: Network Technologies,

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Computers, called nodes or hosts

20. form a logical group of computers and users - May share resources - May prevent access to resources

A global address in IPv6 starts with

2000

The Server

3. Client computer requests data or a service from a second computer called

Active Directory (AD)

26. the centralized directory database that contains user account information and security for the entire group of computers

Global account (a.k.a. global username or network ID)

27. a domain-level account assigned by the network administrator and is kept in AD

This process is managed by Active Directory Domain Services (AD DS)

28. A user can sign on to the network from any computer on the network and gain access to the resources that AD allows

Client-Server Network Model

24. Resources are managed by the network operating system (NOS) via a centralized directory database

Access is controlled by entries in the centralized domain database

29. Clients don't share their resources directly with each other

SRV (Service Locator)

(Service Locator) A DNS record that specifies a generic service location record for newer protocols.

wiring schematic

A combination of a floor plan and a physical network topology. Similar to physical network diagrams, you can see the nodes on the network and how they are physically connected.

CSU/DSU (Channel Service Unit/Data Service Unit)

A combination of two WAN connectivity devices on a Frame Relay network that work together to connect a digital WAN line with a customer's LAN.

tracert

A command that determines the route data takes to get to a particular destination.

arp utility

A command that enables an administrator to view and manipulate the ARP cache, including deleting it or adding an entry to it.

coax

A common abbreviation for coaxial cable.

ATM

A common protocol transported over SONET

dial-up modem

A communication device that converts a computer's digital signals into analog signals before transmission over telephone lines.

synchronous communications

A communication method in which a byte is sent in a standardized time interval, enabling the receiver to use the predetermined time interval as the means to distinguish between bytes in the data stream.

asynchronous communications

A communication method in which special start and stop bit patterns are inserted between each byte of data allowing the receiver to distinguish between the bytes in the data stream.

LDAP (Lightweight Directory Access Protocol)

A communications protocol that defines how a client can access information, perform operations, and share directory data on a server.

SMTP (Simple Mail Transfer Protocol)

A communications protocol that enables sending email from a client to a server or between servers.

ARP (Address Resolution Protocol)

A communications protocol that resolves IP addresses to MAC addresses.

PDH (Plesiochronous Digital Hierarchy)

A communications standard that can carry data over fibre optic or microwave radio systems.

bottleneck

A component of a system that performs poorly when compared to other components and reduces the overall system performance.

JPEG (Joint Photographic Experts Group)

A compressed graphical file format that reduces the file size.

Network

A computer network is a set of computers which are linked together and are capable of sharing resources, files, applications and can communicate. A standalone computer is not connected to a network.

What is a Wide Area Network?

A computer network that joins computers together over long distances. Can be joined using the public telephone system, fibre optic cables, satellites or other means.

VLAN (Virtual LAN)

A LAN in which network components can be connected even if they are not on the same LAN segment.

network scanner

A computer program used for scanning networks to obtain user names, host names, groups, shares, and services. Also known as network enumerators.

LAN Features

A LAN is a group of computers and network devices connected together, usually within the same building. LANs tend to use inexpensive hardware such as network adaptors, hubs and Ethernet cables. A LAN transmits data to other devices within the same network. A LAN is useful for sharing resources like printers and files A LAN tends to be owned by one organisation.

switched Ethernet

A LAN technology that connects computers using switches, enabling the devices on each switched connection to utilize the full bandwidth of the medium.

STP (Spanning-Tree Protocol)

A Layer 2 protocol that is used for routing and prevents network loops by adopting a dynamic routing method.

PPTP (Point-to-Point Tunneling Protocol)

A Microsoft VPN layer 2 protocol that increases the security of PPP by providing tunneling and data encryption for PPP packets and uses the same authentication methods as PPP.

routing table

A database created manually or by a route-discovery protocol that contains network addresses as perceived by a specific router. A router uses its route table to forward packets to another network or router.

RARP (Reverse Address Resolution Protocol)

A allows a node on a local area network to discover its IP address from a router's ARP table or cache.

daemon

A background process that performs a specific operation.

demarc

A demarcation point where a building's wiring ends and the telephone company's wiring begins.

demarc extension

A demarcation point where a network connectivity line terminates within or just outside of a building and may need to be extended further to accommodate the extended connectivity segment.

network baseline

A baseline that documents the network's current performance level and provides a quantitative basis for identifying abnormal or unacceptable performance.

Class C addresses

A block of IP addresses from 192.0.0.0 to 223.255.255.255 that provides the largest number of networks (2,097,150) and the smallest number of nodes per network (254).

Class D addresses

A block of IP addresses from 224.0.0.0 to 239.255.255.255 used to support multicast sessions.

Class E addresses

A block of IP addresses from 240.0.0.0 to 255.255.255.255 used for research and experimentation purposes.

Class A addresses

A block of iP addresses from 1.0.0.0 to 127.255.255.255 that provides the largest number of nodes (16,777,214) for the smallest number of networks (126), thus increasing the number of nodes per network.

Class B addresses

A block ofiP addresses from 128.0.0.0 to 191.255.255.255 that provides a good balance between the number of networks and the number of nodes per network-16,382 networks of 65,534 nodes each.

DSL (Digital Subscriber Line)

A broadband Internet connection method that transmits digital signals over existing phone lines.

cache

A buffer that is used when reading information from a disk or RAM.

1Pv6 address

A 128-bit hexadecimal number assigned to a computer on a TCP/IP network.

AUI connector (Attachment Unit Interface connector)

A 15-pin D-shaped connector. Also known as a DIX connector, named for the three companies that invented it Digital Equipment Corporation (DEC), Intel, and Xerox.

warm site

A business site that performs noncritical functions under normal conditions, but which can be rapidly converted to a key operations site if needed .

IDF (Intermediate Distribution Frame)

A cable rack that interconnects the telecommunications wiring between an MDF and any workstation devices.

MDF (Main Distribution Frame)

A cable rack that interconnects the telecommunications wiring between itself and any number of IDFs.

packet sniffer

A device or program that monitors network communications and captures data.

AP (Access Point)

A device or software that facilitates communication and provides enhanced security to wireless devices.

What is a router?

A device that allows two networks to communicate, sending data packages from one to the other via telecommunications networks.

STA (Station)

A device that contains an IEEE 802.11 conformant MAC interface to a wireless medium with an Ethernet-like driver interface.

wireless antenna

A device that converts high frequency signals on a cable into wireless electromagnetic waves and vice versa.

T -carrier system

A digital and packet switched system that makes communication more scalable than the analog, circuit-switched systems.

ISDN (Integrated Services Digital Network)

A digital circuit switching technology that carries both voice and data.

SSID (Service Set Identifier)

A 32-bit alphanumeric string that identifies a WAP and all devices attached to it.

1Pv4 address

A 32-bit binary number assigned to a computer on a TCP /IP network.

subnet mask

A 32-bit number assigned to each host for dividing the 32-bit binary IP address into network and node portions.

top

A CPU usage monitoring tool that provides a static snapshot, or a realtime display of the processes currently running on a CPU.

TACACS+ (TACACS Plus)

A Cisco proprietary product that uses TCP port 49, supports multifactor authentication and is considered more secure and scalable than RADIUS.

disaster

A catastrophic loss of system functioning due to a cause that cannot reasonably be foreseen or avoided.

ATM (Asynchronous Transfer Mode)

A cell-switching network technology designed for the high-speed transfer of voice, video, and data in LANs, WANs, and telephone networks.

group policy

A centralized configuration management feature available for Active Directory on Windows Server systems.

DSH (Digital Signal Hierarchy)

A channelized data transmission standard used to multiplex several single data or voice channels for a greater total bandwidth.

vampire tap

A clamshell-like device that clamps over an RG8 cable, making contact with its conductors, and permitting a networking device to connect to the ThickNet segment.

custom TCP/IP subnet

A class of leased addresses that are divided into smaller groups to serve a network's needs.

flow control

A class of technique for optimizing the exchange of data between systems.

on-off keying

A digital data transmission encoding scheme in which a change in voltage from one state to another within a predetermined interval is symbolized by a 1.

TIFF (Tagged Image File Format)

A digital format used to handle images used in publishing and photography.

Manchester encoding

A digital transmission encoding scheme that represents the transition from positive to ground with a 0 and a negative to positive voltage transition in the middle of the bit period designates a binary 1.

point-to-point connection

A direct connection between two nodes on a network.

PBX parachute

A disaster recovery service provided by virtual PBX that keeps the phone service running in case of power failure.

RIPv1

A distance vector routing protocol with a max hop count of 15

IGRP (Interior Gateway Routing Protocol)

A distance-vector routing protocol developed by Cisco as an improvement over RIP and RIP v2.

FDDI (Fiber Distributed Data Interface)

A dual-ring, token-passing fiber network that operates at 100 Mbps.

cold spare

A duplicate piece of backup equipment that can be configured to use as an alternate if needed.

802.x

A family of networking standards developed by IEEE.

full duplex

A feature of NIC that allows multiple devices to send and receive data simultaneously without data collision.

Remote Access

A feature that allows an administrator to access client systems from any location on the network.

zone

A file that physically divides the DNS database and contains the actual IP-to-host name mappings for one or more domains.

EFS (Encrypting File System)

A file-encryption tool available on Windows systems that have partitions formatted with NTFS.

PVC (Polyvinyl Chloride)

A flexible rubber-like plastic used to surround some twisted pair cabling.

data window

A flow control technique in which multiple packets are sent as a unit. The recipient acknowledges each window rather than each packet, resulting in higher throughput.

buffering

A flow control technique in which received data is stored on a temporary high-speed memory location.

stateless firewall

A flrewall that manages and maintains the connection state of a session using the filter and ensures that only authorized packets are permitted in sequence.

stateful firewall

A flrewall that monitors communication paths and data flow on the network.

impedance

A force that opposes the flow of electricity in an AC circuit. Impedance is measured in ohms.

NAT (Network Address Translation)

A form of Internet security that conceals internal addressing schemes from external networks such as the Internet.

broadcast radio

A form of RF networking that is non-directional, uses a single frequency for transmission, and comes in low- and high-power versions.

man-in-the-middle attack

A form of eavesdropping where the attacker makes an independent connection between two victims and steals information to use fraudulently.

microwave transmission

A form of point-to-point wireless transmission over unbounded media in which signals are sent via pulses of electromagnetic energy in the microwave region of the spectrum.

spread spectrum

A form of radio transmission in which the signal is sent over more than one frequency to discourage eavesdropping.

VLSM (Variable Length Subnet Mask)

A classless subnet mask that can be customized to a different length for each subnet based on the number of nodes on that subnet.

NFS (Network File System)

A client/ server application that enables users to access shared files stored on different types of computers and work with those files as if they were stored locally on their own computers.

broadcast domain

A logical area in a computer network where any node connected to the computer network can directly transmit to any other node in the domain without a central routing device.

DET (Directory Entry Table)

A logical link between a directory and the files it contains that is implemented by the NTFS.

tunnel

A logical path through the network that appears like a point-to-point connection.

subnet

A logical subset of a larger network, created by an administrator to improve network performance or to provide security.

standard

A measure of adherence to the network policy.

hertz

A measure of the number of cycles per second in an analog signal. One cycle per second equals one hertz.

TDR (Time-Domain Reflectometer)

A measuring tool that transmits an electrical pulse on a cable and measures the way the signal reflects back on the TDR to determine network issues.

controlled media access

A media access method in which a central device or system controls when and for how long each node can transmit Also called deterministic media access.

contention-based media access

A media access method in which nodes compete or cooperate among themselves for media access time. Also called competitive media access.

connector

A metal device at the end of a wire to connect video equipment and network nodes in a LAN.

NaaS (Network as a Service)

A method by which service providers lease resources on the network such as communication services and infrastructure.

cipher

A method for concealing the meaning of text.

unicast transmission

A method for data transfer from a source address to a destination address.

MPPE (Microsoft Point-to-Point Encryption)

A method of data encryption between PPP dial up connections or PPTP VPN connections.

load balancing

A method of dividing work among the devices on a network.

rollup

A collection of previously issued patches and hotflxes, usually meant to be applied to one component of a system, such as the web browser or a particular service.

NS (Name Server)

A DNS record that delegates a DNS zone to use the given authoritative name servers.

MX (Mail Exchange)

A DNS record that maps a domain name to a mail exchange server list.

CNAME (Canonical name record)

A DNS record that maps multiple canonical names (aliases) to one A record.

PTR (Pointer)

A DNS record that maps the IP address to a host name for reverse lookup functionality.

AAAA

A DNS record that maps the host name to its IP address using a 128-bit IPv6 address.

A

A DNS record that maps the host name to its IP address using a 32-bit IPv4 address.

SOA (Start of Authority)

A DNS record that specifies authoritative information about a DNS zone.

What is fibre optic?

A data cable which has a glass or Perspex core. It allows data to travel in pulses of light at high speeds and less susceptible to interference.

Ethernet frame

A data packet that has been encoded on the Data Link layer for transmission from one node to another on an Ethernet network.

store and forward

A data transmission method used to send data to a server or router where the data is stored until the next hop becomes available.

tunneling

A data transport technique in which a data packet is transferred inside the frame or packet of another protocol, enabling the infrastructure of one network to be used to travel to another network.

certificate repository

A database containing digital certificates.

shielding

A method of placing grounded conductive material around the media to prevent the introduction of noise into the media.

satellite television

A method of relaying video and audio signals directly to the subscriber's television sets using geosynchronous satellites.

Traffic filtering

A method that allows only legitimate traffic through to the network.

PaaS (Platform as a Service)

A method that enables infrastructure and tools from the service provider so that the client does not need to manage them.

IaaS (Infrastructure as a Service)

A method that provides network resources such as for storage and allow the client can deploy software and add network components such as firewalls.

bluejacking

A method used by attackers to send out unwanted Bluetooth signals from PDAs, mobile phones, and laptops to other Bluetooth-enabled devices.

address munging

A method used by end users to provide a fake name or address to post on consumer websites or newsgroups.

RAS (Remote Access Services)

A method where the user can dial in and authenticate with the same account he or she uses at the office.

half duplex

A mode of communication that permits two-way transmission, but in only one direction at a time.

promiscuous mode

A mode of operation for network adapters that enables them to capture all packets sent across the network, regardless of the source or destination of the packets.

Triple DES (3DES)

A more-secure variant of DES that repeatedly encodes the message using three separate DES keys.

FDM (Frequency-Division Multiplexing)

A multiplexing method in which data from multiple nodes is sent over multiple frequencies or channels, over a network medium.

TDM (Time-Division Multiplexing)

A multiplexing method in which the communication channel is divided into discrete time slots that are assigned to each node on a network.

DWDM (Dense Wavelength Division Multiplexing)

A multiplexing technology that uses light wavelengths to transmit data.

network name

A name assigned to a node to help users and technicians recognize the device.

ANS (Authoritative Name Server)

A name server that responds to name-related queries in one or more zones.

GPS (Global Positioning System)

A navigational system that consists of a network of satellites with 24 active satellites and 3 in standby mode.

peer-to-peer network

A network in which resource sharing, processing, and communications control are completely decentralized.

client/server network

A network in which servers provide resources to clients.

Local Area Networks (LAN)

A network in which the computers are situated relatively close together

Network

A network is group of two or more computers which are connected together

OSI reference model (Open Systems Interconnection)

A network model developed by ISO for communication through open system networks.

endpoint

A network node that is the source or destination for data transfer.

redistribution point

A network node that is used to transfer data.

botnet

A collection of software robots run by a command and control program that is controlled by a person.

service pack

A collection of system updates that can include functionality enhancements, new features, and typically all patches, updates, and hotfixes issued up to the point of the release of the service pack.

What is the internet?

A network of computers linked together using a variety of communications technologies such as cables and wireless transmission. The computers and cables constitute the internet.

Windows security policies

Configuration settings within Windows operating systems that control the overall security behavior of the system.

Router

Connects multiple computers together either by cable or wireless. Situated at gateways

NAPTR record

DNS record for the registrar server that defines which transport protocol can be used for the specified domain, specifiying the alias to be used for the SRV query

WAN (Wide Area Network)

A network that spans multiple geographic locations, connecting multiple LANs using long-range transmission media.

open system network

A network that supports multiple communication protocol suites that different vendors develop.

logical star topology

A network topology in which a central device controls network access for nodes that are wired as a physical bus.

physical ring topology

A network topology in which all network nodes are connected in a circle.

logical bus topology

A network topology in which all nodes receive the data transmission at the same time, regardless of the physical wiring layout of the network.

logical ring topology

A network topology in which each node receives data only from its upstream neighbor and retransmits it only to its downstream neighbor, regardless of the physical layout of the network.

physical mesh topology

A network topology in which each node has a direct, point-to-point connection to every other node.

physical star topology

A network topology that uses a central connectivity device with separate point-to-point connections to each node.

flooding

A network transmission state in which data arrives at a receiving node too quickly to be processed.

router

A networking device that connects multiple networks that use the same protocol.

hub

A networking device used to connect the drops in a physical star topology network into a logical bus topology.

unbounded media

A networking medium that does not use a physical connection between devices and can transmit electromagnetic signals through the air using radio waves, microwaves, or infrared radiation.

bounded media

A networking medium that uses a physical conductor, typically made of metal or glass.

HTML

HyperText Markup Language- the programming language for webpages

HTTP

Hypertext Transfer Protocol

THE SECURITY ADMIN FOR YOUR NETWORK HAS ASKED THAT YOU BOCK PING MESSAGES FROM ENTERING YOUR NETWORK. WHAT PROTOCOL WOULD YOU BLOCK

ICMP

TE (Terminal Equipment)

ISDN communications equipment that stations use to accomplish tasks at both ends of a communications link.

WHAT IS A LAYER 2 ADDRESS

IT IS A PHYSICAL ADDRESS, ALSO KNOWN AS THE MAC ADDRESS. E.G 00-AB-0F-2B-3C-4E

IPv6

New addressing scheme utilizes a 128 bit address (instead of 32) and utilizes a hex numbering method in order to avoid long addresses. The hex address format will appear in the for of: 3FFE:B00:800:2::C

access control

In security terms, the process of determining and assigning privileges to various resources, objects, and data.

hotfix

A patch that is often issued on an emergency basis to address a specific security flaw.

BGP (Border Gateway Protocol)

A path-vector protocol used by ISPs to establish routing between one another.

IBSS (Independent Basic Service Set)

A peer-to-peer network where each wireless station acts as both a client and a wireless AP.

ad-hoc mode

A peer-to-peer wireless configuration where each wireless workstation talks directly to other workstations.

extranet

A private network that grants controlled access to users outside of the network.

VPN (Virtual Private Network)

A private network that is configured within a public network such as the Internet

intranet

A private network that uses Internet protocols and services to share a company's information with its employees.

HTTPS (HTTP Secure)

A secure version of HTTP that provides a secure connection between web browser and a server.

authorization

In security terms, the process of determining what rights and privileges a particular entity has.

serial cable

A serial cable is a type of bounded network media that transfers information between two devices using serial transmission.

accountability

In security terms, the process of determining who to hold responsible for a particular activity or event.

auditing

In security terms, the process of tracking and recording system activities and resource access. Also known as accounting.

CARP (Common Address Redundancy Protocol)

A redundancy protocol that allows a number of computers to be grouped together to use a single virtual network interface between them.

virtual server

A remote software tool that can run its own operating systems or applications, similar to a physical server.

ICA (Independent Computing Architecture)

A remote terminal protocol used by Citrix MetaFrame and MetaFrame XP software as add-ons to Microsoft Terminal Services.

PAP (Password Authentication Protocol)

A remote-access authentication method that sends client IDs and passwords as cleartext

logical state

A representation of digital data in the binary form of 1 's and 0's corresponding to the different voltage levels for mathematical reasons and to describe the working of digital devices.

CA (Certificate Authority)

A server that can issue digital certificates and the associated public/private key pairs.

networking standard

A set of specifications, guidelines, or characteristics applied to network components to ensure interoperability and consistency between them.

10Base standards

A set of standards that describes the media type and the speeds at which each type of media operates

Zeroconf (Zero Configuration Networking)

A set of standards used for automatically configuring and allocating IP address on Ethernet as well as wireless networks.

RAID (Redundant Array of Independent or Inexpensive Disks)

A set of vendor-independent specifications for fault-tolerant configurations on multiple-disk systems.

patch

A small unit of supplemental code meant to address either a security problem or a functionality flaw in a software package or operating system.

butt set

A special type of telephone used by telecom technicians when installing and testing local lines. Also known as a lineman's test set.

security incident

A specific instance of a risk event occurring, whether or not it causes damage.

key

A specific piece of information that is used in conjunction with an algorithm to perform encryption and decryption in cryptography.

IEEE 802.1 x

A standard for securing networks by implementing EAP as the authentication protocol over either a wired or wireless Ethernet LAN, rather than the more traditional implementation of EAP over PPP.

PAT (Port Address Translation)

A subset of dynamic NAT functionality that maps either one or multiple unregistered addresses to a single registered address using multiple ports. Also known as overloading.

ES (Edge System)

A system on a Frame Relay network that efficiently manages traffic between a user and the backbone network.

proxy server

A system that isolates internal networks from the servers by downloading and storing files on behalf of clients.

certificate management system

A system that provides the software tools to perform the day-to-day functions of a PKI.

change management

A systematic way of approving and executing change in order to assure maximum security, stability, and availability of information technology services.

FAT (File Allocation Table)

A table on a hard disk maintained by the operating system that provides a map of clusters that files have been stored in.

ARP cache

A table used to maintain a correlation between each MAC address and its corresponding IP address.

EIA (Electronic Industries Alliance)

A trade association accredited by ANSI to develop and jointly issue standards for telecommunications and electronics.

coaxial cable

A type of copper cable that features a central conductor surrounded by an insulator and braided or foil shielding.

sliding window

A type of data window in which block sizes are variable. Window size is continually reevaluated during transmission, with the sender always attempting to send the largest window it can to speed throughput.

fixed length window

A type of data window in which each block of packets is of the same size. Typically, fixed length windows are small to avoid flooding the buffers of less-powerful receivers.

protocol analyzer

A type of diagnostic software that can examine and display data packets that are being transmitted over a network. Also called a network analyzer.

DC (Direct Current)

A type of electric current that flows unidirectionally.

phishing

A type of email-based social engineering attack, in which the attacker sends email from a spoofed source, such as a bank, to try to elicit private information from the victim.

singlemode fiber

A type of fiber optic cable that carries a single optical signal.

multimode fiber

A type of fiber optic cable that carries multiple light signals on a single strand.

IP spoofing attack

A type of software attack where an attacker creates IP packets with a forged source IP address and uses those packets to gain access to a remote system.

malicious code attack

A type of software attack where an attacker inserts malicious software into a user's system.

port scanner

A type of software that searches a network host for open ports.

impersonation

A type of spoofing in which an attacker pretends to be someone they are not, typically an average user in distress, or a help desk representative.

Token ring

A type of technology used on ring networks in which computers pass a special sequence of bits called a token between them.

UTP (Unshielded Twisted Pair)

A type of twisted pair cabling that does not include shielding around its conductors.

NRZ (Non-Return to Zero)

A variation of the on-off keying digital transmission encoding scheme.

NRZI (Non-Return to Zero Inverted)

A variation of the on-off keying digital transmission encoding scheme.

SVC (Switched Virtual Circuit)

A virtual circuit associated with dial-up and demand-dial connections and provide more flexibility than PVCs, allowing a single connection to an endpoint to connect to multiple endpoints as needed.

PVC (Permanent Virtual Circuit)

A virtual circuit associated with leased lines and connects two endpoints, which are always on.

HCC (Horizontal cross-connect)

A wiring closet where the horizontal cabling connects to a patch panel that is attached to the main facility by a backbone cable.

Which Session layer protocol is a streaming live video teleconference liekly to use on the network? UDP SMTP RTP TCP

RTP

CSRC (Contributing source identifier)

RTP header field that identifies the multiple source contributing to a multicast flow

BRI

Referred to as 2B+D

ThinNet

Refers to Ethernet networking over RG58/U or RG58A/U cabling.

ThickNet

Refers to Ethernet networking over RG8 cabling.

plenum

Refers to an air handling space, including ducts and other parts of the HVAC system in a building.

VCC (Vertical Cross-Connect)

Refers to cables that run vertically between floors in a building, or vertically between equipment in an equipment rack.

in phase

Refers to two waves of the same frequency that begin at the same time.

out of phase

Refers to two waves that either start at an offset from each other or have different frequencies.

1024 - 49,151

Registered Port Numbers

active IDS

An IDS that detects a security breach according to the parameters it has been configured with, logs the activity, and then takes the appropriate action to block the user from the suspicious activity.

passive IDS

An IDS that detects potential security breaches, logs the activity, and alerts security personnel.

802.11

An IEEE standard that specifies an over-the-air interface between a wireless client and a base station or between two wireless clients.

802.2

An IEEE standard used to address the need for MAC sub-layer addressing in bridges.

802.3

An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media.

default gateway

An IP address of the router that routes remote traffic from the computer's local subnet to remote subnets.

NIPS (Network-based IPS)

An IPS that is a host that prevents an intrusion on another host that resides on a different IP address and takes actions to prevent an intrusion.

HIPS (Host-based IPS)

An IPS that resides on a computer and uses a specific IP address. It detects and prevents the actions malicious code attempts to modify the system.

satellite Internet

An Internet connection method that uses a satellite network.

NTP (Network Time Protocol)

An Internet protocol that enables synchronization of computer clock times in a network of computers by exchanging time signals.

Data Link layer

An OSI layer responsible for error-free transfer of data packets between nodes on the network.

session hijacking attack

An attack where the attacker exploits a legitimate session to obtain unauthorized access to an organization's network or services.

IV attack

An attack where the attacker is able to predict or control the IV of an encryption process, thus giving the attacker access to view the encrypted data that is supposed to be hidden from everyone else except for the user or network.

Diameter

An authentication protocol that is an updated version of RADIUS and improves on some of its features.

RA (Registration Authority)

An authority in a PKI that processes requests for digital certificates from users.

transit autonomous systems

An autonomous system in which the source or the destination node does not reside within the system.

stub autonomous systems

An autonomous system in which the source or the destination node must exist within the system.

AC (Alternating Current)

An electrical current that switches its flow back and forth in a circuit

circuit tester

An electrical instrument that displays whether an electrical outlet is wired correctly.

voltmeter

An electrical instrument that measures voltage and resistance between two points in a circuit.

cable tester

An electrical instrument that verifies if a signal is transmitted by a cable. Also called a media tester.

digital signal

An electrical signal that can have combinations of only two values: one and zero.

tone locator

An electronic device that emits an audible tone when it detects a signal in a set of wires.

tone generator

An electronic device that sends an electrical signal through one set of UTP cables.

digital certificate

An electronic document that associates credentials with a public key.

multimeter

An electronic measuring instrument that takes electronic measurements such as voltage, current, and resistance.

whaling

An email- or web-based form of phishing which targets particularly wealthy individuals. Also known as spear phishing.

spam

An email-based threat that floods the user's inbox with emails that typically carry unsolicited advertising material for products or other spurious content, and which sometimes delivers viruses.

wireless security

Any method of securing your WLAN network to prevent unauthorized network access and network data theft while ensuring that authorized users can connect to the network.

threat

Any potential violation of security policies or procedures.

exterior router

Any router entirely outside an AS.

attack

Any technique that is used to exploit a vulnerability in any application on a computer system without authorization.

hybrid topology

Any topology that exhibits the characteristics of more than one standard network topology.

password attack

Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.

hoax

Any type of incorrect or misleading information that is disseminated to multiple users through unofficial channels.

unauthorized access

Any type of network or data access that is not explicitly approved by an organization.

BRI and PRI

Two major types of ISDN

Advantages of Wi-Fi

Wireless connectivity between devices and computers on a network. Relatively cheap nowadays. Easy to connect to a range of enabled devices.

Advantages of Wi-Fi

Wireless connectivity between devices and computers on a network. Relatively cheap nowadays. Easy to connect to a range of enabled devices.

Characteristics of Wireless Standards

Wireless networks allow computers to communicate without the use of cables using IEEE 802.11 standards, also known as Wi-Fi. A connection is made from a device, which is usually a PC with a wireless network interface card (NIC), or an Access Point (AP), which acts as a bridge between the wireless stations and Distribution Systems (DS) or wired networks. A wireless adapter can operate in two modes, Ad-Hoc and Infrastructure. In infrastructure mode, all your traffic passes through a wireless AP. In Ad-hoc mode your computers talk directly to each other and do not need an AP. Below are the various standards: 802.11a - 54 mbps, 100ft., 5 GHz 802.11b - 11 mbps, 300ft, 2.4 GHz 802.11g - 54mbps, 300ft 2.4 GHz 802.11n - 540 mbps, 500ft, 5 GHz and/or 2.4 GHz

ISO (International Organization for Standardization)

The largest standards-development body in the world, comprising the national standards institutes of 162 countries.

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? Telnet Remote Desktop FTP SSH

Remote Desktop

PEAP (Protected Extensible Authentication Protocol)

Similar to EAP-TLS, PEAP was proposed as an open standard by a coalition made up of Cisco Systems, Microsoft, and RSA Security.

Blocking

STP Port State: The port remains in this state for 20 seconds by default. During this time, the nondesignated port evaluates BPDUs in an attempt to determine its role in the spanning tree.

WHICH TYPE OF CABLE WOULD YOU USE IF YOU WANTED TO CONNECT A SYSTEM TO AN RJ-45 PORT ON A SWITCH

STRAIGHT-THROUGH

YOU HAVE A UTP CABLE THAT HAS BEEN CONFIGURED AT BOTH ENDS WITH THE 568B STANDARD. WHAT TYPE OF CABLE IS IT

STRAIGHT-THROUGH

Synchronous Transport Signals

STS

WHICH DEVICE FILTERS TRAFFIC BY LOOKING AT THE DESTINATION ADDRESS OF THE FRAME AND THEN FORWARDS THE FRAME TO THE PORT THAT THE DESTINATION SYSTEM RESIDES ON?

SWITCH

WHAT ARE THE 3 PHASES OF THE TCP 3-WAY HANDSHAKE

SYN ACK/SYN ACK

WDM

Sends multiple carriers over a single fiber

802.1X

_____ puts EAP info inside of an Ethernet frame

OSPF (Open Shortest Path First)

______ is the most commonly used IGP on the Internet

File Server

The main computer in any network. It looks like another computer but it is more powerful and holds the software and data that operates all the other computers and peripherals on the network.

Network Technologies

The method a network uses to access the medium and send data or network architecture

IPSec driver

The component of IPSec that watches packets being sent and received to determine if the packets need to be signed and encrypted, based on Group Policy or local Registry settings.

EAP-PSK

The most popular form of authentication used in Wi-Fi

DNS (Domain Name System)

The naming service used on the Internet and many TCP/IP-based networks.

ANSI (American National Standards Institute)

The national standards institute of the United States, which facilitates the formation of a variety of national standards, as well as promoting those standards internationally.

SA (Security Association)

The negotiated relationship between two computers using IPSec. SAs are the result of the two-stage negotiation process. These stages are known as Phase 1 and Phase 2.

frequency

The number of complete cycles per second in a wave. Also, called the period of the wave.

cost

The number of hops along a route between two networks.

packet loss

The number of packets that are lost or damaged during transmission.

subnetting

The process of logically dividing a network into smaller subnetworks or subnets.

deciphering

The process of reversing a cipher.

routing

The process of selecting the best route for moving a packet from its source to destination on a network.

analog modulation

The process of superimposing a low frequency data signal over a high frequency carrier waveform.

LEAP (Lightweight Extensible Authentication Protocol)

The proprietary EAP implementation of Cisco Systems.

IGP (Interior Gateway Protocol)

The protocol responsible for exchanging routing information between gateways within an AS.

EGP (Exterior Gateway Protocol)

The protocol responsible for exchanging routing information between two neighboring gateways.

DWDM

________ can be increased to 1.6 Tbps

CWDM

________ uses four 3.125 Gbps carriers

Frame Relay

___________ replaced circuit-switched T1s

MPLS

____________ replaced Frame Relay

RDP (Remote Desktop Protocol)

The protocol used by Microsoft's Terminal Set.vices implementations.

backoff

The random amount of time a node in a CSMA/CD network waits after a collision has occurred; a typical backoff period is a few milliseconds long.

Bandwidth

The rate at which data can be transmitted. It is measured in bits per second.

troubleshooting

The recognition, diagnosis, and resolution of problems on a network.

latency sensitivity

The susceptibility of a device to experience issues that affect delay within a network.

Network Sniffer with Port Mirroring

___________________________ with ___________________________ Configured on the Switch

Ethernet

a Layer 1 technology developed by Xerox and encompasses a variety of standards, which specify various media types, speeds, and distance limitations.

ISAKMP (internet security association key management protocol)

sub-protocol of IKE to periodically renegotiate the secret keys in a secure way

Broadcast

supports communications to all possible recipients

multicast

supports communications to multiple specific recipients

Unicast

supports only a single communication to a specific recipient

APIPA (Automatic Private Internet Protocol Addressing)

systems that are configured for this will attempt to use DHCP to make a request for an IP address lease for a given network. When the DHCP server is unavailable the service on the client will automatically configure the system with this address in the 169.254.0.1 through 169.254.255.254 address range with a subnet mask of 255.255.0.0

ethernet

technology that uses MAC addresses 48bits and must contain both the source and the destination

mesh VPN

terminals can communicate to each other without going to the headquarters -> higher number of tunnels

provider provision

the VPN is provided and managed by the provider of internet connectivity

RTP (Real-Time Transport)

the audio and video protocol standard used to deliver content over the internet

Wifi

wifi connection are made possible from radio waves

are the systems with the IP addresses of 121.56.78.10 and 121.45.6.88 on the same network

yes

*Which of the following is an example of a Class A IP address?* a. 10.1.0.15 b. 129.1.72.5 c. 192.168.1.5 d. 172.168.15.72

a. 10.1.0.15

Which of the following ports is reserved for File Transfer Protocol? a. 21 b. 42 c. 10 d. 27

a. 21

*One security method is encryption. But encryption does nothing to keep hackers out. To accomplish this goal, which device is best to implement?* a. Firewall b. Bridge c. Router d. Hubs

a. Firewall

*Which of the following communication modes supports two-way traffic, but will only allow it in one direction at a time?* a. Half-duplex b. Full-duplex c. Single User Mode d. Simplex

a. Half-duplex

*What is the agency that is responsible for maintaining the official assignments of port numbers for specific uses on a network and the Internet?* a. IANA b. Cisco c. NCP d. DCCP

a. IANA

Which email protocol allows an email client to read mail stored on the mail server? IMAP4 SMTP TCP POP3

a. IMAP4

*Repeater operates in which layer of the OSI model?* a. Physical layer b. Network later c. Transport layer d. Data Link layer

a. Physical layer

*Which of the following connectors would you use to terminate a Category 6 network cable?* a. RJ-45 b. RJ-11 c. RJ-14 d. RJ-22

a. RJ-45

*Which of the following best describes the purpose of using subnets?* a. Subnets divide an IP network address into multiple network addresses. b. Subnets place each device within its own collision domain. c. Subnets combine multiple IP network addresses into one network address. d. Subnets let you connect a private network on to the Internet.

a. Subnets divide an IP network address into multiple network addresses.

TLS (Transport Layer Security)

another name for SSL

*Which of the following protocols stores e-mail on the mail server and gives users a* choice to download mail or keep it on the server? a. SMTP b. IMAP4 c. NTP d. POP3

b. IMAP4

Temporal Key Integrity Protocol (TKIP)

designed as a solution to replace WEP without requiring the replacement of legacy hardware. It suffered from similar flaws as WEP and has been replaced by more secure encryption schemes.

In the client-server model, what is the primary protocol used for communication between a browser and a Web server? FTP TCP HTTP SSL

c. HTTP

*Which protocol is used for securely browsing a Web site?* a. SSH b. ARP c. HTTPS d. SIP

c. HTTPS

*At which layer of the OSI model is routing performed?* a. Physical b. Transport c. Network d. Data Link

c. Network

*The Internet is an example of which type of network?* a. Cell switched b. Circuit switched c. Packet switched d. All of the above

c. Packet switched

Which of the following is not a type of computer network? a. Local Area Network (LAN) b. Personal Area Network (PAN) c. Remote Area Network (RAN) d. Metropolitan Area Network (MAN)

c. Remote Area Network (RAN)

*Which of the following applications is more likely to justify the investment in Category 6 cable?* a. Instant Messaging b. Printing c. Streaming video d. E-Mail

c. Streaming video

*Which of the following should you setup on the Wi-Fi router to make it most secure?* a. WEP b. NTFS c. WAP2 d. WAP

c. WAP2

coaxial cable

cable TV.outdated, replaced with fiber optic cable. (LAN)

Broadband

can support multiple simultaneous signals, uses frequency modulation, suitable for high throughput rates, a form of analog signal

Baseband

can support only a single communication channel, a form of digital signal

Open Shortest Path First (OSPF)

dynamic routing protocol and is used on IP based networks of all sizes. It is an interior gateway protocol (IGP) that routes IP packets within a single routing domain and was designed to support variable-length subnet masking (VLSM) and Classless Inter-Domain Routing (CIDR) addressing.

hub and spoke VPN

each pair of terminals can communicate to each other only by going through the headquarters

Token Ring

employs token passing mechanism, used on ring or star typologies, rarely used today

ICMP

enables systems on a TCP/IP network to share status and error information such as with the use of PING and TRACERT utilities

*What is the default port for DNS?* a. 80 b. 20 c. 63 d. 53

d. 53

An IP address has: a. A portion of the address which identifies the network to which the individual belongs. b. A portion of the address which identifies the individual host on a destination network. c. A 32 bit addressing schema. d. All of the above.

d. All of the above.

*Which of the following measures are you most likely to implement in order to protect against a worm or Trojan horse?* a. Firewall b. Password Policy c. IPSec d. Anti-Virus software

d. Anti-Virus software

*Which type of cable would you use to connect a router to another router?* a. Straight-through b. Loopback c. Rollover d. Crossover

d. Crossover

*The medium that supports the fastest transmission rate is:* a. Shielded twisted pair b. Coaxial cable c. Type 3 unshielded twisted pair d. Fiber optics

d. Fiber optics

*The loopback address is used to send a packet from the _______ to ________.* a. Host; all other hosts b. Router; all other hosts c. Host; a specific host d. Host; itself

d. Host; itself

*You have a network that uses a logical ring topology. How do messages travel through the network?* a. Messages are sent to a central device which then forwards the message to the destination device. b. Messages are sent directly to the destination device only. c. Messages are sent to all devices connected to the network. d. Messages travel from one device to the next until they reached the destination device.

d. Messages travel from one device to the next until they reached the destination device.

Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications? HTTP and HTTPS SSL and TLS SSL and HTTP TCP and UDP

d. TCP and UDP

*Which command would you use to view the path taken by an Ethernet packet?* a. ipconfig b. ping c. nslookup d. tracert

d. tracert

Next Hop

defined as the next place that a data packet needs to go.

Routing Tables

sometimes referred to as a Routing Information Base (RIB), is the database information that stores all the rout information for the routing network devices. There are three main route entries that are generally found here: Network route - a route to a specific Network ID on the network. Host Route - a route to a specific network address Default Route - the patch used if a physical router or other network routing device cannot find a route for the specified destination.

IMAP

standard protocol for accessing e-mail from your local server. A client/server protocol in which e-mail is received and held for you by your Internet server

2 km, MMF w/ ST or SC

Distance & Cable: 100BaseFX

100 meters, CAT 5

Distance & Cable: 100BaseTX (100BaseT)

10 km

Distance Limitation of 1000BASE-LH

5 km

Distance Limitation of 1000BASE-LX

100 m

Distance Limitation of 1000BASE-T

100 m

Distance Limitation of 1000BASE-TX

70 km

Distance Limitation of 1000BASE-ZX

2 km

Distance Limitation of 100BASE-FX

100 m

Distance Limitation of 100BASE-TX

40 km

Distance Limitation of 100GBASE-ER4

10 km

Distance Limitation of 100GBASE-LR4

125 m

Distance Limitation of 100GBASE-SR10

100 m

Distance Limitation of 10BASE-T

185 m

Distance Limitation of 10BASE2

500 m

Distance Limitation of 10BASE5

40 km

Distance Limitation of 10GBASE-ER

40 km

Distance Limitation of 10GBASE-EW

10 km

Distance Limitation of 10GBASE-LR

10 km

Distance Limitation of 10GBASE-LW

26-82 m

Distance Limitation of 10GBASE-SR

300 m

Distance Limitation of 10GBASE-SW

100 m

Distance Limitation of 10GBASE-T

What does NIC stand for?

Network Interface Card

Remote Access Service

RAS

GSM/EDGE

4G LTE is based on _________

Mobile Communication Technology - 4G (4th Generation)

4G technology is short for fourth generation mobile telephone communication systems technology which was designed to improve the efficiency of data being transferred through your mobile phone (smartphone).

SMA (Sub Multi Assembly or Sub Miniature type A)

A connector with a threaded ferrule on the outside to itself where water or other environmental factors necessitate a waterproof connection.

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)

A contention-based media access method in which nodes can transmit whenever they have data to send.

CSMA/CD (Carrier Sense Multiple Access/Collision Detection)

A contention-based media access method in which nodes can transmit whenever they have data to send.

contention domain

A contention-based network on which a group of nodes compete with each other for access to the media.

multiplexing

A controlled media access method in which a central device called a multiplexer combines signals from multiple nodes and transmits the combined signal across a medium.

polling

A controlled media access method in which a central device contacts each node to check whether it has data to transmit.

HSM (Hardware Security Module)

A cryptographic module that can generate cryptographic keys.

domain

A grouping of computers on the Internet based on the nature of their operations.

white hat

A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.

black hat

A hacker who exposes vulnerabilities for financial gain or for some malicious purpose.

Router

A hardware device which allows two or more computer networks to connect to each other. The networks do not have to be of the same type. it allows the LAN to connect to the Internet. Routers share an internet connection between devices and routes/ directs data around the network.

USB (Universal Serial Bus)

A hardware interface standard designed to provide connections for numerous peripherals.

environment monitor

A hardware tool that ensures that environmental conditions do not spike or plummet temperature above or below equipment specifications.

carrier signal

A high frequency signal that is superimposed on an analog signal to carry information.

intelligent hub

A hub that polls the state of each node and grants permission to transmit in tum.

passive hub

A hub that receives data transmitted from a device on one port and broadcasts it out to the devices connected on all other ports.

active hub

A hub that regenerates the signal similar to a repeater.

spoofing

A human- or software-based attack where the goal is to pretend to be someone else for the purpose of identity concealment.

guessing

A human-based attack where the goal is to guess a password or PIN through brute force means or by using deduction.

logical topology

A topology that describes the data-flow patterns in a network.

host-based IDS

An IDS system that primarily uses software installed on a specific host such as a web server.

collision domain

Another name for a contention domain.

SDH (Synchronous Digital Hierarchy)

Another optical communications standard that is based upon SONET and implemented widely outside the U.S.

VER (Voltage Event Recorder)

Another tool to use in conjunction with or in addition to using a voltmeter to test and verify that the electrical signals transmitting through the network cables are within the required specifications.

software attack

Any attack that targets software resources including operating systems, applications, protocols, and files.

multi-factor authentication

Any authentication scheme that requires validation of at least two of the possible authentication factors.

vulnerability

Any condition that leaves a system open to attack.

node

Any device that can connect to the network and generate, process, or transfer data.

biometrics

Authentication schemes based on an individual's physical characteristics.

5 km, 1,300-nm, SMF

Distance, Wavelength & Cable: 1,000BaseLX

220-500 meters, 850-nm, MMF

Distance, Wavelength & Cable: 1,000BaseSX

E-Carrier Level 1

E1

Extensible Authentication Protocol

EAP

EAPOL (Extensible Authentication Protocol over LAN)

EAP over LAN as used in 802.1X implementations.

PEAP

EAP-MS-CHAPv2 is commonly known as ________

Exterior Gateway Protocol

EGP

Enhanced Interior Gateway Routing Protocol

EIGRP

hybrid

EIGRP is a _______ dynamic routing protocol

Disadvantages of Networks

Expensive to install. Require specialist knowledge to operate/ manage them. Potential for unauthorised users. Server failure may mean computers do not operate. When a software virus is installed onto a network, it can quickly spread, affecting all use data and the organisation's software.

- Not scalable - Not necessarily secure - Not practical for large installations

23. Peer-to-Peer Model: Disadvantages

Characteristics of a LAN

- A switch is used to connect the devices to the network - Devices can connect wirelessly or by cable - A range of devices can be used at the same time -tablets and laptops can connect together- - May be connected to a WAN

Advantages of a LAN

- Can share peripheral devices - Flexible access from multiple locations - Computers can share documents saved on file server - Users usually must be authorized to log onto the network - Backing up data can be done on thee file server - Security can be managed centrally - All computers can access software quickly

Disadvantages of LAN

- Initial costs - A network administer may be required - If the file server breaks down files saved there become inaccessible - Virus could spread to all computers on a network - Network speed will slow if multiple large files are being accessed.

Characteristics of a WAN

- Likely to be composed by several LANs - The internet is a WAN - Bank ATMs are connected to a WAN

Advantages of a WAN

- Users have the capability of accessing a vast range of multimedia resources and services - Retailers can use ecommerce to sell their products - Users are able to access and manage their bank accounts etc.

Bluetooth: Advantages

-Can be used to pair devices -Can increase road safety -Automatic sensing -Small power requirement

Wi-Fi: Advantages

-Easy and convenient -No requirement of cable -Cheaper to install

Optical Fibre:Disadvantages

-Expensive -Cannot carry power -Repeaters are required -If multiple services are being provided on one cable, if the cable fails all the services are lost

Optical Fibre:Advantages

-Faster than copper -Travels further than copper -Large data capacity -Can support multiple services at one time

Mobile Communication technology:Advantages

-Flexible -High speed transfers (4G) -Allows users to access social media etc. -4G is similar speed to Wi-Fi; with greater security

Wi-Fi: Disadvantages

-Security -Range -Traffic

Disadvantages of WAN

-Security concerns (data theft, denial of service attacks and spamming) -Danger of hacking -Additional security required

Bluetooth: Disadvantages

-Short range -Data transmission rate slower than others

Mobile Communication technology:Disadvantages

-Speed limited by strength of signal -User must pay for access -4G is not universal -May be incompatible with networks in other countries -High battery consumption

YOU NEED TO CREATE A CROSSOVER CABLE. WHAT WIRES WOULD YOU CROSS ON ONE OF THE ENDS?

1 and 2 with 3 and 6

SC

1,000BaseFX usually uses __ connectors

LC

1,000BaseSX usually uses __ connectors

802.3ab

1,000BaseT = IEEE _______

802.3z

1,000BaseX (CX, SX, LX) = IEEE ________

WHICH OF THE FOLLOWING ADDRESSES DOES A ROUTER USE TO DETERMINE WHERE A PACKET NEEDS TO BE DELIVERED

1. 24.56.78.10 2. LAYER-3 ADDRESS

NAME 2 LAYER-2 DEVICES

1. BRIDGE 2. SWITCH THEY FILTER TRAFFIC BY MAC ADDRESS

NAME 2 LAYER-1 DEVICES

1. HUBS 2. REPEATER LAYER-1 DEVICES WORK WITH THE ELECTRIC SIGNAL

YOU ARE MONITORING NETWORK TRAFFIC AND NOTICE THAT THERE IS A LARGE NUMBER OF BROADCAST MESSAGES SENT ACROSS THE WIRE. YOU WOULD LIKE TO SEPARATE YOUR NETWORK INTO MULTIPLE BROADCAST DOMAINS. HOW CAN YOU DO THIS? NAME 2 WAYS

1. VLANs 2. ROUTER

Network services

1. the resources a network makes available to its users -Includes applications and the data provided by these applications

- Conversational voice - VoIP (Voice over IP) - Streaming live audio and video - Streaming stored audio and video

10. Three types of communication services:

Class A Private address starts from

10.0.0.0

The decimal number of 137 is

10001001

WHICH 10 GIGABIT ETHERNET STANDARD USES MULTIMODE FIBER-OPTIC CABLING

1000BaseSR S stands for short range multimode fiber-optic cabling is used for short distances

WHICH GIGABIT ETHERNET STANDARD USES UTP CABLING TO REACH 1000Mbps

1000BaseTX

The binary number of 01101101 is

109

14) How fast is the 802.11b standard

11 Mbps

Voice and video transmissions are delay-sensitive

11. You don't want to hear or see breaks in transmission

POP3 USES WHICH PORT

110

Voice and video transmission

12. Are considered loss-tolerant

Physical topology

16. mostly applies to hardware and describes how computers, other devices, and cables fir together to form the physical network

Network administrators

13. must pay attention to the quality of service (QoS) a network provides for voice and video

Bandwidth

14. The amount of traffic, or data transmission activity, on the network

IMAP USES WHICH PORT

143

Topology

15. how parts of a whole work together

Logical topology

17. has to do with software and describes how access to the network is controlled -How users and programs initially gain access to the network

Class B Private address range is

172.16.0.0 to 172.31.255.255

Network operating system

18. controls access to the entire network - Required by client-server models

Peer-to-peer (P2P) network model

19. the OS of each computer on the network is responsible for controlling access to its resources - No centralized control

Class C Private address range is

192.168.0.0 to 192.168.255.255

GIVE AN EXAMPLE OF A LAYER-3 ADDRESS

192.168.2.200

- Client-Server - File and Print Services - Communications Services

2. Types of applications found on most networks

frequencies that are used with 802.11n

2.4 GHz

FTP USES WHICH PORTS

21

Each computer user has a Windows local account

21. Works only on that one computer

- Simple configuration - Less expensive * Compared to other network models

22. Peer-to-Peer Model: Advantages

Windows domain

25. a logical group of computers that a Windows Server can control

What is the default subnet mask of 130.56.78.10

255.255.0.0

What is the default subnet mask of a system with the IP address of 189.34.5.67

255.255.0.0 class B address

What is the default subnet mask of a class C address

255.255.255.0

- Manages client data, resources - Ensures authorized user access - Controls user file access - Restricts user network access - Dictates computer communication rules - Supplies application to clients

30. The NOS is responsible for:

- Windows Server 2012 R2, Ubuntu Server, or Red Hat Linux

31. Server examples

- More memory, processing, storage capacity - Equipped with special hardware - Provides network management functions

32. Servers that have a NOS installed require:

- User credential assigned from one place - Multiple shared resource access centrally controlled - Central problem monitoring, diagnostics, correction capabilities - More scalable

33. Advantages relative to peer-to-peer networks:

3rd Generation Partnership Project

3GPP

fastest that 802.11n can transfer at

3M-10Gbps

ethernet speed

3Mbps to 100Gbps

- Web service - Email services - FTP service - Telnet service - Remote Desktop - Remote applications

4. List of several popular client-server applications:

Mobile Communication Technology

4G technology is short for fourth generation mobile telephone communication systems technology which was designed to improve the efficiency of data being transferred through your mobile phone (smartphone). 5G is the forthcoming fifth generation of mobile network technology. 5G technology promises mobile data speeds that far outstrip the fastest home broadband network currently available in the UK. With speeds of up to 100 gigabits per second, 5G will be as much as 1,000 times faster than existing bandwidth.

File services

5. a server's ability to share data files and disk storage space

YOU WISH TO CREATE A CROSSOVER CABLE AND HAVE WIRED ONE END OF THE CABLE WITH THE 568A STANDARD. WHAT STANDARD SHOULD YOU USE TO WIRE THE OPPOSITE END OF THE CABLE

568B

Mobile Communication Technology - 5G (5th Generation)

5G is the forthcoming fifth generation of mobile network technology. 5G technology promises mobile data speeds that far outstrip the fastest home broadband network currently available in the UK. With speeds of up to 100 gigabits per second, 5G will be as much as 1,000 times faster than existing bandwidth.

frequencies that are used with 802.11ac

5GHZ

File server

6. a computer that provides file services

Print services

7. ability to share printers across a network, - With one printer, less time is spent on maintenance and management

YOU WISH TO ALLOW ECHO REQUEST MESSAGES TO PASS THROUGH THE FIREWALL. WHAT ICMP TYPE IS USED IN AN ECHO REQUEST MESSAGE

8 ICMP TYPE 8 IS USED FOR ECHO REQUESTS ICMP TYPE 0 IS USED FOR ECHO REPLY

Convergence

8. using the same network to deliver multiple types of communications services

Unified communication (UC)

9. refers to the centralized management of multiple network-based communications

Which of the following is the IPv6 equivalent to 127.0.0.1

::1

traffic shaping

A QoS mechanism that introduces some amount of delay in traffic that exceeds an administratively defined rate.

28

A T3 line consists of ___ T1 circuits

pathping

A TCP / IP command that provides information about latency and packet loss on a network.

FTP (File Transfer Protocol)

A TCP / IP protocol that allows the transfer of files between a user's workstation and a remote host.

ping

A TCP/IP command used to verify the network connectivity of a computer, and also to check if the target system is active.

NETSTAT

A TCP/IP utility that shows the status of each active connection.

Time and Distance

A TDR sends an electrical pulse down the cable and calculates __________ and __________

BOOTP (Bootstrap Protocol)

A UDP network protocol that helps diskless workstation computers get an IP address before loading an advanced operating system.

VTP (VLAN Trunking Protocol)

A VLAN management protocol developed by Cisco.

SSL VPN (Secure Socket Layer VPN)

A VPN format that works with a web browser-installing a separate client is not necessary.

ICS (Internet Connection Sharing)

A WAN connectivity method that connects multiple computers to the Internet by using a single Internet connection.

cable Internet access

A WAN connectivity technology that uses a cable television connection and a cable modem to provide high-speed Internet access to homes and small businesses.

WAN Features

A WAN covers a large geographical area and this may also include different countries. Relatively expensive with regard to hardware such as satellite transmission and routers. A WAN uses various transmission methods as the devices it transmits to are very far apart. Because a WAN covers wide geographical area it is limited to the resources available in each segment. A WAN may be used by many organisations.

Frame Relay

A WAN protocol that operates at the Physical and Data Link layers of the OSI model.

wireless tester

A Wi-Fi spectrum analyzer used to detect devices and points of interference, as well as analyze and troubleshoot network issues on a WLAN.

Microsoft Management Console (MMC)

A Windows tool that is used to manage IPSec policies on Windows systems.

IP Security Monitor

A Windows tool that provides a main mode and a quick mode to verify IPSec statistics.

NBTSTAT

A Windows utility that is used to view and manage NetBIOS name cache information.

signal bounce

A condition in which the signals endlessly move from one end of a cable to the other end.

VLAN switch

A configurable managed switch used on VLANs that creates a logical network structure, even when computers are on different physical segments.

ESS (Extended Service Set)

A configuration of multiple BSSs used to handle mobility on a wireless network.

Remote desktop

A connection mode that enables a user to access any network system from their workstation and perform tasks on the remote system.

TCP (Transmission Control Protocol)

A connection-oriented, guaranteed-delivery protocol used to send data packets between computers over a network like the Internet.

IP (Internet Protocol)

A connectionless Network-layer protocol that is responsible for sending data packets across a network.

UDP (User Datagram Protocol)

A connectionless Transport-layer protocol that is one of the protocols in the Internet protocol suite, and is used with IP. It is also known as the Universal Datagram Protocol.

SC (Subscriber Connector or Standard Connector)

A connector used in a duplex configuration where two fibers are terminated into two SC connectors that are molded together.

FC (Face Contact)

A connector used in industrial settings that has a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors.

ST (Straight Tip)

A connector used to connect multimode fiber.

transceiver

A device that has a transmitter and a receiver integrated into it to send and receive data.

modem

A device that modulates and demodulates data over an analog signal sent via a telephone line.

demultiplexer

A device that performs demultiplexing. Also called a demux.

multiplexer

A device that performs multiplexing. Also called a mux.

oscilloscope

A device that plots the amplitude of an analog signal as a function of time and displays analog signals as sine wave-shaped plots.

WAP (Wireless Access Point)

A device that provides a connection between wireless devices and can connect to wired networks.

UPS (uninterruptible power supply)

A device that provides backup power when the electrical power fails or drops to an unacceptable voltage level.

encryption devices

A device that provides encryption, decryption, and access control using an HSM.

repeater

A device that regenerates a signal to improve transmission distances.

NIC (Network Interface Card)

A device that serves as an interface between the computer and the network. Also called a network adapter or network card.

smart jack

A device that serves as the demarcation point between the end user's inside wiring and local access carriers' facilities.

modulator

A device that superimposes a high frequency carrier wave over an analog signal.

What is a hub?

A device which connects several devices on a network together. Data is made available to all devices through the hub.

What is a firewall?

A device which contains software to protect a LAN or computer when using the internet. It prevents hackers and viruses from entering the network and can also prevent users from sending data out of the network.

gateway

A device, software, or a system that converts data between incompatible systems.

radio networking

A form of wireless communications in which signals are sent via RF waves. Also called RF networking.

infrared transmission

A form of wireless transmission over unbounded media in which signals are sent as pulses of infrared light.

security policy

A formalized statement that defines how security will be implemented within a particular organization.

network policy

A formalized statement that defines network functioning and establishes expectations for users, management, and IT personnel.

TCP/IP model

A four-layer data communication model developed by the United States Department of Defense. To some extent, it is similar to the OSI model.

RF (Radio Frequency)

A frequency in which network or other communications that take place using radio waves in the 10 KHz to 1 GHz range.

hot site

A fully configured alternate network that can be online quickly after a disaster.

hot spare

A fully configured and operational piece of backup equipment that can be swapped into a system with little to no interruption in functionality.

plenum cable

A grade of cable that does not give off noxious or poisonous gases when burned.

GIF (Graphics Interchange Format)

A graphic interchange format primarily used on the Internet.

computer network

A group of computers that are connected together to communicate and share network resources.

X.25

A legacy packet switching network technology developed in the 1970s to move data across less than reliable public carriers.

OSPF (Open Shortest Path First)

A link-state routing protocol used on IP networks.

IS-IS (Intermediate System to Intermediate System)

A link-state routing protocol used within a network.

DoS attack (Denial of Service attack)

A network attack in which an attacker disables systems that provide network services by consuming a network link's available bandwidth, consuming a single system's available resources, or exploiting programming flaws in an application or operating system.

eavesdropping attack

A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also known as a sniffing attack.

sniffing attack

A network attack that uses special monitoring software to gain access to private communications on the network wire or across a wireless network. Also known as an eavesdropping attack.

fiber optic cable

A network cable in which one or more glass or plastic strands, plus additional fiber strands or wraps, are surrounded by a protective outer jacket.

media access method

A network communications mechanism that determines whether or not a particular node can transmit data on a network at a given time.

terminator

A network component attached to the ends of a network cable that can impede or absorb signals so they cannot reflect onto the cable. Also... A resistor or other device added to the end of a cable to ensure that the end of the cable is not a source of signal reflections and noise.

server

A network computer that shares resources with and responds to requests from computers, devices, and other servers on the network.

client

A network computer that utilizes the resources of other network computers.

network model

A network design specification for how the nodes on a network interact and communicate.

switch

A network device that acts as a common connecting point for various nodes or segments.

bridge

A network device that divides a logical bus network into subnets.

logical network diagram

A network diagram that documents the protocols and applications that control the flow of network traffic.

link redundancy

A network fault-tolerance method that provides alternative network connections that can function if a critical primary connection is interrupted.

centralized network

A network in which a central host computer controls all network communication and performs data processing and storage on behalf of clients.

Wide Area Network (WAN)

A network in which computers are geographically remote. They are connected by a telecommunications link, such PSTN

packet switching network

A network in which data is broken up into separate packets and each packet is separately routed, without a dedicated connection between the endpoints.

What is a Local Area Network?

A network of computers which are connected together in a limited area, usually the same building or a couple of nearby buildings. They are usually high speed and they make use of connected periperhals such as printers.

network reconstruction plan

A network plan that provides the steps to reconstruct the network.

TCP/IP (Transmission Control Protocol/Internet Protocol)

A network protocol suite that is routable and allows computers to communicate across all types of networks.

HTTP (Hypertext Transfer Protocol)

A network protocol that works on the Application layer of the OSI and TCP /IP models and enables clients to connect to and retrieve web pages from a server to interact with websites.

routable protocol

A network protocol which provides separate network and node addresses to work with routers.

authentication

A network security measure in which a computer user or some other network component proves its identity in order to gain access to network resources.

DHCP (Dynamic Host Configuration Protocol)

A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.

topology

A network specification that determines the network's overall layout, signaling, and data-flow patterns.

MPLS (Multiprotocol Label Switching)

A network technology defined by a set of IETF specifications that enable Layer 3 devices, such as routers, to establish and manage network traffic.

Wi-Fi

A network technology that uses radio waves to allow a device to communicate with a wireless router.

WPAN (Wireless Personal Area Network)

A network that connects devices in very close proximity but not through a wireless access point.

PAN (Personal Area Network)

A network that connects two to three workstations with twisted pair cabling most often seen in small or home offices.

MAN (Metropolitan Area Network)

A network that covers an area equivalent to a city or other municipality.

CAN (Campus Area Network)

A network that covers an area equivalent to an academic campus or business park.

enterprise network

A network that includes elements of both local and wide area networks and is owned and operated by a single organization to interlink its computers and resources.

mixed mode network

A network that incorporates elements from more than one of the three standard network models.

differential signaling

A noise reduction technique in which the signals from two inputs are compared; signals that are identical on the two inputs are ignored, while those that are different on the inputs are accepted

ICANN (Internet Corporation for Assigned Names and Numbers)

A non-profit corporation that assigns unique identifications on the Internet, such as domain names, IP addresses, and extension names.

I SOC (Internet Society)

A non-profit organization that oversees standards and practices for the Internet.

What is a network?

A number of computers or devices connected can share resources communicate with each other.

simplex

A one-way mode of communication. Radio and television broadcasts ace simplex mode transmissions.

WiMAX (Worldwide Interoperability for Microwave Access)

A packet-based wireless technology that provides wireless broadband access over long distances.

strong password

A password that meets the complexity requirements that are set by a system administrator and documented in a password policy.

USB connection

A personal computer connection that enables you to connect multiple peripherals to a single port with high performance and minimal device configuration.

physical tree topology

A physical network topology in which a central, or root, node is hierarchically connected to one or more nodes, which in turn are connected to other nodes lower in the hierarchy.

token

A physical or virtual object that stores authentication information.

segment

A physical subdivision of a network that links a number of devices, or serves as a connection between two specific nodes.

physical bus topology

A physical topology in which network nodes are arranged in a linear format.

physical network diagram

A pictorial representation of the location of all network devices and endpoints, it depicts their connections to one another.

logic bomb

A piece of code that sits dormant on a target computer until it is triggered by the occurrence of specific conditions, such as a specific date and time. Once the code is triggered, the logic bomb "detonates," performing whatever action it was programmed to do.

worm

A piece of code that spreads from one computer to another on its own, not by attaching itself to another file.

HOSTS file

A plaintext file configured on a client machine containing a list of IP addresses and their associated host names, which can be used for host name resolution as an alternative to DNS.

smart card

A plastic card containing an embedded computer chip that can store different types of electronic information.

VNC (Virtual Network Computing)

A platform-independent desktop sharing system.

PON (Passive Optical Network)

A point-to-multipoint optical network that is used for broadcast transmissions using optical systems.

disaster recovery plan

A policy and set of procedures that documents how people and resources will be protected in case of disaster, and how the organization will recover from the disaster and restore normal functioning.

demand priority

A polling technique in which nodes signal their state--either ready to transmit or idle--to an intelligent hub. The hub polls the state of each node and grants permission to transmit in turn.

802.1X

A port-based authentication network access control mechanism for networks, only broadly adopted in wireless networking

host computer

A powerful, centralized computer system that performs data storage and processing tasks on behalf of clients and other network devices.

cold site

A predetermined alternate location where a network can be rebuilt after a disaster.

Intranet

A private communication network that can only be accessed by users within a company or organisation.

virtual PBX

A private communications service provider that provides a low-cost PBX service.

bluesnarfing

A process in which attackers gain access to unauthorized information on a wireless device using a Bluetooth connection.

encapsulation

A process of adding delivery information to the actual data in each layer.

intrusion detection

A process of monitoring the events occurring on a computer or a network, and analyzing them to detect possible incidents, which are violations or imminent threats of violation of computer security policies, and standard security practices.

digital signal modulation

A process of representing digital data with an analog signal so that digital data can be transmitted between different digital devices.

demultiplexing

A process that converts the multiplexed signals to independent signals.

parity check

A process used to detect errors in memory or data communication.

SSH (Secure Shell)

A program that enables a user or an application to log on to another computer over a network, run commands in a remote machine, and transfer files from one machine to the other.

IGMP (Internet Group Management Protocol)

A protocol in the TCP /IP suite that supports multicasting in a routed environment.

AH protocol (Authentication Header protocol)

A protocol that IPSec uses to provide data integrity through the use of MDS and SHA. AH takes an IP packet and uses either MDS or AH to hash the IP header and the data payload, and then adds its own header to the packet.

ESP protocol (Encapsulating Security Payload protocol)

A protocol that IPSec uses to provide data integrity as well as data confidentiality (encryption) using one of the two encryption algorithms, DES or 3DES.

RADIUS (Remote Authentication Dial-In User Service)

A protocol that enables a server to provide standardized, centralized authentication for remote users.

EAP (Extensible Authentication Protocol)

A protocol that enables systems to use hardware-based identifiers, such as fingerprint scanners or smart card readers, for authentication.

WEP (Wired Equivalency Privacy)

A protocol that provides 64-bit, 128-bit, and 256-bit encryption using the Rivest Cipher 4 (RC4) algorithm for wireless communication that uses the 802.11 a and 802.11 b protocols.

SCP (Secure Copy Protocol)

A protocol that uses SSH to securely copy files between a local and a remote host, or between two remote hosts.

SMB (Server Message Block)

A protocol that works on the Application layer and is used to share files, serial ports, printers, and communications devices, including mail slots and named pipes, between computers.

PPP (Point-to-Point Protocol)

A protocol that works on the Data Link layer of the TCP/IP protocol suite, PPP is used to send IP datagrams over serial point-to-point links. PPP can be used in synchronous and asynchronous connections and can dynamically configure and test remote network connections.

IKE (Internet Key Exchange)

A protocol used by IPSec to create a master key, which in turn is used to generate bulk encryption keys for encrypting data.

IMAP4 (Internet Message Access Protocol)

A protocol used for retrieving email messages and folders from a mail server.

MME (Mesh Made Easy)

A protocol used for routing in wireless networks.

POP3 (Post Office Protocol version 3)

A protocol used from retrieving email from a mailbox on the mail server.

RFB (Remote Framebuffer)

A protocol used in VNC for remote access and graphical user interfaces (GUis).

NNTP (Network News Transfer Protocol)

A protocol used to post and retrieve messages from newsgroups, usually from the worldwide bulletin board system called USENET.

ICMP (Internet Control Message Protocol)

A protocol used with IP that attempts to report on the condition of a connection between two nodes.

network address

A protocol-specific identifier assigned to a node that maps to a MAC address.

iterative query

A query used by the DNS server for name resolution when a client requests only the information the server already has in its cache for a particular domain name.

recursive query

A query used by the DNS server for name resolution when a client requests that its preferred DNS server find data on other DNS servers.

LTE (Long Term Evolution)

A radio technology for wireless broadband access.

high availability

A rating that expresses how closely systems approach the goal of providing data availability 100 percent of the time.

baseline

A record of a system's performance statistics under normal operating conditions.

log file

A record of actions and events performed on an operating system.

interior router

A router arranged inside an AS and completely controlled by the AS administrator.

border router

A router situated on the edge of an AS that connects the AS to one or more remote networks.

path-vector routing

A routing method in which the router keeps track of the route from itself to the destination; however, rather than recording every individual node, path-vector routing can treat entire autonomous systems as nodes.

link state routing

A routing method that floods routing information to all routers within a network to build and maintain a more complex network route database.

routing loop

A routing process in which two routers discover different routes to the same location that include each other but never reach the endpoint.

RIP (Routing Information Protocol)

A routing protocol that configures routers to periodically broadcast their entire routing tables. RIP routers broadcast their tables regardless of whether or not any changes have occurred on the network.

virus

A sample of code that spreads from one computer to another by attaching itself to other files.

mutual authentication

A security mechanism that requires that each party in a communication verify its identity.

TKIP (Temporal Key Integrity Protocol)

A security protocol created by the IEEE 802.11i task group to replace WEP.

WPA (Wi-Fi Protected Access)

A security protocol introduced to address some of the shortcomings in WEP, WEP, WPA2, and WiFi.

TLS (Transport Layer Security)

A security protocol that uses certificates and public key cryptography for mutual authentication and data encryption over a TCP/IP connection.

SSL (Secure Sockets Layer)

A security protocol that uses certificates for authentication and encryption to protect web communication.

permission

A security setting that determines the level of access a user or group account has to a particular resource.

encryption

A security technique that converts data from plain, or cleartext form, into coded, or ciphertext form so that only authorized parties with the necessary decryption information can decode and read the data.

honeypot

A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb.

WLAN (Wireless Local Area Network)

A self-contained network of two or more computers connected using a wireless connection.

AS (Autonomous System)

A self-contained network on the Internet that deploys a single protocol and has a single administration.

LAN (Local Area Network)

A self-contained network that spans a small area, such as a single building, floor, or room.

peer

A self-sufficient computer that acts as both a server and a client.

BSS (Basic Service Set)

A service set that defines the way a WLAN is configured.

DHCP relay agent

A service that captures a BOOTP broadcast and forwards it through the router as a unicast transmission to a DHCP server on a remote subnet.

APIPA (Automatic Private IP Addressing)

A service that enables a DHCP client computer to configure itself automatically with an IP address on the 169.254.0.0 network in case no DHCP servers respond to the client's DHCP discover broadcast.

IPSec Policy Agent

A service that runs on each Windows computer that is used to transfer an IPSec policy agent from Active Directory or the local Registry to the IPSec driver.

SSO (Single Sign-On)

A session/user authentication process that permits a user to enter one name and password in order to access multiple applications.

ACL (Access Control List)

A set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access to a resource such as a computer, file, or network.

Ethernet

A set of networking technologies and media access methods specified for LANs.

IPSec (Internet Protocol Security)

A set of open, non-proprietary standards that you can use to secure data as it travels across the network or the Internet through data authentication and encryption.

QoS (Quality of Service)

A set of parameters that controls the level of quality provided to different types of network traffic.

What is protocol?

A set of rules which govern the way in which data is transmitted between computer networks.

IPSec policy

A set of security configuration settings that define how an IPSec-enabled system will respond to IP network traffic.

physical topology

A topology that describes a network's physical layout and shape.

DES (Data Encryption Standard)

A shared-key encryption algorithm that uses a 56-bit encryption key to encode data in 64-bit blocks.

analog signal

A signal that oscillates over time between minimum and maximum values and can take on any value between those limits.

network acknowledgment

A signal used by a communication protocol between nodes on a network to acknowledge receipt of data.

TFTP (Trivial File Transfer Protocol)

A simple version of FTP that uses UDP as the transport protocol, and does not require a logon to the remote host.

NetBIOS

A simple, broadcast-based naming service.

VLAN

A single broadcast domain, representing a single subnet. Typically, a group of ports on a switch is assigned to a single one of these. For traffic to travel between two of these, that traffic needs to be routed.

What are switches?

A single connection point for a group of computers. The switch is then connected to the file server and organises the communication. Can send data to a particular computer. Not needed with all networks.

VPN concentrator

A single device that incorporates advanced encryption and authentication methods in order to handle a large number of VPN tunnels.

LC (Local Connector)

A small form factor ceramic ferrule connector for both singlemode and multimode fiber.

SOHO (Small office/home office)

A small network that can comprise up to 10 nodes.

DMZ (demilitarized zone)

A small section of a private network that is located between two firewalls and made available for public access.

VSAT (Very Small Aperture Terminal)

A small telecommunication Earth station that consists of a small antenna that transmits and receives signals from satellites.

sine wave

A smoothly oscillating curve that is the result of calculating the sine of the angles between zero and 360 and plotting the results.

IDS (Intrusion Detection System)

A software and/ or hardware system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.

high bandwidth application

A software application or program that requires large amounts of network bandwidth for data transmission.

DDoS attack (Distributed Denial of Service attack)

A software attack in which an attacker hijacks or manipulates multiple computers (through the use of zombies or drones) on disparate networks to carry out a DoS attack.

network analyzer

A software or hardware tool that integrates diagnostic and reporting capabilities to provide a comprehensive view of an organization's network.

firewall

A software program or a hardware device or a combination of both that protects a system or network from unauthorized data by blocking unsolicited traffic.

antivirus software

A software program that scans a computer or network for known viruses, Trojans, worms, and other malicious software.

performance monitor

A software tool that monitors the state of services, processes, and resources on a system.

DFS (Distributed File System)

A software-based distributed hierarchical storage implementation that is built into Windows Server 2003, Windows Server 2008 R2, and other Windows server software.

virtual switch

A software-based switch that provides functionality similar to physical switches, and is used for connecting virtual systems to form a network.

hardware loopback plug

A special connector used for diagnosing transmission problems that redirects electrical signals back to the transmitting system.

crossover cable

A special network cable used in Ethernet UTP installations, in which the transmit and receive lines are crossed in a way that enables you to connect two hubs or two stations without using a switch.

SONET (Synchronous Optical Network)

A standard for synchronous data transmission on optical media.

PoE (Power over Ethernet)

A standard that specifies a method for supplying electrical power over Ethernet connections.

OCx (Optical Carrier x)

A standard that specifies the bandwidth for fiber optic transmissions.

troubleshooting model

A standardized step-by-step approach to the troubleshooting process.

MCC (Main cross-connect)

A structured cabling connection point that connects equipment cables, backbone cables, and entrance cables.

LLC (Logical Link Control)

A sub-layer of the Data Link layer of the OSI model that controls how data packets are placed on a media by controlling the Physical layer device.

MAC (Media Access Control)

A sub-layer of the Data Link layer of the OSI model that is responsible for sensing the presence of data frames on a medium and allowing the nodes to access the medium.

CIDR (Classless Inter Domain Routing)

A subnetting method that selects a subnet mask that meets an individual network's networking and node requirements and then treats the mask like a 32-bit binary word.

Analog

A subtechnology, a continuous signal that varies in frequency, amplitude, phase, voltage, and so on. The variances in the continuous signal produce a wave shape (as opposed to the square shape of a digital signal). The actual communication occurs by variances in the constant signal, suffers from Attenuation

Digital

A subtechnology, more reliable than analog signals over long distances or when interference is present, sends data in binary form (0,1), faster than analog

Asynchronous

A subtechnology, rely on a stop and start delimiter bit to manage the transmission of data, best suited for smaller amounts of data, PSTN modems (Public Switched telephone Networks) use this communication method

Synchronous

A subtechnology, rely on a timing or clocking mechanism based on either an independent clock or a time stamp embedded in the data stream, typically able to support very high rates of data transfer

guideline

A suggestion for meeting the policy standard or best practices on a network policy.

Root bridge

A switch in an STP topology elected to act as a reference point for a spanning tree. The switch with the lowest bridge ID (BID) is elected as this. The BID is made up of a priority value and a MAC address.

NNI (Network-to-Network Interface)

A switch that is inside an ATM network.

circuit switching

A switching technique in which one endpoint creates a single path connection to another, depending on the requirement.

virtual circuit switching

A switching technique that connects endpoints logically through a provider's network.

label switching

A switching technology that saves up on processing time of packets by routers by adding a label to each incoming data packet.

port filtering

A technique of selectively enabling or disabling TCP and UDP ports on computers or network devices.

IP filtering

A technique that determines the packets which will be allowed to pass and those which will be dropped by screening the packet based on certain criteria.

IV (Initialization Vector)

A technique used in cryptography to generate random numbers to be used along with a secret key to provide data encryption.

switching

A technique used to transmit information over a network to the destination network device.

BPL (Broadband over Powerlines)

A technology that allows domestic power lines for broadband transmission.

dedicated lines

A telecommunication path that is available 24 hours a day for use by a designated user.

satellite phone

A telephone system that relies on the satellite network to provide services, instead of the infrastructure of the local telephone switch.

attacker

A term for a user who gains unauthorized access to computers and networks for malicious purposes.

NAC (Network Access Control)

A term that refers to collected protocols, policies, and hardware that govern access on devices to and from a network.

Telnet

A terminal emulation protocol that allows users at one site to simulate a session on a remote host.

wire crimper

A tool that attaches media connectors to the ends of cables.

punch down tool

A tool used in a wiring closet to connect cable wires directly to a patch panel.

GBIC (Gigabit Interface Converter)

A transceiver used to convert electrical signals into optical signals and vice versa.

SFP (Small Form Factor Pluggable)

A transceiver used to interconvert electrical signals to optical signals.

Network Cables

A transmission medium that is used to connect computers to the file server. It can be either copper wire or fibre optics cables. Fibre optic cables have a faster transmission rate than copper wire.

broadcast transmission

A transmission method in which data goes from a source node to all other nodes on a network.

multicast transmission

A transmission method in which data is sent from a server to specific nodes that are predefined as members of a multicast group.

broadband transmission

A transmission technique in which analog signaling is used to send data over a transmission medium using a portion of the medium's bandwidth.

baseband transmission

A transmission technique in which digital signaling is used to send data over a single transmission medium using the entire bandwidth of that medium.

parallel data transmission

A transmission technique in which multiple bits are transmitted across multiple transmission lines.

serial data transmission

A transmission technique in which the transmission of bits occurs as one per clock cycle, across a single transmission medium.

directional antenna

A type of antenna that concentrates the signal beam in a single direction.

omni-directional antenna

A type of antenna that radiates the signal beam out in all directions and has lower gain but a wider coverage area.

data theft

A type of attack in which unauthorized access is used to obtain protected network information.

social engineering attack

A type of attack where the goal is to obtain sensitive data, including user names and passwords, from network users through deception and trickery.

copper media

A type of bounded media that uses one or more copper conductors surrounded by a non-conductive insulated coating.

twisted pair

A type of cable in which two conductors or pairs of copper wires are twisted around each other and clad in a color-coded, protective insulating plastic sheath or jacket to form a pair.

cable certifiers

A type of certifier that can perform tests, such as cable testing and validity testing.

HVAC (Heating, Ventilating, and Air Conditioning)

A type of climate control system often found in large commercial or industrial buildings.

wireless communication

A type of communication in which signals are transmitted over a distance without the use of a physical medium.

replay attack

A type of network attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.

remote networking

A type of network communication that enables users who are not at their physical locations to access network resources.

cell switching network

A type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.

dictionary attack

A type of password attack that automates password guessing by comparing encrypted passwords against a predetermined list of possible password values.

guessing attack

A type of password attack that involves and individual making repeated attempts to guess a password by entering different common password values, such as the user's name, a spouse's name, or a significant date.

brute force attack

A type of password attack where an attacker uses an application to exhaustively try every possible alphanumeric combination to try to crack encrypted passwords.

remote access protocol

A type of protocol that enables users to log on to a computer or network within an organization from an external location.

FHSS (Frequency Hopping Spread Spectrum)

A type of radio transmission in which a signal is sent on one channel at a time, and at predetermined fiXed intervals, the channel changes.

DSSS (Direct Sequence Spread Spectrum)

A type of radio transmission in which a single data signal is converted into multiple digital data signals called chips.

domain name

A unique name that identifies a website on the Internet A period is used to separate the labels of domain names.

MAC address

A unique, hardware level address assigned to every networking device by its manufacturer. MAC addresses are six bytes long. Also known as a physical address.

data packet

A unit of data transfer between computers that communicate on a network.

packet

A unit of data transmitted on a network.

UNI (User-to-Network Interface)

A user device, it is an ATM border device that connects one ATM network to another or a LAN.

cracker

A user who breaks encryption codes, defeats software copy protections, or specializes in breaking into systems.

hacker

A user who excels at programming or managing and configuring computer systems, and has the skills to gain access to computer systems through unauthorized or unapproved means.

MTR (My traceroute)

A utility that is a combination of ping and traceroute used in a UNIX-based system.

nslookup

A utility that is used to test and troubleshoot domain name servers.

TTL (Time To Live)

A value for the ping command that determines how many hops an IP packet can travel before being discarded.

Checksum

A value to let the receiver test the integrity of received data.

OTDR (Optical Time-Domain Reflectometer)

A variation of TDR that transmits light-based signals of different wavelengths over fiber optic cabling to determine cabling issues.

partial mesh

A variation of mesh topology in which only a few nodes have direct links with all other nodes.

connection

A virtual link between two nodes established for the duration of a communication session.

VoIP (Voice over IP)

A voice over data implementation in which voice signals are transmitted over IP networks.

EAP-TLS (EAP-Transport Layer Security)

A widely supported feature in wireless routers and cards that provides robust security.

DS (Distribution System)

A wired connection between a BSS and a premise-wide network that enables mobility on devices.

infrastructure mode

A wireless configuration that uses one or more WAPs to connect wireless workstations to the cable backbone.

radiated connection

A wireless point-to-point or multipoint connection between devices.

Bluetooth

A wireless technology that facilitates short-range wireless communication between devices such as personal computers, laptop, cellular phones, and gaming consoles, thus creating a WPAN.

Apache is a popular example of what type of networking software? Web server Browser Email Server Email Client

A. Web server

WHICH FLAG IS SET IN A TCP PACKET THAT INDICATES A PREVIOUS PACKET WAS RECEIVED

ACK

WHAT FLAGS ARE SET ON THE SECOND PHASE OF THE 3-WAY HANDSHAKE

ACK/SYN

Asymmetric Digital Subscriber Line

ADSL

Authentication Header

AH

Which protocol is responsible for converting the logical address to a physical address

ARP Address Resolution Protocol is a network layer protocol that converts the IP address (logical address) to a MAC address (physical address)

edge

AS to AS Routers are called _____ routers

EGPs

ASs communicate with each other using _____

Asynchronous Transfer Mode

ATM

TIA (Telecommunications Industry Association)

Along with EIA, developed the 568 Commercial Building Telecommunication Cabling standard.

termination

Adding a resistor to the ends of a coax network segment to prevent reflections that would interfere with the proper reception of signals.

PAT

Address translation that protects internal systems from the Internet

private IP address

Addresses used by organizations for nodes that need IP connectivity only within their enterprise network, but not external connections to the Internet.

IEEE 1394

Also known as FireWire, used to connect up to 63 devices to form a small local network.

Nonroot bridge

All other switches in the STP topology not elected to act as a reference point for a spanning tree.

managed hub

Also known as an intelligent hub, this is a hub that enable you to monitor and configure its operations.

RSS feeds

Allow users to subscribe and receive updates made to a web page.

half-duplex

Allows a device to either receive or transmit data at any one time. Cannot simultaneously transmit and receive.

DNAT

Allows many computers to share a pool of routable IP addresses

encoding

Also known as digital signal modulation.

MAC Addressing

Also known as hardware address or ethernet address, it is a unique code assigned to most networking hardware. It is assigned by the manufacturer and is permanent to the device. They are in a 48-bit hexadecimal format such as 00:2F:21:C1:11:0A. They are used to uniquely identify a device on a network and for other functions such as being authenticated by a DHCP server.

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

An AES cipher-based encryption protocol used in WPA2.

SNMP (Simple Network Management Protocol)

An Application-layer protocol used to exchange information between network devices.

16

An E3 line consists of ___ E1 circuits

Fast Ethernet

An Ethernet technology that can transmit data at speeds of 100 Mbps.

Gigabit Ethernet

An Ethernet technology that can transmit data at speeds of 1000 Mbps and primarily uses optical fibers for transmission.

application-based IDS

An IDS software component that monitors a specific application on a host.

network-based IDS

An IDS system that primarily uses passive hardware sensors to monitor traffic on a specific segment of the network.

IPS (Intrusion Prevention System)

An active, inline security device that monitors suspicious network and/ or system traffic and reacts in real time to block it Also called a Network Intrusion Prevention System (NIPS).

SLA (Service Level Agreement)

An agreement entered into by the transmitter, ISP and the receiver, subscriber.

split horizon

An algorithm that prevents count-to-infinity loops by configuring a router from broadcasting internal network information.

poison reverse

An algorithm that prevents count-to-infmity loops by ensuring that a router broadcasts a route cost of 16 for all transmissions on its network.

fall-back plan

An alternate network reconstruction design that can be implemented temporarily to enable critical network elements to function.

caching engine

An application or service that stores requested data in order to provide faster responses to future requests for the data.

WWW- World Wide Web

An application which runs on the internet. The most used service on the internet.

pharming

An attack in which a request for a website, typically an e-commerce site, is redirected to a similar-looking, but fake, website.

packet sniffing

An attack on wireless networks where an attacker captures data and registers data flows in order to analyze what data is contained in a packet.

buffer overflow

An attack that targets system vulnerability to cause the device operating system to crash or reboot and may result in loss of data or execute rogue code on devices.

FTP bounce attack

An attack that targets the FTP vulnerability to permit connected clients to open other connections on any port on the FTP server.

hybrid password attack

An attack that utilizes multiple attack vectors including dictionary, rainbow table, and brute force attack methodologies when trying to crack a password.

port scanning attack

An attack where an attacker scans your systems to see which ports are listening in an attempt to find a way to gain unauthorized access.

digital signature

An encrypted hash value that is appended to a message to identify the sender and the message.

CHAP (Challenge Handshake Authentication Protocol)

An encrypted remote-access authentication method that enables connections from any authentication method requested by the server, except for PAP and SPAP unencrypted authentication.

shared-key encryption

An encryption system in which a single key is shared between parties in a communication and used to both encode and decode the message.

key-pair encryption

An encryption system in which an individual has two encryption keys: the public key that anyone can use to encode the message, and the user's private key, which is used to decode messages.

PKI (Public Key Infrastructure)

An encryption system that is composed of a CA, certificates, software, services, and other cryptographic components, for the purpose of verifying authenticity and enabling validation of data and entities.

terminal

An end user's device on a host-based network, dedicated to transmitting data to a host for processing and displaying the result to the user.

honeynet

An entire dummy network used to lure attackers.

CRC (Cyclic Redundancy Check)

An error detection method that can be applied to blocks of data, rather than individual words. Both the sender and receiver calculate EDC; if they match, the data is assumed to be valid.

EIGRP (Enhanced Interior Gateway Routing Protocol)

An improvement over IGRP that includes features that support VLSM and classful and classless subnet masks.

gain

An increase in the amplitude of a radio wave.

counter

An individual statistic about the operation of system objects such as software processes or hardware components, monitored by a performance monitor.

risk

An information security concept that indicates exposure to the chance of damage or loss, and signifies the likelihood of a hazard or threat

Trojan horse

An insidious type of malware that is itself a software attack and can pave the way for a number of other types of attacks.

dialectric

An insulator-a material that does not conduct electricity by separating the conductor and shield. The entire package is wrapped in an insulating layer called a sheath or jacket.

IETF (Internet Engineering Task Force)

An international open committee that works to develop and maintain Internet standards and contribute to the evolution and smooth operation of the Internet

lANA (Internet Assigned Number Authority)

An international organization established in 1993 to govern the use of Internet IP addresses. ICANN is now responsible for leasing IP addresses worldwide.

ITU (International Telecommunication Union)

An international organization within the United Nations that defines global technical standards for telecommunications.

PSTN (Public Switched Telephone Network)

An international telephone system that carries analog voice data.

SCSI (Small Computer System Interface)

An older personal computer connection standard that provides high-performance data transfer between the SCSI device and the other components of the computer. SCSI is pronounced "scuzzy."

WINS (Windows Internet Naming Service)

An older type of naming service used on Windows-based networks.

ICC (intermediate cross-connect)

An optional connection between the main cross-connect and the horizontal cross-connect.

IEEE (Institute of Electrical and Electronics Engineers)

An organization dedicated to advancing theory and technology in electrical sciences.

policy statement

An outline of the plan for the individual component on a network policy.

static routing

An type of routing used by a network administrator to manually specify the mappings in the routing table.

rogue access point

An unauthorized wireless access point on a corporate or private network, which allows unauthorized individuals to connect to the network.

link aggregation

As defined by the IEEE 802.3ad standard, this allows multiple physical connections to be logically bundled into a single logical connection.

ATM

Asynchronous Transfer Mode: connection-oriented standard to set pu virtual circuits over B-ISDN networks

AAL 5

Atm Adaptation Layer 5: used for segmentation and reassembly of IP packets into ATM cells

What service on the network is responsible for verifying username and passwords when the user attempts to log on

Authentication Server

authentication by assertion

Authentication based entirely on a user name/password combination.

Border Gateway Protocol

BGP

Basic Rate Interface

BRI

A GROUP OF SYSTEMS THAT CAN RECEIVE ONE ANOTHER`S BROADCAST MESSAGE

BROADCAST DOMAIN

A MESSAGE THAT IS SENT OUT ON THE NETWORK AND IS DESTINED FOR ALL SYSTEMS IS KNOWN AS A

BROADCAST MESSAGE A BROADCAST MESSAGE HAS A DESTINATION MAC ADDRESS OF FF-FF-FF-FF-FF-FF

What service on the network is responsible for converting the FQDN to an IP address

DNS Server

1 Gbps

Bandwidth Capacity of 1000BASE-LH

1 Gbps

Bandwidth Capacity of 1000BASE-LX

1 Gbps

Bandwidth Capacity of 1000BASE-T

1 Gbps

Bandwidth Capacity of 1000BASE-TX

1 Gbps

Bandwidth Capacity of 1000BASE-ZX

100 Mbps

Bandwidth Capacity of 100BASE-FX

100 Mbps

Bandwidth Capacity of 100BASE-TX

100 Gbps

Bandwidth Capacity of 100GBASE-ER4

100 Gbps

Bandwidth Capacity of 100GBASE-LR4

100 Gbps

Bandwidth Capacity of 100GBASE-SR10

10 Mbps

Bandwidth Capacity of 10BASE-T

10 Mbps

Bandwidth Capacity of 10BASE2

10 Mbps

Bandwidth Capacity of 10BASE5

10 Gbps

Bandwidth Capacity of 10GBASE-ER

10 Gbps

Bandwidth Capacity of 10GBASE-EW

10 Gbps

Bandwidth Capacity of 10GBASE-LR

10 Gbps

Bandwidth Capacity of 10GBASE-LW

10 Gbps

Bandwidth Capacity of 10GBASE-SR

10 Gbps

Bandwidth Capacity of 10GBASE-SW

10 Gbps

Bandwidth Capacity of 10GBASE-T

10 Gbps

Bandwidth capacity for 10-Gigabit Ethernet

100 Gbps

Bandwidth capacity for 100-Gigabit Ethernet

100 Mbps

Bandwidth capacity for Fast Ethernet

1 Gbps

Bandwidth capacity for Gigabit Ethernet

10 Mbps

Bandwidth capacity for Standard Ethernet

155.52 Mbps

Bandwidth: STM-1

51.84 Mbps

Bandwidth: STS-1 / OC-1

BRA

Basic Rate Access: 2*64 kbps + 1 signaling at 16 kbps

Broadcast Storm Step 2

Broadcast Storm Step: Both switches flood a copy of the broadcast frame out of their Gig 0/2 ports (that is, on to segment B), causing PC2 to receive two copies of the broadcast frame.

Broadcast Storm Step 3

Broadcast Storm Step: Both switches receive a copy of the broadcast frame on their Gig 0/2 ports (that is, from segment B) and flood the frame out of their Gig 0/1 ports (that is, on to segment A), causing PC1 to receive two copies of the broadcast frame.

Broadcast Storm Step 1

Broadcast Storm Step: PC1 sends a broadcast frame on to segment A, and the frame enters each switch on port Gig 0/1.

Code Division Multiple Access

CDMA

A GROUP OF SYSTEMS THAT CAN HAVE THEIR DATA COLLIDE WITH ONE ANOTHER IS KNOWN AS A

COLLISION DOMAIN

Disadvantages of Optical Fibre

Cable is expensive. Specialist installation required. Optical fibre cannot carry power, whereas copper cable can carry power and signal simultaneously. If multiple services are being provided (e.g. TV, telephone, internet) using the same cables and the cable fails, all services are lost.

YOU ARE TESTING COMMUNICATION TO A ROUTER AND HAVE DECIDED TO CONNECT YOUR WORKSTATION TO THE FAST ETHERNET PORT OF THE ROUTER. WHAT TYPE OF CABLE WOULD YOU USE?

CROSSOVER

YOU WISH TO NETWORK 2 SYSTEMS BY CONNECTING A COMPUTER DIRECTLY TO ANOTHER COMPUTER. WHAT TYPE OF CABLE WOULD YOU USE?

CROSSOVER

carrier sense multiple access collision detect

CSMA/CD

Carrier sense

CSMA/CD component: A device attached to an Ethernet network can listen to the wire, prior to transmitting, to make sure that a frame is not currently being transmitted on the network segment.

Collision detect

CSMA/CD component: If a collision occurs (perhaps because two devices were simultaneously listening to the network and simultaneously concluded that it was safe to transmit), Ethernet devices can detect that collision and set random back off timers. After each device's random timer expires, each device again attempts to transmit its data.

Multiple access

CSMA/CD component: Unlike a deterministic method of network access (for example, the method used by Token Ring), all Ethernet devices simultaneously have access to an Ethernet segment.

Coarse Wavelength-Division Multiplexing

CWDM

LX4

CWDM = 10Base-____

Circuit Switching

Circuit is established between endpoints before data passes

XTACACS

Cisco's proprietary remote authentication protocol which has additional support for accounting and auditing

Which class address always has the value of the first bits in the IP address set to 0

Class A class A addresses always have the first 2 bits set to 0. this means that class A addresses range from 00000001 (1) to 01111111 (127)

Which class address always has the value of the first bits in the IP address set to 10

Class B class B addresses always have the first 2 bits set to 10. this means that class B addresses range from 10000000 (128) to 10111111 (191)

A Network consists of 10 computers, all running Windows 7 Professional. One computer acts a file server and serves up data to other computers on the network. Which networking model does the network use?

Client Server

CWDM

Coarse WDM: in optical networks it allows to transmit a lower number of signals with wavelengths well separeted

MPLS

Combined all the best attributes of ATM and Frame Relay

trunking

Combining multiple network connections to increase bandwidth and reliability.

CIR

Committed Information Rate: bit rate set by the provider inside frame relay networks

PPPoE

Common DSL protocol because telephone providers know it

voice over data systems

Communications systems that replace traditional telephone links by transmitting analog voice communications over digital WAN networking technologies.

multipoint connections

Connections between many nodes.

Grounding

Connection of a shield or conductor to an electrical ground point, such as a pipe or wire that is in contact with the ground.

CR-LDP

Constraint-based LDP: extension of LDP, centralized routing protocol where the egress LSRs are advertised to understand which links are currently the most loaded ones

List three types of services a network might support that are considered part of unified communications or convergence. File transfer, print services, and conversational voice User authentication, streaming live audio and video, and print services Web services, email services, and file services Conversational voice, straming live audio and voice, and streaming stored audio and voice

Conversational voice, streaming live audio and voice, and streaming stored audio and voice

network administration

Covers the support functions that are required to manage the network. It comprises functions that do not involve performing changes such as configuring and tuning or the running of the actual network.

Which email protocol allows an email client to download email messages to the local computer? IMAP4 SMTP TCP POP3

D. POP3

THE ROUTER LOOKS AT WHICH FIELD IN THE IP HEADER TO DECIDE WHERE TO SEND THE PACKET

DESTINATION IP ADDRESS

Which network service can be configured on your router that is responsible for assigning IP addresses to systems on the network

DHCP

When a client system boots up and requests an IP address, it first must send out which message?

DHCP DISCOVER

Dynamic Network Address Translation

DNAT

You are troubleshooting a communication problem. You seem to be able to communicate with Glen`s website by IP address, but not by the fully qualified domain name. What is most likely the problem

DNS

Data Over Cable Service Interface Specification

DOCSIS

Dense Wavelength-Division Multiplexing

DWDM

DLCI

Data Link Connection Identifier: ID of permanent circuit in Frame Relay technology.

Disadvantages of Bluetooth

Data can only be transferred over short distances. Slower transfer speeds than other wireless technologies.

Advantages of Bluetooth

Data can pass through solid objects. Cheap. Each to connect to a range of enabled devices.

ciphertext

Data that has been encoded with a cipher and is unreadable.

STP

Defined by the IEEE 802.1D standard, it allows a network to have redundant Layer 2 connections, while logically preventing a loop, which could lead to symptoms such as broadcast storms and MAC address table corruption.

PoE

Defined by the IEEE 802.3af and 802.3at standards, this allows an Ethernet switch to provide power to an attached device (for example, a wireless access point, security camera, or IP phone) by applying power to the same wires in a UTP cable that are used to transmit and receive data.

DWDM

Dense WDM: in optical networks it allows to transmit a higher number of signalswith any wavelength.

Internet of things

Devices and appliances directly connected to the internet

56, 320

Dialup provides ___ Kbps, and up to ____ Kbps with compression

25 meters, Twinaxial Copper

Distance & Cable: 1,000BaseCX

100 meters, CAT 5e

Distance & Cable: 1,000BaseT

100 meters, CAT 6

Distance & Cable: 1,000BaseTX

2 km, MMF w/ ST or SC

Distance & Cable: 100BaseFL

Encapsulating Security Payload

ESP

49,152 - 65,535

Dynamic/Private Port Numbers

What is a Network Interface Card?

Each computer MUST have one of these. It communicates with the file server and other computers on the network.

distance-vector routing

Each router passes a copy of its routing table to its adjacent neighbors. The neighbor adds the route to its own table, incrementing the metric to reflect the extra distance to the end network. The distance is given as a hop count; the vector component specifies the address of the next hop.

noise

Electromagnetic interference that disrupts the signal.

Ethernet

Employs both BROADCAST & COLLISION domains, uses 802.3 standard, data units transferred are DATA FRAMES

media converter

Enables networks running on different media to interconnect and exchange signals.

Advantages of Mobile Communication Technology

Enables video calling and other services. Can be used to connect to the internet without requiring a broadband connection. High speed transfer of data. Allows users access to mobile gaming, social media, instant messaging and video calls. 4G gives users internet access at a similar speed to Wi-Fi but with greater security.

Advantages of Mobile Communication Technology

Enables video calling and other services. Can be used to connect to the internet without requiring a broadband connection. High speed transfer of data. Allows users access to mobile gaming, social media, instant messaging and video calls. 4G gives users internet access at a similar speed to Wi-Fi but with greater security.

1024 - 5000

Ephemeral Port Numbers

1,500-byte

Ethernet likes to use what size frames?

Ferrule Connector / Field Assembly Connector

FC

You are monitoring network traffic and you notice a number of DHCP discover messages on the network, Which of the following is the destination address of the DHCP discover message

FF-FF-FF-FF-FF-FF IT IS A LAYER-2 REPRESENTATION OF A BROADCAST ADDRESS THE DHCP DISCOVER MESSAGE IS A BROADCAST MESSAGE USED TO LOCATE THE DHCP SERVER ON THE NETWORK

The ARP request is sent to which of the following layer-2 destination addresses?

FF-FF-FF-FF-FF-FF The ARP request message is a broadcast message and is therefore destined for the broadcast address of FF-FF-FF-FF-FF-FF

WHAT IS THE GENERAL TERM FOR DATA RECEIVED AND PROCESSED BY A SWITCH

FRAME

LAYER APPLICATION PROTOCOL

FTP

20 (data), 21 (comm)

FTP Ports

RIPv2

First distance vector routing protocol to support VLSM

16

Fixed WiMAX = IEEE 802.___

FEC

Forwarding Equivalence Class is a set of packets which may be forwarded in the same way, that is they may be bounded to the same MPLS labels.

Gigabit Interface Converter

GBIC

Global System for Mobile Communications

GSM

CDMA

HSPA+ is based on __________

Hot Standby Router Protocol

HSRP

VRRP

HA Protocol in which the default router is not real, so devices use a virtual IP for the default gateway

A DEVICE THAT CAN SEND AND RECEIVE INFORMATION, BUT NOT AT THE SAME TIME, IS SAID TO BE

HALF-DUPLEX

High Speed Packet Access

HSPA+

cable modem

Hardware that connects subscribers to a service provider's cable systems.

PRI over T1

Has 23 bearer channels and one signaling channel

PRI over E1

Has 30 bearer channels and one signaling channel

BRI

Has two 64 Kbps bearer channels and one 16 Kbps signaling channel

How bandwidth affects the performance on a computer system

High bandwidth provides good quality output, for example, sound and picture while Skyping or streaming online. Low bandwidth may cause poor quality output sound, for example, poor sound and picture or lagging while Skyping or streaming online.

Advantages of Optical Fibre

Higher bandwidth. Faster transmission of data. More secure - light is harder to intercept. Data can travel further than using copper wiring. Glass fibres do not corrode. Can support carrying multiple services at the same time, for example TV, telephone and broadband could all use the same optical fibre optic.

WHAT TCP/IP PROTOCOL IS RESPONSIBLE FOR ERROR AND STATUS REPORTING

ICMP IT RUNS AT THE NETWORK LAYER

Interior Gateway Protocol

IGP

Interior Gateway Routing Protocol

IGRP

Internet Key Exchange

IKE

143

IMAP4 Port

WHAT TCP/IP PROTOCOL IS RESPONSIBLE FOR LOGICAL ADDRESSING AND ROUTING FUNCTIONS

IP

Subnetting

IP addresses can be class A, B, or C. Class A addresses are for networks with a large number of hosts. The first octet is the netid and the rest are the hostid. Default subnet: 255.0.0.0 Subnets: 126 Hosts per subnet: 16,777,214 Class B addresses are used in medium to large networks with the first 2 octers making up the netid and the remaining are the hostid. Default subnet: 255.255.0.0 Subnets: 16,384 Hosts per subnet: 65,534 Class C is for smaller networks and the first 3 octets make up the netid while the last is hostid. Default subnet: 255.255.255.0 Subnets: 2,097,152 Hosts per subnet: 254 The Network ID and the Host ID are determined by a subnet mask. The default subnet masks are above

link state

IS-IS is a ________ dynamic routing protocol

Internet Security Association and Key Management Protocol

ISAKMP

Integrated Services Digital Network

ISDN

nondesignated ports

In STP terms, these block traffic to create a loop-free topology.

scope

In DHCP, the IP addresses that a DHCP server is configured with and can assign to clients.

NTU (Network Termination Unit)

In ISDN, a device that can directly connect to ISDNaware equipment, such as phones or ISDN NICs in computers.

NT (Network Termination)

In ISDN, a device that connects the local telephone exchange lines to the customer's telephone or data equipment

TA (Terminal Adapters)

In ISDN, the hardware interface between a computer and an ISDN line.

designated port

In a STP topology, this is the port on that segment that is closest to the root bridge, in terms of cost. Therefore, all ports on a root bridge are these. Every network segment has a single one of these.

root port

In a STP topology, this is the port on that switch that is closest to the root bridge, in terms of cost. Every nonroot bridge has a one of these.

authentication server

In a network using 802.1X user authentication, this (typically, a RADIUS server) checks a supplicant's credentials. If the credentials are acceptable, this notifies the authenticator that the supplicant is allowed to communicate on a network. This also gives the authenticator a key that can be used to securely transmit data during the authenticator's session with the supplicant.

authenticator

In a network using 802.1X user authentication, this forwards a supplicant's authentication request on to an authentication server. After the authentication server authenticates the supplicant, this receives a key that is used to communicate securely during a session with the supplicant.

supplicant

In a network using 802.1X user authentication, this is the device that wants to gain access to a network.

branching factor

In a physical tree topology, the number of point-to-point connections that are consistently found between a node and the nodes beneath it in the tree structure.

algorithm

In encryption, the rule, system, or mechanism used to encrypt data.

public key

In key-pair encryption, the key that is available to all and is used to encode data.

private key

In key-pair encryption, the key that is known only to an individual and is used to decode data.

trunk

In the context of an Ethernet network, this is a single physical or logical connection that simultaneously carries traffic for multiple VLANs. Also refers to an interconnection between telephone switches, in the context of telephony.

procedure

Instructions that detail specifically how to implement the policy on a network policy.

ISDN

Integrated Service Digital Network, allows to carry data through the voice in the telecom network: devices can be connected thorugh the bus via two channels, BRA and PRA

DTE (Data Termination Equipment)

Interface devices such as NICs and routers on a Frame Relay network.

DCE (Data Communications Equipment)

Interface devices such as modems on a Frame Relay network.

What does ISP stand for?

Internet Service Provider

Differences: WWW, Intranet, Internet

Internet: Network of interconnected networks which provides the communications links for data to be transferred WWW: Service that uses the internet to transfer web pages between web servers and individual devices Intranet: Private network only authorised users can access. Internet of Things: network of devices that have the capability to connect directly to the internet

Switch

Is a hardware device that connects sections of computer networks to each other. A network component used to link a group of computers on a network to the server. A switch connects devices together on a network. Receives/ sends information to the correct destination. Allows multiple computers to connect to the server.

spim

Is an IM-based attack just like spam, but is propagated through instant messaging instead of through email.

Network Interface Card

It is a physical interface/connection between the computer and network. It controls the flow of data between the computer and the network. Allows communication with other computers.

Wi-Fi

It is a set of standards for using short range radio waves to allow computing devices to connect to a LAN or to the Internet.

de-encapsulation

It is the reverse process of removing the added information, as data passes to the next higher layer at the receiver end.

Long Term Evolution

LTE

Kerberized Internet Negotiation of Keys

KINK

Link Aggregation Control Protocol

LACP

CSMA/CA

LAN media access technology, AppleTalk and 802.11 wireless networking are examples of networks, avoid collisions by granting only a single permission to communicate at any given time

CSMA

LAN media access technology, does not directly address collisions,

CSMA/CD

LAN media access technology, employed by Ethernet networks, responds to collisions by having each member of the collision domain wait for a short but random period of time before starting the process over, slower throughput by 40%

Token Passing

LAN media access technology that performs communications using a digital token, possession allows host to transmit data, used by Token Ring networks, such as FDDI, prevents collisions since only the system possessing the token is allowed to transmit data

Polling

LAN media access technology, method of monitoring multiple devices and controlling network access permissions, primary device asks secondary device if anything to communicate, priority and order can be set

WHICH OF THE OSI MODEL WORKS WITH FRAMES

LAYER 2 LAYER-2 DEVICES SUCH AS BRIDGES AND SWITCHES PROCESS FRAMES BECAUSE THEY ARE CONSIDERED LAYER-2 DEVICES.

WHICH LAYER OF THE OSI MODEL WORKS WITH PACKETS

LAYER 3 -NETWORK LAYER WHEN LAYER-3 HEADER HAS BEEN ADDED TO THE MESSAGE, THE MESSAGE IS KNOWN AS A PACKET LAYER-3 DEVICES SUCH AS ROUTERS PROCESS PACKETS

Lucent Connector / Local Connector / "Little" Connector

LC

TCP 389

LDAP Port

LDP

Label Distribution Protocol: MPLS protocol

LSR

Label Switch Router is the device responsible for switching the labels used to route packets.

LSP

Label Switched Path is a path set up by signaling protocol that links a source label edge router (ingress) to a drain one (egress).

popped

Labels are ________ off on the way out of the MPLS cloud

pushed

Labels are ________ onto packets as they enter the MPLS cloud

TACACS+

Latest version of Cisco's proprietary remote authentication protocol

Point to Point Protocol (PPP)

Layer 2 protocol that works almost anywhere, can be used with many other protocols, and provides authentication, compression, error detection, and multilink capabilities

LAN

Local Area Network

What does LAN stand for?

Local Area Network

LAN

Local Area Network - A LAN tends to cover a small geographical area and uses cables to connect.

malware

Malicious code, such as viruses, Trojans, or worms, which is designed to gain unauthorized access to, make unauthorized use of, or damage computer systems and networks.

Multimode Fiber

MMF

Mutliprotocol Label Switching

MPLS

Mechanical Transfer Registered Jack / Media Termination - Recommended Jack

MT-RJ

A MESSAGE THAT IS SENT OUT ON THE NETWORK AND IS DESTINED FOR A GROUP OF SYSTEMS IS KNOWN AS A

MULTICAST MESSAGE

Optical Fibre

Made of glass strands to allow for greater transmission speeds.

What is a file server? 7

Main computer on the network. More powerful than other computers on the network. Contains a large amount of RAM and Hard Disk space. Holds the networks OS e.g. Windows XP. Holds the application software e.g. Microsoft Office Suite. Stores the user files created on the system. Uses usernames and passwords.

network management

Management of systems on the network using various activities, methods, procedures, and tools that relate to the operation, administration, maintenance, and provisioning of these systems.

mux (multiplexer)

Manages separate signals in a logical star topology and enables them to share media.

SNAT

Maps a single public IP address to a single private system

16 Mbps

Max Bandwidth: CAT 3

100 Mbps

Max Bandwidth: CAT 5

1,000 Mbps

Max Bandwidth: CAT 5e

1,000 Mbps

Max Bandwidth: CAT 6

1,000 Mbps

Max Bandwidth: CAT 6a

SMF

Media Type for 1000BASE-LH

MMF/SMF

Media Type for 1000BASE-LX

Cat 5e (or higher)

Media Type for 1000BASE-T

Cat 6 (or higher) UTP

Media Type for 1000BASE-TX

SMF

Media Type for 1000BASE-ZX

MMF

Media Type for 100BASE-FX

Cat 5 (or higher)

Media Type for 100BASE-TX

SMF

Media Type for 100GBASE-ER4

SMF

Media Type for 100GBASE-LR4

MMF

Media Type for 100GBASE-SR10

Cat 3 (or higher)

Media Type for 10BASE-T

thinnet (Coax)

Media Type for 10BASE2

thicknet (Coax)

Media Type for 10BASE5

SMF

Media Type for 10GBASE-ER

SMF

Media Type for 10GBASE-EW

SMF

Media Type for 10GBASE-LR

SMF

Media Type for 10GBASE-LW

MMF

Media Type for 10GBASE-SR

MMF

Media Type for 10GBASE-SW

Cat 6a (or higher)

Media Type for 10GBASE-T

16e-2005

Mobile WiMAX = IEEE 802.___

Mobile Communication technology

Mobile broadband is the delivery of an internet service using mobile phone technology

chips

Multiple data signals generated in the DSSS technique.

Synchronous Optical Networking

Multiplexes digital signals over optical cable

MPLS

Multiprotocol Label Switching:it is the enabling technology for the new IP public network. It is a protocol architecture that controls different sub-protocols.

Network Address Translation

NAT

Your manager asks you which service is responsible for translating the source IP address of a packet to the IP address of the public interface on the router

NAT

WHAT LAYER OF THE OSI MODEL IS RESPONSIBLE FOR ROUTING AND LOGICAL ADDRESSING

NETWORK LAYER

Network Management Software

NMS

Network Time Protocol

NTP

UDP 123

NTP Port

VRRP and HSRP

Name two High Availability protocols

IGPs

Networks inside of an AS communicate with each other using ____

Optical Time Domain Reflectometer

OTDR

cycle

One complete oscillation of an analog signal.

Autonomous System (AS)

One or more networks governed by a single dynamic routing protocol

hashing encryption

One-way encryption that transforms cleartext into a coded form that is never decrypted.

WHAT TCP FLAG IS RESPONSIBLE FOR DROPPING A CONNECTION AT ANY POINT IN TIME

RST A reset flag is used to drop the TCP connection at any time

Port Address Translation

PAT

Port Aggregation Protocol

PAgP

Protected Extensible Authentication Protocol

PEAP

YOU ARE TROUBLESHOOTING COMMUNICATION TO A NETWORK BY LOOKING AT THE LINK LIGHT ON THE SWITCH, WHAT LAYER OF THE OSI MODEL ARE YOU TROUBLESHOOTING WHEN LOOKING AT A LINK LIGHT

PHYSICAL LAYER

WHAT IS THE APPLICATION LAYER PROTOCOL FOR RECEIVING E-MAIL OVER THE INTERNET

POP3

110

POP3 Port

Plain Old Telephone Service

POTS

Circuit

POTS, PSTN, T1/E1/T3/E3, and ISDN are examples of __________ switching

Primary Rate Interface

PRI

dial-up lines

PS1N connections that use modems, existing phone lines, and long-distance carrier services to provide low-cost, low-bandwidth WAN connectivity and remote network access.

Public Switched Telephone Network

PSTN

RSVP-TE

RSVP for Traffic Engineering: extension of RSVP

Disadvantages of Mobile Communication Technology

Performance affected by network coverage and signal strength. Data transfer can be expensive. High battery consumption.

Advantages of a Network

Peripherals can be shared such as printers and scanners. Data can be shared. Users can log on at any workstation to access their files. Users can communicate. Enhanced security/ levels of access/ usernames and passwords Shared software. Software applications tend to be cheaper as they are purchased as a licence. Because the data tends to be stored on a central fileserver the data is more secure. Automatic backup of data can be taken.

PVC

Permanent Virtual Circuit

PDH

Plesiochronus Digital Hierarchy: old standard designed to transfer digital voice channels at 64 Kbps over TDM-based digital telephone networks.

Power over Ethernet

PoE

Forwarding

Port _______ can be used to hide a service hosted inside your network

TCP 445

Port for SMB without NetBIOS

incident management

Practices and procedures that govern how an organization will respond to an incident in progress.

ATM

Provides high throughput, real-time, low latency data, voice and video with max speeds of OC-192

Spanning Tree Protocol

Protocol: STP

Router discovery protocols

Protocols that are used to identify routers on the network.

VPN protocols

Protocols that provide VPN functionality.

Satellite Networking (non-terrestrial communication)

Provides 15 Mbps down and 2 Mbps up

T1

Provides 24 channels with 64 Kbps per channel and 1.544 Mbps per line

VDSL

Provides 3 Mbps thru 100 Mbps

E1

Provides 32 channels with 64 Kbps per channel and 2.048 Mbps per line

E3

Provides 34.368 Mbps

Fixed WiMAX

Provides 37 Mbps down and 17 Mbps up

DOCSIS (cable modem)

Provides 4 Mbps - 250 Mbps

T3

Provides 44.736 Mbps

HSPA+

Provides 84 Mbps down and 22 Mbps up

WPA2 (Wi-Fi Protected Access v2)

Provides WPA with Advanced Encryption Standard (AES) cipher-based CCMP encryption for even greater security and to replace TKIP.

TACACS (Terminal Access Controller Access Control System)

Provides centralized authentication and authorization services for remote users.

PSTN

Public Switched Telephone Network

DNSBLs (DNS blacklists)

Published lists that contain email addresses that ace confirmed as spam sources.

WHAT DEVICE IS RESPONSIBLE FOR REGENERATING THE SIGNAL SO THAT THE SIGNAL CAN TRAVEL A GREATER DISTANCE?

REPEATER

WHICH OF THE FOLLOWING IS A LAYER-3 DEVICE

ROUTER

Routing and Remote Access Service

RRAS

What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network? Remote Desktop Services Windows 8.1 File Transfer Protocol Active Directory

Remote Desktop Services

NAT

Replaces private IP address on outgoing packets with the public IP address of a router

waveform

Represents the shape of an analog signal.

Disadvantages of Wi-Fi

Requires the computer/ device to be in range of a wireless router (generally the further it is from the router, the weaker the signal). Not as secure as wired connections.

RSVP

Resource Reservation Protocol

Learning

STP Port State: The port moves from the listening state to this state and remains in this state for 15 seconds by default. During this time, the port begins to add entries to its MAC address table.

inter-domain routing

Routing a packet among different autonomous systems.

intra-domain routing

Routing a packet within an autonomous system.

Subscriber Connector / Standard Connector / Square Connector

SC

Supervisory Control and Data Acquisition System

SCADA

Synchronous Digital Hierarchy

SDH

WHAT DOES TCP USE TO GUARANTEE DELIVERY

SEQUENCE NUMBERS AND ACKNOWLEDGEMENTS

Small Form Factor

SFF

Small Form-factor Pluggable

SFP

TCP & UDP 137, 138

SMB Ports with NetBIOS over TCP

Single-mode Fiber

SMF

WHAT APPLICATION LAYER PROTOCOL IS USED FOR DELIVERING E-MAIL ACROSS THE INTERNET

SMTP

25

SMTP Port

Static Network Address Translation

SNAT

UDP 161

SNMP Port

Synchronous Optical NETworking

SONET

US and Canada

SONET is used in _______________, while SDH is used everywhere else, though both are effectively identical

Packet

SONET, ATM, DSL, Frame Relay, MPLS, DOCSIS Satellite and Wireless are examples of __________ switching

WHAT ARE FIELDS FOUND IN THE IP HEADER

SOURCE IP ADDRESS TIME TO LIVE

Shortest Path Bridging

SPB (a routing metric standard; IEEE 802.1aq)

22

SSH Port

RSA key

SSH servers use PKI in the form of an _______

Straight Tip

ST

Synchronous Transport Modules

STM

Sheilded Twisted Pair

STP

4

STP Port Cost for 1 Gbps (Gigabit Ethernet)

2

STP Port Cost for 10 Gbps (10-Gigabit Ethernet)

100

STP Port Cost for 10 Mbps (Ethernet)

19

STP Port Cost for 100 Mbps (Fast Ethernet)

Listening

STP Port State: The port moves from the blocking state to this state and remains in this state for 15 seconds by default. During this time, the port sources BPDUs, which inform adjacent switches of the port's intent to forward data.

Forwarding

STP Port State: The port moves from the learning state to this state and begins to forward frames.

Potential with using Wi-Fi

Security - Wi-Fi routers can be configured to require a password or can be made public for open access by any Wi-Fi enabled device. Range - The further away that a device is from the router, the weaker the radio signal will be. As a result, the user might experience web pages or data downloading slower than expected. Traffic - Wi-Fi uses radio technology, so the number of devices that can connect to the wireless network is dependent on the number of channels available on the wireless router.

Potential problems with using Wi-Fi

Security - Wi-Fi routers can be configured to require a password or can be made public for open access by any Wi-Fi enabled device. Range - The further away that a device is from the router, the weaker the radio signal will be. As a result, the user might experience web pages or data downloading slower than expected. In addition, Wi-Fi signal is affected by walls or doors being between the router and the device. Traffic - Wi-Fi uses radio technology, so the number of devices that can connect to the wireless network is dependent on the number of channels available on the wireless router.

Bluetooth

Short range wireless communication standard.

MT-RJ (Mechanical Transfer Registered Jack)

Sometimes called a Fiber Jack connector, it is a compact snap-to-lock connector used with multimode fiber.

socket

Software in an operating system that connects an application with a network protocol.

codec

Software or hardware that codes and decodes digital data to and from the analog format.

adware

Software that automatically displays or downloads advertisements when it is used.

terminal emulator

Software that enables a standard client computer to appear to a host computer as a dedicated terminal.

rootkit

Software that is intended to take full or partial control of a system at the lowest levels.

TTS (Transaction Tracking System)

Software that monitors a transaction through to completion.

load balancer

Stand-alone network devices that perform load balancing as their primary function.

Functions of a File Server

Storing data/ files. Storing all software/ system software/ operating system/ programs. Managing security on the network. Communicating with all devices on the network. Managing users' access to the network.

Terminal Access Controller Access-Control System

TACACS

spyware

Surreptitiously installed malicious software that is intended to track and report on the usage of a target system, or collect other data the author wishes to obtain.

1492

TACACS = RFC ____

SDH

Synchronous Digital Hierarchy: old standard designed to transfer digital voice, at a higher speed than PDH. It has a single clock.

SONET

Synchronous Optical NETworking -> american term for SDH

23

Telnet Port

SNIPS (System and Network Integrated Polling Software)

System and network monitoring software that runs on UNIX systems and offers both a command-line and web interface to monitor network and system devices.

T-Carrier Level 1

T1

Coax with BNC connectors

T3 /DS3 / E3 is delivered on ________

WHAT PORT DOES TELNET USE

TCP 23

SMTP USES WHICH PORT

TCP 25

WHAT PORT DOES SSH USE

TCP 25

Commonly used TCP/UDP Ports

TCP Ports: FTP - 20,21 SSH - 22 TELNET - 23 SMTP - 25 DNS - 53 HTTP - 80 POP3 - 110 NTP - 123 IMAP4 - 143 HTTPS - 443 UDP Ports: DHCP - 67 TFTP - 69 SNMP - 161

Time-Domain Multiplexing

TDM

Time Domain Reflectometer

TDR

WHICH IPV6 TRANSITIONING TUNNELING METHOD ENCAPSULATES THE IPv6 DATA INTO AN IPv4 USER DATAGRAM TO TRAVEL OVER THE INTERNET AND CAN PASS THROUGH NAT DEVICES

TEREDO

69

TFTP Port

WHAT 3 TECHNIQUES CAN BE USED TO ALLOW MIGRATION FROM IPv4 TO IPv6

TRANSLATION BETWEEN IPv6 AND IPv4 USE OF DUAL-STACK ROUTING USE TUNNELING PROTOCOLS

WHAT LAYER OF THE OSI MODEL IS RESPONSIBLE FOR BREAKING THE DATA INTO SMALLER SEGMENTS

TRANSPORT LAYER

AT LAYER 3, THE DATA BEING PROCESSED IS CALLED A PACKET BECAUSE IT HAS A LAYER-3 HEADER

TRUE

AT LAYER 4, THE DATA BEING PROCESSED IS CALLED A SEGMENT

TRUE

CLASS A PRIVATE ADDRESS STARTS WITH 10.0.0.0

TRUE

IN IPv6 THERE IS NO BROADCAST MESSAGE AND IT USES AUTOMATIC CONFIGURATION

TRUE

LINK-LOCAL ADDRESSES IN IPv6 ARE SIMILAR TO APIPA ADDRESSES IN IPv4

TRUE

SEQUENCE AND ACKNOWLEDGEMENTS ARE STORED IN THE TCP HEADER

TRUE

SOURCE AND DESTINATION PORT INFORMATION ARE STORED IN THE TCP OR UDP HEADER

TRUE

TCP ASSIGNS EACH MESSAGE (KNOWN AS A SEGMENT) A SEQUENCE NUMBER. WHEN A MESSAGE IS RECEIVED AT THE DESTINATION, IT SENDS AN ACKNOWLEDGEMENT BASED ON THE RECEIVED SEQUENCE NUMBER INDICATING THAT THE MESSAGE HAS BEEN RECEIVED

TRUE

THE IP HEADER CONTAINS INFO USED BY THE IP PROTOCOL. SUCH AS SOURCE AND DESTINATION IP ADDRESSES, WITH THE TTL

TRUE

You cannot assign an IP address to a system that has all host bits set to 1s or 0s.

TRUE

You cannot have an IP address where the first octet is 127.

TRUE reserved for loopback

Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? Telnet Telnet Remote Desktop FTP SSH

Telnet

BGP-4

The Internet uses what EGP?

Application layer

The OSI layer provides services and utilities that enable applications to access the network and its resources.

Physical layer

The OSI layer provides the means for transmitting data bits over a physical medium.

Transport layer

The OSI layer that accepts data from the upper layers, and breaks it up into smaller units known as segments, passes them on to the lower layers, and ensures that all segments arrive correctly at the other end.

Network layer

The OSI layer that addresses data packets, routes the packets from a source to a destination through the network, and ensures the delivery of those packets.

Session layer

The OSI layer that is responsible foe establishing a connection between network devices, maintaining the connection, and then terminating or reestablishing it when required.

Presentation layer

The OSI layer that is responsible for translating data into a network compatible format.

AES

The PSK within EAP-PSK is encrytped using what algorithm?

SPI (Security Parameters Index)

The SPI helps the computer keep track of the computers it is communicating with.

bandwidth

The average number of bits of data that can be transmitted from a source to a destination over the network in one second.

EDC (Error Detection Code)

The bits that are attached to transmitted data to indicate its original contents.

fault tolerance

The ability of a network or system to withstand a foreseeable component failure and still continue to provide an acceptable level of service.

war driving

The act of searching for instances of wireless LAN networks while in motion, using wireless tracking devices like PDAs, mobile phones, or laptops.

hop

The action of forwarding a packet from one router to the next.

disaster recovery

The administrative function of protecting people and resources while restoring a failed network or systems as quickly as possible.

cell

The area covered by a wireless access point Alternatively, a cell is a type of network, similar to a packet switching network, in which data is transmitted as fixed-length packets called cells.

protocol binding

The assignment of a protocol to a NIC.

premise wiring

The collection of drop cables, patch panels, and patch cables that together make a functional network.

network media

The conduit through which signals flow, can be either bounded or unbounded.

drain

The connection point between a shield and the ground.

amplitude

The crest or trough of a wave from the midpoint of the waveform to its top or bottom.

L2TP (Layer Two Tunneling Protocol)

The de facto standard VPN protocol for tunneling PPP sessions across a variety of network protocols such as IP, Frame Relay, or ATM.

signal

The electromagnetic pulses that ace transmitted across a network medium.

port

The endpoint of a logical connection that client computers use to connect to specific server programs.

FCS (Frame Check Sequence)

The extra characters added to a frame for detecting and correcting errors.

attenuation

The fading or degradation of a signal as it travels across a network medium.

first responder

The first person or team to respond to an accident, damage site, or natural disaster in an IT company.

OUI (Organizationally Unique Identifier)

The first three bytes of a MAC address that uniquely identify a network device manufacturer.

phase

The fixed point where a wave's cycle begins in relationship to a fixed point.

integrity

The fundamental security goal of ensuring that electronic data is not altered or tampered with.

availability

The fundamental security goal of ensuring that systems operate continuously and that authorized persons can access data that they need.

confidentiality

The fundamental security goal of keeping information and communications private and protecting them from unauthorized access.

network backbone

The highest-speed transmission path that carries the majority of network data.

FQDN (Fully Qualified Domain Name)

The host name combined with the host's domain name.

physical security

The implementation and practice of various control mechanisms that are intended to restrict physical access to facilities.

WPA

The original standard used TKIP, but was later replaced with WPA2 which uses a more secure AES-based algorithm. This uses a 256 bit key to encrypt data. This key may be entered either as a string of 64 hexadecimal digits or a passphrase of 8 to 63 characters.

route convergence

The period of time between a network change and the router updates to reach a steady state once again.

refraction

The phenomenon of light rays bending due to a change in speed when passing from one transparent medium to another.

port mirroring

The practice of duplicating all traffic on one port in a switch to a second port.

patch management

The practice of monitoring for, evaluating, testing, and installing software patches and updates.

implicit deny

The principle that establishes that everything that is not explicitly allowed is denied.

enciphering

The process of applying a cipher.

demodulation

The process of decoding or removing a low frequency data signal from a high frequency carrier waveform.

EDAC (Error Detection and Correction)

The process of determining if transmitted data has been received correctly and completely, and if not, rebuilding the data to its correct form.

error detection

The process of determining if transmitted data has been received correctly and completely.

cryptography

The science of hiding information to protect sensitive information and communication from unauthorized access.

non-repudiation

The security goal of ensuring that data remains associated with the party that creates it or sends a transmission.

privilege bracketing

The security method of allowing privileges to a user only when needed and revoking them as soon as the task is complete.

IRP (Incident Response Policy)

The security policy that determines the actions that an organization will take following a confirmed or potential secmity breach.

least privilege

The security principle that establishes that users and software should only have the minimal level of access that is necessary for them to perform the duties required of them.

Internet

The single largest global WAN that virtually links every country in the world.

STM - Synchronous Transport Modules

The speed rating of SDH is called _______

STS - Synchronous Transport Signals

The speed rating of SONET is called ______

CIA triad (Confidentiality, Integrity, Availability)

The three principles of security control and management: confidentiality, integrity, and availability. Also known as the information security triad or information security triple.

latency

The time delay for a packet to go from a source to a destination and back to the source.

data transmission

The transfer of data between computers or other electronic devices through a network.

cleartext

The unencrypted form of data. Also known as plaintext

host name

The unique name given to a network node on a TCP /IP network.

ohm

The value of electrical resistance through which one volt will maintain a current of one ampere.

hash

The value that results from hashing encryption. Also known as hash value or message digest.

jitter

The variability of latency over time across a network.

Internet

The worldwide communications system that links computers

interactive mode

This mode of the nslookup utility enables you to query name servers for information about hosts and domains, or to print a list of hosts in a domain.

non-interactive mode

This mode of the nslookup utility prints only the name and requested details for one host or domain and is useful for a single query.

What are Network Cables?

These plug into the back of each computer and link them together. They go straight into the Network Interface Card inside the computer.

EAP

This protocol is nothing more than an authentication method wrapped in PPP

Optical Fibre

This carries data in pulses of light and is not prone to interference. It uses light to transmit data and are made of glass or plastic strands.

Optical Fibre

This carries data in pulses of light and is not prone to interference. It uses light to transmit data and are made of glass or plastic strands. This is a very fine glass strand that allows rapid transmission of data, using light beams. Many strands are grouped together to make a cable, so the cable can carry multiple data signals at the same time. The main consumer application for optical fibre is by companies offering high bandwidth internet services for TV on demand and high speed internet access.

full-duplex

This connection allows a device to simultaneously transmit and receive data.

Intranet

This is a private network that only authorised users from an organisation can access.

World Wide Web

This is a service which uses the internet to transfer web pages between web servers and individual devices.

Bluetooth

This is a type of radio communication and networking protocol combined that lets devices that are within close range of each other communicate and exchange data (around 15ft). Bluetooth uses less power than other wireless technologies and is much cheaper. The data transmission rate is lower than other wireless technologies.

Bluetooth

This is a type of radio communication and networking protocol combined that lets devices that are within close range of each other communicate and exchange data (around 15ft). The data transmission rate is lower than other wireless technologies.

Internet of Things

This is the network of devices which have the capability to connect directly to the internet.

Internet

This is the network of interconnected networks which provides the communication links for data to be transferred between devices.

Wi-Fi (Wireless Fidelity)

This is used to connect computers or other hardware together that come within range of each other. It is a set of standards for using short range radio waves to allow computing devices to connect to a LAN or to the Internet. Each device requires a wireless adapter.

TDM

Time Division Multiplexing

WHICH TRANSPORT LAYER PROTOCOL IS RESPONSIBLE FOR UNRELIABLE DELIVERY

UDP

SNMP USES WHICH PORT

UDP 161

DNS USES WHICH PORT

UDP 53

WHAT PORT DOES TFTP USE

UDP 69

DHCP USES WHICH PORT

UDP 7/68

WHAT IPv6 ADDRESS TYPE IS SIMILAR TO AN IPv4 PRIVATE IP ADDRESS AND STARTS WITH FC00

UNIQUE LOCAL ADDRESS

Unsheilded Twisted Pair

UTP

3 CABLE TYPES

UTP/STP,FIBER OPTIC,COAXIAL

zombie

Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a drone.

drone

Unauthorized software introduced on multiple computers to manipulate the computers into mounting a DDoS attack. Also called a zombie.

plaintext

Unencoded data. Also known as cleartext.

URL

Uniform Resource Locator

electrical noise

Unwanted signals that are introduced into network media. Noise interferes with the proper reception of transmitted signals.

CSMA/CD

Used on an Ethernet network to help prevent a collision from occurring and to recover if a collision does occur. Only needed on half-duplex connections.

DVM (Digital Volt Meter)

Uses an analog-to-digital converter to display numeric voltage readings.

SSTP (Secure Socket Tunneling Protocol)

Uses the HTTP over SSL protocol and encapsulates an IP packet with an SSTP header.

X Window system

Uses the X protocol that leverages a client-server relationship to provide graphical user interface and input device management functionality to applications.

WWAN (Wireless Wide Area Network)

Uses the wireless network technology to allow users to check email, surf the web, and connect to corporate resources accessible within the cellular network boundaries.

war chalking

Using symbols to mark off a sidewalk or wall to indicate that there is an open wireless network which may be offering Internet access.

Very-high-bit-rate Digital Subscriber Line

VDSL

virtual LAN

VLAN

Variable-length Subnet Masking

VLSM

VPWS (Virtual Private Wire Service)

VPN that virtualizes a leased line (over a packet-switching network)

deployment access

VPN that virtualizes dial-up connection and connects a single user to a corporate network through ISDN, PTSN, cable modem, wireless LAN by using PPTP and L2TP

deployment site-to-site

VPN that virtualizes leased line and connects multiple remote networksone to each other using IPsec, GRE and MPLS

voluntary tunnels

VPN tunnels that are created between client endpoints at the request of the client

compulsory tunnels

VPN tunnels that are established by the WAN carrier without involvement from client endpoints.

Virtual Router Redundancy Protocol

VRRP

Optical Fibre

Very fine glass strands that allow rapid transmission of data. Data is transmitted as pulses of light. The cable can carry multiple data signals at the same time

VCI

Virtual Circuit Identifier: ID of circuit in ATM

VPI

Virtual Path Identifier: ID of path in ATM

vishing

Voice phishing, a human-based attack where the attacker extracts information while speaking over the phone or leveraging IP-based voice messaging services such as VoIP.

Wavelength-Division Multiplexing

WDM

WDM

Wavelength Division Multiplexing

0 - 1023

Well-known Port Numbers

SONET and SDH

What are the two variations of Synchronous Optical Networking?

EIGRP

What is Cisco's proprietary dynamic routing protocol

Download speed is faster than upload speed

What is asymmetric about ADSL?

Route Redistribution

What is it called when a router announces a route via one method which was learned by another method (i.e.: RIP to OSPF)?

IS-IS

What is the de facto dynamic routing protocol for ISPs?

ADSL

What type of DSL provides 24 Mbps down and 3.3 Mbps up?

threshold

When monitoring network performance, the value that signals that an object or component is functioning outside acceptable performance limits.

HSRP

Which HA Protocol is Cisco's proprietary version?

FC

Which fiber connector is threaded?

802.11

wi-fi 54 Mbps

Single-mode

Which provides more distance? Multimode or Single-mode Fiber.

OSPFv3

Which version of OSPF supports IPv6?

CSMA/CA

Wi-Fi uses this (LAN) and it is slower because there are no collisions and it has to send one message at a time

Worldwide Interoperability for Microwave Access

WiMAX

WAN

Wide Area Network

What does WAN stand for?

Wide Area Network

WAN

Wide Area Network - A WAN tends to cover a very large geographical area and it can use fibre optic and satellite for transmission.

interference

Within wireless networking, the phenomenon by which radio waves from other devices interfere with the 802.11 wireless signals.

WWW

World Wide Web

WWW

World wide web

Extended Terminal Access Controller Access-Control System

XTACACS

OSPF and IS-IS

____ and ____ are the only two link state dynamic routing protocols

SSH

____ has the capability to act as a tunnel for any TCP/IP application

TLS (Transport Layer Security)

a cryptographic protocol that provides security for communications over networks such as the internet. It encrypts the segments of network connection at the Transport Layer end-to-end

Routing Information Protocol (RIPv1)

a distance-vector routing protocol using "hop count" as a routing metric. The maximum number of hops allowed is 15 which effectively limits the size of network that it can support.

Intermediate System to Intermediate System (IS-IS)

a link state protocol that operates by forwarding network topology information throughout a network of routers. Each router then independently builds a picture of the network's topology based on the data reviewed and the best topologixal path through the network to the destination. It is an Interior Gateway Protocol (IGP) typically used on larger networks.

Remote Authentication Dial In User Service (RADIUS)

a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. Often used by ISP's and enterprises to manage access to the Internet or internal networks, and wireless networks.

Enhanced Interior Gateway Routing Protocol (EIGRP)

a proprietary hybrid protocol from Cisco that is a distance vector routing protocol that functions like a link state routing protocol. It collects information and stores it in three tables; The Neighbor Table which store the information about neighboring routers. The Topology Table which contains only the information and data regarding the routing tables from directly connected neighbors. The Routing Table which stores the actual routes to all destinations.

Dynamic Router Updates

a router with dynamically configured routing tables. This type of automatic configuration is made up of routing tables that are built and maintained by ongoing communication between the routers. If a router or link goes down, the routers sense the change in the network topology when the "learned route" expires in the routing table and cannot be renewed due to the outage. this change is then disseminated to other routers so that all the routers "learn" of the network changes.

Static Router Updates

a router with manually configured routing tables. For these types of devices, a network admin will usually build and make updates to the routing table for all routes in the administrative domain. These routers are not fault tolerant because when another network device goes down the manually input information may not necessarily provide alternate pathing to a destination which makes it unreachable.

Wired Equivalent Privacy (WEP)

a security encryption algorithm that is easily cracked.

SIP (Session Initiation)

a signaling protocol, widely used for controlling multimedia communication sessions such as voice and video calls over IP

Multicast

a single source address responding to multiple destination addresses with information to be sent.

*A VPN is used primarily for what purpose?* a. Support secured communications over an untrusted network. b. Support the distribution of public Web documents. c. Allow the use of network-attached printers. d. Allow remote systems to save documents, avoiding overage charges on cellular data plans.

a. Support secured communications over an untrusted network

*Which windows utility is useful in identifying a program that is hogging the processor?* a. Task Manager b. System Information c. Device Manager d. Netstat

a. Task Manager

*Which of the following is the correct name for TCP?* a. Transmission Control Protocol b. Transmission Catering Protocol c. Transit Control Protocol d. Transport Control Protocol

a. Transmission Control Protocol

multicast

address that identifies a group of stations, and the packet is forwarded to all the nodes in the group

anycast

address that identifies a group of stations, but the packet is forwarded just to the closest node in te group.

Cisco Console Cable

aka Rollover or Yost cable

centralized internet access

all the traffic towards and from the Internet always passes through the VPN gateway

IPsec

an integrated protocol suite for ipv6 security issues that defines two extension headers, AH and ESP

*How many devices can USB support?* a. 140 b. 63 c. 48 d. 127

d. 127

plug and play stateful

autoconfiguration protocol in which it is possible to access the internet through a DHCP server

plug and play stateless

autoconfiguration protocol in which only link-local address is guaranted without contacting any server

*Which of the following is an example of a Class B IP address?* a. 10.0.1.5 b. 191.168.0.52 c. 192.128.254.5 d. 223.255.254.56

b. 191.168.0.52

*How many hosts can successfully send data simultaneously on Ethernet?* a. 1 b. 2 c. 3 d. Unlimited

b. 2

*Which of the following describes the most common implementation of a Local Area Network?* a. Fast packet network used to connect PCs to mainframes in an SNA environment b. A moderate to high speed data network confined to a limited geographic area c. A high speed data network used to connect PCs in different geographic regions of the country d. A local network used primarily to connect PCs to Unix servers

b. A moderate to high speed data network confined to a limited geographic area

*What is the term given to a machine that has its address assigned by a DHCP server?* a. Static Address b. Dynamic Address c. Sticky address d. Unicast address

b. Dynamic Address

*Which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?* a. IGMP b. ICMP c. IP d. DHCP

b. ICMP

*Which protocol is used on the World Wide Web to transmit Web pages to Web browsers?* a. HTML b. FTP c. HTTP d. SFTP

c. HTTP

*Security is always a concern of a Network administrator. Just recently, almost 85% of your end users are receiving e-mails requesting that they need to change their password. What type of security concern is this?* a. Spear phishing b. Phishing c. Pharming d. Mail bombing

b. Phishing

*Which of the following is a file transfer protocol that uses UDP?* a. FTP b. TFTP c. HTTP d. SMTP

b. TFTP

*You are troubleshooting a network connection issue for a customer. You discover that the computer's IP address is 169.254.5.50. What would this indicate?* a. The PC is configured with a private IP address. b. The PC is unable to contact the DHCP server. c. The PC is configured with a public IP address. d. The PC is configure is a static IP address.

b. The PC is unable to contact the DHCP server.

*Sending a file from your personal computer's primary memory or disk to another computer is called?* a. Downloading b. Uploading c. Saving d. Networking

b. Uploading

*What does VoIP stand for?* a. Virtual online Internet Protocol b. Voice over Internet Protocol c. Virtual omni-directional Internet Protocol d. Voice online Internet Protocol

b. Voice over Internet Protocol

TCP

breaks data into manageable packets and tracks information such as source and destination of the packets. Able to reroute packets and is responsible for guaranteed delivery of the data.

*Which of the following ports is reserved for Post Office Protocol v3?* a. 104 b. 156 c. 110 d. 179

c. 110

*Which of the following is considered a network broadcast address?* a. 192.168.0.1 b. 192.168.0.254 c. 192.168.0.255 d. 192.168.0.0

c. 192.168.0.255

*How many IP addresses are available in a Class B network?* a. 256 b. 32,506 c. 65,536 d. 128,580

c. 65,536

*Which of the following is a valid public IP address?* a. 10.1.20.254 b. 172.16.30.20 c. 68.12.16.30 d. 192.168.30.10

c. 68.12.16.30

*How many layers are there in the OSI model?* a. 4 b. 5 c. 7 d. 9

c. 7

*Which of the following is a valid MAC address?* a. 192.168.0.1 b. 83-09-5A-8E-FF-0B-F1-31 c. C0-34-FF-15-01-8E d. 255.255.255.0

c. C0-34-FF-15-01-8E

*All of the 802.11 standards for wireless networking support which type of communication path sharing technology?* a. CSMA/CD b. Polling c. CSMA/CA d. Token passing

c. CSMA/CA

*You are building network cables and attaching RJ-45 connectors to each end. Which tool do you need for this task?* a. Punch down tool b. Vampire taps c. Crimping tool d. Needle nose pliers

c. Crimping tool

*Which network service would you use to get the IP address from the FQDN hostname?* a. NAT b. FTP c. DNS d. DHCP

c. DNS

*What does a router do in a network?* a. Forwards a packet to all outgoing links b. Forwards a packet to the next free outgoing link c. Determines on which outgoing link a packet is to be forwarded d. Forwards a packet to all outgoing links except the originated link

c. Determines on which outgoing link a packet is to be forwarded

*Which of the following is the best device to deploy to protect your private network from a public untrusted network?* a. Router b. Hub c. Firewall d. Switch

c. Firewall

UDP

connectionless, datagram service that provides an unreliable, best-effort delivery.

Which class address always has the value of the first bits in the IP address set to 110

class c class C addresses always have the first 3 bits set to 110. this means that a class C address ranges from 11000000 (192) to 11011111 (223)

NAT (Network Address Translation)

commonly used IP translation and mapping technology. Using a device or piece of software that implements NAT allows an entire home or office network to share a single internet connection over a single IP address

IP

connectionless protocol meaning a sessions is not created before sending data. Responsible for addressing and routing of packets between computers. Doesn't guarantee delivery and does not give acknowledgements of packets that are lost or sent out of order

PNS (PPTP Network Server)

corporate gateway in PPTP

*Which Ethernet standard specifies a data transfer rate of 1 Gigabit per second (Gbps)?* a. 10BaseT b. 100BaseFX c. 10Base5 d. 1000BaseT

d. 1000BaseT

most popular technology

ethernet

802.3

ethernet 2.4G/5.0G

IPv4

every IP address can be broken down into two parts, the Network ID(netid) and the Host ID(hostid). All hosts on the same network must have the same netid. Each of these hosts must have a hostid that is unique in relation to the netid. They are divided into 4 octets with each having a maximum value of 255. Class A has a range of 1-126 Class B has a range of <128-191 Class C has a range of 192-223 127.x.x.x is reserved for loopback testing on the local system and is not used on live systems. THe following address ranges are reserved for private networks: 10.0.0.0 - 10.254.254.254 172.16.0.0 - 172.31.254.254 192.168.0.0 - 192.168.254.254

SNAT (Secure Network Address Translation)

extension of the standard NAT service. Done through one to one IP address translation of one internal IP address to one external IP address where NAT is effectively one external address to many internal IP addresses.

A link-local address starts with

fe80

PAT (Port Address Translation)

feature of a network address that translates TCP or UDP communications made between hosts on a private network and hosts on a public network. It allows a single public IP address to be used by many hosts on a private network.

SSRC (Synchronization source identifier)

field in the RTP header that identifies the RTP mixer

NLA (Next Level Authority)

field in the ipv6 prefix that identifies an intermediate service provider

TLA (Top Level Authority)

field in the ipv6 prefix that identifies the large service provider

SLA (Subnet Level Authority)

field in the ipv6 prefix that identifies the organization

ASN.1

format for H.323 messages encoding. it is not textual, so it is very difficult to debug it.

FDDI

high-speed token-passing technology, employs 2 rings with traffic flowing in opposite directions, can SELF HEAL by removing failed segment

SPI (Security Parameter Index)

identification tag used in SA, included in AH and ESP headers, and it is a one-way logical channel

Routing Information Protocol (RIPv2)

improved upon RIPv1 by having the ability to include subnet information with its updates which allows for Classless Inter-Domain Routing (CIDR) support. The 30 second proactive broadcast has been eliminated in favor of multicast advertisements for its updates. The 15 hop count limit remains so that the devices are backwards compatible with RIPv1 devices.

LNS (L2TP Network Server)

internal server inside the corporate network that receives a PPP packet from a remote user

ipv4-mapped address

ipv6 address where the first 80 bits are 0 and 16 bits are set to 1

ipv4-compatible address

ipv6 address where the first 96 bits are set to 0

AH (Authentication Header)

ipv6 extension header that enables the sender to authenticate itself

ESP (encapsulating Security payload)

ipv6 extension header that encrypts the data

PPTP (Point-to-Point Tunnelling Protocol)

it a protocol to tunnel the PPP protocol into IP. it was originally designed for customer provisioned access VPNs and it was developed by major operating systems vendors.

RAS controller

it allows a terminal in H.323 to exchange control messages with the gatekeeper

PWE3 (Pseudo Wire Emulation End-to-End)

it allows to emulate wires over an MPLS networkto exchange Ethernet frames between layer 2 terminals such as Ethernet switches or phone switches.

LCP (Link Control Protocol)

it has the task of opening and closing PPP connections

SSL (Secure Socket Layer)

it is a cryptografic protocol which is designed to provide communication security between a client and a server

PPP (Poit-to-Point Protocol)

it is a layer 2 protocol used in point-to point connections (dial-up, ISDN) to encapsulate any protocol at higher level.

GRE (Generic Routing Encapsulation)

it is a layer 3 protocol to encapsulate any protocol (including IP and other protocols at lower layer) into IP

L2TP (Layer 2 Tunnelling Protocol)

it is a protocol to tunnel any layer 2 protocol

H.323

it is an application-layer signaling protocol suite standardized by ITU. It is very complex because it inherits the logics from the telephony operators. originally developed to allow communication between hosts connected to a corporate LAN.

SIP (Session Initiation Protocol)

it is an application-layer signaling protocol. It uses a text-based approach, so the codification is easy to understand. The interaction is client-server.

MCU (Multipoint Control Unit)

it is like the RTP mixer in SIP

Enhanced GRE

it is similiar to GRE but there are more fields, like key and acknowledgement number

RTP (Real-time Transport Protocol)

it is used to transport VoIP flows over UDP

RTCP (RTP Control Protocol)

it performs connection monitoring and control in RTP: destination collects statisticsand it periodically sends them to the source

SRV record

it specifies the registrar server alias , to be used for the A/AAAA query, and the port for the specified transport protocol.

VPLS (Virtual Private LAN Service)

layer 2 VPN that virtualizes a LAN -> broadcast packets are allowed

Frame Relay

layer 2 connection oriented standard to set up permanent virtual circuits

BGP (Border Gateway Protocol)

layer 3 protocol to support deployment of VPNs over MPLS

NIC

network interface card

collision

occurs when two devices on an Ethernet network simultaneously transmit a frame. Because an Ethernet segment cannot handle more than one frame at a time, both frames become corrupted.

Distance-vector routing protocols

one of the two main classes of routing protocols used in packet switching networks and includes Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP). Uses distance as one factor and the vector as the other to determine against the known routing tables to deliver data to the source and destination locations. Routers using the distance-vector routing protocol will update other routers of topology changes periodically when a change is detected in the topology of a network.

Link State routing protocols

one of the two main classes or routing protocols used in packet switching networks and includes protocols such as Open Shortest Path First (OSPF) and Intermediate System to Intermediate System (IS-IS). The link-state protocol is performed on every router on the network, where every routing node constructs a map of the connectivity to the network by showing which nodes are connected to each other. Each router calculates the next best logical hop from it to every possible known destination which forms the nodes routing table.

Network cable

physically connects a computer to a network

CHAP (Challenge Handshake Authentication Protocol)

protocol inside L2TP that the LNS (receiver) uses to authenticate itself to the LAC (transmitter)

IKE (Internet Key exchange)

protocol that uses digital certificate and asymmetrical criptography to send secret keys in a secure way

RADIUS (Remote Authentication Dial In User Service)

protocol used by the corporate gateway in VPNs to check the user

NCP (Network Control Protocol)

protocol used to negotiate layer 3 parameters in access VPNs

NTP (Network Time Protocol)

protocol used to synchronize computer clock times in a network of computers

ARP

provides IP-address to MAC address resolution for IP packets

DHCP (Dynamic Host Config)

provides a solution that automatically assigns IP addresses to computers on a network. If a device is configured for this, it will send out a request to the server which will issue a "lease" and assign it to that client. Benefits include: Prevents users from making up their own IP addresses Prevents incorrect gateway or subnet masks from being entered Decreases amount of time spent configuring computers especially in env. where computers get moved around frequently

TELNET

provides a virtual terminal or remote login across the network that is connection-based. The remote server must be running this service for clients to connect

Exterior Gateway Protocol (EGP)

routing protocol that is across different autonomous system / administrative domains. It was the routing protocol leveraged for Internet connected devices in the early 1980s. It is the replacement standard for Internet routing over EGP.

Interior Gateway Protocol (IGP)

routing protocol that is used with an autonomous system which is sometimes referred to as an administrative domain. Examples include: RIP, IGRP, EIGRP, OSPF and IS-IS

TFTP

same as FTP but not connection oriented

LAC (L2TP Access Concentrator)

server at the edge of the service provider network that receives the PPP packet from the remote user.

POP3

server that holds mail until the workstation is ready to receive it

SA (Security Association)

set of agreements between two parties A and B to be used for ESP and AH

HTTP

set of rules for exchanging files on the world wide web. The protocol for controlling the transfer and addressing of requests and responses.

STP

shielded twisted pair (to prevent interference)

HTTPS

signifies that a web page is using the SSL protocol and is providing a secure connection. Used for secure internet business transactions

Border Gateway Protocol (BGP)

the core routing protocol of the Internet. It maintains a table of IP networks and the data that designates where and how to reach network through autonomous systems (AS). It makes routing decisions based on patch, network policies and/or rule sets.

peer model

the gateways inside the infrasturcture participate to the creation of the VPN

overlay model

the infrastucture is unaware of the VPN solution and it just carries packets

Classful versus Clessless addressing

the original TCP/IP addressing method was called classful addressing which worked by dividing the IP address space into chunks of different sizes called classes. Classless addressing is referred to Classless Inter-Domain Routing (CIDR) and is done by allocation address space to ISP's and end users on any address bit boundary, instead of on 8-bit segments.

Unicast

the sending of information packets to a single network node. This type of network transmission is used where a private or unique resource such as media servers are being requested for two way connections that are needed to complete network communication.

POTS

the traditional circuit-switching telephone network

distributed internet access

the traffic towards and from the Internet does not involve the VPN, which is deployed only for corporate traffic

customer provision

the user creates and manages the VPN by himself, and tunnels are set up between customer edges

CSMA/CD

there are collisions, and this is faster

fiber optic

thin strands of glass used for long distances & fastest.

Convergence

this is achieved when all of the available topology information from routing devices have been passed along to all of the other devices in totality and when the information gathered is not in a contradiction state to any other router's informed topology information

802.5

token ring 100Mbpswith 802.5 t and 8-2.5v at 1 gbps over fiber

Broadcast

traffic sent out from a network node that will reach every other node on the subnet / broadcast domain because the message is sent with the intent of reaching all nodes. The network node that is sending the traffic will use the broadcast address for that subnet and every device in that broadcast domain will receive the broadcast information.

UTP

unshielded twisted pair, most common in LANs. 4 copper wires twisted together.

SNMP

used for monitoring and status information on a network. Uses both agents and traps to monitor this information

FTP

used for transferring files between remote systems. Connection oriented and must resolve host name to IP address to establish communication

IGMP (Internet Group Management)

used to manage IP multicast groups.

SMTP

used to reliably send and receive mail over the internet.


संबंधित स्टडी सेट्स

IL CHAPTER 3 - LIFE POLICY PROVISIONS, RIDERS, & OPTIONS

View Set

Utah Real Estate: Federal Laws B chapter 38

View Set

Python for Everyone Final Unit 4-7

View Set

Chapter 34 - the school-age child and family (evolve)

View Set

Personal Finance Risk Management

View Set

Macroeconomics (Chapters 1,2,3) Exam

View Set

Introduction Job & Oral: Gas Turbine Engine Sections.

View Set