Mike Meyers Network +

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which item should be found in a security policy? A. Acceptable use policy B. Emergency exit plan C. Service level agreement D. Instruction on how to fill out a change request form

A

Which of the following differentiates a PLC from a DCS controller? A. Sequential control B. Sensors C. Operator D. Actuator

A

Which of the following enables you to use multiple NICs in a computer to achieve a much faster network speed? A. Bonding B. Linking C. SLI D. Xing

A

Which of the following is a common hash function? A. MD5 B. RC4 C. AES D. BMX

A

Which of the following is a duplex fiber-optic connection? A. LC B. RJ-45 C. ST D. SC

A

Which of the following is a proper subnet mask? A. 11111111111111111111111100000000 B. 00000000000000000000000011111111 C. 10101010101010101010101011111111 D. 01010101010101010101010100000000

A

Which of the following is a valid IPv6 address? A. 2001:beacd:beef::1 B. 2001:30f5::3d62::04ffe C. 192.168.1.4:ff45:129g:48fd:1 D. 2001.0470.b33e.23f4.27de.d34a.aed2.1827

A

Which of the following is the most common trunking protocol used in today's VLANs? A. 802.1Q B. 802.1X C. 802.1t D. 802.1z

A

Which of the following statements best applies to an IDS? A. An IDS inspects a copy of all traffic in a network and can respond to detected intrusions with actions. B. An IDS inspects all traffic as it enters a network and can respond to detected intrusions with actions. C. An IDS inspects a copy of all traffic in a network and reports intrusions to a configured user account. D. An IDS inspects all traffic as it enters a network and reports intrusions to a configured user account.

A

Which of these consumer electronics may cause interference with 802.11b wireless networks? A. Wireless telephones B. Wireless televisions C. Cellular telephones D. Television remote controls

A

Which type of access control requires a label to define its sensitivity? A. MAC B. DAC C. RBAC D. VAC

A

What do you call a wireless Ethernet network in infrastructure mode with more than one access point? A. BSS B. EBSS C. WBSS D. ExNet

B

What do you need to install a legal copy of Windows 8.1 into a virtual machine using VMware Workstation? A. A valid VM key B. Valid Windows 8.1 installation media C. A valid ESXi key D. A second NIC

B

What does nslookup do? A. Retrieves the name space for the network B. Queries DNS for the IP address of the supplied host name C. Performs a reverse IP lookup D. Lists the current running network services on localhost

B

What is SONET used for? A. Short-distance, high-speed, fiber-optic transmission B. Long-distance, high-speed, fiber-optic transmission C. Long-distance, low-speed, copper cable transmission D. Short-distance, low-speed, copper cable transmission

B

What is a big advantage to using fiber-optic cable? A. Fiber is common glass; therefore, it's less expensive. B. Fiber is not affected by EMI. C. Making custom cable lengths is easier with fiber. D. All that orange fiber looks impressive in the network closet.

B

What is the /48 prefix of the address 2001:0480:b6f3:0001::0001? A. 2001:480:b6f3:1 B. 2001:480:b6f3 C. 2001:480:b6f3:1:0000::1 D. 2001:480:b6f3:1:0000:0000:0000:1

B

What is the job of a first responder? A. Investigate data on a computer suspected to contain crime evidence. B. React to the notification of a computer crime. C. Power off computers suspected of being used in criminal activity. D. Wipe the drives of computers suspected of being used in criminal activity.

B

What is the maximum distance that can separate a 10BaseT node from its hub? A. 50 meters B. 100 meters C. 185 meters D. 200 meters

B

What is the most common category of UTP used in new cabling installations? A. CAT 5 B. CAT 5e C. CAT 6 D. CAT 6a

B

What is the name of the cable that you use to connect to the console port on Cisco routers? A. Router console cable B. Yost cable C. That funny blue Cisco cable D. Null modem cable

B

What is the signal rate for DS0? A. 1.544 Mbps B. 64 Kbps C. 2.048 Mbps D. 128 Kbps

B

What standard does IEEE 802.3ab describe? A. 1000BaseLX B. 1000BaseT C. 1000BaseCX D. 1000BaseSX

B

What uniquely identifies every NIC? A. IP address B. Media access control address C. ISO number D. Packet ID number

B

When DHCP Discover fails, what process will the client use to generate an address for itself? A. ATAPI (Automatic Temporary Address Program Initiator) B. APIPA (Automatic Private IP Addressing) C. ATIPA (Automatic Temporary IP Address) D. APFBA (Automatic Programmable Fall Back Address)

B

What do routers use to forward packets? A. Source IP address B. Destination IP address C. Source MAC address D. Destination MAC address

B - Routers match the destination IP address to a network in their routing table.

How much data can a typical frame contain? A. 500 bytes B. 1500 bytes C. 1500 kilobytes D. 1 megabyte

B. 1500 bytes

Which of the following best describes an MAC address? A. A unique dotted decimal notation burned into every NIC B. A unique 48-bit identifying number burned into every NIC C. A dotted decimal notation assigned to a NIC by software D. A 48-bit identifying number assigned to a NIC by software

B. A unique 48-bit identifying number burned into every NIC

Which of the following defines what is and what is not acceptable to do on an organization's computers? A. NDA B. AUP C. VPN D. BYOD

B. AUP The acceptable use policy clearly differentiates between right and wrong in terms of using a company's resources.

Which type of diagram represents a topology or map of how the network looks? A. Logical Diagram B. Physical Diagram C. Rack Diagram D. Change management Diagram

B. Physical Diagram A physical diagram represents how a network looks, while a logical diagram represents how the traffic flows on the network.

Which layer of the OSI model makes sure the data is in a readable format for the Application layer? A. Application layer B. Presentation layer C. Session layer D. Transport layer

B. Presentation layer

Which of the following represents a measurement of how the network behaves under normal conditions? A. Baseband B. Baseline C. IDF D. MDF

B. Baseline A baseline is a log of performance indicators such as CPU usage, network utilization, and other values to give you a picture of your network and servers when they are working correctly.

John has two groups of virtual machines that each need to be on their own subnet. Which of the following should he use to subnet each group of virtual machines without moving or re-cabling hardware? A. Virtual NIC B. Virtual switch C. Virtual router D. Virtual firewall

C

Of the topologies listed, which one is the most fault-tolerant? A. Point-to-point B. Bus C. Star D. Ring

C

RC4 is a(n) _______________ cipher. A. block B. forwarding C. stream D. asymmetric

C

Star-bus is an example of a _______________ topology. A. transitional B. system C. hybrid D. rampant

C

The centerpiece of any ICS will be what? A. Sensors B. PLCs C. ICS server D. HMI

C

The protocol developed by Netscape for transmitting private documents over the Internet is known as ___________. A. SSS B. SSA C. SSL D. NSSL

C

The traceroute utility is useful for? A. Configuring routers remotely B. Showing the physical location of the route between you and the destination C. Discovering information about the routers between you and the destination address D. Fixing the computer's local routing table

C

Client to site and Site to Site

Client software is used to connect a single faraway PC to a remote network. This creates a typical host to site or client to site connection.

Load balancing, clustering

Clustering is a form of load balancing which involves multiple pieces of equipment, such as servers, connected, which appear to the user and the network as one logical device, providing data and services to the organization. load balancing can also happen without clustering. When the servers don't know about the others providing the same service independently. This is where a load balancer comes into play.

When running cables through elevator shafts which cable is preferred?

Coax is preferred because it's resistant to radio noise and is much cheaper than fiber.

RG-59

Coaxial cabling to do short-distance video

RG-6

Coaxial cabling to do television, digital cable Internet

NIC teaming

Combines multiple physical interfaces on a router or switch into one logical interface

ACK/NACK

Communication rules that require both the sending and receiving machines to acknowledge the other's presence and readiness to send and receive data.

BGP protocol

CompTIA Network + lists BGP as a hybrid routing protocol, because it can be used both within your backbone routers and between your backbone routers and other AS routers.

MAC address lookup table

CompTIA is referring to the Source Address Table (SAT) that switches use to map MAC addresses to port when using this term

ICMP (Internet Control Message Protocol)

Connectionless communications that never need more than a single packet; Handles maintenance issues like disconnect which makes the host unreachable; Applications use ICMP to send status information to the other end of a session; Most commonly used with ping. You can open or close it through port 7.

Symbology

Consistency is key when using symbols for networking devices on diagrams. Routers are usually depicted as circular objects, while switches are rectangular.

Control traffic based on network data, filters e-mail to avoid malicious software, phishing, and viruses. Filters URLs by web site category

Content Filters

What is disastrous to a large network and solved by IP addressing so LANs can communicate with other LANs?

Continuous broadcasting

Packet shaper, traffic shaper

Control by bandwidth usage or data rates; Set important applications to have higher priorities than other apps; Manage the Quality of Service

8-bit chunks 8000 times

Converting analog sound into 8-bit chunks 8000 times a second creates a data stream (called a digital signal) of 8x8000 = 64 kilobits per second (Kbps) This digital signal rate is known as DS0. Each analog voice call gets converted into DS0 signal at the telephone company's central office. From three the calls are multiplexed into larger circuits.

Differential backup

Copies all the files that have been changed since the last full backup. It doesn't turn off the archive bits.

hop count

Counts the number of routers between a network

A content switch always works at least at which layer of the OSI model? A. 2 B. 3 C. 4 D. 7

D

An SNMP manager listens on which port when used with TLS? A. 161 B. 162 C. 10161 D. 10162

D

An SSL URL connection starts with which prefix? A. http B. www C. ftp D. https

D

An attack where someone tries to hack a password using every possible password permutation is called what? A. Man-in-the-middle B. Spoofing C. Rainbow D. Brute force

D

BRI ISDN uses_______. A. 1 B channel and 24 D channels B. 24 B channels and 1 D channel C. 1 B channel and 2 D channels D. 2 B channels and 1 D channe

D

IDS and IPS in the event of an attack

If the IDS goes down then traffic will continue to flow. If the IPS goes down traffic stops there.

multifactor or two-factor authentication

If you use passwords and one or more other form of authentication

IPsec

If you use this protocol found with IPv6, every packet sent from your system is encrypted

Local Authentication

If you're not autenticating to a domain controller with Kerberos, you will be logging in to a specific machine. This is known as local authentication, as your credentials are stored on the actual machine you're logging in to, and not a separate server.

64-bits

In IPv6 what are the maximum number of bits for the subnet? This is because the last ____ bits are generated by the NIC card.

Ring topology

In a ring topology network the data traffic is moved in a circle from one computer to the next in the same direction. Does not require a termination since its a circle.

Certificate scenario

In our scenario the bank gives the CA their public key but keeps their private key secret. The CA constructs a digital certificate, signs it, and gives it to the bank to put in the root of their website. When you go to the bank's website the bank presents this digital certificate to your browser. Your browser comes up with a pseudorandomly generated symmetric key based on recent mouse movements and key presses. The browser encrypts the symmetric key with the bank's public key, which is a field in the digital certificate. The bank's private key decrypts the symmetric key. Now both sides have a shared secret.

Incremental backup

Includes only files with the archive bit turned on. In other words, it copies only files that have been changed since the last full or incremental backup. This backup turns off the archive bits.

Destination Port| Source Port | Sequence Number | Checksum | Flags | Acknowledgement | Data

Information in a TCP segment

Exam Tip (Modems)

Internal modems are both a UART and a modem. External modems use a serial or USB port. Th serial or USB port contains the UART, so the external modem truly is just a modem.

Which layer of the TCP/IP model includes IPv4, IPv6, ICMP, IGMP

Internet

What Layer of the TCP/IP model does the IP work?

Internet Layer 2

NIC teaming/port aggregation

Involves joining two or more connections ports logically in a switch so that the resulting bandwidth is treated as a single connection and the throughput is multiplied by the number of linked connectors.

IP Address Management (IPAM)

Is used for planning, tracking, and managing IP addresses by integrating DNS and DHCP.

Dynamic IP address, implemented through Dynamic Host Configuration Protocol (DHCP) does what?

It automatically assigns an IP address whenever a computer connects to the network.

LDAP and active directory.

It can talk to Active Directory and other directory service providers to query and modify items. It uses TCP and UDP ports 389 by default.

Stateless DHCPv6 is what?

It is when the DHCPv6 server doesn't give an IPv6 address/subnet mask pair or a default gateway IP address to DHCPv6 clients, but does give other important information, like IPv6 addresses of DNS servers.

multi speed autosensing NIC

It negotiates speed with the switch to determine the other's device speed and matches.

What is a broadcast domain?

It represents a set of devices that can hear broadcast traffic from each other.

Fibre Channel

Its own ecosystem designed for high performance storage. It has its own cables, protocols, and switches all increasing the cost associated with its use.

Accounting

Keeping track of users and their actions. Admin perspective like login attempts etc.

Fiber cable connectors include

LC, ST, SC, APC, UPC and MTRJ

Infrastructure as a Service (Iaas)

Large scale global Infrastructure as a Service (IaaS) providers use virtualization to minimize idle hardware, protect against data loss and downtime and respond to spike in demand. i.e. AWS.

The layer of the OSI model which includes signaling, cabling, connectors, hubs

Layer 1 - Physical

Network media and connectors and the electrical signals traveling over them are represented by standards at Layer

Layer 1 the physical layer.

Where does some proprietary encryption devices fall on the OSI model?

Layer 2

Which layer of the OSI model do MAC addresses belong to?

Layer 2

Switches work at which layer?

Layer 2 Switches are Layer 2 devices that forward frames based on their destination MAC address but also learn where hosts are, by mapping the source IP address in a frame to their interface on which it was heard.

Which layer of the OSI model is considered the switching layer (Frame, MAC address, EUI-48, EUI-64, Switch)

Layer 2 - Data Link

Frames

Layer 2 PDU

Routers work at which layer?

Layer 3 Routers are devices that forward packets based on their destination IP address.

Which layer of the OSI model does the ping command work? Which layer of the OSI model is considered the routing layer? (Ip Address, router, packet, IP in TCP/IP)

Layer 3 - Network

Internet Layer (TCP/IP Model)

Layer 3 OSI model

Routers inside of switches are sometimes called?

Layer 3 Switches; Layer 2 Switch, Layer 3 Router

Which layer of the OSI model is considered the "post office" layer (TCP segment, UDP datagram)

Layer 4 - Transport

TCP and UDP exist at which layer of OSI?

Layer 4 is where the sending application chooses between connection - oriented TCP and connection-less UDP.

Which layer of the OSI model contains Control protocols, tunneling protocols?

Layer 5 - Session

Which layer of the OSI model contains encryption such as SSL/TLS

Layer 6 - Presentation

Which layer of the OSI model contain HTTP, FTP, DNS, DHCP, and so on.

Layer 7 - Application

1024 - 49151; registered ports

Less common TCP/IP applications register their ports with IANA

Which part of the TCP/IP model includes Address Resolution Protocol (ARP)

Link

How do link state routing protocols work?

Link state routing protocols simply announce and forward individual route changes as they appear.

What is one advantage of the UDP protocol?

Little overhead

Network people usually classify networks into two categories.

Local area network which covers small areas and contains a modest number of computers. Wide area network covers a large area and can have a substantial number of computers.

Virtual definition

Local lingo: The virtual in virtual NIC, virtual switch, virtual router, and virtual firewall means that what would normaly be a hardware device is software instead.

Client/server, peer-to-peer, VPN, VLAN

Logical network topologies

Fiber cable length in runs.

Long cable runs are possible with some types of cable up to 80km.

What creates and addresses the frame?

MAC

MAC filtering

MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network. The MAC of the NIC is the identifier.

A router is to network IP's what a switch is to __________.

MAC addresses

Two names MAC addresses may be referred

MAC-48 or EUI-48; EUI stands for Extended Unique Identifier

characteristics of service

MPLS, ATM, Frame Relay, PPP, PPPoE, DMVPON, and SIP trunk.

Determines the largest frame a particular technology can handle. Ethernet uses 1500 byte frames, but some use smaller. In the event an IP packet is too big for a particular technology, that packet is broken into pieces to fit into the network protocol in what is called fragmentation. This allows you to set the optimal size before IP packets are sent to avoid or reduce fragmentation.

MTU (Maximum Transmission Unit)

What is Port Mirroring?

Many managed switches have the capability to copy data from any or all physical ports on a switch to a single physical port.

A (Address) records

Map hostnames of FQDN's to IPv4 address

Facts about 802.11ac

Max throughput: 1.3 - 3.4 GBps Max range: 100ft Frequency: 5 GHz Compatible with 802.11a

Facts about 802.11b

Max throughput: 11Mbps Max Range: 300ft Frequency: 2.4 GHz

Facts about 802.11g

Max throughput: 54Mbps Max range: 300ft Frequency 2.4GHz

Facts about 802.11n

Max throughput: Up to 600Mbps Max range: 300ft Frequency: 2.4/5 GHz Compatible with a/b/g

bandwidth

Maximum amount of data that goes through the cable per second

Facts about 802.11a

Maximum throughput: 54 Mbps Max range: 150ft Frequency: 5GHz

802.11a networks use which topology type?

Mesh

block ciphers

Most algorithms are called this because they encrypt data in single "chunks" of a certain length at a time.

OSPF (Open Shortest Path First)

Most common used Interior Gateway Protocol; requires a great deal of computational power, so not found in inexpensive home routers; An interiror gateway protocol; sends hello packets when changes are made

How often to back up

Most companies do a big weekly full backup. Followed by incremental or differential backups at the end of every business day.

Uses port numbers to map traffic from specific machines in the network. It's translation table swaps the private IP address to it's public IP address on each packet.

PAT (Port Address Translation;)

Port 110

POP3 Port; E-mail delivery

PPPoE (Point-to-Point Protocol over Ethernet)

PPP running over an Ethernet network. Most SOHO routers come with this built in..

What is the name of the data packaged at the Network layer 3 of the OSI model?

Packets

baseline

Part of any proper performance monitor is the facility to create a baseline. a log of performance indicators such as CPU usage, network utilization, and other values to give you a picture of your network and servers when they are working correctly.

Termination points include

Patch panel, fiber distribution panel, 66 block, 110 block.

PAN

Personal Area Network also WPAN (wireless) i.e. bluetooth, infrared

topology

Physical diagrams show a map or topology of the network. Logical diagrams show how network traffic flows, and where it's contained.

Bounded media includes

Physical networking cabling copper and fiber

Describe what physical and logical topologies are

Physical topologies describe the way the network loks while logical topologies describe how the network behaves in regard to network traffic.

What is PoE and what IEEE standard supports it?

PoE is Power over Ethernet, which enables them to receive their power from the same Ethernet cables that transfer their data. This is covered in IEEE 802.3af

A single computer system acts as a common source through which all members of the network converse.

Point to multipoint

Two computers connect directly together with no need for a central device of any kind.

Point to point

coaxial cable

Popular with satellite dishes, over-the-air antennas, some home video devices, and cable

The most common form of NAT is what?

Port Address Translation (PAT) - uses port numbers tomap traffic from specific machines in the network.

80

Port number for HTTP

110

Port number for receiving e-mail messages from e-mail servers (POP3)

Programs send and receive data across

Ports. They send from and listen on certain ports. Port scanning is a method to find what programs or services are running on a machine. Once you know what services are running on a machine, you can identify vulnerabilities for certain services. For each vulnerability you'll find an exploit, and execute a payload to carry out the attack.

Spanning Tree Protocol (STP)

Prevents bridging loops.

TACACS+

Proprietary to Cisco, and functions like RADIUS; separates authorization, authentication and acounting. Terminal Access Controller Access Control System Plus. is a protocol developed by Cisco to support AAA in a network with many routers and switches.

Software defined networking (SDN) does what?

It cuts the control plane of individual devices out of the picture and lets an all knowing program called a network controller dictate how both physical and virtual network components move traffic through the network.

What marks where a service provider's responsibility ends and the company's responsibility begins? A. Multiplexer B. Demarc C. PPP D. ATM

B. Demarc The demarcation point separates the service provider's equipment and the company's equipment and marks where a service provider's responsibility ends and the company's responsibility begins for the functioning of the network.

Which protocol creates the final IP packet? A. NIC B. IP C. TCP D. UDP

B. IP

2.5 - MPLS labels are located between which two layers? A. Layer 1 and 2 B. Layer 2 and 3 C. Layer 3 and 4 D. Layer 4 and 5

B. Layer 2 and 3 Multi-protocol Label Switching labels sit between the Ethernet frame a Layer 2 and the IP packet at Layer 3.

Most fiber-optic installations use LEDs to send light signals and are known as what? A. Single-mode B. Multimode C. Complex mode D. Duplex mode

B. Multimode

Andalyn says complete 48-bit MAC addresses are allocated to NIC manufacturers from the IEEE. Buster says the IEEE only assigns the first 24 bits to manufacturers. Carlos says the IEEE assigns only the last 24 bits to manufacturers. Who is correct? A. Only Andalyn is correct. B. Only Buster is correct. C. Only Carlos is correct. D. No one is correct.

B. Only Buster is correct.

From the options that follow, select the one that best describes the contents of a typical (simplified) network frame. A. Sender's MAC address, recipient's MAC address, data, FCS B. Recipient's MAC address, sender's MAC address, data, FCS C. Recipient's IP address, sender's IP address, data, FCS D. Recipient's e-mail address, sender's e-mail address, data, FCS

B. Recipient's MAC address, sender's MAC address, data, FCS

Which one of these represents a secure CLI remote access protocol? A. Telnet B. SSH C. RDP D. VNC

B. SSH SSH and Telnet use a CLI but only SSH uses encryption. RDP and VNC use a GUI.

Log file storage

It is common to make log file storage cyclical - when a file grows to a certain size, it begins to cycle. Cycling just means that as a new record appears in the file, the oldest record in the file is deleted.

A hacker who sends an e-mail but replaces his return e-mail address with a fake one is ________ the e-mail address. A. hardening B. malware C. spoofing D. emulating

C

A hash function is by definition a ______. A. complex function B. PKI function C. one-way function D. systematic function

C

A static VLAN assigns VLANs to ______. A. IP addresses B. MAC addresses C. ports D. trunks

C

After the unforeseen failure of her Bigfoot-picture-sharing service, bgFootr—which got hacked when she failed to stay on top of her security updates—Janelle has a great new idea for a new service to report Loch Ness Monster sightings. What service would help keep her from having to play system administrator? A. Software as a Service B. Infrastructure as a Service C. Platform as a Service D. Network as a Service

C

Bob is told by his administrator to go to www.runthisantimalware.com and click the "Run the program" button on that site to check for malware. What form of anti-malware delivery is this called? A. Host-based B. Network-based C. Cloud-based D. FTP-based

C

Given the routing table where would a packet with the address 64.165.5.34 be sent? A. To the default gateway on interface WAN. B. To the 10.11.12.0/24 network on interface LAN. C. To the 64.165.5.0/24 network on interface WAN. D. Nowhere; the routing table does not have a route for that address.

C

Identify the network ID section of the following IP address and subnet mask: 10.14.12.43-255.255.255.0. A. 10.14 B. 43 C. 10.14.12 D. 14.12.43

C

In order to have a PKI you must have a(n) ______. A. Web server B. Web of trust C. root authority D. unsigned certificate

C

Jane needs to increase network throughput on a 10BaseT network that consists of one hub and 30 users. Which of the following hardware solutions would achieve this most inexpensively? A. Add a fiber backbone. B. Upgrade the network to 100BaseT. C. Replace the hub with a switch. D. Add a router.

C

Star topology

The star topology uses a central connection box for all the computers on the network. The advantage here is fault tolerance because there are multiple ways to route traffic.

last mile

The telecommunications industry calls the connection from a central office to individual users the last mile.

Telephone characteristics of service

The telephone industry came up with its own types of packets that run on T-carrier and OC line sto get data from one central office to another. These packet switching protocols are functionally identical to routable network protocols like TCP/IP. Frame Relay and ATM. (both are dying today).

MIMO (multiple input-multiple output)

The use of multiple antennas—often at both the transmitter and receiver—to improve communications in IEEE 802.11n and 802.11ac Wi-Fi networks.

MAC addressing

The use of the MAC address to get frames to the proper computer or node. (Really only used on Network+ exam)

SONET

The vast majority of the long distance connections that make up the Internet use a unique type of signal called SONET. SONET was originally designed to handle special heavy duty circuits with names such as T1.

Public Switched Telephone Network (PSTN)

The worldwide telephony network consisting of multiple telephone carriers.

Private and Public and Hybrid.

There are Private and Public variants of SaaS, PaaS, IaaS. Just whether or not you own the hardware. Hybrid mixes some of private and public.

Antenna types

There are basically two types of antennas common in 802.11 networks 1. Omni directional 2. Unidirectional The standard straight wire antennas the provide omni directional radiation are dipole antennas.

Remote File Access

There are several protocols including FTP, FTPS, SFTP, and TFTP

TCP

This protocol involves a handshake. Acknowledgement between "two people" beginning conversation where both parties respond. The same info sent is the same being received. There is a close to the conversation.

Clustering

This is when multiple servers are configured to provide the same service, and are exchanging information and know about each other.

IR (infrared communication)

This is where a device that emits coded infrared light and a second device that reads the code and acts upon it.

MIMO and Channel bonding

This is where the devices use multiple radio signals simultaneously.

plaintext and cleartext

Unencrypted files so data is easily read or viewed. It is not just the case in text files, but binary as well.

FCS (Frame Check Sequence)

Use of binary math called Cyclic Redundancy Check that the receiving NIC uses to verify the data has arrived correctly

SYN

Use to initiate and establish a connection. It also helps you to synchronize sequence numbers between devices.

Wireless controllers are used for what?

Used to configure and control multiple WAPs simultaneously

FIN

Used to terminate a connection.

Privileged user agreement

Users who have access to sensitive data or control over accounts must sign a privileged user agreement to signify that they know the power they possess and will act appropriately at all times.

Identify Policies and best practices

Users who have access to sensitive data or control over accounts must sign a privileged user agreement to signify that they know the power they possess and will act appropriately at all times. Make sure users understand basic password skills, such as sufficient length.

Cloud based DNS.

Using a cloud based DNS provider like Dyn, is a viable option for scalability, predictability and even to avoid a DDos DNS attack.

Jumbo Frames

Usually 9000 bytes long and they reduce the total number of frames moving through the network.

Type 1 and Type 2 Hypervisor

VMware Workstation requires an underlying operating system, so it functions essentially like a very powerful desktop application. Hypervisors that operate in this fashion are called Type-2 hypervisors. Examples: VMware workstation player, Oracle VirtualBox, KVM If you remove the OS altogether and create a bare-metal implementation of virtualization, turning the machine into a machine that does nothing but support virtual machines. Hypervisors that operate in this fashion are called Type-1 hypervisors. examples include VMware ESXi, and Microsoft Hyper-V

What field in the IP address packet header defines the IP address type?

Version: 4 for IPv4 & 6 for IPv6

Example of Virtualization

Virtualization is the process of using special software a class of programs called hypervisors to create a complete environment in which a guest operating system can function as though it were installed on its own computer. (i.e. a VM) i.e. One host system running multiple OS.

VoIP PBX

VoIP is TCP/IP based communication. These communications encompass a range of technologies, including voice, video, and messaging. VoIP PBX can be thought of as a server that registers all enterprise phones. VoIP uses most commonly SIP Session Initiation Protocol. VoIP gateway connects the VoIP PBX to the public switched telephone nework (PSTN).

WAN connections are terminated points

WAN connections are terminated at demarcation points. Devices at the demarc point include a CSU/DSU and a smart jack.

compare and contrast WAN technologies.

WAN technologies include many different service types, including ISDN, T1/T3, E1/E3, OC-3-OC-192, DSL Metropolitan Ethernet, Cable broadband, and dial-up.

Extended Service Set (ESS)

WLANs containing more than one AP are called ESS WLANs. Like BSS WLANs, ESS WLANs operate in infrastructure mode. When you have more than one AP, take care to prevent one AP from interfering with another. Specifically, nonoverlapping channels (that is, channels 1, 6, and 11 for the 2.4-GHz band) should be selected for adjacent wireless coverage areas.

NIC Teaming and Port Aggregation

Ways to achieve high speed links between devices without having to upgrade the infrastructure. One of those ways is to join two or more connections ports logically in a switch so that the resulting bandwidth is treated as single connection and the throughput is multiplied by the number of linked connectors.

Most routers come with a built in

Web interface that allows you to manipulate the router.

Ports are organized into three categories

Well known port numbers 0-1023 Registered Ports 1024-49151 Dynamic or Private Ports 49152-65535

0 to 1023

Well-known port numbers for specific TCP/IP

You are asked by your boss to research upgrading all the network cable in your office building. The building manager requires the safest possible cabling type in case of fire, and your boss wants to future-proof the network so cabling doesn't need to be replaced when network technologies faster than 1 Gbps come on the market. You decide to use Cat 5e plenum cabling throughout the building. Which objective have you satisfied? A. Neither the building manager's nor your boss's requirements have been met. B. Only the building manager's requirement has been met. C. Only your boss's requirement has been met. D. Both the building manager's and your boss's requirements have been met.

B. Only the building manager's requirement has been met.

Load balancing

This is where work is shared among various devices, and can also happen without clustering, when the servers don't know about the others providing the same service independently.

stateless

This mode of DHCP in IPv4 only passes out optional information DNS and TFTP info

stateful

This mode of DHCPv6 works like DHCP in IPv4

UDP

This protocol can use more bandwidth and would be used in media streaming, VoIP

ipconfig (/all gives more information)

What command do you use win Windows to get a computer's system IP address and MAC address?

Dotted decimal notation

What is a shorthand way for people to discuss and configure the binary IP addresses computers use?

::1

What is the loopback address for IPv6?

FF-FF-FF-FF-FF-FF

What is the universal MAC address for broadcast?

Payload

Whatever is encapsulated in the frame.

When you line up an IP address with a corresponding subnet mask in binary, the portion of the IP address that aligns with the ones of the subnet mask is

the network ID portion of the IP address. The portion that aligns with the zeros is the host ID.

Without proper controls in place what will happen with switching?

certain redundant connections would cause switching loops.

When you run cleartext through a cipher algorithm using a key, you get what's called ____.

ciphertext

Several standards use encrypted tunnels between a computer such as

client to site, or a remote network (site to site), and a private network through the internet resulting in what is called a VPN or a virtual private network.

Connectivity methods to cloud provider include connecting over the

internet directly, using a VPN, and using a separate connectivity provider to set up a direct, private connection.

A Windows command that gives you a system's IP address & MAC address

ipconfig

Line command that will show you your default gateway, and all DNS information in Windows.

ipconfig /all

Command to refresh a DHCP lease on a computer.

ipconfig /release is a good first step, and then ipconfig /renew

physical address

ipconfig calls the MAC address what?

Metropolitan Area Network (MAN)

is a group of networks connected together in a smaller distance than a WAN

SNMP - Simple Network Management Protocol

is an extensible protocol, meaning it can be adapted to accommodate different needs. uses management information bases (MIBs) to categorize the data that can be queried (and subsequently analyzed). Used to manage network devices such as routers or switches. SNMP agents report information via notifications known as SNMP traps, or SNMP device traps. Ccreates a managed network and consists of at least three components. 1. SNMP manager 2. Managed devices 3. Management information bases

Virtual Network Computing (VNC)

is an open source alternative to RDP and can be run on any operating system.

MMF

is cheaper than SMF and is typically used within a building or between buildings of a campus, due to the short distances required.

When the network is very busy, VoIP calls start to sound badly clipped. What solution might improve the quality of the VoIP calls? A. 802.1z B. Traffic shaping C. DNS D. Content switching

B

When used for Ethernet, unshielded twisted pair uses what type of connector? A. RG-58 B. RJ-45 C. RJ-11 D. RS-232

B

When working inside equipment, what should Jane do? A. Ensure that the equipment is secured to the rack with four screws. B. Wear a properly connected anti-ESD wrist strap. C. Have a fire extinguisher nearby and review its proper use. D. Wear safety goggles and fire retardant gloves.

B

Where does a packet sniffer put information it collects? A. Answer file B. Capture file C. Pocket file D. Sniffer file

B

Which of the following connections would require a crossover cable? A. Router to switch B. Switch to Switch C. PC to Switch D. Switch to Router

B

Which of the following is a protocol popular with Cisco VPNs? A. PPTP B. L2TP C. IPsec D. PPPoE

B

Which of the following is a tool to prevent ARP cache poisoning? A. DHCP B. DAI C. Edge firewall D. DNS snooping

B

Which of the following is a type of coaxial cable? A. RJ-45 B. RG-59 C. BNC D. Barrel

B

Which of the following is an advantage of a virtual machine over a physical machine? A. Increased performance B. Hardware consolidation C. No backups needed D. Operating systems included

B

Which of the following is an example of a MAC address? A. 0-255 B. 00-50-56-A3-04-0C C. SBY3M7 D. 192.168.4.13

B

Which of the following topologies requires termination? A. Star B. Bus C. Mesh D. Ring

B

Which tool enables you to query the functions of a DNS server? A. ipconfig B. nslookup C. ping D. xdns

B

Which wireless networking technology uses the 5.0-GHz frequency range? A. 802.11 B. 802.11a C. 802.11b D. 802.11g

B

What type of hypervisor is runs on top of an existing operating system? A. Type-1 B. Type-2 C. Bare metal D. Oracle

B - A hypervisor the runs on top of a host operating system is a Type-2 hypervisor

TDMA (Time Division Multiple Access)

technology to divide the available user channels by time, giving each transmitting cellular telephone a brief turn to transmit

Equipment room should also have

temperature monitors

What must bus topologies have to prevent the system from going down.

terminators

Stateful DHCPv6 is when

the DHCPv6 server actually emulates a DHCP server in the world of IPv4, by giving out an IP address/ subnet mask pair, an IP address of a default gateway, as well as other information like IP addresses of DNS servers.

Electrical safety in a networking environment covers several topics:

the inherent danger of electricity, grounding and static. Prevent a ground loop wear an electrostatic discharge bracelet when working

Programs and Services

the logical ways networking traffic goes into and out of a machine. A service is a program that runs in the background, independent of a logon. The way into and out of a program or service is through a logical port, which is simply a number found in either the TCP or UDP header that identifies the programs or services that the data is sources from and destined for.

Port 25

SMTP Port; Sending e-mail

FF02::2

The solicitation specific number in IPv6

Which of the following connectors are used by 10BaseFL cable? (Select two.) A. SC B. RJ-45 C. RJ-11 D. ST

AD

1

This is the number usually assigned by network administrators on the LAN-side NIC on the default gateway.

VLAN

This is used by all but the smallest LANs. It allows you to set up physical computers from logical computers.

Two types of twisted pair cabling

UTP and STP.

NFC

(Near Field Communication) e.g. contactless payment debit cards and smartphone NFC chips.

Steps to testing network connectivity as well as troubleshooting the network

* Check the layer 1 issues such as NIC cards, cables * ping the loopback address. * Look at the default gateway by pinging it * Ping outside the network

PVC and Plenum are

UTP cable designations for fire ratings

How long it takes the wire to get a full charge.

capacitance

Three problems resolved by using the Network Address Translation; NAT

* Malicious programmers target IP address * IPv4 available address pool has run out * Leasing an IPv4 address is becoming more expensive.

Items configured in the DHCP server

* Scope - Range of available IP addresses * Subnet mask for the scope * Default gateway for scope * DNS service

Which of the following protocols are used to receive e-mail from servers? (Select two.) A. IMAP B. ICMP C. IGMP D. POP

AD

Which layer of the OSI model is the only one which has sublayers?

Data Link

Which Windows utility would most easily show you open ports on a host? A. netstat B. ping C. ipconfig D. nbtstat

A

Why do we virtualize?

- A single hypervisor on a single system will happily run as many virtual machines as its RAM, CPU, and drive space allow. (Ram is almost always the limiting factor) - A virtual machine that's shut down is little more than a file. (or a few files) sitting on a hard drive. - Power savings - Hardware consolidation - System recovery (snapshot's) - System duplication (file copy) - Research

Broadcast Address

-FF-FF-FF-FF-FF-FF -sent by a nic to ask for the destination MAC address when it doesnt know it.

Remote access policies

-Identifies how remote users can access a network and what is accessible via remote connectivity deal with how corporate resources can be accessed from a remote, offsite location.

If the network ID is directly connected to the router, what number is the IP address of the gateway configured to show in the router table?

0.0.0.0

Class A IP range

1-126

Coaxial Connectors include

1. BNC connector. 2. Modern coaxial cables use screen on F connectors.

Two types of copper cabling are

1. Coaxial 2. Twisted Pair

All cables in networking can be categorized into two groups

1. Copper (UTP, STP, Coax) 2. Fiber-Optic

There are two ways to give a host an IP address, subnet mask and default gateway (as well as other information like IP addresses of DNS servers):

1. Either by typing in all the information (called static addressing) or by having a server program running on a system that automatically passes out all the IP information to systems as they boot up on or connect to a network (called dynamic addressing).

Over Fiber data can be sent via

1. Infrared 2. Laser light Infrared LED uses multimode fiber (MMF) Laser diode based system (mainly used for high speed, long haul data, and telecom links) use single-mode fiber (SMF) cable.

Fiber cable is good for

1. Long distances 2. No line of sight to use other mediums 3. High speed is required 4. Security is a concern 5. EMI 6. Elimination of potential for electrical spark

Diagnosing Layer 2 Switches

1. May be a problem with connected device. 2. Examine switch for obvious damage. 3. Look for link lights. If they are not flashing try a different port. 4. Check cables for damage. 5. Replace the switch or cable with a known good device.

An IP address consists of two portions

1. Network ID: A group of bits, the first part of the address, shared by all hosts on the same network. 2. Host ID: A group of bits, the second part of the address, unique in pattern to each host on the same network.

Types of Updates

1. OS updates 2. Driver updates 3. Feature changes/updates 4. Vulnerability patch 5. Patch tuesday is microsoft's patch day. The second tuesday of every month. 6. Firmware updates

Ports can be in one of three states.

1. Open 2. Closed 3. Filtered Open ports have applications or services listening on them. Closed ports do not. For examples if you start Apache HTTP server, port 80 is open. Stop the Apache HTTP Server, and port 80 is now closed. A filtered port is a port that's either open or closed. but we don't know, because our traffic destined to that port is being filtered by a firewall before it can reach the destination port.

UTP sheaths for cabling have to types

1. Plenum 2. PVC

UTP cable connectors include

1. RJ-45 (RJ= Registered Jack) Telephone use a 4 pin connector known as a RJ-11.

How to patch

1. Research 2. Test 3. Configuration of back ups

Two types of fiber optic cables are

1. Single mode fiber 2. Multimode fiber (MMF)

Hybrid topologies include

1. Star-ring topology 2. Star-bus topology Star-bus is the only one remaining.

Two types of packet filtering

1. Stateless 2. Stateful

Components of fiber cable include

1. The fiber itself 2. The cladding 3. the insulation jacket

What is the IP Range for Class A Private IP?

10

Class A private IP address range

10.x.y.z

Which version of Gigabit Ethernet uses a unique cable known as twinaxial?

1000BaseCX

Which versions of Gigabit Ethernet are published under the 802.3z standard?

1000BaseCX ,1000BaseLX, 1000BaseSX

Of all the gigabit Ethernet standards detailed in the chapter, which maintains a signal over the greatest distance?

1000BaseLX

Which version of Gigabit Ethernet is published under the 802.3ab standard?

1000BaseT

1000 BaseT 1000 BaseLX 1000 BaseSX 10G BaseT Fiber Based 10 GbE

1000BaseT - Gigabit Ethernet on UTP 1000BaseLX - Long distance carrier for Gigabit Ethernet. Uses lasers on single-mode cables to shoot data at distances up to 5km and repeaters up to 70km. 1000BaseSX - multimode fiber optic cabling to connect systems with maximum cable length 220-500 meters 10GBaseT - Offers speeds of up to 10 gigabits per second over STP or UTP copper cables Fiber based 10 GbE - 10GBasesy - short wave length 850mm signal over multi-mode fiber. 10GBaseLy uses long-wavelength 1310nm signal over single mode fiber

POP (Post Office Protocol) uses what port?

110 Obsolete replaced by IMAP. Retrieves email from server; removing it from the server and storing it on the local machine.

802.11b has a throughput of

11Mbs and runs at the 2.4Ghz frequency band

NTP (Network Time Protocol) uses what port?

123 Synchronizes clocks between networked devices

IP address for loopback

127.0.0.0 - 127.255.255.255.255

What is the Loopback IP address?

127.0.0.1

local loop back in IPv4

127.0.0.1

Class B IP range

128-191

What is the size of the wave length used by 1000BaseLX fiber-optic cabling?

1300nm

What number of bytes are in a frame on most wired networks.

1500 bytes.

SNMP (Simple Network Management Protocol) uses what port?

161 Collects information from networking devices for management and monitoring purposes.

All DHCP clients are designed to generate an APIPA address of what?

169.254.0.0/16 automatically if they do not receive a response to multiple DHCP Discovery messages.

What is the APIPA address range?

169.254/16 ; First and last 256 addresses are reserved.

What is the IP range for Class B private IP?

172.16.0.0-172.31.255.255

Class B private IP address range

172.16.y.z

H.323 uses what port?

1720 Defines AV protocols, defining how multimedia communications occur between devices.

Class C IP range

192-223

What is the IP range for a Class C private IP.

192.168.0.0 - 192.168.255.255

Class C private IP address range

192.168.y.z

1. Nmap is primarily used for 1. Packet sniffing 2. Port scanning 3. Traffic analysis 4. Log reviewing

2. Port Scanning Nmap is the most popular port scanner in use today.

802.11 Frequencies

2.4 and 5 GHz. With channels. 2.4 GHz has 14 channels. In the US 12-14 are not used. Channels 1,6, and 11 do not overlap. Channels in 2.4GHz band are separated by 5MHz but have a bandwidth of 22 MHz.

SSH uses which port?

22 Remote shell login with encryption. Replaces Telnet which sent communications including username and passwords in plain text.

SFTP (SSH File Transfer Protocol) (or Secure) uses what port?

22 An extension to SSH that provides secure file transfer and file system access.

Class D IP range

224-239

Telnet uses what port?

23 Obsolete and replaced by SSH. Plain text

Telnet runs on port

23. This enables you to connect to a Telnet server and run commands on that server as if you were sitting in front of it. You must enter a username and password to access a Telnet server. Telnet does not have any form of encryption.

Class E IP range

240-255

SMTP (Simple Mail Transfer Protocol) uses what port?

25 Sens email off a domain, and receives email for a domain from another domain

What is the default subnet mask for a class C network?

255.255.255.0

A subnet mask will always total

32bits

RDP (Remote Desktop Protocol) uses what port?

3389 Microsoft protocol that allows for connecting to another computer through a GUI.

LDAP (Lightweight Directory Access Protocol) uses what port?

389 Accesses and maintains distributed directory information services related to user, groups, computers, printers, and more.

The maximum fiber length is

40km

HTTPS uses what port?

443

HTTPS (HTTP over SSL (Secure Socket Layer) ) uses what port?

443 Provides authentication, confidentiality, and integrity exchanges between web servers and clients.

SMB (Server Message Block) uses what port?

445 Provides shared access to files, printers and more

Number of bits of a MAC address

48 bits

MAC Addresses

48-bit binary addresses or 6-byte binary address.

802.11ac was added in 2013, and only uses

5.0Ghz band. Theoretical throughput jumps to a whopping 3.2 Gbps, and is aimed for the home media environment.

An 802.11n-only network can take advantage of the less cluttered

5.0Ghz space for better coverage. The theoretical throughput jumps to 600Mbps. It implements channel bonding to increase throughput even more, where the devices use multiple radio signals.

SIP (Session Initiation Protocol) uses what port?

5060 and 5061 Establishes, modifies and terminates VOIP calls. Port 5060 is used for non encrypted signaling traffic. Port 5061 is used for TLS encrypted traffic.

802.11a has a throughput of

54Mbps and operates at the 5.0Ghz frequency range. This wireless standard is incompatible with 802.11b/g, which runs at 2.4Ghz.

LDAPS (LDAP over SSL) uses what port?

636 Encrypts LDAP communications

DHCP uses what port?

67

DHCP (Dynamic Host Configuration Protocol) uses what port?

67 and 68. This provides clients configuration information including IP address, subnet mask, default gateway, IP addresses of DNS servers and more. Rare circumstances can use port 68.

TFTP (Trivial File Transfer Protocol) uses what port?

69

HTTP (Hypertext Transfer Protocol) uses what port?

80 Defines the formatting, transmission and action done by Web servers and clients. Passes everything in plain text.

What are the Wi-Fi standards?

802.11 - The initial standard which supported transmission speeds of 1 to 2 Mbps. 802.11a - Had a throughput of 54Mbps and operated at the 5.0 GHz frequency band. Incompatible with 802.11 b/g which runs on 2.4 GHz 802.11b Had a throughput of 11 Mbps and runs at the 2.4 GHz. 802.11g improves upon the 802.11b standard by increasing the transfer rate to 54Mbps and is compatible with 802.11b at 2.4GHz 802.11n Designed to run at both 2.4GHZ and 5.0GHz and is compatible with both b/g. Theoretical 600mbps. 802.11ac only uses 5.0GHz. Theoretical 3.2Gbps.

What technology can be used to control IoT devices?

802.11 wireless standard can be used.

802.1x authentication

802.1x is a port based authentication network access control mechanism for networks.

local loop back in IPv6

::0

A computer compromised with malware to support a botnet is called a ________. A. zombie B. reflection C. DDoS D. locked node

A

An analysis of a network shows a lot of traffic on one machine on port 161. What kind of machine is it? A. Managed device B. SNMP manager C. PDU D. MIB

A

In a NAT router, what is the name for an arbitrary number generated by the sending computer?

Ephemeral port

Bart has a choice of tools to view his managed network, but he primarily wants to see graphs of various types of data, such as the overall traffic and the current capacities of the file servers. Which tool offers him the best option? A. Cacti B. CNA C. NetFlow D. Wireshark

A

BitTorrent is an example of what kind of logical network topology? A. Peer-to-peer B. Client/server C. Multinode D. Server-to-server

A

Distance vector routing protocols such as RIP rely on what metric to determine the best route? A. Hop count. B. Link speed. C. Ping time. D. Routes are chosen at random.

A

In a PKI encryption method, which key encrypts the data? A. Public B. Private C. Both D. Depends on who sends the data

A

In an SNMP managed network, which software does a managed device run? A. Agent B. NMS C. SNMP manager D. MIB

A

Janelle wants to start a new photo-sharing service for real pictures of Bigfoot, but doesn't own any servers. How can she quickly create a new server to run her service? A. Public cloud B. Private cloud C. Community cloud D. Hybrid cloud

A

Port 110 (POP) is what kind of port? A. Well-known B. Registered C. Ephemeral D. Reserved

A

The DNS root directory is represented by what symbol? A. . (dot) B. / (forward slash) C. \ (back slash) D. $ (dollar sign)

A

The NSA's TEMPEST security standards are used to combat which risk? A. RF emanation B. Spoofing C. DDoS D. Malware

A

The V.90 standard defines a modem speed of_______. A. 56 Kbps B. 33.6 K baud C. 28.8 Kbps D. 2400 baud

A

The original 802.11 wireless specification enabled a maximum throughput speed of _______________. A. 2 Mbps B. 11 Mbps C. 54 Mbps D. 4 Mbps

A

The placement of a rack should optimize what? A. Airflow B. HVAC C. MSDS D. Emergency procedures

A

What Windows utility do you use to find the MAC address for a system? A. ipconfig /all B. ipcfg /all C. ping D. mac

A

What are tone probes and tone generators used for? A. Locating a particular cable B. Testing the dial tone on a PBX system C. A long-duration ping test D. As safety equipment when working in crawl spaces

A

What function does CSMA/CD provide that CSMA/CA does not? A. Data packet collision detection B. End-to-end data packet encryption C. Data packet collision avoidance D. Data packet error checking

A

What is a router? A. A piece of hardware that forwards packets based on IP address B. A device that separates your computers from the Internet C. A piece of hardware that distributes a single Internet connection to multiple computers D. A synonym for a firewall

A

What is checked first when trying to resolve an FQDN to an IP address? A. hosts file B. LMHOSTS file C. DNS server D. WINS server

A

What is succession planning? A. Identifying personnel who can take over certain positions in response to an incident B. The career path by which employees of an organization can grow through the ranks C. The selection of failover servers in the event of a catastrophic server failure D. The selection of failover routers in the event of a catastrophic router failure

A

What is the big physical difference between 1000BaseSX and 100BaseFX? A. 1000BaseSX uses the SC connector exclusively. B. 1000BaseSX is single-mode, whereas 100BaseFX is multimode. C. 1000BaseSX uses the ST connector exclusively. D. There is no difference.

A

What is the maximum cable length of 10GBaseT on CAT 6? A. 55 meters B. 100 meters C. 20 meters D. 70 meters

A

What is the maximum number of nodes that can be connected to a 10BaseT hub? A. 1024 B. 500 C. 100 D. 185

A

What is the number 138 in binary? A. 10001010 B. 10101010 C. 10000111 D. 11001010

A

What is the popular Microsoft remote access server program called? A. RRAS B. Dial-Up Networking C. Dial-Up Server D. Microsoft Client for Networks

A

What service do tunnel brokers provide? A. A way for users to jump the gap between their computers and the IPv6 Internet routers. B. They provide no useful service. C. Access to IPv6 DNS records. D. A second connection for multihoming.

A

What type of cable and connector does 100BaseFX use? A. Multimode fiber with ST or SC connectors B. STP CAT 6 with RJ-45 connectors C. Single-mode fiber with MT-RJ connectors D. UTP CAT 5e with RJ-45 connectors

A

What's the most common method used to configure a VLAN-capable switch? A. Log into the switch using SSH and use the command-line interface. B. Plug into the switch with a serial cable and use the command-line interface. C. Log into the switch via a Web browser and use the GUI. D. Plug into the switch with a VLAN cable and use the command-line interface.

A

When trying to establish symptoms over the phone, what kind of questions should you ask of a novice or confused user? A. You should ask open-ended questions and let the user explain the problem in his or her own words. B. You should ask detailed, close-ended questions to try and narrow down the possible causes. C. Leading questions are your best choice for pointing the user in the right direction. D. None; ask the user to bring the machine in because it is useless to troubleshoot over the phone.

A

When you are first setting up a new router, you should never plug it into an existing network. A. True B. False

A

Where does a DNS server store the IP addresses and FQDNs for the computers within a domain? A. Forward lookup zone B. Canonical zone C. MX record D. SMTP record

A

Which MAC address begins a frame? A. Receiving system B. Sending system C. Network D. Router

A

Which PDU does an SNMP manager use to query agents? A. Get B. Response C. Set D. Trap

A

While you are asking the user problem-isolating questions, what else should you be doing? A. Asking yourself if there is anything on your side of the network that could be causing the problem. B. Nothing; just keep asking the user questions. C. Using an accusatory tone with the user. D. Playing solitaire.

A

You have just had DSL installed at your house. Although the Internet connection is fast, your phones no longer work. What is the problem? A. The installer failed to install the POTS filters on the phones. B. Nothing; the phones can't function at the same time as the Internet. C. The house phone lines can't handle the bandwidth of both the phone and DSL. D. The DSL modem is missing the filter and is causing line interference.

A

Global unicast address.

A "global address". This is required to get on the Internet. Your system needs a second IPv6 address and it gets it from the default gateway which must be configured to pass out these IP addresses.

Role-Based Access Control (RBAC)

A "real-world" access control model in which access is based on a user's job function within the organization.

pfSense is an example of what? A. Virtual firewall B. Virtual NIC C. Virtual Switch D. Virtual LAN

A - pfSense is a very popular virtual route/firewall combination

What is an IPv6 Address?

A 128-bit address displayed in hexadecimal format and not the dotted decimal notation that is used by IPv4. divided into eight 16 bit groups that are separated by a colon (:). Many techs call these groups hextets.

LTE (Long Term Evolution)

A 4G cellular network technology that achieves downlink data rates of up to 1 Gbps and uplink rates up to 500 Mbps. AT&T and Verizon have adopted LTE for their high-speed wireless data networks.

Preamble

A 7-byte series of alternating ones and zeroes followed by 1-byte start frame delimiter. Gives a receiving NIC time to realize a frame is coming.

Bit Error Rate Test (BERT)

A BERT test verifies the T-carrier connection from end to end.

What is a CAN?

A CAN is a bunch of LANs connected together in very close proximity for example a campus.

The order of DNS requests is

A DNS client's DNS server will query a root anme server, then a TLD DNS server, and finally an authoritative DNS server for the target domain to get an answer to deliver to the client.

A LAN is what?

A LAN is a single network of devices that can directly communicate with each other in the same broadcast domain

What is a MAN?

A MAN is a group of networks connected closer together than a WAN for example, a city.

What is a PAN?

A PAN (presonal area network) is a network of devices using point to point communication over very short distances.

AUP (Acceptable Use Policy)

A Set of rules and guidelines that are set up to regulate Internet use and to protect the user. Each company has their own AUP that employees sign before use. - Ownership - Network Access - Privacy/Consent to Monitoring - Illegal Use

What is the purpose of the UPS and what other options exist?

A UPS enables you to shut down servers in an orderly fashion. It does not provide enough power for you to continue working. For that you will need a power generator which burns petroleum. Other options include dual power supplies and redundant circuits.

A VPN concentrator

A VPN concentrator can be thought of as a router with special capabilities that can connect endpoints from multiple VPN tunnels simultaneously and manage those connections. In addition the VPN concentratro can authenticate users, assign IP addresses and encrypt and decrypt data.

What is a WAN?

A WAN is a bunch of LANs connected together over an extended geographical distance

Frame Relay

A WAN protocol that operates at the Physical and Data Link layers of the OSI model. an extremely efficient packet switching standards, designed for and used primarily with T-carrier lines. MPLS replaced it.

uninterruptible power supply (UPS)

A battery power source that provides electric current during a power outage. UPS can also act as a power monitoring tool to report problems when there's any fluctuation in the electricity supply. i.e. a voltage event recorder.

Something you do

A behavioral characteristic. i.e. the way you walk, how you hold your phone, or type on a keyboard.

AES (Advanced Encryption Standard; )

A block cipher using 128-bit block size and 128, 192, or 256 bit key size. Incredibly secure, practically uncrackable, and so fast even applications that traditionally used stream ciphers are switching to it. Applications are switching to AES.

XOR (Exclusive OR)

A boolean logic operation that is widely used in cryptography as well as in generating parity bits for error checking and fault tolerance. XOR compares two input bits and generates one output bit. If the bits are the same, the result is 0. If bits are different, the result is 1.

What are the three ways to send a frame or packet?

A broadcast, which is where every device on the LAn hears the message; A multicast, where a single device sends a packet to a group of interested computers, and A unicast, where one device sends a message directly to another device.

riser

A cabling you would use for vertical runs between floors of a building, but since it is not fire rated, more people opt for plenum rated cable.

CDMA (Code Division Multiple Access)

A cellular standard that uses spread-spectrum technology, in which a signal is spread over a wide bandwidth so that multiple users can occupy the same channel. A cellular device on a CDMA network does not require a SIM card because, on a CDMA network, devices are compared against a white list, which is a database of subscribers that contains information on their subscriptions with the provider.

Access Control List (ACL)

A clearly defined list of permissions that specifies what actions an authenticated user may perform on a shared resource.

ACL

A clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource.

What is an ACL (Access Control List)?

A collection of statements applied to an interface that can permit or deny traffic.

PuTTY

A communications program designed to allow SECURE login from a Windows PC to a remote devices

eight groups of four hexadecimal characters. Leading zeroes can be dropped.

A complete IPv6 address always has?

digital signature

A digital guarantee that information has not been modified as if it were protected by a tamper-proof seal. The recipient uses the public key to decrypt this back into the original digest, recomputes a new digest from the transmitted file and compares the two to see if they match.

MMF (Multimode fiber)

A fiber-optic cable that uses LEDs

SMF ( Singlemode fiber)

A fiber-optic cable that uses lasers

Forward vs Revers Proxy servers

A forward proxy servers acts on behalf of clients, getting information from various sources and handling that info to the clients. The sources (Servers) don't know about the clients, only the proxy server. A reverse proxy server, in contrast acts on behalf of its servers. Clients contact the reverse proxy server, which gathers information from its associated servers and hands that information to the clients.

PKI (public-key infrastructure)

A framework for creating a secure method for exchanging information based on public key cryptography. It is the certificate authority which issues digital certificates that authenticate the identity of organizations and individuals over a public system such as the internet.

Extensible Authentication Protocol (EAP)

A framework for transporting authentication protocols that defines the format of the messages. Three types to know 1. EAP-TLS EAP with transport layer security 2. PEAP Protected EAP 3. EAP-FAST EAP Flexible Authentication via Secure Tunneling

cipher

A general term for a way to encrypt data; series of complex and hard-to-reverse operations. Run the cipher on a string to make a new set.

Initiating Change

A good request will include the following 1. Type of change 2. Configuration procedures 3. Rollback process 4. Potential impact 5. Notification The ongoing and last step of the change is change management documentation. 1. Network configurations, server settings, router configurations 2. Additions to the network, servers, swithces 3. Physical location changes, moved workstations relocated switches etc.

Host ID

A group of bits, the second part of the address, unique in pattern to each host on the same network.

Collision Domain

A group of nodes that have the capability of sending frames at the same time as each other, resulting in a collision.

RSA (Rivest Shamir Adleman; )

A highly secure cryptography method where the private key is kept by the owner, the public key is published. This is also used for authentication by creating a digital signature.

NDA (Non-Disclosure Agreement)

A legally binding contract signed by both parties stating that they will not reveal any trade secrets or intellectual property owned by the other.

Cold Site

A location that consists of a building, facilities, desks, toilets, parking - everything that a business needs except computers. A cold site will generally take more than a few days to bring online.

Baseline

A log of performance indicators such as CPU usage, network utilization and other values to give a picture of the network at a specific point in time.

Broadcast Domain

A logical area in a computer network where any node connected to the computer network can directly transmit to any other node in the domain without a central routing device.

Algorithm / cipher

A mathematical function that converts the plaintext into jumbled output known as ciphertext

brute force

A mechanism that will attack a cipher to look for any combinations possible

Modem

A modulator / demodulator is a device that converts both digital bit streams into analog signals (modulation) and incoming analog signals back into digital signals (demodulation). The traditional modem connects telephone lines to computers. DSL - point to point protocol over Ethernet. Cable - Data over cable service interface specifications

Multiplexer

A multiplexer took a circuit and combined it with a few hundred other circuits into a single complex circuit on one wire.

Service Level Agreement (SLA)

A negotiated agreement between the customer and the vendor. May specify the levels of availability, serviceability, performance, operation, or other commitment requirements. i.e. Definition of the service provided Equipment Technical support

Something you have

A physical security device, smart card, badge, key fob

Platform as a Service (PaaS)

A platform as a service (PaaS) provider gives programmers all the tools they need to deploy, administer, and maintain a Web application. Builds a platform: a complete deployment and management system to handle every aspect of a Web application.

host ID

A portion of an IP address used to identify any device requiring a Network Interface Card, such as a PC or networked printer on the network.

Network ID

A portion of the TCP/IP address that is used to identify individuals or devices on a network such as a local area network or the Internet. A group of bits, the first part of the address, shared by all hosts on the same network.

VPN

A private network configured within a public network such as the Internet or a carrier's network.

Packet Analyzer

A program that processes capture files from packet sniffers and analyzes them based on your monitoring needs. Can file and sort a capture file based on almost anything and create an output to help us do monitoring properly. It performs packet/traffic analysis. i.e. Wireshark

Packet sniffer

A program that queries a network interface and collects (captures) packets in a file called (surprisingly) a capture file.

A packet analyzer is

A program that reads the capture files from packet sniffers and analyzes them based on monitoring needs.

Interface Monitor

A program that tracks the bandwidth and utilization of one or more interfaces on one or more devices in order to monitor traffic on a network. If you want to know how hard your network is working turn to an interface monitor.

HyperTerminal

A program that you can use to connect to other computers, Telnet sites, bulletin board systems, online services, etc.

What is a protocol data unit?

A protocol data unit (PDU) represents a specific set of data at each layer of a model, like OSI.

Point-to-Point Protocol (PPP)

A protocol that allows a computer to connect to the Internet over a phone line. Modems use PPP for making secure connection to an ISP. PPP enables two devices to connect directly, authenticate with user name and passwords, and negotiate a network protocol. (TCP/IP)

A Proxy Server

A proxy server sits in between clients and external servers, essentially pocketing the requests from the clients for server resources and making those requests itself. The client computers never touch the outside servers and thus stay protected from any unwanted activity. The proxy server forwards the requests using its own IP address and then forwards returning packets to the client.

stream ciphers

A quicker type of encryption where single bits are encrypted at a time.

Patch Cable

A relatively short section (usually between 3 and 25 feet) of cabling with connectors on both ends. Connects two lines in patch panel.

RDP (Remote Desktop Protocol)

A remote terminal programs require a server and a client. The server is the computer to be controlled. The client is the computer from which you do the controlling. Microsoft uses Remote Desktop Protocol and Remote Desktop connection.

Bridge

A repeater to connect two networks. Sends traffic based on the MAC address of the device.

Cisco console cable is more commonly called

A rollover or Yost cable

What is a Firewall?

A security barrier that prevents unauthorized access to or from private networks. These can be either physical hardware devices or as software running on a host. Firewalls filter traffic based on rules. Filtering, as far as firewalls are concerned, means that certain packets are not let into the network. Packets can also be blocked from leaving. Firewalls can filter by source IP address, destination IP address, protocols, ports and other criteria.

Principle of least privilege

A security discipline that requires that a particular user, system, or application be given no more privilege than necessary to perform its function or job.

PGP (Pretty Good Privacy)

A selection option for signing digitally.

Relay Agent

A service the listens for DHCP broadcast request and forwards them via unicast to a DHCP server on another sunbet. Sometimes refered to as IP Helper or BootP Forwarder. Routers can perform this function.

Protocol Suite

A set of protocols that are commonly used together and operate at different levels of the OSI seven-layer model.

RADIUS server facts

A single RADIUS server can support multiple NASs and provide a complete Point to Point Protocol connection from the requesting system through the NAS all the way to the RADIUS server. It supports Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP) and Microsoft's MS-CHAP. RADIUS performs this authentication on either UDP ports 1812 and 1813 or UDP ports 1645 and 1646.

Bus topology

A single cable from which lines hang off of to specific clients. Terminated bus topology just has the ends capped.

The first stel of installing a wireless network is

A site survey.

SSID (Service Set Identifier)

A standard name applied to the BSS or IBSS to help the connection happen. The SSID is somtimes called a network name. It is a 32 bit identification string that inserted into the header of each frame processed bya WAP.

API (Application Programming Interface)

A standard way for programmers to enhance or extend an application's capabilities.

certificate

A standardized type of digital signature that includes the digital signature of a third party, a person or company that guarantees that who is passing out this verification is who they say theya re.

Mean Time Between Failures (MTBF)

A statistical value that is the average time until a component fails, cannot be repaired, and must be replaced. Usually hardware components. A manufacturers best guess.

Key

A string of 1's and 0's used as an input to the algorithm, in addition to the plaintext. The secrecy/confidentiality is achieved with the secrecy of the key, not the algorithm.

What is the purpose of a subnet mask?

A subnet mask is needed to identify the network ID and host ID portions of the IP address. A subnet mask is nothing more than a string of ones followed by some number of zeros, always totaling exactly 32 bits. Here is an example of a common one: 255.255.255.0

Out of band management

A switch management option that provides on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, in order to interface with a switch.

out-of-band management

A switch management option that provides on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, in order to interface with a switch.

A multilayer or layer 3 switch is

A switch that also has the capability to create SVIs and physical routed ports, at both layer 2 and 3 at the same time.

Source Address Table (SAT)

A table of ports and the MAC addresses connected to each port on a switch.

Data Loss Prevention (DLP)

A technology that reduces the risk of data loss even when the data is in use, in motion, or at rest. It identifies, monitors, and protects data through deep content inspection, contextual security analysis of transaction, and with a centralized management framework. Detects and prevents the unauthorized use and transmission of confidential information. Can be proactive by protecting data from a potential data breach. Can be stopped in three ways. Data in use, data in transit and data at rest. ____ software makes sure data isn't exfiltrated from the network.

Certificate Authority (CA)

A trusted third-party agency that is responsible for issuing digital certificates.

PDU

A unit of data at each layer of the OSI model.

Something you know

A username, a password, a passphrase a PIN Something you have

netstat -n

A windows network command line that displays network protocol statistics as well as the current TCP/IP connections.

Which of these is a valid host IP address on the 10.1.0.0/16 network?

A. 10.1.0.1 B. 10.2.0.1 C. 10.1.255.255 D. 10.1.0.0 A

What is the most popular size of fiber-optic cabling? A. 62.5/125 µm B. 125/62.5 µm C. 50/125 µm D. 125/50 µm

A. 62.5/125 µm

Which of the following is the latest 802.11 standard used to provide LAN access?

A. 802.11a B. 802.11b C. 802.11c D. 802.11d C

What standard defines wireless networks?

A. 802.2 B. 802.3 C. 802.1Q D. 802.11 D. 802.11

Which of these DNS records is found in a reverse lookup zone?

A. A B. MX C. PTR D. SRV C Pointer records resolve an IP address to its corresponding hostname

Which DNS record can be used for security

A. A B. SOA C. PTR D. TXT D - The sender policy Framework (SPF) and Domain Keys Identified Mail (DKIM) are implemented through the TXT record.

Which TCP/IP layer includes Layers 5-7 from the OSI seven-layer model? A. Application layer B. Transport layer C. Internet layer D. Link layer

A. Application layer

Which of the following wired topologies is used today to connect devices of the same network together?

A. Bus B. Ring C. Mesh D. Star D. Star

Which of the following are classic network topologies? (Select three.) A. Bus B. Star C. Ring D. Dual-ring

A. Bus B. Star C. Ring

The term "unshielded twisted pair" describes which of the following network components? A. Cable B. Hub C. Router D. NIC

A. Cable

DOCSIS is used by which type of company? A. Cable B. Fiber C. DSL D. Dial-Up

A. Cable Cable companies use Data Over Cable Service Interface Specifications (DOCSIS) to transmit and receive frames to and from customers.

Which components work at Layer 1 of the OSI seven-layer model? (Select two.) A. Cables B. Hub C. Network protocol D. Session software

A. Cables

Which shape usually represents a router in a networking diagram? A. Circle B. Square C. Rectangle D. Triangle

A. Circle Routers are usually represented as circular objects in networking diagrams.

What are the main components of fiber-optic cabling? (Select three.) A. Cladding B. Insulating jacket C. Copper core D. Fiber

A. Cladding B. Insulating jacket D. Fiber

What's the first step to installing a wireless network?

A. Configure the WAP B. Conduct a site survey C. Assign IP addresses to the hosts D. Assign IP addresses to the routers B.

What do Firewalls do to traffic identified as malicious? A. Filter B. Forward C. Flood D. Quarantine

A. Firewalls filter (block) malicious packets from either entering or exiting networks and devices.

What aspects of network cabling do the IEEE committees establish? (Select three.) A. Frame size B. Speed C. Color of sheathing D. Cable types

A. Frame size B. Speed D. Cable types

SIM cards came from which technology?

A. GSM B. TDMA C. CDMA D. MIMO A.

Which one of the following sites represents the quickest way for a company to recovery from a disaster? A. Hot site B. Warm site C. Cold site D. Web site

A. Hot site A hot site has equipment, data, and links ready to go.

Which of the following topologies uses a WAP?

A. Infrastructure B. Ad hoc C. Bus D. Mesh A. Infrastructure

What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode? (Select two.) A. An access point B. A router C. A hub D. A wireless bridge

AD

What organization is responsible for establishing and promoting networking standards? A. Institute of Electrical and Electronics Engineers (IEEE) B. International Networking Standards Organization (INSO) C. Federal Communications Commission (FCC) D. International Telecommunications Association (ITA)

A. Institute of Electrical and Electronics Engineers (IEEE)

Which two protocols are used by Microsoft domain controllers? A. Kerberos and LDAP B. RADIUS and TACACS+ C. Kerberos and RADIUS D. TACACS+ and LDAP

A. Kerberos and LDAP Kerberos is used for authenticating and granting tickets to other servers, and LDAP is implemented through Active Directory.

Which one of these password recommendations is viable? 1. Longer is better 2. Shorter is better 3. Length does not matter 4. Reuse a previous password

A. Longer is better One of the best ways to strengthen your password, is to make it longer, preventing a brute-force attack.

What component of Layer 2 of the OSI seven-layer model creates and addresses the frame? A. MAC sublayer B. LLC sublayer C. CRC sublayer D. Data Link sublayer

A. MAC sublayer

Which of the following prohibits employees from violating the confidentiality of any proprietary and sensitive company related information? A. NDA B. AUP C. VPN D. BYOD

A. NDA A nondisclosure agreement protects the privacy of a network, as those who sign the NDA agree to keep everything confidential

Which of the following concepts combines multiple physical ports on a router or switch into one logical port. A. NIC teaming B. Clustering C. Incremental backup D. Redundant circuits

A. NIC Teaming NIC teaming, also known by other terms like port aggregation combines multiple physical interfaces on a router or switch into one logical interface.

Which one of these is not a cloud delivery model?

A. Public B. Private C. Hybrid D. Mesh D

What is used as the authentication server is 802.1X? A. RADIUS server B. TACACS+ server C. DNS server D. DHCP server

A. RADIUS server A RADIUS server is found at the back end of an 802.1X infrastructure.

What types of coax cabling have been used in computer networking? (Select two.) A. RG-6 B. RG-11 C. RG-45 D. RG-59

A. RG-6 D. RG-59

Which of the following is a use case for IaaS?

A. Running programs over the Internet B. Web site development C. A company that needs extra servers to handle a spike in traffic for holiday shopping D. Backing up files C

3. Which of these is the de facto network management protocol? A. SNMP B. SMTP C. SFTP D. DHCP

A. SNMP SNMP is the de facto network management protocol.

Google Docs is an example of which of the following?

A. SaaS B. PaaS C. IaaS D. VPN A

Which of the following is true regarding DHCP relay agents?

A. They forward broadcast from clients B. They turn broadcasts from clients into unicasts C. They turn unicasts from clients into broadcasts D. They forward unicasts from clients B - DHCP relay agents take broadcasts from clients and unicast them to DHCP servers. Routers never forward broadcasts, or do they turn unicasts into broadcasts.

Which of the following devices provides only temporary power, to allow devices to shut down properly? A. UPS B. MTTR C. SLA D. Generator

A. UPS A UPS is only a temporary provision of power, to allow servers to properly shutdown. A power generator is need for extended power.

An SVI involves assigning an IP address to what? A. VLAN B. Switch C. Firewall D. PBX

A. VLAN. Switched virtual interfaces are IP addresses assigned to VLANs and serve as default gateways for hosts on that switch.

Which of the following is used for detection? A. Video surveillance B. Biomentrics C. Smart Cards D. Locks

A. Video Surveillance Video Surveillance is used for detection. The other options are used for prevention.

2. What's the most popular packet sniffer/protocol analyzer? A. Wireshark B. Nmap C. Nessus D. Open VAS

A. Wireshark Wireshark is the most popular packet sniffer/protocol analyzer in use today

IP address classes

A: 1-126, address space of 2^24 or 16,777,216 addresses; B: 128-191, 65,536 networks providing 65,536 addresses each; C: 192-223, 16,777,216 networks each providing 254 addresses; D: 224:239 uses for group messaging. E: 240-255 Not assigned to hosts, used for experimental purposes

Which of these IP addresses can't be used on the internet?

A: 192.171.1 B: 192.168.1.1 C: 192.169.1.1 D: 192.170.1.1 B

Which one of these is not a DHCP message type?

A: Discover B: Offer C: Reply D: Acknowledgement C

Authentication, Authorization, & Accounting

AAA

Explain authentication and access controls

AAA refers to authentication (proving you are who you say you are from the identification phase), authorization (being allowed to access certain things, but not others), and accounting (the logging of your actions, so they can be analyzed).

What are the benefits of caching on a Web proxy? (Select two.) A. Response time B. Virus detection C. Tracking D. Authentication

AB

What ports does FTP use traditionally? (Select two.) A. 20 B. 21 C. 23 D. 25

AB

Which of the following are valid subnet masks? (Select two.) A. 11111111.11111111.11100000.00000000 B. 11111111.11111111.11111111.00000000 C. 11111111.00000000.11111111.00000000 D. 00000000.00000000.11111111.11111111

AB

Which of the following advantages does WPA have over WEP? (Select three.) A. End-to-end data packet encryption B. EAP user authentication C. Encryption key integrity checking D. 128-bit data encryption

ABC

Which statements about netstat switches (in Windows) are true? (Select three.) A. -a shows all used ports. B. -n shows raw port numbers and IP addresses. C. -o shows the process ID. D. -s shows the application name.

ABC

Which of the following operating systems have Teredo built in? (Select two). A. Windows 7 B. OS X C. Windows 8 D. Linux

AC

ANT+

ANT is a proven ultra-low power (ULP) wireless protocol that is responsible for sending information wirelessly from one device to another device, in a robust and flexible manner. i.e. Heart rate monitor thats used a most once a week.

What type of address is assigned if a computer is using DHCP and there is no DHCP server found on a network?

APIPA (Automatic Private IP Addressing)

Application Integrated Circuit

ASIC

Auditing and Logging

Accounting as mentioned earlier deals with keeping track of users and their generated events. Thisis often described as logging. Auditing, tough, is something different. Auditing is a formal check of the logs to see whether malicious actions were performed or if standards and requirements were followed.

P2P

Act as both client and server

When a wireless network does not use a WAP what does it use?

Ad hoc topology. If it uses as WAP then it is infrastructure topology

Access Control

After authentication, it is time to determine who has what privileges. Access control is determined with 802.1X, NAC, port security, MAC filtering, captive portal and access control lists.

Telephone systems in side Dmarc

After the demarc network and telephone cables connect to some type of box owned by the customer, that acts as the primary distribution tool for the building. i.e. a patch panel that is a vertical cross connect. The room that stores all of this equipment is known as a main distribution frame (MDF). IDF are smaller aka telecom rooms that serve individual floors).

Detection

Alerts but does not stop an attack

PSTN Modem speeds

All PSTN modem speeds are a multiple of 2400, with the latest and (last) generation of modems achieving 2400 x 24 = 57,600 bps (56 Kbps)

Subnet mask and network ID

All computers on the same network have these two things in common

Auto MDI-X

All gigabit ethernet devices have an automatic crossover detection feature called auto MDI-X.

Multiple Access

All machines have equal access to the wire. Strictly on a first come first serve basis.

NIC Teaming

All of the cables from the joined ports must go to the same device - another switch, a storage area network (SAN), a station, or whatever. That device must also support the logical joining of all of the involved ports. In CompTIA terms this is called NIC Teaming.

Cold site, Warm Site, Hot site

Allow an organization to continue to operate after a disaster. These sites differ in what's set up from the start. Good backup plans combine a full backup with either an incremental backup or a differential backup.

Fiber networking practices

Almost all fiber networking standards require two fibers and a pair is often connected together as duplex optical fiber cabling.

Before pacing your router online

Always configure it. Do not plug in a new router into an existing network.

The North American Regional Internet Registeries (RIR) is named?

American Registry for Internet Numbers

IDS and IPS continued

An IDS can alert an administrator and even automatically tell a firewall to block traffic, based on what it observers. An IPS can do the same, but can stop traffic dead in its tracks as well. The IPS will still report back to a firewall so that traffic can be filtered a lot earlier than where the IPS is located.

Intrusion Detection System (IDS)

An IDS is out of band, and simply gets copies of network traffic. It can be as simple as a system getting copies of traffic to inspect through a switch configured to send all traffic to the IDS. It does not add latency.

NTP (Network Time Protocol)

An Internet protocol that enables synchronization of computer clock times in a network of computers by exchanging time signals.

Data Link Control (DLC)

An ancient printing protocol with the same name; might show up as an incorrect answer on the exam

What is a DMZ?

An area of the network carved out by a single or multiple firewalls to provide a special place (a zone) on the netowrk for any servers that need to be publicly accessible from the Internet.

Kerberos

An authentication protocol for TCP/IP networks with many clients all connected to an authenticating server. No point to point. The cornerstone of Kerberos is the Key Distribution Center (KDC), which has two processes: The Authentication Server (AS) and the Ticket-Granting Service (TGS). In windows environments, the KDC is installed on the domain controller.

DNS (Domain Name System)

An autonomous system usually has two DNS servers for the entire network. These DNS servers have a zone file that lists all the hostnames on the domain and their corresponding IP addresses along with other resource record types. The primary DNS server will through Zone Transer distribute updated information to the secondary DNS servers in the domain.

FCS

An error detection mechanism found in the L2 trailer

FTPS (File Transfer Protocol Secure)

An extension of FTP that uses SSL or TLS encrypt FTP traffic. Some implementations of FTPS use ports 989 and 990

FTPS (FTP Secure)

An extension of FTP which uses SSL or TLS to encrypt FTP traffic. Addressed the weakness of FTP, the fact that it uses plaintext for transmission, by adding support for SSL/TLS encryption.

NIC

An interface between the PC and the network.

Miredo

An open source implementation of Teredo for Linux and some other UNIX based systems.

VNC (Virtual Network Computing)

An open source system that enables a remote client (or viewer) workstation to manipulate and receive screen updates from a host. Examples of VNC software include RealVNC, TightVNC, and UltraVNC.

Thick vs Thin Access Point

Any WAP that you can access directly and configure singularly via its own interface is called a thick AP. A WAP that can only be configured by a wireless controller is called a thin AP. Most manufacturers use the "Light weight access point protocol LWAPP)

A Router is

Any piece of hardware or software that forwards packets based on their destination IP address. I.e. from one network to another. Layer 3.

What is the biggest weakness to Symmetric-key encryptions?

Anyone who gets a hold of the key, can encrypt or decrypt data, and it forces us to send the key to the other person.

Plaintext

Anything that is original bit stream - images, sounds, or any other type of file on your machine.

Which layer of the TCP/IP model includes FTP, BOOTP, DNS, HTTP(S), TLS/SSL, VoIP, SSH, POP3, IMAP4, NTP, Telnet, SMTP, SNMP

Application

TCP/IP Internet protocol top to bottom

Application -> Transport -> Internet -> Link

At which layer of the TCP/IP protocol stack do HTTP, DNS, and FTP reside?

Application Layer

Explain a MAC address table.

As it forwards all frames, a switch copies the source MAC addresses and ports they were heard on, and quickly creates a table of the MAC addresses of each connected computer. The table is called the MAC address table.

Logical Addressing

As opposed to physical addressing, the process of assigning organized blocks of logically associated network addresses to create smaller manageable networks called subnets. IP addresses are one example of logical addressing.

ICMP (Internet Control Message Protocol;)

Asks the question, "Is there a computer with this IP address and used at Internet Layer 2 of the TCIP/IP model?

Straight through cables use

At the NIC Pins 1 and 2 as the transmit pins and pines 3 and 6 as receive pins. On the switch pins 1 and 2 are the receive pins while pins 3 and 6 are the transmit pins. This wont work NIC to NIC that requires a cross over cable.

Kerberos (KDC)

Authentication protocol for TCP/IP No connection to PPP Many clients Single authentication server If it's down, no one has access Timestamping requires synchronized clocks

AAA/RADIUS server

Authentication, authorization, and accounting (AAA) are vitally important for security on WAPs, routers and witches. We use intelligent devices that support AAA. Many switches and almost every WAP come with features that support authentication.

A(n) _______________ organizes and protects the horizontal cabling in the telecommunications room. A. rack B. patch panel C. outlet D. 110 jack

B

Adding a generator to a server room is an example of what? A. Power conversion B. Power redundancy C. UPS D. Load balancing

B

Any encryption that uses the same key for encryption and decryption is called? A. Encoded key B. Symmetric key C. Single key D. Synthetic key

B

DHCP is required to receive an IPv6 address automatically. A. True B. False

B

Ethernet hubs take an incoming packet and _______________ it out to the other connected ports. A. amplify B. repeat C. filter D. distort

B

How do IPv6 multicasts differ from broadcasts? A. Broadcasts are sent to all network nodes; multicasts are sent only to specific network nodes. B. Both broadcasts and multicasts are sent to all network nodes, but in a multicast, only the destination nodes process the incoming packets. C. Broadcasts can cross over a router, whereas multicasts cannot. D. Broadcasts are used on local networks; multicasts are used on the Internet.

B

How does an SNMP managed system categorize data that can be queried? A. QoS B. MIBs C. PDUs D. UDP

B

How many bits does an IPv4 address consist of? A. 16 B. 32 C. 64 D. 128

B

How many pairs of wires are in a CAT 5e-rated cable? A. 2 B. 4 C. 8 D. It doesn't specify.

B

Identify the class of the following IP address: 146.203.143.101. A. Class A B. Class B C. Class C D. Class D

B

If you saw some traffic running on UDP ports 1812 and 1813, what AAA standard would you know was running? A. PPP B. RADIUS C. MS-CHAP D. TACACS+

B

Is NAT needed with IPv6? A. No, because NAT has been replaced with a new version called NAT6. B. No, the address space is so large that rationing routable addresses is unnecessary. C. Yes, because it is the only way to protect against hackers. D. Yes, because of the limited nature of IPv6 addressing.

B

Jason is concerned about the communication between two workstations and wants to capture and analyze that traffic to see if anything illicit is going on. Which tool would best serve his needs? A. Interface monitor B. Packet flow monitor C. Packet sniffer D. Performance monitor

B

Routers must use the same type of connection for all routes, such as Ethernet to Ethernet or ATM to ATM. A. True B. False

B

The RTP protocol runs on top of which protocol? A. UC server B. SIP C. MGCP D. H.323

B

Users need training from the IT department to understand which of the following? A. How to troubleshoot lost network connections B. How to secure workstations with screen-locking and password-security techniques C. How to send e-mail to the change management team D. How to check their network connection

B

What device do you use to connect to a T1 line? A. Router B. CSU/DSU C. Modem D. WIC-2T

B

Jill needs to run some UTP cable from one office to another. She found a box of cable in the closet and wants to make sure it's Cat 5 or better. How can she tell the Cat level of the cable? (Select two.) A. Check the box. B. Scan for markings on the cable. C. Check the color of the cable—gray means Cat 5, yellow means Cat 6e, and so on. D. Check the ends of the cable.

B. Scan for markings on the cable.

A user calls to say she can't see the other systems on the network when she looks in My Network Places. You are not using NetBIOS. What are your first two troubleshooting steps? (Select two.) A. Ping the address of a known Web site. B. Ping the loopback address to test her NIC. C. Ping several neighboring systems using both DNS names and IP addresses. D. Ping the IP addresses of the router.

BC

When designing a basic network, which of the following are factors to consider according to the CompTIA Network+ objectives? (Select two.) A. Ease of use B. List of requirements C. Equipment limitations D. Cost of installation

BC

What are patch cables used for? (Select two.) A. To connect different telecommunications rooms. B. To connect the patch panel to the switch. C. They are used as crossover cables. D. To connect PCs to outlet boxes.

BD

What are two big advantages to using OSPF over RIP or BGP? (Select two.) A. OSPF is a modern protocol that does not have legacy problems. B. OSPF chooses routes based on link speed, not hop count. C. OSPF runs on all routers, big and small. D. OSPF sends only routing table changes, reducing network traffic.

BD

Which of the following are key benefits of Web-based mail? (Select two.) A. You can use a third-party application, like Microsoft Outlook, to download your e-mail. B. You can access your e-mail from anywhere in the world using a Web browser and an Internet connection. C. It is completely spam-free. D. It is great for creating throw-away accounts.

BD

Which of the following protocols are notorious for cleartext passwords? (Select two.) A. SSH B. Telnet C. HTTPS D. POP3

BD

Which statements about SSH and Telnet are true? (Select two.) A. Windows comes with preinstalled SSH and Telnet clients. B. SSH is more secure than Telnet because it encrypts data. C. Telnet is a command-line tool, whereas SSH is a GUI tool. D. SSH uses port 22, and Telnet uses port 23.

BD

Which of the following is the distance vector routing protocol used on the Internet?

BGP

This is the glue of the Internet, connecting all of the Autonomous Systems. It is considered a hybrid routing protocol, but it's more technically a path vector routing protocol. These types of routers are manually configured, and will not go down very often.

BGP-4 (Border Gateway Protocol)

What are two names for dynamic IP addressing?

BOOTP & DHCP

What happens when a PortFast switch receives a BPDU?

BPDU guard will move the port into an err-disable state (i.e., error occured, disabled) if a BPDU is received on that port.

With infrastructure mode a single WAP servicing a given area is called a

Basic Service Set (BSS) This service can be extended by adding more access points. This is called appropriately an Extended Service Set (ESS)

Yaggi antenna

Beam antenna. Highly directional.

ISDN service consists of two types of channels.

Bearer channels (B channels carry data and voice information using standard DS0 channels (64 Kbps) vs Delta Channels (D Channels) carry setup and configuration information at 16 Kbps. Another type of ISDN is called Primary Rate Interface (PRI). ISDN PRI is actually just a full T1 line, carrying 23 B channels.

Transmission mediums

Besides copper and fiber cables, there are also satellite and wireless transmission mediums.

What is the best practice with servers for IP addressing?

Best practice with servers, though, is to use static IP addresses so that they're reachable if the DHCP server goes down.

WAP lists

Blacklist Defines who cannot access a network Whitelist Defines who can access a network Defeated by MAC spoofing. To defeat use wired connections.

Prevention

Blocks the attack

What is Bluetooth designed to do?

Bluetooth is designed to enable wireless communication between PCs and peripheral components as well as consumer electronics

Bluetooth technology

Bluetooth technology creates a small wireless networks called wireless personal area networks WPANS. Uses 2.4GHz. Highly resistant to interference.

Older and mostly obsolete method of dynamic IP addressing

Bootstrap Protocol (BOOTP)

The external routing protocol used on the Internet is __________.

Border Gateway Protocol (BGP-4)

What is the one protocol used on the Internet for communication between Autonomous Systems?

Border Gateway Protocol (BGP-4)

Telnet and SSH

Both allow you to control a remote computer using a CLI (command line interface) / terminal from a local computer of a network.

routing table

Built into the router is this actual set of instructions which tell the router what to do with incoming packets and where to send them

802.1X is a great example of ______. A. encryption B. content switching C. port authentication D. VLAN trunking

C

A MAC address is known as a(n) __________ address. A. IP B. logical C. physical D. OEM

C

A NIC sends data in discrete chunks called __________. A. segments B. sections C. frames D. layers

C

A frame ends with a special bit called the frame check sequence (FCS). What does the FCS do? A. Cycles data across the network B. Verifies that the MAC addresses are correct C. Verifies that the data arrived correctly D. Verifies that the IP address is correct

C

The users on your network haven't been able to connect to the server for 30 minutes. You check and reboot the server, but you're unable to ping either its own loopback address or any of your client systems. What should you do? A. Restart the DHCP server. B. Restart the DNS server. C. Replace the NIC on the server because it has failed. D. Have your users ping the server.

C

Through what mechanism is a change to the IT structure initiated? A. Users make a change to their environment, then report the result to the change management team. B. A user requests funding for a change to upper management, then submits a requisition to the change management team to source and purchase new equipment. C. Users submit a change request to the change management team. D. The change management team issues a proposed change to users in the organization, then evaluates the responses.

C

Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously? A. CPU B. Hard drive C. RAM D. Windows

C

What command do you use to see the DNS cache on a Windows system? A. ping /showdns B. ipconfig /showdns C. ipconfig /displaydns D. ping /displaydns

C

What does ARP stand for? A. Address Reconciliation Process B. Automated Ranking Protocol C. Address Resolution Protocol D. Advanced Resolution Protocol

C

What does SIP stand for? A. Standard Initiation Protocol B. System Internetworking Protocol C. Session Initiation Protocol D. Sector Information Protocol

C

What feature lets you save a VM's state so you can quickly restore to that point? A. Replacement B. Save C. Snapshot D. Zip

C

What is a medianet's primary tool to ensure bandwidth for VTC? A. MPLS B. RTU C. QoS D. ISDN

C

What is appended to the beginning of the Ethernet frame? A. MAC address B. Length C. Preamble D. FCS

C

What is the /16 prefix for all 6to4 address? A. 2001 B. 2003 C. 2002 D. 2021

C

What is the last step in the troubleshooting process? A. Implementing the solution B. Testing the solution C. Documenting the solution D. Closing the help ticket

C

What kind of DNS records do IPv6 addresses use? A. A B. SIX C. AAAA D. NSSIX

C

What protocol do cable modems use? A. ACMSIS B. CMAS C. DOCSIS D. CCSIP

C

What term is used to describe the interconnectivity of network components? A. Segmentation B. Map C. Topology D. Protocol

C

What type of bus does 10BaseT use? A. Bus B. Ring C. Star bus D. Bus ring

C

What type of server supports EAP-encrypted passwords in accordance with the 802.1X standard? A. WAP server B. WEP server C. RADIUS server D. NAS server

C

When should you use a cable tester to troubleshoot a network cable? A. When you have a host experiencing a very slow connection B. When you have an intermittent connection problem. C. When you have a dead connection and you suspect a broken cable D. When you are trying to find the correct cable up in the plenum

C

Where does a hub send data? A. Only to the receiving system B. Only to the sending system C. To all the systems connected to the hub D. Only to the server

C

Which Cat standard is the latest approve by TIA/EIA? A. 5e B. 6 C. 6A D. 6e

C

Which is an ancient form of DoS attack? A. DDoS B. Ping C. Smurf D. Arrow

C

Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer? A. Application layer B. Presentation layer C. Session layer D. Transport layer

C

Which network topology connects nodes with a ring of cable? A. Star B. Bus C. Ring D. Mesh

C

Which of the following connector types is associated with fiber-optic cable? A. RJ-45 B. BNC C. ST D. RG-58

C

Which of the following provides the fastest throughput? A. PSTN B. ISDN BRI C. ADSL D. POTS

C

Which of the following would enable you to use iSCSI to read and write data over the network? A. Serial-attached SCSI B. SMB C. Storage area network D. Network attached storage

C

Which type of DNS record is used by mail servers to determine where to send e-mail? A. A record B. CNAME record C. MX record D. SMTP record

C

Why might you use the netstat utility? A. To see the route an IP packet takes across multiple routers B. To see your IP address and configuration details C. To see the endpoints of your sessions D. To issue commands to a remote server

C

With 100BaseT, what is the maximum distance between the switch and the node? A. 1000 meters B. 400 meters C. 100 meters D. 150 meters

C

What do switches use to learn where hosts are? A. Source IP address B. Destination IP address C. Source MAC address D. Destination MAC address

C - This is the reason the table that maps MAC addresses to ports on a switch is called the source address table

Which of the following is most likely to be a MAC address assigned to a NIC? A. 192.168.1.121 B. 24.17.232.7B C. 23.4F.17.8A.4C.10 D. 713.555.1212

C. 23.4F.17.8A.4C.10

Which one of these is not part of AAA security? A. Authentication B. Authorization C. Auditing D. Accounting

C. Auditing while an important task, is not part of the AAA model of security.

Which of the following represents a correct sequential order for AAA? A. Accounting, Authentication, Authorization B. Accounting, Authorization, Authentication C. Authentication, Authorization, Accounting D. Authentication, Accounting, Authorization

C. Authentication, Authorization, Accounting First you authenticate, then you are authorized to do certain things, and then everything you do is logged.

Which of the following can identify a person by physical characteristics? A. Key Fob B. Asset tracking tag C. Biometrics D. Smart Card

C. Biometrics Biometrics are described as "something you are" and can be used to authenticate a person before permitting them to access a controlled IT resource.

What applications are best suited for fiber-optic cabling? (Select two.) A. Short distances B. Wireless networks C. High-EMI areas D. Long distances

C. High-EMI areas D. Long distances

Which layer of the TCP/IP model involves routing? A. Link layer B. Transport layer C. Internet layer D. Application layer

C. Internet layer

Which device(s) can notify a firewall about an intrusion so that the firewall can take action? A. Just an IDS B. Just an IPS C. Both an IDS and an IPS D. Neither an IDS or an IPS

C. Intrusion detection systems and intrusion prevention systems both have capabilities to inform firewalls of intrusions.

Where are you most likely to encounter a mesh network? A. On any network using fiber-optic cable B. On any network using plenum cable C. On wireless networks D. On wired networks

C. On wireless networks

Why was the main cable in a bus topology terminated at both ends? A. To allow the signal to be amplified so it could reach both ends of the network B. To prevent the signal from dropping off the network before reaching all computers C. To prevent the signal from bouncing back and forth D. To convert the signal to the proper format for a bus network

C. To prevent the signal from bouncing back and forth

At which layer of the TCP/IP model are UDP datagrams created? A. Link/Network Interface B. Internet C. Transport D. Application

C. Transport

What two devices together enable you to pick a single cable out of a stack of cables? (Select two.) A. Tone aggregator B. Tone binder C. Tone generator D. Tone probe

CD

Which of the following network technologies use UTP cabling in a star topology? (Select two.) A. 10Base2 B. Fiber optics C. 10BaseT D. 100BaseT

CD

What is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?

CIDR

This takes a single class of IP addresses and chops it up into multiple smaller groups. Also called subnetting.

CIDR (Classless Inter-Domain Routing)

Classless Inter-Domain Routing (CIDR)

CIDR was introduced in 1993 to solve the following three problems, as listed in RFC 1519, CIDR: An Address Assignment and Aggregation Strategy". 1. Exhaustion of the class B network address space. 2. Growth of routing tables in Internet routers beyond the ability of current software, hardware, and people to effectively manage. 3. Eventual exhaustion of the 32-bit IP address space

Do Wifi networks use CSMA/CD or CSMA/CA?

CSMA/CA

This is used to determine which computer should use a shared cable at a given moment.

CSMA/CD ( carrier sense multiple access/collision detection)

CAT 5

Cable that has frequency of 100 MHz, 100 Mbps, No longer recognized with TIA/EIA

CAT 5e

Cable that has frequency of 100 MHz, 1000 Mbps, Recognized with TIA/EIA

CAT 3

Cable that has frequency of 16MHz, 16 Mbps, Still recognized with with TIA/EIA

CAT 6

Cable that has frequency of 250 MHz, 10000 Mbps, Recognized with TIA/EIA

CAT 6a

Cable that has frequency of 500 MHz, 10000 Mbps, Recognized with TIA/EIA

CAN

Campus Area Network is a group of interconnected LANs within a small geographical area such as a school campus

SAAC (Stateless Address Auto Configuration; )

Can get IP address to communicate with the Internet without talking to the DHCP server.

CSMA/CA

Carrier Sense Multiple Access with Collision Avoidance

CSMA/CD

Carrier Sense Multiple Access with Collision Detection

Trunking

Carrying multiple VLANs through a single network link through the use of a _______ protocol. To allow for multiple VLANs on one link, frames from individual VLANs must be identified.

UTP categories and data rates

Cat 3 - 16 Mbps Cat 4 - 20 Mbps Cat 5 - 100 Mbps Cat 5e - 1 Gbps Cat 6 - 10 Gbps Cat 6A - 10 Gbps Cat 7 - 10+ Gbps

UTP grades / categories

Cat 3, 5, 5e, 6, 6A, 7 Most new cabling installations will use Cat 6 or Cat 6A because they support all current and planned data speeds and standards.

What is the minimum cable type specified for 100BaseTX?

Category 5 UTP

What is the first troubleshooting thing you should do if you see a computer with an APIPA address?

Check the switch to see if it's functioning. Reboot the switch.

Segmentation

Chopping up data into chunks that fit into a packet and organize the packets for the benefit of the receiving system and hand it over to the NIC for sending.

What class is an IP if the first decimal value is between 1 and 126 with a subnet mask of 255.0.0.0?

Class A

IANA originally passed out IP addresses in a classful fashion:

Class A 1-126 Class B 128-191 Class C 192-223 Class D 224-239 Class E 240-255

What class is an IP if the first decimal value is between 128 and 191 with a subnet mask of 255.255.0.0?

Class B

What class is an IP if the first decimal value is between 192 and 223 with a subnet mask of 255.255.255.0?

Class C

What class is an IP if the first decimal value is between 224 and 239?

Class D

What class is an IP if the first decimal value is between 240 and 254?

Class E

BigTracks is a successful Bigfoot-tracking company using an internal service to manage all of its automated Bigfoot monitoring stations. A Bigfoot migration has caused a massive increase in the amount of audio and video sent back from their stations. In order to add short-term capacity, they can create new servers in the public cloud. What model of cloud computing does this describe? A. Public cloud B. Private cloud C. Community cloud D. Hybrid cloud

D

Coaxial cables all have a(n) _______________ rating. A. resistance B. watt C. speed D. ohm

D

During and after a change to the IT infrastructure, what must be done? A. Downtime must be scheduled. B. New equipment must be installed. C. Operating systems must be patched. D. The changes must be documented.

D

H.323 uses which TCP port number? A. 5004 B. 5060 C. 2427 D. 1720

D

How many pairs of wires do 10BaseT and 100BaseT use? A. 4 B. 1 C. 3 D. 2

D

How many wire pairs does 1000BaseT use? A. 1 B. 2 C. 3 D. 4

D

NetBIOS uses what type of name space? A. Hierarchical name space B. People name space C. DNS name space D. Flat name space

D

One of your users calls you with a complaint that he can't reach the site www.google.com. You try and access the site and discover you can't connect either but you can ping the site with its IP address. What is the most probable culprit? A. The workgroup switch is down. B. Google is down. C. The gateway is down. D. The DNS server is down.

D

Rack-mounted equipment has a height measured in what units? A. Mbps B. MBps C. Inches D. U

D

The best way to know the vulnerabilities of an IT infrastructure is to run what? A. A system-wide antivirus scanner B. Cable certifier C. Critical asset scanner D. Vulnerability scanner

D

The goal of a DoS attack is to make the attacked system process each request for as long as possible. This is called ________. A. reflection B. rotation C. destruction D. amplification

D

The process of verifying with a high degree of confidence that the sender is who the receiver thinks he or she should be is called ______. A. PKI B. authentication C. locking D. nonrepudiation

D

What device directs packets based on MAC addresses? A. Router B. Hub C. Repeater D. Switch

D

What enables two VMs hosted on the same physical machine to communicate without leaving the machine itself? A. Virtual firewall B. Virtual LAN C. Virtual PBX D. Virtual switch

D

What is Area 0 called in OSPF? A. Local Area B. Primary Zone C. Trunk D. Backbone

D

What is Wireshark? A. Protocol analyzer B. Packet sniffer C. Packet analyzer D. All of the above

D

What is the maximum distance for 1000BaseLX without repeaters? A. 1 mile B. 2500 meters C. 20,000 feet D. 5000 meters

D

What is the maximum number of hosts in a /19 subnet? A. 254 B. 8,192 C. 16,382 D. 8,190

D

What is the standard connector for the 10 GbE fiber standard? A. ST B. SC C. MT-RJ D. There is no standard.

D

What should you create when a network is running correctly? A. Answer file B. Capture file C. MIB D. Baseline

D

What standard is used by most NAS devices, enabling them to connect easily to almost any network? A. VLAN B. SIP C. RTU D. CIFS

D

What technology allows you to share a single public IP address with many computers? A. Static Address Translation B. Natural Address Translation C. Computed Public Address Translation D. Port Address Translation

D

What tool enables you to compare current network performance with correctly functioning network performance? A. Baseline monitor B. Packet flow monitor C. Packet sniffer D. Performance monitor

D

What will the command route print return on a Windows system? A. The results of the last tracert B. The gateway's router table C. The routes taken by a concurrent connection D. The current system's route table

D

When is a memorandum of understanding used? A. As part of a legal contract B. As part of a statement of work (SOW) C. When a service level agreement (SLA) expires D. When a legal contract is not appropriate

D

Which authentication standard is highly time sensitive? A. PAP B. RADIUS C. 802.1X D. Kerberos

D

Which command enables you to eliminate DNS cache? A. ipconfig B. ipconfig /all C. ipconfig /dns D. ipconfig /flushdns

D

Which layer of the TCP/IP model controls the assembly and disassembly of data? A. Application layer B. Presentation layer C. Session layer D. Transport layer

D

Which network topology is most commonly seen only in wireless networks? A. Star B. Bus C. Ring D. Mesh

D

Which networking devices can use the Spanning Tree Protocol (STP)? A. Hubs B. Media converters C. UTP cables D. Switches

D

Which of the following cables should never be used in a structured cabling installation? A. UTP B. STP C. Fiber-optic D. Coax

D

Which of the following devices would most likely be a UC gateway? A. VoIP telephone B. Desktop running Windows server C. Managed switch D. Router

D

Which of the following is a unique server function? A. Network login B. High graphics speed C. Large amounts of RAM D. Network authentication

D

Which of the following is a valid loopback address? A. 128.0.0.1 B. 127.0.0.0 C. 128.0.0.255 D. 127.24.0.1

D

link local address

Equivalent to IPv4's APIPA address, when a computer running IPv6 boots up, it gives itself this type of address. The first 64 bits are always FE80::/10 followed by 54 zero bits.

Which of the following is not true of crossover cables? A. They are a type of twisted-pair cabling. B. They reverse the sending and receiving wire pairs. C. They are used to connect hubs. D. Both ends of a crossover cable are wired according to the TIA/EIA 568B standard.

D

Which of the following is the most secure method of wireless encryption? A. WEP B. WEP2 C. WPA D. WPA2

D

Which of the following is the valid reduced version of the address 2001:0489:000f:0000:0000:1f00:0000:000d? A. 2001:489:f::1f:0:d B. 2001:489:f::1f00::d C. 2001:0489:000f::1f00:0000:000d D. 2001:489:f::1f00:0:d

D

Which of the following would never be seen in an equipment rack? A. Patch panel B. UPS C. PC D. All of the above may be seen in an equipment rack.

D

Which standard aims to flexibly integrate a few types of wired and wireless networking technologies, including Wi-Fi and Ethernet? A. IEEE 802.11 B. IEEE 802.3ad C. IEEE 1901 D. IEEE 1905

D

Why might you use a Telnet client? A. To see the route an IP packet takes across multiple routers B. To see your IP address and configuration details C. To see the endpoints of your sessions D. To issue commands to a remote server

D

Why should you configure a unique SSID for your wireless network? A. A unique SSID enables backward-compatibility between 802.11g and 802.11b. B. A unique SSID boosts wireless network range. C. A unique SSID boosts wireless network data throughput. D. A unique SSID clearly defines your wireless network.

D

Which one of these technologies is the most commonly used interconnect in supercomputers? A. NAS B. FCoE C. iSCSI D. InfiniBand

D - InfiniBand allows for very high throughput with very low latency, competing with Ethernet, Fibre Channel, and other technologies.

Which of the following OSI layers converts the ones and zeroes to electrical signals and places these signals on the cable? A. Physical layer B. Transport layer C. Network layer D. Data Link layer

D. Data Link layer

Which one of these protocols is not used for VPN's A. IPsec B. SSL/TLS C. DTLS D. FTPS

D. FTPS FTPS is FTP using SSL/TLS and is not used for VPNs

John was carrying on at the water cooler the other day, trying to show off his knowledge of networking. He claimed that the company had installed special cabling to handle the problems of crosstalk on the network. What kind of cabling did the company install? A. Coaxial B. Shielded coaxial C. Unshielded twisted pair D. Fiber-optic

D. Fiber-optic

Which one of these is not used primarily for file transfers? A. SFTP B. FTPS C. TFTP D. HTTP

D. HTTP HTTP is primarily used to deliver Web pages and content to browsers, not for uploading and downloading files.

Which committee is responsible for wireless networking standards? A. IEEE 802.2 B. IEEE 802.3 C. IEEE 802.5 D. IEEE 802.11

D. IEEE 802.11

Which of the following is used for prevention? A. Motion B. Video C. Tags D. Key fob

D. Key Fob A key fob is a small hardware device used to authenticate a user. Requiring users to present a key fob can prevent unauthorized access. The other options are for detection.

What topology provides the most fault tolerance? A. Bus B. Ring C. Star-bus D. Mesh

D. Mesh

Two obsolete connectors include

DB-9 and DB25

An IP is set for a fixed amount of time, usually 5-8 days, and assigned by a server.

DHCP (Dynamic Host Configuration Protocol)

DHCP servers can be set up to reserve address for specific machines through what's called

DHCP IP reservations.

DHCP exclusion

DHCP exclusions prevent a DHCP server from giving out sertain IP addresses that were statically configured on servers and routers.

A DHCP client accepts a DHCP assigned IP address for a specific amount of time assigned by a network administrator.

DHCP lease

Many computers can share a pool of routable IP addresses that number fewer than the computers. This is also called pooled NAT.

DNAT (dynamic NAT; )

What does DNS do?

DNS converts FQDN to IP addresses as well as IP addresses to FQDN's to make it easier for people to communicate with computers.

DDNS

DNS previously required manual updates to zone files, but it became very problematic as the Internet and organization's computers grew in numbers. This enables a DNS to talk to a DHCP server and get IP addressing info on its clients.

If done correctly an organization can have internal and external

DNS servers to handle both internal and external DNS requests.

DNS record types include

DNS uses many different record types for different resolutions. The most common DNS resource record is the A record, which maps a host name or FQDN to its corresponding IPv4 address. Others include AAAA (hostname or FQDN to IPv6 address). NS (domain to authoritative DNS servers for the domain). MX (domain to SMTP servers for the domain). CNAME (hostname or FQDN, or simply more text), SRV (service to hostname or FQDN and port number) PTR (IP address to hostname or FQDN).

What type of frame do cable modems use?

DOCSIS

The most basic chunk of data in the telephone world

DS0

What field of the IP address packet header contains data used by bandwidth-sensitive applications like VoIP?

DSCP (Differentiated Service Code Point 0

Direc sequence Spread Spectrum (DSSS)

DSSS is a modulation technique that transfers data using the full bandwidth of a frequency.

Wavelength division multiplexing (WDM) and dense WDM (DWDM)

DWDM enables an individual single mode fiber to carry multiple signals by giving each signal a different wavelength.

Which layer of the OSI model is the only one to have any sublayers?

Data Link

Wireless Bridge

Dedicated wireless bridges are used to connect two wireless networks together, two wired networks together or to join wireless and wired networks together in the same way that wired switches do. Two types 1. Point to Point These connect to another single bridge 2. Point to multipoint These connect and can talk to more than one bridge at a time and connect multiple network segments.

The inside NIC on a router is also referred to as the ______.

Default Gateway

What are the signs of APIPA

Default IP of 169.254.XX.XX with a subnet of 255.255. Everything works except for the internet

Institute of Electrical and Electronics Engineers; IEEE

Defines industry wide standards that promote the use and implementation of technology.

Authentication

Defines what an authenticated person can do with data. Most famous form is username and password

Authorization

Defines what an authenticated person can do with data. The classic thing done in windows is to assign permissions to user accounts.

Compare and contrast business continuity and disaster recovery concepts.

Deploying redundant hardware provides fault tolerance and helps to avoid downtime disruptions.

What information is stored in a packet

Destination IP address, Source IP address, Data

What are four items listed in a routing table entry list?

Destination LAN IP Subnet Mask Gateway Interface

What two things does a router use in combination to see if a packet matches that route?

Destination LAN IP & Subnet Mask

DES (Data Encryption Standard;)

Developed by the U.S. Government it uses a 64-bit block and 56-bit key; Old TCP/IP symmetric-key algorithms

RC4

Develped in 1980s, it is lightning fast encryption, easy to use and free. In 2001-2013 some flaws were found with it, so while it is still supported, it's quickly being looked at as legacy.

Steps to troubleshooting the network

Diagnose the NIC Diagnose locally Check IP address & subnet mask Run netstat with no options Run netstat -s Diagnose the gateway Diagnose the internet

Contingency planning

Disaster recovery is a critical part of contingency planning that deals directly with recovering your primary infrastructure from a disaster. A disaster is an event that disables or destroys substantial amounts of infrastructure, such as a hurricane or flood.

Disaster recovery plan

Disaster recovery starts with an organization developing a disaster recovery plan.

This routing protocol calculates the total cost to get to a particular network ID and compare that cost to the total cost of all the other routes to get to that same network ID. Not as efficient for large networks.

Distance vector

What determines the best route for distance vector routing protocols?

Distance vector routing protocols use one of several algorithms to determine the best route to other routers based on the cost (distance) and direction (vector).

Load balancer

Distributes the load over many physical servers; adds fault-tolerance; can cache and prioritize traffic; very common in large environments

active directory

Domain is an organization of computers that shares one or more Windows domain - get more info

Server program automatically passes out the information to computers on the network

Dynamic addressing

EAP-FAST (EAP Flexible Authentication via Secure Tunneling)

EAP Flexible Authentication via Secure Tunneling is Cisco's replacement for LEAP (Lightweight Extensible Authentication Protocol). All current operating systems support EAP-FAST.

EAP-TLS (EAP-Transport Layer Security)

EAP with TLS defines the use of a RADIUS server as well as mutual authentication, requiring certificates on both the server and every client.

Exam Tip

Each 64 Kbps channel in a DS1 signal is a DS0

Virtual vs Physical hardware

Each VM has a virtual NIC, just like each VM has a virtual CPU, virtual RAM and more. However, the host system running the hypervisor will have two virtual NICs as well. Note: No virtual NIC is created for bridged networking as the host system and VM are on the same subnet. A virtual switch connects the host systems physical NIC to the VM's virtual NIC.

With CSMA/CD, when does a computer know when to transmit?

Each device generates a random number and the computer with the lowest number goes first.

Carrier Sense

Each node using the network examines the cables before sending a data frame.

Where are port numbers found?

Either TCP or UDP headers. They are used at Layer 4 to correspond with a program or service on a machine that is sending or receiving traffic.

network topology's link devices together in two ways

Either physically or logically and can be wired or wireless

Uplink Port

Enable you to connect 2 switches using a straight through cable.

public-key cryptography

Encryption keys can be exchanged securely

An arbitrary number generated by a sending computer, most common in range of 1024-5000, receiving computer uses this as a destination address

Ephemeral port

Interface Monitoring consists of

Error Rate - How many packets per second are errors. Utilization - How much of the total bandwidth of the port is being used? Packet Drops - How many packets are dropped per second?

CCITT (Comité Consultatif International Téléphonique et Télégraphique) Which is now ITU-T

Established standards for modems. V standards, which define the speeds at which modems can modulate. V.22 1200bps all the way to V.92 57,600 bps.

01-00-5E-xx-xx-xx

Ethernet reserves this address for IPv4 multicast frame destination addresses.

In terms of actual numbers, network ID's are always ______?

Even

UPS

Even the smallest rack should run off of a good battery backup that plugs into the wall. It enables you to shut down in an orderly fashion. It does not provide enough power for you to continue to work. The device that handles the latter service is called a generator.

router

Every TCP/IP LAN that wants to connect to another TCP/IP LAN must have this type of physical connector.

Recovery and continuity plans

Every business continuity plan includes setting up some form of secondary location that enables an organization to continue to operate should its primary site no longer function. These can be broken into three different types. Cold, Warm, and Hot. They all use forms of backups, snapshots, and previously saved versions to be back to normal as quickly as possible.

Full backup

Every file selected is backed up, and the archive bit is turned off for every file backed up. This is the standard "back it all up" option.

Aggregation

Every router uses a subset of the next higher router's existing routes and reduces the size and complexity of routing tables. This gives a geographic picture of Internet organization. The IP address indicates location and is part of IPv6

Emergency procedures

Exit plans, building layout, fire escape plans, and location of emergency exits. Locked doors need to fail open (doors that open in emergency) or fail closed (doors that close in an emergency). These should be posted. Also have a loud emergency alert system.

Port 20/21

FTP Port; File transfer

Active vs Passive FTP

FTP has two ways to transfer data: active and passive FTP. FTP uses TCP ports 20 and 21. When your client sends an FTP request, it goes out on port 21.

TCP examples

FTP, email, IMAP/SMTP and HTTP, SSL/TLS

The part of the IP that is the same for all the computers on a network is called the Host ID. T or F

False

Fale positive and False negative

False positive is when normal activities are flagged as malicious. False negative is when malicious activities are flagged as normal.

Fiber connectors

Fiber connectors are optical rather than electrical. ST - Stick and twist SC - Stick and click LC - Local connector FC - ferrule connector MTRJ - Mechanical Transfer Registered Jack Standard connector type is PC physical contact. But prices have replaced PC with 1. Ultra Physical Contact (UPC) 2. Angled Physical Contact (APC)

Organizationally Unique Identifier (OUI)

First 6 digits of a MAC address that represent the manufacturer of the NIC.

ipconfig /flushdns

Flush the DNS cache and forcing it to repopulate itself to repopulate with the latest DNS resolutions.

Logical vs. Physical diagrams

For physical think wiring and port locations, server locations, and workstations. For the logical, think about VLANs and network segmentation. Physical diagrams show a map or topology of the network. Logical diagrams show how network traffic flows, and where it's contained.

DHCP on small networks

For small networks, when there is a single subnet, it is a given that the DHCP server will be on that network.

Forward vs. Reverse Zones

Forward lookup zones contain all DNS resources records mentioned in the prvious section except for PTR records. A reverse lookup zone takes a network ID, reverses it, and adds a unique doman called "in-addr-arpa" to create the zone.

MPLS network terms

Forwarding Equivalence Class (FEC) Label Switching router (LSR) Label Edge Router (LER) Label distribution Protocol (LDP)

What information is included in a frame?

Frame header, Packet header, Data, FCS

What is the name of the data packaged at the Data Link layer 2 of the OSI model?

Frames

CA Private Keys and Revocation

If the CA's private key was stolen, they would have revoked it, and the theft would have been all over the news. Furthermore, your browser checks a certificate revocation list (CRL) or uses the Online Certificate Status Protocol (OSCP) to see if root certificates from CAs are still valid.

DSL (digital subscriber line)

Fully digital dedicated connection. Uses the same telephone lines and RJ-11 jacks as any regular phone line. Versions include Symmetric DSL (SDSL) and Asymmetric DSL (ADSL). SDSL - same upload and download speeds. ADSL - faster download than upload speeds. To use DSL you must be within 18,000 ft of a central office. VDSL is the latest version of DSL to appear. Speeds up to 100+ Mbps in both directions makes it attractive. But need to be within 300M.

Wireless

GSM, CDMA, TDMA

1000BaseT

Gigabit Ethernet on UTP. Today this is the most common type of Ethernet found on new NICs. IEEE 802.3ab = 1000BaseT IEEE 802.3z = 1000BaseX

inventory

Good inventory management includes documentation of what you have which allows you to maintain a collection of spare in the event of failure.

Port 80

HTTP Port; Web

Port 443

HTTPS Port; Secure Web

An OSI Layer 1 device which is a multi-port repeater, everything is half-duplex, and becomes less efficient as speeds increase

HUB

Session Layer

Handles all the sessions for a system. Initiation, accepting incoming sessions, opening and closing existing sessioins.

session software

Handles the process of differentiating among various types of connections on a PC.

RG-59 cable

Has an Ohm rating of 75

RG-6 cable

Has an Ohm rating of 75

Hot site

Has everything a warm site does, but also includes very recent backups. It might need just a little data restored from a backup to be current, but in many cases a hot site is a complete duplicate of the primary site. A proper hot site should only take a few hours to bring online.

What field in the IP address packet header indicates the total size of the IP portion of the packet in words (32 bits)?

Header Length

ACK

Helps to confirm to the other side that it has received the SYN.

Z Wave

Home automation - the process of controlling lights, thermostats, cameras even washer and dryer remotely

What are the most common criteria for determining a metric?

Hop; hop count Bandwidth Latency Cost (lower bandwidth "costs" more) Administrative distance - number assigned to a route/protocol combination

FQDN (Fully qualified domain name)

Host and domain name together for a naming convention.

ARP ( Address Resolution Protocol)

How a TCP/IP network figures out the MAC address based on the destination IP address.

32 bits

How many bits is an IPv4 IP address?

8 quartets; 16 bits each; 16 bytes total

How many quartets does an IPv6 IP address contain?

Port Aggregation Protocol (PAgP)

I am the protocol used by Cisco for port channeling / Port aggregation. Or you can run this across Link Aggregation Control Protocol (LACP) which is an IEEE specification.

IMAP (Internet Message Access Protocol) uses what port?

I143 Retrieves mail from a server to an email client. But you are working directly on the server the entire time.

Who assigns Autonomous System Numbers (ASNs)?

IANA

Which organization was formed to track and disperse IP addresses to those who need them.

IANA (Internet Assigned Number Authority)

Which protocol is used for information and error reporting?

ICMP

IDS and IPS facts

IDS are out of band and get copies of frames, while IPS are inline and can stop traffic dead inits tracks. Both IDSs and IPSs can notify a firewall about addig urles to block certain packets.

Host based or network based IDS/IPS

IDS/IPS can be both host based or network based.

What standard allows frames to be sent with a VLAN?

IEEE 802.1Q is used by every Ethernet switch.

Port 143

IMAP4 Port; E-mail delivery

What overcomes limits of Ethernet MAC addresses?

IP addressing

IP exclusions

IP exclusion represents an IP address or range of IP addresses from the pool addresses that are not to be given out by the DHCP server.

Where are TCP segments and UDP datagrams encapsulated?

IP packets at layer 3.

IPSec (Internet Protocol Security)

IPsec is a suite of protocols used for authentication and encryption of packets.

Common VPN protocols are

IPsec, SSL, TLS and DTLS

Which three protocols are found on the Internet layer?

IPv4, IPv6, ICMP

Multicast

IPv6 completely drops the idea of broadcast addresses and replaces it with the idea of ____.

Identification and authentication

Identification is to say he is someone authentication is to prove it.

Power management

If possible put the telecommunications room on it's own dedicated circuit; that way when someone blows a circuit in the kitchen it doesn't take out the entire network.

Fiber to homes

Most fiber-to-the home technologies employ a version of passive optical network (PON) architecture that uses a single fiber to the neighborhood switch and then individual fiber runs to each final destination. PON uses WDM to enable multiple signals to travel on the same fiber and then passively splits the signal at the switch to send traffic to its proper recipient.

1500 bytes

Most networks hold at most, this many bytes in a frame

49152 - 65535 (Dynamic/Private Ports)

Most operating systems avoid registered port numbers and use these ports instead.

Ping

Most users rarely start a program that uses ICMP, but which command utility does?

Snapshots

Most virtual machines let us take a snapshot, which saves the virtual machines state at that moment, allowing us to quickly return to this state later. Good but not a long term back up strategy.

Class D addresses are used for

Multicasting.

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

Multimode with ST or SC connectors

A methodology of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device.

NAT (Network Address Translation)

NGFW/Layer 7 Firewall

NGFW's are simply components fore UTM's.

NIU

NIU's are known as smart jacks.

DNS & DHCP

Name two networking protocols that used UDP

At what layer of the OSI model does the Internet protocol reside?

Network

What are some examples of topologies and which are commonly used?

Networks used to be designed as physical bus, ring, and mesh topologies but for many years the only physical topology that has been used by networks is the star topology.

Port Scanning Tools include

Nmap, or network mapper.

0

No individual computers can have an IP address ending in what character? These are reserved for network ID's.

UTP (Unshielded twisted pair;)

No protection from EMI

Should switches connected directly to a PC use STP?

No, STP causes latency. These switches should be configured to use a setting called PortFast, which enables interfaces to come up right away.

block size

Number of computers/hosts in the subnet

Link Layer (Network Interface Layer) (TCP/IP Model)

OSI Layer 1 and Layer 2

Wireless Access Point - WAP

OSI Layer 2 device; not a wireless router; It is a bridge to make forwarding decisions based on MAC addresses

Firewall

OSI Layer 4 (TCP/UDP), some filter all the way through Layer 7; filters traffic by port number; can encrypt traffic into/out of network and between sites; Can proxy traffic, a common security technique; call also be Layer 3 devices inside of the router

Application Layer (TCP/IP Model)

OSI Layer 7, 6, 5

Class E addresses are used for

Occasional experimental purposes

In terms of actual numbers, all broadcast IP's are always _____?

Odd

Media converter

Often a plain looking box with a port or dongle on either side. They come in many flavors such as Single mode fiber to UTP/STP Multimode fiber (MMF) to UTP/STP Fiber to coaxial SMF to MMF

The only important measure of a coax cable is its ______.

Ohm rating

Yost cable

Oldest method for connecting to router for configuration; almost unique to Cisco-brand routers; also called rollover cable

IP packets at layer 3 wired vs wireless

On wired LANs they are Ethernet Frames. On wireless LANs they are 802.11 Frames.

PAT (port address table)

One device can handle multiple devices with port translation' changes the source IP address and port number to something usable on the internet

Cisco 2600 series device; Cisco 2811 and 1841

One of the most popular routers ever made, on the older side, but built to last.

Two types of UPS

Online and Standby An online UPS continuously charges a battery that, in turn, powers the computer components. If power goes out the computer doesn't miss a beat until the battery runs out. A standby power supply (SPS) also has a big battery but doesn't power the computer unless the power goes out. Circuitry detects the power outage and immediately kicks on the battery.

Equipment environment

Optimize airflow Use HVAC Avg temperature of 68 degree F. and 50% humidity. Have a proper fire suppression system Follow material safety data sheet.

T568B

Orange / white orange green /white blue blue / white green brown / white brown

Local exchange

Overtime the U.S. was divided into hundreds and thousands of local exchanges where groupings of individual phone circuits served by a single multiplexer. One or more exchanges were housed in buildings called a central office.

EIGRP (Enhanced Interior Gateway Routing Protocol)

Proprietary to Cisco; A hybrid which includes aspects of both distance vector and link state protocols; losing ground to nonproprietary IGP protocols; Developed to replace RIP

Intrusion detection/prevention system

Protects against OS and application exploits; Network based high-speed appliance

Which field of the IP address packet header identifies what's encapsulated inside the packet. Typically it is TCP or UDP

Protocol

Application Programming Interfaces; APIs

Provides a standard way for programmers to enhance or extend an application's capability

Root Guard

Provides a way to enforce the root bridge placement in the network by not allowing a port to become a root port

Remote Authentication Dial-In User Service (RADIUS)

Provides authentication, authorization, and accounting in a centralized fashion for important network resources, was created to support ISP's with hundreds if not thousands of modems in hundred of computers to connect to a single central database. Today it commonly works with digital subscriber line (DSL) connections between a customer and ISP, wireless access points (WAPs), VPNs, and switches using 802.1x authentication.

What does ICMP do?

Provides information and error reporting to devices.

Remote access methods include

RDP, SSH, VNC

Unbounded media includes

RF, microwave, infrared

Coax Standards obsolete cable types include

RG-58, RG-8. (50 ohms) Broadband cable has evolved from RG-59 to RG-6. (75 ohms)

This protocol has a maximum hop count of 15, so your router will not talk to another router more than 15 routers away.

RIP (Routing Information Protocol)

This routing protocol sent out an update very 30 seconds, and caused huge network overloads. It did not know how to use variable length subnet masking; VLSM. It also had no authentication leaving them open to hackers sending false routing table information.

RIPv1

Routers can use one of three distance vector routing protocols. What are they?

RIPv1, RIPv2, or Cisco's Enhanced Interior Gateway Routing Protocol (EIGRP).

Adopted in 1994, this is the current version of RIP. It added VLSM support and authentication protocol is built-in. Used only in small, private networks, it's time to convergence caused problems, but is easy to configure in small networks. Most routers have the ability to use this routing protocol.

RIPv2

Round Trip Time / Real Transfer Time

RTT

Racks

Racks are 19 inches wide It's a good idea to provide each rack with its own rack-mounted UPS Install them on rails and use locking brackets Use properly sized tools wear safety goggles

All coax cables have this type of rating as a quick reference for the different types of coax cables.

Radio Grade (RG) rating

Shielded Twisted Pair

Rather rare, and prevents EMI interface.

MX (Mail eXchanger

Records are used to map a domain to the FQDNs of that domains SMTP (simple mail transfer protocol)

SRV (Service)

Records map a service to a hostname or FQDN and a port number.

AAAA (IPv6 Address)

Records map hostnames of FQDNs to IPv6 address

TXT (text)

Records map text (without any specifications or requirements) to a host name or FQDN or simply more text.

Bridging Loops/Switching Loops

Redundant connections on a network that cause a network to crash because of frames circling the network in a loop.

Using what technique are loops prevented?

Redundant links that are used for fault tolerance will cause a bridging loop. Ports on these loops will be placed into a "blocking" state and will not send or receive data frames. Ports in a blocking state will still hear configuration BPDUs which are sent to switches every 2 seconds.

Microsoft created its own standard called RDP or

Remote Desktop Protocol, which defines how terminal information is passed between a client and server.

Port 3389

Remote Desktop protocol port so you can remote desktop from one internal computer to another internal computer.

Multiprotocol Label Switching (MPLS)

Replaced Frame Relay and ATM. sits between layer 2 and 3. Adds an MPLS label between layer 2 header and layer 3 information. Consists of 4 parts. 1. Label 2. Experimental bits 3. Bottom of label stack 4. Time to live

Crossover Cable

Reverses the sending and receiving pairs on one end of the cable. One end is wired with TIA/EIA 568A and the other end is wired with TIA/EIA 568B. Used to connect two computers directly together.

OSI Layer 3 device which routes traffic between IP subnets and often connects diverse network types - LAN, WAN, copper, fiber

Router

The typical SOHO has several functions

Router, a switch, firewall, DHCP server, DNS server, Wireless access point.

static routes

Routers can have this type of addressing routes which is manually entered, detected by the setup router

dynamic routing protocol

Routers communicated among themselves with change information, update each other on changes about direct connections and distant routers, a passage of a packet through a single router is called a hop

Routers and Broadcast messages

Routers do not forward broadcast messages.

Packet switching is done by who?

Routers. They occupy a transmission channel moving a packet from one router to the next, and then having that channel available for subsequent packets.

What are two hash functions that are no longer recommended as safe

SHA-1 and MD5

Maps a single routable that is not private IP address to a single machine enabling you to access that machine from outside the network. The NAT keeps track of the IP address or addresses and applies them permanently on a one-to-one basis with computers on the network.

SNAT (Static NAT)

SNMP ports and protocol

SNMP uses User Datagram Protocl (UDP) ports 161 and 162 for nonsecure communications. The NMS receives/listens on port 162. The agent receives/listens on port 161. When security is added via Transport Layer Security (TLS) the standard ports used are 10162 and 10161, respectively.

Synchronous Transport Signal (STS)

SONET uses the Synchronous Transport Signal (STS) signal mehtod. The STS consists of two parts: The STS payload (which carriers data) and the STS overhead (which carries the signaling and protocol information).

A routing metric standard to provide true shortest-path forwarding within an Ethernet mesh topology.

SPB (Shortest Path Bridging; )

Port 22

SSH Port; Secure terminal emulation

STP 802.1d vs RSTP 802.1w

STP converges a network in 50 seconds and RSTP converges a network in 6 seconds.

Mitigation Techniques

STP, BPDU guard and root guard.

Satellite as a transmission medium

Satellite access comes in two types: one way and two-way. One way means that you download via satellite but you must use a PSTN/dial up modem connection for uploads. Two way means the satellite service handles both uploading and downloading.

F-type connector

Screws on, making a more secure connection

SSL/TLS/DTLS

Secure Sockets Layer (SSL) VPN's offer an advantage over data link or network based VPN's because they don't require any special client software. The two most common types of SSL VPN's are SSL portal VPNs and SSL tunnel VPNs

What is the name of the data packaged at the Transport layer 4 of the OSI model?

Segments

SSH

Sends encrypted transmissions

telnet

Sends unencrypted transmissions

SIP Trunk

Session Initiation Protocol (SIP) and H.323 handle the initiation, setup, and delivery of VoIP sessions. VoIP uses multicasting.

address compression

Shortcuts for IPv6 are called?

netstat -a

Shows active sessons running.

ip a

Shows network configurations including the MAC address on a Linux system.

IS-IS (Intermediate system - Intermediate system)

Similar to OSPF, but not used very often; Sends only updates to routing tables; worked with IPv6

Virtual Router

Similar to how virtual machines enable us to easily reallocate computer resources when demand changes, virtual routers let us dynamically reconfigure networks. This lets the network keep up when VMs are moved from host to host to meet demand or improve resource use.

E1/E3

Similar to the North American T1 line, E-carrier level 1 (E1) is the European format for digital transmissions. An E1 line carriers signals at 2.048 Mbps. (32 channels at 64 Kbps) compared to T1's 1.544 Mbps (24 channels at 64 Kbps).

PAT; port addressing tables

Some manufacturers, such as Cisco, use this term to refer to either overloaded NAT or port forwarding.

Factors of authentication

Something you know Something you have Something you are Somewhere you are Something you do

TCP header has what?

Source port, Destination Port

UDP header has

Source port, destination port, length and checksum

Four parts of a UDP header

Source port, destination port, length, checksum

Virtual Switch

Special software that enables VMs to communicate with each other without going outside of the host system. Hypervisors allow you to connect all of your virtual machines to the same virtual switch

100 Base TX (100 BaseT) Summary

Speed - 100mbps Signal Type - Baseband Distance - 100 meters between the switch and the node Node limit - 1024 nodes per swithc Topology - Star-bus, physical star, logical bus Cable Type - Cat 5 or better UTP/STP, cabling with RJ45 connectors

850 nm

Speed of almost all multimode cables

1310 or 1550 nm depending on the laser

Speed of almost all single-mode fibers

Most popular network topology used today.

Star bus hybrid

Wired topologies include

Star, ring, mesh and bus topologies

An IP address is determined by manually typing in the IP address information.

Static addressing

Two ways in which a computer gets a logical IP address

Static or Dynamic

SAN

Storage Area Network is a server that can take a pool of hard disks and present them over the network as any number of logical disks

De-encapsulation

Strips data headers as it goes up the OSI data stack.

IEEE 802.3

Subcommittee that deals with standards for Ethernet. It has many subcommittees under it.

IEEE 802.11

Subcommittee that deals with standards for LAN specifications such as WiFi.

GSM (Global System for Mobile Communications) & EDGE Enhanced data rates for GSM Evolution.

The first group of networking technology widely applied to mobile devices relied on TDMA. 2G

What does subnetting involve?

Subnetting involves taking a single network ID and chopping it up into multiple smaller networks, also known as subnets. Subnetting is done by an organization. It is given a block of addresses and then breaks the single block of addresses into multiple subnets. Classless addressing ( one component of CIDR) is done by an ISP or RIR.

Password Policy

Sufficient length, Old also included complexity and changing passwords often.

Who does supernetting?

Supernetting is done by routers, and combines multiple entries for destination networks into a single entry. The fewer rows that need to be parsed by a router to determine how to route the packet, the more efficient it will perform.

OSI Layer 2 device hardware bridging ASICs and is very fast. Forwards traffic based on MAC address, the core of an enterprise network, high bandwidth with many simultaneous packets.

Switch

Layer 2 switches

Switches that route traffic based on MAC address.

Cisco networking device icons like routers and switches.

Switches, Routers and other devices and their associated icons.

NTP

Synchronizes network clocks.

Copper Termination Standards

T568A and T568B. These determine the order of the RJ45 connector strands. Everyone uses T568B.

Connection based delivery system with error checking.

TCP

HTTP is directly encapsulated in what protocol?

TCP

Two protocols at the Transport Layer 4 of the OSI and TCP/IP models.

TCP & UDP

segments

TCP chops data into these, giving them a sequence number, and then verifying all sent data was received.

Layer 4 uses what protocols?

TCP or UDP protocols TCP Segment or a UDP datagram In addition ICMP messages are placed inside IP packets for informational and error reporting.

SSH uses

TCP port 22

What is the de facto protocol suite of the Internet?

TCP/IP

Port 69

TFTP Port; File transfer

Which field of the IP address packet header prevents an IP packet from indefinitely spinning through the Internet by using a counter that decrements by one every time a packet goes through a router. This number cannot start higher than 255, and many start at 128.

TTL (Time to Live)

Modulator

Takes a digital signal and converts it into an analog signal. A demodulator takes an analog signal and converts it into a digital signal. The typical modulator/demodulator device in computers is a modem.

PEAP (Protected Extensible Authentication Protocol)

Technically known as EAP-MS-CHAPv2, uses a password function based on MS-CHAPv2 with the addition of an encrypted TLS tunnel similar to EAP-TLS. The big difference is that the server side is authenticated with a certificate, without the need for the client to have one. This is the most prominent form of EAP is use today with 802.1X

Port 23

Telnet Port; Terminal emulation

If all the WAPs on a single SSID the most important point is

That all WAPs connect to a single switch or group of switches. We call these switches wireless controllers.

While badges, biometrics, smart cards, key fobs, and locks are in place to serve as physical security devices for the prevention of network attacks, they are not perfect.

That's why detection mechanisms like motion detection, video surveillance, asset-tracking tags, and tamper detection are necessary for network security.

What is the OSI layer 7?

The Application layer. This layer contains the APIs and protocols that programs can use to access the network. Application layer programs provide services to the programs that the users see.

BSSID (basic service set identifier)

The BSSID is the MAC address of the wireless access point (AP).

What is the OSI layer 2?

The Data Link Layer. This defines the rules for accessing and using the physical layer. The Data Link layer is divided into two sublayers; Media Access Control (MAC) and Logical Link Control (LLC). NICs exist at this layer as well, because they contain the MAC address that's used, and also because they deal with frames.

Trailer

The Frame Check Sequence.

Intrusion Protection System

The IPS is inline so original traffic must pass through the IPS. An IPS adds some altency, since traffic is processed live.

The Maximum Transmission Unit (MTU) of Ethernet is...?

The MTU is 1500 bytes, which means that more than 1500 bytes, consisting of an IP header and data can't be places inside of an Ethernet frame.

Two patterns for host bits are also reserved. If all host bits are zeros (no matter how many host bits there are), Then that represents

The Network ID

What is the OSI layer 3?

The Network Layer. This is the last layer to work directly with hardware. It creates and addresses packets. The IP addressing enables routers to make sure packets get to the correct system without worrying about the type of hardware used for transmission. Anything having to do with logical addressing works at the Network Layer.

What is the OSI layer 6?

The Presentation Layer. This layer translates data from the lower layers into formats usable by the Application layer. It also translates from the Application layer to lower layers.

Packet

The small unit into which information is broken down before being sent across a network. Layer 3 PDU.

Protocol stack / IP stack

The software installed on a system that enables a specific protocol suite to function.

RADIUS consists of three devices

The RADIUS server that has access to a database of user names and passwords, a number of network access servers (NASs) that control the modems, and a group of systems that in some way connect to the network. To use RADIUS you need a RADIUS server. The most popular choice for Microsoft environments is internet authentication service (IAS).

What is the OSI layer 5?

The Session layer. With session software, handles the process of differentiating between various types of connections on a PC. The Session layer initiates sessions, accepts incoming sessions, and opens and closes existing sessions. You can use the netstat utility to view existing sessions.

Software as a Service (SaaS)

The Software as a Service model provides access to necessary applications wherever you have an internet connection, often without having to carry data with you, or regularly update software. i.e. office software, messaging software, payroll processing software, database management software.

What is the OSI layer 4?

The Transport Layer. This uses either TCP segments for connection - oriented guaranteed, and acknowledged communication or UDP datagrams for connection-less, unguaranteed, and unacknowledged communication.

Failover (high availability)

The ability for backup systems to detect when a master has failed and then to take over. Use of a virtual IP.

Fault tolerance

The ability of the system to continue to operate in the event of a failure is one of its components. i.e. RAID, spread data across multiple drives, server with multiple power supplies, add a second NIC.

single sign-on (SSO)

The ability to log in only one time and use the same token to access any resource (that your allowed to) on an entire network is called single sign on.

Bandwidth/Throughput

The amount of data that can be transferred in a given time period.

Logical Link Control ( LLC)

The aspect of the NIC that talks to the system's operating system.

Mean time to failure (MTTF)

The average amount of time expected until the first failure of a piece of equipment.

mean time to recovery (MTTR)

The average time for a device to recover from a failure that is not a terminal failure.

Vulnerability scanning

The best way to know your infrastructures vulnerabilities is to perform vulnerability scanning, which entails running a program called a vulnerability scanner that will inspect huge number of potential vulnerabilities and create a report for you to then act upon. i.e. 1. Microsoft Baseline Security Analyzer 2. Nessus (Free for home users) 3. Open VAS entails running a program called a vulnerability scanner that will inspect a huge number of potential vulnerabilities and create a report for you to then act upon.

Root Bridge

The center switch that acts as the center of the STP universe.

IDF (intermediate distribution frame) and MDF

The central component being an equipment rack. All racks are 19 inches wide and vary in height. Some are free standing some are mounted to walls etc. The hold things like, routers, servers, rack mounted UPS.

root authorization

The certificate of authority is at the top of the "tree", intermediate certification is in the middle, and the digital signature is at the bottom.

The client generates how must of an APIPA address?

The client only generates the last two octets of an APIPA address. This at least allows the dynamic clients on a single network to continue to communicate with each other because they are on the same Network ID. Unfortunately, APIPA cannot issue a default gateway so you'll never get on the Internet using APIPA.

Content Delivery Network (CDN)

The concept of running many websites replicated on multiple servers. This way when browser request websites they are directed to the nearest server geographically to them, improving performance and reducing latency.

TCP (Transmission Control Protocol)

The connection oriented protocol which assures data is moving between two systems gets there in good order.

VPN concentrator

The connection point for remote users; traffic is encrypted across the Internet and decrypted on the internal private network

UDP (User Datagram Protocol)

The connectionless oriented protocol which is the "fire and forget" missile of the TCP/IP protocol suite.

Incident response

The cornerstone of incident response is the incident response team. This is usually one or more trained, preassigned first responders with procedures in place for what to do. Items mentioned in an incident response policy include deciding whether an event qualifies as an incident the team should address, ignore, or escalate; evaluating the scope and cause of the issue; preventing further disruption; resolving the cause; restoring order to affected systems; and identifying ways to prevent a recurrence.

System Life Cycle

The course of development changes through which a system passes from its conception to the termination of its use. Hardware.

For clients to send data off of the network they need the IP address of.

The default gateway. Clients need to be configured with the IP address of the default gateway, or thier traffic will never be sent off ther network, and traffic for them from other networks, will be delivered onto their networks.

Encapsulation

The entire process of preparing data to go onto a network. All the steps from the application to the Application, Presentation, Session, Transport, Network, and Data Link layers.

T1/T3

The first digital trunk carriers used by the telephone industry are called T-carriers. T1 has several meanings. First, it refers to a digital networking technology (at one time, considered high-speed) called T1 connection. Second, the term T1 line refers to the specific, shielded, two-pair cabling that connects the two ends of a T1 connection. Two wires are for sending data and two wire are for receiving data. This used DS1. 1.544 Mbps. Uses Time Division Multiplexing.

CIDR Part 2

The first probelm (Exhaustion of class B network addresses) was solved with concepts known as subnetting and variable length subnet masking (VLSM). The second problem (growth of routing tables) was solved with a concept known as supernetting, The third problem was solved with a new protocol known as IPv6

OUI - Organizationally Unique Identifier (OUI).

The first six digits of a MAC address identifies which manufacturer built the NIC.

Site Survey

The first step of installing a wireless network is a site survey. This will reveal obstacles to creating the wireless network and will help determine the best possible location for access points.

Protocols

The format and procedure that governs the transmitting and receiving of data.

Two defining defining characteristics of Ethernet

The frame size and elements and the way devices share access to the bus.

Back ups

The goal of backing up data is to ensure that when a system dies, there will be an available, recent copy you can use to restore the system.

Ciphertext (the result)

The jumbled message which, while it can be read, can't be understood.

Device ID

The last 6 digits of a MAC address, unique to each NIC.

device ID

The last 6 digits of the MAC address.

Discretionary Access Control (DAC)

The least restrictive access control model in which the owner of the object has total control over it.

Server Load balancer

The load balancer sends requests to the servers in an efficient way that maximizes speed and capability, making sure that no single server is overburdened. If one goes down or a new one is added the load balancer adjusts accordingly.

Somewhere you are

The location factor; requires you to be in a space to authenticate. i.e. a specific office.

How can you know a web site is secured with a digital certificate?

The lock icon on the browser window on the address bar or the bottom corner

PKI (Public Key Infrastructure)

The method of using third party verification for digital signatures

Mandatory Access Control (MAC)

The most restrictive access control model, typically found in military settings in which security is of supreme importance. User must have permissions at that level to access data.

SYN-ACK

The packet a node sends to acknowledge to another node that it has received a SYN request for connection. This packet is the second of three in the three-step process of establishing a connection.

What is the OSI layer 1?

The physical layer, includes anything that moves data from one system to another, such as cabling or radio waves. NICs exist at this layer, because they transmit and receive signals.

Demarcation Point

The point of division between a telecommunications service carrier's network and a building's internal network. In your home the DSL or cable modem supplied by your ISP is a network interface unit (NIU) that serves as a demarc between your home network and your ISP. NIU = NIB = NID.

BYOD (bring your own device)

The practice of allowing users to use their own personal devices to connect to an organizational network. Often times has mobile device management installed to allow system admins control when on employers network. movement has stormed the corporate world, as employees are using their personal devices for work.

Change management

The process of creating change in your infrastructure in an organized, controlled, safe way is called change management.

InterVLAN Routing

The process of making a router work between two VLANs is called InterVLAN routing.

Nonrepudiation

The process of making sure data came from the person or entity it was supposed to come from. It prevents others from pretending to be a different entity and doing evil things by impersonating

Reassembly

The process of reconstructing data units that have been segmented.

ISDN

The process of sending telephone transmission across fully digital lines end-to-end.

What is Trunking?

The process of transferring VLAN traffic between two or more switches.

Virtualization

The process of using powerful, special software running on a computer to create a complete environment that imitates (virtualizes) all of the hardware you'd see on a physical computer. Two popular methods are SAN and NAS

Integrity

The process that guarantees that the data received is the same as originally sent. Designed to cover situations in which someone intercepts your data on the fly and makes changes.

LDAP (Lightweight Directory Access Protocol)

The protocol that programs use to query and change a database used by the network. Every windows domain controller stores a copy of the active directory database.

Default gateway

The router interface is known as this, and when configuring a client to access the network beyond the router, you must use this IP address.

Warm Site

The same as a cold site, but adds computers loaded with software and functioning servers. A complete hardware infrastructure. It lacks current data and may not have functioning internet, network links. Bringing this site up to speed may start with activating your network links, and it most certainly requires loading data from recent backups. A warm site should only take a day or two to bring online.

interface identifier

The second 64 bits of a link-local address which is generated either randomly or in older Windows products, they use the device's MAC address to create a 64-bit number called an Extended Unique Identifier or EUI-64

Header

The sending and receiving MAC addresses and Type.

Data Storage

There are two methods to consolidate data and storage from hosts. A storage area network (SAN), which reads and writes at the block level, uses certain technologies, including Fibre Channel (FC), Fibre Channel over Ethernet (FCoE), Internet Small Computer System Interface (iSCSI), and InfiniBand. Network attached storage (NAS) is essentially a dedicated file server that has its own file system and typically uses hardware and software designed for serving and storing files.

Termination

There are two reasons to use a telephony WAN connection: to get your LAN on the intertnet or to make a private connection between two or more of your private LANs.

TCP/IP suite or internet protocol

There is a strong push to refer to TCP/IP as these terms instead of TCP/IP

switched virtual interface (SVI)

These are IP addresses assigned to VLANs that serve as default gateways for devices plugged into the switch, as well as physical routed ports to interconnect these VLAns.

forward lookup zone

These contain the mappings of hostnames or FQDNs to IP addresses, while reverse lookip zones contain the mappings of IP addresses to hostnames or FQDN's.

Intrusion Detection System (IDS) and Intrusion Prevention Systems

These detect that something has intruded into a network and then do something about it.

On-boarding and off-boarding procedures

These ensure that employees digital accounts and permissions are assigned and revoked in a consistent and efficient manner.

SNMP has eight core functions

These functions are commonly called protocol data unit (PDU). Four are important 1. Get 2. Response 3. Set 4. Trap

Flags

These individual bits give both sides detailed information about the state of the connection

What do Distributed switching, through technologies like Cisco StackWise allow?

These make it possible to have separate physical switches act as a single logical one.

What did older Ethernet networks use CSMA/CD for?

These networks that used half duplex communications, where a node could only transmit or receive at one time (not simultaneously), used carrier sense multiple access with collision detection (CSMA/CD) to determine which computer should use the shared media at a given moment.

Sequence and ACK numbers

These numbers enable the sending and receiving computers to keep track of the various pieces of data flowing back and forth

Managed devices

These type of devices include both routers and advanced switches that CAN be configured

IPv4 addresses are how mans bits?

They are 32 bit numbers, written in dotted decimal (4 base 10 numbers, separated by 3 dots) notation, like this: 192.168.5.23

What are the nodes that connect in an Ad hoc network called?

They are called IBSS or Independent Basic Service set and randomly generate a 48bit string of numbers called an IBSS ID that looks and functions just like a MAC.

What is a VLAN and what does it do?

They are used to properly segment a network, various departments and components need to be placed into unique virtual local area networks (VLANS). VLANs provide much better control over the inter-network, with security and optimized performance.

Modems do what?

They connect customers to their ISP and can use multiples protocols depending on the ISP type.

How DNS servers find an address they don't have internally

They send messages to other DNS servers asking if they have the information for that network.

Checksum

This checks the TCP header for errors

nslookup

This command queries functions of the DNS servers, depends on proper permission level, running this gives teh IP address and the name of my default DNS server

Part of any proper performance monitor is the facility to create a baseline:

This includes a log of performance indicators such as CPU usage, network utilization, ad other values to give you a picture of your network and servers when they are working correctly.

Wireless Access Point (WAP)

This is a device designed to interconnect wireless net-work nodes with wired networks. A basic WAP operates like a hub and works at OSI layer 1. WAP's are often a WAP, Swith and Router all built into one.

6to4

This is a tunneling protocol that enables IPv6 traffic to use the IPv4 Internet without having to set up explicit tunnels.

100BaseT

This is also called Fast Ethernet.

Teredo

This is built into Microsoft Windows and is the second NAT traversal IPv6 tunneling protocol

unicode

This is how we change numbers to letters

ephemeral port

This is randomly generated port number of the receiving machine

Authentication, Authorizaiton, and Accounting (AAA)

This is the framework for controlling three major concepts related to network security. A user who is trying to connect to a network must present some form of credential for access to the network. After providing a user name, which is known as identification, the user has to prove he is who he claims to be. This is known as authentication, and is commonly done through a password. However, it might also be a security token such as a smart card, retinal scan, or digital certificate or combination.

algorithm

This is the mathematical formula that underlies the cipher.

IGMP (Internet Group Management Protocol)

This protocol is used for multicasts; Enables routers to communicate with hosts to determine a "group" membership; Class D IP address with network ID 224-239 range using a subnet mask of 224.0.0.0

TFTP ( Trivial File Transfer Protocol)

This protocol sends small files between computers - Max file size of 4GB; IntraLAN use where chances of losing data is small. Does not support authentication or encryption. No longer provided by Microsoft for security reasons.

DHCP (Dynamic Host Configuration Protocol)

This protocol uses UDP on port 67 for clients sending the data to this server, and port 68 for server sending the data to these clients. The acknowledgement from the server comes with IP configuration.

NDP (Neighbor Discovery Protocol)

This replaces the IPv4 Address Resolution Protocol; ARP

Stream cipher

This type of encryption takes a single bit at a time and encrypts it on the fly.

Explain Neighbor Discovery Protocol

This uses router advertisements to allow devices to give themselves IPv6 addresses. This is implemented through ICMPv6 (IMCP for IPv6)

Frequency Hopping Spread Spectrum (FHSS)

This wireless technology spreads its signal over rapidly changing frequencies

4to6

This works like any other tunnel, encapsulating one type of data into another. In this case, you are encapsulating your IPv6 traffic into an IPv4 tunnel to get an IPv6 capable router.

How many types of cloud services are there?

Three 1. Saas (Software as a service) 2. PaaS (Platform as a service) 3. IaaS (Infrastructure as a service)

Mandatory Access Control; MAC Discretionary access control; DAC Role-based access control; RBAC

Three types of access control models

The Global System for Mobile (GSM), relied on

Time Division Multiple Access. TDMA

What do PC's need to communicate over phone lines?

To connect over phone lines, PCs need two devices, one that converts this 8-bit wide parallel digital signal from the computer into serial (1 bit wide) digital data and then another device to convert (modulate) the data into analog waveforms that can travel across PSTN lines. Modem and inside the modem is the other piece a Universal Asynchronous Receiver/Transmitter (UART).

Explain an ARP table / ARP cache.

To minimize the network traffic that ARP presents, especially ARP requests, which are broadcasts, each device maintains its own local ARP table (also known as ARP cache), containing bindings of IP addresses to MAC addresses that were recently resolved.

What is the purpose of ports?

To represent a logical way for traffic to move into and out of a program or service on a machine.

How DNS / DHCP work

To request the IP address of www.microsoft.com your PC needs the IP address of its DNS server. This information is gven out by a DHCP server, when it gives a client its IP address subnet mask, and default gateway.

Encryption; Decryption unscrambles it on the other end

To scramble, mix up, or change data in such a way the bad guys can't read it.

DNS root servers

Top dog DNS servers. The internet name for DNS root is "."

65535

Total number of port numbers

Packet flow monitoring

Tracks traffic flowing between specific source and destination devices. The primary tool is netflow Netflow is similar to SNMP but different. This is based on the idea of flows that you define to track the type of traffic you wish to see.

Presentation Layer (Layer 6)

Translates data received from lower layers into a format usable by the Application Layer and vice versa. Encrypts data.

DNS (Domain Name Service)

Translates human readable names into machine readable IP addresses.

transmission medium

Transmission mediums include satellite, copper, fiber, and wireless.

Transmission note

Transmissions over copper wires (i.e. T1, T3 and ISDN lines) have fallen out of favor due to quicker and more practical types of mediums like fiber and wireless.

Which layer of the TCP/IP model includes TCP, UDP

Transport

What layer of the OSI Model is the assembler/disassembler software?

Transport Layer 4

Segments

Transportation (Layer 4) PDU

One of the downsides of subnetting is that you will waste subnets. T or F

True

Some routers and DNS servers between your IPv6 capable computer and other IPv6 capable computers to which you would like to connect are not yet ready for IPv6. What allows you to get past this restriction?

Tunneling

A DHCP relay agent is needed to

Turn DHCP broadcast traffic from clients into unicast traffic, send that unicast traffic to DHCP servers on different subnets, and send the replies from DHCP servers back to the clients.

Dial-up

Two groups Dedicated and dial up. Dedicated lines are always off the hook (that is, they never hang up on each other). Always on. Dial-up lines by contrast have phone numbers; they must dial each other up to make a connection. These are covered by PSTN and ISDN.

Which delivery system is connectionless and does not worry about sychronization or error correction. "Best effort". It is a shout rather than a conversation.

UDP

Which protocol is DHCP directly encapsulated in?

UDP

FF02:::2

When a computer boots up, it sends out a router solicitation message on the multicast address looking for a router. The router hears this message and tells your computer the prefix. Once it has a prefix, the computer generates the rest of the global unicast address, and now you have a legitimate public IPv6 address. What is the multicast address?

Packet Discard

When a port intentionally drops a well formed frame containing a packet. A discard is not an error.

SOP

When certain tasks need to be efficiently carried out the same way every time, a company's standard operating procedure document (work instructions), details each task's steps.

High availability

When devices and systems keep working without interruption or downtime.

Virtual firewalls

When it comes to firewalls, the same rules that apply to virtual routers aply: virtual firewalls can protect servers where it would be hard, costly or impossible to insert physical firewalls. i.e. pfsense

What is Diff Serv? (Differentiated services)

When we talk about QoS, we need to develop the concept of differentiated services (Diff Serv). DiffServ is the underlying architecture that makes QoS work.

What is Circut switching?

When you physically connect two phones together on one circuit you are using called circuit switching.

ICANN (Internet Corporation for Assigned Names and Numbers)

Where Domain Names are registered.

T1

Which T-carrier has 24 channels and speed of 1.544 Mbps

E1

Which T-carrier has 32 channels and speed of 2.048 Mbps

E3

Which T-carrier has 512 channels and speed of 34.368 Mbps

T3

Which T-carrier has 672 channels and speed of 44.736 Mbps

While the 802.11n specification recommends most devices to have multiple antennas to implement multiple in multiple out MIMO

Which enables the devices to make multiple simultaneous connections the latest version of 802.11ac include a new version of MIMO caled multiuser MIMO. MU MIMO gives a WAP the ability to broadcast to multiple users simultaneously.

PPP(Point-to-Point)

Which protocol is found on Layer 2, is used in many physical network environments, and includes authentication, compression, error detection, & multilink

IANA

Who passes out /48 subnets to ISPs and end users who need large allotments? The ISPs and others will borrow another 16 bits for subnetting and then pass out the /64 subnets to end users

Which command is blocked by default and needs to be enabled.

Win 7 ping

T568A

Wire order white / green green white / orange blue white /blue orange white / brown brown

WLAN

Wireless Local Area Network

What is a WLAN

Wireless Local Area Network is a network using Wi-Fi and not cables

documentation for change

Wiring and port locations are important to document. All patch panels have space in the front for labels, and these labels are the network tech's best friend.

Packet and IP how it works

With Ethernet, the whole frame encapsulates a single set of data, such as an IP packet that, in turn encapsulates a TCP segment, UDP datagram, or ICMP packet. It generally takes multiple frames to get the data to the recipient, where the frames are removed, the IP packet is removed, and the segment or datagram gets put together to make the data transfer complete.

OFDM (Orthogonal Frequency Division Multiplexing)

With OFDM the data is delivered by being spread across multiple parallel channels.

How close do you need to be to a central office to use ISDN?

Within approximately 18,000ft.

Internet Protocol (IP)

Works at the Internet Layer, taking data chunks from the Transport Layer, adding addressing, and creating the final IP packet.

What converts Ethernet to Fiber Optic and vice versa

XENPACK

Can you designate a specific local address for various network services with port forwarding?

Yes

On many advanced routers and switches what are some ways you can implement QoS?

You can do this through bandwidth management, such as traffic shaping, where you control the flow of packets into or out of the network according to the type of packet or other rules.

Internal vs. External DNS

You can have external DNS servers to handle public requests and internal DNS servers to handle private requests.

A T1 connection is point to point

You cannot have more than two CSU/DSU on a single T1 line. The cable ends with a modular jack called an RJ-48C.

Does DSL need additional phone lines?

You do not have to run new phone lines with DSL. The same DSL lines you use for data can simultaneously transmit your voice calls.

What is Z-Wave

Z-Wave is another wireless protocol that is mainly used for home automation.

Port Security

a Cisco switch feature that limits the number of MAC addresses allowed to communicate through a particular port / switch port.

Storage Area Network (SAN)

a SAN is a server that can take a pool of hard disks and present them over the network as any number of logical disks. The interface it presents to a client computer pretends to be a hard disk and enables the client's operating system to read and write blocks over the network.

MAC filtering involves

a blacklist of MAC addresses that can't acess your network and a whitelist of MAC addresses that can access your network. It's not a perfect system, as hackers can spoof their MAC addresses.

Primary and secondary DNS servers

a both authoritative for that domain. That means they don't rely on cache to give out answers. as they have the answers in a file. The difference between the two is that the sysadmin makes changes to the zone files on the primary DNS server, and those changes are copied upon request to the secondary DNS servers in a process known as zone transfer.

Patch Panel

a box with a row of female ports in the front and permanent connections in the back, to which you connect the horizontal cables is used to organize cables. All have space in the front for labels. A good out let will also identify the position in the patch panel.

Something you are

a distinguishing unique characteristic such as a bio metric

A certificate is

a form of authentication that contains, among other items, a digital signature of a third party, a person or company that guarantees that who is passing out this certificate truly is who they say they are.

InfiniBand

a high-performance, multipurpose network architecture based on a switched fabric, and was designed for use in SANs and cluster networks. As the most commonly used interconnect in supercomputers, InfiniBand allows for very high throughput with very low latency, competing with Ethernet.

Port scanning

a method to find what programs or services are running on a machine. Once you know what services are running on a machine, you can identify vulnerabilities for certain services. For each vulnerability, you'll find an exploit, and execute a payload to carry out the attack.

A packet sniffer is

a program that queries a network interface and collects (captures) packets in a file called a capture file

Hypervisor

a program that runs virtual machines, which exist as a single file or multiple files. The CPU, RAM, hard drive, and other physical hardware are virtualized for the virtual machines that run through a hypervisor. Every for of networking can be virtualized, including NICs, switches, routers, and firewalls.

Every TCP/IP LAn that wants to connect to another TCP/IP PAN must have

a router connection. There is no exception to this critical rule. A router therefore, needs an IP address on the LANs that it serves, so it can correctly route packets. That router interface, on each LAN, is known as the default gateway.

An IP address is nothing without

a subnet mask

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

ANT+ is

a wireless protocol which allows for monitoring sensor data like heart rates and tire pressure in cars. It also controls indoor lighting, television sets and other systems.

CNAME (Canonical name record)

act like aliases. They map a hostname or FQDN to another hostname of FQDN. i.e. if you type it in wrong they know what you meant.

Wireless networks can operate in one of two modes (topologies)

ad hoc or infrastructure. In a ad hoc network, the wireless nodes communicate directly with each other. Infrastructure mode uses a wireless access point which is connected to the network.

Network interface unit (NIU)

also known as a demarc. Commonly used to describe a small box on the side of a home that accepts the incoming lines from the telephone company and then splits them to the different wall outlets. Demarc more commonly describes large connections used in businesses.

Content filter or Content switch

always work at layer 7. They are designed to work with Web servers, therefore are able to read the incoming HTTP and SSL/TLS requests. Can act as a load balancer.

Captive Portal

an AP that requires users to agree to some condition before that can use the network / internet

SFTP (SSH FTP) is similar to FTP, with servers and clients but relies on

an SSH tunnel.

Stateful packet filtering uses sessions

and can understand stages of a TCP connection, and can be aware of a hacker who tries to spoof an IP address.

Authentication, authorization, and accounting (AAA) are important for what?

are vitally important for security on switches and work in conjunction with a RADIUS server.

Routers using the OSPF protocol are organized into these groups.

areas

Any encryption that uses a different key for both encryption and decryption is called a _____.

asymmetric-key algorithm

802.1X is a port based

authentication network access control mechanism for networks. A network access control usually prevents computers lacking anti-malware and patches from accessing the network.

Kerberos is an

authentication protocol for TCP/IP networks with many clients all connected to a single authenticating server.

Remote Authentication Dial-In User Service (RADIUS) provides

authentication, authorization, and accounting in a centralized fashion, for important network resources.

variable-length subnet masking (VLSM) is

basically subnetting a subnet and allows an internetwork to have different subnet masks (which translates into different sizes) for different networks.

Unidirectional antenna focuses a radio wave into a

beam of sorts.

802.11n was designed to run at

both 2.4Ghz and 5.0Ghz so that it is compatible with 802.11b and 802.11g.

SIP and H.323

both run on top of the Real-time Transport Protocol (RTP). Most VoIP solutions are either SIP/RTP or H.323/RTP A SIP trunk uses SIP as a VoIP technology and streaming media service.

When every computer on a LAN hears a message, you have sent a _____?

broadcast

iSCSI

built on top of TCP/IP, enabling devices that use the SCSI protocol to communicate across existing networks using cheap, readily available hardware.

CSU/DSU

connect two CSU/DSU boxes together directly by using a T1 crossover cable. Like the UTP crossover cables youve seen previously in the book, the T1 crossover cable simply reverses the send/receive pairs on one end of the cable. You'll only see this in use to connect older routers together. The CSU/DSU connections provide convenient link points.

Wireless bridges are used to

connect two wireless networks together, or wired, or mixture.

The Wired Mesh Topology

connects each node with multiple links, providing multiple paths between any two nodes. The wired mesh topology is rarely if ever seen in LANs because of cost. This type has a high level of fault tolerance.

Many public facilities like airports employ a captive portal to

control access to their public Wi-Fi networks.

The updating of the routing tables for all the routers has completed and nothing changes in terms of connections, the routing tables will not change.

convergence

What is another name for segment?

datagrams

Simple Network Management Protocol (SNMP) is the

de facto network management protocol for TCP/IP networks.

The system life cycle

deals with regular plan of pushing out old devices and moving in new ones.

Network Access Control (NAC)

defines a newer series of protection applications that combine the features of what traditionally was done by separate applications. NAC is a standardized approach to verify that a node meets certain criteria before it is allowed to connect to a network. A NAC usually prevents computers lacking anti-malware and patches from accessing the network.

The AUP - The acceptable use policy

defines what is and what is not acceptable to do on an organizations computers.

SFTP (Secure File Transfer Protocol) also called SSH FTP

designed as a replacement for FTP after many of the inadequacies of SCP were discovered.

On a TCP/IP network, what information within a packet does a router use to determine where an incoming packet should go?

destination IP address

Wireless mesh topology

devices broadcast directly to each other. Every device connects to every other device via two or more wireless access points.

Having a server program running on a system that automatically passes out all IP information to systems as they boot up on or connect to a network

dynamic addressing

Stateless packet filtering

each packet is treated by itself as an isolated piece of communication.

Managing risk to employee physical health falls into three broad categories:

electrical safety, physical/installation safety, and emergency procedures. Most companies implement clear safety procedures and policies to keep employees safe.

A transceiver plugs into a networking devices and

enables conversion from one media type to another. Examples include SFP, GBIC, SFP+, QSFP.

TFTP (Trivial File Transfer Protocol)

enables you to transfer files from one machine to another. using UDP doesn't have any data protection so you would never use it between computers across the internet. uses port 69. Not secure.

Virtual Private Network (VPN)

encrypted tunnel between a computer or remote network and a private network through the internet. An encrypted tunnel requires endpoints. The ends of the tunnel where the data is encrypted and decrypted.

Network Attached Storage (NAS)

essentially a dedicated file server that has its own file system and typically uses hardware and software designed for serving and storing files.

If one of the cables breaks, all of the computers can still communicate because of ______.

fault tolerance

Which type of network topology would have every computer connected to every other computer?

fully meshed

Local connections do not use this, although every routing table has a column for it, and therefore, a value appears in this field for each route.

gateway

A mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length. Used with checksum to test the integrity of the data. It is a one way function.

hash

This has both "outside" and "inside" NICs built in.

home router

What is the term used for the passage of a packet through a router?

hop

Software based firewalls are known as

host based firewalls. These only protect a single system

Any form of network technology that combines physical topology with a signaling topology is called a ______.

hybrid topology

Physical Security Devices

i.e. Video Surveillance Motion detection asset tracking tags tamper detection prevention Badges (RFID) Key FOB Smart Cards Biometrics Locks (on servers and racks)

A UNIX/Linux/OS command that gives you the system's IP address & MAC address

ifconfig

The Ohm rating of a particular piece of cable describes the ______ of that cable which describes the characteristics that define how much a cable resists the flow of electricity. This is not simple resistance though. It is also a factor in such things as how long it takes the wire to get a full charge.

impedance

802.11g improves upon the 802.11b standard by

increasing the transfer rate to 54Mbps, while staying compatible with 802.11b by running at the 2.4Ghz frequency band.

IPAM

integrates DNS and DHCP.

A wireless access point is a device designed to

interconnect wireless network nodes with wired networks.

A media converter

interconnects different cabling standards

File Transfer Protocol (FTP)

is the original protocol used on the internet for transferring files. The old active FTP used TCP ports 21 and 20 by default. Although passive FTP only uses port 21 for a default. FTP is not very secure because data transfers are not encrypted by default. examples include filezilla. is the original protocol used on the internet for transferring files.

What is the dynamic link state routing protocol most autonomous systems use?

it is OSPF (Open Shortest Path First)

Licensing restrictions

just like hardware and software need to be strictly enforced. Note: different countries have regulations in place for exporting hardware and software.

Public and private keys that go together are called ____.

key pair

Which layer of OSI are routers found at?

layer 3 of the OSI.

The beauty of SONET

lies in its multiplexing capabilities. A single SONET ring can combine multiple DS1, DS3, and even European E1 signals and packet them into a single, huge SONET frames for transmission. The Optical Carrier (OC) standards denote the optical data-carrying capacity (in bps) of fiber-optic cables in networks conforming to the SONET standard.

Instead of sending an entire routing table every 30 seconds, this simply announces and forwards individual route changes as they appear.

link state dynamic routing protocol

Like a postal code or telephone numbering scheme, it ignores the hardware and enables you to break up the entire large network into smaller subnets

logical addressing

Fiber cable is used on backbones and over

long distances

Fibre Channel over ethernet , FCoE

make Fibre Channel a little more flexible within local wire network, long distance FC is still clumsy without expensive cabling and hardware.

Both routers and these advanced switches are called

managed devices.

SNMP Ports

managers listen on UDP ports 162 or 10162 (with TLS) Agents listen on ports 161 or 10161 (with TLS).

PTR (Pointer) record

map IP addresses to their corresponding hostnames or FQDNs.

UTM Appliance - A unified threat management appliance

marries traditional firewalls with other security services such as network-based IPS, load balances and more.

A relative value that defines the "cost" of using this route. When determining the route a packet should take, it will always take the smallest of these.

metric

What problem does single-mode fiber prevent which is unique to multimode fiber?

modal distortion; signals sent at the same time don't arrive at the same time because the paths differ slightly in length

Where a single computer sends a packet to a group of internet computers. Often used when routers talk to each other.

multicast

Most common type of fiber is

multimode 62.5 which can be used for cable runs of up to 275m.

Twisted pair cabling in a building can be used for

multiple purposes including computer networks, security systems, telephones etc.

Telecommunications Rooms

need to be protected from excess heat and humidity, so temperature and environmental monitors are a must.

Command prompt command that allows you to see network output sessions

netstat -a

Who assigns Area IDs?

network administrators

Hardware firewalls are referred to as

network based firewalls

IANA passes out IP addresses in contiguous chunks called?

network blocks (blocks)

An IP address entry in a router's routing table, which specifies the next closest/most optimal router in its routing path. Every single router maintains its routing table with this address, which is calculated based on the routing protocol used and its associated metric.

next hop

Each NIC on a network is also referred to as a ____.

node

An access control list ACL in the current context, is

nothing more than a clearly defined list of permissions that specifies what an authenticated user may perform on a shared resource.

Auditing is a formal check

of the logs to see whether malicious actions were performed or if standards and requirements were followed.

demultiplexer

on the other end of the connection split the individual connections back out.

When the router is forwarding outside of the network, it uses what is referred to as the _______.

outside NIC

An omnidirectional antenna radiates

outward from the WAP in all directions.

Created and addressed at the OSI Network Layer, so they can go from one network to another

packets

Bridge Protocol Data Units (BPDUs)

packets contain information on ports, addresses, priorities and costs and ensure that the data ends up where it was intended to go.

Which type of network topology would have at least 2 machines with redundant connections?

partially meshed

A content filter, also known as a content switch does what?

performs very advanced actions after inspecting specific protocols, including load balancing.

MPLS connection that the IPS establishes for you permanently and acts as a VPN is

permanent virtual circuit (PVC)

Wireless range extenders (extenders / repeaters)

pick up a signal and repeat it into a wider space.

DNS (Domain Name System) uses what port?

port 53 Resolves FQDN into their corresponding IP addresses, and performs other types of resolution like finding a domain's DNS servers, a domain's mail servers and reverse lookups, matching IP addresses to FQDN

If your company has a single server on the private LAN that they want to make accessible from the Internet, which of the following would give the server the protection of NAT while allowing access to that server from the Internet?

port forwarding

You can designate a specific local address for various network services. Computers outside of the network can then request a service using the public IP address of the router and the port number of the desired service.

port forwarding

A 7 byte series of alternating ones and zeroes followed by a 1-byte Start Frame. This gives the receiving NIC time to realize a frame is coming and to know exactly where the frame starts. It is added by the sending NIC.

preamble

A Platform as a Service provider gives

programmers all the tools they need to deploy, administer, and maintain a Web application. They have some form of infrastructure but on top of that infrastructure the Paas provider builds a platform: a complete deployment and management system to handle every aspect of a Web application.

Software as a Service model

provides access to necessary applications where you have an internet connection, often without having to carry data with you or regularly update software.

UDP examples

real time communications, conferencing, streaming. DNS, and DHCP

NS (Name Server)

records map a domain to the FQDNs of the authoritative name servers for that domain.

Jumbo Frame

reduce the total number of frames moving through the network.

Patch Management includes

regularly updating operating systems and applications to avoid security threats.

SONET facts

remains the primary standard for long distance high speed fiber optic transmission systems. SONET, like Ethernet defines interface standards at the Physical and Data Link layers of the OSI model. Ring based topology

Telnet and SSH both allow you to

remotely log on to a remote machine through a CLI. TELNET doesn't have any encryption and thus should never be used. SSH encrypts the messages between SSH clients and SSH servers.

Asset Disposal

report describing the final disposition of the asset

MTBF (Mean Time Between Failures)

represents the manufacturer's best guess based on historical data regarding how much time will pass between major failures of that component, white MTTR (mean time to recovery) is the amount of time it takes for a hardware component to recovery from failure.

If you want to see the routing tables, you will have to open a Command Prompt window and then enter the _____ command.

route print

Any piece of hardware or software that forwards packets based on their destination IP address.

router

Connects two networks together; forwards packet based on IP address; Layer 3 Network layer; Classically dedicated boxes; has two NIC cards by default.

router

What makes logical addressing powerful is this tool that connect each of the subnets, uses the IP addresses not the MAC addresses.

router

Every node on the network has one of these ____.

routing table

Snapshot

saves a virtual machine's state at that moment.

TCP's protocol data units are called _____.

segments

The transport protocol breaks up the data into chunks called _____?

segments/datagrams

Load Balancers

send requests to the servers in an efficient way that maximizes speed and capability, making sure that no single server is overburdened.

ipconfig /all

shows the MAC address and all network configurations on a Windows system.

Also known as logical topology, this is how the signal travels electronically

signaling topology

A nondisclosure agreement NDA

signed by employees prohibits them from violating the confidentiality of any proprietary and sensitive company related information.

This network diagnosis program can order a NIC to run in promiscuous mode which causes the NIC to process all frames it sees on the cable regardless of their MAC address.

sniffer

Typing all of the IP information in for each network node so it does not change.

static addressing

Logs

store information about the performance of some particular aspect of a system. Different programs refer to the monitored aspect with different terms. i.e. counters, syslog, facilities. A log file might record the percentage of utilization over time of a specific Ethernet port for example.

This is done by an organization when it takes a block of IP addresses received from an ISP and breaks the single block of numbers into multiple subnetworks

subnetting

Linux/Unix command to release the DHCP address

sudo ifconfig eth0 down

Linux/Unix command to renew the DHCP address

sudo ifconfig eth0 up

Terminal Access Controller Access Control System Plus (TACACS+) is a protocol developed by Cisco to

support AAA in a network with many routers and switches.

Any encryption that uses the same key for both encryption and decryption is called a _____.

symmetric-key algorithm or symmetric key encryption

Ports associated with applications falling between numbers 0 and 1023

system ports

A log file might record what?

the percentage of utilization over time of a specific Ethernet port, for example, or the average throughput of a network connection. Authorization attempts, both successful and unsuccessful, can be logged and analyzed, as well. Therefore, log reviewing is an important monitoring process, to make sure you know what's going on in the network.

Patch Management

the process of regularly applying patches and updates to software

multifactor authentication

the use of two or more types of authentication credentials in conjunction to achieve a greater level of security

Local authenticaiton

this is when you provide credentials to the machine that you're logging in to, and not to a separate server.

How would you use RADIUS?

to connect to a network to send data, but TACACS+ to log in to a router or switch to configure and manage the device.

Cisco's Port Security feature allows you

to limit a certain number of MAC addresses to be learned by a switch port.

LDAP is the protocol that programs use

to query and change a database used by the network.

Interface monitoring includes

tracking metrics such as error rates, utilization, packet drops, and bandwidth / throughput

Log file issues

two issues. The first is security. Log files are important for the information they provide. The second issue is maintenance.

multifactor authentication (MFA) means using

two or more distinctly different methods for authentication: 1. Something you know 2. Something you have 3. Something you are 4. Somewhere you are 5. Something you do

A first hop redundancy protocol (FHRP) allows

two or more routers to provide backup for the default gateway IP address given to hosts.

Where do routes in a routing table come from?

two sources: either they are manually entered or they are detected dynamically by the router. Routers have static routes. However, most routers also have the capability to update their routes dynamically, assuming they're provided with the extra smarts in the form of dynamic routing protocols. Default routes are used by routers to forward packets to other routers, for any destination network not in a router's routing table.

Where one computer sends a message directly to another user

unicast

Security Information and Event Management (SIEM)

used to monitor and manage networks in real time, by analyzing security alerts triggered by both hardware and software. This is a mash up of security event management (SEM) and security information management (SIM). This is a two part process that begins with the security event monitoring component. Once logs are created and saved the second part, SIEM, security information management kicks in: here, the log files are reviewed and analyzed by automated and human interpreters.

FTP (File Transfer Protocol) uses what port?

uses 21 and 20. listens on port 20 and sends on port 21.

Multimode fiber (MMF)

uses multiple rays of light (modes) simultaneously with each ray of light running at a different reflection angle to carry the transmission over short distances (under 21KM).

RFID (radio frequency identification)

uses radio signals to communicate with a tag placed in or attached to an object. Different from NFC 1. RFID isn't a single standard as it is many standards that use the technology 2. RFID standards use diverse frequencies and unique protocols. Close proximity Weak or no encryption Uses labels commonly to house tag

Large scale global infrastructure as a service providers use

virtualization to minimize idle hardware, protect against data loss, and downtime and respond to spikes in demand.

Asynchronous Transfer Mode (ATM)

was a network technology originally designed for high speed LANs in the early 1990s. Until MPLS most of SONET rings used ATM for packet switching.

A VoIP endpoint represents a location at which a call terminates,

which could be an IP phone, an application, and even a server.

Topology Change Notification (TCN)

which is used to indicate that a there has been a change in the switch network topology.

Single mode fiber

which uses a single cohesive frequency of light known as a mode, to carry transmission over long distances (up to as much as around 40km).

Cross over cable order

wires 1 and 2 (Transmit) from one end of the cable are switched to the receive wire place holders (3,6) at the other end of the cable.


Kaugnay na mga set ng pag-aaral

Chapter 1 - Overview of the Insurance Industry

View Set

Agile and Hybrid Questions - Rita

View Set

Biology Module 2: Principles of Ecology

View Set

Chapter 7: Attempt, Conspiracy, and Solicitation

View Set

Rehabilitation Counselor Training (COAST) Exam 1 Part 2

View Set

15. property and casualty insurance- property and casualty insurance basics- insurance regulation

View Set

Period 4 AP Classroom- economic and political

View Set