CNT 120: Chapter 1, CNT 120 Chapter 2, CNT 120 Chapter 3, CNT CHAPTER 4, CNT 125: Chapters 3 & 4, CNT CHAP 5, CNT120 CHAP 6, CNT 125: Chapter 7, CNT 125: Chapter 8, CNT 125 Chapter 9, CNT 125 Chapter 10, CNT 125 Chapter 11, CNT 125 Chapter 12, CNT 12...

Ace your homework & exams now with Quizwiz!

IS-IS

-link-state routing protocol -uses a more complex algorithm to calculate the best path to a destination -fast convergence time -used ONLY on interior routers -can be used for IPv4 and adapted for IPv6

OSPF

-link-state routing protocol -uses a more complex algorithm to calculate the best path to a destination -fast convergence time -very commonly used interior and border routers -used primarily for IPv4

packet-filtering firewall

-Examines header of every entering packet (inbound traffic) -Can block traffic entering (inbound traffic) or exiting a LAN (outbound traffic)

stateless firewall

-manages each incoming packet as a stand-along entity without regard to active connections -Faster .... But less sophisticated

OpenVPN

-open source VPN protocol that uses OpenSSL for encryption -has ability to cross many firewalls -highly secure and highly configurable

NFV

-pfSense VMware Ready Virtual Firewall by Netgate -Barracuda's NextGen Firewall F-Series

IDS

-stand alone device or software running on a computer -used to monitor network traffic and create alerts when suspicious activity happens

PPPoE

-standard for connecting home computers to ISP via DSL or broadband cable -When PPP is used over Ethernet Network

symmetric DSL

-technology provides equal capacity for data traveling both upstream and downstream -HDSL, SDSL, SHDSL

asymmetric DSL

-technology that offers more capacity for data traveling downstream than data traveling upstream -ADSL, VDSL

command-line software

-telnet -SSH

MU-MIMO

-that allows multiple antennas to service multiple clients simultaneously -Reduces congestion and contributes to faster data transmission -Available with WAVE 2 802.11ac products

site-to-site VPN

-tunnels connect multiple sites on a WAN -VPN gateway encrypts and encapsulates data to exchange over the -tunnel with another VPN gateway -clients and servers do not have to run special VPN software

Cat 7

10 Gbps - Each wire pair is shielded ... and ... there is shielding right under the cable jacket that is around all 4 wire pairs. Different type of connector is used.

Cat 6a

10 Gbps - cables include a solid plastic core that keeps the twisted pairs separated - cables often include shielding around all pairs for better shielding from cross-talk and interference

Cat 6

10 Gbps - cables include a solid plastic core that keeps the twisted pairs separated and prevents the cable from being bent too tightly.

10GBase-SR and 10GBase-SW

10 Gigabit Ethernet MMF 850 nm wavelength light source distances up to 300 meters

10GBase-LR and 10GBase-LW

10 Gigabit Ethernet SMF 1310 nm wavelength light source distances can reach 10,000 meters

10GBase-ER and 10GBase-EW

10 Gigabit Ethernet SMF 1550 nm wavelength light source distances can reach 40,000 meters

10GBase-T

10 Gigabit Ethernet, Cat 6a or higher UTP, 100 meters

Cat 3

10 Mbps - Designed for use with 10 Mbps Ethernet or 4 Mbps token ring networks - paired cable, but little to no twisting for cancellation - rarely found on any modern networks

Cat 5

100 Mbps - Required for Fast Ethernet (100 Mbps) - paired cable that is twisted for cancellation.

Cat 5e

1000 Mbps - Similar to Cat 5 but better quality cable and higher twist pitch (tighter twists for better cancellation) provides better EMI protection.

RG-59

75 Ohm, 20 or 22AWG, stranded core coax cable - typically used for short distance applications (video distribution within a building)

Unintentional DoS Attack

Called a friendly attack because it is not done with malicious intent (busy shopping day on website)

management VLAN

Can be used to provide administrative access to a switch.

data VLAN

Carries user-generated traffic, such as email, web browsing, or database updates.

insecure protocols and services

Certain TCP/IP protocols are inherently insecure - UDP requires no authentication, and TCP requires only weak authentication. FTP is notorious for its vulnerabilities. Other protocols include - HTTP, telnet, SLIP, and TFTP.

Wireless USB

Certified ______ products mimic wired USB 2.0 connections with similar speeds, security, ease of use and compatibility. _________ radios transmit in the range between 3.1 and 10.6 GHz.

EAP

The Enterprise versions of WPA and WPA2 implement additional security measures. In most cases, a RADIUS server is used in cooperation with an authentication mechanism called ______

show vlan

The ______________ command is used to list the current VLANs recognized by a switch.

SIP

The _______protocol is a signaling protocol used to make an initial connection between hosts but it does not participate in the data transfer during the session. (Typically used for setting up VoIP calls)

NTP

The _______protocol is most commonly used by computers as they are booting up to request configuration files from another computer on the local network.

SMB

The _______protocol was used by earlier Windows OS for file sharing on networks. UNIX uses a version of ______ in its Samba software, which can share files with other operating systems, including windows systems.

DMZ

The area between firewalls is called a _______.

error rate

The calculated percentage of how often Bits are damaged in transit due to EMI or other interference

802.11b

Freq Band - 2.4 GHz Max Throughput - 11 Mbps Effective Throughput - 5 Mbps Average Range - 100m

802.11g

Freq Band - 2.4 GHz Max Throughput - 54 Mbps Effective Throughput - 20-25 Mbps Average Range - 100m

802.11n

Freq Band - 2.4 GHz or 5 GHz Max Throughput - 600 Mbps Effective Throughput - 65-500 Mbps Average Range - Indoor 70m - Outdoor 250m

802.11ac

Freq Band - 5 GHz Max Throughput - 1.3 Gbps - 6.9 Gbps Effective Throughput - 561 Mbps per client Average Range - Indoor 70m - Outdoor 250m

802.11a

Freq Band - 5 GHz Max Throughput - 54 Mbps Effective Throughput - 11-18 Mbps Average Range - 50m

4

Generally, a twisted-pair cable's bend radius is equal to or greater than _____ times the diameter of the cable.

1000Base-SX

Gigabit Ethernet MMF 850 nm wavelength light source distance can reach 550 meters

1000Base-LX

Gigabit Ethernet SMF or MMF 1300 nm wavelength light source MMF distance can reach 550m SMF distance can reach 5000 meters

1000Base-T

Gigabit Ethernet, Cat 5 UTP or better (Cat 5e UTP is preferred), 100 meters

NOS (Network Operating System)

The client-server network model requires a(n) ______ which controls access to the entire network. (Examples are: Windows 2016 Server, Ubuntu Server, Red Hat Enterprise Linux)

APIPA Address

The following IP address: 169.254.0.23 is an example of what TYPE of IP address?

Private IP Address

The following IP address: 172.16.0.35 is an example of what type of IP address?

Private IP Address

The following IP address: 192.168.0.35 is an example of what type of IP address?

Class C

The following IP address: 193.160.223.1 is an example of what class of IP address?

Class D

The following IP address: 224.0.0.10 is an example of what class of IP address?

Broadcast

The following IP address: 255.255.255.255 is an example of what TYPE of IP address?

Class A

The following Subnet Mask: 255.0.0.0 is the default Subnet Mask for what class of IP Address?

Class B

The following Subnet Mask: 255.255.0.0 is the default Subnet Mask for what class of IP Address?

Class C

The following Subnet Mask: 255.255.255.0 is the default Subnet Mask for what class of IP Address?

Class A

The following Subnet Mask: 255.0.0.0 is the default Subnet Mask for what class of IP Address?

Class B

The following Subnet Mask: 255.255.0.0 is the default Subnet Mask for what class of IP Address?

Class C

The following Subnet Mask: 255.255.255.0 is the default Subnet Mask for what class of IP Address?

True

The following are advantages of a Client-Server network: user accounts and passwords to the network are assigned in one place access to multiple shared resources can be centrally granted to a single user or groups of users problems on a network can be monitored, diagnosed, and often fixed from one location network is scalable

True

The following are advantages of a Peer-to-Peer network: simple to configure less expensive than other network options

True

The following are disadvantages of a Peer-to-Peer network: they are not scalable they are not necessarily secure not practical for connecting more than a few computers

Socket

The following number: 192.168.100.50:23 Is an example of which of the following choices?

True

In most situations, each VLAN is assigned its own subnet of IP addresses. This means that the subnet, working at Layer 3, includes the same group of hosts as the VLAN, working at Layer 2.

FCC

In the United States, the collection of frequencies available for communication - known as "the airwaves" - is considered a natural resource available for public use. The ____ grants organizations in different locations exclusive rights to use each frequency.

RDP

In the Windows Operating System, the ______ application is used to provide a secure, encrypted transmission that allows a technician to remote in to a machine to make configuration changes or troubleshoot that device.

8

Select from the options shown below the number of bits that are available for the Host Portion of a Class C Address.

8

Select from the options shown below the number of bits used to represent the Network Portion of a Class A Address.

16

Select from the options shown below the number of bits used to represent the Network Portion of a Class B Address.

24

Select from the options shown below the number of bits used to represent the Network Portion of a Class C Address.

105.0.0.0

Select the correct Network Number or Network ID of the following IPv4 Address: 105.15.32.12 /8

132.16.0.0

Select the correct Network Number or Network ID of the following IPv4 Address: 132.16.25.92 /16

195.168.32.0

Select the correct Network Number or Network ID of the following IPv4 Address: 195.168.32.12 /24

FHSS

Short bursts of data are transmitted on a particular frequency within the band and the next burst goes to the next frequency in the sequence.

Flags

Signals special conditions (SYN, ACK, PSH, RST, FIN, etc...)

Preamble & SFD (Start of Frame Delimiter)

Signals the receiving node that data is incoming and indicates where the data frame begins

EAP-TLS

Similar to how HTTPS uses SSL/TLS encryption to secure HTTP transmissions, ________ uses TLS encryption to protect communications. __________ also uses PKI (public-key infrastructure) certificates to exchange public keys and authenticate both the supplicant and the server through mutual authentication.

SSO

-Form of authentication in which a client signs on one time to access multiple systems or resources -Primary advantage is convenience -Disadvantage is that once authentication is cleared, the user has access to numerous resources -Kerberos is an example

PDoS Attack

-attack damages a device's firmware beyond repair. -called "bricking" the device -usually target routers or switches

back doors

Software might contain security flaws that allow unauthorized users to gain access to the system. Unless the network administrator performs regular updates, a hacker might exploit these flaws.

stateful firewall

-inspect each packet and determine if it belongs to a currently active connection (legitimate packet) -Slower ... but more sophisticated

NIU or NID

end of the local loop - the box at the customer site that connects customer to local loop (box on the side of your house) - this is the customer's demarcation point

fault

malfunction of one component of a system

TFTP

simple version of FTP that includes no authentication of security - most often used by machines behind the scenes to transfer boot files or configuration files

Physical

simplest layer and is responsible for sending bits via a wired or wireless transmission (Twisted Pair Copper, Fiber Optic, Radio Frequency)

CDMA

spreads the signal over a wider bandwidth so that multiple users occupy the same channel - codes on the packets keep the various calls separated

bandwidth

the theoretical potential for data to transmit during a given period of time

business continuity

The goal of a disaster recovery plan is to ensure ____________, which is the ability of the company to continue doing business with the least amount of interruption possible.

patch panel

This is a panel of data receptors which can be mounted to a wall or a rack which provides a central termination point when many patch cables converge in a single location.

66 block

This is an older connection block used primarily for telephone connections.

entrance facility

This is the location where an incoming network, such as the Internet, connects with a school or corporate network.

Metasploit

This popular penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes.

TLD

This portion of the following: .edu is an example of a __________________.

Host Name

This portion of the following: dbrown is an example of a __________________.

FQDN

This portion of the following: dbrown.hacc.edu is an example of a __________________.

Domain Name

This portion of the following: hacc.edu is an example of a __________________.

IDF

This provides an intermediate connection between the MDF and the end-user equipment on each floor and in each building.

management URL

When you use a web browser and plug in the IP Address of the router to connect to and configure the router, you are using a _________.

Bare-Metal Hypervisor

XenServer by Citrix, ESXi by VMware, Hyper-V by Microsoft

EMI

________ is the noise/interference caused by electrical devices (motors, fluorescent lights) or wires (power lines) carrying electrical signals.

RFI

________ is the noise/interference caused by strong broadcast signals from a radio or TV station.

Attenuation

________ is the the weakening of a signal over a distance as the signal propagates.

Jitter

________ is when packets arrive out of order due to varying amounts of delay on a link.

local loop

a pair of copper wires between CO and customer - the portion of the PSTN that connects any residence or business to the nearest CO - also called the "last mile"

MitM Attack (Man-in-the-Middle)

a person redirects and captures secure transmissions as they occur (hacker could intercept transmissions between clients and a rogue access point). Through these captured transmissions, the attacker can learn users' passwords or even supply users with a phony website that looks valid but presents clickable options capable of harming their systems

IP phone

a phone that transmits and receives digital voice signals - the users voice is immediately digitized and issued from the telephone to the network in packet form

IP-PBX

a private switch that accepts and interprets both analog and digital voice signals and will also communicate and connect with network connectivity devices like routers and gateways - can connect to traditional PSTN lines and data networks

trojan horse

a program that disguises itself as something useful but actually harms you computer

bots

a program that runs automatically without requiring a person to start or stop the program

Recursive

a query that demands a resolution or the answer "It can't be found"

Iterative

a query where the local server issues queries to other servers ... and ...other servers only provide information if they have it (there is no demand for an answer)

patch cable

a relatively short cable (3 to 25 feet) length with connectors at both ends - used to connect user device to a data outlet

Terminal Emulation

allows a remote client to take over and command a host computer (Examples: Telnet, SSH, Remote Desktop and VNC)

SIP

an IETF protocol - an Application layer signaling and control protocol for multiservice, packet-based networks (protocol is modeled on HTTP)

ATA

an adapter that allows an analog phone(s) to connect into a VoIP network

Virtualization

________________ is a virtual, or logical version of something (emulation of a computer, operating system environment, or application) rather than the actual or physical version of something.

fault tolerance

___________________ is the capacity for a system to continue performing despite an unexpected hardware or software malfunction.

disaster recovery

____________________ is the process of restoring your critical functionality and data after an outage that affects more than a single system or a limited group of users.

physical security

____________________ refers to the mechanisms used to restrict physical access to critical components in a network or system.

Cloud Computing

_____________________ refers to the flexible provision of data storage, applications, or services to multiple clients over a network. The term includes a broad range of offerings, from hosting Web sites, to delivering specialized applications to providing virtual servers for collaboration or software development.

phishing

a hacker sends an email asking a user to input their user ID and password to a website whose link is provided in the message, claiming it is necessary to verify your account with an online retailer

PVC

a leased connection established before transmissions occur - bandwidth is shared with other frame relay users - connection remains after transmission is completed

heat map

a map of Wi-Fi signals and noise in your location

NIC

a network port used to attach a device to a network and allow it to send and receive data on the network

load balancing

automatic distribution of traffic over multiple connections to optimize performance and fault tolerance

dynamic IP address

automatically assigned by by DHCP server when computer connects to network

MTTR

average amount of time required to repair the failed device

MTBF

average amount of time that will pass before the next failure is expected to occur

ipconfig

displays the currently assigned IP address

ipconfig /all

displays the currently assigned IP address, the address of the DNS server, DHCP leasing information, and the MAC address of the NIC

nonpersistent agent

dissolvable agent, remains on the device long enough to verify compliance and complete authentication, and then uninstalls.

WEP

encryption that uses a static key to authenticate and encrypt the clients data - use of the shared key makes it more susceptible to discovery - has been replaced by WPA/WPA2

WPA

encryption that dynamically assigns every transmission its own key

RG-6

75 Ohm, 18AWG, solid core coax cable - typically used for broadband internet service and cable TV

blackout

A complete power loss.

broadcasting

ARP relies on ________, which transmits simultaneously to all nodes on a particular network segment.

NGFWs (Next Generation Firewalls)

(Layer 7 Firewall) firewall that can analyze data at higher layers

host-to-host VPN

-2 computers create a VPN tunnel directly between them -both computers have appropriate software installed

SaaS

-Applications -Provider now handles the Application for the customer -Vendor has the hardware for customer, OS's, and associated SW for the OS, the application and data backup -Example: Gmail & Yahoo email -Example: Google drive

PPP

-Can negotiate and establish a connection between two computers -Can authenticate a client to a remote system (PAP or CHAP) -Can support several types of Network layer protocols -Can encrypt the transmissions, although encryption is considered weak by today's standards

hybrid cloud

-Combination of the other service models into a single deployment -Public cloud for email ... but private cloud for storing data

Frame Aggregation

-Combine multiple frames into one larger frame -Reduces Overhead

traffic shaping

-Delaying less-important traffic -Increasing the priority of more-important traffic

L2TP

-Developed by Cisco and standardized by IETF -Encapsulates PPP data in a similar manner to PPTP -Can connect a VPN that uses a mix of equipment types -It is a standard accepted and used by multiple vendors -Can connect two routers, a router and a RAS, or a client and a RAS -typically implemented with IPsec for security

PPTP

-Developed by Microsoft -A Layer 2 protocol that encapsulates PPP data frames so they can traverse the Internet masked as an IP transmission -Uses TCP segments at the Transport layer -Outdated and no longer considered secure

SLIP

-Early and less sophisticated -Does not support encryption -Can only carry IP packets -Works strictly on serial connections (Dial up or DSL)

DS0 -or- analog phone line

64 Kbps

IaaS

-Hardware services and network infrastructure devices -Vendor has the hardware for customer ... but the customer is responsible for own applications, OS's, licenses and data backup -Example: customer uses vendor servers to store data, host websites, provide email, DNS or DHCP Services

traffic policing

-Limiting the volume of traffic flowing in to or out of an interface during a specified time period -Limiting the momentary throughput rate for an interface

RADIUS

-Most popular -Runs in application layer -Defined by the IETF -Transported over UDP or TCP -Treats authentication and authorization as a single process -Can operate as application on remote access server .... or on a dedicated server -Highly scalable -May be used to authenticate wireless connections -Can work in conjunction with other network servers

MIMO

-Multiple antennas on access points and client devices process incoming and outgoing data simultaneously -Increases network's throughput, access point's range -First Available in 802.11n Access Points

PaaS

-OS, runtime libraries or modules the OS provides to applications, and the hardware on which the OS runs -Provider now handles the OS and associated SW for OS -Vendor has the hardware for customer, OS's, and associated SW for the OS ... but customer is responsible for own applications and data backup

CHAP

-Operates over PPP -Encrypts user names, passwords -Uses three-way handshake -Three steps to complete authentication process -Password never transmitted alone -Password never transmitted in clear text

PAP

-Operates over PPP -Uses two-step authentication process -Simple -Not secure -Sends client's credentials in clear text

DDoS Attack

-Orchestrated through several sources, called zombies -botnet ... or ... zombie army

Kerberos

-Purpose: connect a valid user with a service it wants to access -Cross-platform authentication protocol -Uses key encryption -Verifies client identity -Securely exchanges information after client logs on -Private key encryption service -Provides significant security advantages over simple NOS authentication -does not automatically trust clients - instead it requires clients to prove their identity through a 3rd Party

TACACS

-Relies on TCP at the Transport layer -Proprietary protocol developed by Cisco Systems, Inc. -Typically installed on a router -Encrypts all information transmitted for AAA

GUI-based software

-Remote Desktop for Windows -join.me -VNC -Team Viewer

private cloud

-Service established on an organization's own servers in its own data center -Customer maintains own virtual servers

public cloud

-Service provided over public transmission lines -Most examples discussed occur in public cloud (Gmail, etc..)

community cloud

-Service shared between multiple organizations -Medical Database between hospitals and doctors in area

Channel Bonding

-Two adjacent 20-MHz channels bonded to make 40-MHz channel -Doubles the bandwidth available in single 20-MHz channel

default VLAN

-Typically preconfigured on a switch and initially includes all the switch's ports -cannot be renamed or deleted

SDN

-VMware, Cisco, HP, IBM and Juniper controller software -OpenDaylight, Beacon, OpenShift

BGP

-an exterior gateway routing protocol -can span multiple autonomous systems -can be used on border and on exterior routers on the Internet -"protocol of the Internet"

T3

672 channels of 64 Kbps (44.736 Mbps)

Distance-Vector routing protocol

-calculates best path to destination on the basis of distance (typically hops) to that network -periodically (sometimes every 30 seconds) exchange their routing tables with neighbor routers (usually via broadcast) -RIP and RIPv2 are examples

Distance-Vector routing protocol

-calculates the best path to a destination on the basis of distance (typically hops) to that network -periodically (sometimes every 30 seconds) exchange their routing tables with neighbor routers (usually via broadcast) -RIP and RIPv2 are examples

content-filtering firewall

-can block traffic based on upper layer (application layer) data contained in the packet -can block questionable content from a website

client-to-site VPN

-clients, servers and other hosts establish tunnels with a private network using a remote access server or VPN gateway -each client must run their own VPN software to create the tunnel for, and encrypt and encapsulate data -method usually associated with remote access

IKEv2

-component of IPsec protocol -offers fast throughput and good stability when moving between wireless hotspots -compatible with a variety of devices

LAN

-covers a relatively small area (room, floor, building) -uses are for sharing resources and data

WAN

-covers a very large area (between cities and even continents) -uses are for connecting sites of a company (Harrisburg Office to Pittsburgh Office

MAN

-covers usually a "city-wide" area -used to typically connect buildings within a city (government buildings for example)

GRE

-developed by Cisco -Layer 3 protocol used to transmit PPP, IP and other messages through a tunnel -typically implemented with IPsec for security

IPS

-device between attacker and network or host -stands inline with the network traffic and can stop traffic -can prevent traffic from reaching the protected network or host

RIP

-distance-vector routing protocol -only factors hop count to determine the best path to a destination -broadcasts routing table every 30 seconds -convergence time is poor -limited network size (15 routers)

Link-State routing protocol

-independently map the network and determine the best path between itself and destination network -will usually only exchange routing tables when a topology change occurs -will typically use multicasts to exchange routing tables with all routers directly -OSPF and IS-IS are examples

analog phone line

1 channel of 64 Kbps

1 Kbps

1,000 bps

1 Mbps

1,000,000 bps

1 Gbps

1,000,000,000 bps

1 Tbps

1,000,000,000,000 bps

DS1 -or- T1

1.544 Mbps

Global unicast

2000:: /3

T1

24 channels of 64 Kbps (1.544 Mbps)

Source IP address

32 bit address of sending node

Destination IP address

32 bit address of the receiving node

Cat 7a

40 Gbps - 100 Gbps - ISO Standards are still being drafted.

DS3 -or- T3

44.736 Mbps

LTE

4G technology - theoretically achieve downlink data rates of up to 1 Gbps and uplink rates up to 100 Mbps - currently the fastest wireless broadband service available in the United States

/8

A Class A network that has no subnetting would have a default CIDR notation of _____.

255.0.0.0

A Class A network that has no subnetting would have a default Subnet Mask of _______________.

/16

A Class B network that has no subnetting would have a default CIDR notation of _____.

255.255.0.0

A Class B network that has no subnetting would have a default Subnet Mask of _______________.

/24

A Class C network that has no subnetting would have a default CIDR notation of _____.

255.255.255.0

A Class C network that has no subnetting would have a default Subnet Mask of _______________.

Do Not Forward

A LAN is defined as a group of computers and other devices that can directly address each other without going through a router. A LAN which consists of all the nodes a broadcast reaches, can be referred to as a broadcast domain. Routers _______________ broadcast messages, thus creating a boundary for a LAN.

IP Addresses

A Layer 3 Switch is a switch that is capable of interpreting __________ and works much like a router: Layer 3 switches were designed to work on large LANs, similar to core routers, except they are faster and less expensive.

TCP Ports

A Layer 4 Switch is a switch that is capable of interpreting __________ . They operate anywhere between Layers 4 and 7 and are also know as content switches or application switches.

time division multiplexing

A T-Carrier uses ______ over 2 wire pairs to combine multiple signals onto a single cable.

Software Running on a Server

A Windows Server that is running Direct-Access that can automatically authenticate remote users and computers to the Windows Domain

DSLAM

A ____ aggregates multiple DSL subscriber lines and connects them to the carrier's CO.

PBX

A ____ is a telephone switch that connects and manages calls within a private organization.

subnet

A _____ is a smaller network within a larger network. A _______ is a logically visible subdivision of an IP network that is usually created for performance or security reasons and is usually implemented by a router (or other Layer 3 device).

Type 2

A ______ hypervisor installs in a host OS as an application and is called a hosted hypervisor.

Type 1

A ______ hypervisor installs on a computer before any OS and is often called a bare-metal hypervisor.

VPNs

A ______ is a network connection encrypted from end to end that create a private connection to a remote network.

NAC

A ______ system employs a set of rules, called network policies, which determine the level and type of access granted to a device when it joins a network. A popular _____ solution by Cisco includes Cisco firewalls, routers, switches, and ASA (Adaptive Security Appliance) devices that all collectively perform ______ functions.

IPv6

A _______ Address is assigned to nearly every interface, which is a network connection made by a node on a network. An _____ Address has 128 Bits and is written as 8 blocks of hexadecimal numbers separated by colons.

IPv4

A _______ Address is assigned to nearly every interface, which is a network connection made by a node on a network. An _____ Address has 32 Bits and is written as 4 decimal numbers separated by dots.

MAC

A _______ Address is embedded on every NIC and is assumed to be unique to that NIC. It is 48 Bits in length, written as 6 HEX numbers separated by colons. Nodes on a LAN find each other by using the ______ Address.

firewall

A _______ is a dedicated device or software on a computer that selectively filters or blocks traffic between networks.

Port

A _______ is a number used by the transport layer to find an application. It identifies one application among several that might be running on a host.

router

A _______ joins two or more networks and passes packets from one network to another. A ________ is responsible for determining the next network to which a packet should be forwarded on its way to its destination.

vSwitch

A _______ or bridge is a logically defined device that operates at the data link layer to pass data frames between nodes. Thus, it can allow VMs to communicate with each other and with nodes on a physical LAN or WAN.

hacker

A _______, in the original sense of the word, is someone who masters the inner workings of computer hardware and software in an effort to better understand them. Today, _________ is used more generally to describe individuals who gain unauthorized access to systems or networks with or without malicious intent.

DSL modem

A ________ is a device that modulates outgoing signals and demodulates incoming DSL signals for the DSL subscriber.

DHCP

A _________ Server manages the dynamic distribution of IP addresses to devices on a network.

Generator

A _________ serves as a backup power source, providing power redundancy in the event of a total blackout. ____________ can be powered by diesel, liquid propane gas, natural gas, or steam.

standby

A __________ UPS provides continuous voltage to a device by switching virtually instantaneously to the battery when it detects a loss of power from the wall outlet. Upon restoration of power, the ___________ UPS switches the device back to AC power. The problem with a _________ UPS is that, in the brief amount of time it takes the UPS to discover that power from the wall outlet has faltered, a device may have already detected the power loss and shut down or restarted.

proxy server

A __________ acts as an intermediary between external and internal networks (Screens all incoming and outgoing traffic) and works at Application Layer to protect the network.

VLAN

A __________ groups ports on a layer 2 switch so that some of the local traffic on the switch is forced to go through a router.

WAN

A __________ is a network that traverses some distance and usually connects LANs, whether across a city or across the nation.

resolver

A ___________ is a DNS client that requests information from DNS name servers.

media converter

A ___________ is designed to convert the electrical signals on a copper cable to light signals on a fiber optic cable ...... so that a copper port of a device can be connected to a fiber optic port on another device.

continuity tester

A ____________ can be used to check if a network patch cable is functioning correctly and usable or if there is a fault in the cable.

optical power meter

A ____________ can be used to measure the amount of light power transmitted on a fiber-optic line.

multimeter

A ____________ can be used to take voltage and resistance measurements to help locate the cause of interference or a short circuit.

cable certifier / performance tester

A ____________ can be used to verify if the installed network cabling is performing to the desired TIA performance level.

security policy

A ____________ for network users identifies your security goals, risks, levels of authority, designated security coordinator and team members, responsibilities for each team member, and responsibilities for each employee. In addition, it specifies how to address security breaches.

rack diagram

A ________________ shows the devices stacked in a rack system and are typically drawn to scale.

wiring schematic

A ________________, which is a graphical representation of a network's wired infrastructure. In it's most detailed form, it shows every wire necessary to interconnect network devices and the location of those wires.

protocol analyzer

A _________________, can monitor traffic at a specific interface between a server or client and the network.

network monitor

A __________________ is a tool that continually monitors network traffic.

routing table

A __________is a database that holds information (networks and interfaces) about where hosts are located and the most efficient way to reach them (best path).

socket

A _________consists of host's IP address and the port number of an application running on the host, with a colon separating the 2 numbers. (Ex: 10.43.3.87:23)

circuit-switched

A connection is established between two nodes before they begin transmitting data. Bandwidth is dedicated to this connection and remains available until the users terminate communication between the two nodes.

patch

A correction, improvement or enhancement to software. It corrects a bug, closes a vulnerability, or adds minor enhancements to only part of the software, leaving most of the code untouched.

jabber

A device that handles electrical signals improperly - device always re-transmitting (bad NIC or electrical interference)

subnet mask

A device uses a _______________ to determine which subnet or network it belongs to.

DC

A flashlight, uses ______. The batteries in a flashlight have positive and negative poles, and the current always flows at a steady rate in the same direction between those poles,

True

A good guideline to follow on network documentation is to label every data jack or port, patch panel or punchdown block, connector or circuit.

True

A good guideline to follow on network documentation is to use color-coded cables for different purposes and record the color schemes in your documentation.

War Driving

A hacker searches for unprotected wireless networks by driving around with a laptop configured to receive and capture wireless data transmissions

upgrade

A major change to a software package that enhances functionality and features of the software.

WPAN

A mini version of a LAN is a PAN, and the purely wireless version is a ________, as defined by the IEEE 802.15 specifications.

brownout

A momentary decrease in voltage; also known as a sag. An overtaxed electrical system can be the cause.

surge

A momentary increase in voltage due to lightning strikes, solar flares, or electrical problems.

FCoE

A newer technology that allows FC to travel over Ethernet hardware and connections. FC frame is encapsulated inside an ______ frame, which is then encapsulated inside an Ethernet frame

virus

A program that replicates itself with the intent to infect more computers, either through network connections when it piggybacks on other files or through the exchange of external storage devices.

security audit

A qualified consulting company can also assess the security of your network. If the company is accredited by an agency that sets security standards, the assessment qualifies as a _____________.

Evil Twin

A rogue AP planted in a network's geological area to pose as an authorized AP

True

A router can do all of the following: -connect dissimilar networks -interpret layer 3 and often layer 4 addressing -determine the best path for data to follow from point A to B -reroute traffic if a primary path is down but another path is available

True

A router can do all of the following: -connect dissimilar networks -interpret layer 3 and often layer 4 addressing -determine best path for data to follow from point A to B -reroute traffic if a primary path is down but another path is available

access list (ACL)

A router's __________ can decline or forward packets based on it's content.

non-disclosure agreement

A security policy should also define what confidential and private means to the organization. This is often done in an ________________ . In general, information is confidential if it could be used by other parties to impair an organization's functioning, decrease customers' confidence, cause a financial loss, damage an organization's status, or give a significant advantage to a competitor.

trunking

A single switch can support traffic belonging to several VLANs across the network, thanks to the technique known as__________.

less

A wireless network with a theoretical maximum throughput of 10 Mbps will, in fact, transmit _________ data per second than a wired Ethernet network with the same theoretical maximum throughput of 10 Mbps.

T-Carrier

AT&T developed _________ technology in 1957 in an effort to digitize voice signals and thereby enable such signals to travel longer distances over the PSTN. In the 1990's, with increased data communications demands, _________ became a popular way to connect WAN sites.

fixed length 53 byte cell

ATM uses a __________ to carry data from node to node.

star

According to IEEE 802.3 ... and ... ANSI/TIA-568 .... modern Ethernet networks should be connected as a _________ topology.

Core

According to the Cisco Hierarchical Internetworking Model - the _______ Layer Provides fast transport between distribution switches within the enterprise campus. _________ switches and routers are usually the most powerful, in terms of raw forwarding power, in the enterprise; _______ network devices manage the highest-speed connections, such as 10 Gigabit Ethernet or 100 Gigabit Ethernet.

Distribution

According to the Cisco Hierarchical Internetworking Model - the _______ Layer Provides policy-based connectivity and controls the boundary between the access and core layers. The __________ layer is the smart layer in the three-layer model. Routing, filtering, and QoS policies are managed at the ____________ layer.

Access

According to the Cisco Hierarchical Internetworking Model - the _______ Layer Provides workgroup/user access to the network. End-stations and servers connect to the enterprise at the ________ layer. This layer is also called the desktop layer because it focuses on connecting client nodes, such as workstations to the network.

attenuation

After a signal is transmitted, the farther it moves away from the transmission source, the more it weakens. Similar to wired transmission, wireless signals can be amplified by increasing the power of the transmission or extended by repeating the signal from a closer broadcast point called a wireless range extender.

True

After connecting, a remote client can access files, applications, and other shared resources, such as printers, like any other client on the LAN or WAN.

IoT

All sorts of things can be connected to a network, from toasters, refrigerators, bathrooms scales, and garage doors to watches, lamps, cars and even the kitchen sink. This _____ is made up of any device that can be connected to the Internet - that is any sensor, computer or wearable device that talks to other devices over a network.

SKA - Shared Key Authentication

All wireless access clients use the same key, which can then be used for encrypted transmissions.

wireless spectrum

All wireless signals are carried through the air by electromagnetic waves. The ______________, commonly called the airwaves, is the frequency range of electromagnetic waves used for data and voice communications.

MDF

Also know as the MC (main cross-connect) ... this is the centralized point of interconnection for an organization's LAN or WAN.

32

An IPv4 address is a ____ bit number that is commonly written as a dotted decimal number (4 numbers that range from 0 to 255, and each number separated by a decimal point).

32

An IPv4 address is a ____ bit number that is usually written as a dotted decimal number.

128

An IPv6 address is a _____ bit number that is composed of eight blocks of hexadecimal numbers

128

An IPv6 address is a _____ bit number that is composed of eight blocks of hexadecimal numbers.

128

An IPv6 address is a ______ bit number that is usually written as a hexadecimal number (32 hexadecimal digits).

True

An NOS is a special type of software designed to: manage data and other resources for a number of clients ensure that only authorized users access the network control which type of files a user can open restrict when and from where users can access the network dictate which rules computers will use to communicate supply applications and data files to clients

online

An __________ UPS uses the AC power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery. In other words, a server connected to an __________ UPS always relies on the UPS battery for its electricity.

acceptable use policy

An _______________________ explains to users what they can and cannot do while accessing a network's resources. It also explains penalties for violations, and might describe how these measures protect the network's security.

radiation pattern

An antenna's ___________________ describes the relative strength over a three-dimensional area of all the electromagnetic energy the antenna sends or receives.

disaster

An extreme type of incident, involving a network outage that affects more than a single system or limited group of users.

rogue DHCP server

An unauthorized server running on a client device handing out IP addresses, could be used to implement a MitM attack by configuring the attacker's IP address as the victim computers' default gateway. Alternatively, the attacker could give her IP address as the DNS server and then spoof websites.

rogue access point

An unauthorized wireless access point is called a(n) _____________.

incident

Any event, large or small, that has adverse effects on a network's availability or resources. This could be a security breach, such as a hacker gaining access to a user's account, an infection, such as a worm or virus, or an environmental issue, such as a fire or flood.

managed device

Any network node monitored by the NMS- each object is assigned an OID

Data -or- Payload

Application Layer Presentation Layer Session layer

data mining

Application Layer Presentation Layer Session layer

SNMP

Application layer protocol that communicates data between the managed device (the agent) and the management console (NMS)

remote access

As a remote user, you can connect to a network via ____________, a service that allows a client to connect with and log on to a LAN or WAN in a different geographical location.

fading

As a signal runs into various obstacles, its energy will gradually fade, which causes the strength of the signal that reaches the receiver to be lower than the transmitted signal's strength.

refraction

As waves travel into and through a different transmission medium, such as traveling through glass or other solids, the wave's direction, speed, and wavelength are altered, or "bent".

2

As you have learned, a subnet groups IP addresses so that clients on a large network can be logically organized into smaller networks. This is often accomplished with adding routers (or layer 3 switches) to the network or by using multiple ports on a single router (or layer 3 switch). By contrast, a VLAN groups ports on a layer ____ switch so that some of the local traffic on the switch is forced to go through a router. Therefore, VLANs are considered a Layer ____ solution for segmenting a network.

transponder

At a satellite, a _______ receives the uplink signal, then transmits to an Earth-based receiver in a downlink. A typical satellite contains 24 to 32 ____________. Each satellite uses unique frequencies for its downlink. These frequencies, as well as the satellite's orbit location, are assigned and regulated by the FCC.

deauth (deauthentication) attack

Attacker sends faked deauthentication frames to the AP, the client, or both (or as a broadcast to the whole wireless network) to trigger the deauthentication process and knock one or more clients off the wireless network. This is essentially a Wi-Fi DoS attack.

ESSID

BSSes that belong to the same ESS share a special identifier

differential backup

Backs up data that has changed since the last full backup

full backup

Backs up everything every time a backup is done

incremental backup

Backs up only data that has changed since the last backup

ZigBee

Based on the IEEE 802.15.4 standard, _______ is a low-powered, battery-conserving wireless technology. It is designed to handle small amounts of data and is therefore ideal for use in ISM sensors. _____ is also used for IoT devices for purposes of building automation, HVAC control, AMR, and fleet management.

sequence number(s)

Because messages do not always arrive at the destination host in same order that they were created, TCP attaches a chronological _______________ to each segment so that the destination host can, if necessary, reorder segments as they arrive.

device hardening

Besides securing network devices from external tampering, you can take many steps to secure the device from network- or software-supported attacks as well. These practices are called ______________.

Packet-switched networks

Break data into "chunks/pieces" before they are transported (Ex: IP Phone Network)

security

Broadband cable requires many subscribers to share the same local line, thus raising concerns about ____ and actual (versus theoretical) throughput.

DNS poisoning

By altering DNS records on a DNS server, an attacker can redirect Internet traffic from a legitimate web server to a phishing website

1/2

By some estimates, human errors, ignorance, and omissions cause more than ______ of all security breaches sustained by networks.

HSRP

CARP is a free alternative to VRRP (Virtual Router Redundancy Protocol), or Cisco's propriety version called _________. Although VRRP and _______ function somewhat differently than CARP and are used solely for routers, the general idea is the same.

password policy

Choosing a secure password is one of the easiest and least expensive ways to help guard against unauthorized access. Unfortunately, too many people prefer to use an easy-to-remember password. If your password is obvious to you, however, it might also be easy for a hacker to figure out. A ___________ with guidelines for creating passwords should be part of your organization's security policy. It is especially important for network administrators to choose difficult passwords, and also to keep passwords confidential and change them frequently.

Dedicated Devices

Cisco AS5800 access server that performs authentication for clients

multicast

Class "D" IPv4 Addresses begin with octets 224 to 239 and are used for __________ transmissions, in which one host sends a message to multiple participants.

public

Class A, B and C licensed IP addresses are available for use on the Internet and are therefore called ____________ IP addresses.

Hosted Hypervisor

Client Hyper-V, VirtualBox, VMware Player, Linux KVM

True

Collectively the IEEE 802.11 standards and their amendments, extensions, and corrections are known as Wi-Fi, which stands for Wireless Fidelity.

Hot Site

Computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state.

Cold Site

Computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected.

Warm Site

Computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected.

Acknowledgement Number

Confirms receipt of the data via a return message to the sender

Circuit-switched networks

Connection is established between two network nodes before transmitting data (Ex: Traditional Phone Network)

trunk port

Connects the switch to a router or another switch. This interface manages traffic from multiple VLANs.

access port

Connects the switch to an endpoint, such as a workstation

root server

DNS name servers are organized in a hierarchical structure. A __________ holds information used to locate top-level domain (TLD) servers.

Frames

Data Link Layer

packet-switched

Data is broken into "chunks" before it's transported. "Chunks" can travel any path to their destination - each "Chunk" contains the destination address and sequencing information.

RAID 1

Data is mirrored—or duplicated—on multiple disks to provide fault tolerance. If one copy is lost, the other copy is still available.

RAID 5

Data is striped across three or more drives, and parity information is added to the data. Parity checking can be used to recreate data from any one drive if that drive fails, even though only one copy of the data is stored.

RAID 0

Data is striped—or written across—multiple disks to improve performance. Provides no real redundancy, in that only one copy of data is stored.

DSSS

Data streams are divided and encoded into small chunks, which are spread over all available frequencies within one of three, wide channels, all at the same time.

Nmap

Designed to scan large networks quickly and provide information about a network and its hosts. _______ began as a simple port scanner, which is an application that searches a device for open ports indicating which insecure service might be used to craft an attack.

Nessus

Developed by Tenable Security (tenable.com), _______ performs even more sophisticated vulnerability scans than Nmap. Among other things, _____ can identify unencrypted, sensitive data, such as credit card numbers, saved on your network's hosts.

red team-blue team exercise

During this exercise, the "A" team conducts the attack, and the "B" team attempts to defend the network. Usually the "A" team is a hired attacker, such as a consultant or security organization, and the "B" team is the company's own IT, security, and other staff.

EAPoL

EAP is also adaptable to new technology. EAP was originally designed to work only on point-to-point connections (usually on a WAN) and relied on PPP. However, it was adapted to work on both wired and wireless LANs in the 802.1X standard, dubbed ________.

True

Each VLAN and subnet combination acts as a single broadcast domain. Although it is possible to do otherwise, network administrators find life much easier when they adhere to the following rule: 1 Broadcast Domain = 1 VLAN = 1 Subnet

only limited by virtualization software

Each VM can have ____ vNICs, no matter how many NICs the host machine has.

administrative distance

Each routing protocol is assigned a default _________________, which is a number indicating the protocol's reliability, with the lower values being given priority (this number will range from 0 to 255).

OSHA

Electrical and tool safety in workplaces are is generally regulated by______.

interference

Electromagnetic waves in the atmosphere can interfere with wireless communications similar to how EMI affects wired transmissions.

cipher

Encryption is the use of mathematical code, called a __________, to scramble data into a format that can be read only by reversing the _________ - that is by decrypting the data.

Trailer or FCS

Error check field to ensure that the data at the destination exactly matches the data issued from the source

10Base-T

Ethernet, Cat 3 or higher UTP, 100 meters

vNIC

Every VM has its own virtual network adapter, or ___________, that can connect the VM to other machine, both physical and virtual. Just like a physical NIC, a ___________ operates at the Data Link Layer and provides the computer with network access.

posture assessment

Every organization should assess its security risks by conducting a ________________, which is a thorough examination of each aspect of the network to determine how it might be compromised. A _________________ should be performed at least annually and preferably quarterly. They should be performed after making any significant changes to the network.

Unique local unicast

FC00:: /7

Link Local unicast

FE80:: /64

Multicast

FF00:: /8

100Base-T

Fast Ethernet, Cat 5 or higher UTP, 100 meters

noise

Fluctuation in voltage levels caused by other devices on the network or EMI.

EMI

Fluorescent lights, power lines and motors can all be sources of interference called ________ that can cause problems if they are too close to twisted pair copper cabling.

demarc

For most situations .... this is the device that marks where a telecommunications service provider's network ends and the organization's network begins.

LACP

For multiple NICs or ports to use link aggregation, they must be properly configured in each device's operating system. _______ dynamically coordinates communications between hosts on aggregated connections, kind of like what DHCP does for IP addressing.

War Chalking

Hackers draw symbols with chalk on the sidewalk or wall near a vulnerable AP ... to make it known to other hackers

Network

ICMP is a ________ layer protocol that reports on the success or failure of data delivery.

CSMA/CA

IEEE 802.11 Wireless Ethernet Networks

TKIP

IEEE 802.11i incorporates an encryption key generation and management scheme known as _________ to improve security for legacy WEP-based devices.

CSMA/CD

IEEE 802.3 Wired Ethernet Networks

outside

IP Address

TCP

IP does not guarantee delivery of data and no connection is established before data is transmitted. IP depends on _______ to ensure that data packets are delivered with reliability.

connectionless

IP is a _____________ protocol. IP does not guarantee delivery of data and no connection is established before data is transmitted.

Network

IP operates in the ________ layer of the TCP/IP and OSI models and it specifies how and where data should be delivered.

2

ISDN BRI uses ____ B channels and 1 D channel.

23

ISDN PRI uses ____ B channels and 1 D channel.

Metro Ethernet

ISPs are now developing ways to send Ethernet traffic across MAN (called ___________) and WAN (called Carrier Ethernet) connections.

White Hat Hacker

IT security experts are hired by organizations to assess their security and risks. They're sometimes called ethical hackers.

H.323

ITU standard that describes an architecture and for a group of protocols for establishing and managing multimedia sessions on a packet-switched network

Destination address

Identifies the full address of the receiving host

Source address

Identifies the full address of the sending host

Version

Identifies whether it is the IPv4 or IPv6 protocol being used

Version

Identifies which IP version the packet uses

implicit deny

If a packet does not match any criteria in a router's ACL, the packet is dropped. This "rule" is called an ____________.

the FTP packet will be denied

If a packet of FTP encounters the following ACL on a router .... what will happen? access-list 102 deny tcp any any eq 23 access-list 102 deny tcp any any eq ftp access-list 102 deny tcp any any eq ftp-data access-list 102 permit ip any any

the FTP packet will be denied

If a packet of FTP from the 192.168.10.7 workstation encounters the following ACL on a router .... what will happen? access-list 102 deny tcp 192.168.10.0 0.0.0.255 any eq ftp access-list 102 deny tcp 192.168.10.0 0.0.0.255 any eq ftp-data access-list 102 permit ip any any

the FTP packet will be permitted

If a packet of FTP from the 192.168.30.7 workstation encounters the following ACL on a router .... what will happen? access-list 102 deny tcp 192.168.10.0 0.0.0.255 any eq ftp access-list 102 deny tcp 192.168.10.0 0.0.0.255 any eq ftp-data access-list 102 permit ip any any

the HTTP packet will be permitted

If a packet of HTTP encounters the following ACL on a router .... what will happen? access-list 102 deny tcp any any eq 23 access-list 102 deny tcp any any eq ftp access-list 102 deny tcp any any eq ftp-data access-list 102 permit ip any any

the TELNET packet will be denied

If a packet of TELNET encounters the following ACL on a router .... what will happen? access-list 102 deny tcp any any eq 23 access-list 102 deny tcp any any eq ftp access-list 102 deny tcp any any eq ftp-data access-list 102 permit ip any any

server-based

If the anti-malware software resides on the server and checks every file and transaction

1,000 (or 1 Gbps)

If the desktop computers in a network are connected to 100 Mbps ports on the switch, then the switch uplink port (port connected to another switch) should be ________ Mbps.

10,000 (or 10 Gbps)

If the desktop computers in a network are connected to 1000 Mbps ports on the switch, then the switch uplink port (port connected to another switch) should be ________ Mbps.

toner & probe

If you are trying to locate where a specific unlabeled wire (or wire pair) is terminated in a data closet a ___________ can be used to help locate the wire (or wire pair) termination.

ESD

If you are working on the sensitive electronic components of the computer, you should wear a(n) _______ strap to protect the sensitive electronic parts from damage.

host-based

If you install anti-malware software on every desktop, you have addressed the most likely point of entry

4

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 18 How many Subnets are being created in this network.

16,382

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 18 How many Usable Hosts per Subnet are being created in this network.

8

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 19 How many Subnets are being created in this network.

8190

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 19 How many Usable Hosts per Subnet are being created in this network.

16

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 20 How many Subnets are being created in this network.

4094

If you were viewing the following IP Address and Subnet Mask: 150.50.32.12 / 20 How many Usable Hosts per Subnet are being created in this network.

62

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 26 How many Usable Hosts per Subnet are being created in this network.

8

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 27 How many Subnets are being created in this network.

30

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 27 How many Usable Hosts per Subnet are being created in this network.

16

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 28 How many Subnets are being created in this network.

14

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 28 How many Usable Hosts per Subnet are being created in this network.

32

If you were viewing the following IP Address and Subnet Mask: 205.55.92.72 / 29 How many Subnets are being created in this network.

signaling

In VoIP, ______________ is the exchange of information between the components of a network or system for the purposes of establishing, monitoring, or releasing connections as well as controlling system operations.

host-only mode

In _________ mode, VMs on one host can exchange data with each other and with their host, but they cannot communicate with any node beyond the host.

bridged mode

In _________ mode, a vNIC accesses a physical network using the host machine's NIC.

NAT mode

In _________ mode, the VM obtains IP addressing information from its host, rather than a service or router on the physical network.

promiscuous

In __________ mode, also called monitoring mode, a device driver directs the NIC to pass all frames to the operating system and on to the monitoring software, not just those broadcast or intended for the host.

two-factor authentication

In ____________________ , a user must provide something and know something. For example, they might have to provide a fingerprint scan as well as know and enter their password.

availability

In the world of networking, the term _____________ refers to how consistently and reliably a connection, system, or other network resource can be accessed by authorized personnel. It's often expressed as a percentage, such as 98% or 99.5%.

Flow Label

Indicates "the sequence of packets" from one source to one or multiple destinations, the packet belongs to (to ensure that packets belonging to the same transmission arrive together)

Window or Sliding Window Size

Indicates how many bytes the sender can issue to a receiver without acknowledgement

Hop Limit

Indicates the # of times the packet can be forwarded by routers on the network

TTL

Indicates the maximum time a packet can remain on the network before it is discarded

Identification

Indicates the message to which the datagram belongs to and allows the receiver to re-assemble a fragmented packet

Traffic Class

Indicates the packet's priority - it is similar to the DiffServ field in IPv4 packets

Payload Length

Indicates the size of the data carried by the packet

Next Header

Indicates the type of header immediately following the IP header

protocol

Indicates what upper layer protocol is encapsulated inside the packet

Fragment Offset

Indicates where in the data stream the fragment belongs

Flags

Indicates whether a message is fragmented - if fragmented also indicates if this is the last fragment

in-line monitoring

Install a device, called a network TAP (test access point) or packet sniffer, in line with network traffic.

3

Install twisted pair copper cable at least _____ feet away from fluorescent lights, power lines and motors to avoid possible interference caused by these devices.

on-boarding

Installing a specific app or agent onto a device to give it trusted access to certain portions of the network

WPA Attacks

Involves an interception of the network keys communicated between stations and APs

KVM switch

It is impractical to install a console for every device in a rack. Typically. racks have one or more __________, which connects to a single console to provide a central control portal for all devices on the rack.

site survey

Larger WLANs warrant a more systematic approach to access point placement. Before placing APs in every data room, it's wise to conduct a(n) __________. A(n) ___________ assesses client requirements, facility characteristics, and coverage areas to determine an AP arrangement that will ensure reliable wireless connectivity within a given area.

Network Portion

Left Portion 192.168.10 portion

16

Select from the options shown below the number of bits that are available for the Host Portion of a Class B Address.

IB

Like FC, requires specialized network hardware. It's very fast, _____ tends to serve a few niche markets rather than being widely available. ________ falls on the difficult end of the installation and configuration spectrum, and runs on the expensive side as well.

OpenLDAP

Linux

spoofing attack

MAC (and IP) addresses can be impersonated in an attack

inside

MAC Address

spoofing

MAC Addresses can be impersonated, which is a security risk called ___________.

Destination Address

MAC address of receiving node

Source Address

MAC address of sending node

Address 1 & Address 4 fields

MAC address of sending node and MAC address of receiving node

AD - Active Directory

MS Windows

NFV - Network Functions Virtualization

Merging physical and virtual network architecture is called ________.

CIR

Minimum bandwidth guaranteed by carrier

True

Most WLANs utilize frequencies around 2.4 GHz or 5 GHz to send and receive wireless signals.

virtualization

Most cloud service providers use ___________ software to supply multiple platforms to multiple users.

GEO

Most satellites circle the Earth 22,300 miles above the equator in _______ orbit. ______ means that satellites orbit the Earth at the same rate as the Earth turns.

Packets

Network Layer

WLANs

Networks that transmit signals through the air via radio frequency (RF) waves are known as ____________.

OSA - Open System Authentication

No key is used at all.

51.84 Mbps

OC-1

622.08 Mbps

OC-12

155.52 Mbps

OC-3

ipconfig

On a Windows computer, you can use the ___________ utility in a command prompt window to find out the current TCP/IP settings on that computer.

CSMA/CD

On the first Ethernet networks the _________ media access control (MAC) method was used to get data onto the network.

Bits

Physical Layer

In 2003, IEEE released its 802.af standard, which specifies a method for supplying electrical power over twisted pair Ethernet connections, also know as ___________.

PoE

19

Rack systems provide mounting hardware for network equipment to optimize the use of square footage in equipment rooms. Equipment racks come in standard ____ -inch frame, meaning the front is ______inches wide.

port mirroring

Program a switch to use ________, whereby all traffic sent to any port on the switch is copied to this specified port

transport protocols

RTP, RTCP

U

Rack systems provide mounting hardware for network equipment to optimize the use of square footage in equipment rooms. Equipment racks are measured in Rack Units or ____, with the industry standard being 42__ tall.

24

Select from the options shown below the number of bits that are available for the Host Portion of a Class A Address.

native VLAN

Receives all untagged frames from untagged ports

terminal emulation

Remote virtual computing, also called _____________, allows a user on one computer, called a client, to control another computer, called the host or server, across a network connection.

off-boarding

Removing the app or agent that gave devices special permissions on the network

Host Portion

Right Portion 10 portion

don't pass

Routers ________ broadcast traffic.

neighbor discovery

Routers learn about all devices on their network through a process called ________________.

True

Routers may perform any of the following optional functions: -Filter broadcast transmissions -Prevent certain types of traffic from getting to a network -Support simultaneous local and remote connectivity -Provide high network fault tolerance through redundant components such as power supplies Monitor network traffic and report statistics Diagnose internal or other connectivity problems and trigger alarms

True

Routers may perform any of the following optional functions: -Filter broadcast transmissions -Prevent certain types of traffic from getting to a network -Support simultaneous local and remote connectivity -Provide high network fault tolerance through redundant components such as power supplies -Monitor network traffic and report statistics -Diagnose internal or other connectivity problems and trigger alarms

convergence time

Routing protocols are rated on the time it takes to recognize a best path in the event of a change or network outage. This is referred to as the _______________.

wireless monitoring

Run monitoring software on a computer connected wirelessly to the network

signaling protocols

SIP, H.323, SCCP

trap

SNMP agents can be programmed to detect certain abnormal conditions (port goes down) that prompt the generation of SNMP ________ messages, where the agent sends the NMS unsolicited data once the specified condition (port goes down) on the managed device are met.

SDH

SONET has emerged as the best choice for linking WANs between North America, Europe, and Asia. The international implementation of SONET is known as_______.

root bridge

STP selects the ________ based on its BID (Bridge ID). The BID is a combination of a 2-byte priority field, which can be set by a network admin, and the bridge's MAC address. To begin with, all bridges on the network share the same priority number, and so the bridge with the lowest MAC address becomes the _________ by default.

Private/Symmetric Key Encryption

Same key used during both encryption and decryption

network-based

Securing the network's gateways, where the Internet connects with the interior network, can provide a formidable layer of defense against the primary source of intrusion—the Internet

.edu, .com, and .net

Select from the following list 3 common Top Level Domains.

True

Some example of routing metrics are as follows: -Hop count -Theoretical bandwidth and actual throughput -Delay, or latency, on a potential path -Load, or the traffic or processing burden -MTU (maximum transmission unit), or the largest IP packet size in bytes allowable without fragmentation -Routing cost, or a value assigned to a particular route -Reliability of a potential path

True

Some example of routing metrics are as follows: -Hop count -Theoretical bandwidth and actual throughput -Delay, or latency, on a potential path -Load, or the traffic or processing burden -MTU (maximum transmission unit), or the largest IP packet size in bytes allowable without fragmentation -Routing cost, or a value assigned to a particular route Reliability of a potential path

Data

Specifies the upper layer protocol to receive the data

honeypot

Staying a step ahead of hackers and constantly evolving exploits requires vigilance. Those who want to learn more about hacking techniques or nab a hacker in the act might create a ___________, or a decoy system that is purposely vulnerable and filled with what appears to be sensitive (though false) content, such as financial data.

voice VLAN

Supports VoIP traffic, which requires high bandwidths, priority over other traffic, flexible routing, and minimized latency.

event viewer

Systems generate different logs so that an administrator can troubleshoot and audit these systems. On a Windows system these logs can be reviewed using the ____________ utility.

DS1

T1 line

DS3

T3 line

HTTPS

TCP Port # 443

HTTP

TCP Port # 80

data from upper layer

TCP Segment = TCP Header + ___________

connection-oriented

TCP is a _____________ protocol. Before TCP transmits, it ensures that a connection or session is established before actual data is sent between hosts.

checksum(s

TCP on the sending host will send a character string called a ________; TCP on the destination host then generates a similar string. If the two ___________ fail to match, then the destination host asks the source to re-transmit the data. (So this is acting as a "error check").

Transport

TCP operates in the ________ layer of the TCP/IP and OSI models and provides reliable data delivery services.

flow control

TCP uses __________, which is the process of gauging the appropriate rate of transmission based on how quickly the recipient can accept data. (This is typically in the form of sliding-window size).

3-Way Handshake

TCP uses a ________ to establish a TCP connection before data is transmitted between hosts.

in-band management

Telnet, SSH, RDP, VNC, management URL

MAC

The Data Link Layer address is more commonly called the ______ Address.

IP

The Network Layer address is more commonly called the ______ Address.

PSK

The Personal versions of WPA and WPA2 are sometimes referred to as WPA-____ or WPA2-____ .

Client-Server

The ____________ network model, the resources are managed by the NOS via a centralized directory database.

IEEE 802.1Q

The VLAN identifier is specified in the ________ standard, which is the IEEE standard that defines how VLAN information appears in frames and how switches interpret that information. This is also referred to as VLAN Tagging or Frame Tagging.

TTL

The _____ field identifies how long a record should be saved in cache on a server.

ITU

The _____ is a United Nations agency that sets standards for international wireless services, including frequency allocation, signaling and protocols used by wireless devices; wireless transmission and reception equipment; satellite orbits and so on.

SSID

The ______ is a unique character string used to identify an access point.

RTP

The ______ protocol operates at the Application Layer and relies on UDP at the Transport Layer to carry/deliver the voice or video packets across the network.

PSTN

The ______, also called POTS, is a circuit-switching network for lines and carrier equipment that provides telephone service to most homes and businesses.

PSTN

The ______, based on Alexander Graham Bell's circuit-switched model, carries telephone calls and fax transmissions.

nslookup

The _______ command allows you to query the DNS database from any computer on a network to find the host name of a device by specifying its IP address, or vice versa.

ping

The _______ command used to verify that TCP/IP is installed, bound to the NIC, configured correctly, and communicating with the network.

SSH

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is encrypted (it creates a secure tunnel between the 2 systems), so it is secure and more commonly used that its predecessor.

Telnet

The _______ protocol is used at the command-line to allow an administrator to connect to remote systems (computer, server, router, switch) to make configuration changes to that device. The ______ protocol is not encrypted, so it has been replaced by a protocol that is more secure.

dig

The _______ utility allows you to query the DNS database from any computer on a network to find the host name of a device by specifying its IP address, or vice versa. The ____ utility is available on Linux and macOS and provides more detailed information than nslookup.

tracert ..or ... traceroute

The ________ command uses ICMP echo requests to "show" the path from one networked node to another, identifying the all intermediate hops between the 2 nodes.

CSU/DSU

The ________ device is commonly found at or near the demarc. A _________ A device that serves as the connection point for a T1 line at the customer's site. A ________ is the equivalent of the modem for an entire LAN.

smart jack

The ________ device is commonly found at or near the demarc. A more intelligent version of an NIU is a _________, which can provide diagnostic information about the interface. For example, a _________ might include loopback capabilities. Just like the loopback adapter you use to test a port or cable on your computer, the ___________ can loop the ISP's signal back to the CO (central office) for testing.

line driver

The ________ device is commonly found at or near the demarc. Essentially a repeater, a _________ can be installed either on copper lines (in which case, it is called a copper _________) or fiber lines (in which case, it is called a fiber _________) to boost the signal across greater distances.

NIU or NID

The ________ device is commonly found at or near the demarc. The __________ at the demarc connects the ISP's local loop to the customer's network. A more intelligent version is a smart jack, which can provide diagnostic information about the interface.

pathping ..or... mtr

The ________ utility combines elements of both ping and tracert to provide deeper information about network issues along a route. It sends multiple pings to each hop along a route, then compiles the information into a single report.

netstat

The ________ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host.

tcpdump

The ________ utility is a free, command-line packet sniffer that runs on Linux and other Unix operating systems.

subnet mask

The _________ is a 32 Bit number that identifies which portion of the IP address is the network portion, (what portion is subnet - if there is any subnetting), and what portion is host portion.

default gateway

The _________ is the address of a computer, router, or other device that a host uses to access another network.

logical

The _________ topology has to do with software, how access to the network is controlled, including how users and programs initially gain access to the network, and how specific resources, such as applications and databases are shared on the network.

physical

The _________ topology refers to a network's hardware and how computers, other devices, and cables fit together to form the network.

IEEE 802.11

The __________ data frame carries significant overhead - that is, it includes a large quantity of fields in addition to the data field.

TIA/EIA-568

The ____________ Commercial Building Wiring Standard, or structured cabling, describes a uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system.

Peer-to-Peer

The ____________ network model, the operating system of each computer on the network is responsible for controlling access to its resources without centralized control.

BNC

The connector shown above for coaxial cable is a(n) ______ connector.

F-Connector (or F-Type)

The connector shown above for coaxial cable is a(n) ______ connector.

46 to 1500

The data portion of an Ethernet Frame may contain from __________ bytes of information.

OC (Optical Carrier) level

The data rate of a particular SONET connection is indicated by its ____, a rating that is internationally recognized by networking professionals and standards organizations.

Sequence Number

The data segments position in the stream of data segments already sent

ARP table

The database of IP-to-MAC address mappings is called an ________ .

128 Kbps

The effective throughput of ISDN BRI is ____________.

1.544 Mbps

The effective throughput of ISDN PRI is ____________.

Private or Reserved IP Address

The following IP address 10.80.90.1 is an example of a(n) ________ IP address.

Class A

The following IP address 113.52.172.98 is an example of a(n) ________ IP address.

Loopback Address

The following IP address 127.0.0.1 is an example of a(n) ________ IP address.

Class B

The following IP address 132.152.12.8 is an example of a(n) ________ IP address.

Automatic Private IP Addressing (APIPA)

The following IP address 169.254.100.100 is an example of a(n) ________ IP address.

Private or Reserved IP Address

The following IP address 172.16.54.1 is an example of a(n) ________ IP address.

Private or Reserved IP Address

The following IP address 192.168.20.50 is an example of a(n) ________ IP address.

Class C

The following IP address 201.15.182.62 is an example of a ________ IP address.

Class D

The following IP address 224.0.0.1 is an example of a(n) ________ IP address.

Private IP Address

The following IP address: 10.0.0.35 is an example of what type of IP address?

Class A

The following IP address: 125.50.83.21 is an example of what class of IP address?

Loopback Address

The following IP address: 127.0.0.1 is an example of what TYPE of IP address?

Class B

The following IP address: 128.60.123.201 is an example of what class of IP address?

APIPA Address

The following IP address: 169.254.0.23 is an example of what TYPE of IP address?

Private IP Address

The following IP address: 192.168.0.35 is an example of what type of IP address?

Class C

The following IP address: 193.160.223.1 is an example of what class of IP address?

Class D

The following IP address: 224.0.0.10 is an example of what class of IP address?

Broadcast

The following IP address: 255.255.255.255 is an example of what TYPE of IP address?

Private IP Address

The following IP address: 10.0.0.35 is an example of what type of IP address?

Class A

The following IP address: 125.50.83.21 is an example of what class of IP address?

Loopback Address

The following IP address: 127.0.0.1 is an example of what TYPE of IP address?

Class B

The following IP address: 128.60.123.201 is an example of what class of IP address?

100

The maximum allowable distance for horizontal wiring is ______ meters.

protocols

The methods and rules for communication on a network are called _______________.

Ethernet

The most important Data Link Layer standard, _____________, is adaptable, capable of running on a variety of network media, and offers excellent throughput at a reasonable cost.

employee training

The most important defense against social engineering is ___________, along with frequent reminders and tips regarding the latest scams.

BIND

The most popular DNS server software is ________ which is free, open source software that runs on Linux, UNIX and Windows platforms.

RBAC

The most popular authorization method is ___________. With _________, a network administrator receives from a user's supervisor a detailed description of the roles or jobs the user performs for the organization. The administrator is responsible for assigning the privileges and permissions necessary for the user to perform only these roles.

IANA

The organization responsible for tracking the assignment of port #'s, domain names, and IP Addresses is __________.

Destination Port

The port number of the destination node application

Source Port

The port number of the sending node application

HTTP

The primary protocol used by Web servers and browsers (without a layer of security) is _________.

SMTP

The primary protocol used by clients to send an email message is the _________ protocol.

system life cycle

The process of designing, implementing, and maintaining an entire network is called the ______________. A major part of this process is the removal and disposal of outdated assets, and the addition of compatible, updated devices.

rollback

The process of reverting to a previous version of software.

packet drops

The quantity of packets that are dropped due to .... being damaged beyond use, arrive after their expiration, or are not allowed through an interface

POP3 or IMAP4

The recipient's email server delivers the email message to the receiving client by using the _________ protocol.

star

The structured cabling standard describes the best way to install networking media to maximize performance and minimize upkeep. Structured cabling is based on a hierarchical design and assumes a network is based on a ________ topology.

CoS

The term QoS refers to techniques that are performed at various OSI layers via several protocols. By contrast, the term ______________ refers only to techniques performed at Layer 2, on Ethernet frames, and is one method of implementing QoS.

xDSL

The term _____ refers to all varieties of DSL.

inventory management

The term ____________ refers to the monitoring and maintaining of all the assets that make up a network.

more overhead

The use of ACK packets to verify every transmission means that 802.11 networks require __________________ than 802.3 networks.

9 kHz and 300 GHz

The wireless spectrum (as defined by the FCC) spans frequencies between _____ and _______.

Black Hat Hacker

These groups or individuals use their skills to bypass security systems to cause damage, steal data, or compromise privacy.

Gray Hat Hacker

These hackers abide by a code of ethics all their own. Although they might engage in illegal activity, their intent is to educate and assist.

penetration testing

This attack simulation uses various tools to find network vulnerabilities, as in vulnerability scanning, and then attempts to exploit those vulnerabilities.

vulnerability scanning

This technique is used to identify vulnerabilities in a network. It's often performed by a company's own staff, and does not attempt to exploit any vulnerabilities. ______________________ might also be the first step in other attack simulations or in a real attack.

ANDing

To calculate a host's network ID given its IPv4 Addresses and subnet mask, you follow a logical process of combining bits known as _________. "1" and "1" = "1" "1" and "0" = "0" "0" and "0" = "0" (This is the same process that routers use to determine the "destination network" for a packet it receives.)

True

To communicate via remote access, the client and host need a transmission path plus the appropriate software to complete the connection and exchange data.

private

To conserve its Public IP addresses, a company can use __________ IP addresses on its own personal network - that is, networks that do not directly connect to the Internet.

routing

To determine the best path, routers communicate with each other through __________ protocols.

tunneling

To ensure a VPN can carry all types of data in a private manner over any kind of connection, special VPN protocols encapsulate higher-layer protocols in a process known as _____________.

tag (frame tag or VLAN tag)

To identify the transmissions that belong to each VLAN, the switch adds a ______ to Ethernet frames that identifies the port through which they arrive at the switch.

baseline

To identify when there's a problem on the network, you must first know what is normal for that network. A(n) ____________ is a report of the network's normal state of operation and might include a range of acceptable measurements.

QoS

To support voice and video traffic on a network, network administrators must pay attention to a network's _________, which is a group of techniques for adjusting the priority a network assigns to various types of transmissions

all the same size

Traditional subnetting reduces the waste of IP addresses, but results in multiple subnets that are ________________.

inter-VLAN routing

Traffic between hosts on VLAN 1 and VLAN 2 must go through the router, which is called __________________ to be able to communicate. This simple VLAN configuration, where one router connects to a switch that supports multiple VLANs, is sometimes called an ROAS ("router-on-a-stick").

Segments

Transport Layer

iSCSI

Transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. It can work on a twisted-pair Ethernet network with ordinary Ethernet NICs. ______ is an evolution of SCSI (Small Computer System Interface), which is a fast transmission standard used by internal hard drives and operating systems in file servers.

connectionless

UDP is a _____________ protocol. UDP does not use error checking or sequencing to keep track of data transferred between hosts.

Transport

UDP operates in the ________ layer of the TCP/IP and OSI models and provides efficient transfer of data with no error checking or sequencing.

syslog

UNIX or Linux based computer log containing monitored device information

ifconfig

UNIX or Linux command to view and edit the IP information on a computer

MAC Address

Upon creation, each vNIC is automatically assigned its own ______________.

Type

Upper Layer data

Checksum

Used by the receiving node to determine whether the TCP segment became corrupted

Two-factor authentication

User knows their password and provides their fingerprint scan

Multifactor authentication

User knows their password, provides their fingerprint scan, and provides the security token #

RAID 10

Using four or more disks, data is mirrored within each pair of disks, and then striped to multiple pairs of disks.

site prefix -or- prefix mask

Using the following IPv6 Address as an example .... 2000:FE10:1:A:002:50FF:FE2B:E708 /64 ... what is the correct name for the " /64 " portion of the address?

layer 2

VLANs

broadcast domain

VLANs or layer 3 devices (routers) define the borders for this type of domain

RTS, CTS

WLANs can use the optional RTS/CTS protocol. The source node sends a ________ signal to the access point requesting the exclusive opportunity to transmit. If the access point agrees to the request it will respond with a ______ and will temporarily suspend communication through the access point and wait for the source node to complete transmission.

1 and 2

WLANs work at OSI Layers ______. They support the same TCP/IP higher-layer OSI protocols and operating systems (Windows, Unix, Linux, Apple) as wired LANs.

Class C

What class of fire extinguisher is necessary to put out electrical fires?

MSDS

What piece of information would you consult to know how to properly handle substances such as chemical solvents and how to dispose of them?

DLCI

What the routers read to determine what to do with the frame it receives on a frame relay network

HTTPS

When HTTP is layered on top of an encryption protocol such as SSL or TLS .... the result is the ________ protocol.

domain

When a Windows Server controls network access to a group of computers, this logical group is called a Windows __________.

dial-up

When the Internet first became popular in the 1990s, most home users logged on to the Internet via a ________ connection. ________ required the user to enter a phone number. The computer then called, waited for a response, and negotiated a connection.

reflection

When waves encounter an obstacle and the signals "bounce off". This is usually caused by large flat surfaces - walls, ceilings, floors, etc...

static routing

When a network administrator configures a routing table to direct messages along a specific path between networks

dual stacked

When a network is configured for both IPv4 and IPv6 protocols, the network is said to be ____________.

dynamic routing

When a routing protocol automatically calculates the best path between 2 networks and accumulates this information in a routing table

scattering

When a wireless signal encounters an object that has small dimensions compared with the signal's wavelength, it's diffused or "broken into pieces" into multiple directions. This is usually caused by rough surfaces. Indoors this can be caused by books, chairs, computers. Outdoors this can be caused by rain, mist, hail, and snow.

diffraction

When a wireless signal is split into secondary waves when it encounters an obstruction. The waves appear to "bend around an obstacle". This is caused by objects with sharp edges including corners of walls or desks.

ARP poisoning

When attackers use faked ARP replies to alter ARP tables in the network

administrative credentials

When configuring a device, make it a habit to change the default ________________________ before you do anything else, and record this information in a safe place. When you do so, avoid common usernames and passwords.

global

When dealing with IPv6 Addresses: A(n) ________ address can be routed on the Internet and is similar to public IPv4 addresses.

link local

When dealing with IPv6 Addresses: A(n) ________ address can be used for communicating with nodes in the same link, and is similar to an autoconfigured APIPA address in IPv4.

anycast

When dealing with IPv6 Addresses: A(n) ________ address can identify multiple destinations, with packets delivered to the closest destination (closet DNS server for example)

multicast

When dealing with IPv6 Addresses: A(n) ________ address is used so that packets are delivered to all nodes in a specific _______ group (all routers for example .. or ... all nodes in a video conference).

unicast

When dealing with IPv6 Addresses: A(n) ________ address specifies a single node on a network.

global

When dealing with IPv6 Addresses: A(n) ________ address can be routed on the Internet and is similar to public IPv4 addresses.

link local

When dealing with IPv6 Addresses: A(n) ________ address can be used for communicating with nodes in the same link, and is similar to an autoconfigured APIPA address in IPv4.

anycast

When dealing with IPv6 Addresses: A(n) ________ address can identify multiple destinations, with packets delivered to the closest destination (closet DNS server for example)

multicast

When dealing with IPv6 Addresses: A(n) ________ address is used so that packets are delivered to all nodes in a specific _______ group (all routers for example .. or ... all nodes in a video conference).

unicast

When dealing with IPv6 Addresses: A(n) ________ address specifies a single node on a network.

broadcast traffic containment

When designing a network ..... switches are typically connected to a Layer 3 Device port - either L3 Switch or Router. Why is this typically done?

Yes Indeed

When designing a network ..... typically the following rule is followed .... 1 IP Address Subnet per VLAN

a device in it's own collision domain does not compete for bandwidth so receives "full bandwidth" of the port

When designing a network ..... workstations are typically connected to an individual switch port so they are in their own collision domain. Why is this done?

PoE

When designing a network and selecting a switch to use in your network .... special consideration should be made when selecting a switch to support a network with IP Phones, Wireless Access Points and IP Security cameras. What special consideration should be carefully selected for the switch?

link aggregation

When designing networks it is common to use 2 links to connect together 2 switches in a network. When dual links are used for redundancy .... this is called ____________ and will need to be configured in the switches.

router

When designing networks, VLANs are typically used for some broadcast traffic containment as well as some security. If communication between VLANs is desired, then the services of a ____________ is needed to allow this communication.

switches

When designing networks, VLANs are typically used for some broadcast traffic containment as well as some security. VLANs are implemented on _________.

plenum

When installing cable in a building .... if the cable is to be installed in the air space above the ceiling tile or below a raised floor, the cable must be ______-rated cable.

jitter

When successive packets experience varying amounts of latency, resulting in their arriving out of order

crosstalk

When terminating twisted pair copper cabling, do not leave more than 1 inch of exposed cable before a termination. Doing so would increase the possibility for transmission interference between wires, a phenomenon called __________.

event log

Windows-based computer log containing monitored device information

3

Wired and Wireless signals share many similarities, including the use of the same Layer _____ and above protocols.

ATM

____ is a WAN technology that functions primarily at Layer 2, although its protocols can reach to Layer 1 and 3. Its ITU standard prescribes both network access and signal multiplexing techniques. What sets this technology apart is the use of a fixed length cell (53 Byte Cell) instead of a variable length frame or a packet.

UPS

_____ is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that prevents undesired fluctuations of the wall outlet's AC power from harming the device or interrupting its services.

NFC

_____ is a form of RFID and transfers data wirelessly over very short distances (usually 10cm or less). A tiny antenna embedded in the device sends its radio signal at a fixed frequency of 13.56 MHz. The signal can also be transmitted one way by an _____ tag, or smart tag, such as when employees need to access a secure area of a building.

QoS

_____ is a measure of how well a network service matches its expected performance.

DNS

_____ is an application layer client-server system of computers and databases designed to associate computer names with IP Addresses.

AC

_____ power comes from the power station through the wall outlet to a device for it's use.

NEXT

________ is the crosstalk that occurs between wire pairs near the source of a signal.

VTP

______ allows changes to a VLAN database on one switch, called the stack master, to be communicated to all other switches in the network. This provides network administrators with the ability to centrally manage all VLANs by making changes to a single switch.

SSL/TLS

______ are methods of encrypting TCP/IP transmissions - including web pages and data entered into web forms - en route between client and server using public key encryption technology. All modern browsers support (IE, Firefox, Chrome) support its use to create secure transmissions of HTTPS sessions.

FTP

______ is a client-server application that transfers files between 2 computers. _____ does not provide encryption and is therefore not secure.

2

______ strands of fiber are needed for full-duplex communication.

IR - Infrared

______ technology has found a new life in the world of IoT. ____ sensors are used to collect information such as: -presence or level of liquid -variations in reflections from skin caused by variations in blood flow which can be used to monitor heart rate -proximity to the device, which can trigger an action like steering a vehicle away from an object -commands from a control device

ARP

______ works in conjunction with IPv4 to discover the MAC address of a host or node on the local network and to maintain a database that maps IP addresses to MAC addresses on the local network.

STP

______, defined in IEEE standard 802.1D, functions at the Data Link layer. It prevents traffic loops, also called switching loops, by calculating paths that avoid potential loops and by artificially blocking the links that would complete a loop.

PEAP

_______ creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. ______ is called the outer method.

MPLS

_______ enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols. _______ supports IP and all the other Layer 3 and higher protocols used on TCP/IP networks. ______ can operate over Ethernet frames, but is more often used with other Layer 2 protocols, like those designed for WANs. ________ is often used by ISPs on their own networks for moving traffic from one customer site to another, and it's becoming the solution of choice for many enterprises to connect their branch offices. _______ labels are sometimes called a shim because of their placement between Layer 3 and Layer 2 information. For this reason, _______ is sometimes said to belong to "Layer 2.5."

CCMP

_______ improves wireless security for newer devices that can use WPA2. _____ is more future-focused.

DSL

_______ is a WAN connection method introduced by researchers at Bell Labs in the mid-1990's. It operates over the PSTN (combines voice and data onto an analog phone line) and compete directly with T-1 and Broadband Cable services.

Broadband Cable

_______ is a WAN connection method offered by cable companies that is based on the coaxial cable wiring used for TV signals and was standardized by an international, cooperative effort orchestrated by CableLabs that yielded DOCSIS.

PAT

_______ is a process of assigning a TCP port number to each ongoing session between a local host and Internet host.

Z-Wave

_______ is a smart home protocol that provides 2 basic types of functions: signaling to manage wireless connections, and control, to transmit data and commands between devices. A ________ network controller, called a hub, receives commands from a smartphone or computer and relays the commands to various smart devices on its network.

NAT

_______ is a technique designed to conserve public IP addresses needed by a network. A gateway device that stands between a private network and other networks substitutes the private IP address used by computers on the private network with its own public IP address when these computers need access to other networks or the Internet.

IPsec

_______ is an encryption protocol suite that defines rules for encryption, authentication, and key management for TCP/IP transmissions. It is an enhancement to IPv4 and is native in IPv6. ______ works at Network Layer - it sdds security information to the header of all IP packets and encrypts the data payload.

Bluetooth

_______, defined by the IEEE 802.15.1 specifications, is named after a medieval king of Denmark. Like its namesake, ___________ technology unities separate entities - it unites mobile devices, PCs, and accessories under a single communication standard. Most ________ devices require close proximity to form a connection.

SDN - Software-Defined Networking

________ is a centralized approach to networking that removes most decision-making power from network devices and instead handles the responsibility at a software level with a network controller.

Tunneling

________ is a method used by IPv6 to transport IPv6 packets through or over an IPv4 network.

NAS

________ is a specialized storage device or group of storage devices that provides centralized, fault-tolerant data storage for a network. You can think of _______ as a unique type of server dedicated to data sharing.

EAP-FAST

________ is also a form of tunneled EAP. It was developed by Cisco and works similarly to PEAP, except faster. The most important difference with ________ is that it uses PACs (Protected Access Credentials), which are somewhat similar to cookies that websites store on a user's computer to track their activities.

TCP/IP

________ is not simply one protocol, but rather a suite of specialized protocols - including TCP, IP, UDP, ARP, and many others.

Latency

________ is the brief delay it takes for a signal to propagate the length of a cable.

Alien crosstalk

________ is the crosstalk that occurs between 2 cables.

FEXT

________ is the crosstalk that occurs between wire pairs at the far end of the cable from the signal source.

ANT+

________ technology is an ad-hoc wireless protocol operating at about 2.4 GHz. While _____ is a proprietary Garmin protocol, it is also open-source and therefore used by many manufacturers in addition to Garmin. ______ gathers and tracks information from sensors that are typically embedded in heart rate monitors, GPS devices, and other activity monitoring devices. _______ can also synch data from multiple devices for the same activity, such as a smartwatch, smartphone, bicycle computer, or fitness equipment.

RFID

________ uses electromagnetic fields to store data on a small chip in an ________ tag, which includes an antenna that can both transmit and receive, and possibly a battery. The tag holds 1 to 8 KB of data, such as serial number, credit card info, or medical data, which can transmit to a nearby reader.

RDP

_________ is a Microsoft proprietary protocol used to remotely connect to and control Windows Desktop and Server systems.

SSH

_________ is a collection of protocols that does both authentication and encryption. With ________, you can securely log on to a host, execute commands on that host, and copy files to and from that host. _______ encrypts data exchanged throughout the session.

SAN

_________ is a distinct network of storage devices that communicate directly with each other and with other networks.

Frame Relay

_________ is a group of Layer 2 Protocols defined by ITU and ANSI in 1984. It was originally designed as a fast packet-switched network over ISDN, although today __________ is used as the Data Link protocol for various virtual circuit interfaces and media.

SONET

_________ is a high-bandwidth WAN signaling technique developed for fiber-optic cabling by Bell Communications Research in the 1980's, and later standardized by ANSI and ITU. __________specifies framing and multiplexing techniques at the Physical Layer.

telnet

_________ is a terminal emulation utility that allows an administrator or other network user to control a computer remotely. You can use ________ to access a router or switch and run commands to change the configuration settings. However, __________ provides little security for establishing a connection (poor authentication) and no security for transmitting data (no encryption).

ISDN

_________ is an international standard, originally established by the ITU in 1984, for transmitting digital data over the PSTN.

VNC

_________ is open source, so therefore is cross-platform, and can be used to remotely connect to and control desktop and server systems.

BYOD

_________ refers to the practice of allowing people to bring their smartphones, laptops, or other technology into a facility for the purpose of performing work or school responsibilities

CARP

____________ allows a pool of computers or interfaces to share one or more IP addresses. This pool is known as a group of redundancy or redundancy group. When using _______, one device, acting as the group master, receives requests for an IP address, then parcels out the requests to one of several devices in the group.

Port numbers

____________ ensure that data is transmitted to the correct application among other applications running on a computer.

DiffServ

____________ is a simple technique that addresses QoS issues by prioritizing traffic at Layer 3. _______ takes into account all types of network traffic, not just the time-sensitive services such as voice and video. That way, it can assign voice streams a high priority and at the same time assign unessential data streams (for example, an employee surfing the Internet on his lunch hour) a low priority.

managed

____________ switches, on the other hand, can be configured via a command-line interface or a web-based management GUI, and sometimes can be configured in groups. Usually, they are also assigned IP addresses for the purpose of continued management. VLANs can only be implemented through ___________ switches, whose ports can be partitioned into groups.

Network Management

_____________ refers to the assessment, monitoring and maintenance of all aspects of a network.

Spiceworks

______________ is a type of network monitoring software because it can be configured to monitor multiple devices on a network at one time.

Wireshark

______________ is a type of protocol analyzer because it monitors traffic on the interface between a single device and the network.

Clustering

______________ refers to the technique of grouping multiple devices so they appear as a single device to the rest of the network. ____________ can be configured with groups of servers, routers, or applications.

Incident response policy

______________ specifically define the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a result. Qualifying incidents take into account the full spectrum of possible events, which might include a break-in, fire, weather-related emergency, hacking attack, discovery of illegal content or activity on an employee's computer, malware outbreak, or a full-scale, environmental disaster that shuts down businesses throughout the city or state. The policy is written with the intent of keeping people safe; protecting sensitive data; ensuring network availability and integrity; and collecting data to determine what went wrong, who is responsible, and what actions should be taken in the future to prevent similar damage.

network diagrams

_______________ are graphical representations of a network's devices and connections.

Nmap

_______________ is a utility that can assist with discovering and identifying the devices on a network.

Active Directory

_______________ is the centralized directory database that contains user account information and security for the entire group of computers.

network mapping

_______________ is the process of discovering and identifying the devices on a network.

VLSM

________________ allows subnets to be further divided into smaller and smaller groupings until each subnet is about the same size as the necessary IP address space. This is often referred to as "Subnetting a Subnet".

Hashing

_________means to transform data through an algorithm that generally reduces the amount of space needed for the data. __________ is not the same thing as encryption, though it's often listed as a type of encryption and does, in a similar manner, transform data from one format to another. ______ is mostly used to ensure data integrity—that is, to verify the data has not been altered, which is similar to the purpose of a checksum.

SCCP

a Cisco protocol for establishing and managing multimedia sessions on a packet-switched network

DRDoS Attack

a DDoS attack bounced off of uninfected computers, called reflectors, before being directed at target

dedicated line (private line)

a cable or other telecommunications path that is not shared with other users and has continuously available communications channels

automatic failover

a component that is able to automatically assume the responsibilities of an identical component that fails - example: a backup router automatically assumes the role of a failed router

softphone

a computer programmed to act like an IP phone - it transmits and receives digital voice signals (user may use headphone and microphone attached to the PC)

cells

a coverage area for a cellular network serviced by an antenna and a base station - antennas are posted at 3 of the corners of the coverage area - appears as a honeycomb pattern

spectrum analyzer

a device that can assess the quality of the wireless signal - helps with identifying where interference is greatest

router

a device that manages traffic between two or more networks .. and ... can help find the best path for traffic to get from one network to another typically by reading the destination IP address of the data packet

network-based firewall

a device/system that protects an entire network

RFP (request for proposal)

a document to vendors to submit an offer for a product or service your company wants to purchase

ESS

a group of access points connected to the same LAN

BSS

a group of nodes that share an access point

digital certificate

a small file containing verified identification information about the user and the user's public key

zero-day exploit

a software vulnerability that hasn't yet become public, and is known only to the hacker who discovered it

host-based firewall

a system/software that protects the computer on which it is installed

analog phone

a traditional phone that connects into the PSTN

SMF (Singlemode Fiber)

a type of fiber optic that is designed to transmit data using a single "ray" of light typical size of 8/125um .. or .. 10/125um accommodates the highest bandwidths and distances

MMF (Multimode Fiber)

a type of fiber optic that is designed to transmit data using multiple "rays" of light typical size of 50/125um or 62.5/125um only suitable for distances of a few kilometers

local authentication

a user can sign in to Windows PC using the account stored on that PC

network authentication

a user can sign in to the network using the account that is stored in Active Directory on a Windows domain server

VPN

a virtual connection between 2 hosts or sites over the Internet to remotely provide network resources

vulnerability

a weakness of a system, process, or architecture that could lead to compromised information or unauthorized access

FTPS

added layer of protection for FTP using SSL/TLS

Infrastructure WLAN

an intervening connectivity device (access point) accepts the signals from the nodes and re-transmits them to the rest of the network

social engineering

an intruder poses as a technical support person who needs a password to solve the problem, so the user gives the intruder their password

ipconfig /release

any dynamically assigned IP address lease is cleared

malware

any program or piece of code designed to intrude upon or harm a system or its resources

HSPA+

began as a 3G technology - uses MIMO & sophisticated encoding - max 168 Mbps downlink throughput & 22 Mbps uplink throughput in its current release

head-end

cable company central office

DIA - dedicated Internet access

cable itself or a portion of its available bandwidth is dedicated to a single customer; this is more common for business customers and comes with an SLA-defined (service-level agreement) guarantee of minimum uptime percentages and maximum recovery times if the service goes down

DCE

carrier's endpoint device for the WAN

polling

collecting data from multiple network devices on regular intervals

FDM

combining multiple signals onto a wire/cable by using multiple frequency bands

STDM

combining multiple signals onto a wire/cable by using multiple time slots - time slots are allocated based on priority or need

TDM

combining multiple signals onto a wire/cable by using multiple time slots - time slots are reserved for their designated nodes regardless of whether they have data to send

DWDM

combining multiple signals onto a wire/cable by using multiple wavelengths of light - a to support between 80 and 320 channels - used as WAN Links between an ISP and larger NSP

CWDM

combining multiple signals onto a wire/cable by using multiple wavelengths of light - can support 4, 8, 16, or 18 channels per fiber

WDM

combining multiple signals onto a wire/cable by using multiple wavelengths of light - works on any type of fiber optic cable

Rollover

connect a serial port (com port) on a PC to a console port on a device like a router or switch

Crossover

connect a switch to a switch connect "like devices"

edge router ... or .... border router

connect an autonomous system with an outside network

SIM Card

contains a microchip to hold data about the subscription a user has with the cellular carrier

ping -t

continue pinging until interrupted

MSA (master service agreement)

contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangments

DTE

customer's endpoint device on the WAN

core router ... or ... interior router

direct data between networks within the same autonomous system (routers operated under the same organization)

Confidentiality

data can only be viewed by its intended recipient or at the intended destination

Availability

data is accessible to the intended recipient when needed

Integrity

data is not modified in the time after the sender transmits it and before the receiver picks it up

Session

describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

Application

describes the interface between two applications, on separate computers (HTTP, FTP, SMTP, POP3, DNS, etc...)

fault management

detection and signaling of device, link, or component failures

authorization

determines what the user can and cannot do with network resources. In other words, "What are you allowed to do?"

failure

deviation from a specified level of system performance for a given period of time

cable modem

device at the subscriber end that modulates and demodulates signals for transmission and reception via cable wiring

out-of-band management

dial-in modem, console connection

SOW (statement of work)

documents in detail the work that must be completed for a particular project, and includes specifics such as tasks, deliverables, standards, payment schedules and work timeline

MOU (memorandum of understanding)

documents the intentions of 2 or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts

guest

each VM on the physical computer

HFC

fiber-optic link that connects the cable company's offices to a node location near a customer

SFTP

file-transfer version of SSH - it is an extension of the SSH protocol

management frame

frame involved in association and reassociation - such as probe and beacon

data frames

frames involved in carrying the data between stations

control frame

frames related to medium access and data delivery - such as ACK and RTS/CTS

ghosts

frames that are not actually frames - caused by device misinterpreting stray voltage on wire

dead zone

gaps in Wi-Fi coverage at your location

IGP - Interior Gateway Protocol

routing protocols used by core routers and edge routers within autonomous systems

MLA (master license agreement)

grants a license from a creator, developer, or producer, such as a software producer, to a third party for the purposes of marketing, sublicensing, or distributing the product to consumers as a stand-alone product of as a part of another product

CNAME record

holds alternative names for a host

frame control field

holds information about the protocol in use, the type of frame being transmitted, whether the frame is part of a larger, fragmented packet, whether the frame is one that was reissued, what type of security the frame uses, etc....

Windows Defender Firewall

host-based firewall

collision domain

hubs define the borders of this type of domain

MX record

identifies a mail server and is used for email traffic

Destination address

identifies the full address of the receiving host

Source address

identifies the full address of the sending host

Version

identifies whether it is the IPv4 or IPv6 protocol being used

Version

identifies which IP version the packet uses

"0" Bits

in a subnet mask indicates the host portion of the address

"1" Bits

in a subnet mask indicates the network and subnet portion of the address

Flow Label

indicates "the sequence of packets" from one source to one or multiple destinations, the packet belongs to (to ensure that packets belonging to the same transmission arrive together)

Hop Limit

indicates the # of times the packet can be forwarded by routers on the network

TTL

indicates the maximum time a packet can remain on the network before it is discarded

Identification

indicates the message to which the datagram belongs to and allows the receiver to re-assemble a fragmented packet

Traffic Class

indicates the packet's priority - it is similar to the DiffServ field in IPv4 packets

Payload Length

indicates the size of the data carried by the packet

Next Header

indicates the type of header immediately following the IP header

protocol

indicates what upper layer protocol is encapsulated inside the packet

Fragment Offset

indicates where in the data stream the fragment belongs

Flags

indicates whether a message is fragmented - if fragmented also indicates if this is the last fragment

:002:50FF:FE2B:E708

interface ID

SLA (service level agreement)

legally binding contract that defines in plain language and in measurable terms, the aspects of a service provided to a customer, such as service provided by ISP

Network

is a group of computers and other devices (printers, smart phones, tablet PC, Xbox, Wii, PS, IP Phone, etc...) that are connected by some type of transmission media (copper wire, fiber optic, or RF).

GSM

is an open standard accepted and used worldwide - uses digital communication of data that is separated by timeslots on a channel

MIB

list of objects managed by the NMS, as well as the descriptions of these objects - contains data about an object's performance in a database format that can be mined and analyzed

virtual circuit

logically appears to customer to be a dedicated line, but physically can be any configuration through the carrier cloud

accounting

logs users' access and activities on the network. In other words, "What did you do?"

static IP address

manually assigned by network administrator

MAC filtering

method to prevent an AP from authenticating any device whose MAC address is not listed by network admin

utilization

metric refers to the actual throughput used as a percentage of available bandwidth

performance management

monitoring how well links and devices are keeping up with the demands placed on them

cisco ASA firewall

network-based firewall

EGP - Exterior Gateway Protocol

routing protocols used by edge routers and exterior routers to distribute data outside of autonomous systems

giants

packets larger than maximum packet size (more than 1518 bytes)

packet loss

packets lost due to unknown protocol, unrecognized port, network noise - never arrive at destination

runts

packets smaller than minimum packet size (less than 64 bytes)

discarded packets

packets that arrive at destination but are discarded due to buffer overflow, latency, bottlenecks or congestion

persistent agent

permanently installed on a device. This more robust program might provide additional security measures, such as remote wipe, virus scans, and mass messaging.

layer 1

physical devices

ping www.google.com

ping a host using its host name to verify you have connectivity between the nodes

ping6

ping an IPv6 address from a Linux computer

ping -6

ping an IPv6 address from a windows computer

ping 127.0.0.1

ping the loopback of a node to determine whether your workstations TCP/IP services are running

authentication

process of comparing and matching a client's credentials with the credentials in a client database to enable the client to log on to the network

ransomeware

program that locks a user's data or computer system until $$$ is paid

worms

program that runs independently and travesl between computers and across networks - they may be transferred by any type of file transfer, including e-mail - they can carry viruses

cloud-based

provides the same kinds of benefits as other cloud-based solutions, such as scalability, cost efficiency, and shared resources

ipconfig /renew

re-establishes a dynamically assigned IP address lease from the DHCP server

pconfig /renew

re-establishes a dynamically assigned IP address lease from the DHCP server

switch

receives incoming data frame from one of its ports, reads the MAC address and then directs the data frame to the correct port to the destination node

DS0

regular analog phone line

Point-to-Point

remote access using a dedicated (usually leased) line, such as DSL or T-1

interface resets

repeated resets of the connection (interface misconfiguration)

Data Link

responsible for interfacing with physical hardware on the local network - responsible for getting data onto the network (NIC, MAC Address, Ethernet, Wi-Fi)

Network

responsible for moving messages from one node to another until reaches destination (IP, ICMP, ARP)

Presentation

responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read (.txt, .png, .mp3, .html, etc....)

Transport

responsible for transporting Application layer payloads from one application to another (TCP ... and ... UDP)

exterior router

router outside of an autonomous systems (routers that operate on the Internet backbone)

UTM (Unified Threat Management)

security strategy that combines multiple layers of security appliances and technologies into a single safety net

1G

service for analog signals from the 1970's to 1980's

2G

service for digital transmission that paved the way for texting and media downloads from the 1990's - did not exceed 240 kbps

5G

services don't yet exist - expected download speeds of up to 20 Gbps and upload speeds of up to 10 Gbps

4G

services for digital transmission (packet switching for data and for voice) where data rates rose to 100Mbps for fast moving mobile clients - from 2008

3G

services for digital transmission (packet switching for data but not for voice) where data rates rose to 384 kbps - from the early 2000's

half-duplex

signals are free to travel in both directions over a medium but in only 1 direction at a time

full-duplex

signals are free to travel in both directions over a medium simultaneously

simplex

signals may travel in only 1 direction

2000:FE10:1:A:

site prefix ... or ... global routing prefix

guest network

smart security precaution - gives guests access to Internet through an open network without opening doors to entire LAN on the router

network management agent

software routine that collects information about the device's operation and provides it to the NMS

wireless analyzer (Wi-Fi analyzer)

software that can evaluate Wi-Fi network availability, optimize Wi-Fi signal settings, and help identify Wi-Fi security threats

Fibre Channel

storage networking architecture that runs separately from Ethernet networks to maximize speed of data storage and access. Fiber-optic cable is much more commonly used. Requires special hardware, which makes it an expensive storage connection technology.

A record

stores the name-to-address mapping for a host - using IPv4 Addresses

AAAA record

stores the name-to-address mapping for a host - using IPv6 Addresses

layer 3

subnetting

Address 2 & Address 3 fields

the MAC address of the access points or intermediary device on the wireless network

exploit

the act of taking advantage of a vulnerability

throughput

the actual measure of how much data is transmitted during a given period of time

MTSO or MSC

the base stations are connected to this office - this is the connection point between the wireless portion of the network and the wired portion of the network

backbone cable

the cables or wireless links that provide inter-connection between the entrance facility and MDF, and between MDF and IDF - this is often fiber-optic cable

Core

the center glass portion of the fiber that transmits the Data (the light signal)

NMS

the central collection point .... the management console - the software installed on the management console that collects and displays the data gathered from the managed devices

cable drop

the coax or fiber connection from the cable company to a customer

link aggregation -or- port aggregation

the combination of multiple network interfaces or ports to act as one logical interface

CO

the switching office - a place where the telephone company terminates lines and switches calls between different locations

captive portal

the first page a new wireless client sees in the browser when connecting to a guest network

BSSID

the identifier for the group of nodes that share the same access point

certificate authority

the organization that issues and maintains the digital certificates

host

the physical computer

authentication

the process of verifying a user's credentials (typically a username and password) to grant the user access to secured resources on a system or network

hypervisor

the software that allows you to define VMs and manage resource allocation and sharing

codec

the software that coverts (usually compresses and converts) analog voice signals into digital binary bits to be sent across a network

passive scanning

the station listens on all channels within its frequency range for a special signal, known as a beacon frame, issued from an access point

active scanning

the station transmits a special frame, known as a probe, on all available channels within its frequency range

Cladding

the surrounding glass portion of the fiber that reflects the light back into the "center of the fiber" so it does not leave the fiber

handoff

the transition that occurs when a client passes from one coverage area to a new coverage area

public-key infrastructure

the use of certificate authorities to associate public keys with certain users

transport protocols

these protocols are used to actually deliver the voice or video payload

signaling protocols

these protocols set-up and manage sessions between clients

horizontal cable

this is the cabling used to connect workstations to the closet data room and to switches housed in the room - maximum allowable length is 100 meters

Public/Asymmetric Key Encryption

two keys are used for data encryption - #1 for encrypting and #2 for encrypting

encryption

use of an algorithm to scramble data into a format that can be read only by reversing the algorithm - purpose is to keep information private

PTR record

used for reverse lookups - when you know the IP and need the Name

sequence control field

used to indicate how a large packet is fragmented for more reliable delivery

unidirectional antenna

used when a source needs to communicate with one destination - point-to-point link

omnidirectional antenna

used when many different receivers must be able to pick up the signal - point-to-multipoint links

broadband

well-suited for residential customers, the cables (whether telephone, copper, or fiber) and available bandwidth are shared between multiple customers

DoS Attack

when a legitimate user is unable to access normal network resources, such as a web server, because of an attacker's intervention

static routing

when a network administrator configures a routing table to direct messages along a specific path between networks

dynamic routing

when a routing protocol automatically calculates the best path between 2 networks and accumulates this information in a routing table

Ad Hoc WLAN

wireless nodes transmit directly to each other via wireless NICs without and intervening connectivity device


Related study sets

Chapter 4: Access Control, Authentication, and Authorization

View Set

Marine Biology MIDTERM 2 Questions

View Set

CH 23 nursing care for newborns with special needs

View Set

OCR A Level Biology Transport in Animals

View Set

HEALTH PROMOTION AND MAINTENANCE

View Set

TESUTURI VEGETALE (TESUTURI EMBRIONARE)

View Set