The menu can be used to troubleshoot problems when loading Windows. In Windows 7/Vista, the menu is called the advanced Boot Options menu.
NFTS permissions
A Windows method to share a folder or file over a network and can apply to local users and network users. The folder or file must be on an NTFS volume. Compare with share permission.
Remote Assistance
A Windows tool that allows a technician to remote in to a user's computer while the user remains signed, retains control of the session, and can see the screen. This is helpful when a technician is troubleshooting problems on a computer.
Remote Desktop Connection (RDC)
A Windows tool that gives a user access to a Windows desktop from anywhere on the Internet.
Memory Diagnostics
A Windows utility (mdsched.exe) used to test memory.
recimg.exe
A Windows utility that captures an image of your PC, after you install the applications and make any personal customizations, and stores it in a folder you specify.
System File Checker (SFC)
A Windows utility that verifies and, if necessary, refreshes a Windows system file, replacing it with one kept in a cache of current system files.
subfolder
A folder within another folder.
rapid elasticity
A cloud computing service that is capable of scaling up or down as a customer's need level changes.
Infrastructure as a Service (IaaS)
A cloud computing service that provides only the hardware, which can include servers, storage devices, and networks.
Software as a Service (SaaS)
A cloud computing service whereby the service is responsible for the hardware, the operating system, and the applications installed.
Platform as a Service (PaaS)
A clouding computing service that provides the hardware and the operating system and is responsible for updating and maintaining both.
Cylinder
A collection of all the tracks that lie above and below one another.
Directory (Folder)
A collection of files and directories (subdirectories).
Fox and the Hound
A combination of a tone generator and a tone locator.
hybrid cloud
A combination of public, private, and community clouds used by the same organization. For example, a company might store data in a private cloud, but use a public cloud email service.
cd
A command line argument used to change the current working directory in operating systems such as Unix, DOS, OS/2, AmigaOS (where if a bare path is given, cd is implied), Windows, and Linux.
netstat (Network Statistics)
A command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics.
tasklist
A command-line version of the Task Manager
file server
A computer dedicated to storing and serving up data files and folders.
ping
A computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
Server
A computer on the network that provides other computers (called clients or workstations) access to resources like disk drives, folders, printers, modems, and the Internet. These resources are called shared resources. There are different types of servers: mail servers store & distribute emails to clients, file servers store data & program files for clients, and application servers run tasks for clients. Servers are more powerful than the average workstation; they have SCSI or SATA RAID hard-drive arrays and larger amounts of RAM. Since servers aren't controlled by a single person, they're usually controlled remotely and have low-powered video.
Gateway
A computer or device like a router that provides a connection between a LAN and a WAN or the Internet. Computers that use a LAN connection to connect to the Internet must enter the IP address/addresses of the gateways if the computer doesn't use DHCP to obtain an IP address.
distributed database
A database comprised of at least two separate files that are in different locations on a network
registry
A database in which Windows stores its configuration settings.
Global Catalog
A database of all Active Directory objects; like an index
demarc
A demarcation point where the bldg.'s wiring ends and the telephone company's wiring begins. aka hand off
What is a Layer 3 Switch?
A device that performs functions similar to both a switch and a router
tone generator
A device that sends an electrical signal through one pair of UTP wires.
Smart Jack
A device that serves as the demarcation point between the end user's inside wiring and local access carriers' facilities.
switch
A device used to connect nodes on a network in a star network topology. When it receives a packet, it uses its table of MAC addresses to decide where to send the packet.
nbtstat
A diagnostic tool for NetBIOS over TCP/IP. Its primary design is to help troubleshoot NetBIOS name resolution problems.
dxdiag
A diagnostics tool used to test DirectX functionality and troubleshoot video- or sound-related hardware problems.
Internet Options
A dialog box used to manage Internet Explorer settings.
DNS (Domain Name System)
A distributed pool of information (called the namespace) that keeps track of assigned host names and domain names and their corresponding IP addresses.
NetBIOS over TCP/IP
A feature of Server Message Block (SMB) protocols that allows legacy NetBIOS applications to communicate on a TCP/IP network.
multiple input/multiple output (MIMO)
A feature of the IEEE 802.11n/ac standards for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance.
Recovery Console
A feature of the Windows 2000, Windows XP and Windows Server 2003 operating systems. It provides the means for administrators to perform a limited range of tasks using a command line interface. Its primary function is to enable administrators to recover from situations where Windows does not boot as far as presenting its graphical user interface. This feature is used to provide a way to access the hard drive in an emergency through the command prompt.
Quality of Service (QoS)
A feature used by Windows and network hardware devices to improve network performance for an application that is not getting the best network performance.
Subnets (Figure 7-13)
A figure. A computer is connected to subnet 186.98.34.0 that is then connected to a router connected to another subnet of 186.98.34.128. This subnet is connected to a router that is then connected to subnet 186.98.33.0.
DMZ With Two Firewalls (Figure 7-12)
A figure. An internal network with four computers is connected to a switch that is connected to a proxy server connected to a firewall. The firewall is to a DMZ which in turn is connected to a switch that is connected to a Web server and mail server. The DMZ is also connected to a second firewall that is connected to the Internet router that is connected to the Internet. The firewall is also connected.
data file
A file created by an application
file attribute
A file detail or setting that can be turned on or off.
system file
A file necessary for running the operating system.
executable file
A file that can perform tasks automatically when you open it.
Difference between hubs & switches
A hub takes the bandwidth provided by the Ethernet cable and divides it up amongst the computers it's connected to. For example, let's say we have 5 computers connected to a hub with a Fast Ethernet connection (100Mbps). This means that each computer only gets a bandwidth speed of 20 Mbps. A switch, however, provides the full speed to each port; so with a Fast Ethernet connection, each port gets 100Mbps of bandwidth. Both can be stacked (not enough ports, connect a hub to a hub/switch to switch for more ports).
tag
A keyword you associate with a file.
NetBIOS
A legacy suite of protocols used by Windows before TCP/IP
subscription model
A method of licensing software with a paid annual subscription where the software is installed on your local computer. For example, Office 365 uses a subscription model.
Wi-Fi Protected Setup (WPS)
A method to make it easier for users to connect their computers to a secured wireless network when a hard-toremember SSID and security key are used, and is considered a security risk that should be used with caution.
share permissions
A method to share a folder (not individual files) to remote users on the network, including assigning varying degrees of access to specific user accounts and user groups. Does not apply to local users of a computer and can be used on an NTFS or FAT volume. Compare with NTFS permissions.
OSI model
A model for understanding and developing computer-to-computer communication, it divides networking functions among seven layers.
File
A named or addressable collection of related data usually stored on secondary storage.
dig
A network administration command-line tool for querying Domain Name System (DNS) name servers. Dig is useful for network troubleshooting and for educational purposes. Dig can operate in interactive command line mode or in batch mode by reading requests from an operating system file. When a specific name server is not specified in the command invocation, it will use the operating systems default resolver, usually configured via the resolv.conf file. Without any arguments it queries the DNS root zone.
Peer-to-peer/mesh network
A network in which client computers share resources with each other as peers. Each computer has a different name for a resource depending on whether or not it's being accessed by the peer server or over the network. For example, if one computer is hooked up to an external drive and the other is hooked up to a printer, you can connect the two computers with a peer-to-peer network and print files from the first computer's external drive.
onboard NIC
A network port embedded on the motherboard.
Azure AD Join
A new Azure feature that registers devices and allows them to be accessible and managed by your organization
file path
A notation that indicates where a file is stored and includes the drive name and letter, folder and subfolders, and full filename.
port
A number assigned to a process on a computer so that the process can be found by TCP/IP.
Primary Partition
A partition designated in the MBR of the disk.
File System Partition
A partition that contains a file system (or something similar).
static IP address
A permanent IP address that is manually assigned to a computer
Sector
A portion of a track, typically with 512 bytes.
What is a VPN?
A secure tunnel used to pass data through the Internet
virtual private network (VPN)
A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet.
authentication server
A server responsible for authenticating users or computers to the network so they can access network resources.
DNS server
A server that uses a DNS protocol to find an IP address for a computer when the fully qualified domain name is known.
FTP server
A server using the FTP or Secure FTP protocol that downloads or uploads files to remote computers.
on-demand
A service that is available to users at any time. On-demand cloud computing means that service is always available.
cloud computing
A service where server-side virtualization is delegated to a third-party service, and the Internet is used to connect server and client machines.
protocols
A set of rules and standards that two entities use for communication.
CIDR notation
A shorthand notation for expressing an IPv4 address and subnet mask with the IP address followed by a / slash and the number of bits in the IP address that identifies the network.
ActiveXcontrol
A small app or add-on that can be downloaded from a website along with a webpage and is executed by a browser to enhance the webpage.
Troubleshooting model
A standardized step by steep approach to the troubleshooting process. A framework for correcting a problem on a network w/o introducing further problem or making unnecessary modifications to the network. The goal is to move in a methodical and repeatable manner through the troubleshooting process.
disk
A storage device for digital data.
FAT File Allocation Table
A table with an entry for each cluster on the disk. Cluster's entry can be 0x000 0x0000 0x00000000 Cluster is not in use. Free. 0xNNN 0xNNNN 0xNNNNNNNN Cluster is in use to store a file (or directory) and xxx... is the next cluster used for the file (or directory). (0x0002 < 0xNN... < 0x0FF...F8) A table with an entry for each cluster on the disk. Cluster's entry can be 0xFFF 0xFFFF 0x0FFFFFFF Cluster is in use to store a file and it is the last cluster for the file. EOF (End Of File) Other values (e.g. 0xFF8, 0xFFF8, 0x0FFFFFF8) Bad clusters
Wear-leveling algorithm
A technique for ensuring all blocks experience roughly the same number of write/erase cycles.
beamforming
A technique supported by the IEEE 802.11ac Wi-Fi standard that can detect the location of connected devices and increase signal strength in that direction.
port forwarding (port mapping)
A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by NAT and a firewall that controls the use of ports.
MAC address filtering
A technique used by a router or wireless access point to allow access to a private network to only certain computers or devices identified by their MAC addresses.
Open Database Connectivity (ODBC)
A technology that allows a client computer to create a data source so that the client can interface with a database stored on a remote (host) computer on the network. Also see data source.
Voice over LTE (VoLTE)
A technology used on cellular networks for LTE to support voice communication.
Clipboard
A temporary storage area in your computer's memory for files and content that is accessed when you copy or move data.
Wire crimper
A tool that attaches media connectors to the ends of cables. Used to trim the ends of a cable.
unicast address
A type of IPv6 address that represents a single interface on a device
wireless LAN (WLAN)
A type of LAN that does not use wires or cables to create connections, but instead transmits data over radio or infrared waves.
Users group
A type of Windows user account group. An account in this group is a standard user account, which does not have as many rights as an administrator account.
Backup Operators group
A type of Windows user account group. When a user account belongs to this group, it can back up and restore any files on the system regardless of its having access to these files.
FAT32
A type of file system, almost completely extinct due to it only supporting 4 GB of data.
FAT
A type of file system, seldom used today because it only supports 32 GB of data
Client/server network
A type of network model which uses dedicated servers such as Novell NetWare or Windows Server. The roles of each computer affects both the hardware and software in each computer on the network. Has advantages such as centralized administration, better sharing capabilities, scalability, and possibly increased security.
Power Users group
A type of user account group. Accounts assigned to this group can read from and write to parts of the system other than their own user profile folders, install applications, and perform limited administrative tasks.
Domain name
A unique alphanumeric identifier for websites. Example: www.informit.com. A domain name has three major sections: the top-level domain (.com, .org, etc.), the name of the site (informit) and the server type (www indicates a web server, ftp indicates an FTP server, mail indicates a mail server, and search indicates a search server).
Regsvr32
A utility that is used to register component services used by an installed application.
autochk
A version of Chkdsk that runs only on NTFS disks and only before Windows starts. This command cannot be run directly from the command-line. Instead, it runs in the following situations: 1.) If you try to run Chkdsk on the boot volume 2.) If Chkdsk cannot gain exclusive use of the volume 3.) If the volume is flagged as dirty
Solaris
A version of UNIX developed by Sun Microsystems, designed specifically for e-commerce applications.
Wireless Testers
A wifi spectrum analyzer used to detect devices and point of interference as well as analyze and troubleshoot network issues on a WLAN or other wireless networks.
wireless wide area network (WWAN)
A wireless broadband network for computers and mobile devices that uses cellular towers for communication. Also called a cellular network.
wireless access point (WAP)
A wireless device that is used to create and manage a wireless network.
Which network does the IP address 220.100.100.100 belong to? A. 220.100.100.0/24 B. 220.100.100.1/24 C. 255.255.255.0/24 D. 255.255.255.1/24
A. 220.100.100.0/24
Which subnet mask is valid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245
A. 255.255.255.240
In local area network (LAN) topologies, the primary media access methods are: (Choose two.) A. Contention B. Negotiation C. Kerberos D. Token passing
A. Contention D. Token passing Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.
The command-line tool used to list a host's active incoming connections is: A. NETSTAT B. IPCONFIG C. NSLOOKUP D. PING
A. NETSTAT, In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics. Function: Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships
Which type of network covers the broadest area? A. WAN B. CAN C. LAN D. PAN
A. WAN A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.
A well designed sharing strategy provides each user with three resources. Which of the following is not a provided resource?
Access to thawspace for temporary storage
Which term best describes the technology that list only those files that you have permission to view when accessing file list through a shared folder?
Accessed based enumeration
Typically http://192.168.1.1 will be the address for?
Accessing the admin interface on a wireless modem.
Account Logon
Account Logon events help document domain attempts to authenticate account data, either to a domain controller or a local Security Accounts Manager (SAM), Unlike logon and logoff events, which track attempts to access a particular computer, events in this category report on the account database that is being used.
Account Management
Account Management settings can monitor changes to user and computer accounts and groups.
The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP).
Address Resolution Protocol (ARP) The Address Resolution Protocol is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.
NETSTAT -n
Addresses and port numbers in numerical form
Layer 3 Switches
Addresses using IP addresses instead of MAC addresses
Start menu or desktop
After deploying software by GPO using the Assigned option, where is the package made available for the user?
Windows Control Panel
After deploying software by GPO using the Published option, where is the package made available for the user?
Authorize the server
After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?
Universal Naming Convention (UNC)
Always begins with backslashes, not forward slashes. Used for local networks only. \\computername\sharefolder\....\....
Uniform Resource Locater
Always has backslashes. http://www.grcc.edu/agc/schedule
principle of least privilege
An approach where computer users are classified and the rights assigned are the minimum rights required to do their job.
Recycle Bin
An area on your hard disk that holds deleted files until you remove them permanently.
Circuit Testers
An electrical instrument that is used for testing whether or not current is passing though the circuit. Plugs into socket and displays circuit status.
ticket
An entry in a call-tracking system made by whoever receives a call for help and used to track and document actions taken. The ticket stays open until the issue is resolved.
system image
An exact copy of the drives required for Windows to run
shortcut
An icon or tile that provides a quick way to perform an action such as opening a folder
Universal Plug and Play (UPnP)
An unsecure method a router can use to allow unfiltered communication between nodes on a private network.
gateway
Any device or computer that network traffic can use to leave one network and go to a different network.
TCP Model
Application Transport Internet Network Interface
A Priest Saw Ten Nuns Doing Pushups
Application presentations sessions transport network data link physical
OSI Model
Application presentations sessions transport network data link physical
This address is usually written in notation of four octets expressed in decimal and separated by periods.
IPv4
ext4
Ext4 is the latest version in the ext file system family. Ext4 can handle files up to 16 terabytes and disk sizes up to 1 exabyte.
Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n
B. 802.11g E. 802.11n The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.
Remote Admin share
Gives an administrator access to the Windows folder on a remote computer in a Windows domain.
What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point? A. The access point will transmit, but the node will be unable to receive. B. A connection will be established, C. Both the node and the access point will be unable to transmit. D. The node will transmit, but the access point will be unable to receive.
B. A connection will be established, 802.11g hardware is fully backward compatible with 802.11b hardware.
VPNs are implemented to provide: A. A secure connection within a private network. B. A secure connection through public networks. C. Additional encryption by using IPSec. D. Additional security for selected computers.
B. A secure connection through public networks.
Teredo tunneling is a protocol that: A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). B. Allows IPv6 connectivity through IPv4 devices. C. Provides VPN security. D. Dynamically allocates IPv6 addresses.
B. Allows IPv6 connectivity through IPv4 devices. Teredo tunneling is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts which are on the IPv4 Internet but which have no direct native connection to an IPv6 network.
Which of the following uses pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS
B. DNS Server DNS records include: * A Address record * PTR Pointer record
The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients
B. Display a client's address
The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients
B. Display a client's address ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.
Attenuation in a wireless network signal is a result of: A. Number of wireless nodes connected. B. Distance from the access point. C. Interference from cellular phones. D. Encryption of the signal.
B. Distance from the access point. Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. attenuation is a natural consequence of signal transmission over long distances.
The topology of a local area network (LAN) is defined by the: A. Number of devices to connect. B. Physical and logical characteristics. C. Distance between workstations. D. Type of cable being used.
B. Physical and logical characteristics. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.
The type of connector used on a 100BaseT Ethernet cable is: A. RJ-11 B. RJ-45. C. TNC. D. BNC.
B. RJ-45.
The ping tool is used to: (Choose two.) A. Determine the network portion of a host address. B. Self-test a host's own network interface. C. Determine whether a host is reachable. D. Manage a host's session when UDP is used.
B. Self-test a host's own network interface. C. Determine whether a host is reachable.
One reason to replace an unmanaged switch with a managed switch is to: A. Manage the routing tables. B. Support multiple VLANS. C. Reduce collision domains. D. Route between networks,
B. Support multiple VLANS. A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application- specific integrated circuit (ASIC) hardware.
You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped.
B. The DNS is not resolving.
Which of these factors has the biggest impact on data transmission speed in a wireless network? A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encryption for transmissions D. The transmission wattage rating used on the NIC
B. The transmission standard of the equipment used
Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN
B. VPN
Which type of network is most vulnerable to intrusion? A. Dial-up B. Wireless C. Broadband D. Leased line
B. Wireless Insecure Wi-Fi is the easiest way for people to access your home network, gleech your internet, and cause you serious headaches with more malicious behavior.
BIOS
Basic Input/Output System- firmware that contains the computers start up instructions.
Unified Threat Management (UTM) Security Appliances
Because different types of network security hardware each provide a different defense, network may require multiple devices for comprehensive protection Makes cumbersome to manage multiple devices Unified Threat Management (UTM) - Security product that combines several security functions
Enterprise Resource Planning (ERP)
Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.
Stateful Filtering
Benefits Added efficiency in terms of packet inspection - existing connections only checked against state table, no need to check the rule set If matched with the state table, no need to do "deep packet inspections" or DPI to detect such attacks as malware, buffer overflows, spam, intrusions and DDOS. Stateful filtering is also called shallow packet inspection.
Straight-through cable
Both ends of the cable are wired the same way. Used to connect a computer to a hub/switch.
all its rules, including the preconfigured rules and the ones you have created or modified
By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.
ext3
By layering it atop the ext2 file system, the third extended file system (ext3) supports journaling, so it has faster startup and recovery times. However, because it is tied to ext2, it doesn't offer the full performance capabilities available through a pure journaling file system. This
What are the only scope changes that you cannot make directly?
Global to domain local, or domain local to global
When a client's DHCP-issued address expires, the client will: A. Select a new address and request approval from the DHCP server. B. Require manual configuration with a static IP address. C. Attempt to obtain a new address by broadcasting. D. Continue to use the address until it is notified to stop.
C. Attempt to obtain a new address by broadcasting.
A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available? A. WINS B. DNS C. DHCP D. TFTP
C. DHCP
Which technology provides the highest bit rate? A. T1 B. El C. DS3 D. ISDN
C. DS3 A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps. Incorrect: Not A: T1, 1.544Mbps Not B: E1, 2.048Mbps Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps
At what layer in the OSI model are hardware addresses referenced? A. Network B. Application C. Data link D. Physical
C. Data link The data link layer is divided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer manages communications between devices over a single link of a network.
Two companies want to share data by using the Internet. Which type of network provides the solution? A. Ethernet B. Intranet C. Extranet D. Perimeter
C. Extranet An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
What type of DNS record maps host names to addresses? A. Mail Exchanger (MX) DNS record B. Service (SRV) DNS record C. Host (A) DNS record D. Canonical (CNAME) DNS record
C. Host (A) DNS record
A node within a local area network (LAN) must have a network interface device and a: A. Network account B. Table of all network nodes C. Host address D. Resource to share
C. Host address In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network.
Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK
C. PING The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response.
A Media Access Control (MAC) address identifies a/an: A. UPnP device. B. Local broadcast domain. C. Network interface card (NIC). D. Local area network (LAN).
C. Network interface card (NIC).
A network that separates an organization's private network from a public network is a/an: A. Firewall B. Extranet C. Perimeter D. Internet
C. Perimeter In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.
You need to divide a network into three subnets. Which device should you use? A. Hub B. Bridge C. Router D. Segmenter
C. Router You can use a router to divide your network into subnets.
Which type of port is used to support VLAN traffic between two switches? A. Virtual port B. WAN port C. Trunk port D. LAN port
C. Trunk port Trunk links are required to pass VLAN information between switches.
Which wireless authentication method provides the highest level of security? A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11a
C. WI-FI Protected Access (WPA) WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.
Repeater
Carries signals further than normal.
What is the least expensive options that meets this requirement?
Cat5e
Categories of Multimeters
Category I - Conditions where current levels are low. Category II - Interior residential branch circuits Category III - Distribution panels, motors and appliance outlets. Category IV - High-current applications ie..service connections, breaker panels for wiring mains, and household meters.
Network and Sharing
Centralized location to manage network connections and network security.
Resolving Bad Connector issues
Check and replace the faulty connectors. Verify that the cables are properly secured to the connectors and are properly crimped.
Resolving Bad wiring issues
Check and replace the wires that are in bad condition.
Resolving DB loss issues
Check the cables for defects or damage, crimpling and connection with the connectors. ID and remove sources of interference.
Event Viewer
Check the logs for error messages to help you investigate all kinds of hardware, security, and system problems.
Resolving TXRX reversed issues
Check the network port indicators on the system, if the link light is off there is an issue w/ the network adapter. replace the network adapter.
POST- Power On Self Test
Check the various system components including the buses, system clock, adapter cards, ram chips, mouse, keyboard, and drives.
You need to set up 750 computers on the same network. Which IP class is the best option?
Class B
Multicasting
Class D is used for multicasting transmitting data to multiple computers
In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A C E D
Class D: A 1 - 126* B 128 - 191 C 192 - 223 D 224 - 239
Which of the below is a valid Private IP address in the B class? Choose all that Apply 172.33.20. 20 172.26.20.20 172. 16.20.20 192.168.0.0
Class Private IP Address Subnet Mask A 10.0.0.0 to 10.255.255.255 255.0.0.0 B 172.16.0.0 to 172.31.255.255 255.240.0.0 C 192.168.0.0 to 192.168.255.255 255.255.0.0
public cloud
Cloud computing services provided over the Internet to the general public. Google or Yahoo! email services are examples of public cloud deployment.
resource pooling
Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand.
Partition
Collection of consecutive sectors within a volume. A volume can be part of disk or be built from several disks. A volume can contain a partition or partitions. A partition can contain a volume. A partition can contain partitions.
Volume
Collection of sectors that an O.S. can use for storage.
Memory Diagnostics
Command Prompt. Use it to test memory.
net
Command in Windows that allows users to view a network without knowing the names of the other computers on that network
copy
Command in the command-line interface for making a copy of a file and pasting it in another location.
xcopy
Command in the command-line interface used to copy multiple directories at once, which the copy command could not do.
md (mkdir)
Command in the command-line interface used to create directories.
del (erase)
Command in the command-line interface used to delete/erase files.
format
Command in the command-line interface used to format a storage device.
rd (rmdir)
Command in the command-line interface used to remove directories.
Wireless Network Policies (IEEE 802.3)
Computer Configuration node security settings include several security areas. Which of the following is NOT one of them?
Proxy server
Computer or application that intercepts and processes user requests: If previous request has been fulfilled a copy of Web page may reside in proxy server's cache If not, proxy server requests item from external Web server using its own IP address
Ring topology
Computers are connected either by a physical ring, or by a logical ring. The computers are physically connected as a continuous ring, passing information down the circle.
Peer-to-peer (Mesh) topology
Computers can connect directly to every other computer. Used by computers with multiple network adapters, Wi-Fi when configured for peer-to-peer mode, and Bluetooth.
Star topology
Computers connect to a central hub/switch (wired) or access point (wireless). This topology is used by 10BASE-T (10Mbps Ethernet), 100BASE-T (Fast Ethernet), 1000BASE-T (Gigabit Ethernet), or Wi-Fi when configured for default infrastructure mode. Computers can connect directly to each other.
Bus topology
Computers share a common cable. Connections in this topology are usually made with coaxial 10BASE2 or 10BASE5 cables. If a single computer goes down, the whole network goes down.
Windows Aero
Computers with more than 1 GB of RAM. provides an enhanced visual look, additional navigation operations, and animation.
Your IT Director wants to group all of the Administrative Assistant's computers so they can communicate as if they were on the same network. The challenge is that they are located on different subsets. What should you do?
Configure a VLAN
Wake-on-LAN
Configuring a computer so that it will respond to network activity when the computer is in a sleep state.
SYN_SEND socket state
Connection is active and open
SNY packet
Contains information regarding the return path for the data.
Master Boot Record (MBR)
Contains the partition table and the master boot program used to locate and start the BootMgr program.
Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? Content Addressable Memory Control Access Media Converged Address Memory Control Address Memory
Content Addressable Memory CAM stands for Content Addressable Memory. It is a type of table where fixed-length addresses are kept for fast lookups. Since MAC addresses are fixed length, CAM tables are used to store MAC addresses and their related information. For most purposes, you can think of them as the same thing called by different names.
convert
Converts a drive from FAT or FAT32 to NTFS w/o losing any data Important Options: convert C: /fs:ntfs
The default subnet mask for a Class B network is: A. 0.0.0.255 B. 0.0.255.255 C. 255.0.0.0 D. 255.255.0.0
Correct Answer: D 255.255.0.0
mkswap
Create a swap partition. A swap partition is the location on the hard drive where an operating system writes memory information when it runs out of RAM
mke2fs
Create an ext2, ext3, or ext4 file system
mkfs
Create an ext2, ext3, or fat file system
To connect similar devices like, switch to switch, what type of cable is used ? Console Crossover Cable Straight through Rolled Cable
Crossover Cable used to connect like devices to each other, for example, a computer to another computer, or a switch to another switch.
Which cable type is used to connect two like devices, such as two computers or two hubs?
Crossover cable
You need to connect two switches together. Which type of cable should you use?
Crossover cable
Physical Connectivity Issues
Crosstalk Near end cross talk Attenuation Collisions Shorts Open impedance mismatches Interference Bad modules (SFPs, GBICs) Cable problems Bad cables/improper cable Types
Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1
D. 224.0.0.1 A. 127.0.0.1 = loopback B. 169.254.0.1 = APIPA C. 192.168.0.1 = Class C D. 224.0.0.1 = Multicast
What is the default subnet mask for a Class C Internet network? A. 255.255.255.252 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0
D. 255.255.255.0
The maximum throughput of an 802.llg network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps.
D. 54 Mbps. The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.
Which of these represents the Internet Protocol version 6 (IPv6) loopback address? A. 127.0.0.1 B. 192.168.0.1 C. FEC0:A8C0::AA01 D. ::1
D. ::1 The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address. IPv6 addresses look nothing like IPv4 addresses. IPv6 addresses are 128 bits in length and are made up of hexadecimal characters.
One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.
D. Reduce the number of nodes in a broadcast domain. Explanation/Reference: VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.
One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.
D. Reduce the number of nodes in a broadcast domain. VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.
Which of the following determines the media access method that is used in a network? A. Number of hosts connected to the network B. Number of domain servers on the segment C. Maximum speed of the media D. Topology and protocols
D. Topology and protocols
Which technology can you use to extend an internal network across shared or public networks? A. VLAN B. Microsoft ASP-NET C. Microsoft .NET Framework D. VPN
D. VPN VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
A service that resolves NetBIOS names to IP addresses is: A. Domain Name Service (DNS). B. Internet Service Provider (ISP). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS).
D. Windows Internet Name Service (WINS). Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.
The top-level domain of www.adventureworks.com is: A. www B. adventureworks C. adventureworks.com D. com
D. com
the distributed file system DFS implemented in the windows server 2008 file service rol includes two technologies. DFS namespaces and ?
DFS replication
You are a consultant for a small business that is just starting up. They will have a file server, FTP server, email server, and web server for employees. They will have a firewall with 3 interfaces. Where should they put the file server?
DMZ
3-leg perimeter configuration
DMZ is attached to a separate connections of the company firewall. one to the company-one to the DMZ - one to the Internet.
In the command line, you type: ping www.fusiontomo.com and get a reply from 68.178.232. 100. What service has been used to convert the domain name to the IP address?
DNS
The ____ service resolves host names to IP addresses.
DNS
What is used to remap private addresses to public addresses and back?
DNS
IETF - Internet Engineering Task Force
DNS is defined by
DS Access
DS Access events provide a low-level audit trail of attempts to access and modify objects in AD DS. These events are logged only on domain controllers.
It can be used to test resistances between cable endpoints or voltages inside a lower power system. It should not be used to service high power or high voltage power systems
DVM - Digital Volt Meter
SSD Memory Writing
Data can not be directly overwritten.
Detailed Tracking
Detailed Tracking events can be used to monitor the activities of individual applications to understand how a computer is being used and the activities of users on that computer.
Certification Tester
Determine whether a cable meets specific ISO or TIA standards (Cat5,6 or 7). Should be used if a network is wired with both copper and fiber.
UNIX
Developed in the early 1970s by Bell Laboratories. Used by power users because of its flexibility and power. Some professionals call UNIX a multipurpose OS bc it is both a stand-alone and network operating system.
Modem
Device that allows a computer (or, rarely, multiple computers) to access the Internet by changing digital signals of the computer to analog signals used by a typical landline. Slow, last resort option.
Intrusion Detection and Prevention
Device that can detect an attack as it occurs IDS systems can use different methodologies for monitoring for attacks IDS can be installed on either local hosts or networks Extension of IDS is an intrusion prevention system (IPS)
Router
Device that routes data from one network to another. Often integrated within a WAP or switch. Enables connections with individual high-speed interconnection points. Routes signals for all computers out of the LAN and onto the Internet.
DUN
Dial-up networking. Using an ordinary analog phone line to connect to the Internet.
Crossover cable
Different pin configurations on either end. Used to connect 2 computers together directly.
DSL
Digital Subscriber Line. Broadband Internet that uses telephone lines to carry Internet traffic at speeds as high as 768Kbps or more while letting you use your phone at the same time.
Your wireless network has 10 laptops and 14 connected to it. These are the only computers you want to allow on the network. What can you do to prevent additional computers from connecting to your wireless network?
Disable SSID broadcasting
DORA
Discovery, Offereing, Request, Acknowledge = DHCP sessions four step process
CHS Cylinder Head Sector
Disk access using cylinder, head and sector numbers. Now rarely used.
LBA Logical Block Address
Disk access using sector number. Sectors are considered numbered, starting at 0. Translation from LBA to CHS is done by drive. Usual means of addressing.
removable media
Disks that you insert or attach to a computer.
dir
Displays a list of files and subdirectories in a directory.
netstat -a
Displays all active connections and listening ports
dir /s
Displays files in specified directory and all subdirectories.
arp -N if_addr
Displays the ARP entries for the network interface specified by if_addr
nbtstat -c
Displays the NetBIOS name cache of the local computer
nbtstat -A [IP address]
Displays the NetBIOS name table of the remote computer specified by the IP address
nbtstat -a [remote name]
Displays the NetBIOS name table of the remote computer specified by the name.
ver
Displays the Windows version.
arp -a and arp -g
Displays the current ARP entries in the cache. Can add inet_addr to specify a particular IP address.
netstat -b
Displays the executables (binaries) involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [ ] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will fail unless you have sufficient permissions.
tree /f
Displays the names of the files in each folder.
Administrator
During the Windows Server 2012 installation, what account creation prompts you for the password?
DHCP
Dynamic Host Configuration Protocol. Automatically assigns IP addresses to hosts. These hosts could be computers, printers, servers, etc. In most SOHO (small office/home office) networks, the router uses DHCP to assign IP addresses to client computers. The ISP also uses DHCP to assign an IP address to your computer by way of the router. If you get your address from a DHCP server, you are getting it assigned dynamically, and it will change periodically. Sometimes, however, with an important device like a server or printer, the network administrator manually assigns an IP address. This is so everyone knows exactly what the IP address of that device is, and it doesn't change.
Layer 4: Transport
Ensures proper delivery with no errors. Takes apart and reassembles Messages Message acknowledgement and traffic control Measurement: Segments or Messages
To which IP configuration does the CIDR notation 192.168.1.1/25 refer? A. 192.168.1.1 255.255.255.64 B. 192.168.1.1 255.255.255.1 C. 192.168.1.1 255.255.255.32 D. 192.168.1.1 255.255.255.256 E. 192.168.1.1 255.255.255.128
E. 192.168.1.1 255.255.255.128
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail
E. mail
The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail
E. mail Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into its component parts: mail is the host or local hostname; and google.com is the domain or parent domain name.
Byte
Eight bit number. Usually expressed as two digit hexadecimal number. (When written in binary, group by four bits.) E.g. 0b1011 0011 = 0xB3 Storage location for an eight bit number. Measurement of storage capacity.
Support staff members have been complaining about the amount of time they are spending restoring selected users' files on their Windows 10 PCs. The users are pretty technically savvy and can perform the tasks themselves, but you don't want to give them administrative privileges on their PCs. Describe your recommended solution.
Enable File History on their Windows 10 PCs. File History does not require administrative privileges to set up and run. The user can decide when to turn it on and off, select the drive to use, and restore files without needing to contact support staff.
Telnet
Enables users to make a text-based connection to a remote computer or networking device and use it as if they were sitting right in front of it, rather than just downloading pages.
Interactive mode w/in nslookup utility
Enables you to query name servers for information about hosts and domains.
regedit
Enables you to view, search for, and change settings in your system registry, which contains information about how your computer runs.
2 bytes: 0x55 0xAA
End of Boot Record Footer
Name the default groups
Enterprise Admins( in forest root domain)-Member of the Admin of every domain in the forest giving it complete access to the configuration of all DCs. Schema Admin(container of forest root admin) -Owns and has full control of AD schema Administrators(built in container of each domain)-complete control of all DCs and can change membership of all admin groups in the domain. The admin group of the forest root domain is most powerful and can change membership of Enterprise Admins, Schema Admins, and Domain Admins. Domain Admins(user container of each domain)-Inherits all capabilities of the Admin group and by default is added to the Local Admin group. Server Operators(built in container of each domain) Account Operators(built in container of each domain)-Can create, delete or modify accounts for users, groups and computers located in any OU in the domain except the DC OU.
Step 4 of The Network + Troubleshooting Model
Establish a plan of action to resolve the problem and ID potential effects: Establish a plan of action b/f you start making changes, once you have determined the probable cause. Detail each step that you will take while attempting to resolve the issue.
Step 2 of The Network + Troubleshooting Model
Establish a theory of probable cause: Question the obvios
NETSTAT -e
Ethernet statistics
Loopback Wiring standards
Ethernet: Pin1 to 3 and Pin 2 to 6 T1: Pin 1 to 4 and Pin 2 to 5
shutdown
Executed within a command shell window, shutdown.exe is the command-line shutdown application that can shut down the user's computer or another computer on the user's network.
chkdsk /f
Fixes errors on the disk
ipconfig /flushdns
Flush the DNS resolver cache
local share
Folders on a computer that are shared with others on the network by using a folder's Properties box. Local shares are used with a workgroup and not with a domain.
Local Users and Groups
For business and professional editions of Windows, a Windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.
Low-level Format (Physical Format)
Format done by manufacturer to establish (tracks and) sectors on magnetic media. Traditional sector standard size 512 bytes New alternate sector size for HDs: 4096 bytes 4096 bytes may be not be shown to O.S. O.S. sees 512 byte sectors.
Formatting
Formatting (High-level formatting): Establishing and initializing file system. May also include: Boot code Boot disk Boot partition Has boot loader Establishing O.S. System disk System partition Has O.S. Wiping disk (probably not done). Volume label FORMAT /fs:FileSys /v:VolumeLabel
64 bytes: Partition Table
Four 16 byte entries (three may be empty)
FCS errors
Frame Check Sequence: The extra characters added to a frame for detecting and correcting errors.
You have been hired to install a PAD/Router combination that uses a packet switched Internet connection. Which of the following technologies use packet Switching?
Frame Relay
Frame Relay and X.25 are a type of ___________________ WAN technology? Packet Switching Circuit Switching Network Switching Console switching
Frame relay is based on the older X.25 packet-switching technology that was designed for transmitting analog data such as voice conversations. Unlike X.25, which was designed for analog signals, frame relay is a fast packet technology, which means that the protocol does not attempt to correct errors.
The unit of measurement on a data link layer is _________________ Frames Bits Packets Segments
Frames FramesA frame is a digital data transmission unit in computer networking and telecommunication.
tree
Graphically displays the folder structure of a drive or path.
What are special IDE ties and name them
Groups for which the membership is controlled bY the OS: Anonymous login-connection between a computer and resources made without username and password Authenticated users-identities that have been authenticated. Does not include guest accounts. Everyone-includes authenticated users and guests. On computers running versions eali than W2K includes Anonymous login group Interactive-users accessing a resource while logged on locally to the computer hosting the resource as opposed to accessing the resource over the network. Also includes users logged on thru RDP connection. Network-users accessing a resource ove the network.
All of your users connect to Web sites using Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name.
HTTP
Port 80
HTTP= Hypertext Transfer Protocol
Layer 5: Session
Handles establishment, maintenance and termination between connections. Controls name and address database for the OS NetBIOS - operates at this layer
chkdsk (Check Disk)
Hard drive error detection and, to a certain extent, correction utliity in Windows. Originally a DOS command (chkdsk.exe); also the executable for the graphical Error-checking tool.
Controller, Disk Controller
Hardware (on or plugged into motherboard) for attaching disk.
firewall
Hardware and/or software that blocks unwanted traffic initiated from the Internet into a private network and can restrict Internet access for local computers behind it.
print server
Hardware or software that manages the print jobs sent to one or more printers on a network.
drive
Hardware that can retrieve and usually record data on a disk.
Environment Monitors
Hardware tools that ensure that environmental conditions do not spike or plummet temperature above or below equipment specifications.
Network Firewalls
Host-based application software firewall runs as program on one client Hardware-based network firewall designed to protected an entire network Both essentially same: to inspect packets and either accept or deny entry Hardware firewalls usually located outside network security perimeter as first line of defense
At the refresh interval
How are most Group Policy settings applied or reapplied?
Network Class B
IPv4 address class with address range of first octet between 128 and 191
AppLocker blocks all by default, except for those specified in Allow rules.
How does AppLocker handle all executables, installer packages, and scripts by default?
4
How many layers does the TCP/IP model have?
mkfs -t ext2 or mkfs.ext2
How to assign ext2
mkfs -t ext3 or mkfs.ext3
How to assign ext3
mkfs -t ext4 or mkfs.ext4
How to assign ext4
mkfs -t file_system_type
How to assign file system
mkfs -t msdos or mkfs.msdos
How to assign msdos
mkfs -t reiserfs or mkreiserfs
How to assign reiserfs
________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. Hub Router Firewall Switch
Hub A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
HTML
Hypertext Markup Language. The language used by web pages. Uses tags (text in angle brackets) to manipulate the text appearance, insert links, display pictures, and provide other features. Some are used alone and some in pairs. For example, <p> and </p> indicate the beginning and end of a paragraph, and <a href> </a> indicates the beginning and end of a hyperlink.
HTTPS
Hypertext Transfer Protocol over Secure Sockets Layer. Usually used for payment transactions or sensitive transactions in a corporate network to protect financial information. Sites secured with encryption schemes have the prefix "https://". Most browsers connecting to a secure site will have a closed padlock symbol.
HTTP
Hypertext Transfer Protocol. A protocol used by web browsers to access websites and content. An unsecured website uses the prefix "http://".
Ping is used to check network connectivity and it makes use of the _____________ protocol. IGMP RARP Proxy ARP ICMP
ICMP The Internet Control Message Protocol is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information .
Step 1 of The Network + Troubleshooting Model
ID the problem: question users, re-create the problem, ID the symptoms, and determine if anything has changed.
What group defines the DNS namespace
IETF
Which is the standards agency for TCP/IP?
IETF
Port 143
IMAP=Internet Access Message Protocol
Layer 3 switching uses Logical Addresses such as _____ to determine the destination of the packet.
IP addresses
Subnetting
IP addresses are 32-bit (4-byte) addresses with network address and host address Classful addressing - Split between the network and host portions on the boundaries between the bytes Subnetting or subnet addressing - IP address split anywhere within its 32 bits Instead of just having networks and hosts networks essentially can be divided into three parts: network, subnet, and host
public IP addresses
IP addresses available to the Internet
private IP addresses
IP addresses not available to the Internet
________is a feature in Windows that can used when want to make a server act like a router. RDP IP Sec DNS IP forwarding
IP forwarding
Class D
IP range 224-239
Class E
IP range 240-255, reserved for future use, but has giving way to IPv6 instead
Which is a protocol suite for securing Internet communications by authenticating and encrypting each IP packet of a data stream?
IPSec
The _________protocol is used to encrypt data in L2TP. PAP MS-CHAP IPSec DHCP
IPSec L2TP Layer 2 Tunneling Protocol
Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ IPSec ISDN PSTN Frame Relay
ISDN Integrated Services Digital Network is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
Resolving Split cables issues
Identify the split cables and replace them with compatible cables.
If users have slow links between their workstations and the software distribution point
If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should this method be avoided?
Which two statements are true about layer 2 switches?
If a switch does not know where to forward a fame, it floods it out all ports. Switches uses MAC address tables to determine where to forward frames.
The firewall does not block client-initiated network traffic by default.
If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond?
Public, private, and domain
If an administrator wants to enable the "Block all incoming connections, including those in the list of allowed apps" setting, to which of the firewall profiles does it apply?
What is the primary disadvantage of a bus topology?
If there is a problem with the cable, the entire network breaks down
Local Application
If you install an application directly onto a computer running Windows 7; it's considered to be a local application because it stays with that computer.
Full/half duplex
If your hardware permits, you can configure a network to run in full-duplex mode. In full-duplex mode, data is sent and received at the same time, which doubles the network speed. Half-duplex is the default mode where data is sent and received separately. The network and all of it's adapters need to support full-duplex, and a switch must be used, not a hub.
Step 5 of The Network + Troubleshooting Model
Implement the solution or escalate as necessary: Implement the plan of action step by step to fix the problem. Or, escalate the issue to the appropriate personnel.
Batch File
In DOS, OS/2, and also Microsoft Windows, this is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter.
Automatic Private IP Address (APIPA)
In TCP/IP version 4, IP address in the address range 169.254.x.y used by a computer when it cannot successfully lease an IP address from a DHCP server
octet
In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address.
ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)
In TCP/IP version 6, a tunneling protocol that has been developed for IPv6 packets to travel over an IPv4 network
Teredo
In TCP/IP version 6, a tunneling protocol to transmit TCP/IPv6 packets over a TCP/IPv4 network.
Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.
In Windows Firewall Customized Settings, there are three profiles (public, private, and domain). What differentiates these profiles from each other?
Registry
In Windows Vista, consists of several files that contain the system configuration information.
Recovery Console
In Windows XP, a lean bootable command-line operating system on the Windows XP setup CD that can be used to troubleshoot an XP boot problem.
hidden share
In Windows, a folder whose folder name ends with a $ symbol. When you share the folder, it does not appear in the File Explorer or Windows Explorer window of remote computers on the network.
Everyone group
In Windows, the Authenticated Users group as well as the Guest account. When you share a file or folder on the network, Windows by default, gives access to the Everyone group.
rule applies to all programs, to one specific program, or to a specific service
In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______.
Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker
In what Group Policy objects container are AppLocker settings located?
Intrusion Detection and Prevention
Intrusion detection system (IDS) - Device that can detect an attack as it occurs IDS systems can use different methodologies for monitoring for attacks IDS can be installed on either local hosts or networks Extension of IDS is an intrusion prevention system (IPS)
Intranet
It is a private, scaled version of the internet, usually build and managed by a company.
Extranet
It is an intranet that allows small and select groups of people access. Not just anybody can have access to it.
Arp utility
It supports the arp service of the TCP/IP protocol. It enables the administrator to view the arp cache and add or delete cache entries.
_______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. Gateway Address IP address MAC Address None of the above
MAC Address A media access control address of a device is a unique identifier assigned to network interface controllers for communications at the data link layer of a network segment.
Layer 2 switching uses _____ to determine which data path to use.
MAC addresses
Layer 2 switching uses ________ to determine which port will forward the frame
MAC addresses
One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet.
Make resources available to the Internet.
Windows Boot Manager
Manages the initial startup of the OS.
ntfs
Microsoft operating systems use NTFS (New Technology File System). Linux can only read ntfs partitions created using Windows 2000 and later, and can write to NTFS file systems created with MS operating system prior to Windows 2000. However, utilities such as ntfsprogs may enable read/write access on all ntfs partitions.
Intrusion Prevention System (IPS)
Monitors to detect malicious activities like IDS does but also attempts to prevent them by stopping attack
Big-endian
Most significant bytes first Stored: 12 34 (two bytes) Interpreted: 12 34 Hex Value: 0x12 34 Stored: 56 78 9A BC (four bytes) Interpreted: 56 78 9A BC Hex: 0x56 78 9A BC
Big Endian
Most significant bytes occur first
UNICODE
Multibyte encoding of world's alphabets.
You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement _____ an address.
Multicast
A router is a device that functions primarily on the ______ layer of the OSI Model.
Network
A windows utility that is used to view and manage NetBIOS over TCP/IP(NetBT) status information.
NBTSTAT
Helpful in identifying problems that are specific to Windows computers that use NetBIOS naming.
NBTSTAT
Socket States
NETSTAT will display one of several states for each socket.
You suspect an issue with one of the ports on the firewall. If you decide to scan the ports, which is the appropriate tool to use?
NMAP
Which permissions do administrators typically use to assign storage space as well as modify permissions on a windows server 2008 file server?
NTFS
NBTSTAT utility
Name resolution: It can display NetBIOS name tables for both the local computer and remote computers and also the NetBIOS name cache. The table names enables you to verify the connection establishment. You can refresh the NetBIOS name cache as well as the names registered with the WINS server. Developed specifically as a NetBIOS diagnostic tool.
NAT
Network address translation. The process of modifying IP addresses as information crosses a router. It hides an entire range of IP addresses on the LAN - for example, 192.168.0.1 through 192.168.0.255. Whenever an IP address on the LAN wants to communicate with the Internet, the private IP is converted to the public IP of the router in order to access the Internet. This public IP is assigned to the router by the ISP. This both allows one IP to do the work for multiple IPs, and also protects the computers in the network by only exposing itself to the Internet instead of directly showing the world the client's private IP address.
Switch - Traffic Monitoring
Network administrator monitors network traffic to help identify and troubleshoot network problems Traffic monitoring methods: Port mirroring - Allows administrator to configure switch to copy traffic that occurs on some or all ports to designated monitoring port on switch Network tap (test access point) - Separate device installed on network
Command-line interface
Network administrators use it to configure devices, manage system resources, and troubleshoot network connections. type commands or press special keys to enter data and instructions.
Network Intrusion Detection System (NIDS)
Network intrusion detection system (NIDS) - Watches for attacks on network. NIDS sensors installed on firewalls and routers to gather information and report back to central device May use one or more of the evaluation techniques
Security Through Network Technologies
Network technologies can also help to secure network Two technologies: Network address translation Network access control
device-independent OS's
New trend, run on computers provided by a variety of manufacturers.
SATA (Serial ATA)
Nine pin interface with power connection built in.
You are analyzing Frame Relay frames and find that one message consisting of five packets was sent over three different circuits. The three circuits form a _______ circuit.
No change is needed
Object Access
Object Access events track attempts to access specific objects or types of object on a network or computer
Internet Control Message Protocol (ICMP)
One of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. This protocol can also be used to relay query messages.
Windows Boot Loader (WinLoad.exe)
One of two programs that manage the loading of Windows 7/Vista. The program file is stored in C:\ Windows\System32, and it loads and starts essential Windows processes.
Hop
One portion of the path between source and destination. Data packets pass through routers and gateways on the way. Each time packets are passed to the next device, a hop occurs. To see how many hops it takes to get from one host to another ping or traceroute/tracepath commands can be used.
community cloud
Online resources and services that are shared between multiple organizations, but not available publicly.
You are setting up a VPN that allows connections on inbound port 1723. What tunneling protocol will you use?
PPTP
Which of the below are tunneling protocol used by VPN? PPTP L2TP SFTP NNTP
PPTP: The Point-to-Point Tunneling Protocol is an obsolete method for implementing virtual private networks, with many known security issues. PPTP uses a TCP control channel and a GRE tunnel to encapsulate PPP packets L2TP: In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
fixmbr
Part of the Recovery Console that writes a new master boot record to a disk.
fixboot
Part of the Recovery Console that writes a new volume boot record to a volume.
Extended Partition
Partition which holds other partitions. Starts with a virtual MBR which has a partition table. Partitions within the extended partition may be secondary file system partitions or secondary extended partitions.
Boot Partition
Partition with boot code in VBR. Also called active partition.
Secondary Partition:
Partition within an extended partition.
CLOSE_WAIT socket state
Passive close. The server just received FIN_WAIT_1 from a client.
Cable Internet
Piggybacks off of the coaxial cable that brings in cable TV. It can reach download speeds anywhere from 2Mbps up to 50Mbps or faster. Upload speeds are usually about 10% of the download speed. Some providers use the same cable for both, but some use a splitter to separate cable TV and cable Internet signals and reduce interference.
Ping
Ping command tests TCP/IP connectivity to other hosts on the network, and checks the Internet connection to see if it's working properly. Ping is a more reliable way to check Internet connection than opening your browser because a misconfigured router can think your TCP/IP config. is incorrect. In order to check your Internet connectivity, connect to the Internet, open up a command-prompt window, and type "Ping (IP address here)" or "Ping (server name here)". Ping sends four data packets from your computer, and if your TCP/IP connection is working properly, you should get a response telling you how long it took for the signals to travel back and forth between the computer and the server. Having a high ping is bad, because it means you have a very long latency time, which indicates a slow connection.
ping -t
Ping continuously until stopped with Ctrl+C
MUT - black hole
Places in the network where incoming or outgoing traffic is silently discarded or dropped w/o informing the source that the data did not reach its intended recipient.
POTS/PSTN
Plain old telephone system
Self-installed DSL setup
Plug computer into RJ-45 jack on DSL modem. Attach RJ-11 cord from modem to two-outlet modular adapter which plugs into the RJ-11 wallplate. The second outlet in the adapter is connected to a microfilter, which is then connected to a telephone.
External modem
Plugs into serial or USB port. A serial/USB connection connects the external modem to the computer, and a phone line connects the computer to the Internet. There is a reset switch on some modems to reset the modem without resetting the computer.
POP3 protocol
Port 110
IMAP protocol
Port 143
FTP protocol
Port 21
SSH protocol
Port 22
Telnet protocol
Port 23
SMTP protocol
Port 25
RDP protocol
Port 3389
HTTPS protocol
Port 443
DNS protocol
Port 53
HTTP protocol
Port 80
Logical Connectivity Issues
Port Speed Port duplex mismatches Incorrect VLAN assignment Incorrect IP address Wrong gateway assignment Wrong DNS server assignment Wrong subnet mask Power Failure Bad/Missing Routes
robocopy
Powerful command-line utility for copying files and directories, even over a network.
__________Layer of the OSI takes care of the compression and encryption. Physical Session Presentation Transport
Presentation layer, Layer 6, which is primarily responsible for managing protocol and architecture. ... Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation.
Advanced Boot Options Menu
Press F8 when Windows first Starts to load. Use several options on this menu to help you troubleshoot boot problems.
Bus
Principal data path within a system.
System Software
Programs that control or maintain operation of the computer
Firewall
Protects a computer from unwanted intrusion.
/? (Information)
Provides options and syntax for command line utlities and programs.
Digital Volt Meter (DVM)
Provides scales for reading voltage in both AC and DC and different resistances.
Insulation Displacement Connector is the technical name for a?
Punch Down tool.
Punch-down tool
Punches down individual wires into 110 IDC clips of an RJ-45 jack and patch panel. This is the termination at the end of the cable. You do it for the wall jack and for the patch panel (terminate on both ends).
nbtstat -R
Purges the cache and reloads static entries from the LMHOSTS file
Multicast address
assigned to a group of interfaces and are also most likely on separate hosts
private cloud
Services on the Internet that an organization provides on its own servers or established virtually for a single organization's private use.
What is the frame that is smaller than 64 bytes called? JUMBO RUNT TINY MICRO
RUNT In networks, a runt is a packet that is too small. For example, the Ethernet protocol requires that each packet be at least 64 bytes long. In Ethernet, which operates on the idea that two parties can attempt to get use of the line at the same time and sometimes do, runts are usually the fragments of packet collisions.
Define Backlink
Read only attribute that is automatically updated when it's corresponding forward link attribute changes
Mount
Ready a medium for use on a computer system. Physical (Disk, Thumb Drive, ...) Logical (Volume) Image Windows doesn't mount images. Tools will mount images. Plug and play (PnP) is essentially automounting.
Advantages of load-balancing technology
Reduces probability of overloading a single server Optimizes bandwidth of network computers Reduces network downtime
Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a unstable state. During the recovery process, you want to preserve as much data as possible including apps purchased from the Microsoft Store as well as your user's data files. Which option should you use?
Refresh Your PC
NETSTAT [interval]
Refreshes and redisplays the statistics specified in the command at the stated number of seconds specified in place of [interval] in the code syntax.
computer roles
Regarding security templates, a strategy plan should consider ______.
ipconfig /release
Release the DHCP lease
ipconfig /renew
Renew the DHCP lease
bootrec /fixmbr
Repairs critical disk structures. /fixmbr option writes the master boot record of the system partition using the master boot record compatibile with Windows 7. This operation does not overwrite the existing partition table.
fixmbr [device-name]
Repairs the master boot record of the boot partition. Device-name is an optional name that specifies the device that needs a new MBR. If this is left blank then the boot device is used. Only supported on x86-based computers
warm boot
See soft boot.
Connecting several computers together in a circle without the use of a hub or switch is using a _____ Topology.
Ring
Your Network Administrator has tasked you with installing a new PAD on the network. Which of the following devices is most similar to a PAD?
Router
Your Network Administrator has tasked you with installing a new PAD on the network. Which of the following devices is the most similar to a PAD
Router
Rule-Based Firewalls
Rule-based firewall uses set of individual instructions to control actions (firewall rules) Each firewall rule is separate instruction processed in sequence Rules stored together in one or more text files that read when firewall starts Rule-based are static in nature and cannot do anything other than what have been expressly configured to do
You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6
STP Cat5e Cat5e, is an improvement on Cat5 cabling. It was made to support 1000 Mbps "gigabit" speeds, so in theory, it's faster than Cat5. It it also cuts down on crosstalk, the interference you can sometimes get between wires inside the cable.
Embedded Linux
Scaled down Linux OS for smart phones, ect
bootrec /ScanOs
Scans all disks for installations compatible with Windows 7 and displays the entries that are currently not in the boot configuration store.
sfc /scannow
Scans integrity of all protected system files and repairs files with problems when possible.
bootcfg /rebuild
Scans the hard disks of the computer for Windows XP installations and then displays the results.
SSH
Secure Shell. Allows data to be exchanged between comps. on a secured channel. More secure replacement to FTP & Telnet. Some protocols like SFTP (secure FTP) use SSH.
SSL
Secure Socket Layers. An encryption technology used by secured (https://) websites. To access a secured website, the broswer must support the same encryption level used by the site (usually 128-bit encryption) and use the same version of SSL (usually SSL version 2.0 or 3.0).
In the IP Sec the __________ generates encryption and authentication keys. SA AH ARP ESP
Security Associations (SA) provides the bundle of algorithms and data that provide the parameters necessary for AH and/or ESP operations. (ESP) Encapsulating Security Payloads
Name the two type of groups
Security and distribution
Standard Network Devices
Security functions of standard network devices can be used to provide degree of network security Hubs rarely used today due to security vulnerability and increased network traffic Switch - Data Link layer (Layer 2), Provide better security than hubs Router - Network Layer (Layer 3)
cold boot
See hard boot.
Map Network Drive dialog box
Select one of the available letters to assign to the shared drive/folder from the drop down menu, select the folder you want to map it to. Select "Reconnect at Login" if you want to connect to this drive automatically upon login (this should only be enabled if the server is always on, otherwise you'll just get an error message). Select "Connect Using Different Credentials" if you want to use a different username/password to connect to the shared resource.
ping -n <count>
Sends a specified number of echo requests
nbtstat -RR
Sends name release packets to the WINS server and then starts refresh.
Layer 7: Physical
Serves as backend of the end users applications Such as; FTP ,HTTP,POP3,SMTP
SSID
Service Set Identifier. A user-friendly name that identifies the wireless network. It's usually set on a SOHO router.
ipconfig /all
Show all TCP/IP details
msinfo32
Shows details about your computer's hardware configuration, computer components, and software, including drivers.
NETSTAT utility
Shows the status of each active network connection. Will display statistics for both TCP and UDP, including protocol, local address, foreign address and the TCP connection stat. Not the UDP stat b/c UDP is connectionless.
shutdown -r
Shutdown and restart the computer
restore points
Signposts in a system's history that enable you to return the system to an earlier state.
Network intrusion prevention system (NIPS)
Similar to active NIDS that monitors network traffic to immediately react to malicious attack
SMTP
Simple Mail Transfer Protocol. Used to send email from client system to email server, which also uses SMTP to relay the message to the receiving email server.
To send email messages what services does a windows server 2008 computer need to be running>
Simple mail transfer protocol
Which of the below modes are related to Fiber Optic Cable? Single Mode Multi Mode Fiber Mode RJ Mode
Single Mode Multi Mode
Cluster
Smallest logical unit of storage that may be accessed in Microsoft file system. Clusters begin after root directory (FAT 12, FAT 16) or FAT 2 (FAT 32). Addressed by cluster number. First cluster number is 2. (FAT file systems)
Sector
Smallest unit of secondary (external) storage that may be accessed (read or written) by O.S. Defined by hardware or low level formatting. Traditionally 512 bytes, future may be 4096 bytes. LBA Sectors are probably different for optical media (CDs, DVDs, etc.) if they exist.
Cluster
Smallest unit of storage that may be accessed in Microsoft file system. Defined by Microsoft O.S. (FAT, NTFS, exFAT). Must consist of one or more sectors. Purportedly a power of 2: 1, 2, 4, 8, ... Block in *NIX.
Sector
Smallest unit that disk is able to access (read or write), typically 512 bytes. Accessing data on a disk means specifying its sector or sectors. 4096 byte ("4K") sector disks exist
Socket
Software in an OS that connects an application with a network protocol.
Network zone
Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network?
Path
Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system?
Hash
Software restriction relies on four types of rules to specify which programs can or cannot run. What type relies on a value generated by an algorithm that creates a fingerprint of the file, which makes it impossible for another program to have the same value?
Certificate
Software restriction relies on four types of rules to specify which programs can or cannot run. What type uses a digital certificate to confirm its legitimacy?
expert system
Software that uses a database of known facts and rules to stimulate a human expert's reasoning and decision-making process.
Driver, Device Driver
Software used to operate a peripheral device. May be part of op. sys.
Host-Based Intrusion Detection System (HIDS)
Software-based application that runs on local host computer that can detect an attack as occurs HIDS relies on agents installed directly on system being protected Monitors: System calls File system access System registry settings Host input/output
Spam Filters On POP3 Server
Spam filters installed on POP3 server All spam must first pass through SMTP server and be delivered to user's mailbox Can result in increased costs of storage, transmission, backup, deletion Third-party entity contracted to filter spam All email directed to third-party's remote spam filter Email cleansed before being redirected to organization
Spam Filters On SMTP Server
Spam filters installed with SMTP server Filter configured to listen on port 25 Pass non-spam e-mail to SMTP server listening on another port Method prevents SMTP server from notifying spammer of failed message delivery
Application-aware proxy
Special proxy server that "knows" the application protocols that it supports (e.g., FTP proxy server implements the protocol FTP)
Web application firewall
Special type of application-aware that looks at applications using HTTP
System files
Specific operating system files that the BIOS searches for.
Network Security Hardware
Specifically designed security hardware devices Greater protection than standard networking devices Devices include network firewalls, spam filters, virtual private network concentrators, Internet content filters, Web security gateways, intrusion detection and prevention systems, and Unified Threat Management appliances
mstsc -v <IP address>
Specifies the specific remote computer to connect to via RDP
platform
The hardware, operating system, runtime libraries, and modules on which an application runs.
copy /y
Suppresses prompting to confirm you want to overwrite an existing destination file
A _____ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
Switch
Routing and Switching Connection Issues
Switching Loop Routing loop Routing problem Proxy arp Broadcast storms Port configuration VLAN assignment Mismatched MTU/MUT blackhole
Open impedance mismatches
Symptoms: An echo on either the talker or listener end of the connection. Causes: Mismatching of electrical resistance. Resolution: Use TDR to detect. Collect and review data, interpret the symptoms, determine the root cause.
Bad cables/improper cable types
Symptoms: Cables that connect different parts of a network are cut or shorted. Causes: When the wire conductor comes in contact with another conductive surface, changing the path of the signal Resolution: Use cable testers. After you ID the source of the issue, move the cable to prevent it from coming in contact with other conductive surface.
Interference - (Electro Magnetic Interference -EMI)
Symptoms: Crackling, humming and static. Low throughput, network degradation, and poor voice quality. Causes: Radio Frequency (RF) interference - cordless phones, Bluetooth, cameras, paging systems, unauthorized APs and client in the ad-hoc mode. Resolution: Remove or avoid environmental interferences. Ensure adequate LAN coverage. Test area prior to deployment using tools such as spectrum analyzers.
Latency
Symptoms: Delay in data transmission on the network is very high. Causes: The signal strength is weak or the position of the wireless antenna is modified. Resolution: Verify that the wireless modem is functional. Change the antenna position to the position that gives the best performance. Ensure that your antenna is maintained at the same position.
Collisions
Symptoms: High latency, reduced network performance, and intermittent connectivity issues. Causes: occur on networks as nodes attempt to access shared resources. Resolution: Depends on the network. ie.. replacing a hub for a switch will fix it.
Incorrect encryption levels
Symptoms: If the encryption types or keys b/t two devices do not match, no connection is established. Causes: Improper configuration and different encryption types. Resolution: Ensure that security settings match between and among devices.
Port duplex mismatches
Symptoms: Late collisions, port alignment errors, and FCS errors are present during testing. Causes: Configuration errors. Occurs when the switch port and a device are configured to use a different set of duplex settings, or when both ends are set to auto negotiate the settings. Resolution: Verify that the switch port and device are configured to use the same duplex setting.
Distance
Symptoms: Low signal strength and throughput. Issues that can occur b/c of low signal strength include latency, packet loss, retransmission or transient traffic. Causes: The distance b/t two points causes this connectivity issue. The longer the distance b/t two devices the lower is the signal strength. Resolution: Add another access point to increase coverage. use a spectrum analyzer to determine coverage and signal strength.
Interference on a Wireless connection
Symptoms: Low throughput, network degradation, dropped packets, intermittent connectivity and poor voice quality. Causes: RF interference can be caused by a number of devices including cordless phones, bluetooth, cameras, paging systems, unauthorized APs, metal building framing, and clients in ad-hoc mode. Resolution: Remove or avoid environmental interferences as mush as possible.
Mismatched MTU/MUT black hole
Symptoms: MTU is inaccessible Causes: In case of a mismatch of the MTU, the TCP/IP connection handshake does not occur b/t the devices (routers) and the connection cannot be established. Resolution: Reconfigure the MTU to check whether the problem gets resolved. If not replace the device.
Incorrect frequency
Symptoms: No connectivity Causes: Devices must operate on the same frequency. 5GHz cannot communicate w/ 2.4GHz. Resolution: Deploy devices that operate on the same frequency.
Wrong DNS server assignment
Symptoms: No connectivity between devices Causes: A device is configured to use the wrong DNS server Resolution: Open TCP/IP properties and check the IP address of the DNS server listed for the client. Replace w/ the correct IP address and test connectivity.
Incorrect VLAN assignment
Symptoms: No connectivity between devices Causes: Devices are configured to use different VLANs Resolution: Reconfigure devices to use the same VLANs
Incorrect IP address
Symptoms: No connectivity between devices Causes: Either the source or destination device has an incorrect IP address. Resolution: Use Ping cmd to determine if there is connectivity between devices. Check IP addresses and empty the ARP cache on both computers.
Wrong subnet mask
Symptoms: No connectivity between devices Causes: Either the source or destination device has an incorrect subnet mask. Resolution: Use the ping cmd to determine if there is connectivity b/t devices. Check the subnet mask on both devices. Change the incorrect subnet mask to a correct one and test connectivity.
Wrong gateway assignment
Symptoms: No connectivity between devices Causes: The IP address of the gateway is incorrect for the specified route. Resolution: change the address of the gateway to the correct address.
Standard mismatches
Symptoms: No connectivity between devices. Causes: Devices are configured to use different standards such as 802.11a/b/g/n Resolution: Devices chosen to work together should use the same standard to operate.
SSID mismatches
Symptoms: No connectivity between devices. Causes: Devices are configured to use different ESSIDs. Resolution: Set the devices to use the same SSID. Ensure that the wireless client and the access point are the same.
Bounce
Symptoms: No or low connectivity b/t devices. Causes: Signals from device bounce off obstructions and are not received by the receiving device. Resolution: Move one of the devices to avoid obstructions. Monitor performance and check for interference.
Incorrect antenna placement
Symptoms: No or low signal and connectivity. Causes: The position of your antenna can negatively affect overall performance if placed incorrectly. Resolution: Alter the position of your antenna and monitor device performance.
Port Speed issues
Symptoms: No or low speed connectivity b/t devices. Causes: Ports are configured to operate at different speeds and are therefore incompatible w/ each other. Resolution:Verify that equipment is compatible and is operating at compatible speeds.
VLAN assignment
Symptoms: Nodes on the network cannot communicate w/ one another. Causes: By default, computers on different segments are added to different VLANs and they cannot communicate with one another unless the switch is configured to allow communication b/t computers on different VLANs. Resolution: Check the VLAN assignment on the switch console and reassign the computers to the VLAN to enable communication among them. Ensure that the IOS of the switch is updated to reflect the latest settings.
Routing problem
Symptoms: Packets do not reach their intended destination. Causes: This could be caused by configuration problems, route convergence, broken segments or router malfunctioning. Resolution: Verify that the router is functional. replace the router.
Port configuration
Symptoms: Port configuration is incorrect. Causes: The recent changes made to the port were incorrect. Resolution: On the system console of the switch, verify the port properties of the individual nodes and check their status. if needed restore the port configuration to is default setting from the last backup.
Near end cross talk
Symptoms: Signal loss or interference Causes: occurs near the terminating connector along the transmitting end of the cable. Resolution: Test with cable testers on both ends. verify the cable is terminated properly and that the twists in the pairs of wires are maintained.
Cross-talk
Symptoms: Slow network performance and excess of dropped or unintelligible packets. users hear garbled voice. Causes: two cables run in parallel and the signal of one cable interferes with the other. Crossed or crushed wire pairs in twisted pair cabling. Resolution: Use twisted pair cabling or use digital signals. Maintain proper distance b/t cables.
Attenuation
Symptoms: Slow responses from the network Causes: degradation of signal strength Resolution: For wired networks use shorter cable runs. For Wireless use more access points and signal boosters. Evaluate the environment for interference.
Incorrect switch placement
Symptoms: Switch performance is considerable reduced. Causes: There is a conflicting device in the range which is causing the interference. Resolution: Locate the conflicting device and move it to another location. if you can't then rework your network layout and determine a better position for the switch so that there is no conflict w/ the other devices. Monitor the switch performance periodically to prevent further occurrence of the issue.
Bad modules (SFPs, GBICs)
Symptoms: System console on the switch may use distinct colors ie.. amber or red to help you locate the faulty SFPs/GBICs. No communication through the faulty device. Causes: Modules in SFPs/GBICs get corrupted. Resolution: Replace the faulty SFPs/GBICs
Broadcast storms
Symptoms: The network becomes overwhelmed by constant broadcast traffic generated by a device on the network. Causes: There are too many broadcast messages being send parallelly causing high network traffic. Resolution: ID the device and reconfigure it to increase the interval of broadcast messages. On the network, apply restrictive settings to prevent network nodes from sending broadcast messages. Cisco uses Link Aggregation to prevent broadcast storm. Spanning Tree Algorithm can also be used.
Proxy arp
Symptoms: The proxy server is not functional. Causes: The proxy settings are misconfigured or down. may lead to DoS attacks. Resolution: Correct the proxy settings to resolve the issue.
Bad/Missing Routes
Symptoms: The router is sending packets using an invalid path. Causes: The router setting is incorrect. Resolution: Check and change the router setting and reboot the router for the changes to be effected.
Incompatibilities
Symptoms: The wireless device is not accessible from the client. Causes: The settings on the wireless device is not compatible with the clients. Resolution: Check the configuration of the wireless modem by accessing the web admin interface. Verify that the client systems can support the same configuration. ID the configuration supported on both the client and the server and apply the same on the wireless device and the client systems.
Incorrect channel
Symptoms: The wireless signal is not accessible even within the expected range. Causes: Most common cause could be another wireless device or application that operates at the same frequency level creating a conflict. Resolution: ID the conflicting device and move it to another location that is outside the reach of the Wireless access point. If you can't relocate it change the channel of one of the devices.
Power Failure
Symptoms: There is a power failure that affects switches and routers. Causes: Switch and router adapters connect to cable modems which depend on the availability of power. Resolution: Use cable modems and other network devices w/ battery backed power supplies to ensure that there is uninterrupted service of several hours in case of local power failures.
Routing loop
Symptoms: There is a routing loop on the network. Causes: Packets are routed in a loop. Resolution: Recheck the router configuration and adjust it to prevent a routing loop.
Switching Loop
Symptoms: There is a switching loop on the network Causes: Packets are switched in a loop Resolution: A switching loop needs STP to ensure loop free switching of data. Rework on the network arrangement and cabling to prevent the switching loop. Use Spanning Tree protocol - it will turn off those redundant links.
Channel congestion
Symptoms: Very slow speeds Causes: Interference from neighboring wireless networks; congested network channels. Resolution: Many wireless routers are set to autoconfigure the same wireless channel. log into the router and manually change the channel the wireless router is operating on.
Configurations
Symptoms: Wireless modem is active, but clients cannot access the Internet. Causes: Configuration of the wireless modem is incorrect. Resolution: Check wifi modem configuration via the web admin interface. Cehck the encryption type, SSID and pass phrase text that is specified and confirm that the wifi modem was rebooted after the configuration change. Check that the clients can support the same encryption type. Verify that the same SSID and key phrase are defined in the network connection. Verify that the wifi receiver on the desktop system is configured properly w/ correct compatible drivers installed.
Electrical Shorts
Symptoms: complete loss of signal Causes: 2 nodes of an electrical circuit that are meant to be at different voltages create a low resistance connection causing a short circuit. Resolution: Use a TDR to detect and locate shorts. Replace cables and connectors.
Cable problems
Symptoms: nodes on the network cannot communicate. the routers, switches and individual nodes on the network work but the problem still persists. Causes: problems with network cables. Resolution:Identify the issue with the network cable and determine a suitable solution.
X.25 connections utilize a clocking circuit that makes them ________.
Synchronous
SDSL
Synchronous DSL. Upstream and downstream speeds are equal. Doesn't support existing phone line; no user installation; typical downstream & upstream speeds of 284Kbps-2.0Mbps.
SNIPS
System and network Integrated Polling Software: A system and network monitoring software tool that runs on UNIX systems. It offers both a command-line and web interfaces to monitor network and system devices. The monitoring functions of SNIPS determine and report the status of services running on the network.
System
System events track high-level changes to a computer that are not included in other categories and that have potential security implications.
Loopback
The 127 network is reserved for testing, known as "loopback". For example, 127.0.0.1. the usable starting IP for class A is actually 1.0.0.0. In any given network, the first and last addresses are reserved and can't be assigned to other comps. or other hosts. Example: in the 192.168.1.0 network, 192.168.1.1 through 192.168.1.254 can be assigned, but 192.168.1.0 is reserved for the network number, and 192.168.1.255 is reserved for the broadcast.
Global Object Access Auditing
The Global Access Auditing settings define computer SACLs per object type for either the file system or registry. The specified SACL is then automatically applied to every object of that type. • Auditors will be able to prove that every resource in the system is protected by an audit policy by just viewing the contents of the Global Object Access Auditing policy settings. • Resource SACLs are also useful for disanostic scenarios. For example, setting a Global Object Access Auditing policy to log all the activity for a specific user and enabling the Access Failures audit policies in a resource (file system, registry) will help administrators quickly identify which object in system is denying a user access.
You've been instructed by your IT Director to manually configure a new computer with an IP address, subnet mask, DNS server, and a default gateway. What is a default gateway?
The IP address of the nearest interface of a router directly connected to the LAN
Platform
The OS that a computer uses.
What is an initial step in diagnosing general connectivity problems?
The Ping Utility. It is the most commonly used ICMP command.
reiserfs
The Reiser file system (ReiserFS) is a newer Linux file system that calculates and proposes the best options for the file system. Because ReiserFS was independently built from the ground up, its journaling capability is native and more robust, offering a great deal of reliability. It is also more efficient at storing small files than other file systems. However, data corruption can occur if power goes out during disk synchronizations. Also, defragmentation tools are not available for this file system.
Wi-Fi (Wireless Fidelity)
The common name for standards for a local wireless network as defined by IEEE 802.11.
FIN_WAIT_1 socket state
The connection is active but closed.
Kernel
The core of the operating system that manages memory and devices, maintains the computers clock, starts programs, and assigns the computers resources, such as devices, programs, data, and information.
Which two statements are true about Microsoft security zones?
The default security level for Local intranet and Trusted sites in the same. Internet Explorer has four security zones
OS boot record
The first sector in the active partition. Windows XP uses this sector during the boot, but Windows 7/Vista does not.
administrative share
The folders that are shared by default on a network domain that administrator accounts can access.
default gateway
The gateway a computer on a network uses to access another network unless it knows to specifically use another gateway for quicker access to that network.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
The group or suite of protocols used for almost all networks, including the Internet.
Top-level domain
The letters after the period (Examples are .com (commercial), .org (nonprofit), .gov (government), and .info (general use).)
MAC address & MAC filtering
The media access control address of your network adapter identifies it on most LANs. Exa: 00-12-23-A4-BA-F8. This number is burned into the PROM chip of the adapter. MAC filtering is a technique used to the secure the router by only allowing computers with certain MAC addresses. These exceptions are burned into the router's firmware; aside from disabling the SSID and using encryption, this is one of the most common ways to secure a router.
Port forwarding
The method of forwarding external visitors through a router to a specific computer. For example, let's say you have an FTP server within your LAN with an IP address of 192.168.0.250. An external client wants to access your FTP server. The server has a specific port open on it to accept file transactions (say, port 21), but the client can't connect directly to the server; it first has to go through the router. In order to do this, it must know the router's public IP address, and the router needs to know the inbound port open on the FTP server. So the client sends a request to the router, which then knows that the client wants access to the FTP server; so it forwards the appropriate data packets from the clients to the address 192.168.0.250, or whatever port is open.
Which of the following statements is not true regarding FSRM quotes?
They can be configured to create event log entries only.
Service Set Identifier (SSID)
The name of a wireless access point and wireless network.
NTFS
The new file system that supports up to 256 TB of data.
POP3
The newest standard of POP (Post Office Protocol) which downloads emails from the server into a folder on a local system. It is generally not recommended for users who switch computers a lot, because their emails will end up on multiple computers. Solutions to this are programs like Windows Remote Desktop, which connect remotely to the mail server and download emails to whatever computer the user is using.
Offset
The number of units (often bytes) from a starting point. Usually a nonnegative integer. Starting point's offset is 0.
NETSTAT -o
The process ID associated w/ each connection
name resolution
The process of associating a character-based name with an IP address.
booting
The process of starting up a computer and loading an operating system.
TCP (Transmission Control Protocol)
The protocol in the TCP/IP suite of protocols that works at the OSI Transport layer and establishes a session or connection between parties and guarantees packet delivery.
Troubleshooting
The recognition, diagnosis and resolution of problems.
Which of the following are true regarding the recovery partition on a Windows system?
The recovery partition can be used to restore the system to its original state when it shipped from the manufacturer.
Maximum Transition Unit (MTU)
The size in bytes of the largest protocol data unit that the layer can pass onwards.
technical documentation
The technical reference manuals, included with software packages and hardware, that provide directions for installation, usage, and troubleshooting. The information extends beyond that given in user manuals.
Safe Mode
The technique of launching Windows with a minimum configuration, eliminating third-party software, and reducing Windows startup to only essential processes. The technique can sometime launch Windows when a normal Windows startup is corrupted.
If there is a bad connection, this usually means...
There are no bytes in the send or receive queues.
regsvr32
This command-line tool registers .dll files as command components in the registry.
IPv6 subnet
This defines the individual subnet of the network that the address is located on.
Interface ID
This is the individual host IP portion. It can be assigned to one interface or more than one interface, depending on the type of IPv6 address.
Layer 4 - Transport Layer
This layer ensures error-free transmission between host through logical addressing. Inbound & outbound ports are controlled in this layer. Ports = transport layer.
Layer 5 - Session Layer
This layer governs the establishment, termination, synchronization of sessions within the OS over the network and between host. Think log on, log off
Layer 7 - Application Layer
This layer is where message creation and packet creation begins.
Layer 6 - Presentation Layer
This layer translates the data format from sender to receiver in the various OSes that may be used. Exp = code conversion, data compression, and file encryption.
pin
To add a shortcut to a folder or application on the Start screen or other location.
What is a common first step when dealing with TCP/IP networking problems?
To verify that the host's IP addressing information is correct, using IPconfig or IFconfig.
The ____ network architecture is physically a star, but logically a ring.
Token Ring
T3
Trunk carrier 3= 28 T1s, will come into a company as 224 wires or thereabouts and must be punched down to a DSX or like device.
How could you get traffic from a protocol that is unroutable, through he internet?
Tunnel It
FAT Region or FATs
Two (usually) copies of File Allocation Table: Tracks use of clusters. Links clusters of files (and directories).
client/server
Two computers communicating using a local network or the Internet
Dongle
USB device which serves a key to use software. Losing the dongle is the same as losing the software license or copy. $$$$$$$$
10BASE-T
UTP Cat3 cable w/ RJ-45 connector. AKA, Ethernet. Max speed of 10Mbps, supports star topology, can be up to 100 meters per segment.
100BASE-TX
UTP Cat5, 5e or 6 cable w/ RJ-45 connector. AKA, Fast Ethernet. Max speed of 100Mbps, supports star topology, max distance of 100 meters per segment.
1000BASE-T
UTP Cat5e or 6 cable w/ RJ-45 connector. AKA, Gigabit Ethernet. Max. speed of 1000Mbps, supports star topology, max distance of 100 meters per segment.
Tone generators and tone locators can only help you differentiate between WHAT?
UTP cables.
Configuring proxy server settings in IE 8
Under the Connections tab of Internet Properties, click LAN settings. You can then enable the use of a proxy if you wish, and specify a specific address & port number to use for all Internet traffic. However, you can also click Advanced, and assign different proxy server addresses & ports for different types of sites (http, https, ftp, etc.). You can also enter specific web addresses that are exceptions to the proxy server settings, so if you want to access a secured HTTP site but you don't want to use a proxy, you can set that specific address as an exception.
TCP/IP Configuration with a DHCP server in the network
Under the general tab in Internet Protocol Properties, you can configure whether or not you want to automatically obtain IP and DNS server information automatically when a DHCP server is used on the network.
Three types of IPv6
Unicast, Anycast, and Multicast
UNC
Universal Naming Convention. Enables users to access network resources like folders or printers without mapping drive letters to network drives or specifying the type of device that stores the file/hosts the printer. It has the following structure: \\servername\share name\path\filename. Exa: \\Tiger1\O\NetDocuments\this_doc.doc. \\Tiger1 is the server, \O is the share name, \NetDocuments is the path, and \this_doc.doc is the document being accessed.
UTP Cabling
Unshielded twisted pair. UTP cabling is the most common of the major cabling types, and it's name refers to the four twisted pairs of wire surrounded by a flexible jacket. It comes in various grades, of which Category 5e (Cat5e) and Cat6 are the most common standards. These are suitable to use with both standard 10BASE-T and Fast Ethernet networking, and can also be used for Gigabit Ethernet.
Resolving Open, short cables issues
Use cable testers and locate open or short cables. repair the cables and recheck that the issues are resolved if not replace the cables.
Troubleshooting w/ IP configuration Utilities
Use ipconfig or ifconfig to determine if the host is configured for static or dynamic IP addressing and if it has a valid IP address.
Computer Management
Use it to access several snap-ins to manage and troubleshoot a system.
Backup and Restore
Use it to backup and restore user data and the system image and to make a rescue disk.
Chkdsk
Use it to check and repair errors on a drive. If critical system files are affected by these errors, repairing the drive might solve a startup problem.
Group Policy
Use it to display and change policies controlling users and the computer. Is a command prompt.
Device Manager
Use it to solve problems with hardware devices, to update device drivers, and to disable and uninstall a device.
Disk Management
Use it to view and modify partitions on hard drives and to format drives.
Safe Mode
Use it when Windows does not start or starts with errors. Loads the Windows desktop with a minimum configuration. In this minimized environment, you can solve a problem with a device driver, display setting, or corrupted or malicious applications.
How do you delegate group membership management?
Use the Managed By tab in the group object's properties. You can also use the Advanced Security Settings dialog box to assign the Allow Write Member permission directly
Last Known Good Configuration
Use this tool when Windows won't start normally and you want to revert the system to before a Windows setting, driver, or application that is causing problems was changed.
taskkill
Used by Microsoft Windows XP, Vista and 7 to terminate processes.
Wireless LAN Survey Software
Used for wireless planning. Simulates WLAN performance. Can determine network coverage areas
Punch Down Tools
Used in a wiring closet to connect cable wires directly to a patch panel. Strips insulation and embeds wire into the connection at the back of the panel.
66 Block Type of punch down block
Used in the telephone industry to terminate telecommunication. supports low-bandwidth telecommunications transmission.
Punch Down Blocks
Used to connect one group of telephone and network wires with another group in utility or communication closets. Typically support low-bandwith Ethernet and Token Ring networks.
T1 Crossover
Used to connect two T1 CSU/DSU devices by using T568B pairs.
Crimper
Used to crimp down an RJ-45 connector onto the cables.
Subnet mask
Used to distinguish between the network and host portions of an IP address. For example, for an IP address of 192.168.1.1, a typical subnet mask would be 255.255.255.0. The "255s" correspond to the network portion of the IP address; the 0s correspond to the host portion.
Sharp cutting tool
Used to make a clean cut on the end of a network cable. Cut pliers or other cable cutting tools are necessary.
Cable Certifiers
Used to perform tests ie. cable testing and validity testing. useful in finding short circuits and other faults. helpful in determining mode of connectivity devices ie. full duplex and half duplex.
Action Center
Used to solve problems when installing a device or application, to solve problems with software or hardware, and get a history of past and current problems.
Wire stripper
Used to strip the insulation off of UTP cabling. You expose the individual wires and then twist them into the correct pinout.
Optical Time-Domain Reflectometer
Used to test fiber optic cabling: Detects fiber length, location of faulty splices, breaks and bends; measures attenuation.
arp eth_addr
Used w/ other options to specify a physical address
arp inet-addr
Used w/ other options to specify an Internet address.
arp if_addr
Used w/ other options to specify the Internet address of the interface whose ARP table should be modified.
defrag -f
Used when needing to defrag a hard drive with less than 15% of its space free.
UDP
User Datagram Protocol. UDP sessions are known as connectionless sessions. If a packet is dropped, it is not asked for again. This protocol is usually used when streaming media sessions. Exa: If you're streaming music and there's a break in the song, it means a data packet was lost. However, by the time the packet is resent, you'll have moved on, and now the song is all messed up. (check table)
anonymous users
User accounts that have not been authenticated on a remote computer
Graphical User Interface (GUI)
User interacts with menus and visual images such as buttons and other graphical objects. -Computers with less than 1 GB of RAM work with the Windows Vista Basic Interface.
Command-Line Interface
User interface for an OS devoid of all graphical trappings.
what types of objects can be members of a global group?
Users computers and other global groups from same domain
tree /a
Uses ASCII text instead of extended characters.
Layer 2: Data Link
Uses Switch hardware that uses MAC addressing when deciding on where to send data.
Class C
Uses first three octets as network portion and last octet as the host portion. Range of private IP addresses: uses the range 192.168.0.0 through 192.168.255.255.
Class B
Uses the 1st & 2nd octets as the network portion, uses the 3rd & 4th octets for the host portion. Range of private IP addresses: uses the range 172.16.0.0 through 172.31.255.255.
Class A
Uses the 1st octet as the network portion, uses the 2nd, 3rd, and 4th octets for host portion. Range of private IP addresses: uses the entire 10 network, from 10.0.0.0 to 10.255.255.255.
secondary logon
Using administrator privileges to perform an operation when you are not logged on with an account that has these privileges.
Sysprep
Utility built into Windows for image deployment over the network. Preps the system to be moved as an image file.
vfat
VFAT is a FAT32 filesystem for Linux and does not support journaling. VFAT includes long name support. Support for vfat must be compiled into the kernel for the system to recognize the vfat format.
How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?
VPN
permissions
Varying degrees of access assigned to a folder or file and given to a user account or user group. Access can include full control, write, delete, or read-only.
copy /v
Verifies that new files are written correctly.
Step 6 of The Network + Troubleshooting Model
Verify full system functionality and if applicable implement preventative measures.
A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next? A. Flush the cache on the DNS server. B. Reset the user's password on the server. C. Check your router's current routing tables. D. Verify that the DHCP service is available.
Verify that the DHCP service is available
Resolving Cable placement issues
Verify that the cable is placed away from source of EMI. ID and removed the sources of interference.
Resolving Distance issues
Verify that the cables are run only for the maximum distance they are supported. ie.. if an Ethernet cable exceeds 100 meters, the signal will deteriorate.
You are analyzing Frame Relay frames and find that one message consisting of five packets was sent over three different circuits. The three circuits form a _____ circuit.
Virtual
Virtual LANs (VLAN)
Virtual LAN (VLAN) - Segment network by separating devices into logical groups VLAN allows scattered users to be logically grouped together even though physically attached to different switches Can reduce network traffic and provide a degree of security similar to subnetting VLANs can be isolated so sensitive data is transported only to members of the VLAN Switch or tagging protocol can be used
Virtual Private Network Concentrators
Virtual private network (VPN) - Uses unsecured network as if were secure All data transmitted between remote device and network is encrypted Types of VPNs: Remote-access VPN - User to LAN connection Site-to-site VPN - Multiple sites can connect to other sites over the Internet
VoIP
Voice over IP communication. An increasingly popular method for providing home & business telephone access. Routes phone calls over the same TCP/IP network used for LAN and Internet access. In order to add VoIP to an existing Ethernet network, you can either attach an adapter to your existing router or get a VoIP router that replaces the existing router.
What type of communications is defined at the lowest three layers of the OSI model?
WAN protocols
Which of the below is a 64 bit Wireless Encryption Protocol? AES TKIP WPA 2 WEP
WEP Wired Equivalent Privacy (WEP), and its weaker security level is discussed here. Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts transmitted data . ... (40-bit and 64-bit WEP encryption are the same thing — 40-bit devices can communicate with 64-bit devices.)
Service in Windows resolves NetBIOS names to IP addresses. WINS DHCP DNS ARP
WINS: Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.
____ provides the strongest encryption fora wireless network.
WPA2
Web Services
Web applications created with many programming languages or any operating system to communicate data seamlessly
Roles installed
What impacts the types of logs and events logged on a server?
Application control policies
What is AppLocker also known as?
Security template
What is a collection of configuration settings stored as a text file with an .inf extension?
Stateless
What is known as pure packet filtering, does not retain memory of packets that have passed through the firewall.
Nothing—the application is Windows Installer-enabled
What is required to prepare applications with an approval stamp from Microsoft on its packaging, including the Certified for Windows Server 2012 logo, for Windows Installer?
Inbound & outbound ports
When a computer wants to communicate with another, they must both use the same protocol. For example, if a computer wants to access http://www.google.com, it uses Hypertext Transfer Protocol to communicate with a server called "google.com". HTTP selects an unused port on your computer called an "outbound port" to send and receive data from google.com. On the other end, Google's server has a specific port open at all times to accept sessions; this is called an "inbound port"; in most cases, this is port 80.
Port triggering
When a firewall opens a port because a computer behind the firewall initiates communication on another port.
DNAT (Destination Network Address Translation)
When a firewall using Network Address Translation (NAT) allows uninitiated communication to a computer behind the firewall through a port that is normally closed.
Assigning forces the application, whereas publishing provides the option to install.
When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?
File location rule
When configuring software restriction policies, there are four rules that help determine the programs that can or cannot run. Select which of the following is NOT one of those rules.
Allowing an application opens the specified port only while the program is running, and thus is less risky.
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
When the computer starts up
When does Windows apply Computer Configuration policies by default?
As the user logs in
When does Windows apply User Configuration policies by default?
Windows Installer package files, or .msi files modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files.
When installing software using Group Policy, what file or files does an administrator use?
When you join a computer to an AD DS domain, you can create new local user accounts with the Local Users and Groups snap-in. Control Panel is used when the computer is not a member of an AD DS domain.
When would you need to create a user account through Control Panel?
Encryption Key
When you mark a file for encryption, Windows generates a large, random number—a unique encryption key.
EFS certificate
When you're logged on to Windows and attempt to open an encrypted file, Windows retrieves your personal EFScertificate.
root directory
Where Windows stores folders and important files that it needs when you turn on the computer.
PPTP
Which VPN technology is the most common and the easiest to set up?
Application
Which layer in the OSI model covers HTTP, FTP, and RDC?
Physical
Which layer in the OSI model includes the cable and network adapters?
Data Link
Which layer of the OSI model includes VLANS?
Session
Which layer of the OSI model is used to create a connection so that a host can transfer files?
peer-to-peer
Which model has each host have their own security database?
full-duplex
Which of the following does a switch use for increased performance?
67
Which of these ports does DHCP use?
Well-Known Ports
Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?
UDP
Which protocol do you use as the transport protocol for a video application?
WINS
Windows Internet Naming Service. Matches the NetBIOS name of a particular computer to an IP address on the network; this process is also called resolving or translating a NetBIOS name to an IP address.
mesh
Which topology is the most redundant and the most expensive?
Packet filtering
Which type of firewall blocks packets based on rules that are based on IP addresses or ports?
WPA
Wi-Fi Protected Access. A security protocol developed by the Wi-Fi alliance to secure wireless networks. It uses the TKIP encryption protocol and replaces WEP. WPA uses an alphanumeric key that can be as long as 63 characters. It can use either Temporal Key Integrity Protocol (TKIP) 128-bit encryption, or 128-256 bit Advanced Encryption Standard (AES). WPA using AES is often referred to as WPA2. The latest version is WPA2, which is more secure than WPA.
WAN
Wide Area Network. LAN networks in different places that are connected over a bigger network. Each LAN requires a router and high-speed connection provided by a telecommunications company to connect to each other.
Simple Cable Tester
Will determine whether a cable has an end to end connection and can detect shorts or opens but cannot certify the cable for transmission quality.
Windows Mobile, Palm OS, Blackberry
Windows Embedded CE- scaled down Windows OS used in VoIP telephones, industial control devices, digital cameras, security robots, ticket machines... Windows Mobile-OS based on windows embedded CE, smart phones and PDA's also called Pocket PC Palm OS includes handwriting-recognition software Blackberry-supplied by RIM
.wfw
Windows Firewall allows an administrator to import and export firewall rules. What are the rules' file extension?
You can create a new Group Policy Object and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.
Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?
Domain, private, and public
Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?
ports, protocols, applications, users, and IP address ranges
You can configure the Windows Firewall to allow or block specific _________.
DNS - Domain Name System
Worldwide service that resolves host names to IP addresses, facilitates proper communication between computers
bootrec /fixboot [drive]
Writes a new boot sector onto the system partition using the boot sector compatible with Windows 7.
What WAN technology will you use be troubleshooting if asked to troubleshoot a technology with a maximum data transfer rate of Kbps.
X.25
In which of the following situations would restoring from a backup be the best option?
You accidentally deleted several important e-mails and need to restore them. You need to restore several word processing files that were accidentally deleted from your Documents folder.
You must create a distribution share, also called a software distribution point. Then create the Group Policy Object, specifying how to deploy the application.
You want to deploy software using Group Policy. What is necessary before assigning the software to a user account?
1. Specify the correct order of steps necessary to creating a system restore point.
__1___ Log on with local administrative privileges. __2___ Press the Windows logo key + w and then type System Restore. __3___ Click Create a Restore Point from the results. __4___ Click Configure and make sure the Turn on system protection option is enabled. __5___ Drag the slider to set the maximum disk space you want to use. __6___ Click Apply and then click OK. __7___ Click Create to create a new restore point. __8___ Type a description for the restore point. __9___ Click Create.
2. Specify the correct order of steps necessary to enabling File History on Windows 10.
__4___ From Results, choose File History. __1___ Log on with local administrative privileges. __5___ Click Turn On. __3___ Press the Windows logo key + w and then type File History. __2___ Connect an external drive.
IP address
a 32-bit or 128-bit string that is assigned to a network connection when the connection is first made.
Back-to back configuration
a DMZ is situated between two firewall devices, which could be a black box appliance or Mircrosoft Internet Security and Acceleration Servers
Boot.ini
a Windows 2000/XP hidden text file that contains information needed to start the boot and build the boot loader menu.
HomeGroup
a Windows 7 feature that enables sharing of files and printers across a small office/home office network
fixboot
a Windows 7/Vista command that repairs the boot sector of the system partition.
fixmbr
a Windows 7/Vista command to repair the MBR. (Master Boot Record)
Boot Configuration Data (BCD) file
a Windows 7/Vista file structured the same as a registry file and contains configuration information about how Windows is started. The BCD file replaces the Boot.ini file used in Windows 2000/XP.
FDISK
a Windows 9x/Me command used to create and manage partitions on a hard drive.
diskpart
a Windows command to manage hard drives, partitions, and volumes.
network discovery
a Windows feature that enables a computer to find other computers and devices (such as printers) on a connected network; also lets a user control whether other computers can see the user's computer on the same network
basic sharing
a Windows feature that enables users to control who may access specific files and folders located in the user's libraries
advanced sharing
a Windows feature that enables users to control who may access specific files and folders located in the user's libraries; offers more options than basic sharing and is therefore the best choice for protecting confidential information
Public folder
a Windows folder that's set up for sharing files and folders with other users on an attached network; Windows 7 Public folders include Public Documents, Public Music, and others
recovery image
a backup of the Windows volume.
Operating System
a type of system software that coordinates all activities among the computer hardware resources
Uninstaller
a utility that removes a program, as well as associated entries in the system files
NAT/PAT
an interim solution invented in the 1990s to the problem of IPv4 not having enough addresses; allowed more than one device to use the same IP address on a private network as long as there was one Internet address available
Which of the following approaches is considered most effective to decommission an older computer before donating it to charity? a. Initiate a PC Reset. b. Initiate a PC Refresh. c. Purchase a third-party disk wipe tool. d. Move all the data off of the hard drive and reinstall Windows manually.
a. Initiate a PC Reset.
Which of the following options will put a PC back to a new state and will reinstall Windows, but delete files, settings, and apps, except those apps that came with the PC? a. Reset b. Refresh c. PC Cleanup d. Windows Undo
a. Reset
Which mode starts Windows with a minimal set of drivers and services? a. Safe mode b. Last Known Good Configuration c. Full mode d. Standard mode
a. Safe mode
Which of the following Windows 10 features is used to create a restore point? a. System Restore b. PC Refresh c. PC Reset d. System Point Restore
a. System Restore
Which of the following does File History not back up? (Choose all that apply.) a. System files b. Documents c. Application files d. Registry settings
a. System files c. Application files
Which of the following allows users to schedule a weekly backup to a secondary disk? a. Using Windows 7 File Recovery b. Using File History c. Scheduling a system restore point d. Creating a Windows 10 File Recovery drive
a. Using Windows 7 File Recovery
truncated
abbreviated IPv6 address by removing unnecessary 0s
Subnetting
act of dividing a network into smaller logical subnetworks.
swapon -a
activates all swap partitions
wireless access point (WAP)
acts as the central connecting device for the network, such as laptops, PDAs, tablet computers, micro computers
T1
actual trunk carrier circuit that is brought into a company, a dedicated high-speed link or have other shared technologies running on top of it like Frame Relay and ISDN
Wireless network adapters
allows connectivity between a desktop computer or laptop and the wireless access point.
single user/single tasking
allows only one user to run one program at a time.Smart phones and PDAs often use
backup utility
allows users to copy or backup selected files or an entire hard disk to another storage medium
Encrypting File System (EFS)
allows users to encrypt information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media. Files and folders are not encrypted in Windows 7 by default; however, users can enforce encryption on data files, folders, and entire drives. Encrypted (EFS) files and folders are displayed in green in Windows Explorer.
Network Operating System
allows users to share resources on a network,administers security by establishing username and password for each user
Terminal Services
also known as Remote desktop services is a type of thin-client terminal server it uses port 3389.
MSCONFIG
also known as the System Configuration utility, lets you enable or disable startup services, set boot options such as booting into Safe Mode, access tools like Action Center and Event Viewer, and more. You'll use this utility mainly to troubleshoot startup problems with Windows.
NAT filtering
also known as the endpoint filtering, filters traffic according to ports TCP or UDP.
anycast address
an IPv6 address assigned to multiple devices; packets are delivered to the closest device
Client-server
an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista.
Intra-Site Automatic Tunneling Protocol (ISATAP)
an automatic tunneling mechanism used to connect an IPv6 network to an IPv4 address space that does not use NAT
Which of the following best describes the time when a manual restore point should be created? a. After completing the installation of a new application b. One day before performing an installation of a new application c. Two days before performing an installation of a new application d. Let Windows 10 perform an automatic restore point on its regularly scheduled interval
b. One day before performing an installation of a new application
nodes
individual computers on a peer-to-peer network
By default, how many days is a file deleted with OneDrive kept in the Recycle Bin? a. 10 days b. 15 days c. 30 days d. 45 days
c. 30 days
write
change folder and file data and atrributes
Which of the following programs restores files through a familiar File Explorer interface? a. OneDrive b. File Explorer History c. File History d. Windows 10 Backup and Restore
c. File History
Which of the following tools best represents the preferred method to back up important documents so that a previous version can be found and restored quickly? a. OneDrive b. OneDrive for Business c. File History d. Windows 7 Backup and Restore
c. File History
Twisted-pair cables
cable most commonly used, copper based cables, 8 wires grouped into 4 pairs, they are twisted to reduce crosstalk and interference.
Boot disk, recovery disk
contains system files that will start computer when computer cant boot.
A fault-tolerant computer
continues to operate when one of its components fails, ensuring that no data is lost, switches to duplicate component and continues to operate.
Print server
controls printers that can be connected directly to the server or are connected to the network.
Worm
copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the system down.
BGP - Border Gateway Protocol
core routing protocol that bases routing decisions on the network path ad rules
mke2fs -j
creates the file system with an ext3 journal
ownership
creator is owner full access
How frequently does Windows 10 automatically create restore points? a. Every 4 days b. Every 5 days c. Every 30 days d. Every 7 days
d. Every 7 days
Which of the following time frames best represents the point at which a restore point should be created? a. Daily b. Weekly c. After performing a major system event d. Prior to performing a major system event
d. Prior to performing a major system event
Which of the following is the best method of data recovery? a. Running scandisk b. Performing Windows updates c. Using an antivirus package d. Using backups
d. Using backups
swapoff -a
deactivates all swap partitions
swapoff
deactivates swap partition
Layer 3 - Network layer
dedicated to routing and switching information to different networks. UOM= Packets
IEEE Institute of Electrical and Electronics engineers 802.3
defines carrier sense multiple access with collision detection or CSMA/CD
Network topology
defines the physical connection of hosts in a computer network.
allow vs deny
deny takes precedence over allow deny permission always override all, regardless of whether the permissions are inherited or explicitly assigned to a file
Personal Firewall
detects and protects a personal computer from unauthorized intrusions
mkfs -i
determines how many inodes are on the partition and uses the same values as -b
What tool is shipped with Windows Server 2008 to initiate a migration of sysvol replication from FRS to the DFS replication service?
dfsrmig.exe
ipconfig
displays IP addresses
nbtstat
displays NetBIOS over TCP/IP statistics for local and remote computers.
netstat -an
displays a list of all the connections to and from your computer in numeric format.
Adware
displays an online advertisement in a banner or pop up window sometimes contains hidden spyware
ipconfig/all
displays information pertaining to your network, TCP/IP configurations including your MAC address
mke2fs -n
displays what mke2fs would do if it created a file system, but does not actually create the file system
Trojan Horse
hides within or looks like a legitimate program such as a screen saver
Packet switching
how data packets are moved over switched wide area networks, such as X.25 and Frame Relay
ipconfig/all
how you get the MAC address in the command prompt
A ____ simply repeats an incoming signal to every computer attached to it.
hub
domain name
identifies a network (the names that appear before the period in microsoft.com,)
Workgroup name
identifies a workgroup
Personal computer maintenance utility
identifies and fixes operating system problems and disk problems
Antivirus Program
identifies and removes viruses in memory, storage media, and incoming files
fully qualified domain name (FQDN)
identifies computer and network to which it belongs
Access Control List (ACL)
identifies the users or groups and their level of access to the folder or file can not move from parition to partition stored in the Master File Table
ghosting
images could be etched permanently on a monitors screen~ reason for a screen saver
troubleshooter
in Windows, a wizard-driven tool that walks a user through a software or hardware issue to help the user resolve it
share permissions
in Windows, permissions that apply to users who connect to a shared folder over a network
full control
includes all other actions and adds the ability to take ownership of and change the permissions on the folder
modify
includes all read & execute and write actions adds the ability to add or delete files
read & execute
includes all read actions adds ability to run programs
After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. ifconfig traceroute ping ipconfig
ipconfig In computing, ipconfig in Microsoft Windows is a console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol and Domain Name System settings.
The ______________ command in Windows CLI will remove the IP address learnt from DHCP. ipconfig /renew ipconfig / release netstat / release ping -a
ipconfig / release First, ipconfig /release is executed to force the client to immediately give up its lease by sending the server a DHCP release notification which updates the server's status information and marks the old client's IP address as "available". Then, the command ipconfig /renew is executed to request a new IP address.
You are required to find the MAC address of you own computer. Which of the below command is used? ipconfig /all ipconfig -an netstat -an ipconfig
ipconfig /all Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. ... Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.
You need to find the MAC address of the network adapter for the computer you are currently working on. What command will give you the information you need?
ipconfig/all
T-carrier or telecommunications carrier system
is a cabling and interface implemented in mid-sized and large organizations that carry data at high speeds generally 1.544 MB or higher.
ISDN - Integrated Services Digital Network
is a digital technology developed to combat the limitations of PSTN, sends data, fax, or talk on the phone simultaneously from one line.
Frame
is a group of bytes packaged by a network adapter for transimission across the network, these frames are created on Layer 2 of the OSI model.
VLAN- Virtual LAN
is a group of host with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.
Unicast address
is a single address on a single interface.
MAC - Media Access Control
is a unique identifier assigned to network adapters by the manufacturer, 6 octets, and written in hexadecimal.
Classless inter-domain routing (CIDR)
is a way of allocating IP addresses and routing Internet Protocol packets. EXP= 192.168.0.0/16, /16 means that the subnet mask has 16 masked bits (1s)
FDDI
is standard for transmitting data on optical fiber cables at a rate of around 100 Mbps
DNS server address
is the IP address of the device or server that resolves DNS address to IP address. This could be a Windows server or a all in one multifunction network device.
Frame Relay
is the advancement of X.25 packet switching, designed for faster connections, packets are referred to as frames and it uses a virtual circuit.
Default gateway
is the first IP address of the device that a client computer will look for when attempting to gain access outside the local network.
NAT
is used to protect an organization's computers and switches on the LAN from possible attacks initiated by mischievous people on the Internet or other locations outside the LAN
The ___________ command is used to check the connection status to and from your computer. netstat -an ping -t arp -a tcpdump
netstat -an However this can provide you with more information than you need. Therefore if you are looking for specific port then you can filter that information. For example to find a connection to web sites or other services using port 80 use this command: netstat -an | findstr :80 Will show all connections on port 80
network interface card (NIC)
network adapter
network adapter
network card, a network interface card, or a NIC
IPv6
new generation of IP addressing for the Internet, can be used in small office networks and home networks. 128-bit 340 undecillion addresses.
interface
node's attachment to a link
What can you use to display information about DNS servers?
nslookup
what can you use to determine what is performing name resolution and if it's doing it correctly?
nslookup
nslookup syntax
nslookup [-option ...] [computer-to-find | - [server] ]
IP conflict
occurs when two computers are configured with the same IP address.
device-dependent program
on that runs only on a specific type or make of computer.
tree
one or more domains that follow the same contiguous namespace
dynamic route
one that has been implemented dynamically with special routing protocols.
static route
one that has been manually entered into the routing table with the route add command.
user interface
ontrols how you enter data and instructions and how information displays on screen
Multi-mode (MM)
optic cable w/ larger fiber core, carries multiple rays of light. used in shorter runs up to 600 meters.
Single-Mode (SM)
optic cable with an optical fiber that is meant to carry a single ray of light, used in longer distance runs 10km to 80km
memory management
optimizing use of random access memory
ntfs copy to same ntfs partititon
removes explicit permission plus will inherit permissions assigned to parent volume or folder
ntfs explicit copy or move to different ntfs partition
removes explicit permission plus will inherit permissions assigned to parent volume or folder
WINS - Windows Internet Name Service
resolves NetBios names to IP address
warm boot
restarting computer that is powered on
An example of a device that associates a network address with an interface is a ___.
router
permissions
rules applied to users and groups to limit actions they can take on shared resources, such as files, folders, drives, network shares, and even printers
Services
run in the background on a Windows system to help the operating system run other programs. The Services console is the central management point of services in Windows Vista and Windows 7.
Elevated Mode
running command prompt as an administrator is also known as
Cross-platform
runs the same on multiple operating systems
disk scanner
searches for and removes unnecessary files,windows vista includes disk cleanup.
Spooling
sending print jobs to buffer instead of directly to printer
DHCP
sends IP information to clients automatically making configuration of IP addresses on the network easier and automated.
Token Ring
sends data logicaly in a ring fashion, Token Ring network are physically connected in a star fashion, but logically a ring.
mke2fs -L
sets the volume label for the file system
Which console can be used to create multiple shares and exercise more granular control over there properties?
share and storage management
netstat -a
shows in depth TCP and UDP connections
tracert
shows paths to a destination on another network
compress
shrink the size of files during the backup process.
File compression utility
shrinks size of files to free up room and improve performance
PAD (packet assembler disassembler)
similar to a router which disassembles packets and sends them to a CSU/DSU which is like a modem for the LAN.
Programs and features
simply browse the list of programs, click the program you want to uninstall, and then click Uninstall on the toolbar. Follow the prompts that display until the program is removed. You might be prompted to restart your computer.
Classless Inter-Domain Routing (CIDR)
slash notation used in classless subnetting (for example: /16)
permissions to copy file
source - read destination -write
permissions to move a file
source - read & modify destination -write
Windows Vista
successor to windows xp containing a new interface and new/enhanced features WV Home Basic- for the basic home user WV Home Premium- also includes Windows Aero with its flip 3D feature WV Ultimate- designed to make mobile user's computers more secure and easier to network. WV Business- for all sizes of businesses WV Enterprise- all features of WV business plus greater levels of data protection and a multi-language interface.
multiprocessing
supports 2 or more processors running programs at the same time. increases processing speed
Application-level gateway - ALG
supports address and port translation and checks whether the type of application traffic is allowed.
/ect/fstab
swap partitions listed here
A ____ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.
switch
Utility program
system software that performs maintenance type tasks, also called utility
nonresident
the instructions remain on the hard disk until they are needed.
schema
the objects and attributes in a database, what they contain, and how they are organized
preemptive multitasking
the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
background
the other programs running but not in use.
File system
the overall structure your computer uses to name, store, and organize files and folders on a hard disk or partition.
Network administrator
the person overseeing network operations, uses the network OS to add and remove users, computers, and other devices to and from the network.
printer sharing
the process of allowing a computer user to share his or her attached printer with other users on a network; the Devices and Printers applet in Windows 7 helps a user manage and share printers
Compression
the process of decreasing the size of files or folders without affecting the files' content. The purpose of compression is to decrease large files that would otherwise use a lot of storage space. Because files often include a lot of redundant, repeated data, compressing them replaces repeated data with pointers to the data. The pointers take up much less space than the repeated data, so the size of the file is reduced.
Encryption
the process of encoding data and information into an unreadable form.
NAT- Network address translation
the process of modifying an IP address while it is in transit across a router, computer, or similar device, hides a person's private internal IP address.
What is booting?
the process of starting or restarting a computer
Command language
the set of commands entered when using a command-line interface.
Which port categories include inbound ports HTTP, HTTPS, FTP, and DNS?
well known ports
NIPS
what type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity?
NIDS
what type of device is used to detect malicious network activities and reports only those issues to the administrator?
thrashing
when an operating system spends much of its time paging instead of executing application software.
Multi-booting
where you choose at startup which operating system you want to load, you might need to format a partition with FAT32 if that partition will run Windows 95, Windows 98, or Windows Millenium Edition.
Network
which layer in the OSI model is used to verify that data was delivered without error?
Data Link
which layer is the OSI model covers routing between networks?
client/server
which model uses a central database for authentication?
Policy change, be aware of the following
• Audit Policy Change- audits changes in security audit policy settings. • Authentication Policy Change- audits events generated by changes to the authentication policy. • Authorization Policy Change- audits generated by changes to the authorization policy. • MPSSVC Rule-Level Policy Change- aduits events generated by changes in policy rules used by Windows Firewall. • Filtering Platform Policy Change- audits events generated by changes to WFP. • Other Policy Change Events- audits generated by other security policy changes that are not audited in the Policy Change category.
Account Logon, Be aware of the following settings
• Credential Validation audits events generated by validation tests on user account logon credentials. • Kerberos Service Ticket Operations- audits events generated by Kerberos service ticket request. • Other Account Logon Events- audits events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. • Kerberos Authentication Service- audits events generated by Kerberos authentication ticket-granting ticket (TGT) request.
DS Access, be aware of the following
• Direcetory Service Access audits events generated when an AD DS object is accessed. • Only AD DS object with a matching global System Access Control List (SACL) are logged. • Events in this subcategory are similar to the Directory Service Access events available in previous version of Windows. • Directory service Changes- audits events generated by changes to AD DS objects. Events are logged when an object is created, deleted, modified, moved, or undeleted. • Directory Service Replication- audits replication between two AD DS domain controllers. • Detailed Directory Service Replication- audits events generated by detailed AD DS replication between domain controllers.
Object Access, be aware of the following
• File System- audits user attempts to access file system objects. • Registry- audits attempts to access registry objects. • Kernel Object- audits attempts to access the system kernel, which include mutexes and semaphores. NOTE: The Audit: audits the access of global system objects policy setting controls the default SACL of kernel objects. • SAM- audits events generated by attempts to access Security Accounts Manger (SAM) objects. • Application Generated- audits applications that generate events by using the Windows Auditing Application Programming Interface (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function. • Handle Manipulation- audits events generated when a handle to an object is open or closed. Only objects with a matching SACL generate security audit events. • File Share- audits attempts to access a shared folder. However, no security audit events are generated when a folder is created, deleted, or its share permissions are changes. • Detailed File Share- audits attempts to access files and folders on a shared folder. Note: the Detailed File share settings logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. • Filtering Platform Packet Drop- audits packets that are dropped by Windows Filtering Platform (WFP). • Filtering Platform Connection- audits connections that are allowed or blocked by WFP. • Other Object Access Events- audits events generated by the management of Task Scheduler jobs or COM+ objects.
Global Object Access Auditing, be aware of the following
• File system- audits a SACL on the file system for an entire computer. NOTE: If both a file or folder SACL and a Global Object Access Auditing policy (or a single registry setting SACL and a Global Object Access Auditing policy) are configured on a computer, then an audit event is generated if an activity matches either the file or folder SACL or the Global Object Access Auditing policy. • Registry- audits a global SACL on the file system for an entire computer. NOTE: Both the File system and Registry settings must be used in combination with their corresponding security policy setting under the Object Access category.
Logon/Logoff, be aware of the following
• Logon -audits events generated by user account logon attempts on a computer. • Logoff- audits events generated by closing a logon session. These events occur on the computer taht was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. • Account Lockout- audits events generated by a failed attempt to log on to an account that is locked out. • IPsec Main Mode- audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotations. • IPsec Extended Mode- audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. • Special Logon- audits events generated by special logons. • Other Logon/Logoff Events- audits other events related to logon and logoff that are not included in the Logon/Logoff category. • Network Policy Server- audits events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These request can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.
System, be aware of the following
• Security State Change- audits events generated by changes in the security state of the computer. • Security System Extension- audits events related to security system extensions or services. • System Integrity- audits events that violate the integrity of the system subsystem. • IPsec Driver- audits events that are generated by the IPsec filter driver. • Other System Events- audits any of the following events; • Startup and shutdown of the Windows Firewall • Security policy processing by the Windows Firewall. • Cryptography key file and migration operations.
Privilege Use, be aware of the following
• Sensitive Privilege Use- audits events generated by the use of sensitive privileges (user rights), such as acting as part of the operating system, backing up files and directories, impersonating a client computer, or generating security audits. • Non Sensitive Privilege Use- audits events generated by the use of non-sensitive privileges (user rights), such as logging on locally or with a Remote Desktop connection, changing the system time, or removing a computer from a docking station.
Account Management, be aware of the following
• User Account Management- audits changes to user accounts. • Computer Account Management- audits events generated by changes to computer accounts, such as when a computer account is created, changed, or deleted. • Security Group Management- audits events generated by changes to security groups • Distribution Group Management- audits events generated by changes to distribution groups. Events are logged only on domain controllers. • Application Group Management- audits events generated by changes to application groups. • Other Account Management Events- audits events generated by other user account changes that are not covered in this category.
In Windows Server 2008 R2, 53 new auditing capabilities have been integrated with Group Policy. Be aware of the following details about the advanced audit policy configuration
• You can configure the Advanced Audit Policy using the Group Policy Management Console by navigating to the Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration node or by using the command line utility auditpol.exe. • The 53 new settings can be used in place of the nine basic auditing settings under Local Policies\Audit Policy to specifically target the types of activities you want to audit and eliminate the unnecessary auditing activities that can make audit logs difficult to manage and decipher. • Using both the basic audit policy settings under Local Policies\Audit Policy and the advanced settings under Advanced Audit Policy Configuration can cause unexpected results; the two sets of audit policy settings should not be combined. • If you use Advanced Audit Policy Configuration settings, you should enable the Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings policy settings under Local Policies\Security Options. This will prevent conflicts between similar settings by forcing basic security auditing to be ignored. • Reason for Access auditing logs the reason, based on specific permissions. why someone had access to specific resources. The reason why someone has been granted or denied access is added to the open handle event. To enable this functionality, the handle manipulation audit policy also need to be enabled.