Midterm Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

default class A subnet mask

255.0.0.0

default class B subnet mask

255.255.0.0

SSH (Secure Shell)

TCP 22

Telnet

TCP 23

SMTP (Simple Mail Transfer Protocol)

TCP 25

RDP (Remote Desktop Protocol)

TCP 3389

HTTPS (Hypertext Transfer Protocol Secure)

TCP 443

SMB (Server Message Block)

TCP 445

SIP (Session Initiation Protocol)

TCP 5060/5061

HTTP (Hypertext Transfer Protocol)

TCP 80

class A private address

10.90.9.140

default class C subnet mask

255.255.255.0

broadcast

255.255.255.255

a logical digital pattern that provides clues as to the type and purpose of a worm, virus, or malware

data signature

the physical point where a WAN connection comes into a facility

demarcation point

use of mathematical algorithms to hide data by scrambling its symbols or changing the symbols

encryption

a hardware appliance running software used in logical security to scrutinize and manage data traffic

firewall

use of phone line to deliver dedicated high speed digital services

DSL

a person or condition within an organization possessing potential for harm

internal threat

a type of unicast address that the client computer gives to itself, similar to APIPA in IPv4

link local address

a method of learning data link layer addresses for IPv6 machines located in the sam physical or broadcast domain

neighbor discovery (ND)

a physical topology that separates the internal network from the external network

DMZ

an organizational framework that defines assets to be protected and assigns authority for doing so

security policy

a periodic message sent to a network segment providing information about the network address and other network parameters

router advertisement (RA)

a host generated message to force an IPv6 gateway device to advertise its network capabilities

router solicitation (RS)

a computer appliance with software designed to detect but not necessarily prevent an unauthorized intruder

IDS

the protocol that handles the built-in security that IPv6 incorporates to encrypt packet data

IPsec

what does the common Ipconfig /renew do?

PC8 will contact the DHCP server and request an IP address. the DHCP server will offer the first available address from its pool or scope of addresses.

security policy implementation such that a specific data asset is protected using an authentication and authorization process

access control list

loopback address

127.0.0.1

class B public address

154.50.3.4

what is the difference between a Basic Service Set (BSS) and an Extended Service Set (ESS) in this scenario?

with BSS, a user would hav to log in to each wireless access point separately because they would each have a separate SSID. With ESS, they can roam around the facility with their laptop computers using the same SSID. the laptop would negotiate its connection with the strongest signal and adapt its channel setting accordingly.

you receive a call for a user/client who claims he cannot reach the internet. he executes the command ipconfig and relays the following information back to you: IP address: 169.254.46.9 Subnet mask: 255.255.0.0 Default Gateway: [none listed] which of the following can you definitely conclude are true? a) the machine is set to obtain an IP address automatically b) the machine is configured with a static address c) the machine is using APIPA d) the machine failed to located a DHCP server e) the connection to the switch is not currently enabled or plugged in f) the DHCP server is down

1) A,C,D are definitely true. the other answers could be true, but not definitely 2) not being able to obtain its IP address from a reachable DHCP server is the main problem here

what else could you do to narrow down this problem?

1) ping the DHCP server address to see if it responds. if it does, the machine that DHCP is configured on is working, but the DHCP service is not working, or has run out of addresses to offer clients 2) find out whether anyone else on this network is having the same issue 3) if you have physical access, you can examine the event viewer for error messages regarding the DHCP service

POP3 (Post Office Protocol version 3)

110 TCP

IMAP (Internet Message Access Protocol)

143 TCP

Automatic Private IP Addressing (APIPA)

169.254.4.220

class B private address

172.16.2.2

class c private address

192.168.234.2

class A public address

2.2.2.2

FTP (File Transfer Protocol)

21

class c public address

222.2.2.2

class D multicast address

224.0.0.10

RIP (Routing Information Protocol)

520

DNS (Domain Name System)

53

LDAPS (Lightweight Directory Access Protocol Secure)

636

creates signal in the 5GHz range

802.11a

creates 11mbps signals at a frequency of 2.4GHz

802.11b

can deliver 54mbps at 2.4GHz frequency

802.11g

wifi protected access version 2 (WPA2) authentication

802.11i

Uses MIMO to make multiple simultaneous connections while extending distance

802.11n

better for short distances and limited data for personal area networks

802.15

a fiber connector that is polished at an angle where it connects to another fiber connector in order to minimize signal loss

APC

wireless network in which one device associates itself with another device without the benefit of a wireless access point

AdHoc

what method was used to provide this machine (PC9) with an IP address?

DCHP is set to no. therefore, a computer administrator provided the address manually

allows multiple wireless access points to work together to extend a wireless netowrk

ESS

Consider the medium of air as defined by the use of radio frequency. What made some of the early standards so slow compared to today's 802.11n 300Mbps and higher bandwidth?

Earliest standards were dependent on a single frequency/channel to both send and receive. This shared medium creates the same problem as half-duplex coax cable. Because receivers had to wait for the signal before sending a response, this reduced the overall bandwidth. Other factors affect wireless signal propagation, too, including RF interference, antenna choice, and obstacles such as walls, trees, and even weather (precipitation, for example).

a first generation supplementary interface adaptor that converts allows 1 gbps conversion from fiber optic to twisted pair or vice versa

GBIC

high density fiber designed by Lucent to be used in fiber optic networks

LC

a data delivery protocol that forwards packets using the data link layer using label switching instead of routing tables

MPLS

a fiber connector smaller than the typical SC connector

MTRJ

domain controller (DC)

Microsoft Server that responds to security authentication requests (logging in, checking permissions, etc.) to a number of computer resources with the use of a single username and password combination.

optical signaling providing 155 mbps

OC3

a WAN protocol that is non-proprietary and capable of having encrypted authentication

PPP

encapsulates point to point protocol inside ethernet frames

PPPoE

similar to a T-1 in bandwidth, but can also use ISDN technology and requires more bandwidth to be dedicated to the signaling and control function

PRI

what might be the problem is you try to access the Local Area Connection window and no Network Adapter seems to be available?

Possible answers include: no adapter is installed no device driver or the wrong device driver was installed the adapter has a corrupt device driver the network adapter is damaged

a transceiver with a small enough form factor that it can plus into a network interface but allow conversion of electrical ethernet to fiber optic at up to 28gbps

QSFP

coax commonly used in cable tv, satellite, and broadband internet installation

RG-6

used to terminate a cat5 cable into an 8 pin connector

RJ-45

square connector with a spring loaded coupling to improve performance

SC

use of high speed leased lines managed via software defined network programming to lower costs

SD-WAN

small form factor interface that supports up to 16gbps fiber optic data traffic

SFP+

used in delivering a voice telephony service on the internet

SIP Trunk

a name this is used to represent a wireless network to a set of common hosts

SSID

dedicated leased line technology allowing for 1.544 mbps

T1

dedicated leased line services delivering up to 45 mbps

T3

NTP (Network Time Protocol)

UDP 123

SNMP (Simple Network Management Protocol)

UDP 161

DHCP (Dynamic Host Configuration Protocol)

UDP 67, 68

TFTP (Trivial File Transfer Protocol)

UDP 69

the process of reducing the IPv6 address to its shortest possible format

address truncation

the address that replaces the broadcast IPv4 address and allows for machines to contact all machines with a specific service to offer, such as a router or DNS server

anycast address

delivery of high speed Internet using existing shared medium TV coax

cable broadband

a routable address used to set up a host to host link on the public internet

global unicast address

generic term for an individual engaged in attempts to circumvent security measures protecting data

hacker

access PC8 and bring up its command prompt. use the same Ipconfig /all command as before. what do you notice this time with respect to DCHP?

it is set to yes, meaning it want to have its IP address provided by a DHCP server service.

50-62.5 micron diameter cable that allows multiple optical frequencies to travel in the core simultaneously

multi mode

an address that is used to receive data that is intended for many destinations simultaneously

multicast address

process of monitoring and reporting on network related events involving accessing and using data

network auditing

why do we need port numbers?

port numbers basically transfer data received by the NIC to the local machine RAM location being reserved for the specific application. For example, when you are watching a movie while receiving email at the same time. this is how your email does not show up on your movie screen.

8-10 micron diameter long distance cable used with laser diode generated signals for fiber optic networking

single mode

suppose you are the technician who has just asked a complaining user to use ipconfig to tell you what his IP address is. He responds with 169.254.2.45. What can you conclude from this?

the user's machine cannot reach the DHCP server and so it has given itself an IP address from the range 169.254..., which is reserved for automatic private IP addresses (APIPA). the next question that the tech needs to ask is why the user cannot reach the DHCP server. is anyone else experiencing the problems, or just this user?

use of data encapsulation to package data inside another header so as to hide the original header and data

tunnel

the process of placing an IPv6 datagram inside an IPv4 packet header for use by IPv4 networks

tunneling

similar to IPv4, a single address on a single interface forming a direct line of communication

unicast address

an address that can be assigned manually to ensure that an address stays on a private network and is not routed

unique local address

pints of network access where the exposure to threats can turn into unauthorized intrusion

vulnerability

use of mobile devices to discover open wireless hotspots

war driving

ethical hacking authorized by an organization as a means of testing and hardening security defenses

white hat


Ensembles d'études connexes

OTA Lab 1 Final Written Study Guide

View Set

Political Science 101 Ingram Final

View Set

Chapter 27: Measuring Domestic Output and National Income

View Set

Entrepreneurial Small Business Chapter 6

View Set

Midterm: Alcohol and Drug Abuse Prevention

View Set

GS ECO 2301 CH 8 GDP : Measuring Total Production and Income

View Set

Module 1 - Central Nervous System Part 1 copy

View Set

Chapter 19 managing cost and budgets

View Set