Midterm Study Guide
default class A subnet mask
255.0.0.0
default class B subnet mask
255.255.0.0
SSH (Secure Shell)
TCP 22
Telnet
TCP 23
SMTP (Simple Mail Transfer Protocol)
TCP 25
RDP (Remote Desktop Protocol)
TCP 3389
HTTPS (Hypertext Transfer Protocol Secure)
TCP 443
SMB (Server Message Block)
TCP 445
SIP (Session Initiation Protocol)
TCP 5060/5061
HTTP (Hypertext Transfer Protocol)
TCP 80
class A private address
10.90.9.140
default class C subnet mask
255.255.255.0
broadcast
255.255.255.255
a logical digital pattern that provides clues as to the type and purpose of a worm, virus, or malware
data signature
the physical point where a WAN connection comes into a facility
demarcation point
use of mathematical algorithms to hide data by scrambling its symbols or changing the symbols
encryption
a hardware appliance running software used in logical security to scrutinize and manage data traffic
firewall
use of phone line to deliver dedicated high speed digital services
DSL
a person or condition within an organization possessing potential for harm
internal threat
a type of unicast address that the client computer gives to itself, similar to APIPA in IPv4
link local address
a method of learning data link layer addresses for IPv6 machines located in the sam physical or broadcast domain
neighbor discovery (ND)
a physical topology that separates the internal network from the external network
DMZ
an organizational framework that defines assets to be protected and assigns authority for doing so
security policy
a periodic message sent to a network segment providing information about the network address and other network parameters
router advertisement (RA)
a host generated message to force an IPv6 gateway device to advertise its network capabilities
router solicitation (RS)
a computer appliance with software designed to detect but not necessarily prevent an unauthorized intruder
IDS
the protocol that handles the built-in security that IPv6 incorporates to encrypt packet data
IPsec
what does the common Ipconfig /renew do?
PC8 will contact the DHCP server and request an IP address. the DHCP server will offer the first available address from its pool or scope of addresses.
security policy implementation such that a specific data asset is protected using an authentication and authorization process
access control list
loopback address
127.0.0.1
class B public address
154.50.3.4
what is the difference between a Basic Service Set (BSS) and an Extended Service Set (ESS) in this scenario?
with BSS, a user would hav to log in to each wireless access point separately because they would each have a separate SSID. With ESS, they can roam around the facility with their laptop computers using the same SSID. the laptop would negotiate its connection with the strongest signal and adapt its channel setting accordingly.
you receive a call for a user/client who claims he cannot reach the internet. he executes the command ipconfig and relays the following information back to you: IP address: 169.254.46.9 Subnet mask: 255.255.0.0 Default Gateway: [none listed] which of the following can you definitely conclude are true? a) the machine is set to obtain an IP address automatically b) the machine is configured with a static address c) the machine is using APIPA d) the machine failed to located a DHCP server e) the connection to the switch is not currently enabled or plugged in f) the DHCP server is down
1) A,C,D are definitely true. the other answers could be true, but not definitely 2) not being able to obtain its IP address from a reachable DHCP server is the main problem here
what else could you do to narrow down this problem?
1) ping the DHCP server address to see if it responds. if it does, the machine that DHCP is configured on is working, but the DHCP service is not working, or has run out of addresses to offer clients 2) find out whether anyone else on this network is having the same issue 3) if you have physical access, you can examine the event viewer for error messages regarding the DHCP service
POP3 (Post Office Protocol version 3)
110 TCP
IMAP (Internet Message Access Protocol)
143 TCP
Automatic Private IP Addressing (APIPA)
169.254.4.220
class B private address
172.16.2.2
class c private address
192.168.234.2
class A public address
2.2.2.2
FTP (File Transfer Protocol)
21
class c public address
222.2.2.2
class D multicast address
224.0.0.10
RIP (Routing Information Protocol)
520
DNS (Domain Name System)
53
LDAPS (Lightweight Directory Access Protocol Secure)
636
creates signal in the 5GHz range
802.11a
creates 11mbps signals at a frequency of 2.4GHz
802.11b
can deliver 54mbps at 2.4GHz frequency
802.11g
wifi protected access version 2 (WPA2) authentication
802.11i
Uses MIMO to make multiple simultaneous connections while extending distance
802.11n
better for short distances and limited data for personal area networks
802.15
a fiber connector that is polished at an angle where it connects to another fiber connector in order to minimize signal loss
APC
wireless network in which one device associates itself with another device without the benefit of a wireless access point
AdHoc
what method was used to provide this machine (PC9) with an IP address?
DCHP is set to no. therefore, a computer administrator provided the address manually
allows multiple wireless access points to work together to extend a wireless netowrk
ESS
Consider the medium of air as defined by the use of radio frequency. What made some of the early standards so slow compared to today's 802.11n 300Mbps and higher bandwidth?
Earliest standards were dependent on a single frequency/channel to both send and receive. This shared medium creates the same problem as half-duplex coax cable. Because receivers had to wait for the signal before sending a response, this reduced the overall bandwidth. Other factors affect wireless signal propagation, too, including RF interference, antenna choice, and obstacles such as walls, trees, and even weather (precipitation, for example).
a first generation supplementary interface adaptor that converts allows 1 gbps conversion from fiber optic to twisted pair or vice versa
GBIC
high density fiber designed by Lucent to be used in fiber optic networks
LC
a data delivery protocol that forwards packets using the data link layer using label switching instead of routing tables
MPLS
a fiber connector smaller than the typical SC connector
MTRJ
domain controller (DC)
Microsoft Server that responds to security authentication requests (logging in, checking permissions, etc.) to a number of computer resources with the use of a single username and password combination.
optical signaling providing 155 mbps
OC3
a WAN protocol that is non-proprietary and capable of having encrypted authentication
PPP
encapsulates point to point protocol inside ethernet frames
PPPoE
similar to a T-1 in bandwidth, but can also use ISDN technology and requires more bandwidth to be dedicated to the signaling and control function
PRI
what might be the problem is you try to access the Local Area Connection window and no Network Adapter seems to be available?
Possible answers include: no adapter is installed no device driver or the wrong device driver was installed the adapter has a corrupt device driver the network adapter is damaged
a transceiver with a small enough form factor that it can plus into a network interface but allow conversion of electrical ethernet to fiber optic at up to 28gbps
QSFP
coax commonly used in cable tv, satellite, and broadband internet installation
RG-6
used to terminate a cat5 cable into an 8 pin connector
RJ-45
square connector with a spring loaded coupling to improve performance
SC
use of high speed leased lines managed via software defined network programming to lower costs
SD-WAN
small form factor interface that supports up to 16gbps fiber optic data traffic
SFP+
used in delivering a voice telephony service on the internet
SIP Trunk
a name this is used to represent a wireless network to a set of common hosts
SSID
dedicated leased line technology allowing for 1.544 mbps
T1
dedicated leased line services delivering up to 45 mbps
T3
NTP (Network Time Protocol)
UDP 123
SNMP (Simple Network Management Protocol)
UDP 161
DHCP (Dynamic Host Configuration Protocol)
UDP 67, 68
TFTP (Trivial File Transfer Protocol)
UDP 69
the process of reducing the IPv6 address to its shortest possible format
address truncation
the address that replaces the broadcast IPv4 address and allows for machines to contact all machines with a specific service to offer, such as a router or DNS server
anycast address
delivery of high speed Internet using existing shared medium TV coax
cable broadband
a routable address used to set up a host to host link on the public internet
global unicast address
generic term for an individual engaged in attempts to circumvent security measures protecting data
hacker
access PC8 and bring up its command prompt. use the same Ipconfig /all command as before. what do you notice this time with respect to DCHP?
it is set to yes, meaning it want to have its IP address provided by a DHCP server service.
50-62.5 micron diameter cable that allows multiple optical frequencies to travel in the core simultaneously
multi mode
an address that is used to receive data that is intended for many destinations simultaneously
multicast address
process of monitoring and reporting on network related events involving accessing and using data
network auditing
why do we need port numbers?
port numbers basically transfer data received by the NIC to the local machine RAM location being reserved for the specific application. For example, when you are watching a movie while receiving email at the same time. this is how your email does not show up on your movie screen.
8-10 micron diameter long distance cable used with laser diode generated signals for fiber optic networking
single mode
suppose you are the technician who has just asked a complaining user to use ipconfig to tell you what his IP address is. He responds with 169.254.2.45. What can you conclude from this?
the user's machine cannot reach the DHCP server and so it has given itself an IP address from the range 169.254..., which is reserved for automatic private IP addresses (APIPA). the next question that the tech needs to ask is why the user cannot reach the DHCP server. is anyone else experiencing the problems, or just this user?
use of data encapsulation to package data inside another header so as to hide the original header and data
tunnel
the process of placing an IPv6 datagram inside an IPv4 packet header for use by IPv4 networks
tunneling
similar to IPv4, a single address on a single interface forming a direct line of communication
unicast address
an address that can be assigned manually to ensure that an address stays on a private network and is not routed
unique local address
pints of network access where the exposure to threats can turn into unauthorized intrusion
vulnerability
use of mobile devices to discover open wireless hotspots
war driving
ethical hacking authorized by an organization as a means of testing and hardening security defenses
white hat