CompTia Network+
What are the main address classes?
A, B, and C
All APIPA addresses begin with
169.254.0.0
Class B private address ranges
172.16.0.0 to 172.31.255.255.255
What are the Class C address class ranges?
192.0.0.0 to 223.255.255.255
Class C private address ranges
192.168.0.0 to 192.168.255.255
Used to refer to a family of protocols which mediate network access
AAA
These records map a FQDN (fully qualified domain name) to an IPv6 address. This is the IPv6 equivalent to the A record.
AAAA
Also known as "IPv6 address record", maps a hostname to a 128-bit IPv6 address in the Domain Name System (DNS)
AAAA Record
A list of permissions attached to an object
ACL
Automatic Private IP Addressing
APIPA
Address Resolution Protocol
ARP
Which syntax is representative of transmission speed of 10 Mbps using UTP?
A single break in the bus disables the network
What is a typical subnet mask for IPv6?
A string of 64 bits
A form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer's ARP cache with a forged ARP request and reply packets
ARP Poisoning
Which protocol maps an IP address to a MAC address within a local network?
ARP-Address Resolution Protocol
Autonomous systems
AS
One or more networks, controlled by a single organization (such as an ISP) whose routers are governed by a single dynamic routing policy, and often a single protocol
AS
A set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used
Acceptable Use
ACL
Access Control List
A switch port that connects to a NIC in a PC
Access Port
ACK
Acknowlege
What can wireless devices use when there is no WAP present?
Ad Hoc Mode
A number assigned to a routing protocol to allow routers to prefer one protocol over the other, if a destination network can be reached with multiple routing protocols
Administrative Distance
Device used for analog signals, just increases the voltage and includes all the pops and hisses created by all kinds of interference.
Amplifier
Applied to a group of systems (sharing the same Unicast IP address) providing a service
Anycast
Transmission Method in which data is sent from a server to the nearest node in the group
Anycast Transmission
Which layers of the OSI model are used for upper layer data?
Application Presentation Session
What are the layers of the OSI model?
Application Presentation Session Transport Network Datalink Physical
What are the layers of the TCP/IP model?
Application Transport Internet Network Access
Requires two keys to encrypt and decrypt data
Asymmetric encryption
AAA
Authentication, Authorization and Accounting
AAAA
Authentication, Authorization, Accounting, and Auditing
What are the four major factors of security systems?
Authorization Access control Accountability Auditing
AS
Autonomous System
Any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel
Crosstalk
Problems caused when signals from adjacent cables interfere with each other
Crosstalk
What is it called when two pairs of wires in the same cable interfere with each other?
Crosstalk
Key combination that allows to stop the execution of the current command run in Windows Command Prompt
Ctrl+C
What is the last step in resolving a network problem?
Customer verification
Digital storage directly attached to the computer accessing it, as opposed to storage accessed over a computer network
DAS
Direct-Attached Storage
DAS
Distributed Control System
DCS
Distributed Denial of Service
DDOS
Type of computer attack that uses a number of hosts to overwhelm a server, causing a website to experience a complete system crash
DDOS
Creates buffer overflow on a server
DDoS
Distributes IP addresses and additional IP setting to machines on the network
DHCP
Ports 67, 68
DHCP
Protocol that assigns IP addresses automatically to clients on the network.
DHCP
Protocol that provides automatic host IP address assignment
DHCP
When this is enabled and configured within a router, the router will pass DHCP requests and responses across the router interfaces, by taking DHCP broadcasts and turning the into unicasts
DHCP relay
Network that sits between your internal network and the internet
DMZ
Port 53
DNS
Protocol that maps computer names to IP addresses
DNS
Protocol that provides TCP/IP name resolution
DNS
Translates IP addresses into names that humans can better handle and remember
DNS
Data Over Cable Service Interface Specification
DOCSIS
Protocol used by cable companies
DOCSIS
Telecommunications standard used to provide Internet access via a cable modem
DOCSIS
A standard digital transmission rate for digital telecommunications. Defines a transmission rate of 64 Kbps and can carry either a single voice channel or data
DS0
Digital Signal Zero
DS0
Each 64kbps channel in a DS1 signal is a
DS0
Differentiated Services Code Point
DSCP
A family of technologies that are used to transmit digital data over telephone lines
DSL
Digital Subscriber Line
DSL
An optical technology used to increase bandwidth over existing fiber optic backbones.
DWDM
Dense Wavelength Division Multiplexing
DWDM
Frames reside on which layer of the OSI model?
Data Link
Unit of data transfer between deices that communicate over a network
Data packet
Remote connections that are never disconnected
Dedicated connection
IP address of a router that routes remote traffic from the devices local subnet to remove subnets is known as a
Default Gateway
What device separates the private network from the communications provider?
Demarc
The transmission path originating from the interface of the access provider's side of a demarcation point within a premises and ending at the termination point prior to the interface of the edge Customer Premises Equipment (CPE) is called a
Demarc Extension
DMZ
Demilitarized Zone
Computer software, firmware or hardware that creates and runs virtual machines
Hypervisor or VMM
This protocol that works at layer 3 delivers information and error messages.
ICMP
Intrusion Detection System
IDS
Type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities or through security policy violations
IDS
A type of protocol used for exchanging routing information between gateways (commonly routers) within an autonomous system. This routing information can then be used to route network-layer protocols like IP.
IGP
Interior Gateway Protocol
IGP
How is the MAC address sometimes used in IPv6?
In the second half of the link local address as the EUI
Why is IPv6 being introduced?
Increase the number of IP addresses
IEEE
Institute of Electrical and Electronics Engineers
Performs framing of the information from all layers above in the proper format for the physical network. Performs error detection of corrupt or missing bits in the frame.
Layer 2 Function
At which layers of the OSI model does a managed switch perform?
Layer 2 and Layer 3
At which layer of the OSI model do routers work?
Layer 3
Performs routing. Determines the path the information will take to get from the source to the destination device.
Layer 3 Function
Provides end-to-end reliability between end devices. (Achieved by segmentation, synchronization, and flow control mechanisms)
Layer 4 Function
Manages communication between source and destination applications. Establishes, maintains, and terminates logical connections between client and server applications.
Layer 5 Function
Converts the data from the application layer into a format that other layers can understand. Handles formatting, compression, and encryption.
Layer 6 Function
Interacts with the OS or application to provide network services needed to perform the network function that the software needs to do. Ex. transferring files, email, web browsing
Layer 7 Function
Troubleshooting Step 6
Document findings, actions and outcomes
Advantages/Disadvantages of Static Routing tables
Does not cause additional network traffic/Requires manual maintenance
Computers share a pool of public routable IP addresses that number fewer than the computers
Dynamic NAT
Route discovery operations build and update routing tables themselves by using special software is known as
Dynamic Routing
What are the names of the European telephone signal carriers using copper?
E1/E3
Extensive Authentication Protocol
EAP
Protocol used to assist in the authorization process used in wireless networks
EAP
If data has an error, the receiver can rebuild the data using
EDAC-Error Detection and Correction
A now obsolete routing protocol for the Internet originally specified in 1982
EGP
A simple reachability protocol, and, unlike modern distance-vector and path-vector protocols, it is limited to tree-like topologies.
EGP
Extended Gateway Protocol
EGP
Exterior Gateway Protocol
EGP
Any individual or group that circumvents security to access unauthorized data
Hacker
A virtual server without a keyboard or mouse is called
Headless
Refers to a system or component that is continuously operational for a desirably long length of time
High Availability
A decoy network for trapping hackers or tracking unconventional or new hacking methods
Honeynet
A decoy computer system for trapping hackers or tracking unconventional or new hacking methods
Honeypot
Defined as each time a packet goes through a router
Hop
The action of forwarding a packet from one router to the next is a
Hop
A device connected to a network
Host
What does a network topology depend on?
How the signals move
A cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms
Hybrid Cloud
Combination of two or more clouds
Hybrid Cloud
Self sufficient computer that acts as both server and client to other computers on a network
Peer
Each computer acts as both a client and a server
Peer to Peer
PAN
Personal Area Network
Fraudulent act of acquiring private and sensitive information, such as credit card numbers, personal identification and account usernames and passwords
Phishing
Slang term for hacking into secure telecommunication networks
Phreaking
Bits reside on which layer of the OSI model?
Physical
MAC addresses sometimes referred to as
Physical Addresses
Which layer of the OSI model transmits bits from one device to another and regulates the transmission stream over a medium?
Physical Layer
These cables are slower to burn and produce less smoke than cables using a mantle of materials like PVC
Plenum
An application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall.
Port Forwarding
Designating a specific local address for various network services
Port Forwarding
Practice of duplicating all traffic on one port in a switch to a second port, effectively sending a copy of all data to the node connected to the second port is known as
Port Mirroring
What function is used to monitor a port during active transmissions of data?
Port Mirroring
What ports do FTP ( File Transfer Protocol) use?
Ports 20 and 21
What is appended to the beginning of the Ethernet frame?
Preamble
A particular model of cloud computing that involves a distinct and secure cloud based environment in which only the specified client can operate
Private Cloud
Cloud infrastructure operated solely for a single organization
Private Cloud
Connection that connects a remote system to a private network via dial up
Private Dial Up
Addresses used by organizations for nodes used within enterprise networks and not connected to the internet are known as
Private IP addresses
A protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector
Syslog Server
Qos
Quality of Service
Remote Authentication Dial-in User Service
RADIUS
Protocol that maps a MAC address to an IP address
RARP-Reverse Address Resolution Protocol
Allows users to see the GUI of another computer as if they were sitting in front of it
RDP
Port 3389
RDP
T-Carrier, 24 channels, 1.544 Mbps
T1
T-Carrier, 672 channels, 44.736 Mbps
T3
Port 49
TACACS
Terminal Access Control Access Cotrol
TACACS+
Protocol that enables connection-oriented communication in networks that use the TCP/IP protocol suite
TCP
What are the two protocol that handle the Transport-layer traffic in TCP/IP networks?
TCP and UDP
What type of cable is used to connect the satellite transmitter and receiver to the modem?
RG-6
Time Division Multiplexing
TDM
Electronic instrument that uses time-domain reflectometry to characterize and locate faults in metallic cables
TDR
Time Domain Reflectometer
TDR
Port 69
TFTP
Protocol that transfers files between servers and clients without requiring any user login
TFTP
Distance Vector Routing Protocols that use router hop counts as their metrics. They support a maximum hop count value of 15. Any router farther than 15 hops away is considered to be unreachable
RIPv2
Protocol that monitors Qos in RTP transmission. Acts as a partner to RTP to package and deliver data but does not transfer data
RTCP-Real Time Transfer Control Protocol
Ports 5004, 5005
RTP
Which protocol transmits audio and video content and defines the packet for delivery?
RTP-Real Time Transport Protocol
Network control protocol designed for use in entertainment and communications systems to control streaming media servers. The protocol is used for establishing and controlling media sessions between end points
RTSP
Port 554
RTSP
If it is installed, which of these can be used by the technician when they arrive on site to repair or run maintenance on a distant ICS?
RTU
Which MAC address begins a frame?
Receiving system
RSH
Remote Shell Commands
Connection from a far away computer that enables you to control that computer as if you were sitting in front of it, logged in
Remote Terminal
Device that takes the entire digital signal and recreates it on the other end
Repeater
What is the protocol POP3 used for?
Retrieving email messages from a mailbox on a mail server
What is the protocol IMAP4 used for?
Retrieving messages from a mail server
A zone that resolves the IP address to the FQDN
Reverse lookup
Any wireless access point that has been installed on a network's wired infrastructure without the consent of the network's administrator or owner, thereby providing unauthorized wireless access to the network's wired infrastructure
Rogue Access Point
A form of VPN that can be used with a standard Web browser
SSL VPN
Fiber - Straight Tip or Bayonet Fiber Optic Connector
ST
What feature of switches prevents the problem of switching loops?
STP
Which protocol resolves switching loops?
STP
A virtual LAN (VLAN) of switch ports represented by one interface to a routing or bridging system
SVI
Switched Virtual Interfaces
SVI
A software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted
SaaS
Software as as Service
SaaS
Enables a service provider to make applications available over the internet
Saas-Software as a Service
VPN connection that enables two seperate LANs to function as a single network, sharing files and services as if in the same building
Site to site VPN connection
Type of denial of service attack in which a system is flooded with spoofed ping messages
Smurf Attack
VM feature that enables users to save an extra copy of the virtual machine as it is exactly at that moment in time
Snapshot
UDP
User Datagram Protocol
In what manner does a gateway router pass out private IP addresses for the LAN?
Using DHCP
Latest version of DSL to appear, provides speeds of 100+ Mbps in both directions, will only get those speeds if within 300 meters
VDSL
A logical local area network that extends beyond a single traditional LAN to a group of LAN segments, given specific configurations
VLAN
Any broadcast domain that is partitioned and isolated in a computer network at the data link layer
VLAN
Network that uses a single switch to create multiple broadcast domains
VLAN
Virtual Local Area Network
VLAN
Virtual Machine Manager
VMM
SYN
Synchonize
Receive and route calls to appropriate individuals based on callers responses
Virtual PBX- Virtual Private Branch Exchange
Virtual machines that are running a network operating system or other server software are known as
Virtual Servers
A software program that allows one virtual machine (VM) to communicate with another
Virtual Switch
The process of using special software to create a complete environment in which a guest operating system can function as though it were installed on its own computer
Virtualization
Type of malicious software comprised of small pieces of code attached to legitimate programs
Virus
Uses an IP connection to transfer phone calls
VoIP
Where are the most common physical network problems found?
Work Area
What do private IP addresses allow users to do?
Work within their own network
Which command utilizes ICMP?
ping
The most popular virtualization manager for Mac OSX
Parallells Desktop
The syslog tool used with UNIX records errors by level of importance. Which of these is the most important level?
0
Well known ports range
0-1023
IPv6 loopback address
0:0:0:0:0:0:0:1 or ::1
Maximum Length for a Cat 6 cable is
100 meters
What is the cornerstone topology of the current type of network in use today?
1000Base
Registered port ranges
1024-49151
Which syntax is representative of transmission speed of 10 Mbps using UTP?
10Base5
What is the cornerstone topology of the current type of network in use today?
10BaseT
Which syntax is representative of transmission speed of 10 Mbps using UTP?
10BaseT
What is the cornerstone topology of the current type of network in use today?
10Mbps
Horizontal runs are terminated with
110 Blocks
IP loopback address that is used for testing
127.0.0.1
What IP address is used for ping, ping loopback, ping local host, and testing?
127.0.01
IPv6 addresses are how many bits in length?
128-bits
What are the Class B address class ranges?
128.0.0.0 to 191.255.255.255
The networking standard that supports virtual LANs (VLANs) on an IEEE 802.3 Ethernet network
802.1q
What is the maximum distance for a cable run?
90 meters
Record that maps a domain name to the IP address (IPv4) of the computer hosting the domain
A
Why is a host needed for a virtual machine (VM)?
A VM needs the use of hardware
What term refers to a situation where two half duplex nodes send messages at the same time?
Collision
IPv4 addresses contain four octets of decimal numbers from 0 to 255. What does an IPv6 address contain?
Colons and hexadecimal numbers
How is InterVLAN routing used in a managed switch?
Combine several VLANS into one
A collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally
Community Cloud
Multiple organizations form a specific community with common interests to share a cloud
Community Cloud
CIA Triad
Confidentiality Integrity Accountability
The CIA Triad is made up of three parts. What are they?
Confidentiality Integrity Availability
Virtual link between two nodes established for the duration of a communication session
Connection
What type of protocol is TCP?
Connection Orientated
What is the primary purpose of subnetting?
Conserve IP addresses. Also security and performance
Firewall type that monitors activity by applications and micro applications
Context Aware Firewall
A relative value used to determine the importance of the labeled packet
Cost of Service
Occurs when a router or network goes down and one of the other routers does not realize it can no longer reach that route
Count to Infinity Loop
A technology for transmitting data between computer devices at data rates of up to 4 Gbps (and 10 Gbps in the near future). Especially suited for connecting computer servers to shared storage devices and for interconnecting storage controllers and drives
Fibre Channel
When a virtual is not running where is it stored?
Files
What is used with DLS to block unwanted noise while using the telephone?
Filter
Network devices that use ACLs to prevent unauthorized access into company systems
Firewall
How many address classes are there?
Five address classes. A, B, C, D, and E.
Technique for optimizing data exchange between systems
Flow Control
Which part of the Ethernet standard has remained the same throughout all revisions?
Frame
Packet switching that switches packets quickly but without any guarantee of data integrity at all.
Frame Relay
A NIC sends data in discrete chunks called
Frames
Gigabit Interface Converter
GBIC
What device provides a flexible interface for different gigabit fiber-optic standards on a switch?
GBIC
Generic Routing Encapsulation
GRE
IP address for the next hop router: where the packet should go
Gateway
Device that acts as the default gateway for a number of client computers
Gateway Router
What two commands are used with FTP?
Get, Put
GAN
Global Area Network
Port 1720
H.323
Protocol that handles the initiation, setup, and delivery of VOIP sessions. Is an alternative of SIP.
H.323
When resolving names which is the first to be consulted?
HOST files
What was used to resolve FQDNs before DNS was deployed?
HOSTS File
When resolving names, what will be consulted first?
HOSTS file
Host Standby Router Protocol
HSRP
Port 80
HTTP
Protocol that accepts connections from and send data to web browsers.
HTTP
Port 80
HTTP (Hypertext Transfer Protocol)
A form of cloud computing that provides virtualized computing resources over the internet
IaaS
Infrastructure as a Service
IaaS
Arrangement where users rent an infrastructure and are billed for it is known as a
IaaS-Infrastructure as a Service
Six Step Troubleshooting Process
Identify the Problem, Establish a theory of probable cause, Test the Theory, Establish a plan of action, Verify system functionality, Document
Troubleshooting Step 1
Identify the problem
Protocol used to assist in the authorization process used in wired networks
Kerberos
A tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.
L2TP
A tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself. Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy
L2TP
Layer 2 Tunneling Protocol
L2TP
Network that is self contained, small, usually limited to a building, room, or floor
LAN
What type of network describes a way for multiple devices to share resources in a single broadcast domain?
LAN
Fiber - Little Connector or Local Connector
LC
Standard for high-speed wireless communication for mobile devices and data terminals, based on the GSM/EDGE and UMTS/HSPA technologies
LTE
Radio technology for wireless broadband access
LTE-Long Term Evolution
A unique identifier used by MPLS capable routers to determine how to move data
Label
The slow down of network connections between routers
Latency
At which layer of the OSI model don't multilayer switches work?
Layer 1
Defines the physical characteristics of the network such as connectors, cabling, voltage levels, and timing.
Layer 1 Function
At which layer of the OSI model do traditional switches work?
Layer 2
A file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients
NAS
Network Attached Storage
NAS
A computing device or appliance that provides only file based storage services
NAS-Network Attached Storage
Allows an ISP to give one single public IP address to a home or company, private IP addresses to be used on the LAN, and those computers using the private IP addresses to communicate over the internet
NAT
Network Address Translation
NAT
Network Interface Unit
NIU
Which internet protocol synchronizes the clock times of devices in a network by exchanging the signals?
NTP - Network Time Protocol
Network Basic Input/Output System
NetBIOS
Ports 137, 138, and 139
NetBIOS
Provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network
NetBIOS
Used to support functions such as Microsoft File and Print Sharing over TCP/IP protocols
NetBIOS
A group of devices connected together to communicate and share resources is known as a
Network
Packets reside on which layer of the OSI model?
Network
Outlines acceptable network behavior
Network Access Policy
A very high speed transmission path that carries the majority of network data is known as a
Network Backbone
NIC is short for
Network Interface Card
Any device or computer that can connect to a network and generate, process, or transfer data is known as a
Node
Firewall that filters by port numbers
Stateless
Maps a single routable (that is not private) IP addresses to a single machine, enabling users to access that machine from outside the network
Static NAT
Routing that uses table mappings that the network administrator establishes manually in the router prior to routing is known as
Static Routing
DNS zones that contain only the SOA, NS, and A glue records for a domain
Stub Zone
Taking a single network ID and chopping it up into multiple smaller subnets
Subnetting
What device can use the Spanning Tree Protocol (STP)?
Switch
What device forwards packets based on MAC address?
Switch
Which physical topology uses a switch?
Switch
A physical port on a switch that an Ethernet cable plug into
Switch port
Uses the same key to encrypt and decrypt data
Symmetric encryption
What uses the same key to encrypt and decrypt data?
Symmetric encryption
Why are link state protocols more efficient than distance vector routing protocols?
The forward only changes to individual routes instead of forwarding the entire routing table.
Segments reside on which layer of the OSI model?
Transport
TCP
Transport Control Protocol
Which layer of the TCP/IP model controls the assembly and disassembly of data?
Transport layer
A port on a switch configured to carry all traffic
Trunk Port
A switch port that connects to another switch port on a different switch
Trunk Port
802.1q
Trunk Standard
A method for a system to provide network access to many clients by sharing a set of lines or frequencies instead of providing them individually
Trunking
Links are combined to increase bandwidth and reliability
Trunking
The process of transferring VLAN traffic betwwen teo or more switches
Trunking
Used to protect files when they are not originally encrypted
Tunnel
What does a VPN use to connect a remote computer to a local network?
Tunneling
How many IP addresses should a router have?
Two or more
Hypervisors that run directly on the system hardware. They are often referred to as a "native" or "bare metal" or "embedded" hypervisors in vendor literature.
Type 1 Hypervisor
Hypervisors that run on a host operating system
Type 2 Hypervisor
What type of communications protocol do arp and ping use?
UDP
One to One Communication
Unicast
Transmission method of data transfer from one source address to one destination address
Unicast Transmission
UC Gateway
Unified Communications Gateway
A simple switch without any configuration capabilitiy
Unmanaged switch
What do routers do when there is more than one path to a destination?
Use the route with the lowest metric
Model designed to guide policies for information security within an organization
CIA Triad
Classless addressing method that considers a custom subnet mask as a 32-bit binary word.
CIDR-Classless Inter Domain Routing
A type of resource record in the Domain Name System (DNS) used to specify that a domain name is an alias for another domain
CNAME
Canonical Name
CNAME
What is a canonical name in DNS?
CNAME record for alias
Error detection method in which a predefined mathematical operation is used to calculate a CRC code
CRC-Cyclic Redundancy Checking
What names is given to the access method used by wireless devices?
CSMA/CA
What method is used to avoid transmission collisions?
CSMA/CD
When full duplex is enabled on a link, what is disabled?
CSMA/CD
Channel Service Unit/Digital Service Unit
CSU/DSU
Provides an interface between the T1 line and some other device, often a router.
CSU/DSU
ipconfig parameter that allows to view the physical address of a Network Interface Card (NIC)
/all
netstat parameter that allows to display the names of applications and executable file components that are accessing the network
-b
netstat parameter that allows to display the contents of the IP routing table
-r
Examples of Top Level Domains
.net , .edu, .com
ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters
/all
What are the Class A address class ranges?
1.0.0.0 to 126.255.255.255
What is the height of a U?
1.75 in Tall
How big is a U?
1.75in
Class A private IP address ranges
10.0.0.0 to 10.255.255.255
The distance limitation between a switch and a node is ___ meters due to the restrictions of UTP cabling.
100
How many conductors does a coaxial cable have?
2
Fast Ethernet/100BASE-FX Maximum Length
2000m
Teredo addresses start with
2001:0000:/32
Multicast Broadcast Address
224.0.0.0
Multicast address
224.0.0.0
What is the Class A default subnet?
255.0.0.0
What is the class B default subnet?
255.255.0.0
What is the class C default subnet?
255.255.255.0
The current ASN's are how many bits?
32 bits
IPv4 addresses are how many bits in length?
32-bits
How many layers are in the TCP/IP model?
4
Dynamic or private port ranges
49152-65535
10GBASET should not exceed a length of
55 meters
1000BASE-LX Maximum Length
550m
What is the minimum size of an Ethernet frame?
64 bytes
A tunneling protocol that enables IPv6 traffic to use the IPv4 internet without having to set up explicit tunnels
6to4
How many layers are in the OSI model?
7
Standard uses the same data link layer protocol and frame format as the original standard, but an OFDM based air interface (physical layer). It operates in the 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code, which yields realistic net achievable throughput in the mid-20 Mbit/s
802.11a
Standard works on 2.4 and 5GHZ band. Fully backwards compatible with previous WiFi standards. Speeds up to 1300mbps.
802.11ac
What is the new wireless standard that only runs at the 5GHZ range, with a maximum transfer rate of over 3 Gpbs?
802.11ac
Standard has a maximum raw data rate of 11 Mbit/s, and uses the same media access method defined in the original standard
802.11b
Standard works in the 2.4 GHz band (like 802.11b), but uses the same OFDM based transmission scheme as 802.11a. It operates at a maximum physical layer bit rate of 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput
802.11g
Operates on both the 2.4 GHz and the 5 GHz bands. Support for 5 GHz bands is optional. It operates at a maximum net data rate from 54 Mbit/s to 600 Mbit/s.
802.11n
Bit Error Rate Test
BERT
Test that verifies the T-Carrier connection from end to end
BERT
A standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet
BGP
Border Gateway Protocol
BGP
The glue of the internet, connecting all the Autonomous Systems. Implements and supports route aggregation, a way to simplify routing tables into manageable levels.
BGP
What is the primary protocol for the internet?
BGP
Bridge Protocol Data Unit
BPDU
Frames that contain information about the Spanning tree protocol (STP)
BPDU
What advantage does a switch offer that a hub cannot?
Bandwidth
Digital Signals are sent via DC pulses over a single unmultiplexed signal channel
Baseband Transmission
A device hack performed when a wireless, Bluetooth-enabled device is in discoverable mode
Bluesnarfing
A group of computers connected in a coordinated fashion for malicious purposes
Botnet
What is a common accidental cabling problem automatically fixed by STP?
Bridge Looping
Allows users to connect two or more network segments together allowing devices to join the network when it's not possible to connect them directly to a router or switch
Bridged Connection
Single medium to carry multiplex channels of data, usually through modulation
Broadband Transmission
Transmission method in which data is sent from one srouce node to all other nodes in a network
Broadcast Transmission
Flow control technique in which data is sorted on a temporary high speed memory location until the main system components are ready for work
Buffering
How can the nslookup command be used to verify a DNS server?
By typing nslookup followed by a space and the IP address
A university with several buildings in close proximity will have what type of network install?
CAN
UTP Cable, 16MHZ, Length up to 100m. Used for telephone
CAT 3
UTP Cable, 100MHZ, length of 100m. Current standard. Used for LAN
CAT 5, 5e
UTP cable, 250MHZ, 100m, Emerging cable standard
CAT 6
What is the cornerstone topology of the current type of network in use today?
Cable runs of 100 meters between switch and node
CAN
Campus Area Network
A standardized twisted pair cable for Ethernet and other network physical layers that is backward compatible with the Category 5/5e and Category 3 cable standards
Cat 6
Network in which a central mainframe computer controls all network communications and performs data processing and storage on behalf of clents
Centralized Network
Term for all approaches to preparing and supporting individuals, teams, and organizations in making organizational change.
Change Management
A computer or process running on a device that initiates a connection to a server is known as a
Client
Type of network in which servers provide resources to clients
Client/Server
A model for providing or purchasing off premises computing services over the Ethernet
Cloud Computing
Class of Service
CoS
Used for identifying packet priority
CoS
Used on packet-switched networks to automatically calculate route costs and routing table entries
Distance Vector Routing
Uses one of several algorithms to determine the best route to other routers based on the distance (cost) and direction (vector)
Distance Vector Routing Protocol
eDiscovery
Electronic Discovery
What is SNMP (Simple Network Management Protocol) used for? Which ports does SNMP use?
Enables administrators to monitor and manage network devices and traffic. Ports 161 and 162
Process of adding delivery information to the actual data transmitted on each layer
Encapsulation
The best way to protect data transmitted across the internet is
Encryption
The ends of the tunnel where the data is encrypted and decrypted
Endpoints
Process of determining if transmitted data has been received correctly and completely
Error Detection
Troubleshooting Step 4
Establish a plan of action to resolve the problem and implement the solution
Troubleshooting Step 2
Establish a theory to determine the cause
802.3
Ethernet
A rogue or fake wireless access point that appears as a genuine hotspot offered by a legitimate provider
Evil Twin
The -t switch in the MS Windows' ping utility is used for
Executing ping in a loop
Private network that grants controlled access to users outside of the network
Extranet
Fiber - Ferrule Connector or Fiber Channel
FC
Which part of the frame contains information used for checking the validity of the frame?
FCS
A technique for sending two or more signals over the same telephone line, radio channel, or other medium. Each signal is transmitted as a unique range of frequencies within the bandwidth of the channel as a whole, enabling several signals to be transmitted simultaneously.
FDM
Frequency Division Multiplexing
FDM
Which protocol transfers files between clients and servers?
FTP
Port 143
IMAP 4 (Internet Message Access Protocol 4)
Port 143
IMAP4
Protocol that email clients use to access email messages while leaving messages themselves stored on the server.
IMAP4
Port 993
IMAP4 encrypted transmissions
What is the name of the Cisco operating system for managed switches and routers?
IOS
Protocol responsible for the addressing and routing of data to the remote system.
IP
Unique binary address assigned to a device so that it can communicate with other devices on a TCP/IP network
IP Address
To implement TCP/IP on a network, administrators must implement three things. What are they?
IP Address Subnet Mask Default Gateway
What is needed to use a graphical interface while configuring a managed router or switch?
IP address
Remote computers need this function so they can be on a VPN using the Internet.
IP encapsulation
Intrusion Protection System
IPS
System that monitors a network for malicious activities such as security threats or policy violations
IPS
A 128 bit address displayed in hexadecimal format and not the dotted decimal notation that is used by IPv4
IPv6
A link state dynamic routing protocol that has great usage in the niche market of ISP backbones. Similar to OSPF
IS-IS
Intermediate System to Intermediate System
IS-IS
Link Sate protocol, IGP, ISP alternative to OSPF
IS-IS
Digital circuit switching technology that carries voice and data over digital phone lines
ISDN
Integrated Services Digital Network
ISDN
Process of sending telephone transmission across fully digital lines end to end
ISDN
The process of making a router work between two VLANs is called
InterVLAN Routing
The single largest global WAN that links virtually every country in the world.
Internet
IPsec
Internet Protocol Security
iSCSI
Internet Small Computer Systems Interface
IoT
Internet of Things
Network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and network connectivity which enables these objects to connect and exchange data
Internet of Things
Private network that uses internet protocols and services to share a company's information with its employees
Intranet
A network protocol suite that authenticates and encrypts the packets of data sent over a network
Ipsec
Which syntax is representative of transmission speed of 10 Mbps using UTP?
It uses BNC and Tee connectors
Ethernet frame with a payload greater than the standard maximum transmission unit of 1500 bytes is known as a
Jumbo Frame
Default authentication protocol used in Windows, Linux, Unix, and Mac OSX
Kerberos
Privileges users and software receive that only give them the minimal level of access required is known as
Least Privilege
An individual who drains resources, bandwidth, or data off a website or a network, often in an unethical manner
Leech
Process that an organization uses to preserve all forms of relevant information when litigation is reasonably anticipated
Legal Hold
Allows routers to construct their own topology map of the internetwork, after hearing about the state of the links from the actual routers connected to the link themselves.
Link State
What is the first thing to look at when checking for a good physical connection with the switch?
Link and activity lights
Aims to optimize resource use, maximize throughput, minimize response time, and avoid overload of any single resource
Load Balancing
LAN
Local Area Network
LTE
Long Term Evolution
What uniquely identifies every NIC?
MAC address
Metro-Ethernet is known as a
MAN
Main Distribution Frame
MDF
Ports 2427, 2727
MGCP
Protocol designed from the ground up to be a complete VOIP or video presentation connection and session controller. Takes over all the work from SIP and H.323.
MGCP
What feature of 802.11n enables devices to use multiple antennas to make multiple simultaneous connections and thus increase throughput?
MIMO
An agreement between two (bilateral) or more (multilateral) parties. It expresses a convergence of will between the parties, indicating an intended common line of action. It is often used in cases where parties either do not imply a legal commitment or in situations where the parties cannot create a legally enforceable agreement.
MOU
Memorandum of Understanding
MOU
Multi-Protocol Label Switching
MPLS
High Performance, multi-service switching technology that is used in packet data networks
MPLS-Multi Protocol Label Switching
Microsoft Challenge Handshake Authentication Protocol
MS-CHAP
An agreement between multiple manufacturers to make products which are compatible across vendors, acting as de facto standards, establishing a competitive market for interoperable products
MSA
Multi-Source Agreement
MSA
Fiber - Mechanical Transfer Registered Jack
MTRJ
Mail Exchanger
MX
Records for mail servers
MX
What record in the primary zone of a DNS server points to the mail server/
MX
Powerful centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices
Mainframe Computer
Any software that brings harm to a computer system
Malware
An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other
Man in the Middle
MITM
Man in the Middle
MTU
Maximum Transmission Unit
MAC is short for
Media Access Control
What network topology is most fault tolerant?
Mesh
MGCP
Message Gateway Control Protocol
Relative value that defines the cost of using the route
Metric
MAN
Metropolitan Access Network
An open source implementation of Teredo for Linux and other UNIX based systems
Miredo
Device that converts the digital signal to analog and back
Modem
Modulator/Demodulator
Modem
What device is used to connect a computer for dial-up communications?
Modem
One to Many Communication
Multicast
A network device that has the ability to operate at higher layers of the OSI reference model, unlike the Data Link Layer (DLL) traditionally used by switches. Can perform the functions of a switch as well as that of a router at incredibly fast speeds
Multilayer Switch
Online Certificate Status Protocol
OCSP
Link State protocol, IGP, fast, popular, uses Area IDs
OSPF
Open Shortest Path First
OSPF
There are two link state dynamic routing protocols:
OSPF and IS-IS
An optoelectronic instrument used to characterize an optical fiber. Is the optical equivalent of an electronic time domain reflectometer.
OTDR
Optical Time Domain Reflectometer
OTDR
What does the base in baseband refer to?
One channel
HOw are the connectors wired on a crossover cable?
One end is T568A, the other end is T568B
What is the most vulnerable part of a computer system that hackers like to exploit?
Open Ports
What does SaaS eliminate the need of?
Optical Drive
What is the color order for a standard TIA/EIA "B" connector
Orange/White-Orange-Green/White-Blue-Blue/White-Green-Brown/White-Brown
Port Address Translation
PAT
Uses port numbers to map traffic from specific machines in the network
PAT
Data that is not synced is carried over fiber using microwave radio systems in this hierarchy
PDH-Plesiochronus Digital Hierarchy
Port 110
POP3
Protocol used to retrieve email from mail servers.
POP3
Port 195
POP3 encrypted transmissions
Port 110
POP3-Post Office Protocol 3
Plain Old Telephone System
POTS
Point to Point Protocol
PPP
Protocol used by modems for making a secure connection to an ISP. Enables two devices to connect directly, authenticate with username and password, and negotiate a network protocol
PPP
A specification for connecting multiple computer users on an Ethernet local area network to a remote site through common customer premises equipment, which is the telephone company's term for a modem and similar devices
PPPoE
Requires a username and password to log on and use the internet
PPPoE
An obsolete method for implementing virtual private networks, with many known security issues. Uses a TCP control channel and a GRE tunnel to encapsulate PPP packets.
PPTP
The fastest ISDN connection
PRI
A cloud computing model in which a third-party provider delivers hardware and software tools -- usually those needed for application development -- to users over the internet. A provider hosts the hardware and software on its own infrastructure
PaaS
Platform as a Service
PaaS
Service where users can rent a fully configured system that is already set up is known as
Paas-Platform as a Service
A computer program or piece of computer hardware that can intercept and log traffic that passes over a digital network or part of a network
Packet Analyzer
Process of intercepting and logging traffic
Packet Capture
A tool that intercepts data flowing in a network
Packet Sniffer
What is WireShark used for when troubleshooting networks?
Protocol Analyzing
What is the protocol HTTP used for?
Provides web services
Cloud based on the standard cloud computing model, in which a service provider makes resources, such as virtual machines (VMs), applications or storage, available to the general public over the internet. Cloud services may be free or offered on a pay-per-usage model.
Public Cloud
Cloud that provides services over a network that is open for public use
Public Cloud
PSTN
Public Swtiched Telephone Network
Which of these tools are used to connect CAT5e cable to a patch panel?
Punchdown Tool
A means of sorting IP packets to provide priority based on header information
QoS
Quality of Service
QoS
Cable type that is used to manage a router or switch rather than send Ethernet frames
Rollover
What kind of cable is used to access the OS through the console port of a managed switch?
Rollover
RTT
Round Trip Time
A path that is used by data packets to reach the specified destination using the gateway as the next hop is known as a
Route
One route in a table represents multiple subnets
Route Aggregation
Which device enables you to connect two networks and discards broadcast traffic?
Router
Devices that connect networks to enable communication and resource sharing among those networks
Routers
Routing process in which two routers discover different routes to the same location but have incorrect information and thereby never reach the end point
Routing Loop
A database created manually or by a route discovery protocol that contains network addresses as perceived by a specific router is known as a
Routing Table
Tells the router exactly where to send the packets
Routing table
Allows for execution of a command if the requested operation in the command-line interface in MS Windows requires elevation
Run as Administrator
A network which provides access to consolidated, block level data storage
SAN
Fibre channel and iSCSI are used in conjunction with
SAN
Storage Area Network
SAN
High speed data transfer network that provides access to consolidated block level storage
SAN-Storage Area Network
What feature of switches keeps track of which MAC address goes to each port?
SAT
Fiber - Subscriber Connector or Squared Connector
SC
Supervisory Control and Data Acquisition
SCADA
Synced data moves on fibers using LED's in this hierarchy
SDH-Synchronous Digital Hierarchy
Software Defined Network
SDN
Technology that allows programmers to write code to control routers and switches
SDN
Protocol that describes the content of a multimedia communication session
SDP-Session Description Protocol
Protocol that handles the initiation, setup, and delivery of VOIP sessions.
SIP
Session Initiation Protocol
SIP
Port 5060
SIP (clear text)
Port 5061
SIP (encrypted)
Defined as an official commitment that prevails between a service provider and a client
SLA
Service Level Agreement
SLA
Port 445
SMB
Port 25
SMTP
Protocol that sends email messages between mail servers
SMTP
What protocol can utilize ports 25 or 587 for formatting and sending emails?
SMTP-Simple Mail Transfer Protocol
Which protocol uses port 465 for encrypted communication?
SMTP-Simple Mail Transfer Protocol.
Static NAT
SNAT
What tool allows us to administer managed devices from a central location?
SNMP on a NMS
What are ports 161 and 162?
SNMP-Simple Network Management Protocol
Protocol that can remotely monitor network devices.
SNMPv3
A style of software design where services are provided to the other components by application components, through a communication protocol over a network
SOA
Record that defines the authoritative system
SOA
Service Oriented Architecture
SOA
Synchronous Optical Network
SONET
The primary standard for long distance, high speed, fiber optic transmission systems.
SONET
Network standard for synchronous data transport over a fiber optic cable
SONET-Synchronous Optical Network
Defines project-specific activities, deliverables and timelines for a vendor providing services to the client
SOW
Statement of Work
SOW
A computer networking technology intended to simplify the creation and configuration of networks, while enabling multipath routing
SPB
Shortest Path Bridging
SPB
Port 22
SSH
Protocol that is a secure replacement got Telnet, encrypts both login information and data sent over the connection.
SSH
Provides strong authentication and secure communications over a network
SSH
SSH
Secured Shell
Which document is the Security Committee responsible for?
Security Policies
Which document contains the actual implementation details for the security of a network?
Security Procedures
A subdivision of a network that links a number of devices or serves as a connection between nodes is known as a
Segment
What are the four types of network backbones?
Serial Distributed/Hierarchal Collapsed Parallel
Transmission of bits that occurs as one per clock cycle across a single transmission medium
Serial Data Transmission
Network computer or process that shares resources with and responds to requests from computers, devices, and other servers on the network is known as a
Server
SMB
Server Message Block
SIP
Session Initiation Protocol
Which layer of the OSI model keeps track of a systems communications to send the right response to the right computer?
Session layer
Where would you look for problem or error information following a failed Windows install?
Setup log
A method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned
Split Horizon
Fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver
Spoofing
Which of these tools are used to connect CAT5e cable to a patch panel?
TIA/EIA 568A to TIA/EIA 568B
Transport Layer Security
TLS
The practice of inserting a VLAN ID into a packet header in order to identify which VLAN (Virtual Local Area Network) the packet belongs to is called
Tagging
Port 23
Telnet
Protocol that can execute commands on a remote system unencrypted
Telnet
Which protocol enables a user to log in remotely and execute commands on a remote host?
Telnet
A NAT traversal IPv6 tunneling protocol. Built into Windows
Teredo
Which syntax is representative of transmission speed of 10 Mbps using UTP?
Terminating Resistor
Troubleshooting Step 3
Test the theory to determine the cause
What is the most vulnerable part of a computer system that hackers like to exploit?
The no fragmentation rule setting in a router
How many lines of a routing table does the router read when comparing IP addresses and subnet mask of an incoming packet?
The router reads all the lines and then dtermines the proper route.
A cross-platform free and open-source remote desktop software application
TightVNC
Port 5900
TightVNC
Process of having frames that carry a portion of every channel sent on a regular interval is called
Time Division Mulitplexing
Port 68
Time Protocol
Where does a hub send data?
To all the systems connected to the hub
802.5
Token Ring
What tool is used to locate a single cable in a cable bunch connected to a 24-port patch panel?
Toner and Probe
Used to control the bandwidth used by network traffic
Traffic Shaping
Extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
VPN
Virtual Private Network
VPN
A type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes
VPN concentrator
Eliminates the single point of failure inherent in the static default routed environment
VRRP
Virtual Router Redundancy Protocol
VRRP
A Cisco proprietary protocol that propagates the definition of Virtual Local Area Networks (VLAN) on the whole local area network
VTP
Proprietary protocol used by Cisco that automates the updating of multiple VLAN switches
VTP
VLAN Trunking Protocol
VTP
What does the FCS do?
Verifies the data was sent correctly.
Troubleshooting Step 5
Verify full system functionality and if applicable implement preventive measures
When is hash used in transferring a file?
Verify the file
Network that spans a large area network. Often across multiple geographical locations
WAN
What device enables two or more Wi-Fi enabled devices to connect to each other wirelessly and connect to a wired network?
WAP
Wireless LAN
WLAN
Refers to drawing symbols in public spaces to denote an open Wi-Fi wireless network in a public space
Warchalking
Act of locating open Wi-Fi hot spots while driving in a car
Wardriving
What type of software are Apache and IIS?
Web Servers
What type of software are Apache and IIS?
Web servers
Standard an provide at-home or mobile Internet access across whole cities or countries
WiMAX
Worldwide Interoperability for Microwave Access
WiMAX
Packet based wireless telecommunication technology that provides wireless broadband access of long distances
WiMAX-Wireless Interoperability for Microwave Access
WAN
Wide Area Network
802.11
Wireless
Command in MS Windows that is used to display help information related to a specific network command-line utility
[command]/?
Command in MS Windows displays a table consisting of IP addresses and their resolved Ethernet or Token Ring physical addresses
arp-a
The electronic aspect of identifying, collecting and producing electronically stored information (ESI) in response to a request for production in a law suit or investigation
eDiscovery
Command that displays the IP and MAC Addresses on UNIX/Linux/Mac OSX
ifconfig
Linux command used to display TCP/IP configuration settings
ifconfig
An Internet Protocol (IP)-based storage networking standard for linking data storage facilities
iSCSI
Dynamic NAT is also called
pooled NAT
Command that displays the IP and MAC Addresses
ipconfig
Windows command-line utility that can be used to display TCP/IP configuration settings
ipconfig
What command is used to diplay the current DNS assignments>
ipconfig /all
Command used to clear the DNS cache
ipconfig /flushdns
Command lines used for resetting the DHCP configuration settings for all adapters
ipconfig/ release,ipconfig/renew
What Windows utility do you use to find the MAC address for a system?
ipconfig/all
What command can you use to clear the DNS cache?
ipconfig/flushdns
Windows command-line utility designed to be of help in troubleshooting NetBIOS name resolution problems
nbtstat
What command can be used to display the current sessions that are connected?
nbtstat-s
Command used for displaying protocol statistics and current TCP/IP network connections
netstat
Command that will display all open ports in a users network
netstat-a
IaaS provides
network resources
Command used for obtaining a domain name to IP address mapping
nslookup
Command in Windows that combines the features of ping and tracert
pathping
Command that queries if a host is reachable
ping
Command-line utility used for checking the reachability of a remote host
ping
Command that adds static entries
route add
Command that modifies an existing route
route change
Command that removes static entries
route delete
Command that diplays the contents of a routing table
route print
Command that displays routing table entries
route print
Command that clears a routing table of all entries
route-f
The number of running virtual machines on a single host is limited by
the amount of physical RAM
Linux command-line utility for displaying intermediary points (routers) the IPv4 packet is passed through on its way to another network node is known as
traceroute
Command-line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host is called
tracert
Command in MS Windows that displays the route taken by IPv6 packets on their way to another host
tracert-6