MTA Networking Fundamentals, MTA Networking Fundamentals-Final, MTA Network Fundamentals- OSI/TCP, MTA Networking Fundamentals Test 1, MTA Networking Fundamentals Test 2, MTA Networking Fundamentals Test 3, MTA Networking Fundamentals, MTA Networking...

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Aero Requirements

-Windows Vista -1Ghz processor -1GB RAM -128 MB graphics card -DirectX 9 compatible graphics processor widows display driver model driver (WDDM) pixel shader 2.0 in hardware 32-bits per pixel

NETSTAT Options

-a -e -n -o -p [protocol] -r -s [interval]

NBTSTAT Options

-a [remoteName] -A [IPAddress] -c -n -r -R -S

User Account Control

-credentials are elevated to administrator when necessary -configure windows firewall -install applications -schedule tasks -change user information

Control UAC

-enable/disable in user accounts

The hash of a drive (partition) may change. Even when write blocked. File carving is harder.

.

Which one of the following is a second-level domain?

.edu

The subnet mask 255.255.255.240 can be written in slash notation as _______________ /30 /26 /28 /24

/28

Digits: 0, 1

0 False Off Cleared 1 True On Set

unmasked

0 in binary

Notation - Prefix 0b

0b1100 1101 = 127 + 126 + 025 + 024 + 123 + 122 + 021 + 1 20 = 128 + 64 + 8 + 4 + 1 =

masked

1 in binary

Bluetooth class 3

1 mW, range of 1 meter (3 feet).

1.The type of network is 2. The solution is

1. Ethernet 2. Replace the hub with a switch

1. Application Layer 2. Network Layer 3. Data Link Layer 4. Physical Layer

1. FTP 2. Router 3. Network Interface Card 4. Hub

1. Attenuation 2. Attenuation 3. Crosstalk 4. TrafficCollisions

1. Radio waves affected by weather, walls, and other obstructions 2. Loss of signal intensity or integrity over long cables 3. Hearing two radio broadcasts on the same station 4. Primary problem with Ethernet

1. PPTP 2. L2TP 3. SSTP

1. TCP/UDP port 1723 2. UDP port 1701 3. TCP port 443

How many B channels does an ISDN PRI support?

23

Class C

255.255.255.0 - IP range 192-239

A replication group can have up to BLANK members

256

Each server can manage up to BLANK replication groups.

256

Using nslookup you can verify that:

1. The system is configured w/ the correct DNS server. 2. The server is responding to requests. 3. The entries on the server are correct. 4. The DNS server can communicate w/ other servers in the DNS hierarchy to resolve names.

APIPA

169.254.x.x

proxy server

A computer that intercepts requests that a client (for example, browser) makes of a server (for example, a web server) and can serve up the request from a cache it maintains to improve performance or can filter requests to secure a large network.

Client

A computer that uses resources on the server. Depending on the network OS, they can be separate machines, or the client can act as a server and vice versa. Clients can refer to servers either by assigning drive letters to shared folders or by using a Universal Naming Convention (UNC) path name to refer to the server.

Group Policy

A console (gpedit.msc) available only in Windows professional and business editions that is used to control what users can do and how the system can be used.

folder

A container used for organizing files into manageable groups.

diskpart

A fully functioning command-line partitioning tool.

location independence

A function of cloud computing whereby customers generally are not aware of where the physical devices providing cloud services are located geographically.

Static vs. server-assigned gateway

A gateway identifies the IP address of a device that connects the computer to the Internet or other LAN. Static: IP address for gateway has to be entered, same value for all comps. on network. Server-assigned: automatically assigned by DHCP server.

Internet Protocol version 6 (IPv6)

A group of TCP/IP standards that uses IP addresses that have 128 bits.

Internet Protocol version 4 (IPv4)

A group of TCP/IP standards that uses IP addresses that have 32 bits.

subnet

A group of local networks when several networks are tied together in a subsystem of the larger intranet.

What is a shadow group?

A group that contains the same users as an OU and these users meet a certain criterion. Cannot maintain membership dynamically.

Attribute

A predefined designation that a file or directory may or may not have. Examples: Hidden System File and directory attributes are usually assigned by system, but can be changed by user.

Private IP address

A private IP address is hidden from sight on the Internet, and are usually behind a firewall. Computers within a LAN network are usually given a private IP.

default program

A program associated with a file extension that is used to open the file.

Public IP address

A public IP address is the one that faces the Internet and can be seen by any computer that connects to the Internet. Servers connecting to the Internet are usually given a public IP.

driver roll back

A recovery feature in Windows 8.1 that will let you reinstall the last device driver that was functioning

System restore

A recovery option for your computer that saves information about your drives, registry settings, programs, and files in the form of restore points.

Last Known Good Configuration (LKGC)

A recovery option used to restore registry and driver settings that were in place the last time your system started successfully.

USB drive

A removable disk that you plug into a USB port on your computer.

Command

A request, typed from a terminal or embedded in a file, to perform an operation or to execute a particular program.

data source

A resource on a network that includes a database and the drivers required to interface between a remote computer and the data. Also see Open Database Connectivity (ODBC).

swap

A swap file system is used as virtual memory (the portion of the hard disk used to temporarily store portions of main memory) by the operating system. (A recommended practice is to make the swap file equal in size to the amount of memory on the computer.)

call tracking software

A system that tracks the dates, times, and transactions of help-desk or on-site IT support calls, including the problem presented, the issues addressed, who did what, and when and how each call was resolved.

MSconfig

A system utility used to troubleshoot the Microsoft Windows startup process. It can disable or re-enable software, device drivers and Windows services that run at startup, or change boot parameters.

contextual tab

A tab on the Ribbon that appears only when you are performing certain tasks, and contains options related to your current task.

SIM (Subscriber Identification Module) card

A small flash memory card that contains all the information a device needs to connect to a GSM or LTE cellular network, including a password and other authentication information needed to access the network, encryption standards used, and the services that a subscription includes.

Hardware Loopback plug

A special connector used for diagnosing transmission problems such as redirecting electrical signals back to itself. It plugs into a port and crosses over transmit/receive lines. The plug directly connects Pin 1 to 3 and Pin 2 to 6.

ARP cache

A table used for maintaining the correlation between each MAC address and its corresponding IP address.

crossover cable

A special network cable used in Ethernet UTP installations, which enable you to connect devices without using a hub or a switch. The transmit and receive lines are crossed to make them work like a loopback. Pins 1 and 2 connect to Pins 3 and 6.

channel

A specific radio frequency within a broader frequency.

File System

A specification of how files and directories are organized and managed in secondary storage. Essential functions: Storage Dynamic size Retrieval Deletion Naming -Ancillary functions: Sizes Dates and times Permissible uses (Security)

Address

A specification of the location of data.

Guests group

A type of user group in Windows. User accounts that belong to this group have limited rights to the system and are given a temporary profile that is deleted after the user logs off.

Administrators group

A type of user group. When a user account is assigned to this group, the account is granted rights that are assigned to an administrator account.

A VPN is a/an: A. Encrypted connection across the Internet. B. Virtual network within your local area network (LAN). C. Communication tunnel between VLANs. D. Personal network for your use only.

A. Encrypted connection across the Internet. VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.

Which of the following is a Layer 2 WAN protocol? A. Point-to-Point Protocol (PPP) B. Simple Network Management Protocol (SNMP) C. Transmission Control Protocol (TCP) D. Internet Protocol (IP)

A. Point-to-Point Protocol (PPP) Data Link Layer: WAN Protocols: HDLC, PPP, Frame Relay, Ethernet WANs, MPLS VSAT, Broadband

Authenticated Users group

All user accounts that have been authenticated to access the system except the Guest account. Compare with anonymous users.

Location Aware Printing

Allows you to choose different default printers for different networks

Time to Live (TTL)

Also known as "hop limit", is a mechanism that limits the lifespan or lifetime of data in a computer or network. This mechanism may be implemented as a counter or timestamp attached to or embedded in the data.

Wireless Ethernet

Also known as IEEE 802.11. The collective name for a group of wireless technologies compatible with wired Ethernet, referred to as wireless LAN (WLAN) standards. Wireless Ethernet is also known as Wi-Fi. Supports both star and mesh topologies. (check table of Wireless Ethernet types)

Ethernet connection

Also known as IEEE-802.3. The most common and oldest network still in use today. Most recent wired Ethernet networks use UTP cables, but older versions use types of coaxial cable. (check table)

System Configuration utility

Also known as MSCONFIG.

Active directory

An infrastructure (directory) that stores information and objects. An object can be a file, a printer, a computer, a user account, or other entities.

Spectrum Analyzer

An instrument that displays the variation of signal strength against the frequency.

Octet

An octet is the name for each number in an IP address. An octet is an eight-bit byte; this means that in binary, the number can range from 00000000-11111111. Example: 255 is actually 11111111 when converted to binary.

GSM (Global System for Mobile Communications)

An open standard for cellular networks and cell phones that uses digital communication of data and is accepted and used worldwide.

Anything as a Service or Everything as a Service (XaaS)

An open-ended cloud computing service that can provide any combination of functions depending on a customer's exact needs.

library

An organizational tool for folders and files that displays similar types of files together, no matter where they are stored on the computer.

dynamic IP address

An IP address assigned by a DHCP server for the current session only, and is leased when the computer first connects to a network. When the session is terminated, the IP address is returned to the list of available addresses.

loopback address

An IP address that indicates your own computer and is used to test TCP/IP configuration on the computer.

Parts of an IPv4 address

An IPv4 address consists of 4 groups of numbers which each range from 0 to 255; example: 192.168.1.1. IP addresses are divided into two sections: the network portion (the number of the network the computer is on) and the host portion (the number of the individual computer). In the above example, 192.168.1 is the network number, and .1 is the host number.

In addition to switching, multilayer switches also: A. Provide Layer 3 routing functions. B. Interface with CAT3, CATS, CAT5e, and fiber optics. C. Support 10 MB, 100 MB, and 1 GB local area network (LAN) ports. D. Operate by using only Layer 1 and 2 protocols.

A. Provide Layer 3 routing functions.

what is the best practice for group nesting called?

AGDLA - Accounts- are members (users and computers of Global groups- represent business roles and are members of Domain Local - groups that represent management rules and these rule groups are added to ACLs- which provide the level of access required by the rule

Which protocol is used to translate IP addresses to MAC addresses?

ARP

arp -s inet_addr OR arp -s eth_addr

Add a host. The internet address is set by adding an inet_addr value and the physical address is set by adding an eth_addr value

What is nesting

Adding groups to other groupsg

NETSTAT -a

All connections and listening ports

Root Directory Region

Area for the root directory. Usually follows FAT region. FAT12, FAT16 root directory not part of data region. FAT32 root directory is within data region (but normally starts in cluster 2).

Data Region

Area where files and directories are actually stored. Area organized in clusters.

escalate

Assigning a problem to someone higher in the support chain of an organization. This action is normally recorded in call tracking software.

ADSL

Asynchronous DSL. Always has higher downstream speeds than upstream. It supports an existing phone line, as a user installation option; typical downstream speeds of 384Kbps-24Mbps; typical upstream speeds of 128Kbps-3.3Mbps.

Once the DHC server is installed in Windows Server, we activate it and one more step needs to be done. What is that important step? Get scope registered Authorized the server Get clients registered Get DNS IP registered

Authorized the server

You work at a coffee shop. Your supervisor asks you to help set up a computer network. The network needs to have the following items: ✑ A public facing web server ✑ A Wi-Fi network for customers ✑ A private network for the point of sale terminals ✑ An office PC ✑ A file/print server ✑ A network printer You need to set up a perimeter network to protect the network. Which two items should you include in the perimeter network? (Choose two.) A. Network printer B. Web server C. File server D. Wi-Fi network E. Point of sale terminals

B: Web Server D: Wi-Fi network

In a twisted pair cable, the wires are in pairs and something of BOGB is referred. What does this BOGB in reference to the cable represent? Blue, Orange, Green, Black Black, Orange, Green, Brown Blue, Orange, Green, Brown Brown, Orange, Green, Black

BOGB Blue Orange Green Brown

Which of these is an application layer protocol? A. TCP B. FTP C. IP D. UDP

B. FTP BGP-DHCP- DNS- FTP- HTTP- IMAP- LDAP- MGCP- NNTP- NTP- POP- RTP- RTSP- RIP- SIP SMTP- SNMP- SSH- Telnet- TLS/SSL

Which of the following are features of DHCP? (Choose two.) A. IP address resolution to canonical names B. Secure shell connections C. Address reservation D. Network file transfer E. IP address exclusion

C. Address reservation E. IP address exclusion

You are home for vacation, and a family member wants your help to purchase and install network cable for a home office. The cable needs to support at least 300 Mbps. What is the least expensive option that meets this requirement? A. Cat3 B. CAT5 C. Cat5e D. Cat6

CAT 5e The Cat 5e standard provides performance of up to 100 MHz and can be used up to a maximum length of 100 meters It was made to support 1000 Mbps

Setting up network share in XP using default simple file-sharing option

Check "share this folder on the network" to enable sharing. You must name the shared resource under "share name." Check "allow network users to change my files" to enable full read/write access.

format

Command line tool for creating a volume (usually in a partition). Establishes a file system. O.S. has defaults (for differing media) FAT12, FAT16, FAT32, exFAT (in this course), NTFS Cluster size (No. of sectors per cluster) May also be done from Windows Explorer

nslookup

Command-line program in Windows used to determine exactly what information the DNS server is providing about a specific host name.

Windows Powershell

Command-line tool included with Windows 7 and available for earlier versions from Microsoft. Offers a number of powerful scripting tools for automating changes both on local machines and over networks.

ipconfig

Command-line utility for Windows servers and workstations that displays the current TCP/IP configuration of the machine. Similar to winipcfg and ifconfig Important Options: /all /release /renew /flushdns

tracert

Command-line utility used to follow the path a packet takes between two hosts.

sfc (System File Checker)

Command-prompt program (sfc.exe) that scans, detects, and restores Windows system files, folders and paths.

Half duplex

Communication between two devices whereby transmission takes place in only one direction at a time.

Full duplex

Communication that happens in two directions at the same time.

One of the computers on your network cannot connect to the network. You have reason to suspect the twisted pair cable. What tool should you used to test for problems with the cable?

Community tester.

NETSTAT -p [protocol]

Connections for the protocol specified in place of [protocol] in the command syntax. The value of the [protocol] variable may be TCP, UDP, TCPv6 or UDPv6.

Loopback plug

Connects directly to RJ-45 port on PC's network adapter. Simulates network & tests whether network adapter & TCP/IP are functioning properly.

If an 802.llg Internet connection has connectivity problems, what may be the cause? A. A cordless phone B. A cellular phone C. Incandescent lights D. Electromagnetic interference (EMI)

D. Electromagnetic interference (EMI) The 802.11g specification is a standard for (WLANs) that offers transmission over relatively short distances at up to 54(Mbps), 2.4 GHz

In a physical star topology, the central device is referred to as a: A. Bridge B. Server C. segmenter D. Hub

D. Hub In local area networks with a star topology, each network host is connected to a central hub with a point-to-point connection.

Mac Flooding

Description: An attacker can overflow the switches with fake MAC address forcing it to act like a hub, sending packets to all devices Security Defense: Use a Switch that can close ports with too many MAC Address

Type of attack: Network tap

Description: A network tap is connected to the network to intercept frames. Security defense: Keep network connections secure by restricting physical access.

Type of attack: Port mirroring

Description: An attacker connects his device to the switch's mirror port Security defense: Secure the switch in a locked room.

Type of attack: MAC address impersonation

Description: If two devices have the same MAC address, a switch may send frames to each device. An attacker can change the MAC address on her device to match the target device's MAC address. Security defense: Configure the switch so that only one port can be assigned per MAC address

Type of attack: ARP poisoning

Description: The attacker sends a forged ARP packet to the source device, substituting the attacker's computer MAC address. Security defense: Use an ARP detection appliance

Global groups are used to primarily to?

Define collections of domain objects based on business roles

Layer 1: Physical Layer

Defines the physical network device, and cables. Measurement: Bits

What is Dsrm used for?

Delete a group or any AD object

arp -d

Deletes a single host entry if followed by if_addr. Deletes all host entries if followed by *

DMZ

Demilitarized zone. An area that isn't quite on the Internet, but it's also not a part of your LAN. It's a middle ground that's mostly protected by a firewall, but particular traffic will be let through. It's a good place for web, email, and FTP servers because these are services required by people on the Internet, and this way, if it's configured correctly, external clients cannot connect to the LAN such as if the server was directly in the LAN.

Partitioning

Divides medium into logical volumes, (may also format). At least one partition on device. Logical volumes may reside within partitions. Rarely done by users. Doesn't destroy all disk contents, but may make contents hard to access.

Step 7 of The Network + Troubleshooting Model

Document findings, actions and outcomes.

netstat -n

Does not resolve hostnames. Instead displays addresses and port numbers in numerical form.

Reverse proxy

Does not serve clients but routes incoming requests to correct server Reverse proxy's IP address visible to outside users Internal server's IP address hidden

DIG utility

Domain Internet Groper: Unix/Linux command line tool that can be used to display name server information. Easier to use than nslookup. It is included with the BIN version of DNS and can be downloaded from many UNIX and Linux resource sites on the Internet.

DNS

Domain Name System. The network of servers on the Internet that translates domain names and host names into their matching IP addresses. If you manually configure an IP address, you typically provide the IP addresses of one or more DNS servers as part of the configuration process.

Downstream & Upstream

Downstream = download speed, upstream = upload speed.

Which of the following is a member of the IPsec protocol suite and provides origin authenticity, integrity, and confidentiality protection of packets?

ESP

Security Through Network Design Elements

Elements of a secure network design Demilitarized zones Subnetting Virtual LANs Remote access

EFI

Extensible Firmware Interface (officially UEFI - Unified Extensible Firmware Interface): Intel ("Tiano") developed, since standardized firmware-op. sys. interface. Includes boot services and partition specifications.

Frame Relay is associated with FECN / BECN, what does FECN stand for________________ Frame Elastic Check Notification Forward Explicit Congestion Notification Frame Explict Compression Notification Forward Explict Compression Notification

FECN: Forward Explicit Congestion Notification tells the receiving device that the path is congested so that the upper layer protocols should expect some delay. BECN: backward explicit congestion notification tells the transmitting device that the Frame Relay network is congested and that it should "back off" to allow better throughput.

Which if the below is a valoid MAC for broadcast? FFFF FFFF FFFF EEEE EEEE EEEE ABAB ABAB ABAB ABCD ABCD ABCD

FFFF FFFF FFFF When a device sends a packet to the broadcast MAC address (FF:FF:FF:FF:FF:FF), it is delivered to all stations on the local network. It needs to be used in order for all devices to receive your packet at the datalink layer. For IP, 255.255.255.255 is the broadcast address for local networks.

Port 21

FTP=File Transfer Protocol

___ is a wireless communication problem caused by electromagnetic waves

Fading

T/F You can use CSVDE to import and modify group objects

False -It can be used to create objects, not modify existing objects ( LDIFDE can be used to modify group objects

The IEEE standard 802.3j is used for Thin Coaxial Fiber Optic Thick Coaxial Twisted Pair

Fiber Optic 10BASE-F 10 Mbit/s (1.25 MB/s) over Fiber-Optic

FTP

File Transfer Protocol. Used by both web broswers & specialized FTP programs to access dedicated file transfer servers. An FTP site has the prefix "ftp://". FTP sites w/ downloads availbable to any user support anonymous FTP; if any credentials are needed, it's usually the user's email as a password with the username preset to be anonymous. Some FTP sites require the user to log in with a username and password. Though you can use the FTP client built into Windows, it's better to download third party software and customize it.

inode table

File size Modification, access, and creation times Permissions Ownership

superblock

File system type (e.g., ext2 and ext3) Size (e.g., 10GB and 360GB) Status

FAT File System

File system which uses a FAT to keep track of clusters' allocation and the linking of clusters for a file.

Wireless Connection Issues

Interference Incorrect encryption levels Channel congestion Incorrect frequency SSID mismatches Standard mismatches Distance Bounce Incorrect antenna placement Configuration Incompatibilities Incorrect channel Latency Incorrect switch placement

Inbound—block all. Outbound—permit all

Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?

Volume Boot Record (VBR) Boot Sector

First sector of a primary or secondary FAT file system partition which contains information about the file system and possibly boot code. A floppy disk only has a VBR (no MBR). First sector of volumes with other file systems also have file system information.

Master Boot Record (MBR):

First sector on hard disk, zip disk, flash drive contains MBR. 446 bytes: Boot code

802.11n

Frequency of 2.4GHz (standard) or 5GHz (optional). Max speed of 600Mbps, though the typical cap is 300Mbps. Works with 802.11b and 802.11g; if operating at 5GHz, works with 802.11a as well.

802.11b

Frequency of 2.4GHz, max speed of 11Mbps, works with 802.11g.

802.11g

Frequency of 2.4GHz, speed of 54Mbps, works with 802.11b and 802.11n.

802.11a

Frequency of 5GHz, max speed of 54Mbps, requires dual-mode (802.11a/b or 802.11a/g) hardware; works with 802.11n networks with 5GHz frequency.

In Windows to configure VPN which options do you need to go to? CLI command -> start vpn Control Panel VPN From Administrative Tools Routing and Remote Access None of the above

From Administrative Tools Routing and Remote Access

You need to connect a network adapter to a switch. You need the connection to be able to send and receive data at the same time. What type of connection should you use?

Full duplex

GPT

GUID* Partition Table. Can replace the partition table of the MBR when EFI is utilized. Suitable for larger partitions (over 2 TB). * Globally Unique IDentifier MBR is present at sector 0. Partition code of 0xEE in MBR partition table entry indicates GPT. GPT follows MBR. * Globally Unique IDentifier

SA - Security Association

Generates the encryption and authentication keys that are used by IPsec

Network Class C

IPv4 address class with address range of first octet between 192 and 223; provides a large number of unique networks and a small number of unique hosts per network

Network Class A

IPv4 address class with first octet ranging between 1 and 126; provides small number of unique networks and a large number of unique hosts per network

Global Unicast Address

IPv6 addresses that start with 2000:: /3

The three main types of IPv6 addresses are _________________ Unicast Anycast Multicast Broadcast

IPv6 has three types of addresses, which can be categorized by type and scope: Unicast addresses. A packet is delivered to one interface. Multicast addresses. A packet is delivered to multiple interfaces. Anycast addresses. A packet is delivered to the nearest of multiple interfaces (in terms of routing distance).

IPv6 tunneling

IPv6 packets can be encapsulated inside IPv4 datagrams

connection-oriented protocol

In networking, a TCP/IP protocol that confirms a good connection has been made before transmitting data to the other end, verifies data was received, and resends it if it is not.

Proxy server advantages:

Increased speed (requests served from the cache) Reduced costs (cache reduces bandwidth required) Improved management - Block specific Web pages or sites Stronger security: Intercept malware Hide client system's IP address from the open Internet

IrDA protocol

Infrared Data Association protocol. Allows for short-range, low-speed, line-of-sight infrared networks. Some laptops have an integrated IrDA port, and sometimes printers have a port so you can connect using infrared.

ISDN

Integrated Services Digital Network. Developed to provide an all-digital method for connecting multiple phone devices to a single line to provide faster access.

An example of a physical _____ topology would be hubs connected to s single switch.

Star

Sidebar Settings

Start > All Programs > Accessories > Windows Sidebar

Startup File Maintenance

Start > All Programs > Startup -drag apps into group and they will autorun at startup

change UAC Configuration

Start > Control Panel > Administrative Tools > Local Security Policy

Index Settings

Start > Control Panel > Indexing Options

Static vs. server-assigned IP address

Static IP: unique value for each computer. Server-assigned: automatically assigned by DHCP server.

Secondary Storage

Storage for data and program instructions using magnetic devices (disk, tape), optical devices (CD) or electronic devices (solid state drives, flash drive, memory card).

Classless Inter-domain Routing requires which one of the following:

Subnet mask

Category 5 cabling

Supports 10BASE-T and 100BASE-T networking. Supports up to 100Mbps. Uses UTP and STP, four wire pairs.

Category 7 cabling

Supports 10BASE-T, 100BASE-T and 1000BASE-T networking. Supports up to 1000Mbps. Uses 12-connector GG45 connector (backwards compat. w/ RJ-45), uses UTP and STP.

Category 5e cabling

Supports 10BASE-T, 100BASE-T, and 1000BASE-T networking. Supports up to 1000Mbps (1000BASE-T). Enhanced version of Cat5, uses UTP and STP, four wire pairs.

Category 6 cabling

Supports 10BASE-T, 100BASE-T, and 1000BASE-T networking. Supports up to 1000Mbps. Handles higher frequencies than Cat5/5e, uses UTP and STP.

Category 3 cabling

Supports 10BASE-t and Ethernet networking. Supports up to 10Mbps. Uses UTP, is obsolete, four wire pairs.

Category 4 cabling

Supports token ring networking. Supports up to 16Mbps. Uses STP, one wire pair.

Which is an industry-standard transport layer protocol enabled on most routers today?

TCP/IP

TRUE/FALSE: SSIDs are case sensitive.

TRUE

Load Balancing

Technology to help evenly distribute work across network. Allocate requests among multiple devices. Load balancing achieved through software or hardware device

You have just scanned the ports of your server and notice that port 3389 is open. What can you tell from this information?

Terminal Services is running

IMAP

Internet Message Access Protocol. An email protocol that enables messages to remain on the email server so they can be retrieved from any location.

IPv4

Internet Protocol version 4, is the most frequently used communications protocol and resides on the network layer of the OSI model, IP addresses consist of 4 numbers each between 0-255.

Internet Content Filters

Internet content filters - Monitor Internet traffic and block access to preselected Web sites and files Unapproved sites can be restricted based on: Uniform Resource Locator (URL filtering) Searching for and matching keywords such as sex or hate (content inspection) Looking for malware (malware inspection)

Network Address Translation (NAT)

Internet routers normally drop packet with private address Network address translation (NAT) - Allows private IP addresses to be used on public Internet Replaces private IP address with public address as leaves network and vice versa when returns Port address translation (PAT) - Variation of NAT that outgoing packets given same IP address but different TCP port number

To install IPv6 on your windows computer you need to _____________ LAN connection Properties-> Check IPv6 using CLI : enable ipv6 From Web Browser Properties using CLI: ipv6 enable

LAN connection Properties-> Check IPv6

What type of communication is defined at the physical and data link layers of the OSI model?

LAN protcols

Which print services roles enable UNIX clients running the LPR program to send their print jobs to windows printers?

LPD Service

Internet

Largest public network that supports the world wide web, email, gaming, etc.

mmc

Launches an extensible common presentation service for management applications.

Virtual Lan (VLAN)

Layer 2 switching allows VLAN to be implemented to segment the network,reduce collisions, organize the network, boost performance, and hopefully, increase security.

Virtual LAN (VLAN)

Layer 2 switching that allows for segmenting/organizing of networks.

A _____ switch uses logical addressing to determine data paths.

Layer 3

Difference between layer 2 & 3

Layer 3 switches forward packets like a router, used in busy environments, and layer 2 switches forward frames like an advanced bridge.

TCP maps to which layer of the OSI Model

Layer 4

What Layer are Ports apart of?

Layer 4 - Transport Layer 0-65535

L2TP uses port ________________ 443 500 89 1723

Layer Two Tunneling Protocol (L2TP) uses TCP port 1701 and is an extension of the Point-to-Point Tunneling Protocol. L2TP is often used with IPSec to establish a Virtual Private Network (VPN). Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP port 47 Generic Routing Encapsulation (GRE)

Little-endian

Least significant bytes first Stored: 12 34 (two bytes) Interpreted: 34 12 Hex Value: 0x34 12 Stored: 56 78 9A BC (four bytes) Interpreted: BC 9A 78 56 Hex: 0x BC 9A 78 56 PCs (WINTEL) use little endian for integers (which may represent other data, e.g., Unicode).

Little Endian

Least significant bytes occur first. E.g. Two bytes Stored: 12 34 → Value: 0x34 12 Four bytes Stored: 56 78 9A BC → Value: 0xBC 9A 78 56 WINTEL machines use little endian.

LDAP

Lightweight Directory Access Protocol. Used to access and maintain distributed directory information services, like email and Microsoft Active Directory.

Types of LED Indicators

Link Indicators - indicate signal reception from the network. Activity - Flickers when data packets are received or sent. Speed - whether the adapter is operating at 10Mbps, 100Mbps or at 1Gbps. Dual color - Indicate different network states.

You are troubleshooting a server that needs to connect directly to the Internet. After you run an ipconfig/all, you discover the problem. The server has been auto assigned the IPv6 address fe80::260:8ff:fec0:984. The server won't connect to the Internet because this is a _____ address.

Link Local

nbtstat -S

Lists NetBIOS connections and their state with destination IP addresses.

nbtstat -s

Lists NetBIOS connections and their state, converting destination IP addresses to computer NetBIOS names.

nbtstat -n

Lists local NetBIOS names.

nbtstat -r

Lists the NetBIOS names resolved by broadcast and via WINS.

nbtstat -n

Lists the local NetBIOS name table along with the service code, type and status.

nbtstat -A <IP address>

Lists the remote machine's name table given its IP address

nbtstat -a <device name>

Lists the remote machine's name table given its name

LAN

Local Area Network. Two or more computers connected together in the same office.

defrag

Locates and consolidates fragmented files on local volumes to improve system performance. Only to be used on platter-based hard drives. Do not use on SSD!

chkdsk /r

Locates bad sectors and recovers readable information Implies /f

Logon/Logoff

Logon/Logoff events track attempts to log on to a computer interactively or over a network. These events are particularly useful for tracking user activity and identifying potential attacks on network resources.

Switch

Looks like a hub, but each port works independently, allowing for more than one concurrent session. The computer sending information identifies the MAC address of the specific computer it wants to send info to, and sends it only to them.

I/O Input/Output

Means of transferring data between user & machine.

Qualification tester

Measure the speeds at which a network can transmit data. Used to troubleshoot a network but not to test networks. It tests the continuity of UTP/STP cables and verifies the adherence to 10BASE-T, 100BASE-T, TIA568A, TIA-568B and Token ring wiring standards. Verifies ring wiring standards and shield integrity.

Voltmeters

Measures voltage and resistance b/t two points in a circuit.

The physical environment through which data travels as it moves from one computing device to another is called:

Media

In a ____ top logy, Every single computer is connected to every other computer on the network.

Mesh

In a ____ topology, every single computer is connected to every other computer on the network.

Mesh

Network Firewall Filtering

Methods of firewall packet filtering: Stateless packet filtering - Inspects incoming packet and permits or denies based on conditions set by administrator Stateful packet filtering - Keeps record of state of connection and makes decisions based on connection and conditions

MAN

Metropolitan/Municipal Area Network. When two different networks in two different offices in the same city want to connect. Similar to a WAN, but on a smaller scale. Still need a telecoms company to provide a high-speed connection.

The _________________ technology is used to mask and Private IP address from the outside world. We can use this and have multiple computers with Private IP address browse the Internet. WINS DHCP Network Address Translation FTP

Network Address Translation It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a router, usually connecting two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

Network Access Control (NAC)

Network access control (NAC) - Examines current state of system or network device before allowing network connection Device must meet set of criteria If not met, NAC allows connection to quarantine network until deficiencies corrected

Privilege Use

Privilege Use events track the use of certain privileges on one or more computers.

Cable testing tool

Test the cable's functionality. The best option is a proper network cable tester. It'll have a LAN testing unit that you can plug into a port on the patch panel and a terminator you plug in on the other end in the RJ-45 wall jack. Tests each individual wire to make sure it's wired up correctly.

Step 3 of The Network + Troubleshooting Model

Test the theory to determine cause: Determine next step to resolve the problem

Network cable certifier

Test transmission speed and performance

LAN tester

Test transmission speed, cable skew, cable propagation delay, cable typing (CAT3, 5,5e,6), attenuation, and cable verification. Carries out a cable conduction test and a miswiring detection test.

Patch tester

Tests patch cables. Has 2 RJ-45 jacks, plug either end of the cable in, tests each wire to make sure they're all properly wired up.

Command Prompt

Text prompt for entering commands.

Which of these protocols is not a Network Layer Protocol? IP ICMP HTTP ARP

The Hypertext Transfer Protocol is an application protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Standard port: 80

When you load a partition management utility on a workstation running an OEM version of Windows 8.1, you notice that there is a hidden partition located at the beginning of the workstation's hard drive. You decide to delete it to free up space on the drive. Should you do this?

No, this is the system's recovery partition.

To protect your Windows 10 system, you've used System Restore to automatically protect your system using restore points. You've also configured File History to protect your user's data files. Will this configuration adequately protect your system in the even of a hard disk failure?

No, you need to create an image of your Windows system as well.

Repackage the software for Windows Installer.

Not all software on the market provides .msi support. What is your best option to use Windows Installer to assign and publish the software?

NetWare

Novell's network OS designed for client/server networks

FATs

Number of the first cluster used to store a file (or directory) is in the directory entry for the file. The entry in the FAT for a cluster used to store a file contains either the number of next cluster or an end of file marker.

TRIM Command

O. S. command to notify SSD that cluster (or sector) is unallocated, i.e. ready to be erased.

The transmission rate of an Optical Carrier OC-24 is 51.84 Mbps 1.244 Gbps 9.953 Gbps 2.488Gbps

OC Data Rate OC-1 51.84 Mbps OC-3 155.52 Mbps OC-12 622.08 Mbps OC-24 1.244 Gbps OC-48 2.488 Gbps

You have been tasked with installing a routing protocol that monitors the network for router that have changed their link state. Which routing protocol will accomplish this?

OSPF

Which of the below is a Link state routing protocol? Choose the best fit RIP IGRP EIGRP OSPF

OSPF Open Shortest Path First is a routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior gateway protocols, operating within a single autonomous system.

Which of the following three protocols use dynamic routing?

OSPF RIP IGRP

Cable stripper

Often part of a wire crimper, allowing the user to strip wires of their protective coating and then use the crimping tool to attach a media connector.

To configure a DHCP server in Windows which of the below is a correct step. On Server Manager Roles Add RolesSelect DHCP Server and Click Next ipconfig /dhcp On control Panel DHCP Server None of the above

On Server Manager Roles Add RolesSelect DHCP Server and Click Next

How do you protect an object from accidental deletion?

On. The Object Tab in the properties box, check 'Protect object from accidental Deletion'

network share

One computer (the client) on the network appears to have a hard drive, such as drive E:, that is actually hard drive space on another host computer (the server). Also see mapping.

Hub

Original connecting device for computers on LAN. Creates a simple shared physical plant that all computers use to send data. Device broadcasts data out to all computers on network, but only the computer that needs it accepts it; the rest drop the information. This means only 2 computers can communicate at a time (the one sending the info and the one receiving it). It's not common anymore.

Cable modem & cable TV installation

PC connects to cable modem either by an RJ-45 cable on both ends, or a USB type A port on the PC and a USB type B port on the cable modem. A coaxial cable plugs into the cable modem and connects to a splitter. A separate coaxial cable on the splitter connects it to the TV's set-top box.

Port 110

POP3=Post Office Protocol Version 3

___ is a connection that uses the public switched analog telephone natwork rather than a dedicated circuit or some other type of private network

POTS

inherited permissions

Permission assigned by Windows that are attained from a parent object.

Proxy

Person who authorized to act as substitute or agent on behalf of another human

PAN

Personal Area Network. Smaller computer network used for communication between smartphones. Add wireless standards like Bluetooth, and you get a wireless PAN (WPAN). No-one is controlling the device or server (ad-hoc, a peer-to-peer/mesh network - no single sever in control.)

Policy Change

Policy change events track changes to important security policies on a local system or network.

Non-interactive mode w/in nslookup utility

Prints only the name and requested details for one host or domain. Useful for a single query.

Windows Boot Manager (BootMgr)

The Windows 7/Vista program that manages the initial startup of Windows. The BootMgr program file is stored in the C:\ root directory and has no file extension.

Ntldr

The Windows XP program responsible for starting Windows XP, called the boot loader program.

gpresult

The Windows command to find out group policies that are currently applied to a system for the computer or user.

xfs

The XFS file system was developed for Silicon Graphics IRIX operating system. An XFS file system is proficient at handling large files, offers smooth data transfers, and provides journaling. It also can reside on a regular disk partition or on a logical volume.

file association

The association between a data file and an application to open the file that is determined by the file extension.

file type (file format)

The characteristic of a file that determines the type of data it contains.

mapping

The client computer creates and saves a shortcut, called a network drive, to a folder or drive shared by a remote computer on the network. The network drive has a drive letter associated with it, which points to the network share.

TIMED_WAIT socket state

The client enters this state after FIN_WAIT_1

FIN_WAIT_2 socket state

The client just received an acknowledgement of its FIN_WAIT_1 from the server.

ESTABLISHED socket state

The client received the server's SYN and the session is established.

RJ-45

RJ stands for "registered jack". RJ-45 has 8 contacts that accept 8 wires, a.k.a. pins. Looks like a bigger version of RJ-11 (used for telephones).

Straight-through

RJ45 cable that is commonly used for network connectivity. Pins 1 and 2 transmit and Pins 3 and 6 receive.

Customer Relationship Management (CRM)

Refers to practices, strategies and technologies that companies use to manage and analyze customer interactions and data throughout the customer lifecycle, with the goal of improving business relationships with customers, assisting in customer retention and driving sales growth.

DMZ (demilitarized zone)

Refers to removing firewall protection from a computer or network within an organization of protected computers and networks.

Layer 2 switch

Resides on the data link layer, most common type of switch used on a LAN. Hardware based and use MAC address, but security is a concern.

ping -a

Resolves address to hostnames

Which of the below is not a process in the DHCP DORA? Discover Offer Response Acknowledge

Response Discovery Offer Request Acknowledgement

hard boot

Restart the computer by turning off the power or by pressing the Reset button. also called a cold boot.

Which protocol is responsible for generating encryption keys used by IPsec?

SA

what is the group pre Windows2000 name?

SAMAccountName attribiute

Types of fiber-optic connectors

SC (square connectors), LC (square connectors, similar to SC), ST (round connectors), and FC (uses a single round connector).

TCP/IP based programs

SMTP and FTP

ping -f

Sets Don't fragment flag in packet (IPv4 only)

Reason organizations need networks

Sharing, Communication, Organization, Money

STP Cabling

Shielded twisted pair. Originally only available in Category 4 (Cat4), which was used by the now outdated IBM Token-Ring Networks. It uses the same RJ-45 connector as a UTP, but includes a metal shield for electrical insulation between wire pairs and the outer jacket. It's durable, but more expensive, and hard to bend into tight spaces. STP cabling is also available in Cat5, Cat5e, and Cat6 for use with Ethernet networks. It's used where electromagnetic interference prevents the use of a UTP cable; STP protects itself against interference with metal shielding and a grounding wire.

TCP/IP

Short for "Transport Control Protocol/Internet Protocol." It's the most common multiplatform protocol used for both Internet access and LANs. It is a suite of protocols used on the Internet to route and transport information.

Bluetooth

Short-range low-speed wireless network designed for peer-to-peer communication between PCs, printers, and handheld devices. (check table of classes & ranges)

Static vs. server-assigned WINS configuration

Static: IP addresses for one or more WINS servers must be entered if enabled. Server-assigned: can use DHCP to resolve WINS if necessary.

Static vs. server-assigned DNS configuration

Static: IP addresses of one or more DNS servers, host name, and domain name have to be entered Server-assigned: Automatically assigned by DHCP server.

NETSTAT -s

Statistics grouped by protocol -IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP and UDPv6

Apply consistent, scalable, and reproducible security settings throughout an enterprise.

What are the key benefits of security templates?

Unrestricted, Disallowed, and Basic User

What are the three default security levels within software restriction policies?

Application, Security, and System

What are the three primary event logs?

User AND Computer

What are the two categories of security settings within Group Policy? Select two answers.

User Accounts control panel and the Local Users and Groups snap-in for MMC

What are the two interfaces available for creating and managing user accounts in Windows Server 2012?

User Accounts control panel and the Local Users and Groups snap-in for MMC

What are the two interfaces for creating and managing local user accounts a computer joined to the domain?

User Account Control (UAC)

What did Microsoft introduce in Windows Server 2012 to ensure users with administrative privileges still operate routine tasks as standard users?

Switch

What do you use to create VLAN?

VLAN

What do you use to isolate a group of computers within your organization?

Network intrusion attempts, such as a denial of service attack

What does a firewall protect your company against?

16,384 KB

What is the default size for each of the three Event logs?

RJ45

What is the most common adapter or connector used to connect a computer to a wired network?

switch

What is the most common central device used today to connect computers to a network?

Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously

What is the most common way to implement software restriction policies?

To permit traffic in and out for legitimate users, and to block the rest

What is the primary objective of a firewall?

Administrators can log successful and failed security events, such as loss of data, account access, and object access.

What is the purpose of the Audit Policy section of a local GPO?

Importing the security template into a GPO

What is the simplest way to deploy a security template on several computers simultaneously?

80

What is the typical incoming port number for a web server?

IP Address

What is used to uniquely identify a host on a TCP/IP network?

Session

What layer in the OSI model is responsible for logging on and off?

Presentation

What layer in the OSI model is used to encrypt data?

Setting up network share in XP when simple file-sharing option is disabled

What makes it different from simple share is: you can comment on the name to give more detail; you can set a max number of users that can see the doc; more specific permissions configuration; and control of caching of offline files to their computers by other users.

CSMA/CA

What mechanism do wireless networks used to access the network?

OSI Reference Model

What model is used to describe how data communication occurs between host?

Distributive Computing

What model promises the most processing power?

Scope

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies?

Protocol and Ports

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the exact type of traffic at the network or transport layer, which the firewall can block or allow?

Action

What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule?

Program

What parameter in the Windows Firewall New Inbound Rule Wizard specifies whether the rule applies to all programs, to one specific program, or to a specific service?

Restricted Groups policy

What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?

1701

What port does L2TP use?

DHCP

What protocol automatically configures IP configuration for a client?

IPSec

What protocol is used with L2TP to provide encryption?

Application Identity

What service does AppLocker require running to function properly?

Windows Installer

What service works with Group Policy to install, upgrade, patch, or remove software applications?

802.3

What standard describes CSMA/CD (collision detection)

VPN

What technology can you use temporarily to connect networks from two different companies?

Stateful

What technology used in firewalls keeps track of connections so that it knows what to allow back into the network?

User Accounts Control Panel

What tool for creating new users is only valid while the Windows Server 2012 computer is part of a workgroup and not joined to an AD DS domain?

Local Users and Groups snap-in

What tool for user creation provides full access to all local user and group accounts on the computer?

Windows Firewall With Advanced Security snap-in for the Microsoft Management console

What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?

Unicast

What type of communication is sent to a single designated host?

Circuit-level gateway

What type of firewall works on the session layer that creates a connection and allows packets to flow between the two host without further checking?

network controller

What type of server does Active Director run on?

DMZ

What zone is used to publish external websites for an organization?

permission propagation

When Windows passes permissions from parent objects to child objects.

DNS client

When Windows queries the DNS server for a name resolution, which means to find an IP address for a computer when the fully qualified domain name is known.

address reservation

When a DHCP server assigns a static IP address to a DHCP client. For example, a network printer might require a static IP address so that computers on the network can find the printer.

measured service

When a cloud computing vendor offers services that are metered for billing purposes or to ensure transparency between vendors and customers.

Start up folder

Windows Vista~ contains a list of programs that open automatically when you boot the computer.

Last Known Good Configuration

Windows, registry settings and device drivers that were in effect when the computer last booted successfully. These settings can be restored during the startup process to recover from errors during the last boot.

Most popular Lan

Wired-computers and other devices are wired together using copper-based twisted-pair cables RJ45 plugs on each end.

WAP

Wireless Access Point. A device that enables connectivity between computers with wireless network adapters to create a wireless network. The WAP is basically a switch, but for wireless connectivity rather than wired networks.

WEP

Wireless Equivalent Privacy. An older wireless network security standard, succeeded by WPA. It prevents unauthorized users from getting into the network, and is only used today if the hardware of a computer isn't compatible with WPA. Without it, if someone knows the SSID, they can join the network. It is encrypted with a WEP Key, which is basically a password with either 10 (64-bit encryption) or 26 (128-bit encryption) alphanumeric characters.

You need to connect three wireless networks together. An 802.11a, and 802.11g, and and 802.11n. Which wireless toll should you use to accomplish this task.

Wireless bridge

Give an example of two Network Analyzers

Wireshark Microsoft Network Monitor.

Which of the below two tools can be used to capture and analyze traffic? Wireshark Kiwi syslog dumpster diving tcpdump

Wireshark/tshark /dumpcap can use tcpdump filter syntax as capture filter. As tcpdump is available on most *NIX system I usually use tcpdump. Depending on the problem I sometimes use tcpdump to capture traffic and write it to a file, and then later use wireshark to analyze it.

TCP/IP Configuration when manual configuration is used

With manual configuration under the general tab of Internet Protocol Properties, you have to manually input the iP address and DNS server addresses. Under IP address, you must input the IP address, subnet mask, and default gateway. Under the DNS server addresses, you must input the preferred DNS server and the alternate DNS server.

Traceroute Utility

You can use it to determine where the communication fails. Issue the cmd from the local machine to see how far the trace gets before you receive an error message. Using the IP address of the last successful connection you will know where to begin troubleshooting the problem.

You can disable the setting area that is not configured for faster processing.

You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?

network documentation

You have a key network administrator leave a company. Therefore what does the company depend on to continue to use the network?

You use a laptop and tablet that sync with your OneDrive repository. You were working late one night, and you decided to do a little cleanup of your files. A few days later, you realized that you deleted a couple of reports that were in your sync folder for OneDrive. Describe how to recover those files.

You need to log on to the OneDrive website and access the Recycle Bin. The files will be kept in the Recycle Bin for 30 days. You can then review the documents and select which ones to restore.

In which of the following situations would restoring from a system image be the best option?

You need to restore a Windows system after a catastrophic hard drive failure.

Connecting a LAN network to the Internet

You need two things: an Internet access device, and a router. The Internet access device uses a broadband connection to connect to the Internet (i.e. cable, DSL phone line, etc.). A router is then connected to the Internet access device, and it routes data requests from each PC in order to give the correct data back to the PC that requested it.

Given that you are using a Windows 10 system, in which of the following situations would reverting to a System Restore point be the best option?

You recently installed a new application and now the system behaves erratically.

file system

The hierarchy of folders and files an operating system uses to organize files.

Network topology

The physical arrangement of computers in a network.

NETSTAT -r

The routing table

ext2

The second extended file system supports Access Control Lists to control individual permissions, but it does not support journaling.

LAST_ACK socket state

The server is in this state when it sends its own FIN.

LISTEN socket state

The server is ready to accept a connection

SYN_RECEIVED socket state

The server just received the synchronize flag set (SYN) from the client

CLOSED socket state

The server received an acknowledgement (ACK) from the client and the connection is closed.

Group policy

a collection of settings (policies) stored in Active Directory on a Windows network.

bcdedit

a command used to manually edit the BCD (Boot Configuration File)

bootsect

a command used to repair a dual boot system.

bootrec

a command used to repair the BCD (Boot Configuration Data) and boot sectors.

Stand-alone operating systems

a complete OS that works on a desktop computer, notebook, or mobile device. Some are client operating systems bc they work in conjunction with a network OS

client machine

a computer that is normally used by a company's end users

VPN - Virtual private network

a connection between two or more computers or devices that are not on the same private network.

router

a device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another

system repair disc

a disc you can create using Windows 7 that can be used to launch Windows RE. (Windows Recovery Environment)

name resolution

a fully qualified domain name must be associated with an IP address before this computer can be found. This process of associating a character-based name with an IP address is called

object

a general term for a virtual thing in computing, such as user accounts, group accounts, folders, etc.

Ethernet

a group of networking technologies that define how information is sent and received between network adapters, hubs, switches, and other devices.

Network Interface Card (NIC)

a hardware component used to connect computers or other devices to the network to allow machines to communicate with each other

Media Center PC

a home entertainment personal computer that includes mid to high end processor, larger capacity hard disk, CD and DVD drives, remote control and advanced graphics and audio capabilities.

Windows Recovery Environment (Windows RE)

a lean operating system installed on the Windows 7/Vista setup DVD and also on a Windows 7 hard drive that can be used to troubleshoot problems when Windows refuses to start.

link (local link)

a local area network (LAN) or wide area network (WAN) bound by routers

domain

a logical grouping of objects into a distributed database within an organization

server

a machine that users connect to so they can access resources located on that machine

dual stack implementation

a means of transitioning to IPv6 that simply has both IPv4 and IPv6 installed

Teredo

a mechanism for transitioning to IPv6 that allows users behind a NAT to access the IPv6 address space by tunneling IPv6 packets

6to4

a mechanism to transition to IPv4 which treats the IPv4 address space as a logical link layer and creates a point-to-point connection

L2TP

a more secure VPN that is gaining in popular due to the inclusion of IPsec

local area network (LAN)

a network bound by routers or other gateway devices

Open System Interconnection (OSI) model

a network model in which communications are divided into seven layers; each layer performs a specific task or tasks and builds upon the preceding layer until the communications are complete

hexadecimal

a notation used with IPv6 to represent 8 bits using the values 0 to 9 and A to F

intranet

a private computer network or single Web site that an organization implements in order to share data with employees around the world.

If the error count is high, it could be....

a problem with the card, or could indicate generally high network traffic.

Spyware

a program placed on a computer without the users knowledge that secretly collects info about the user often enters when a user installs a new program

Search utility

a program that attempts to locate a file on your computer based on criteria you specify.

Application

a program that runs "on top" of the operating system or from a server, and helps a user perform a specific task, such as word processing, appointment scheduling, or accounting. Some applications are included with Windows—such as Notepad for simple text editing or Internet Explorer for browsing the Web.

driver

a program that tells operating system how to communicate with a device

trust

a relationship between a parent and child domain that allows users to be granted access to resources in the larger domain

soft boot

To restart a PC without turning off the power, for example, in Windows 7, by clicking Start, pointing to Shut down, and clicking Restart. also called warm boot.

Voltage Event Recorders

Tool used in conjunction with or in addition to a voltmeter to test and verify that the electrical signals transmitting through the network cables are within the required specifications.

phishing

a scam in which a perpetrator attempts to obtain your personal and/or financial info. Phishing filters warn or blocks you from potentially fraudulent websites

buffer

a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.

Layer 6: Presentation

Translates data format from sender to receiver in the OS Data compression and encryption operate on this layer

Layer 3: Network

Translates logical addresses to physical addresses. Routers/IP switches operate at this layer IP addresses & subnets are Network Layer components Measurement: packets

POST (power-on self test)

a self-diagnostic program used to perform a simple test of the CPU, RaM, and various I/O devices. The POST is performed by startup BIOS when the computer is first turned on, and is stored in ROM-BIOS.

DHCP server

a server running a service to automatically assign TCP/IP information to your computers

domain controller

a server that contains a copy of the Active Directory database

DNS server

a server that has a service running on it to resolve hostnames to TCP/IP addresses (forward lookup) and vice versa (reverse lookup)

standalone server

a server that is not a member of a domain; may be used for virtualization

member server

a server that is part of domain-based network, but which does not contain a copy of the Active Directory

Network Discovery

a setting that determines whether your Windows 10 system can locate other computers and devices on the network and if other computers on the network can see your computer

DMZ or perimeter network

a small network that is set up separately from a company's private LAN and the Internet, allows users outside a company LAN to access specific services located on the DMZ

printer driver

a small software program that prepares application data to print to a specific printer

NetBIOS

a software specification used for identifying computer resources by name as opposed to IP address

multicast address

a special IPv4 address that one or more devices will listen for by joining this type of group; first octet will be between 224 and 239

Folder

a specific named location on a storage medium that contains related documents

Long Term Evolution (LTE)

a standard for wireless communication of high-speed data for mobile phones and data terminals

PAT - Port address translation

a subset of NAT which translates both IP address and port numbers

TCP/IP

a suite of protocols that had evolved into the industry standard for network, internetwork, and Internet connectivity

NAT (Network Address Translation)

a technique designed to conserve the number of public IP addresses needed by a network

netsh

a tool that administrators can use to configure and monitor Windows computers from the command prompt.

TCP

Transmission Control Protocol. TCP sessions are known as connection-oriented sessions. Basically, it constantly checks that every data packet sent from one computer to another. If the receiving computer never receives the data packet, this protocol tells the sending computer to send it again. (check table)

Fiber-optic cabling

Transmits signals with light instead of electricity - no interference. Two types: single mode (thin core between 8-10 microns, carries single ray of light long distances) and multi mode (thicker core of 62.5 microns, carries multiple rays shorter distances).

TLS

Transport Layer Security. The successor to SSL.

Gateways

Web security gateway - Can block malicious content in real time Enable higher level of defense by examining content through application-level filtering Examples of blocked web traffic: ActiveX objects Adware, spyware Peer to peer file sharing Script exploits TCP/IP malicious code attacks

Computer Configuration\Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security

What GPO node presents the interface with which to configure Windows Firewall properties?

classful network architecture

What IPv4 classification system is known as class A,B,C,D,E

Windows 7 and Windows Server 2008 R2 or later

What Windows versions support the use of AppLocker polices, which poses a disadvantage compared to using software restriction policies?

Guest

What account is created during Windows Server 2012 installation with the account disabled by default?

Proxy Server

What acts as a middleman that translates between internal and external addresses and that caches previously accessed web pages so that it can provide those more quickly in the future?

110 Block Type of punch down block

aka Cable Termination block used for structured wiring systems. Supports higher bandwidth than 66 block and is suitable for use in data applications.

Butt set

aka Lineman's test set: A special type of telephone handset used by telecom technicians when installing and testing local lines.

Cable Tester

aka Media Tester: An electrical instrument that verifies if a signal is transmitted by a cable.

Perimeter network

aka as demilitarized zone DMZ-Small network that is set up separately from a company's private LAN and the internet.

Network Analyzers

aka packet or protocol analyzer or packet sniffer: a software or hardware tool that integrates diagnostic and reporting capabilities to provide a comprehensive view of an organizations network.

Stateless packet inspection SPI

aka pure packet filter, does not retain memory of packets that have passed through the firewall, more vulnerable to spoofing attacks

Tone Locator

aka tone probe: a device that emits an audible tone when it detects a signal in a pair of wires.

Multimeters

aka volt/ohm meter: An electronic measuring instrument that takes electrical measurements such as voltage, current and resistance. Can be analog (AMM) or digital (DVOM)

Mac OS X

available only for computers manufactured by apple, macintosh operating system has been model for most GUI's

You must also install the blank when installing the internet printing role service

both a and b

netsh

built in command line scripting utility that enables you to display and modify the network configurations of the local computer.

network location

collection of security settings that's appropriate for the type of network a user wants to connect to; Windows 7 offers three broad categories of these: Home, Work, and Public

ipconfig

command can be used to show the IP addresses assigned to all network connections

ipconfig

command displays information pertaining to your network adapter, namely TCP/IP configurations.

arp -a

command prompt that will show IP addresses and corresponding MAC addresses of remote computers.

ipconfig/release

command releases any IP configurations received from DHCP server

X.25

communications protocol was one of the first implementations of packet switching.

CTI-based server

company's telephone system meets its computer system, PBXs, and VOIP

diagnostic utility

compiles technical information about hardware and some software, prepares report outlining problems. Windows Vista~ Problem Reports and Solutions

stateless configuration

configuration that is a newer option with IPv6; means that the clients create their own IP information based on information from the router

stateful configuration

configuration that is currently used with IPv4 and is an option for IPv6; means that the DHCP is going to give clients on the network all of their TCP/IP data

infrastructure mode connection

connecting to a network through a wireless access point or router

ad hoc connection

connecting two PC's together directly rather than through an access point or router

UDP (User Datagram Protocol)

connectionless TCP/IP protocol that works at the OSI Transport layer and does not require a connection to send a packet or guarantee that the packet arrives at its destination. The protocol is commonly used for broadcasting to multiple nodes on a network or the Internet

multiuser operating system

enables two or more users to run programs simultaneously. Networks, servers, mainframes, and supercomputers allow thousands of users to connect at the same time.

defragmenting

eorganizes files and unused space on hard disk so that programs run faster

Layer 2 - Data Link Layer

establishes, maintains, and decides how transfer is accomplished over the physical layer. Think-MAC address UOM= Frames

Mesh topology

every computer connects to every other computer; no central connecting device is needed

extranet

extended to users outside a company and possible to entire organizations tat are separate from or lateral to the company

Windows XP

fast, reliable windows operating system, available in five editions

you must add the blank role to use a WINDOWS server 2008 computer as a fax server.

fax server

Global routing prefix

first three groups of numbers and it defines the network of the address

Embedded operating system

found on most smart phones and small devices, resides on a ROM chip.

folder permissions

full control modify - read& execute list folder contents read write

file permissions

full control modify read & execute read write

by defualt what topology do replication groups use?

full mesh

what are the ways you can change group scopes?

global to universal, domain local to universal, universal to global, universal to domain local

to whom should always assign security permissions?

groups

Arp Options

inet_addr eth_addr if_addr -a -g -N if_addr -d -s inet_addr eth_addr

header

information at the beginning of an IP packet which contains information about IP version, source IP address, destination IP address, etc.

Packet filtering

inspects each packet that passes through the firewall and accepts or rejects it based on a set of rules.

Back-to-back configuration

involves DMZ situated between two firewall devices, which could be black box appliances or Microsoft Internet Security.

ntfs explicit move to same nfts partition

keeps explicit permission plus will inherit permissions assigned to parent volume or folder

Stateful packet inspection

keeps track of the state of network connections by examining the header in each packet, is able to distinguish between legitimate and illegitimate packets.

Upper layers of OSI model

layers 4-7, transport, session, presentation, and application, deals with protocols, compression, encryption, and session creation.

OSPF - Open Shortest Path First

link-state protocol that monitors the network for routers that have a change in their link state,meaning they were turned off, on and restarted, used in large networks

name the group scopes

local, Domain Local, Global and Universial

the simplest print architecture consists of one print device that is connected to one computer. this print devices si also know as a ?

locally attached print device

LED Indicators

located on network adapters, switches, routers, and cable and DSL modems can give you information about the status of the network connection.

workgroup

logical grouping of networked computers that can "see" each other on a network

Library

looks like an ordinary folder, but it is a virtual folder that simply points to files and folders in different locations on a hard disk, network drive, or external drive.

ntfs copy or move to fat 32

loose permission settings

Peer-to-Peer (P2P)

means each computer has an equal ability to serve data and to access data, just like any other computer on the network.

memory resident

means it remains in memory while the computer is running. The kernel is memory resident.

synchronous

means that there is a clocking circuit that controls the timing of communications between the different routers.

mapping a drive

method of creating a logical drive letter that allows easy access to a shared folder or drive on a computer

PPTP - Point-to-point tunneling protocol

more common VPN (virtual private network) but is a less secure option.

special permissions

more granular

Star topology

most common topology, each computer is individually wired to a central connecting device with twisted-pair cabling.

Straight through cable

most common type of patch cable, used to connect a computer to the central connecting device like a switch, usually a 568B on each end.

host name (computer name)

name of a computer (ex. www)

Which server is responsible for maintaining the list of DFS shared folders and responding to user request of those folders>

namespace server.

Which of the below command will help remove IP address from CLI? ipconfig removeIP netdom netsh

netdom Netdom is a command-line tool that is built into Windows Server 2008 and Windows Server 2008 R2.

File manager

performs functions related to file management. Windows Vista includes Document Explorer, Pictures Explorer, and Music Explorer.

PVCs are associated with Frame Relay, what does PVC stand for _________________________ Permanent Virtual Circuit Permanent Virtual Class Preferable Volunteer Circuit Passive Virtual Circuit

permanent virtual circuit (PVC) is a connection that is permanently established between two or more nodes in frame relay and asynchronous transfer mode (ATM) based networks. It enables the creation of a logical connection on top of a physical connection between nodes that communicate frequently or continuously.

effective permissions

permissions for an object, such as a folder, granted to a user or group based on the permissions granted through group membership and any permissions inherited from the parent object; Windows does not include share permissions as part of these

standard permissions

permissions grouped together for easy assignment

NTFS permissions

permissions that apply to users who log on locally or from across a network; these are set using the options on the Security tab in the Properties dialog box

explicit permission

permissions that are set by default when the object is created, or by user action.

Layer 1 - Physical layer

physical and electrical medium for data transfer, includes but is not limited to cables, jacks, patch pannels, punch blocks, hubs, and MAUs. UOM=Bits

Linux

popular,free,multitasking UNIX-type operating system. it is open source software- its code is provided for use, modification, and redistribution.

Nmap

port scanner, to scan for open ports on a computer

Virus

potentially damaging computer program, affects computer without user's knowledge. Programmer of the virus called virus author Malware

The most common use of a file screen is to

prevent users from storing unauthorized file types on the server

Firewalls

primarily used to protect a network from malicious attacks and unwanted intrusions

what hardware actually produces hard-copy documents on paper or other print media?

print device

BLANK is the only role service that is required when you add the Print services role?

print server

Which print service role installs the print managment console for (MMC) that enables administrators to deploy, monitor and manage printers throughout the enterprise?

print server

A computer communicates with a print device through which software interface?

printer

What converts the print jobs generated by applications into an appropriate string of commands for a specific print device/?

printer spooler

Propriety software

privately owned and limited to a specific vendor or computer model.

what is the first step in designing a file sharing stratdgey

projecting anticipated storage needs and percuring the correct server hardware and disk arrays to meet your needs

IGRP - Interior Gateway Routing Protocol

proprietary protocol used in large networks to overcome the limitations of RIP

Encryption

protects the contents of files and folders from unauthorized access.

IPsec - Internet Protocol Security

protocol within the TCP/IP suite tat encrypts and authenticates IP packets.

AH - Authentication Header

provides connectionless integrity and the authentication of data

ESP - Encapsulating security payload

provides connectionless integrity and the authentication of data but also confidentiality when sending data

Windows server system

provides developers with dynamic development tools that allow businesses and customers to connect via the internet

Web filtering software

restricts access to certain material o the web

restore program

reverses the process and returns backed up files to their original form

mke2fs -b

specifies the block size of the file system in Bytes (valid sizes are 1024, 2048 and 4096 bytes per block)

mkfs -b

specify block size (1024, 2048, 94 4096)

mke2fs -t

specify the file system type (i.e., ext2, ext3, ext4, etc.) that is to be created

File server

stores files for computers to share

child domain

subdomain of another domain

Live CD, Live USB

the CD or USB flashdrive is bootable.

3-leg perimeter configuration

the DMZ is usually attached to a seperate connection of the company firewall- 1 to company LAN -1 to the DMZ -1 to the Internet.

virtual memory

the OS allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. Slower than RAM

Plug and Play

the OS automatically configures new devices as you install them.

foreground

the active program, the one you are currently using.

Be aware of the categories of the 53 new auditing policy settings

• Account Logon • Account Management • Detailed Tracking • DS Access • Logon/Logoff • Object Access • Policy Change • Privilege Use • System • Global Object Access Auditing

Detailed Tracking, be aware of the following

• Process Creation- audits events generated when a process is created or starts. The name of the application or user that created the process is also audited. • Process Termination- audits events generated when a process ends. • DPAPI Activity- audits events generated when encryption or decryption request are amde to the Data Protection Application Interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. • RPC Events- audits inbound Remote Procedure Call (RPC) connections.

page

the amount of data and program instructions that can swap at a given time. The technique of swapping items between memory and storage is called paging- a time consuming process.

Swap file

the area of the hard disk that is used for virtual memory; swaps data, info, and instructions between memory and storage.

Communications subnetwork

the guts of OSI model transmission, consisting of layers 1 thru 3. Physical, data, network

unicast address

the type of IPv4 address that identifies a computer or device on a network; divided into network portion and host portion

A collection of setting in a quota template defines all of the following accept>

the user credentials under FSRM operates

Wireless access point (WAP)

this device acts as a router, firewall, and IP proxy, allows connectivity of various wireless devices such as laptops, PDAs, and tablets.

subnet mask

this identifies which part of an IP address is the network portion and which part is the host portion.

inherit

to method of gaining permissions in a file system; a folder with subfolders is considered the parent folder; the subfolders are considered child folders; after permissions are set on a parent folder, new files and subfolders that are created in the folder inherit these permissions

Uninstall application

to remove an application from your computer or network.

File Conversion utility

transforms the contents of a file or data from one format to another.

cold boot

turing on computer that has been powered off

swapon

turns on swap partition

Local Area Network (LAN)

two or more computers that exchange data, confined to a small geographic area usually one building.

Neighbors

two or more nodes on the same link

broadcast address

type of IPv4 address that is read by all hosts that hear it; since it won't go across a router, will be heard by only local devices; 255.255.255.255

Automatic Private IP Addressing (APIPA)

type of private range that was developed by Microsoft for use on small peer-to-peer Windows networks. Uses class B, auto assigns IP addresses.

Fiber Optic cable

used in longer distance runs, high data rate transfer, transmits light instead of electricity over glass or plastic.

Crossover cable

used to connect like devices to each other, computer to computer, or switch to switch. 568B on one side and 568A on the other

Wireless repeater

used to extend the coverage of a wireless network extends the signal out further, usually placed on the perimeter of the wireless network

subnet mask

used to specify which portion of the unicast IPv4 address defines the network value and which portion defines the unique host value; can be shown either as a dotted decimal (255.255.255.0) or as a slash notation (/24)

telnet

used to take control of a remote computer.

NSlookup Utility

used to test and troubleshoot domain name servers. it has 2 nodes. Interactive mode and non-interactive mode. It's available in UNIX and all Windows systems except Win9x and Win ME.

Universal groups contain?

users, Computers, Universal groups, Global groups from same domain and users, computers global groups and Universial groups from another domain in the same forest

global groups contain?

users, Computrs, Global groups from same domain

Ping

verify connectivity to other computers.

read

view folder details and attributes view file attributes open a file

when you have multiple circuits connected to a site, the entire circuit is known as a

virtual circuit

ntfs copy or move to same or differnt ntfs partition

will inherit permissions assigned to parent volume or folder

How do you establish an internet connection?

windows vista includes connect to a network wizard that guides user through setting up connection between computer and internet service provider

single user/multitasking

working on two or more programs that reside in memory at the same time

Circuit-level gateway

works on the session layer of the OSI model when a TCP or UDP connection is established, and hides information about a private network, but they do not filter individual packet

DHCP

works on two ports 67 and 68

Internet

worldwide system of connected computer networks, largest WAN in the world.

Assign

you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.

Publish

you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.

application file

A necessary file for running an application.

Port number 88 is used for which of the below protocols? NetBIOS Kerberos IMAP POP3

Kerberos Is a computer network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.

Symbian OS

an open source, multitasking operating system designed for smart phones.

Windows Server 2008

an upgrade to Windows server 2003 -For Itanium based systems- for computers with 64-bit processors that function as a web server -Standard- for the typical small-sized business network -Enterprise- for medium to large size businesses, including those with e-commerce operations -Datacenter- for businesses with huge volumes of transactions and large scale data bases Web Server 2008- for web server and web hosting businesses

Bitlocker Drive Encryption

another method of protecting data stored on a fixed drive in a Windows computer. BitLocker encrypts the entire drive, rather than individual files and folders. The complementary BitLocker To Go protects data on removable data drives, such as an external flash drive.

node

any device that connects to a network

intranet

any private network that uses TCP/IP protocols

mkfs -j

appends a journal to an ext2 file system

Private IP address

are hidden from the Internet and any other networks. usually behind a IP proxy or firewall device

Public IP address

are ones that are exposed to the internet; any computers on the Internet can potentially communicate with them.

Inherited permissions

are permissions that are given to an object because it is a child of a parent object.

Group Policy Object

are used by administrators to control users and computers on a network and to deploy applications, software updates, and security.

performance monitor

assesses and reports information about system resources and devices

Anycast address

assigned to a group of interfaces and are also most likely on separate host, but packets sent to such an address are delivered to all the interfaces in the group.

Boot drive

drive from which your personal computer boots. Drive C ( the hard disk) in most computers.

What is the command to add a group?

dsadd group GroupDN

What command can you use to retrieve a list of group members?

dsget group GroupDN

What command can be used to change group type and scope?

dsmod group GroupDN

What command can you use to move or rename a group?

dsmove ObjectDN

RIP - Routing Info Protocol

dynamic protocol tat uses distance-vector routing algorithms to decipher which route to send data packets.

Which of the following is the default windows server 2008 printing sharing configuration?

each client uses its own printer and printer driver

Ring Topology

each computer is connected to the network using a closed loop; done with coaxial cable. This is a pretty outdated concept

Install application

either at the local level or the network level. A local installation results in the software files running directly from a computer. Installing over a network generally means the software files are made available from an application server on a network. The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.

Messaging Server

email servers, but also fax, instant messaging, collaborative, and other types of messaging servers.

ipconfig/flushdns

empties the DNS cache

list folder content

includes all read actions adds ability to view folder content

ASCII

"As-key" American Standard Code for Information Interchange Seven bit encoding of Latin (English) alphabet, decimal digits, punctuation and control characters. Usually stored in one byte.

emergency repair disk

(1) In Windows 2000, a record of critical information about your system that can be used to fix a problem with the OS. The ERD enables restoration of the Windows 2000 registry on your hard drive. (2) In Windows XP, a bootable floppy disk that can boot the system, bypassing the boot files stored in the root of drive C.

ATA

(Advanced Technology Attachment): ANSI name for IDE standard. ATA-1, ATA-2, ATA-..

The below protocol is used to automatically assign or configure an IP address to a client. DNS ARP RIP DHCP

(DHCP) is a network management protocol used on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks

EIDE

(Enhanced IDE, also Expanded IDE) Adopted by ANSI in 1994 as ATA-2. A.K.A. Fast ATA

IDE

(Integrated Drive Electronics, also Intelligent Drive Electronics) Parallel interface with the controller embedded in device. ATA

CPU, Central Processing Unit, Processor

(Intel, AMD) - The semiconductor device that controls the system, does arithmetic and logic.

Low-level Format

(Physical Format): Format done by manufacturer to establish tracks and sectors on disk. Physical size for sector is larger, includes synchronization bits, error correcting codes,... ZBR: Zoned bit recording Provide LBA

Memory, Main Memory, RAM

(Random Access Memory) - Storage for data and program instructions using semiconductor devices.

Application-Aware Firewalls

(next-generation firewall or NGFW) - More "intelligent" firewall operates at higher level Identifies applications that send packets through firewall and then make decisions about application (vs. granular rule settings like destination port or protocol)

extend the schema

(v.) to change or expand the attributes of objects in a database, such as user's first name, last name, employee number, etc.

Zoned-Bit Recording (ZBR)

(zone-density recording, multiple-zone recording, ...)

BIT

- Binary Digit Place Values: 1 = 20, 2 = 21, 4 = 22, ...

Electrical Safety Rules

- Professionals should service high-power equipment. - Always disconnect b/f servicing - Work with a partner - Never bypass safety devices. - Use anti-static devices - Perform only the work for which you have sufficient training. - Do not attempt repair work when you are tired. - Do not assume anything w/o checking it out for yourself. -Do not wear jewelry or other articles that could accidentally contact circuitry and conduct current. - Wear rubber-soled shoes to insulate yourself from ground. - Suspend work during an electrical storm. - Do not handle electrical equipment when your hands or feet are wet or when you are standing on a wet surface. - Prevent static electricity from damaging components by standing on a totally insulated rubber mat to increase the resistance of the path to ground.

Demilitarized Zone (DMZ)

- Separate network located outside secure network perimeter Untrusted outside users can access DMZ but not secure network Most secure approach is have two firewalls

Background Processes

-Task Manager

NETSTAT Utility has several functions

- Use it to find out if TCP/IP based program is listening on the expected port. - Check statistics to see if the connection is good. -Use statistics to check network adapter error counts - Use it to display routing tables and check for network routing problems.

Time Domain Reflectometers (TDR)

- Used for detecting cable problems. -Sends an electrical signal out onto the wire and analyzes the signal on its return. -Can detect: bends, short circuits, connector problems, termination problems on coax networks. -Optical TDR

1. PPTP 2. L2TP 3. SSTP

1. MPPE 2. IPSec 3. HTTPS

1. Cat5e 2. Cat3 3. Cat5

1. 1 Gbps 2. 10 Mbps 3. 100 Mbps

1. 1 Kbps 2. 10 Mbps 3. 1 Gbps 4. 1000 Kbps

1. 1,000 bits per second 2. 10,000,000 bits per second 2. 1,000 Megabits per second 4. 1 Mbps

You must manually configure a computer with an IP address on the same network as a router. The router's interface is configured as 192.168.1.100 with a subnet mask of 255.255.255.0. Which two are valid IP addresses you could assign the computer?

1. 192.168.1.254 2. 192.168.1.5

1. The number of hops a packet must take from the source network to the destination network is...... 2. ...... is a common routing protocol that uses hop count

1. 4 2. RIP

1. Public network addresses 2. Multicast addresses 3. Private network addresses

1. 75.0.0.0 - 75.255.255.255 2. 244.0.0.0 - 239.255.255.255 3. 192.168.0.0 - 192.168.255.255

Network Technician's Hand Tools

1. A variety of screwdrivers and spare screws 2. Long-nose pliers 3. Small diagonal cutting pliers. 4. A small adjustable wrentch 5. A variety of wrenches or nut drivers. 6. A small AA or AAA flashlight 7. An anti-static wrist strap with clip

1. Proxy Server 2. Domain Name Server 3. DHCP 4. Remote Access Server

1. Caches web pages 2. Resolves a host name to an IP addresses 3. Distributes IP addresses 4. Authenticates a user from an external network

Types of Cable Testers and Certifiers

1. Certification Tester 2. Qualification Tester 3. LAN tester 4. Network cable certifier

1. 10.123.12.1 2. 130.34.3.223 3. 199.11.221.4 4. 224.2.200.35

1. Class A 2. Class B 3. Class C 4. Class D

What are three common forwarding methods used by LAN switches?

1. Cut-Through 2. Store-and-Forward 3. Fragment-Free

Which two of the following can be obtained from a DHCP server?

1. DNS serve address 2. IP address

Which two of the following WAN technologies are most commonly used to connect home devices to the Internet?

1. DSL 2. CATV

1. 802.11b 2. 802.11g 3. 802.11n 4. 802.11a

1. Frequency: 2.4 Ghz Data rate: 11 Mbps 2. Frequency: 2.4 Ghz Data rate: 54 Mbps 3. Frequency range: 2.4 Ghz or 5 Ghz Data rate: 65 - 600 Mbps 4. Frequency range: 5Ghz Data rate: 54 Mbps

The Network + Troubleshooting Model (7 steps)

1. ID the problem 2. Establish a theory of probable cause 3. Test the theory of determine cause 4. Establish a plan of action to resolve the problem and ID potential effects. 5. Implement the solution or escalate as necessary 6. Verify full system functionality and if applicable implement preventative measures. 7. Document finding, actions and outcomes.

The 4 monitoring levels supported by SNIPS are:

1. Info 2. warning 3. error 4. critical

What are two advantages of using mesh topology in a network?

1. It is self-healing and can still operate when one node breaks down 2. It is considered more reliable than other networks

In which directions can communications occur between layers of the OSI model?

1. Layer directly above 2. Peer layer in other networked computer systems 3. Layer directly below

1. The IP address tested in this ping is the ... 2.The equivalent IPv6 is .....

1. Loopback 2. ::1

1. 117.225.33.121/255.255.0.0 2. 117.225.33.121/255.225.255.0 3. 117.225.33.121/255.255.255.224 4. 117.225.33.121/255.255.240.0

1. Network: 117.255.0.0 Broadcast: 117.255.255.255 2. Network: 117.255.33.0 Broadcast: 117.255.33.255 3. Network: 117.255.33.96 Broadcast: 117.255.33.127 4. Network: 117.255.32.0 Broadcast: 117.255.47.255

1. A VLAN is typically configured on a router 2. A router is used to separate multiple networks 3. NAT is the mapping of a private LAN IP address to a public IP address

1. No 2. Yes 3. Yes

1. RARP resolves logical addresses to MAC addresses 2. DNS resolves host names to IP addresses 3. ARP resolves logical addresses to MAC addresses

1. No 2. Yes 3. Yes

1. The domain in-addr.arpa uses exchange records to perform revers name lockups 2. A secondary name server gets its data from another name server using a zone transfer 3. Entries in s HOSTS file on a local computer take precedence over DNS

1. No 2. Yes 3. Yes

Ping Responses

1. Normal - the computer responds w/ requested data 2. Destination unreachable - target computer was ID'd but unreachable by the default gateway. 3. Unknown host - target computer is unknown and is not reachable. 4. Destination does not respond - there is no response to the ping. 5. Network or host unreachable - routing table does not contain an entry for the network or host.

1.You must select .... to receive an IP address from the DHCP service on the router. 2. The DHCP service on the router can assign

1. Obtain an IP address automatically 2. the DNS server address

1. Leased Line 2. Circuit Switching 3. Packet Switching 4. Packet Switching 5. Packet Switching

1. PPP 2. ISDN 3. X.25 4. DSL 5. Frame Relay

What are three common LAN problem

1. Packet Collision 2. Incorrect Software Configuration 3. Media Issues

The ping Utility steps:

1. Ping the loopback address 127.0.0.1 2. Ping a specific system: to verify that is is running and is connected to the network. 3. Ping by IP address: to determine if is is a problem related to name resolution 4. Localize the problem: ping the local loopback address; ping the systems' own IP address; ping the address of the default gateway; ping the address of a remote host.

1. Hub 2. Layer 2 Switch 3. Router

1. Same as a Repeater 2. Uses MAC addressing to determine which port to forward a frame 3. Connects two networks using different protocals

1. Keeps conversation separate 2. User interface to the network 3. Specific voltage, media speeds, connector pin outs 4. ASCII, .jpg, mp3 5. Determines reliable or unreliable delivery 6. Combines bytes into frames; uses MAC addressing 7. Determines data route using logical addressing

1. Session Layer 2. Application Layer 3. Physical Layer 4. Presentation Layer 5. Transport Layer 6. Data Link Layer 7. Network Layer

1.You should use a ...... to connect each computer to the hub. 2. You should use a ...... to connect each hub to the switch

1. Strait Through cable 2. Crossover cable

1. The access you will use to securely connect your home computer to your company intranet is a ..... 2. What two things will ensure your connection is secure?

1. VPN 2. Authorization and Encryprtion

What is the primary advantage of implementing a dynamic routing protocol versus using static routing?

Adaptation

1. 64 Kbps 2. 128 Kbps 3. 45 Mbps 4. 622 Mbps

1. X.25 2. ISDN 3. Frame Relay T1 4. ATM

1. ipconfig/release is the command that deletes an IP address bound to an interface 2. dhcp renew is the command that acquires an IP address from a DHCP server 3. dhcp release is the command that deletes an IP address bound to an interface 4. ipconfig/renew is the command that acquires and IP address from a DHCP server

1. Yes 2. No 3. No 4. Yes

1.In a star topology, a bad cable affect only two interfaces. 2.In a star topology, failure of a central connectivity device does not bring down the entire network. 3.In a star topology, a central connection point allows for flexibility and scalability.

1. Yes 2. No 3. Yes

1. SMTP is a service that supports email 2. WINS resolves NETBIOS names to IP addresses 3. DNS and WINS perform the same service

1. Yes 2. Yes 3 No

1. A Firewall can be a hardware device 2. A Firewall can be a software package 3. A Firewall is a special room to protect servers

1. Yes 2. Yes 3. No

1. A layer 2 switch is also called a bridge 2. A switched floods ports if it does not know where to send a packet 3. A layer 2 switch uses routing tables

1. Yes 2. Yes 3. No

1. IPSec supports data integrity 2. IPSec supports data confidentiality 3. IPSec performs data compression

1. Yes 2. Yes 3. No

1. Layer 2 switches use MAC addresses 2. Layer 3 switches use IP addresses 3. Layer 3 switches can user MAC addresses

1. Yes 2. Yes 3. No

1. TCP is connection-oriented and reliable 2. UDP is connectionless and unreliable 3. IP is connection-oriented and reliable

1. Yes 2. Yes 3. No

1. ping n 2. ping t 3. ping l 4. ping 127.0.0.1

1. assigns a specific number of packets to transmit 2. Continuously pings a remote host until stopped 3. Specifies the size of the packet to transmit 4. Sends four packets to the local loopback dress

1. The security options shown are methods of wireless. 2. 3. 4.

1. authentication 2. WEP 3. WPA 4. WPA2

1. The name of the DNS server is ... 2. The IP address of the DNS Server is .....

1. hsd1.ut.comcast.net 2. 75.75.76.76

1.The command used to generate these results was ... 2.To solve the connectivity problem, you should clear the computer's memory by executing the ... command

1. ipconfig/displaydns 2. ipconfig/flushdns

192.168.1.0 1. The problem is ... 2. The solution is ...

1. no Default Gateway is configured 2. Assign a Default Gateway

1. The TCP/IP tool used to generate these results was ... 2. The results of shown indicate that the DNS server is ...

1. ping 2. unavailable

1. The physical topology of this network is a ... 2. The logical topology of this network is a ...

1. star 2. ring

ipconfig 1. The problem is ... 2. The solution is ...

1. the Default Gateway is incorrect 2. Change the Default Gateway

1. The TCP/IP tool used to generate these results was ... 2. The results of this contact indicate that the packet made ... hops to each the Louvre Museum website.

1. tracert 2. 15

Your ISP recently installed a T1 line. What is the maximum throughput in a T1 line?

1.544

Your ISP installed a T1 line. What is the maximum throughput of a T line

1.544 Mbps

1.Layer switches use routing tables 2.Layer switches use logical addresses 3.Layer switches use MAC addresses

1.No 2.Yes 3.Yes

1. Unsecured websites are accessed through port 80 by default 2. Public websites are accessed through port 25 3. Secured websites are accessed through port 443 by default

1.Yes 2.No 3.Yes

1.Crossover cable is used to connect similar devices: compute-to-computer, hub-to-hub, switch-to-switch, router-to-router 2.Strait through cable is used to connect dissimilar devices: computer-to-switch, hub-to-router 3. Rollower cable is another name for a crossover cable

1.Yes 2.Yes 3.No

1.The physical top logy of this network is a ... 2.An example that typically uses this topology is ...

1.star 2.ethernet

802.3

10 Mbps - 10Base5 - Thick coaxial

You need to set up computers on a Class A private network. Which of the following network IDs meet all of Class A private network?

10.0.0.0

802.3u

100 Mbps - 100Base-TX, 100Base-T4, 100Base-FX = TP using 2 pairs, TP using 4 pairs, Fiber optic

A cable that meets the 1000BaseT standard has a maximum length of ___.

100 meters

802.3Z

1000 Mbps or 1Gbps - 1000BASE-X - FIBER OPTIC

802.3ab

1000 Mbps or 1Gbps - 10GBASE-T - TWISTED PAIR

Bluetooth class 1

100mW, range of 100 meters (328 feet).

802.3AE

10Gbps - 10GBASE-SR, 10GBASE-LR, 10GBASE-ER, AND SO ON - FIBER OPTIC

This cable is a ... If the blue/blue white wire positions were swapped with the brown white/brown wire in the opposite connector, the cable would be a ...

10baseT/ 100baseTX Crossover Cable 10baseT/ 100baseTX/ 1000baseTXT4 Crossover Cable

802.11b

11 Mbps - 2 GHz

Using this kind of block system, multi-pair station cables are terminated allowing cross connection to other punch down locations.

110 Block

You need to subnet a 192.168.1.0 networking using a 255.255.255.248 subnet mask. What is 248 equal to in binary?

11111000

diagnostic loopback address

127.0.0.1

Which if the below are loopback addresses. Choose all that apply. 128.0.0.1 127.0.0.1 127.31.0.1 192.127.0.0

127.0.0.1 127.31.0.1 The IP address range 127.0.0.0 - 127.255.255.255 is reserved for loopback, i.e. a Host's self-address, also known as localhost address. This loopback IP address is managed entirely by and within the operating system.

Which of the following IP addresses is not routable?

127.0.10.4/8

How many bits is an IPv6 address?

128

IPv4 is a 32 bit system, allowing for approximately four billion addresses. IPv6 is a _______ bit system, allowing for 3.4 X 10^38 addresses.

128

An IPv6 address is __________ in length 32 bit 64 byte 128 bts 128 bytes

128 bts Larger address space. The main advantage of IPv6 over IPv4 is its larger address space. The length of an IPv6 address is 128 bits, compared with 32 bits in IPv4.

Bluetooth class 2

2.5 mW, range of 10 meters (33 feet).

Class A

255.0.0.0 - IP range 0-127

You can truncate IPv6 addresses to save time. The fully truncated version of 2001:4860:0000:2001:0000:0000:0000:0068 would be _______.

2001:4860:0:2001::68

___ is a valid IPv6 address that could be assigned to a host computer.

2003:dead:beef:4dad:23:46:bb:101

Class B

255.255.0.0 - IP range 128-191

FAT Directory Entry

32 Bytes File Name and Extension Attributes Creation Date & Time Access Date Update (Modified) Date & Time First Cluster File Size (in bytes)

Master, Slave

40 Pin Ribbon Cable, Separate Power Supply

MAC (Media Access Control) address

48-bit (6-byte) hardware address unique to each network interface card (NIC) or onboard network controller that is assigned by the manufacturer at the factory and embedded on the device

802.11g

54 Mbps - 2.4GHz

802.11a

54 Mbps - 5 GHz

802.11n

600 Mbps - 5GHz and 2.4GHz

2 main Types of punch down blocks

66 Block 110 Block

OSI model

7 layers which house different protocols within one of several protocol suites, how data communicates occur on computer networks.

Which of the below is a standard for Wireless devices? IEEE 802.1 q IEEE 802.3 IEEE 802.11 IEEE 802.3ab

802.11 IEEE 802.11 is a set of media access control and physical layer specifications for implementing wireless local area network computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands.

Your boss has asked you to connect three new laptops to the wireless network WLAN42. It runs at a frequency of 2.4 GHz, with a speed of Mbps. What IEEE 802.11 standard should you implement when connecting the laptops to the Wireless Access Point.

802.11g

The 802.3an Ethernet network runs at a speed of ____________ 10Mbps 100 Mbps 10 Gbps 1 Gbps

802.3an 2006 10GBASE-T 10 Gbit/s (1,250 MB/s) Ethernet over unshielded twisted pair (UTP)

System Partition

: Partition with O.S. These may not be the same. There may be more than one boot partition (to allow dual (or more) booting). There may be more than one system partition.

Track

: A circle on a disk below (or above) one read/write head (disk rotating, head fixed)

DHCPv6 server

A DHCP server that serves up IPv6 addresses.

DHCP client

A computer or other device (such as a network printer) that requests an IP address from a DHCP server.

Microfilter

A DSL filter that prevents interference between the DSL connection and other devices within the circuit, such as a telephone or fax machine.

Component Services (COM+)

A Microsoft Management Console snap-in that can be used to register components used by installed applications.

PC Reset

A Windows 8.1 feature that enables you to return your PC back to the original state it was in when you purchased it or first set it up

PC refresh

A Windows 8.1 reinstall option that allows you to keep your personal data, your Windows Store apps, your basic settings (mapped drives, drive letter assignments), and your personalization settings.

map

A Windows Recovery Console command used to display all drive letters, partition sizes, file system types, and relationships to actual physical hard drives on your computer.

bootrec

A Windows Recovery Environment troubleshooting and repair tool that repairs the master boot record, boot sector, or BCD store. It replaces the fixboot and fixmbr Recovery Console commands used in Windows XP and earlier operating systems.

Microsoft Terminal Services Client (mstsc)

A Windows command that allows you to start Remote Desktop Connection to remote in to your host computer using Remote Desktop.

tasklist

A Windows command that returns the process identifier (PID), which is a number that identifies each running process.

taskkill

A Windows command that uses the process PID to kill a process.

Network File System (NFS)

A Windows component that is a distributed file system used to manage shared files on a network.

Advanced Options menu

A Windows menu that appears when you press F8 when Windows starts. The menu can be used to troubleshoot problems when loading Windows. In Windows 7/Vista, the menu is called the advanced Boot Options menu.

NFTS permissions

A Windows method to share a folder or file over a network and can apply to local users and network users. The folder or file must be on an NTFS volume. Compare with share permission.

Remote Assistance

A Windows tool that allows a technician to remote in to a user's computer while the user remains signed, retains control of the session, and can see the screen. This is helpful when a technician is troubleshooting problems on a computer.

Remote Desktop Connection (RDC)

A Windows tool that gives a user access to a Windows desktop from anywhere on the Internet.

Memory Diagnostics

A Windows utility (mdsched.exe) used to test memory.

recimg.exe

A Windows utility that captures an image of your PC, after you install the applications and make any personal customizations, and stores it in a folder you specify.

System File Checker (SFC)

A Windows utility that verifies and, if necessary, refreshes a Windows system file, replacing it with one kept in a cache of current system files.

subfolder

A folder within another folder.

rapid elasticity

A cloud computing service that is capable of scaling up or down as a customer's need level changes.

Infrastructure as a Service (IaaS)

A cloud computing service that provides only the hardware, which can include servers, storage devices, and networks.

Software as a Service (SaaS)

A cloud computing service whereby the service is responsible for the hardware, the operating system, and the applications installed.

Platform as a Service (PaaS)

A clouding computing service that provides the hardware and the operating system and is responsible for updating and maintaining both.

Cylinder

A collection of all the tracks that lie above and below one another.

Directory (Folder)

A collection of files and directories (subdirectories).

Fox and the Hound

A combination of a tone generator and a tone locator.

hybrid cloud

A combination of public, private, and community clouds used by the same organization. For example, a company might store data in a private cloud, but use a public cloud email service.

cd

A command line argument used to change the current working directory in operating systems such as Unix, DOS, OS/2, AmigaOS (where if a bare path is given, cd is implied), Windows, and Linux.

netstat (Network Statistics)

A command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface (network interface controller or software-defined network interface) and network protocol statistics.

tasklist

A command-line version of the Task Manager

file server

A computer dedicated to storing and serving up data files and folders.

ping

A computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.

Server

A computer on the network that provides other computers (called clients or workstations) access to resources like disk drives, folders, printers, modems, and the Internet. These resources are called shared resources. There are different types of servers: mail servers store & distribute emails to clients, file servers store data & program files for clients, and application servers run tasks for clients. Servers are more powerful than the average workstation; they have SCSI or SATA RAID hard-drive arrays and larger amounts of RAM. Since servers aren't controlled by a single person, they're usually controlled remotely and have low-powered video.

Gateway

A computer or device like a router that provides a connection between a LAN and a WAN or the Internet. Computers that use a LAN connection to connect to the Internet must enter the IP address/addresses of the gateways if the computer doesn't use DHCP to obtain an IP address.

distributed database

A database comprised of at least two separate files that are in different locations on a network

registry

A database in which Windows stores its configuration settings.

Global Catalog

A database of all Active Directory objects; like an index

demarc

A demarcation point where the bldg.'s wiring ends and the telephone company's wiring begins. aka hand off

What is a Layer 3 Switch?

A device that performs functions similar to both a switch and a router

tone generator

A device that sends an electrical signal through one pair of UTP wires.

Smart Jack

A device that serves as the demarcation point between the end user's inside wiring and local access carriers' facilities.

switch

A device used to connect nodes on a network in a star network topology. When it receives a packet, it uses its table of MAC addresses to decide where to send the packet.

nbtstat

A diagnostic tool for NetBIOS over TCP/IP. Its primary design is to help troubleshoot NetBIOS name resolution problems.

dxdiag

A diagnostics tool used to test DirectX functionality and troubleshoot video- or sound-related hardware problems.

Internet Options

A dialog box used to manage Internet Explorer settings.

DNS (Domain Name System)

A distributed pool of information (called the namespace) that keeps track of assigned host names and domain names and their corresponding IP addresses.

NetBIOS over TCP/IP

A feature of Server Message Block (SMB) protocols that allows legacy NetBIOS applications to communicate on a TCP/IP network.

multiple input/multiple output (MIMO)

A feature of the IEEE 802.11n/ac standards for wireless networking whereby two or more antennas are used at both ends of transmissions to improve performance.

Recovery Console

A feature of the Windows 2000, Windows XP and Windows Server 2003 operating systems. It provides the means for administrators to perform a limited range of tasks using a command line interface. Its primary function is to enable administrators to recover from situations where Windows does not boot as far as presenting its graphical user interface. This feature is used to provide a way to access the hard drive in an emergency through the command prompt.

Quality of Service (QoS)

A feature used by Windows and network hardware devices to improve network performance for an application that is not getting the best network performance.

Subnets (Figure 7-13)

A figure. A computer is connected to subnet 186.98.34.0 that is then connected to a router connected to another subnet of 186.98.34.128. This subnet is connected to a router that is then connected to subnet 186.98.33.0.

DMZ With Two Firewalls (Figure 7-12)

A figure. An internal network with four computers is connected to a switch that is connected to a proxy server connected to a firewall. The firewall is to a DMZ which in turn is connected to a switch that is connected to a Web server and mail server. The DMZ is also connected to a second firewall that is connected to the Internet router that is connected to the Internet. The firewall is also connected.

data file

A file created by an application

file attribute

A file detail or setting that can be turned on or off.

system file

A file necessary for running the operating system.

executable file

A file that can perform tasks automatically when you open it.

Difference between hubs & switches

A hub takes the bandwidth provided by the Ethernet cable and divides it up amongst the computers it's connected to. For example, let's say we have 5 computers connected to a hub with a Fast Ethernet connection (100Mbps). This means that each computer only gets a bandwidth speed of 20 Mbps. A switch, however, provides the full speed to each port; so with a Fast Ethernet connection, each port gets 100Mbps of bandwidth. Both can be stacked (not enough ports, connect a hub to a hub/switch to switch for more ports).

tag

A keyword you associate with a file.

NetBIOS

A legacy suite of protocols used by Windows before TCP/IP

subscription model

A method of licensing software with a paid annual subscription where the software is installed on your local computer. For example, Office 365 uses a subscription model.

Wi-Fi Protected Setup (WPS)

A method to make it easier for users to connect their computers to a secured wireless network when a hard-toremember SSID and security key are used, and is considered a security risk that should be used with caution.

share permissions

A method to share a folder (not individual files) to remote users on the network, including assigning varying degrees of access to specific user accounts and user groups. Does not apply to local users of a computer and can be used on an NTFS or FAT volume. Compare with NTFS permissions.

OSI model

A model for understanding and developing computer-to-computer communication, it divides networking functions among seven layers.

File

A named or addressable collection of related data usually stored on secondary storage.

dig

A network administration command-line tool for querying Domain Name System (DNS) name servers. Dig is useful for network troubleshooting and for educational purposes. Dig can operate in interactive command line mode or in batch mode by reading requests from an operating system file. When a specific name server is not specified in the command invocation, it will use the operating systems default resolver, usually configured via the resolv.conf file. Without any arguments it queries the DNS root zone.

Peer-to-peer/mesh network

A network in which client computers share resources with each other as peers. Each computer has a different name for a resource depending on whether or not it's being accessed by the peer server or over the network. For example, if one computer is hooked up to an external drive and the other is hooked up to a printer, you can connect the two computers with a peer-to-peer network and print files from the first computer's external drive.

onboard NIC

A network port embedded on the motherboard.

Azure AD Join

A new Azure feature that registers devices and allows them to be accessible and managed by your organization

file path

A notation that indicates where a file is stored and includes the drive name and letter, folder and subfolders, and full filename.

port

A number assigned to a process on a computer so that the process can be found by TCP/IP.

Primary Partition

A partition designated in the MBR of the disk.

File System Partition

A partition that contains a file system (or something similar).

static IP address

A permanent IP address that is manually assigned to a computer

Sector

A portion of a track, typically with 512 bytes.

What is a VPN?

A secure tunnel used to pass data through the Internet

virtual private network (VPN)

A security technique that uses encrypted data packets between a private network and a computer somewhere on the Internet.

authentication server

A server responsible for authenticating users or computers to the network so they can access network resources.

DNS server

A server that uses a DNS protocol to find an IP address for a computer when the fully qualified domain name is known.

FTP server

A server using the FTP or Secure FTP protocol that downloads or uploads files to remote computers.

on-demand

A service that is available to users at any time. On-demand cloud computing means that service is always available.

cloud computing

A service where server-side virtualization is delegated to a third-party service, and the Internet is used to connect server and client machines.

protocols

A set of rules and standards that two entities use for communication.

CIDR notation

A shorthand notation for expressing an IPv4 address and subnet mask with the IP address followed by a / slash and the number of bits in the IP address that identifies the network.

ActiveXcontrol

A small app or add-on that can be downloaded from a website along with a webpage and is executed by a browser to enhance the webpage.

Troubleshooting model

A standardized step by steep approach to the troubleshooting process. A framework for correcting a problem on a network w/o introducing further problem or making unnecessary modifications to the network. The goal is to move in a methodical and repeatable manner through the troubleshooting process.

disk

A storage device for digital data.

FAT File Allocation Table

A table with an entry for each cluster on the disk. Cluster's entry can be 0x000 0x0000 0x00000000 Cluster is not in use. Free. 0xNNN 0xNNNN 0xNNNNNNNN Cluster is in use to store a file (or directory) and xxx... is the next cluster used for the file (or directory). (0x0002 < 0xNN... < 0x0FF...F8) A table with an entry for each cluster on the disk. Cluster's entry can be 0xFFF 0xFFFF 0x0FFFFFFF Cluster is in use to store a file and it is the last cluster for the file. EOF (End Of File) Other values (e.g. 0xFF8, 0xFFF8, 0x0FFFFFF8) Bad clusters

Wear-leveling algorithm

A technique for ensuring all blocks experience roughly the same number of write/erase cycles.

beamforming

A technique supported by the IEEE 802.11ac Wi-Fi standard that can detect the location of connected devices and increase signal strength in that direction.

port forwarding (port mapping)

A technique that allows a computer on the Internet to reach a computer on a private network using a certain port when the private network is protected by NAT and a firewall that controls the use of ports.

MAC address filtering

A technique used by a router or wireless access point to allow access to a private network to only certain computers or devices identified by their MAC addresses.

Open Database Connectivity (ODBC)

A technology that allows a client computer to create a data source so that the client can interface with a database stored on a remote (host) computer on the network. Also see data source.

Voice over LTE (VoLTE)

A technology used on cellular networks for LTE to support voice communication.

Clipboard

A temporary storage area in your computer's memory for files and content that is accessed when you copy or move data.

Wire crimper

A tool that attaches media connectors to the ends of cables. Used to trim the ends of a cable.

unicast address

A type of IPv6 address that represents a single interface on a device

wireless LAN (WLAN)

A type of LAN that does not use wires or cables to create connections, but instead transmits data over radio or infrared waves.

Users group

A type of Windows user account group. An account in this group is a standard user account, which does not have as many rights as an administrator account.

Backup Operators group

A type of Windows user account group. When a user account belongs to this group, it can back up and restore any files on the system regardless of its having access to these files.

FAT32

A type of file system, almost completely extinct due to it only supporting 4 GB of data.

FAT

A type of file system, seldom used today because it only supports 32 GB of data

Client/server network

A type of network model which uses dedicated servers such as Novell NetWare or Windows Server. The roles of each computer affects both the hardware and software in each computer on the network. Has advantages such as centralized administration, better sharing capabilities, scalability, and possibly increased security.

Power Users group

A type of user account group. Accounts assigned to this group can read from and write to parts of the system other than their own user profile folders, install applications, and perform limited administrative tasks.

Domain name

A unique alphanumeric identifier for websites. Example: www.informit.com. A domain name has three major sections: the top-level domain (.com, .org, etc.), the name of the site (informit) and the server type (www indicates a web server, ftp indicates an FTP server, mail indicates a mail server, and search indicates a search server).

Regsvr32

A utility that is used to register component services used by an installed application.

autochk

A version of Chkdsk that runs only on NTFS disks and only before Windows starts. This command cannot be run directly from the command-line. Instead, it runs in the following situations: 1.) If you try to run Chkdsk on the boot volume 2.) If Chkdsk cannot gain exclusive use of the volume 3.) If the volume is flagged as dirty

Solaris

A version of UNIX developed by Sun Microsystems, designed specifically for e-commerce applications.

Wireless Testers

A wifi spectrum analyzer used to detect devices and point of interference as well as analyze and troubleshoot network issues on a WLAN or other wireless networks.

wireless wide area network (WWAN)

A wireless broadband network for computers and mobile devices that uses cellular towers for communication. Also called a cellular network.

wireless access point (WAP)

A wireless device that is used to create and manage a wireless network.

Which network does the IP address 220.100.100.100 belong to? A. 220.100.100.0/24 B. 220.100.100.1/24 C. 255.255.255.0/24 D. 255.255.255.1/24

A. 220.100.100.0/24

Which subnet mask is valid? A. 255.255.255.240 B. 255.255.255.228 C. 255.255.255.164 D. 255.255.255.245

A. 255.255.255.240

In local area network (LAN) topologies, the primary media access methods are: (Choose two.) A. Contention B. Negotiation C. Kerberos D. Token passing

A. Contention D. Token passing Media contention occurs when two or more network devices have data to send at the same time. Because multiple devices cannot talk on the network simultaneously, some type of method must be used to allow one device access to the network media at a time. This is done in two main ways: carrier sense multiple access collision detect (CSMA/CD) and token passing.

The command-line tool used to list a host's active incoming connections is: A. NETSTAT B. IPCONFIG C. NSLOOKUP D. PING

A. NETSTAT, In computing, netstat is a command-line network utility tool that displays network connections for the Transmission Control Protocol, routing tables, and a number of network interface and network protocol statistics. Function: Print network connections, routing tables, interface statistics, masquerade connections, and multicast memberships

Which type of network covers the broadest area? A. WAN B. CAN C. LAN D. PAN

A. WAN A wide area network (WAN) is a network that covers a broad area (i.e., any telecommunications network that links across metropolitan, regional, national or international boundaries) using leased telecommunication lines.

A well designed sharing strategy provides each user with three resources. Which of the following is not a provided resource?

Access to thawspace for temporary storage

Which term best describes the technology that list only those files that you have permission to view when accessing file list through a shared folder?

Accessed based enumeration

Typically http://192.168.1.1 will be the address for?

Accessing the admin interface on a wireless modem.

Account Logon

Account Logon events help document domain attempts to authenticate account data, either to a domain controller or a local Security Accounts Manager (SAM), Unlike logon and logoff events, which track attempts to access a particular computer, events in this category report on the account database that is being used.

Account Management

Account Management settings can monitor changes to user and computer accounts and groups.

The protocol that maps IP addresses to a Media Access Control (MAC) address is: A. Internet Message Access Protocol (IMAP). B. Dynamic Host Configuration Protocol (DHCP). C. Routing Information Protocol (RIP). D. User Datagram Protocol (UDP). E. Address Resolution Protocol (ARP).

Address Resolution Protocol (ARP) The Address Resolution Protocol is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given network layer address, typically an IPv4 address.

NETSTAT -n

Addresses and port numbers in numerical form

Layer 3 Switches

Addresses using IP addresses instead of MAC addresses

Start menu or desktop

After deploying software by GPO using the Assigned option, where is the package made available for the user?

Windows Control Panel

After deploying software by GPO using the Published option, where is the package made available for the user?

Authorize the server

After you install DHCP servers and configure and activate a scope, what is the last step in installing a DHCP server?

Universal Naming Convention (UNC)

Always begins with backslashes, not forward slashes. Used for local networks only. \\computername\sharefolder\....\....

Uniform Resource Locater

Always has backslashes. http://www.grcc.edu/agc/schedule

principle of least privilege

An approach where computer users are classified and the rights assigned are the minimum rights required to do their job.

Recycle Bin

An area on your hard disk that holds deleted files until you remove them permanently.

Circuit Testers

An electrical instrument that is used for testing whether or not current is passing though the circuit. Plugs into socket and displays circuit status.

ticket

An entry in a call-tracking system made by whoever receives a call for help and used to track and document actions taken. The ticket stays open until the issue is resolved.

system image

An exact copy of the drives required for Windows to run

shortcut

An icon or tile that provides a quick way to perform an action such as opening a folder

Universal Plug and Play (UPnP)

An unsecure method a router can use to allow unfiltered communication between nodes on a private network.

gateway

Any device or computer that network traffic can use to leave one network and go to a different network.

TCP Model

Application Transport Internet Network Interface

A Priest Saw Ten Nuns Doing Pushups

Application presentations sessions transport network data link physical

OSI Model

Application presentations sessions transport network data link physical

This address is usually written in notation of four octets expressed in decimal and separated by periods.

IPv4

ext4

Ext4 is the latest version in the ext file system family. Ext4 can handle files up to 16 terabytes and disk sizes up to 1 exabyte.

Which two are published IEEE 802.11 wireless transmission standards? (Choose two.) A. 802.1 If B. 802.11g C. 802.11k D. 802.11m E. 802.11n

B. 802.11g E. 802.11n The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac.

Remote Admin share

Gives an administrator access to the Windows folder on a remote computer in a Windows domain.

What happens when an 802.11b node starts broadcasting within the range of an 802.llg access point? A. The access point will transmit, but the node will be unable to receive. B. A connection will be established, C. Both the node and the access point will be unable to transmit. D. The node will transmit, but the access point will be unable to receive.

B. A connection will be established, 802.11g hardware is fully backward compatible with 802.11b hardware.

VPNs are implemented to provide: A. A secure connection within a private network. B. A secure connection through public networks. C. Additional encryption by using IPSec. D. Additional security for selected computers.

B. A secure connection through public networks.

Teredo tunneling is a protocol that: A. Translates Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). B. Allows IPv6 connectivity through IPv4 devices. C. Provides VPN security. D. Dynamically allocates IPv6 addresses.

B. Allows IPv6 connectivity through IPv4 devices. Teredo tunneling is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts which are on the IPv4 Internet but which have no direct native connection to an IPv6 network.

Which of the following uses pointer records and A records? A. IDS B. DNS Server C. NAT Server D. IPS

B. DNS Server DNS records include: * A Address record * PTR Pointer record

The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients

B. Display a client's address

The ipconfig command will: A. Configure routers B. Display a client's address C. Display a client's broadcast mode D. Configure DHCP clients

B. Display a client's address ipconfig Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Attenuation in a wireless network signal is a result of: A. Number of wireless nodes connected. B. Distance from the access point. C. Interference from cellular phones. D. Encryption of the signal.

B. Distance from the access point. Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. attenuation is a natural consequence of signal transmission over long distances.

The topology of a local area network (LAN) is defined by the: A. Number of devices to connect. B. Physical and logical characteristics. C. Distance between workstations. D. Type of cable being used.

B. Physical and logical characteristics. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer network. Essentially, it is the topological structure of a network and may be depicted physically or logically.

The type of connector used on a 100BaseT Ethernet cable is: A. RJ-11 B. RJ-45. C. TNC. D. BNC.

B. RJ-45.

The ping tool is used to: (Choose two.) A. Determine the network portion of a host address. B. Self-test a host's own network interface. C. Determine whether a host is reachable. D. Manage a host's session when UDP is used.

B. Self-test a host's own network interface. C. Determine whether a host is reachable.

One reason to replace an unmanaged switch with a managed switch is to: A. Manage the routing tables. B. Support multiple VLANS. C. Reduce collision domains. D. Route between networks,

B. Support multiple VLANS. A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers. The major difference between the packet switching operation of a router and that of a Layer 3 switch is the physical implementation. In general-purpose routers, packet switching takes place using software that runs on a microprocessor, whereas a Layer 3 switch performs this using dedicated application- specific integrated circuit (ASIC) hardware.

You ping a server by using fully qualified domain name (FQDN) and do not receive a response. You then ping the same server by using its IP address and receive a response. Why do you receive a response on the second attempt but not on the first attempt? A. PING is improperly configured. B. The DNS is not resolving. C. The DHCP server is offline. D. NSLOOKUP is stopped.

B. The DNS is not resolving.

Which of these factors has the biggest impact on data transmission speed in a wireless network? A. The access method used for the network B. The transmission standard of the equipment used C. The use of strong encryption for transmissions D. The transmission wattage rating used on the NIC

B. The transmission standard of the equipment used

Which of the following uses a tunneling protocol? A. Internet B. VPN C. Extranet D. VLAN

B. VPN

Which type of network is most vulnerable to intrusion? A. Dial-up B. Wireless C. Broadband D. Leased line

B. Wireless Insecure Wi-Fi is the easiest way for people to access your home network, gleech your internet, and cause you serious headaches with more malicious behavior.

BIOS

Basic Input/Output System- firmware that contains the computers start up instructions.

Unified Threat Management (UTM) Security Appliances

Because different types of network security hardware each provide a different defense, network may require multiple devices for comprehensive protection Makes cumbersome to manage multiple devices Unified Threat Management (UTM) - Security product that combines several security functions

Enterprise Resource Planning (ERP)

Business process management software that allows an organization to use a system of integrated applications to manage the business and automate many back office functions related to technology, services and human resources.

Stateful Filtering

Benefits Added efficiency in terms of packet inspection - existing connections only checked against state table, no need to check the rule set If matched with the state table, no need to do "deep packet inspections" or DPI to detect such attacks as malware, buffer overflows, spam, intrusions and DDOS. Stateful filtering is also called shallow packet inspection.

Straight-through cable

Both ends of the cable are wired the same way. Used to connect a computer to a hub/switch.

all its rules, including the preconfigured rules and the ones you have created or modified

By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.

ext3

By layering it atop the ext2 file system, the third extended file system (ext3) supports journaling, so it has faster startup and recovery times. However, because it is tied to ext2, it doesn't offer the full performance capabilities available through a pure journaling file system. This

What are the only scope changes that you cannot make directly?

Global to domain local, or domain local to global

When a client's DHCP-issued address expires, the client will: A. Select a new address and request approval from the DHCP server. B. Require manual configuration with a static IP address. C. Attempt to obtain a new address by broadcasting. D. Continue to use the address until it is notified to stop.

C. Attempt to obtain a new address by broadcasting.

A computer that has an IP address of 169.254.0.1 cannot access the network. Which of the following services should you confirm is available? A. WINS B. DNS C. DHCP D. TFTP

C. DHCP

Which technology provides the highest bit rate? A. T1 B. El C. DS3 D. ISDN

C. DS3 A DS3 line (sometimes also referred to as T3) is a dedicated, high bandwidth, fiber circuit with a speed of 45 Mbps. Incorrect: Not A: T1, 1.544Mbps Not B: E1, 2.048Mbps Not D: SDN 30B+1D (all 64K) ~ E1: 1.930Mbps

At what layer in the OSI model are hardware addresses referenced? A. Network B. Application C. Data link D. Physical

C. Data link The data link layer is divided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer manages communications between devices over a single link of a network.

Two companies want to share data by using the Internet. Which type of network provides the solution? A. Ethernet B. Intranet C. Extranet D. Perimeter

C. Extranet An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.

What type of DNS record maps host names to addresses? A. Mail Exchanger (MX) DNS record B. Service (SRV) DNS record C. Host (A) DNS record D. Canonical (CNAME) DNS record

C. Host (A) DNS record

A node within a local area network (LAN) must have a network interface device and a: A. Network account B. Table of all network nodes C. Host address D. Resource to share

C. Host address In network addressing, the host address, or the host ID portion of an IP address, is the portion of the address used to identify hosts (any device requiring a Network Interface Card, such as a PC or networked printer) on the network.

Which command is used to verify that a server is connected to the network? A. IPCONFIG B. ROUTE C. PING D. CHECK

C. PING The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination computer and waiting for a response.

A Media Access Control (MAC) address identifies a/an: A. UPnP device. B. Local broadcast domain. C. Network interface card (NIC). D. Local area network (LAN).

C. Network interface card (NIC).

A network that separates an organization's private network from a public network is a/an: A. Firewall B. Extranet C. Perimeter D. Internet

C. Perimeter In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted network, usually a larger network such as the Internet.

You need to divide a network into three subnets. Which device should you use? A. Hub B. Bridge C. Router D. Segmenter

C. Router You can use a router to divide your network into subnets.

Which type of port is used to support VLAN traffic between two switches? A. Virtual port B. WAN port C. Trunk port D. LAN port

C. Trunk port Trunk links are required to pass VLAN information between switches.

Which wireless authentication method provides the highest level of security? A. Wired Equivalency Privacy (WEP) B. IEEE 802.lln C. WI-FI Protected Access (WPA) D. IEEE 802.11a

C. WI-FI Protected Access (WPA) WPA aims to provide stronger wireless data encryption than WEP. Wi-Fi Protected Access (WPA) is a security protocol and security certification program developed by the Wi-Fi Alliance to secure wireless computer networks.

Repeater

Carries signals further than normal.

What is the least expensive options that meets this requirement?

Cat5e

Categories of Multimeters

Category I - Conditions where current levels are low. Category II - Interior residential branch circuits Category III - Distribution panels, motors and appliance outlets. Category IV - High-current applications ie..service connections, breaker panels for wiring mains, and household meters.

Network and Sharing

Centralized location to manage network connections and network security.

Resolving Bad Connector issues

Check and replace the faulty connectors. Verify that the cables are properly secured to the connectors and are properly crimped.

Resolving Bad wiring issues

Check and replace the wires that are in bad condition.

Resolving DB loss issues

Check the cables for defects or damage, crimpling and connection with the connectors. ID and remove sources of interference.

Event Viewer

Check the logs for error messages to help you investigate all kinds of hardware, security, and system problems.

Resolving TXRX reversed issues

Check the network port indicators on the system, if the link light is off there is an issue w/ the network adapter. replace the network adapter.

POST- Power On Self Test

Check the various system components including the buses, system clock, adapter cards, ram chips, mouse, keyboard, and drives.

You need to set up 750 computers on the same network. Which IP class is the best option?

Class B

Multicasting

Class D is used for multicasting transmitting data to multiple computers

In IP address v4 the 1st octet in the range of 224-239 indicates which Class IP address? A C E D

Class D: A 1 - 126* B 128 - 191 C 192 - 223 D 224 - 239

Which of the below is a valid Private IP address in the B class? Choose all that Apply 172.33.20. 20 172.26.20.20 172. 16.20.20 192.168.0.0

Class Private IP Address Subnet Mask A 10.0.0.0 to 10.255.255.255 255.0.0.0 B 172.16.0.0 to 172.31.255.255 255.240.0.0 C 192.168.0.0 to 192.168.255.255 255.255.0.0

public cloud

Cloud computing services provided over the Internet to the general public. Google or Yahoo! email services are examples of public cloud deployment.

resource pooling

Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand.

Partition

Collection of consecutive sectors within a volume. A volume can be part of disk or be built from several disks. A volume can contain a partition or partitions. A partition can contain a volume. A partition can contain partitions.

Volume

Collection of sectors that an O.S. can use for storage.

Memory Diagnostics

Command Prompt. Use it to test memory.

net

Command in Windows that allows users to view a network without knowing the names of the other computers on that network

copy

Command in the command-line interface for making a copy of a file and pasting it in another location.

xcopy

Command in the command-line interface used to copy multiple directories at once, which the copy command could not do.

md (mkdir)

Command in the command-line interface used to create directories.

del (erase)

Command in the command-line interface used to delete/erase files.

format

Command in the command-line interface used to format a storage device.

rd (rmdir)

Command in the command-line interface used to remove directories.

Wireless Network Policies (IEEE 802.3)

Computer Configuration node security settings include several security areas. Which of the following is NOT one of them?

Proxy server

Computer or application that intercepts and processes user requests: If previous request has been fulfilled a copy of Web page may reside in proxy server's cache If not, proxy server requests item from external Web server using its own IP address

Ring topology

Computers are connected either by a physical ring, or by a logical ring. The computers are physically connected as a continuous ring, passing information down the circle.

Peer-to-peer (Mesh) topology

Computers can connect directly to every other computer. Used by computers with multiple network adapters, Wi-Fi when configured for peer-to-peer mode, and Bluetooth.

Star topology

Computers connect to a central hub/switch (wired) or access point (wireless). This topology is used by 10BASE-T (10Mbps Ethernet), 100BASE-T (Fast Ethernet), 1000BASE-T (Gigabit Ethernet), or Wi-Fi when configured for default infrastructure mode. Computers can connect directly to each other.

Bus topology

Computers share a common cable. Connections in this topology are usually made with coaxial 10BASE2 or 10BASE5 cables. If a single computer goes down, the whole network goes down.

Windows Aero

Computers with more than 1 GB of RAM. provides an enhanced visual look, additional navigation operations, and animation.

Your IT Director wants to group all of the Administrative Assistant's computers so they can communicate as if they were on the same network. The challenge is that they are located on different subsets. What should you do?

Configure a VLAN

Wake-on-LAN

Configuring a computer so that it will respond to network activity when the computer is in a sleep state.

SYN_SEND socket state

Connection is active and open

SNY packet

Contains information regarding the return path for the data.

Master Boot Record (MBR)

Contains the partition table and the master boot program used to locate and start the BootMgr program.

Switches store the MAC to port translation mapping in a table know as MAC table. It is also known as CAM table. What does CAM stand for? Content Addressable Memory Control Access Media Converged Address Memory Control Address Memory

Content Addressable Memory CAM stands for Content Addressable Memory. It is a type of table where fixed-length addresses are kept for fast lookups. Since MAC addresses are fixed length, CAM tables are used to store MAC addresses and their related information. For most purposes, you can think of them as the same thing called by different names.

convert

Converts a drive from FAT or FAT32 to NTFS w/o losing any data Important Options: convert C: /fs:ntfs

The default subnet mask for a Class B network is: A. 0.0.0.255 B. 0.0.255.255 C. 255.0.0.0 D. 255.255.0.0

Correct Answer: D 255.255.0.0

mkswap

Create a swap partition. A swap partition is the location on the hard drive where an operating system writes memory information when it runs out of RAM

mke2fs

Create an ext2, ext3, or ext4 file system

mkfs

Create an ext2, ext3, or fat file system

To connect similar devices like, switch to switch, what type of cable is used ? Console Crossover Cable Straight through Rolled Cable

Crossover Cable used to connect like devices to each other, for example, a computer to another computer, or a switch to another switch.

Which cable type is used to connect two like devices, such as two computers or two hubs?

Crossover cable

You need to connect two switches together. Which type of cable should you use?

Crossover cable

Physical Connectivity Issues

Crosstalk Near end cross talk Attenuation Collisions Shorts Open impedance mismatches Interference Bad modules (SFPs, GBICs) Cable problems Bad cables/improper cable Types

Which of these addresses is a multicast address? A. 127.0.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 224.0.0.1

D. 224.0.0.1 A. 127.0.0.1 = loopback B. 169.254.0.1 = APIPA C. 192.168.0.1 = Class C D. 224.0.0.1 = Multicast

What is the default subnet mask for a Class C Internet network? A. 255.255.255.252 B. 255.255.255.240 C. 255.255.255.192 D. 255.255.255.0

D. 255.255.255.0

The maximum throughput of an 802.llg network is: A. 2.4 GHz. B. 54 GHz. C. 2.4 Mbps D. 54 Mbps.

D. 54 Mbps. The 802.11g standard for wireless networking supports a maximum bandwidth of 54 Mbps.

Which of these represents the Internet Protocol version 6 (IPv6) loopback address? A. 127.0.0.1 B. 192.168.0.1 C. FEC0:A8C0::AA01 D. ::1

D. ::1 The IPv4 addresses we are all used to seeing are made up of four numerical octets that combine to form a 32-bit address. IPv6 addresses look nothing like IPv4 addresses. IPv6 addresses are 128 bits in length and are made up of hexadecimal characters.

One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.

D. Reduce the number of nodes in a broadcast domain. Explanation/Reference: VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

One reason to incorporate VLANs in a network is to: A. Increase the number of available IP addresses. B. Increase the number of available Media Access Control (MAC) addresses. C. Reduce the number of broadcast domains. D. Reduce the number of nodes in a broadcast domain.

D. Reduce the number of nodes in a broadcast domain. VLANs provide the following advantages: * VLANs enable logical grouping of end-stations that are physically dispersed on a network. ... * VLANs reduce the need to have routers deployed on a network to contain broadcast traffic. ... * Confinement of broadcast domains on a network significantly reduces traffic. By confining the broadcast domains, end-stations on a VLAN are prevented from listening to or receiving broadcasts not intended for them. Moreover, if a router is not connected between the VLANs, the end-stations of a VLAN cannot communicate with the end-stations of the other VLANs.

Which of the following determines the media access method that is used in a network? A. Number of hosts connected to the network B. Number of domain servers on the segment C. Maximum speed of the media D. Topology and protocols

D. Topology and protocols

Which technology can you use to extend an internal network across shared or public networks? A. VLAN B. Microsoft ASP-NET C. Microsoft .NET Framework D. VPN

D. VPN VPN is a network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.

A service that resolves NetBIOS names to IP addresses is: A. Domain Name Service (DNS). B. Internet Service Provider (ISP). C. Address Resolution Protocol (ARP). D. Windows Internet Name Service (WINS).

D. Windows Internet Name Service (WINS). Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.

The top-level domain of www.adventureworks.com is: A. www B. adventureworks C. adventureworks.com D. com

D. com

the distributed file system DFS implemented in the windows server 2008 file service rol includes two technologies. DFS namespaces and ?

DFS replication

You are a consultant for a small business that is just starting up. They will have a file server, FTP server, email server, and web server for employees. They will have a firewall with 3 interfaces. Where should they put the file server?

DMZ

3-leg perimeter configuration

DMZ is attached to a separate connections of the company firewall. one to the company-one to the DMZ - one to the Internet.

In the command line, you type: ping www.fusiontomo.com and get a reply from 68.178.232. 100. What service has been used to convert the domain name to the IP address?

DNS

The ____ service resolves host names to IP addresses.

DNS

What is used to remap private addresses to public addresses and back?

DNS

IETF - Internet Engineering Task Force

DNS is defined by

DS Access

DS Access events provide a low-level audit trail of attempts to access and modify objects in AD DS. These events are logged only on domain controllers.

It can be used to test resistances between cable endpoints or voltages inside a lower power system. It should not be used to service high power or high voltage power systems

DVM - Digital Volt Meter

SSD Memory Writing

Data can not be directly overwritten.

Detailed Tracking

Detailed Tracking events can be used to monitor the activities of individual applications to understand how a computer is being used and the activities of users on that computer.

Certification Tester

Determine whether a cable meets specific ISO or TIA standards (Cat5,6 or 7). Should be used if a network is wired with both copper and fiber.

UNIX

Developed in the early 1970s by Bell Laboratories. Used by power users because of its flexibility and power. Some professionals call UNIX a multipurpose OS bc it is both a stand-alone and network operating system.

Modem

Device that allows a computer (or, rarely, multiple computers) to access the Internet by changing digital signals of the computer to analog signals used by a typical landline. Slow, last resort option.

Intrusion Detection and Prevention

Device that can detect an attack as it occurs IDS systems can use different methodologies for monitoring for attacks IDS can be installed on either local hosts or networks Extension of IDS is an intrusion prevention system (IPS)

Router

Device that routes data from one network to another. Often integrated within a WAP or switch. Enables connections with individual high-speed interconnection points. Routes signals for all computers out of the LAN and onto the Internet.

DUN

Dial-up networking. Using an ordinary analog phone line to connect to the Internet.

Crossover cable

Different pin configurations on either end. Used to connect 2 computers together directly.

DSL

Digital Subscriber Line. Broadband Internet that uses telephone lines to carry Internet traffic at speeds as high as 768Kbps or more while letting you use your phone at the same time.

Your wireless network has 10 laptops and 14 connected to it. These are the only computers you want to allow on the network. What can you do to prevent additional computers from connecting to your wireless network?

Disable SSID broadcasting

DORA

Discovery, Offereing, Request, Acknowledge = DHCP sessions four step process

CHS Cylinder Head Sector

Disk access using cylinder, head and sector numbers. Now rarely used.

LBA Logical Block Address

Disk access using sector number. Sectors are considered numbered, starting at 0. Translation from LBA to CHS is done by drive. Usual means of addressing.

removable media

Disks that you insert or attach to a computer.

dir

Displays a list of files and subdirectories in a directory.

netstat -a

Displays all active connections and listening ports

dir /s

Displays files in specified directory and all subdirectories.

arp -N if_addr

Displays the ARP entries for the network interface specified by if_addr

nbtstat -c

Displays the NetBIOS name cache of the local computer

nbtstat -A [IP address]

Displays the NetBIOS name table of the remote computer specified by the IP address

nbtstat -a [remote name]

Displays the NetBIOS name table of the remote computer specified by the name.

ver

Displays the Windows version.

arp -a and arp -g

Displays the current ARP entries in the cache. Can add inet_addr to specify a particular IP address.

netstat -b

Displays the executables (binaries) involved in creating each connection or listening port. In some cases well-known executables host multiple independent components, and in these cases the sequence of components involved in creating the connection or listening port is displayed. In this case the executable name is in [ ] at the bottom, on top is the component it called, and so forth until TCP/IP was reached. Note that this option can be time-consuming and will fail unless you have sufficient permissions.

tree /f

Displays the names of the files in each folder.

Administrator

During the Windows Server 2012 installation, what account creation prompts you for the password?

DHCP

Dynamic Host Configuration Protocol. Automatically assigns IP addresses to hosts. These hosts could be computers, printers, servers, etc. In most SOHO (small office/home office) networks, the router uses DHCP to assign IP addresses to client computers. The ISP also uses DHCP to assign an IP address to your computer by way of the router. If you get your address from a DHCP server, you are getting it assigned dynamically, and it will change periodically. Sometimes, however, with an important device like a server or printer, the network administrator manually assigns an IP address. This is so everyone knows exactly what the IP address of that device is, and it doesn't change.

Layer 4: Transport

Ensures proper delivery with no errors. Takes apart and reassembles Messages Message acknowledgement and traffic control Measurement: Segments or Messages

To which IP configuration does the CIDR notation 192.168.1.1/25 refer? A. 192.168.1.1 255.255.255.64 B. 192.168.1.1 255.255.255.1 C. 192.168.1.1 255.255.255.32 D. 192.168.1.1 255.255.255.256 E. 192.168.1.1 255.255.255.128

E. 192.168.1.1 255.255.255.128

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail

E. mail

The host name of the fully qualified domain name (FQDN) mail.exchange.corp.nwtraders.com is: A. corp B. com C. nwtraders D. exchange E. mail

E. mail Hostnames are composed of series of labels concatenated with dots, as are all domain names. For example, let's break mail.google.com into its component parts: mail is the host or local hostname; and google.com is the domain or parent domain name.

Byte

Eight bit number. Usually expressed as two digit hexadecimal number. (When written in binary, group by four bits.) E.g. 0b1011 0011 = 0xB3 Storage location for an eight bit number. Measurement of storage capacity.

Support staff members have been complaining about the amount of time they are spending restoring selected users' files on their Windows 10 PCs. The users are pretty technically savvy and can perform the tasks themselves, but you don't want to give them administrative privileges on their PCs. Describe your recommended solution.

Enable File History on their Windows 10 PCs. File History does not require administrative privileges to set up and run. The user can decide when to turn it on and off, select the drive to use, and restore files without needing to contact support staff.

Telnet

Enables users to make a text-based connection to a remote computer or networking device and use it as if they were sitting right in front of it, rather than just downloading pages.

Interactive mode w/in nslookup utility

Enables you to query name servers for information about hosts and domains.

regedit

Enables you to view, search for, and change settings in your system registry, which contains information about how your computer runs.

2 bytes: 0x55 0xAA

End of Boot Record Footer

Name the default groups

Enterprise Admins( in forest root domain)-Member of the Admin of every domain in the forest giving it complete access to the configuration of all DCs. Schema Admin(container of forest root admin) -Owns and has full control of AD schema Administrators(built in container of each domain)-complete control of all DCs and can change membership of all admin groups in the domain. The admin group of the forest root domain is most powerful and can change membership of Enterprise Admins, Schema Admins, and Domain Admins. Domain Admins(user container of each domain)-Inherits all capabilities of the Admin group and by default is added to the Local Admin group. Server Operators(built in container of each domain) Account Operators(built in container of each domain)-Can create, delete or modify accounts for users, groups and computers located in any OU in the domain except the DC OU.

Step 4 of The Network + Troubleshooting Model

Establish a plan of action to resolve the problem and ID potential effects: Establish a plan of action b/f you start making changes, once you have determined the probable cause. Detail each step that you will take while attempting to resolve the issue.

Step 2 of The Network + Troubleshooting Model

Establish a theory of probable cause: Question the obvios

NETSTAT -e

Ethernet statistics

Loopback Wiring standards

Ethernet: Pin1 to 3 and Pin 2 to 6 T1: Pin 1 to 4 and Pin 2 to 5

shutdown

Executed within a command shell window, shutdown.exe is the command-line shutdown application that can shut down the user's computer or another computer on the user's network.

chkdsk /f

Fixes errors on the disk

ipconfig /flushdns

Flush the DNS resolver cache

local share

Folders on a computer that are shared with others on the network by using a folder's Properties box. Local shares are used with a workgroup and not with a domain.

Local Users and Groups

For business and professional editions of Windows, a Windows utility console (lusrmgr.msc) that can be used to manage user accounts and user groups.

Low-level Format (Physical Format)

Format done by manufacturer to establish (tracks and) sectors on magnetic media. Traditional sector standard size 512 bytes New alternate sector size for HDs: 4096 bytes 4096 bytes may be not be shown to O.S. O.S. sees 512 byte sectors.

Formatting

Formatting (High-level formatting): Establishing and initializing file system. May also include: Boot code Boot disk Boot partition Has boot loader Establishing O.S. System disk System partition Has O.S. Wiping disk (probably not done). Volume label FORMAT /fs:FileSys /v:VolumeLabel

64 bytes: Partition Table

Four 16 byte entries (three may be empty)

FCS errors

Frame Check Sequence: The extra characters added to a frame for detecting and correcting errors.

You have been hired to install a PAD/Router combination that uses a packet switched Internet connection. Which of the following technologies use packet Switching?

Frame Relay

Frame Relay and X.25 are a type of ___________________ WAN technology? Packet Switching Circuit Switching Network Switching Console switching

Frame relay is based on the older X.25 packet-switching technology that was designed for transmitting analog data such as voice conversations. Unlike X.25, which was designed for analog signals, frame relay is a fast packet technology, which means that the protocol does not attempt to correct errors.

The unit of measurement on a data link layer is _________________ Frames Bits Packets Segments

Frames FramesA frame is a digital data transmission unit in computer networking and telecommunication.

tree

Graphically displays the folder structure of a drive or path.

What are special IDE ties and name them

Groups for which the membership is controlled bY the OS: Anonymous login-connection between a computer and resources made without username and password Authenticated users-identities that have been authenticated. Does not include guest accounts. Everyone-includes authenticated users and guests. On computers running versions eali than W2K includes Anonymous login group Interactive-users accessing a resource while logged on locally to the computer hosting the resource as opposed to accessing the resource over the network. Also includes users logged on thru RDP connection. Network-users accessing a resource ove the network.

All of your users connect to Web sites using Internet Explorer. They usually type domain names such as www.microsoft.com. What protocol is initiated by default when they press Enter after typing the domain name.

HTTP

Port 80

HTTP= Hypertext Transfer Protocol

Layer 5: Session

Handles establishment, maintenance and termination between connections. Controls name and address database for the OS NetBIOS - operates at this layer

chkdsk (Check Disk)

Hard drive error detection and, to a certain extent, correction utliity in Windows. Originally a DOS command (chkdsk.exe); also the executable for the graphical Error-checking tool.

Controller, Disk Controller

Hardware (on or plugged into motherboard) for attaching disk.

firewall

Hardware and/or software that blocks unwanted traffic initiated from the Internet into a private network and can restrict Internet access for local computers behind it.

print server

Hardware or software that manages the print jobs sent to one or more printers on a network.

drive

Hardware that can retrieve and usually record data on a disk.

Environment Monitors

Hardware tools that ensure that environmental conditions do not spike or plummet temperature above or below equipment specifications.

Network Firewalls

Host-based application software firewall runs as program on one client Hardware-based network firewall designed to protected an entire network Both essentially same: to inspect packets and either accept or deny entry Hardware firewalls usually located outside network security perimeter as first line of defense

At the refresh interval

How are most Group Policy settings applied or reapplied?

Network Class B

IPv4 address class with address range of first octet between 128 and 191

AppLocker blocks all by default, except for those specified in Allow rules.

How does AppLocker handle all executables, installer packages, and scripts by default?

4

How many layers does the TCP/IP model have?

mkfs -t ext2 or mkfs.ext2

How to assign ext2

mkfs -t ext3 or mkfs.ext3

How to assign ext3

mkfs -t ext4 or mkfs.ext4

How to assign ext4

mkfs -t file_system_type

How to assign file system

mkfs -t msdos or mkfs.msdos

How to assign msdos

mkfs -t reiserfs or mkreiserfs

How to assign reiserfs

________________ is a device that regenerates the signal and every time data is sent via broadcast to other connected devices. Hub Router Firewall Switch

Hub A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

HTML

Hypertext Markup Language. The language used by web pages. Uses tags (text in angle brackets) to manipulate the text appearance, insert links, display pictures, and provide other features. Some are used alone and some in pairs. For example, <p> and </p> indicate the beginning and end of a paragraph, and <a href> </a> indicates the beginning and end of a hyperlink.

HTTPS

Hypertext Transfer Protocol over Secure Sockets Layer. Usually used for payment transactions or sensitive transactions in a corporate network to protect financial information. Sites secured with encryption schemes have the prefix "https://". Most browsers connecting to a secure site will have a closed padlock symbol.

HTTP

Hypertext Transfer Protocol. A protocol used by web browsers to access websites and content. An unsecured website uses the prefix "http://".

Ping is used to check network connectivity and it makes use of the _____________ protocol. IGMP RARP Proxy ARP ICMP

ICMP The Internet Control Message Protocol is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information .

Step 1 of The Network + Troubleshooting Model

ID the problem: question users, re-create the problem, ID the symptoms, and determine if anything has changed.

What group defines the DNS namespace

IETF

Which is the standards agency for TCP/IP?

IETF

Port 143

IMAP=Internet Access Message Protocol

Layer 3 switching uses Logical Addresses such as _____ to determine the destination of the packet.

IP addresses

Subnetting

IP addresses are 32-bit (4-byte) addresses with network address and host address Classful addressing - Split between the network and host portions on the boundaries between the bytes Subnetting or subnet addressing - IP address split anywhere within its 32 bits Instead of just having networks and hosts networks essentially can be divided into three parts: network, subnet, and host

public IP addresses

IP addresses available to the Internet

private IP addresses

IP addresses not available to the Internet

________is a feature in Windows that can used when want to make a server act like a router. RDP IP Sec DNS IP forwarding

IP forwarding

Class D

IP range 224-239

Class E

IP range 240-255, reserved for future use, but has giving way to IPv6 instead

Which is a protocol suite for securing Internet communications by authenticating and encrypting each IP packet of a data stream?

IPSec

The _________protocol is used to encrypt data in L2TP. PAP MS-CHAP IPSec DHCP

IPSec L2TP Layer 2 Tunneling Protocol

Basic Rate Interface( BRI) and Primary Rate Interface(PRI) in Digital technology is associated with _______________ IPSec ISDN PSTN Frame Relay

ISDN Integrated Services Digital Network is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

Resolving Split cables issues

Identify the split cables and replace them with compatible cables.

If users have slow links between their workstations and the software distribution point

If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should this method be avoided?

Which two statements are true about layer 2 switches?

If a switch does not know where to forward a fame, it floods it out all ports. Switches uses MAC address tables to determine where to forward frames.

The firewall does not block client-initiated network traffic by default.

If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond?

Public, private, and domain

If an administrator wants to enable the "Block all incoming connections, including those in the list of allowed apps" setting, to which of the firewall profiles does it apply?

What is the primary disadvantage of a bus topology?

If there is a problem with the cable, the entire network breaks down

Local Application

If you install an application directly onto a computer running Windows 7; it's considered to be a local application because it stays with that computer.

Full/half duplex

If your hardware permits, you can configure a network to run in full-duplex mode. In full-duplex mode, data is sent and received at the same time, which doubles the network speed. Half-duplex is the default mode where data is sent and received separately. The network and all of it's adapters need to support full-duplex, and a switch must be used, not a hub.

Step 5 of The Network + Troubleshooting Model

Implement the solution or escalate as necessary: Implement the plan of action step by step to fix the problem. Or, escalate the issue to the appropriate personnel.

Batch File

In DOS, OS/2, and also Microsoft Windows, this is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter.

Automatic Private IP Address (APIPA)

In TCP/IP version 4, IP address in the address range 169.254.x.y used by a computer when it cannot successfully lease an IP address from a DHCP server

octet

In TCP/IP version 4, each of the four numbers that are separated by periods and make up a 32-bit IP address.

ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)

In TCP/IP version 6, a tunneling protocol that has been developed for IPv6 packets to travel over an IPv4 network

Teredo

In TCP/IP version 6, a tunneling protocol to transmit TCP/IPv6 packets over a TCP/IPv4 network.

Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.

In Windows Firewall Customized Settings, there are three profiles (public, private, and domain). What differentiates these profiles from each other?

Registry

In Windows Vista, consists of several files that contain the system configuration information.

Recovery Console

In Windows XP, a lean bootable command-line operating system on the Windows XP setup CD that can be used to troubleshoot an XP boot problem.

hidden share

In Windows, a folder whose folder name ends with a $ symbol. When you share the folder, it does not appear in the File Explorer or Windows Explorer window of remote computers on the network.

Everyone group

In Windows, the Authenticated Users group as well as the Guest account. When you share a file or folder on the network, Windows by default, gives access to the Everyone group.

rule applies to all programs, to one specific program, or to a specific service

In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______.

Computer Configuration\Windows Settings\Security Settings\Application Control Policies\AppLocker

In what Group Policy objects container are AppLocker settings located?

Intrusion Detection and Prevention

Intrusion detection system (IDS) - Device that can detect an attack as it occurs IDS systems can use different methodologies for monitoring for attacks IDS can be installed on either local hosts or networks Extension of IDS is an intrusion prevention system (IPS)

Intranet

It is a private, scaled version of the internet, usually build and managed by a company.

Extranet

It is an intranet that allows small and select groups of people access. Not just anybody can have access to it.

Arp utility

It supports the arp service of the TCP/IP protocol. It enables the administrator to view the arp cache and add or delete cache entries.

_______________ is a unique identifier assigned by the manufacturer to a network adapter. This is written in hexadecimal and is of 6 octets. Gateway Address IP address MAC Address None of the above

MAC Address A media access control address of a device is a unique identifier assigned to network interface controllers for communications at the data link layer of a network segment.

Layer 2 switching uses _____ to determine which data path to use.

MAC addresses

Layer 2 switching uses ________ to determine which port will forward the frame

MAC addresses

One purpose of a perimeter network is to: A. Make resources available to the intranet. B. Link campus area networks (CANs). C. Link local area networks (LANs). D. Make resources available to the Internet.

Make resources available to the Internet.

Windows Boot Manager

Manages the initial startup of the OS.

ntfs

Microsoft operating systems use NTFS (New Technology File System). Linux can only read ntfs partitions created using Windows 2000 and later, and can write to NTFS file systems created with MS operating system prior to Windows 2000. However, utilities such as ntfsprogs may enable read/write access on all ntfs partitions.

Intrusion Prevention System (IPS)

Monitors to detect malicious activities like IDS does but also attempts to prevent them by stopping attack

Big-endian

Most significant bytes first Stored: 12 34 (two bytes) Interpreted: 12 34 Hex Value: 0x12 34 Stored: 56 78 9A BC (four bytes) Interpreted: 56 78 9A BC Hex: 0x56 78 9A BC

Big Endian

Most significant bytes occur first

UNICODE

Multibyte encoding of world's alphabets.

You need to set up a group of IPv6 network interfaces in such a way that each packet is delivered to each interface. You should implement _____ an address.

Multicast

A router is a device that functions primarily on the ______ layer of the OSI Model.

Network

A windows utility that is used to view and manage NetBIOS over TCP/IP(NetBT) status information.

NBTSTAT

Helpful in identifying problems that are specific to Windows computers that use NetBIOS naming.

NBTSTAT

Socket States

NETSTAT will display one of several states for each socket.

You suspect an issue with one of the ports on the firewall. If you decide to scan the ports, which is the appropriate tool to use?

NMAP

Which permissions do administrators typically use to assign storage space as well as modify permissions on a windows server 2008 file server?

NTFS

NBTSTAT utility

Name resolution: It can display NetBIOS name tables for both the local computer and remote computers and also the NetBIOS name cache. The table names enables you to verify the connection establishment. You can refresh the NetBIOS name cache as well as the names registered with the WINS server. Developed specifically as a NetBIOS diagnostic tool.

NAT

Network address translation. The process of modifying IP addresses as information crosses a router. It hides an entire range of IP addresses on the LAN - for example, 192.168.0.1 through 192.168.0.255. Whenever an IP address on the LAN wants to communicate with the Internet, the private IP is converted to the public IP of the router in order to access the Internet. This public IP is assigned to the router by the ISP. This both allows one IP to do the work for multiple IPs, and also protects the computers in the network by only exposing itself to the Internet instead of directly showing the world the client's private IP address.

Switch - Traffic Monitoring

Network administrator monitors network traffic to help identify and troubleshoot network problems Traffic monitoring methods: Port mirroring - Allows administrator to configure switch to copy traffic that occurs on some or all ports to designated monitoring port on switch Network tap (test access point) - Separate device installed on network

Command-line interface

Network administrators use it to configure devices, manage system resources, and troubleshoot network connections. type commands or press special keys to enter data and instructions.

Network Intrusion Detection System (NIDS)

Network intrusion detection system (NIDS) - Watches for attacks on network. NIDS sensors installed on firewalls and routers to gather information and report back to central device May use one or more of the evaluation techniques

Security Through Network Technologies

Network technologies can also help to secure network Two technologies: Network address translation Network access control

device-independent OS's

New trend, run on computers provided by a variety of manufacturers.

SATA (Serial ATA)

Nine pin interface with power connection built in.

You are analyzing Frame Relay frames and find that one message consisting of five packets was sent over three different circuits. The three circuits form a _______ circuit.

No change is needed

Object Access

Object Access events track attempts to access specific objects or types of object on a network or computer

Internet Control Message Protocol (ICMP)

One of the main protocols of the Internet Protocol Suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. This protocol can also be used to relay query messages.

Windows Boot Loader (WinLoad.exe)

One of two programs that manage the loading of Windows 7/Vista. The program file is stored in C:\ Windows\System32, and it loads and starts essential Windows processes.

Hop

One portion of the path between source and destination. Data packets pass through routers and gateways on the way. Each time packets are passed to the next device, a hop occurs. To see how many hops it takes to get from one host to another ping or traceroute/tracepath commands can be used.

community cloud

Online resources and services that are shared between multiple organizations, but not available publicly.

You are setting up a VPN that allows connections on inbound port 1723. What tunneling protocol will you use?

PPTP

Which of the below are tunneling protocol used by VPN? PPTP L2TP SFTP NNTP

PPTP: The Point-to-Point Tunneling Protocol is an obsolete method for implementing virtual private networks, with many known security issues. PPTP uses a TCP control channel and a GRE tunnel to encapsulate PPP packets L2TP: In computer networking, Layer 2 Tunneling Protocol is a tunneling protocol used to support virtual private networks or as part of the delivery of services by ISPs. It does not provide any encryption or confidentiality by itself.

fixmbr

Part of the Recovery Console that writes a new master boot record to a disk.

fixboot

Part of the Recovery Console that writes a new volume boot record to a volume.

Extended Partition

Partition which holds other partitions. Starts with a virtual MBR which has a partition table. Partitions within the extended partition may be secondary file system partitions or secondary extended partitions.

Boot Partition

Partition with boot code in VBR. Also called active partition.

Secondary Partition:

Partition within an extended partition.

CLOSE_WAIT socket state

Passive close. The server just received FIN_WAIT_1 from a client.

Cable Internet

Piggybacks off of the coaxial cable that brings in cable TV. It can reach download speeds anywhere from 2Mbps up to 50Mbps or faster. Upload speeds are usually about 10% of the download speed. Some providers use the same cable for both, but some use a splitter to separate cable TV and cable Internet signals and reduce interference.

Ping

Ping command tests TCP/IP connectivity to other hosts on the network, and checks the Internet connection to see if it's working properly. Ping is a more reliable way to check Internet connection than opening your browser because a misconfigured router can think your TCP/IP config. is incorrect. In order to check your Internet connectivity, connect to the Internet, open up a command-prompt window, and type "Ping (IP address here)" or "Ping (server name here)". Ping sends four data packets from your computer, and if your TCP/IP connection is working properly, you should get a response telling you how long it took for the signals to travel back and forth between the computer and the server. Having a high ping is bad, because it means you have a very long latency time, which indicates a slow connection.

ping -t

Ping continuously until stopped with Ctrl+C

MUT - black hole

Places in the network where incoming or outgoing traffic is silently discarded or dropped w/o informing the source that the data did not reach its intended recipient.

POTS/PSTN

Plain old telephone system

Self-installed DSL setup

Plug computer into RJ-45 jack on DSL modem. Attach RJ-11 cord from modem to two-outlet modular adapter which plugs into the RJ-11 wallplate. The second outlet in the adapter is connected to a microfilter, which is then connected to a telephone.

External modem

Plugs into serial or USB port. A serial/USB connection connects the external modem to the computer, and a phone line connects the computer to the Internet. There is a reset switch on some modems to reset the modem without resetting the computer.

POP3 protocol

Port 110

IMAP protocol

Port 143

FTP protocol

Port 21

SSH protocol

Port 22

Telnet protocol

Port 23

SMTP protocol

Port 25

RDP protocol

Port 3389

HTTPS protocol

Port 443

DNS protocol

Port 53

HTTP protocol

Port 80

Logical Connectivity Issues

Port Speed Port duplex mismatches Incorrect VLAN assignment Incorrect IP address Wrong gateway assignment Wrong DNS server assignment Wrong subnet mask Power Failure Bad/Missing Routes

robocopy

Powerful command-line utility for copying files and directories, even over a network.

__________Layer of the OSI takes care of the compression and encryption. Physical Session Presentation Transport

Presentation layer, Layer 6, which is primarily responsible for managing protocol and architecture. ... Some functions of the presentation layer include character-code translation, data conversion, data encryption and decryption, and data translation.

Advanced Boot Options Menu

Press F8 when Windows first Starts to load. Use several options on this menu to help you troubleshoot boot problems.

Bus

Principal data path within a system.

System Software

Programs that control or maintain operation of the computer

Firewall

Protects a computer from unwanted intrusion.

/? (Information)

Provides options and syntax for command line utlities and programs.

Digital Volt Meter (DVM)

Provides scales for reading voltage in both AC and DC and different resistances.

Insulation Displacement Connector is the technical name for a?

Punch Down tool.

Punch-down tool

Punches down individual wires into 110 IDC clips of an RJ-45 jack and patch panel. This is the termination at the end of the cable. You do it for the wall jack and for the patch panel (terminate on both ends).

nbtstat -R

Purges the cache and reloads static entries from the LMHOSTS file

Multicast address

assigned to a group of interfaces and are also most likely on separate hosts

private cloud

Services on the Internet that an organization provides on its own servers or established virtually for a single organization's private use.

What is the frame that is smaller than 64 bytes called? JUMBO RUNT TINY MICRO

RUNT In networks, a runt is a packet that is too small. For example, the Ethernet protocol requires that each packet be at least 64 bytes long. In Ethernet, which operates on the idea that two parties can attempt to get use of the line at the same time and sometimes do, runts are usually the fragments of packet collisions.

Define Backlink

Read only attribute that is automatically updated when it's corresponding forward link attribute changes

Mount

Ready a medium for use on a computer system. Physical (Disk, Thumb Drive, ...) Logical (Volume) Image Windows doesn't mount images. Tools will mount images. Plug and play (PnP) is essentially automounting.

Advantages of load-balancing technology

Reduces probability of overloading a single server Optimizes bandwidth of network computers Reduces network downtime

Your Windows 8.1 system has experienced a serious failure. You decide to use the advanced recovery options provided by the operating system to bring the system back to a unstable state. During the recovery process, you want to preserve as much data as possible including apps purchased from the Microsoft Store as well as your user's data files. Which option should you use?

Refresh Your PC

NETSTAT [interval]

Refreshes and redisplays the statistics specified in the command at the stated number of seconds specified in place of [interval] in the code syntax.

computer roles

Regarding security templates, a strategy plan should consider ______.

ipconfig /release

Release the DHCP lease

ipconfig /renew

Renew the DHCP lease

bootrec /fixmbr

Repairs critical disk structures. /fixmbr option writes the master boot record of the system partition using the master boot record compatibile with Windows 7. This operation does not overwrite the existing partition table.

fixmbr [device-name]

Repairs the master boot record of the boot partition. Device-name is an optional name that specifies the device that needs a new MBR. If this is left blank then the boot device is used. Only supported on x86-based computers

warm boot

See soft boot.

Connecting several computers together in a circle without the use of a hub or switch is using a _____ Topology.

Ring

Your Network Administrator has tasked you with installing a new PAD on the network. Which of the following devices is most similar to a PAD?

Router

Your Network Administrator has tasked you with installing a new PAD on the network. Which of the following devices is the most similar to a PAD

Router

Rule-Based Firewalls

Rule-based firewall uses set of individual instructions to control actions (firewall rules) Each firewall rule is separate instruction processed in sequence Rules stored together in one or more text files that read when firewall starts Rule-based are static in nature and cannot do anything other than what have been expressly configured to do

You need to run four Ethernet network drops. Each drop is approximately 125 feet/46.33 meters. An interference exists along the path of each drop. You need to ensure that interference is reduced. Which cable type should you use? A. STP Cat5e B. UTPCat5e C. Cat3 D. UTPCat6

STP Cat5e Cat5e, is an improvement on Cat5 cabling. It was made to support 1000 Mbps "gigabit" speeds, so in theory, it's faster than Cat5. It it also cuts down on crosstalk, the interference you can sometimes get between wires inside the cable.

Embedded Linux

Scaled down Linux OS for smart phones, ect

bootrec /ScanOs

Scans all disks for installations compatible with Windows 7 and displays the entries that are currently not in the boot configuration store.

sfc /scannow

Scans integrity of all protected system files and repairs files with problems when possible.

bootcfg /rebuild

Scans the hard disks of the computer for Windows XP installations and then displays the results.

SSH

Secure Shell. Allows data to be exchanged between comps. on a secured channel. More secure replacement to FTP & Telnet. Some protocols like SFTP (secure FTP) use SSH.

SSL

Secure Socket Layers. An encryption technology used by secured (https://) websites. To access a secured website, the broswer must support the same encryption level used by the site (usually 128-bit encryption) and use the same version of SSL (usually SSL version 2.0 or 3.0).

In the IP Sec the __________ generates encryption and authentication keys. SA AH ARP ESP

Security Associations (SA) provides the bundle of algorithms and data that provide the parameters necessary for AH and/or ESP operations. (ESP) Encapsulating Security Payloads

Name the two type of groups

Security and distribution

Standard Network Devices

Security functions of standard network devices can be used to provide degree of network security Hubs rarely used today due to security vulnerability and increased network traffic Switch - Data Link layer (Layer 2), Provide better security than hubs Router - Network Layer (Layer 3)

cold boot

See hard boot.

Map Network Drive dialog box

Select one of the available letters to assign to the shared drive/folder from the drop down menu, select the folder you want to map it to. Select "Reconnect at Login" if you want to connect to this drive automatically upon login (this should only be enabled if the server is always on, otherwise you'll just get an error message). Select "Connect Using Different Credentials" if you want to use a different username/password to connect to the shared resource.

ping -n <count>

Sends a specified number of echo requests

nbtstat -RR

Sends name release packets to the WINS server and then starts refresh.

Layer 7: Physical

Serves as backend of the end users applications Such as; FTP ,HTTP,POP3,SMTP

SSID

Service Set Identifier. A user-friendly name that identifies the wireless network. It's usually set on a SOHO router.

ipconfig /all

Show all TCP/IP details

msinfo32

Shows details about your computer's hardware configuration, computer components, and software, including drivers.

NETSTAT utility

Shows the status of each active network connection. Will display statistics for both TCP and UDP, including protocol, local address, foreign address and the TCP connection stat. Not the UDP stat b/c UDP is connectionless.

shutdown -r

Shutdown and restart the computer

restore points

Signposts in a system's history that enable you to return the system to an earlier state.

Network intrusion prevention system (NIPS)

Similar to active NIDS that monitors network traffic to immediately react to malicious attack

SMTP

Simple Mail Transfer Protocol. Used to send email from client system to email server, which also uses SMTP to relay the message to the receiving email server.

To send email messages what services does a windows server 2008 computer need to be running>

Simple mail transfer protocol

Which of the below modes are related to Fiber Optic Cable? Single Mode Multi Mode Fiber Mode RJ Mode

Single Mode Multi Mode

Cluster

Smallest logical unit of storage that may be accessed in Microsoft file system. Clusters begin after root directory (FAT 12, FAT 16) or FAT 2 (FAT 32). Addressed by cluster number. First cluster number is 2. (FAT file systems)

Sector

Smallest unit of secondary (external) storage that may be accessed (read or written) by O.S. Defined by hardware or low level formatting. Traditionally 512 bytes, future may be 4096 bytes. LBA Sectors are probably different for optical media (CDs, DVDs, etc.) if they exist.

Cluster

Smallest unit of storage that may be accessed in Microsoft file system. Defined by Microsoft O.S. (FAT, NTFS, exFAT). Must consist of one or more sectors. Purportedly a power of 2: 1, 2, 4, 8, ... Block in *NIX.

Sector

Smallest unit that disk is able to access (read or write), typically 512 bytes. Accessing data on a disk means specifying its sector or sectors. 4096 byte ("4K") sector disks exist

Socket

Software in an OS that connects an application with a network protocol.

Network zone

Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network?

Path

Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system?

Hash

Software restriction relies on four types of rules to specify which programs can or cannot run. What type relies on a value generated by an algorithm that creates a fingerprint of the file, which makes it impossible for another program to have the same value?

Certificate

Software restriction relies on four types of rules to specify which programs can or cannot run. What type uses a digital certificate to confirm its legitimacy?

expert system

Software that uses a database of known facts and rules to stimulate a human expert's reasoning and decision-making process.

Driver, Device Driver

Software used to operate a peripheral device. May be part of op. sys.

Host-Based Intrusion Detection System (HIDS)

Software-based application that runs on local host computer that can detect an attack as occurs HIDS relies on agents installed directly on system being protected Monitors: System calls File system access System registry settings Host input/output

Spam Filters On POP3 Server

Spam filters installed on POP3 server All spam must first pass through SMTP server and be delivered to user's mailbox Can result in increased costs of storage, transmission, backup, deletion Third-party entity contracted to filter spam All email directed to third-party's remote spam filter Email cleansed before being redirected to organization

Spam Filters On SMTP Server

Spam filters installed with SMTP server Filter configured to listen on port 25 Pass non-spam e-mail to SMTP server listening on another port Method prevents SMTP server from notifying spammer of failed message delivery

Application-aware proxy

Special proxy server that "knows" the application protocols that it supports (e.g., FTP proxy server implements the protocol FTP)

Web application firewall

Special type of application-aware that looks at applications using HTTP

System files

Specific operating system files that the BIOS searches for.

Network Security Hardware

Specifically designed security hardware devices Greater protection than standard networking devices Devices include network firewalls, spam filters, virtual private network concentrators, Internet content filters, Web security gateways, intrusion detection and prevention systems, and Unified Threat Management appliances

mstsc -v <IP address>

Specifies the specific remote computer to connect to via RDP

platform

The hardware, operating system, runtime libraries, and modules on which an application runs.

copy /y

Suppresses prompting to confirm you want to overwrite an existing destination file

A _____ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.

Switch

Routing and Switching Connection Issues

Switching Loop Routing loop Routing problem Proxy arp Broadcast storms Port configuration VLAN assignment Mismatched MTU/MUT blackhole

Open impedance mismatches

Symptoms: An echo on either the talker or listener end of the connection. Causes: Mismatching of electrical resistance. Resolution: Use TDR to detect. Collect and review data, interpret the symptoms, determine the root cause.

Bad cables/improper cable types

Symptoms: Cables that connect different parts of a network are cut or shorted. Causes: When the wire conductor comes in contact with another conductive surface, changing the path of the signal Resolution: Use cable testers. After you ID the source of the issue, move the cable to prevent it from coming in contact with other conductive surface.

Interference - (Electro Magnetic Interference -EMI)

Symptoms: Crackling, humming and static. Low throughput, network degradation, and poor voice quality. Causes: Radio Frequency (RF) interference - cordless phones, Bluetooth, cameras, paging systems, unauthorized APs and client in the ad-hoc mode. Resolution: Remove or avoid environmental interferences. Ensure adequate LAN coverage. Test area prior to deployment using tools such as spectrum analyzers.

Latency

Symptoms: Delay in data transmission on the network is very high. Causes: The signal strength is weak or the position of the wireless antenna is modified. Resolution: Verify that the wireless modem is functional. Change the antenna position to the position that gives the best performance. Ensure that your antenna is maintained at the same position.

Collisions

Symptoms: High latency, reduced network performance, and intermittent connectivity issues. Causes: occur on networks as nodes attempt to access shared resources. Resolution: Depends on the network. ie.. replacing a hub for a switch will fix it.

Incorrect encryption levels

Symptoms: If the encryption types or keys b/t two devices do not match, no connection is established. Causes: Improper configuration and different encryption types. Resolution: Ensure that security settings match between and among devices.

Port duplex mismatches

Symptoms: Late collisions, port alignment errors, and FCS errors are present during testing. Causes: Configuration errors. Occurs when the switch port and a device are configured to use a different set of duplex settings, or when both ends are set to auto negotiate the settings. Resolution: Verify that the switch port and device are configured to use the same duplex setting.

Distance

Symptoms: Low signal strength and throughput. Issues that can occur b/c of low signal strength include latency, packet loss, retransmission or transient traffic. Causes: The distance b/t two points causes this connectivity issue. The longer the distance b/t two devices the lower is the signal strength. Resolution: Add another access point to increase coverage. use a spectrum analyzer to determine coverage and signal strength.

Interference on a Wireless connection

Symptoms: Low throughput, network degradation, dropped packets, intermittent connectivity and poor voice quality. Causes: RF interference can be caused by a number of devices including cordless phones, bluetooth, cameras, paging systems, unauthorized APs, metal building framing, and clients in ad-hoc mode. Resolution: Remove or avoid environmental interferences as mush as possible.

Mismatched MTU/MUT black hole

Symptoms: MTU is inaccessible Causes: In case of a mismatch of the MTU, the TCP/IP connection handshake does not occur b/t the devices (routers) and the connection cannot be established. Resolution: Reconfigure the MTU to check whether the problem gets resolved. If not replace the device.

Incorrect frequency

Symptoms: No connectivity Causes: Devices must operate on the same frequency. 5GHz cannot communicate w/ 2.4GHz. Resolution: Deploy devices that operate on the same frequency.

Wrong DNS server assignment

Symptoms: No connectivity between devices Causes: A device is configured to use the wrong DNS server Resolution: Open TCP/IP properties and check the IP address of the DNS server listed for the client. Replace w/ the correct IP address and test connectivity.

Incorrect VLAN assignment

Symptoms: No connectivity between devices Causes: Devices are configured to use different VLANs Resolution: Reconfigure devices to use the same VLANs

Incorrect IP address

Symptoms: No connectivity between devices Causes: Either the source or destination device has an incorrect IP address. Resolution: Use Ping cmd to determine if there is connectivity between devices. Check IP addresses and empty the ARP cache on both computers.

Wrong subnet mask

Symptoms: No connectivity between devices Causes: Either the source or destination device has an incorrect subnet mask. Resolution: Use the ping cmd to determine if there is connectivity b/t devices. Check the subnet mask on both devices. Change the incorrect subnet mask to a correct one and test connectivity.

Wrong gateway assignment

Symptoms: No connectivity between devices Causes: The IP address of the gateway is incorrect for the specified route. Resolution: change the address of the gateway to the correct address.

Standard mismatches

Symptoms: No connectivity between devices. Causes: Devices are configured to use different standards such as 802.11a/b/g/n Resolution: Devices chosen to work together should use the same standard to operate.

SSID mismatches

Symptoms: No connectivity between devices. Causes: Devices are configured to use different ESSIDs. Resolution: Set the devices to use the same SSID. Ensure that the wireless client and the access point are the same.

Bounce

Symptoms: No or low connectivity b/t devices. Causes: Signals from device bounce off obstructions and are not received by the receiving device. Resolution: Move one of the devices to avoid obstructions. Monitor performance and check for interference.

Incorrect antenna placement

Symptoms: No or low signal and connectivity. Causes: The position of your antenna can negatively affect overall performance if placed incorrectly. Resolution: Alter the position of your antenna and monitor device performance.

Port Speed issues

Symptoms: No or low speed connectivity b/t devices. Causes: Ports are configured to operate at different speeds and are therefore incompatible w/ each other. Resolution:Verify that equipment is compatible and is operating at compatible speeds.

VLAN assignment

Symptoms: Nodes on the network cannot communicate w/ one another. Causes: By default, computers on different segments are added to different VLANs and they cannot communicate with one another unless the switch is configured to allow communication b/t computers on different VLANs. Resolution: Check the VLAN assignment on the switch console and reassign the computers to the VLAN to enable communication among them. Ensure that the IOS of the switch is updated to reflect the latest settings.

Routing problem

Symptoms: Packets do not reach their intended destination. Causes: This could be caused by configuration problems, route convergence, broken segments or router malfunctioning. Resolution: Verify that the router is functional. replace the router.

Port configuration

Symptoms: Port configuration is incorrect. Causes: The recent changes made to the port were incorrect. Resolution: On the system console of the switch, verify the port properties of the individual nodes and check their status. if needed restore the port configuration to is default setting from the last backup.

Near end cross talk

Symptoms: Signal loss or interference Causes: occurs near the terminating connector along the transmitting end of the cable. Resolution: Test with cable testers on both ends. verify the cable is terminated properly and that the twists in the pairs of wires are maintained.

Cross-talk

Symptoms: Slow network performance and excess of dropped or unintelligible packets. users hear garbled voice. Causes: two cables run in parallel and the signal of one cable interferes with the other. Crossed or crushed wire pairs in twisted pair cabling. Resolution: Use twisted pair cabling or use digital signals. Maintain proper distance b/t cables.

Attenuation

Symptoms: Slow responses from the network Causes: degradation of signal strength Resolution: For wired networks use shorter cable runs. For Wireless use more access points and signal boosters. Evaluate the environment for interference.

Incorrect switch placement

Symptoms: Switch performance is considerable reduced. Causes: There is a conflicting device in the range which is causing the interference. Resolution: Locate the conflicting device and move it to another location. if you can't then rework your network layout and determine a better position for the switch so that there is no conflict w/ the other devices. Monitor the switch performance periodically to prevent further occurrence of the issue.

Bad modules (SFPs, GBICs)

Symptoms: System console on the switch may use distinct colors ie.. amber or red to help you locate the faulty SFPs/GBICs. No communication through the faulty device. Causes: Modules in SFPs/GBICs get corrupted. Resolution: Replace the faulty SFPs/GBICs

Broadcast storms

Symptoms: The network becomes overwhelmed by constant broadcast traffic generated by a device on the network. Causes: There are too many broadcast messages being send parallelly causing high network traffic. Resolution: ID the device and reconfigure it to increase the interval of broadcast messages. On the network, apply restrictive settings to prevent network nodes from sending broadcast messages. Cisco uses Link Aggregation to prevent broadcast storm. Spanning Tree Algorithm can also be used.

Proxy arp

Symptoms: The proxy server is not functional. Causes: The proxy settings are misconfigured or down. may lead to DoS attacks. Resolution: Correct the proxy settings to resolve the issue.

Bad/Missing Routes

Symptoms: The router is sending packets using an invalid path. Causes: The router setting is incorrect. Resolution: Check and change the router setting and reboot the router for the changes to be effected.

Incompatibilities

Symptoms: The wireless device is not accessible from the client. Causes: The settings on the wireless device is not compatible with the clients. Resolution: Check the configuration of the wireless modem by accessing the web admin interface. Verify that the client systems can support the same configuration. ID the configuration supported on both the client and the server and apply the same on the wireless device and the client systems.

Incorrect channel

Symptoms: The wireless signal is not accessible even within the expected range. Causes: Most common cause could be another wireless device or application that operates at the same frequency level creating a conflict. Resolution: ID the conflicting device and move it to another location that is outside the reach of the Wireless access point. If you can't relocate it change the channel of one of the devices.

Power Failure

Symptoms: There is a power failure that affects switches and routers. Causes: Switch and router adapters connect to cable modems which depend on the availability of power. Resolution: Use cable modems and other network devices w/ battery backed power supplies to ensure that there is uninterrupted service of several hours in case of local power failures.

Routing loop

Symptoms: There is a routing loop on the network. Causes: Packets are routed in a loop. Resolution: Recheck the router configuration and adjust it to prevent a routing loop.

Switching Loop

Symptoms: There is a switching loop on the network Causes: Packets are switched in a loop Resolution: A switching loop needs STP to ensure loop free switching of data. Rework on the network arrangement and cabling to prevent the switching loop. Use Spanning Tree protocol - it will turn off those redundant links.

Channel congestion

Symptoms: Very slow speeds Causes: Interference from neighboring wireless networks; congested network channels. Resolution: Many wireless routers are set to autoconfigure the same wireless channel. log into the router and manually change the channel the wireless router is operating on.

Configurations

Symptoms: Wireless modem is active, but clients cannot access the Internet. Causes: Configuration of the wireless modem is incorrect. Resolution: Check wifi modem configuration via the web admin interface. Cehck the encryption type, SSID and pass phrase text that is specified and confirm that the wifi modem was rebooted after the configuration change. Check that the clients can support the same encryption type. Verify that the same SSID and key phrase are defined in the network connection. Verify that the wifi receiver on the desktop system is configured properly w/ correct compatible drivers installed.

Electrical Shorts

Symptoms: complete loss of signal Causes: 2 nodes of an electrical circuit that are meant to be at different voltages create a low resistance connection causing a short circuit. Resolution: Use a TDR to detect and locate shorts. Replace cables and connectors.

Cable problems

Symptoms: nodes on the network cannot communicate. the routers, switches and individual nodes on the network work but the problem still persists. Causes: problems with network cables. Resolution:Identify the issue with the network cable and determine a suitable solution.

X.25 connections utilize a clocking circuit that makes them ________.

Synchronous

SDSL

Synchronous DSL. Upstream and downstream speeds are equal. Doesn't support existing phone line; no user installation; typical downstream & upstream speeds of 284Kbps-2.0Mbps.

SNIPS

System and network Integrated Polling Software: A system and network monitoring software tool that runs on UNIX systems. It offers both a command-line and web interfaces to monitor network and system devices. The monitoring functions of SNIPS determine and report the status of services running on the network.

System

System events track high-level changes to a computer that are not included in other categories and that have potential security implications.

Loopback

The 127 network is reserved for testing, known as "loopback". For example, 127.0.0.1. the usable starting IP for class A is actually 1.0.0.0. In any given network, the first and last addresses are reserved and can't be assigned to other comps. or other hosts. Example: in the 192.168.1.0 network, 192.168.1.1 through 192.168.1.254 can be assigned, but 192.168.1.0 is reserved for the network number, and 192.168.1.255 is reserved for the broadcast.

Global Object Access Auditing

The Global Access Auditing settings define computer SACLs per object type for either the file system or registry. The specified SACL is then automatically applied to every object of that type. • Auditors will be able to prove that every resource in the system is protected by an audit policy by just viewing the contents of the Global Object Access Auditing policy settings. • Resource SACLs are also useful for disanostic scenarios. For example, setting a Global Object Access Auditing policy to log all the activity for a specific user and enabling the Access Failures audit policies in a resource (file system, registry) will help administrators quickly identify which object in system is denying a user access.

You've been instructed by your IT Director to manually configure a new computer with an IP address, subnet mask, DNS server, and a default gateway. What is a default gateway?

The IP address of the nearest interface of a router directly connected to the LAN

Platform

The OS that a computer uses.

What is an initial step in diagnosing general connectivity problems?

The Ping Utility. It is the most commonly used ICMP command.

reiserfs

The Reiser file system (ReiserFS) is a newer Linux file system that calculates and proposes the best options for the file system. Because ReiserFS was independently built from the ground up, its journaling capability is native and more robust, offering a great deal of reliability. It is also more efficient at storing small files than other file systems. However, data corruption can occur if power goes out during disk synchronizations. Also, defragmentation tools are not available for this file system.

Wi-Fi (Wireless Fidelity)

The common name for standards for a local wireless network as defined by IEEE 802.11.

FIN_WAIT_1 socket state

The connection is active but closed.

Kernel

The core of the operating system that manages memory and devices, maintains the computers clock, starts programs, and assigns the computers resources, such as devices, programs, data, and information.

Which two statements are true about Microsoft security zones?

The default security level for Local intranet and Trusted sites in the same. Internet Explorer has four security zones

OS boot record

The first sector in the active partition. Windows XP uses this sector during the boot, but Windows 7/Vista does not.

administrative share

The folders that are shared by default on a network domain that administrator accounts can access.

default gateway

The gateway a computer on a network uses to access another network unless it knows to specifically use another gateway for quicker access to that network.

TCP/IP (Transmission Control Protocol/ Internet Protocol)

The group or suite of protocols used for almost all networks, including the Internet.

Top-level domain

The letters after the period (Examples are .com (commercial), .org (nonprofit), .gov (government), and .info (general use).)

MAC address & MAC filtering

The media access control address of your network adapter identifies it on most LANs. Exa: 00-12-23-A4-BA-F8. This number is burned into the PROM chip of the adapter. MAC filtering is a technique used to the secure the router by only allowing computers with certain MAC addresses. These exceptions are burned into the router's firmware; aside from disabling the SSID and using encryption, this is one of the most common ways to secure a router.

Port forwarding

The method of forwarding external visitors through a router to a specific computer. For example, let's say you have an FTP server within your LAN with an IP address of 192.168.0.250. An external client wants to access your FTP server. The server has a specific port open on it to accept file transactions (say, port 21), but the client can't connect directly to the server; it first has to go through the router. In order to do this, it must know the router's public IP address, and the router needs to know the inbound port open on the FTP server. So the client sends a request to the router, which then knows that the client wants access to the FTP server; so it forwards the appropriate data packets from the clients to the address 192.168.0.250, or whatever port is open.

Which of the following statements is not true regarding FSRM quotes?

They can be configured to create event log entries only.

Service Set Identifier (SSID)

The name of a wireless access point and wireless network.

NTFS

The new file system that supports up to 256 TB of data.

POP3

The newest standard of POP (Post Office Protocol) which downloads emails from the server into a folder on a local system. It is generally not recommended for users who switch computers a lot, because their emails will end up on multiple computers. Solutions to this are programs like Windows Remote Desktop, which connect remotely to the mail server and download emails to whatever computer the user is using.

Offset

The number of units (often bytes) from a starting point. Usually a nonnegative integer. Starting point's offset is 0.

NETSTAT -o

The process ID associated w/ each connection

name resolution

The process of associating a character-based name with an IP address.

booting

The process of starting up a computer and loading an operating system.

TCP (Transmission Control Protocol)

The protocol in the TCP/IP suite of protocols that works at the OSI Transport layer and establishes a session or connection between parties and guarantees packet delivery.

Troubleshooting

The recognition, diagnosis and resolution of problems.

Which of the following are true regarding the recovery partition on a Windows system?

The recovery partition can be used to restore the system to its original state when it shipped from the manufacturer.

Maximum Transition Unit (MTU)

The size in bytes of the largest protocol data unit that the layer can pass onwards.

technical documentation

The technical reference manuals, included with software packages and hardware, that provide directions for installation, usage, and troubleshooting. The information extends beyond that given in user manuals.

Safe Mode

The technique of launching Windows with a minimum configuration, eliminating third-party software, and reducing Windows startup to only essential processes. The technique can sometime launch Windows when a normal Windows startup is corrupted.

If there is a bad connection, this usually means...

There are no bytes in the send or receive queues.

regsvr32

This command-line tool registers .dll files as command components in the registry.

IPv6 subnet

This defines the individual subnet of the network that the address is located on.

Interface ID

This is the individual host IP portion. It can be assigned to one interface or more than one interface, depending on the type of IPv6 address.

Layer 4 - Transport Layer

This layer ensures error-free transmission between host through logical addressing. Inbound & outbound ports are controlled in this layer. Ports = transport layer.

Layer 5 - Session Layer

This layer governs the establishment, termination, synchronization of sessions within the OS over the network and between host. Think log on, log off

Layer 7 - Application Layer

This layer is where message creation and packet creation begins.

Layer 6 - Presentation Layer

This layer translates the data format from sender to receiver in the various OSes that may be used. Exp = code conversion, data compression, and file encryption.

pin

To add a shortcut to a folder or application on the Start screen or other location.

What is a common first step when dealing with TCP/IP networking problems?

To verify that the host's IP addressing information is correct, using IPconfig or IFconfig.

The ____ network architecture is physically a star, but logically a ring.

Token Ring

T3

Trunk carrier 3= 28 T1s, will come into a company as 224 wires or thereabouts and must be punched down to a DSX or like device.

How could you get traffic from a protocol that is unroutable, through he internet?

Tunnel It

FAT Region or FATs

Two (usually) copies of File Allocation Table: Tracks use of clusters. Links clusters of files (and directories).

client/server

Two computers communicating using a local network or the Internet

Dongle

USB device which serves a key to use software. Losing the dongle is the same as losing the software license or copy. $$$$$$$$

10BASE-T

UTP Cat3 cable w/ RJ-45 connector. AKA, Ethernet. Max speed of 10Mbps, supports star topology, can be up to 100 meters per segment.

100BASE-TX

UTP Cat5, 5e or 6 cable w/ RJ-45 connector. AKA, Fast Ethernet. Max speed of 100Mbps, supports star topology, max distance of 100 meters per segment.

1000BASE-T

UTP Cat5e or 6 cable w/ RJ-45 connector. AKA, Gigabit Ethernet. Max. speed of 1000Mbps, supports star topology, max distance of 100 meters per segment.

Tone generators and tone locators can only help you differentiate between WHAT?

UTP cables.

Configuring proxy server settings in IE 8

Under the Connections tab of Internet Properties, click LAN settings. You can then enable the use of a proxy if you wish, and specify a specific address & port number to use for all Internet traffic. However, you can also click Advanced, and assign different proxy server addresses & ports for different types of sites (http, https, ftp, etc.). You can also enter specific web addresses that are exceptions to the proxy server settings, so if you want to access a secured HTTP site but you don't want to use a proxy, you can set that specific address as an exception.

TCP/IP Configuration with a DHCP server in the network

Under the general tab in Internet Protocol Properties, you can configure whether or not you want to automatically obtain IP and DNS server information automatically when a DHCP server is used on the network.

Three types of IPv6

Unicast, Anycast, and Multicast

UNC

Universal Naming Convention. Enables users to access network resources like folders or printers without mapping drive letters to network drives or specifying the type of device that stores the file/hosts the printer. It has the following structure: \\servername\share name\path\filename. Exa: \\Tiger1\O\NetDocuments\this_doc.doc. \\Tiger1 is the server, \O is the share name, \NetDocuments is the path, and \this_doc.doc is the document being accessed.

UTP Cabling

Unshielded twisted pair. UTP cabling is the most common of the major cabling types, and it's name refers to the four twisted pairs of wire surrounded by a flexible jacket. It comes in various grades, of which Category 5e (Cat5e) and Cat6 are the most common standards. These are suitable to use with both standard 10BASE-T and Fast Ethernet networking, and can also be used for Gigabit Ethernet.

Resolving Open, short cables issues

Use cable testers and locate open or short cables. repair the cables and recheck that the issues are resolved if not replace the cables.

Troubleshooting w/ IP configuration Utilities

Use ipconfig or ifconfig to determine if the host is configured for static or dynamic IP addressing and if it has a valid IP address.

Computer Management

Use it to access several snap-ins to manage and troubleshoot a system.

Backup and Restore

Use it to backup and restore user data and the system image and to make a rescue disk.

Chkdsk

Use it to check and repair errors on a drive. If critical system files are affected by these errors, repairing the drive might solve a startup problem.

Group Policy

Use it to display and change policies controlling users and the computer. Is a command prompt.

Device Manager

Use it to solve problems with hardware devices, to update device drivers, and to disable and uninstall a device.

Disk Management

Use it to view and modify partitions on hard drives and to format drives.

Safe Mode

Use it when Windows does not start or starts with errors. Loads the Windows desktop with a minimum configuration. In this minimized environment, you can solve a problem with a device driver, display setting, or corrupted or malicious applications.

How do you delegate group membership management?

Use the Managed By tab in the group object's properties. You can also use the Advanced Security Settings dialog box to assign the Allow Write Member permission directly

Last Known Good Configuration

Use this tool when Windows won't start normally and you want to revert the system to before a Windows setting, driver, or application that is causing problems was changed.

taskkill

Used by Microsoft Windows XP, Vista and 7 to terminate processes.

Wireless LAN Survey Software

Used for wireless planning. Simulates WLAN performance. Can determine network coverage areas

Punch Down Tools

Used in a wiring closet to connect cable wires directly to a patch panel. Strips insulation and embeds wire into the connection at the back of the panel.

66 Block Type of punch down block

Used in the telephone industry to terminate telecommunication. supports low-bandwidth telecommunications transmission.

Punch Down Blocks

Used to connect one group of telephone and network wires with another group in utility or communication closets. Typically support low-bandwith Ethernet and Token Ring networks.

T1 Crossover

Used to connect two T1 CSU/DSU devices by using T568B pairs.

Crimper

Used to crimp down an RJ-45 connector onto the cables.

Subnet mask

Used to distinguish between the network and host portions of an IP address. For example, for an IP address of 192.168.1.1, a typical subnet mask would be 255.255.255.0. The "255s" correspond to the network portion of the IP address; the 0s correspond to the host portion.

Sharp cutting tool

Used to make a clean cut on the end of a network cable. Cut pliers or other cable cutting tools are necessary.

Cable Certifiers

Used to perform tests ie. cable testing and validity testing. useful in finding short circuits and other faults. helpful in determining mode of connectivity devices ie. full duplex and half duplex.

Action Center

Used to solve problems when installing a device or application, to solve problems with software or hardware, and get a history of past and current problems.

Wire stripper

Used to strip the insulation off of UTP cabling. You expose the individual wires and then twist them into the correct pinout.

Optical Time-Domain Reflectometer

Used to test fiber optic cabling: Detects fiber length, location of faulty splices, breaks and bends; measures attenuation.

arp eth_addr

Used w/ other options to specify a physical address

arp inet-addr

Used w/ other options to specify an Internet address.

arp if_addr

Used w/ other options to specify the Internet address of the interface whose ARP table should be modified.

defrag -f

Used when needing to defrag a hard drive with less than 15% of its space free.

UDP

User Datagram Protocol. UDP sessions are known as connectionless sessions. If a packet is dropped, it is not asked for again. This protocol is usually used when streaming media sessions. Exa: If you're streaming music and there's a break in the song, it means a data packet was lost. However, by the time the packet is resent, you'll have moved on, and now the song is all messed up. (check table)

anonymous users

User accounts that have not been authenticated on a remote computer

Graphical User Interface (GUI)

User interacts with menus and visual images such as buttons and other graphical objects. -Computers with less than 1 GB of RAM work with the Windows Vista Basic Interface.

Command-Line Interface

User interface for an OS devoid of all graphical trappings.

what types of objects can be members of a global group?

Users computers and other global groups from same domain

tree /a

Uses ASCII text instead of extended characters.

Layer 2: Data Link

Uses Switch hardware that uses MAC addressing when deciding on where to send data.

Class C

Uses first three octets as network portion and last octet as the host portion. Range of private IP addresses: uses the range 192.168.0.0 through 192.168.255.255.

Class B

Uses the 1st & 2nd octets as the network portion, uses the 3rd & 4th octets for the host portion. Range of private IP addresses: uses the range 172.16.0.0 through 172.31.255.255.

Class A

Uses the 1st octet as the network portion, uses the 2nd, 3rd, and 4th octets for host portion. Range of private IP addresses: uses the entire 10 network, from 10.0.0.0 to 10.255.255.255.

secondary logon

Using administrator privileges to perform an operation when you are not logged on with an account that has these privileges.

Sysprep

Utility built into Windows for image deployment over the network. Preps the system to be moved as an image file.

vfat

VFAT is a FAT32 filesystem for Linux and does not support journaling. VFAT includes long name support. Support for vfat must be compiled into the kernel for the system to recognize the vfat format.

How can you connect computer devices using a public network and ensure their messages are safe from being intercepted by unauthorized users?

VPN

permissions

Varying degrees of access assigned to a folder or file and given to a user account or user group. Access can include full control, write, delete, or read-only.

copy /v

Verifies that new files are written correctly.

Step 6 of The Network + Troubleshooting Model

Verify full system functionality and if applicable implement preventative measures.

A user reports that she cannot connect to network resources from a computer on the company network. The user was able to connect to the network resources yesterday. You verify that the user's computer is properly physically connected to the network. You discover that the computer's IP address is 169.254.48.97. You need to restore access to network resources. What should you do next? A. Flush the cache on the DNS server. B. Reset the user's password on the server. C. Check your router's current routing tables. D. Verify that the DHCP service is available.

Verify that the DHCP service is available

Resolving Cable placement issues

Verify that the cable is placed away from source of EMI. ID and removed the sources of interference.

Resolving Distance issues

Verify that the cables are run only for the maximum distance they are supported. ie.. if an Ethernet cable exceeds 100 meters, the signal will deteriorate.

You are analyzing Frame Relay frames and find that one message consisting of five packets was sent over three different circuits. The three circuits form a _____ circuit.

Virtual

Virtual LANs (VLAN)

Virtual LAN (VLAN) - Segment network by separating devices into logical groups VLAN allows scattered users to be logically grouped together even though physically attached to different switches Can reduce network traffic and provide a degree of security similar to subnetting VLANs can be isolated so sensitive data is transported only to members of the VLAN Switch or tagging protocol can be used

Virtual Private Network Concentrators

Virtual private network (VPN) - Uses unsecured network as if were secure All data transmitted between remote device and network is encrypted Types of VPNs: Remote-access VPN - User to LAN connection Site-to-site VPN - Multiple sites can connect to other sites over the Internet

VoIP

Voice over IP communication. An increasingly popular method for providing home & business telephone access. Routes phone calls over the same TCP/IP network used for LAN and Internet access. In order to add VoIP to an existing Ethernet network, you can either attach an adapter to your existing router or get a VoIP router that replaces the existing router.

What type of communications is defined at the lowest three layers of the OSI model?

WAN protocols

Which of the below is a 64 bit Wireless Encryption Protocol? AES TKIP WPA 2 WEP

WEP Wired Equivalent Privacy (WEP), and its weaker security level is discussed here. Wired Equivalent Privacy (WEP) is a security protocol for wireless networks that encrypts transmitted data . ... (40-bit and 64-bit WEP encryption are the same thing — 40-bit devices can communicate with 64-bit devices.)

Service in Windows resolves NetBIOS names to IP addresses. WINS DHCP DNS ARP

WINS: Windows Internet Name Service is Microsoft's implementation of NetBIOS Name Service, a name server and service for NetBIOS computer names.

____ provides the strongest encryption fora wireless network.

WPA2

Web Services

Web applications created with many programming languages or any operating system to communicate data seamlessly

Roles installed

What impacts the types of logs and events logged on a server?

Application control policies

What is AppLocker also known as?

Security template

What is a collection of configuration settings stored as a text file with an .inf extension?

Stateless

What is known as pure packet filtering, does not retain memory of packets that have passed through the firewall.

Nothing—the application is Windows Installer-enabled

What is required to prepare applications with an approval stamp from Microsoft on its packaging, including the Certified for Windows Server 2012 logo, for Windows Installer?

Inbound & outbound ports

When a computer wants to communicate with another, they must both use the same protocol. For example, if a computer wants to access http://www.google.com, it uses Hypertext Transfer Protocol to communicate with a server called "google.com". HTTP selects an unused port on your computer called an "outbound port" to send and receive data from google.com. On the other end, Google's server has a specific port open at all times to accept sessions; this is called an "inbound port"; in most cases, this is port 80.

Port triggering

When a firewall opens a port because a computer behind the firewall initiates communication on another port.

DNAT (Destination Network Address Translation)

When a firewall using Network Address Translation (NAT) allows uninitiated communication to a computer behind the firewall through a port that is normally closed.

Assigning forces the application, whereas publishing provides the option to install.

When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?

File location rule

When configuring software restriction policies, there are four rules that help determine the programs that can or cannot run. Select which of the following is NOT one of those rules.

Allowing an application opens the specified port only while the program is running, and thus is less risky.

When creating a firewall exception, what is the difference between opening a port and allowing an application through?

When the computer starts up

When does Windows apply Computer Configuration policies by default?

As the user logs in

When does Windows apply User Configuration policies by default?

Windows Installer package files, or .msi files modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files.

When installing software using Group Policy, what file or files does an administrator use?

When you join a computer to an AD DS domain, you can create new local user accounts with the Local Users and Groups snap-in. Control Panel is used when the computer is not a member of an AD DS domain.

When would you need to create a user account through Control Panel?

Encryption Key

When you mark a file for encryption, Windows generates a large, random number—a unique encryption key.

EFS certificate

When you're logged on to Windows and attempt to open an encrypted file, Windows retrieves your personal EFScertificate.

root directory

Where Windows stores folders and important files that it needs when you turn on the computer.

PPTP

Which VPN technology is the most common and the easiest to set up?

Application

Which layer in the OSI model covers HTTP, FTP, and RDC?

Physical

Which layer in the OSI model includes the cable and network adapters?

Data Link

Which layer of the OSI model includes VLANS?

Session

Which layer of the OSI model is used to create a connection so that a host can transfer files?

peer-to-peer

Which model has each host have their own security database?

full-duplex

Which of the following does a switch use for increased performance?

67

Which of these ports does DHCP use?

Well-Known Ports

Which port categories include inbound ports of HTTP, HTTPS, FTP, and DNS?

UDP

Which protocol do you use as the transport protocol for a video application?

WINS

Windows Internet Naming Service. Matches the NetBIOS name of a particular computer to an IP address on the network; this process is also called resolving or translating a NetBIOS name to an IP address.

mesh

Which topology is the most redundant and the most expensive?

Packet filtering

Which type of firewall blocks packets based on rules that are based on IP addresses or ports?

WPA

Wi-Fi Protected Access. A security protocol developed by the Wi-Fi alliance to secure wireless networks. It uses the TKIP encryption protocol and replaces WEP. WPA uses an alphanumeric key that can be as long as 63 characters. It can use either Temporal Key Integrity Protocol (TKIP) 128-bit encryption, or 128-256 bit Advanced Encryption Standard (AES). WPA using AES is often referred to as WPA2. The latest version is WPA2, which is more secure than WPA.

WAN

Wide Area Network. LAN networks in different places that are connected over a bigger network. Each LAN requires a router and high-speed connection provided by a telecommunications company to connect to each other.

Simple Cable Tester

Will determine whether a cable has an end to end connection and can detect shorts or opens but cannot certify the cable for transmission quality.

Windows Mobile, Palm OS, Blackberry

Windows Embedded CE- scaled down Windows OS used in VoIP telephones, industial control devices, digital cameras, security robots, ticket machines... Windows Mobile-OS based on windows embedded CE, smart phones and PDA's also called Pocket PC Palm OS includes handwriting-recognition software Blackberry-supplied by RIM

.wfw

Windows Firewall allows an administrator to import and export firewall rules. What are the rules' file extension?

You can create a new Group Policy Object and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.

Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?

Domain, private, and public

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?

ports, protocols, applications, users, and IP address ranges

You can configure the Windows Firewall to allow or block specific _________.

DNS - Domain Name System

Worldwide service that resolves host names to IP addresses, facilitates proper communication between computers

bootrec /fixboot [drive]

Writes a new boot sector onto the system partition using the boot sector compatible with Windows 7.

What WAN technology will you use be troubleshooting if asked to troubleshoot a technology with a maximum data transfer rate of Kbps.

X.25

In which of the following situations would restoring from a backup be the best option?

You accidentally deleted several important e-mails and need to restore them. You need to restore several word processing files that were accidentally deleted from your Documents folder.

You must create a distribution share, also called a software distribution point. Then create the Group Policy Object, specifying how to deploy the application.

You want to deploy software using Group Policy. What is necessary before assigning the software to a user account?

1. Specify the correct order of steps necessary to creating a system restore point.

__1___ Log on with local administrative privileges. __2___ Press the Windows logo key + w and then type System Restore. __3___ Click Create a Restore Point from the results. __4___ Click Configure and make sure the Turn on system protection option is enabled. __5___ Drag the slider to set the maximum disk space you want to use. __6___ Click Apply and then click OK. __7___ Click Create to create a new restore point. __8___ Type a description for the restore point. __9___ Click Create.

2. Specify the correct order of steps necessary to enabling File History on Windows 10.

__4___ From Results, choose File History. __1___ Log on with local administrative privileges. __5___ Click Turn On. __3___ Press the Windows logo key + w and then type File History. __2___ Connect an external drive.

IP address

a 32-bit or 128-bit string that is assigned to a network connection when the connection is first made.

Back-to back configuration

a DMZ is situated between two firewall devices, which could be a black box appliance or Mircrosoft Internet Security and Acceleration Servers

Boot.ini

a Windows 2000/XP hidden text file that contains information needed to start the boot and build the boot loader menu.

HomeGroup

a Windows 7 feature that enables sharing of files and printers across a small office/home office network

fixboot

a Windows 7/Vista command that repairs the boot sector of the system partition.

fixmbr

a Windows 7/Vista command to repair the MBR. (Master Boot Record)

Boot Configuration Data (BCD) file

a Windows 7/Vista file structured the same as a registry file and contains configuration information about how Windows is started. The BCD file replaces the Boot.ini file used in Windows 2000/XP.

FDISK

a Windows 9x/Me command used to create and manage partitions on a hard drive.

diskpart

a Windows command to manage hard drives, partitions, and volumes.

network discovery

a Windows feature that enables a computer to find other computers and devices (such as printers) on a connected network; also lets a user control whether other computers can see the user's computer on the same network

basic sharing

a Windows feature that enables users to control who may access specific files and folders located in the user's libraries

advanced sharing

a Windows feature that enables users to control who may access specific files and folders located in the user's libraries; offers more options than basic sharing and is therefore the best choice for protecting confidential information

Public folder

a Windows folder that's set up for sharing files and folders with other users on an attached network; Windows 7 Public folders include Public Documents, Public Music, and others

recovery image

a backup of the Windows volume.

Operating System

a type of system software that coordinates all activities among the computer hardware resources

Uninstaller

a utility that removes a program, as well as associated entries in the system files

NAT/PAT

an interim solution invented in the 1990s to the problem of IPv4 not having enough addresses; allowed more than one device to use the same IP address on a private network as long as there was one Internet address available

Which of the following approaches is considered most effective to decommission an older computer before donating it to charity? a. Initiate a PC Reset. b. Initiate a PC Refresh. c. Purchase a third-party disk wipe tool. d. Move all the data off of the hard drive and reinstall Windows manually.

a. Initiate a PC Reset.

Which of the following options will put a PC back to a new state and will reinstall Windows, but delete files, settings, and apps, except those apps that came with the PC? a. Reset b. Refresh c. PC Cleanup d. Windows Undo

a. Reset

Which mode starts Windows with a minimal set of drivers and services? a. Safe mode b. Last Known Good Configuration c. Full mode d. Standard mode

a. Safe mode

Which of the following Windows 10 features is used to create a restore point? a. System Restore b. PC Refresh c. PC Reset d. System Point Restore

a. System Restore

Which of the following does File History not back up? (Choose all that apply.) a. System files b. Documents c. Application files d. Registry settings

a. System files c. Application files

Which of the following allows users to schedule a weekly backup to a secondary disk? a. Using Windows 7 File Recovery b. Using File History c. Scheduling a system restore point d. Creating a Windows 10 File Recovery drive

a. Using Windows 7 File Recovery

truncated

abbreviated IPv6 address by removing unnecessary 0s

Subnetting

act of dividing a network into smaller logical subnetworks.

swapon -a

activates all swap partitions

wireless access point (WAP)

acts as the central connecting device for the network, such as laptops, PDAs, tablet computers, micro computers

T1

actual trunk carrier circuit that is brought into a company, a dedicated high-speed link or have other shared technologies running on top of it like Frame Relay and ISDN

Wireless network adapters

allows connectivity between a desktop computer or laptop and the wireless access point.

single user/single tasking

allows only one user to run one program at a time.Smart phones and PDAs often use

backup utility

allows users to copy or backup selected files or an entire hard disk to another storage medium

Encrypting File System (EFS)

allows users to encrypt information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media. Files and folders are not encrypted in Windows 7 by default; however, users can enforce encryption on data files, folders, and entire drives. Encrypted (EFS) files and folders are displayed in green in Windows Explorer.

Network Operating System

allows users to share resources on a network,administers security by establishing username and password for each user

Terminal Services

also known as Remote desktop services is a type of thin-client terminal server it uses port 3389.

MSCONFIG

also known as the System Configuration utility, lets you enable or disable startup services, set boot options such as booting into Safe Mode, access tools like Action Center and Event Viewer, and more. You'll use this utility mainly to troubleshoot startup problems with Windows.

NAT filtering

also known as the endpoint filtering, filters traffic according to ports TCP or UDP.

anycast address

an IPv6 address assigned to multiple devices; packets are delivered to the closest device

Client-server

an architecture that distributes applications between servers such as Windows Server 2008 and client computers such as Windows 7 or Windows Vista.

Intra-Site Automatic Tunneling Protocol (ISATAP)

an automatic tunneling mechanism used to connect an IPv6 network to an IPv4 address space that does not use NAT

Which of the following best describes the time when a manual restore point should be created? a. After completing the installation of a new application b. One day before performing an installation of a new application c. Two days before performing an installation of a new application d. Let Windows 10 perform an automatic restore point on its regularly scheduled interval

b. One day before performing an installation of a new application

nodes

individual computers on a peer-to-peer network

By default, how many days is a file deleted with OneDrive kept in the Recycle Bin? a. 10 days b. 15 days c. 30 days d. 45 days

c. 30 days

write

change folder and file data and atrributes

Which of the following programs restores files through a familiar File Explorer interface? a. OneDrive b. File Explorer History c. File History d. Windows 10 Backup and Restore

c. File History

Which of the following tools best represents the preferred method to back up important documents so that a previous version can be found and restored quickly? a. OneDrive b. OneDrive for Business c. File History d. Windows 7 Backup and Restore

c. File History

Twisted-pair cables

cable most commonly used, copper based cables, 8 wires grouped into 4 pairs, they are twisted to reduce crosstalk and interference.

Boot disk, recovery disk

contains system files that will start computer when computer cant boot.

A fault-tolerant computer

continues to operate when one of its components fails, ensuring that no data is lost, switches to duplicate component and continues to operate.

Print server

controls printers that can be connected directly to the server or are connected to the network.

Worm

copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the system down.

BGP - Border Gateway Protocol

core routing protocol that bases routing decisions on the network path ad rules

mke2fs -j

creates the file system with an ext3 journal

ownership

creator is owner full access

How frequently does Windows 10 automatically create restore points? a. Every 4 days b. Every 5 days c. Every 30 days d. Every 7 days

d. Every 7 days

Which of the following time frames best represents the point at which a restore point should be created? a. Daily b. Weekly c. After performing a major system event d. Prior to performing a major system event

d. Prior to performing a major system event

Which of the following is the best method of data recovery? a. Running scandisk b. Performing Windows updates c. Using an antivirus package d. Using backups

d. Using backups

swapoff -a

deactivates all swap partitions

swapoff

deactivates swap partition

Layer 3 - Network layer

dedicated to routing and switching information to different networks. UOM= Packets

IEEE Institute of Electrical and Electronics engineers 802.3

defines carrier sense multiple access with collision detection or CSMA/CD

Network topology

defines the physical connection of hosts in a computer network.

allow vs deny

deny takes precedence over allow deny permission always override all, regardless of whether the permissions are inherited or explicitly assigned to a file

Personal Firewall

detects and protects a personal computer from unauthorized intrusions

mkfs -i

determines how many inodes are on the partition and uses the same values as -b

What tool is shipped with Windows Server 2008 to initiate a migration of sysvol replication from FRS to the DFS replication service?

dfsrmig.exe

ipconfig

displays IP addresses

nbtstat

displays NetBIOS over TCP/IP statistics for local and remote computers.

netstat -an

displays a list of all the connections to and from your computer in numeric format.

Adware

displays an online advertisement in a banner or pop up window sometimes contains hidden spyware

ipconfig/all

displays information pertaining to your network, TCP/IP configurations including your MAC address

mke2fs -n

displays what mke2fs would do if it created a file system, but does not actually create the file system

Trojan Horse

hides within or looks like a legitimate program such as a screen saver

Packet switching

how data packets are moved over switched wide area networks, such as X.25 and Frame Relay

ipconfig/all

how you get the MAC address in the command prompt

A ____ simply repeats an incoming signal to every computer attached to it.

hub

domain name

identifies a network (the names that appear before the period in microsoft.com,)

Workgroup name

identifies a workgroup

Personal computer maintenance utility

identifies and fixes operating system problems and disk problems

Antivirus Program

identifies and removes viruses in memory, storage media, and incoming files

fully qualified domain name (FQDN)

identifies computer and network to which it belongs

Access Control List (ACL)

identifies the users or groups and their level of access to the folder or file can not move from parition to partition stored in the Master File Table

ghosting

images could be etched permanently on a monitors screen~ reason for a screen saver

troubleshooter

in Windows, a wizard-driven tool that walks a user through a software or hardware issue to help the user resolve it

share permissions

in Windows, permissions that apply to users who connect to a shared folder over a network

full control

includes all other actions and adds the ability to take ownership of and change the permissions on the folder

modify

includes all read & execute and write actions adds the ability to add or delete files

read & execute

includes all read actions adds ability to run programs

After you configure an IP address and subnet mask on a Windows 7 PC, you want to check the configuration and confirm that the IP and subnet is configured, which of the below command is used. ifconfig traceroute ping ipconfig

ipconfig In computing, ipconfig in Microsoft Windows is a console application that displays all current TCP/IP network configuration values and can modify Dynamic Host Configuration Protocol and Domain Name System settings.

The ______________ command in Windows CLI will remove the IP address learnt from DHCP. ipconfig /renew ipconfig / release netstat / release ping -a

ipconfig / release First, ipconfig /release is executed to force the client to immediately give up its lease by sending the server a DHCP release notification which updates the server's status information and marks the old client's IP address as "available". Then, the command ipconfig /renew is executed to request a new IP address.

You are required to find the MAC address of you own computer. Which of the below command is used? ipconfig /all ipconfig -an netstat -an ipconfig

ipconfig /all Ipconfig (sometimes written as IPCONFIG) is a command line tool used to control the network connections on Windows NT/2000/XP machines. ... Ipconfig displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings.

You need to find the MAC address of the network adapter for the computer you are currently working on. What command will give you the information you need?

ipconfig/all

T-carrier or telecommunications carrier system

is a cabling and interface implemented in mid-sized and large organizations that carry data at high speeds generally 1.544 MB or higher.

ISDN - Integrated Services Digital Network

is a digital technology developed to combat the limitations of PSTN, sends data, fax, or talk on the phone simultaneously from one line.

Frame

is a group of bytes packaged by a network adapter for transimission across the network, these frames are created on Layer 2 of the OSI model.

VLAN- Virtual LAN

is a group of host with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.

Unicast address

is a single address on a single interface.

MAC - Media Access Control

is a unique identifier assigned to network adapters by the manufacturer, 6 octets, and written in hexadecimal.

Classless inter-domain routing (CIDR)

is a way of allocating IP addresses and routing Internet Protocol packets. EXP= 192.168.0.0/16, /16 means that the subnet mask has 16 masked bits (1s)

FDDI

is standard for transmitting data on optical fiber cables at a rate of around 100 Mbps

DNS server address

is the IP address of the device or server that resolves DNS address to IP address. This could be a Windows server or a all in one multifunction network device.

Frame Relay

is the advancement of X.25 packet switching, designed for faster connections, packets are referred to as frames and it uses a virtual circuit.

Default gateway

is the first IP address of the device that a client computer will look for when attempting to gain access outside the local network.

NAT

is used to protect an organization's computers and switches on the LAN from possible attacks initiated by mischievous people on the Internet or other locations outside the LAN

The ___________ command is used to check the connection status to and from your computer. netstat -an ping -t arp -a tcpdump

netstat -an However this can provide you with more information than you need. Therefore if you are looking for specific port then you can filter that information. For example to find a connection to web sites or other services using port 80 use this command: netstat -an | findstr :80 Will show all connections on port 80

network interface card (NIC)

network adapter

network adapter

network card, a network interface card, or a NIC

IPv6

new generation of IP addressing for the Internet, can be used in small office networks and home networks. 128-bit 340 undecillion addresses.

interface

node's attachment to a link

What can you use to display information about DNS servers?

nslookup

what can you use to determine what is performing name resolution and if it's doing it correctly?

nslookup

nslookup syntax

nslookup [-option ...] [computer-to-find | - [server] ]

IP conflict

occurs when two computers are configured with the same IP address.

device-dependent program

on that runs only on a specific type or make of computer.

tree

one or more domains that follow the same contiguous namespace

dynamic route

one that has been implemented dynamically with special routing protocols.

static route

one that has been manually entered into the routing table with the route add command.

user interface

ontrols how you enter data and instructions and how information displays on screen

Multi-mode (MM)

optic cable w/ larger fiber core, carries multiple rays of light. used in shorter runs up to 600 meters.

Single-Mode (SM)

optic cable with an optical fiber that is meant to carry a single ray of light, used in longer distance runs 10km to 80km

memory management

optimizing use of random access memory

ntfs copy to same ntfs partititon

removes explicit permission plus will inherit permissions assigned to parent volume or folder

ntfs explicit copy or move to different ntfs partition

removes explicit permission plus will inherit permissions assigned to parent volume or folder

WINS - Windows Internet Name Service

resolves NetBios names to IP address

warm boot

restarting computer that is powered on

An example of a device that associates a network address with an interface is a ___.

router

permissions

rules applied to users and groups to limit actions they can take on shared resources, such as files, folders, drives, network shares, and even printers

Services

run in the background on a Windows system to help the operating system run other programs. The Services console is the central management point of services in Windows Vista and Windows 7.

Elevated Mode

running command prompt as an administrator is also known as

Cross-platform

runs the same on multiple operating systems

disk scanner

searches for and removes unnecessary files,windows vista includes disk cleanup.

Spooling

sending print jobs to buffer instead of directly to printer

DHCP

sends IP information to clients automatically making configuration of IP addresses on the network easier and automated.

Token Ring

sends data logicaly in a ring fashion, Token Ring network are physically connected in a star fashion, but logically a ring.

mke2fs -L

sets the volume label for the file system

Which console can be used to create multiple shares and exercise more granular control over there properties?

share and storage management

netstat -a

shows in depth TCP and UDP connections

tracert

shows paths to a destination on another network

compress

shrink the size of files during the backup process.

File compression utility

shrinks size of files to free up room and improve performance

PAD (packet assembler disassembler)

similar to a router which disassembles packets and sends them to a CSU/DSU which is like a modem for the LAN.

Programs and features

simply browse the list of programs, click the program you want to uninstall, and then click Uninstall on the toolbar. Follow the prompts that display until the program is removed. You might be prompted to restart your computer.

Classless Inter-Domain Routing (CIDR)

slash notation used in classless subnetting (for example: /16)

permissions to copy file

source - read destination -write

permissions to move a file

source - read & modify destination -write

Windows Vista

successor to windows xp containing a new interface and new/enhanced features WV Home Basic- for the basic home user WV Home Premium- also includes Windows Aero with its flip 3D feature WV Ultimate- designed to make mobile user's computers more secure and easier to network. WV Business- for all sizes of businesses WV Enterprise- all features of WV business plus greater levels of data protection and a multi-language interface.

multiprocessing

supports 2 or more processors running programs at the same time. increases processing speed

Application-level gateway - ALG

supports address and port translation and checks whether the type of application traffic is allowed.

/ect/fstab

swap partitions listed here

A ____ is a device that sets up different collision domains for each device connected to it, allowing the networked devices to run in Full Duplex without collisions.

switch

Utility program

system software that performs maintenance type tasks, also called utility

nonresident

the instructions remain on the hard disk until they are needed.

schema

the objects and attributes in a database, what they contain, and how they are organized

preemptive multitasking

the operating system interrupts a program that is executing and passes control to another program waiting to be executed.

background

the other programs running but not in use.

File system

the overall structure your computer uses to name, store, and organize files and folders on a hard disk or partition.

Network administrator

the person overseeing network operations, uses the network OS to add and remove users, computers, and other devices to and from the network.

printer sharing

the process of allowing a computer user to share his or her attached printer with other users on a network; the Devices and Printers applet in Windows 7 helps a user manage and share printers

Compression

the process of decreasing the size of files or folders without affecting the files' content. The purpose of compression is to decrease large files that would otherwise use a lot of storage space. Because files often include a lot of redundant, repeated data, compressing them replaces repeated data with pointers to the data. The pointers take up much less space than the repeated data, so the size of the file is reduced.

Encryption

the process of encoding data and information into an unreadable form.

NAT- Network address translation

the process of modifying an IP address while it is in transit across a router, computer, or similar device, hides a person's private internal IP address.

What is booting?

the process of starting or restarting a computer

Command language

the set of commands entered when using a command-line interface.

Which port categories include inbound ports HTTP, HTTPS, FTP, and DNS?

well known ports

NIPS

what type of device is designed to inspect traffic, detect malicious activities, and take steps to mitigate the malicious activity?

NIDS

what type of device is used to detect malicious network activities and reports only those issues to the administrator?

thrashing

when an operating system spends much of its time paging instead of executing application software.

Multi-booting

where you choose at startup which operating system you want to load, you might need to format a partition with FAT32 if that partition will run Windows 95, Windows 98, or Windows Millenium Edition.

Network

which layer in the OSI model is used to verify that data was delivered without error?

Data Link

which layer is the OSI model covers routing between networks?

client/server

which model uses a central database for authentication?

Policy change, be aware of the following

• Audit Policy Change- audits changes in security audit policy settings. • Authentication Policy Change- audits events generated by changes to the authentication policy. • Authorization Policy Change- audits generated by changes to the authorization policy. • MPSSVC Rule-Level Policy Change- aduits events generated by changes in policy rules used by Windows Firewall. • Filtering Platform Policy Change- audits events generated by changes to WFP. • Other Policy Change Events- audits generated by other security policy changes that are not audited in the Policy Change category.

Account Logon, Be aware of the following settings

• Credential Validation audits events generated by validation tests on user account logon credentials. • Kerberos Service Ticket Operations- audits events generated by Kerberos service ticket request. • Other Account Logon Events- audits events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. • Kerberos Authentication Service- audits events generated by Kerberos authentication ticket-granting ticket (TGT) request.

DS Access, be aware of the following

• Direcetory Service Access audits events generated when an AD DS object is accessed. • Only AD DS object with a matching global System Access Control List (SACL) are logged. • Events in this subcategory are similar to the Directory Service Access events available in previous version of Windows. • Directory service Changes- audits events generated by changes to AD DS objects. Events are logged when an object is created, deleted, modified, moved, or undeleted. • Directory Service Replication- audits replication between two AD DS domain controllers. • Detailed Directory Service Replication- audits events generated by detailed AD DS replication between domain controllers.

Object Access, be aware of the following

• File System- audits user attempts to access file system objects. • Registry- audits attempts to access registry objects. • Kernel Object- audits attempts to access the system kernel, which include mutexes and semaphores. NOTE: The Audit: audits the access of global system objects policy setting controls the default SACL of kernel objects. • SAM- audits events generated by attempts to access Security Accounts Manger (SAM) objects. • Application Generated- audits applications that generate events by using the Windows Auditing Application Programming Interface (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function. • Handle Manipulation- audits events generated when a handle to an object is open or closed. Only objects with a matching SACL generate security audit events. • File Share- audits attempts to access a shared folder. However, no security audit events are generated when a folder is created, deleted, or its share permissions are changes. • Detailed File Share- audits attempts to access files and folders on a shared folder. Note: the Detailed File share settings logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. • Filtering Platform Packet Drop- audits packets that are dropped by Windows Filtering Platform (WFP). • Filtering Platform Connection- audits connections that are allowed or blocked by WFP. • Other Object Access Events- audits events generated by the management of Task Scheduler jobs or COM+ objects.

Global Object Access Auditing, be aware of the following

• File system- audits a SACL on the file system for an entire computer. NOTE: If both a file or folder SACL and a Global Object Access Auditing policy (or a single registry setting SACL and a Global Object Access Auditing policy) are configured on a computer, then an audit event is generated if an activity matches either the file or folder SACL or the Global Object Access Auditing policy. • Registry- audits a global SACL on the file system for an entire computer. NOTE: Both the File system and Registry settings must be used in combination with their corresponding security policy setting under the Object Access category.

Logon/Logoff, be aware of the following

• Logon -audits events generated by user account logon attempts on a computer. • Logoff- audits events generated by closing a logon session. These events occur on the computer taht was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. • Account Lockout- audits events generated by a failed attempt to log on to an account that is locked out. • IPsec Main Mode- audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotations. • IPsec Extended Mode- audits events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. • Special Logon- audits events generated by special logons. • Other Logon/Logoff Events- audits other events related to logon and logoff that are not included in the Logon/Logoff category. • Network Policy Server- audits events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These request can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.

System, be aware of the following

• Security State Change- audits events generated by changes in the security state of the computer. • Security System Extension- audits events related to security system extensions or services. • System Integrity- audits events that violate the integrity of the system subsystem. • IPsec Driver- audits events that are generated by the IPsec filter driver. • Other System Events- audits any of the following events; • Startup and shutdown of the Windows Firewall • Security policy processing by the Windows Firewall. • Cryptography key file and migration operations.

Privilege Use, be aware of the following

• Sensitive Privilege Use- audits events generated by the use of sensitive privileges (user rights), such as acting as part of the operating system, backing up files and directories, impersonating a client computer, or generating security audits. • Non Sensitive Privilege Use- audits events generated by the use of non-sensitive privileges (user rights), such as logging on locally or with a Remote Desktop connection, changing the system time, or removing a computer from a docking station.

Account Management, be aware of the following

• User Account Management- audits changes to user accounts. • Computer Account Management- audits events generated by changes to computer accounts, such as when a computer account is created, changed, or deleted. • Security Group Management- audits events generated by changes to security groups • Distribution Group Management- audits events generated by changes to distribution groups. Events are logged only on domain controllers. • Application Group Management- audits events generated by changes to application groups. • Other Account Management Events- audits events generated by other user account changes that are not covered in this category.

In Windows Server 2008 R2, 53 new auditing capabilities have been integrated with Group Policy. Be aware of the following details about the advanced audit policy configuration

• You can configure the Advanced Audit Policy using the Group Policy Management Console by navigating to the Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration node or by using the command line utility auditpol.exe. • The 53 new settings can be used in place of the nine basic auditing settings under Local Policies\Audit Policy to specifically target the types of activities you want to audit and eliminate the unnecessary auditing activities that can make audit logs difficult to manage and decipher. • Using both the basic audit policy settings under Local Policies\Audit Policy and the advanced settings under Advanced Audit Policy Configuration can cause unexpected results; the two sets of audit policy settings should not be combined. • If you use Advanced Audit Policy Configuration settings, you should enable the Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings policy settings under Local Policies\Security Options. This will prevent conflicts between similar settings by forcing basic security auditing to be ignored. • Reason for Access auditing logs the reason, based on specific permissions. why someone had access to specific resources. The reason why someone has been granted or denied access is added to the open handle event. To enable this functionality, the handle manipulation audit policy also need to be enabled.


Set pelajaran terkait

LEGL-2064 - Chapter 8: Intellectual property rights

View Set

Chapter 30 Biology Homework and Readings

View Set

International Business Exam - ALL Quizzes

View Set

Nursing Fundamentals exam 4 practice test

View Set

Pre Chapter 41: Drug Therapy for Diabetes Mellitus

View Set