Unit 1 and Unit 2 Cisco Networking
Virus or malware protection
By default, Windows uses Windows Defender. Windows Defender provides a suite of protection tools built into the system. If Windows Defender is turned off, the system becomes more vulnerable to attacks and malware.
What is the difference between the command line and PowerShell on Windows?
CLI: Can be used to run programs, navigate the file system, and manage files and folders. Batch files can be created to execute multiple commands in succession (like a script). CLI cannot work with the core of Windows, or the GUI. PowerShell: Can be used to create scripts to automate tasks, that CLI can not do.
Metro Ethernet
A WAN technology that sends Ethernet traffic across MAN connections.
Hardware Abstraction Layer (HAL)
A component of the Windows operating system that resides in a file and is loaded into memory during the kernel loading phase of the Windows startup. (10)
Interface
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Physical Port
A connector or outlet on a networking device where the media is connected to an end device or another networking device.
Peer-to-peer
A controller network that simply connects computers to each other or to a device such as a printer, but a server is not necessary
End Devices
A device that is either the source or the destination of a packet on a network.
Internet
A global network connecting millions of computers, making it possible to exchange information.
What is the Windows registry?
A large database where information about the hardware, applications, user and systems settings is stored.
Protocol Interaction
A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format. The figure shows some common network protocols that are used when a device sends a request to a web server for its web page
DHCP (Dynamic Host Configuration Protocol)
A network service that provides automatic assignment of IP addresses and other TCP /IP configuration information.
Windows Firewall
A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the Network and Sharing Center.
Extranet
A private electronic network that links a company with its suppliers and customers
What is multiplexing?
A process in which multiple digital data streams are combined into one signal
CCNA (Cisco Certified Network Associate)
A professional certification that attests to one's skills in installing, configuring, maintaining, and troubleshooting medium-sized networks that use Cisco Systems' switches and routers.
Internet Protocol (IP)
A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.
Microsoft Disk Operating System (MS-DOS)
A single-user, single-task operating system created by Microsoft and was the first widely installed operating system in personal computers.
What is an ADS? (Write out acronym and take notes on how this works.)
Alternate Data Streams: File attribute in NTFS file systems, such as $DATA, known as a data stream
Which feature contains options such as Public, Private, Custom and Hybrid?
Cloud computing
Network Media
Communication across a network is carried on a medium. Copper, Fiber-optic, and wireless.
What is a converged network?
Converged networks can deliver data, voice, and video between multiple devices over the same network.
Which two protocols are service discovery protocols? (Choose two.)
DNS, DHCP
Which two protocols belong in the TCP/IP model application layer?
DNS, DHCP
Which attack slows down or crashes equipment and programs?
Denial of Service
Message Delivery Option
Network Network communications has similar delivery options to communicate. As shown in the figure, there three types of data communications include: Unicast - Information is being transmitted to a single end device. Multicast - Information is being transmitted to a one or more end devices. Broadcast - Information is being transmitted to all end devices.
Network Protocol Functions
Network communication protocols are responsible for a variety of functions necessary for network communications between end devices. For example, in the figure how does the computer send a message, across several network devices, to the server?
Define the phrase network protocol.
Network communication standard used to define a method of exchange data over a computer network.
Node Icon
Networking documents and topologies often represent networking and end devices using a node icon. Nodes are typically represented as a circle. The figure shows a comparison of the three different delivery options using node icons instead of computer icons. The figure uses circles representing network nodes to illustrate the three different message delivery options. There are three topologies shown from left to right. The topology on the left depicts a unicast message and consists of one red node, one green node, and four yellow nodes. It has an arrow from the red node leading to the green node. The middle topology depicts a multicast message and consists of one red node, three green nodes, and two yellow nodes. It has an arrow from the red node leading to each of the green nodes. The topology on the right depicts a broadcast. It has one red node and five green nodes. It has an arrow from the red node leading to each of the green nodes.
Traditional Separate Networks
Each network had its own set of rules and standards to ensure successful communication. Multiple services ran on multiple networks.
What is the process of converting information into the proper form for transmission?
Encoding
Which protocol operates at the network access layer of the TCP/IP model?
Ethernet
Which three are components of message timing?
Flow control, Access method, response timeout
Which two protocols function at the internet layer? (Choose two.)
ICMP, IP
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)
ICMPv4, ICMPv6
Which standards organization oversees development of wireless LAN standards?
IEEE
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?
IP at the internet layer
Logical topology diagrams
Identify devices, ports, and addressing scheme.
Physical topology diagrams
Identify the physical location of intermediary devices and cable installation.
To change the file path, you can use a simple cd command. Type cd\ What happened?
It changed the directory to C:_
Which statement correctly describes frame encoding?
It converts bits into a predefined code in order to provide a predictable pattern to help distinguish data bits from control bits
What is one advantage of using fiber optic cabling rather than copper cabling?
It is able to carry signals much farther than copper cabling
What is an ISP?
It is an organization that enables individuals and businesses to connect to the Internet.
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a Layer 2 frame
Which network infrastructure provides access to users and end devices in a small geographical area, which is typically a network in a department in an enterprise, a home, or small business?
LAN
Dedicated Leased Line
Leased lines are actually reserved circuits within the service provider's network that connect geographically separated offices for private voice and/or data networking. The circuits are typically rented at a monthly or yearly rate. They can be expensive.
What is the difference between a local user and a domain user on Windows?
Local User: Is a user account that stores settings, permissions file locations, and other user data. Domain User: Is a network domain used to set permissions. All the users groups, computers, peripherals and security settings, and stored and controlled by a database. These databases are stored on domain controller computers. All computers on the domain have to authenticate, and get security settings
What is the difference between logical and physical addressing?
Logical addressing is used to deliver the IP packet from the original source to the final destination. Physical addresses are unique to a specified address.
Which type of network topology lets you see which end devices are connected to which intermediary devices and what media is being used?
Logical topology
Network protocol requirements
Message encoding Message formatting and encapsulation Message size Message timing Message delivery options
message source (sender)
Message sources are people, or electronic devices, that need to send a message to other individuals or devices.
The OSI reference model provides an extensive list of functions and services that can occur at each layer.
OSI Model LayerDescription7 - ApplicationThe application layer contains protocols used for process-to-process communications.6 - PresentationThe presentation layer provides for common representation of the data transferred between application layer services.5 - SessionThe session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.4 - TransportThe transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.3 - NetworkThe network layer provides services to exchange the individual pieces of data over the network between identified end devices.2 - Data LinkThe data link layer protocols describe methods for exchanging data frames between devices over a common media1 - PhysicalThe physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.
What are the main differences between a packet-switched and circuit-switched network?
Packet switched network splits traffic into packets that our routed over a shared network. Circuit switched network has a dedicated physical circuit path between the sender, and receiver. Circuit switched networks are typically used by telephone company networks.
Which type of network topology lets you see the actual location of intermediary devices and cable installation?
Physical topology
Which feature is being used when connecting a device to the network using an electrical outlet?
Powerline
Message Encoding
Preparing the information to be communicated and putting it in the correct format
Service Discovery Protocols
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Routing Protocols
Protocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Network Communications Protocols
Protocols enable two or more devices to communicate over one or more networks. The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Security Protocols
Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
With which type of policy, a router can manage the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion?
QOS
Quality of Service (QoS)
Refers to the capability of a network to provide better service to selected network traffic over various technologies, New applications available to users over networks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services.
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)
Routing protocols, Messaging, Internet Protocol
When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achieved?
Scalability
Confidentiality, integrity, and availability are requirements of which of the four basic characteristics of network architecture?
Security
Wide Area Network (WAN)
Spans a large geographic area such as a state, province, or country
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP
SSH (Secure Shell)
TCP 22 UDP 22
The TCP/IP protocol model for internetwork communications was created in the early 1970s and is sometimes referred to as the internet model. This type of model closely matches the structure of a particular protocol suite. The TCP/IP model is a protocol model because it describes the functions that occur at each layer of protocols within the TCP/IP suite. TCP/IP is also used as a reference model. The table shows details about each layer of the OSI model. TCP/IP Model LayerDescription4 - ApplicationRepresents data to the user, plus encoding and dialog control.3 - TransportSupports communication between various devices across diverse networks.2 - InternetDetermines the best path through the network.1 - Network AccessControls the hardware devices and media that make up the network.
TCP/IP Model LayerDescription4 - ApplicationRepresents data to the user, plus encoding and dialog control.3 - TransportSupports communication between various devices across diverse networks.2 - InternetDetermines the best path through the network.1 - Network AccessControls the hardware devices and media that make up the network. The definitions of the standard and the TCP/IP protocols are discussed in a public forum and defined in a publicly available set of IETF RFCs. An RFC is authored by networking engineers and sent to other IETF members for comments.
Describe the ARP (address resolution protocol) process noting why this is important
The ARP provides dynamic address mapping between an IPv4 address and a hardware address. Used for the source host to determine the destination MAC address. Important because it tells how to send packets over a router.
DNS (Domain Name System)
The Internet's system for converting alphabetic names into numeric IP addresses.
7 - Application
The application layer contains protocols used for process-to-process communications.
2 - Data Link
The data link layer protocols describe methods for exchanging data frames between devices over a common media
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
The end-user device needs mobility when connecting to the network
3 - Network
The network layer provides services to exchange the individual pieces of data over the network between identified end devices.
1 - Physical
The physical layer protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.
6 - Presentation
The presentation layer provides for common representation of the data transferred between application layer services.
Which type of communication will send a message to a group of host destinations simultaneously?
multicast
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
physical layer
Bring Your Own Device (BYOD)
policy allows employees to use their personal mobile devices and computers to access enterprise data and applications
What is the general term that is used to describe a piece of data at any layer of a networking model?
protocol data unit
TCP (Transmission Control Protocol)
provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
What is the purpose of protocols in data communications?
providing the rules required for a specific type of communication to occur
Scalability
refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
What type of cable is used to connect a workstation serial port to a Cisco router console port?
rollover
Which two devices are intermediary devices? (Choose two)
routers, switches
BGP and OSPF are examples of which type of protocol?
routing
What characteristic of a network enables it to quickly grow to support new users and applications without impacting the performance of the service being delivered to existing users?
scalability
What is the PDU associated with the transport layer?
segment
What is the process of dividing a large data stream into smaller pieces prior to transmission?
segmentation
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
spyware
Which type of UTP cable is used to connect a PC to a switch port?
straight-through
What is used to determine the network portion of an IPv4 address?
subnet mask
shutdown
t is always best to perform a proper shutdown to turn off the computer. Files that are left open, services that are closed out of order, and applications that hang can all be damaged if the power is turned off without first informing the operating system. The computer needs time to close each application, shut down each service, and record any configuration changes before power is lost.
What is the definition of bandwidth?
the amount of data that can flow from one place to another in a given amount of time
Powerline Networking
the connection of devices to the Internet through the use of existing electrical wiring
Which characteristic describes crosstalk?
the distortion of the transmitted messages from signals carried in adjacent wires
What is indicated by the term throughput?
the measure of the bits transferred across the media over a given period of time
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?
the microwave oven
HTTP (Hypertext Transfer Protocol)
the protocol used for transmitting web pages over the Internet
Which of these is a measure of the transfer of bits across the media?
throughput
In computer communication, what is the purpose of message encoding?
to convert information to the appropriate form for transmission
What is the purpose of the sequencing function in network communication?
to uniquely label transmitted segments of data for proper reassembly by the receiver
What is the purpose of the OSI physical layer?
transmitting bits across the local media
UDP and TCP belong to which layer of the TCP/IP protocol?
transport
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
transport
Which procedure is used to reduce the effect of crosstalk in copper cables?
twisting opposing circuit wire pairs together
Which media uses patterns of microwaves to represent bits?
wireless
User mode and kernel mode
The two separate modes of operating in a system are
Why are two strands of fiber used for a single fiber optic connection?
They allow for full-duplex connectivity
After packets are segmented and multiplexed, how can they be reassembled?
They are reassembled using sequencing where each segment of a message is labeled based on the order it will need to be assembled.
Why is the Internet called open standards if we have standards and protocols?
They have open standards to encourage interoperability, competition, and innovation. No single company can have a monopoly or unfair competitive advantage. These standards are made available to the public and are developed and maintained by a collaborative consensus process. Open standards encourages data exchanges among different products and services and are intended for widespread adoption.
What are two functions of end devices on a network?
They originate the data that flows through the network, they are the interface between humans and the communication network
Hierarchical File System (HFS)
This file system is used on MAC OS X computers and allows much longer filenames, file sizes, and partition sizes than previous file systems. Although it is not supported by Windows without special software, Windows is able to read data from HFS+ partitions.
Application Interface
This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Flow control
This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Error Detection
This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Reliability
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Sequencing
This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Addressing
This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
File Allocation Table (FAT)
This is a simple file system supported by many different operating systems. FAT has limitations to the number of partitions, partition sizes, and file sizes that it can address, so it is not usually used for hard drives (HDs) or solid state drives (SSDs) anymore. Both FAT16 and FAT32 are available to use, with FAT32 being the most common because it has many fewer restrictions than FAT16.
exFAT (Extended File Allocation Table)
This is an extended version of FAT that has even fewer restrictions than FAT32, but is not supported very well outside of the Windows ecosystem.
Partition Boot Sector
This is the first 16 sectors of the drive. It contains the location of the Master File Table (MFT). The last 16 sectors contain a copy of the boot sector.
NTFS (New Technology File System)
This is the most commonly used file system when installing Windows. All versions of Windows and Linux support NTFS while Mac-OS X computers can only read an NTFS partition. They are able to write to an NTFS partition after installing special drivers.
MFT (master file table)
This table contains the locations of all the files and directories on the partition, including file attributes such as security information and timestamps.
True or false. Standards organizations are usually vendor-neutral.
True
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.
True
Converged networks
Unlike dedicated networks, converged networks are capable of delivering data, voice, and video between many different types of devices over the same network infrastructure.
An employee wants to access the network of the organization remotely, in the safest possible way. What network feature would allow an employee to gain secure remote access to a company network?
VPN
Which option creates a secure connection for remote workers?
VPN
Which feature is a good conferencing tool to use with others who are located elsewhere in your city, or even in another country?
Video communications
Which option describes malicious code running on user devices?
Virus, worms or trojan horses
Which network infrastructure provides access to other networks over a large geographical area, which is often owned and managed by a telecommunications service provider?
WAN
Which option describes a network attack that occurs on the first day that a vulnerability becomes known?
Zero day or zero hour
Local Area Network (LAN)
a computer network that covers a small area
In which scenario would the use of a WISP be recommended?
a farm or rural area without wired broadband
Intranet
a network designed for the exclusive use of computer users within an organization that cannot be accessed by users outside the organization
Which device performs the function of determining the path that messages should take through internetworks?
a router
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
What five fundamental traits do network protocols usually share?
a. Message encoding b. Message formatting and encapsulation c. Message Size d. Message Timing e. Message Delivery Options
What are two benefits of using a layered network model? (Choose two.)
assists in protocol design, prevents technology in one layer fro affecting other layers
The physical layer of the receiving device passes bits up to which higher level layer?
data link
Which protocol stack layer encapsulates data into frames?
data link
What process is used to receive transmitted data and convert it into a readable message?
decoding
Which logical address is used for delivery of data to a remote network?
destination IP address
What is the order of the two addresses in the data link frame?
destination MAC, source MAC
Internet Standards
developed through non-hierarchical consensus building.
What types of standards are developed by the Electronics Industries Alliance (EIA)?
electric wiring and connections
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
encapsulation
What process is used to place one message inside another message for transfer from the source to the destination?
encapsulation
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
extranet
True or false? The physical layer is only concerned with wired network connections.
false
True or false? When a frame is encoded by the physical layer, all bits are sent over the media at the same time.
false
A college is building a new dormitory on its campus. Workers are digging in the ground to install a new water pipe for the dormitory. A worker accidentally damages a fiber optic cable that connects two of the existing dormitories to the campus data center. Although the cable has been cut, students in the dormitories only experience a very short interruption of network services. What characteristic of the network is shown here?
fault tolerance
Having multiple paths to a destination is known as redundancy. This is an example of which characteristic of network architecture?
fault tolerance
Which media uses patterns of light to represent bits?
fiber-optic
What PDU is received by the physical layer for encoding and transmission?
frame
What are two characteristics of a scalable network? (Choose two.)
grows in size without impacting existing users, suitable for modular devices that allow for expansion
Which of the following is the name for all computers connected to a network that participate directly in network communication?
hosts
What type of network must a home user access in order to do online shopping?
internet
Fault tolerance
is a computer system designed that in the event a component fails, a backup component or procedure can immediately take its place with no loss of service. Fault tolerance can be provided with software, or embedded in hardware, or provided by some combination.
General
- Three different startup types can be chosen here. Normal loads all drivers and services. Diagnostic loads only basic drivers and services. Selective allows the user to choose what to load on startup.
What is a characteristic of UTP cabling?
cancellation
What command would you use to change back to C:/Program Files
cd "\program files"
Which two Internet connection options do not require that physical cables be run to the building? (Choose two.)
cellular, satellite
Network Security
concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the internet
Intermediary Devices
connect the individual end devices to the network and can connect multiple individual networks to form an internetwork
Which media uses electrical pulses to represent bits?
copper
Login as Administrator
- When a user logs in as an administrator, any program that they run will have the privileges of that account. It is best to log in as a Standard User and only use the administrator password to accomplish certain tasks.
Encryption
- When data is not encrypted, it can easily be gathered and exploited. This is not only important for desktop computers, but especially mobile devices.
Business DSL
Business DSL is available in various formats. A popular choice is Symmetric Digital Subscriber Line (SDSL) which is similar to the consumer version of DSL but provides uploads and downloads at the same high speeds.
When data is encoded as pulses of light, which media is being used to transmit the data?
Fiber-optic cable
Which option blocks unauthorized access to your network?
Firewall
Extended File System (ext)
First file system created specifically for Linux where the metadata and file structure is based on the Unix File system
4 - Transport
The transport layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?
bring your own device
What type of communication will send a message to all devices on a local area network?
broadcast
Which message delivery option is used when all devices need to receive the same message simultaneously?
broadcast
Event Viewer
A GUI application that allows users to easily view and sort events recorded in the event log on a computer running a Windows-based operating system.
Network Interface Card (NIC)
A NIC physically connects the end device to the network.
Security policy
- A good security policy must be configured and followed. Many settings in the Windows Security Policy control can prevent attacks.
Threat actor attacks
- A malicious person attacks user devices or network resources.
Describe a PDU and its relationship to encapsulation.
A PDU (Protocol Data Unit) the form the data takes at any layer, during encapsulation each succeeding layer encapsulates the PDU. The PDU that is received from the layer above is in accordance with the protocol being used. At each stage of the process a PDU has a different name to reflect its new function.
File and share permissions
- These permissions must be set correctly. It is easy to just give the "Everyone" group Full Control, but this allows all people to do what they want to all files. It is best to provide each user or group with the minimum necessary permissions for all files and folders.
Dedicated firewall systems
- These provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
Virtual private networks (VPN)
- These provide secure access into an organization for remote workers.
Data interception and theft
- This attack captures private information from an organization's network.
Identity theft
- This attack steals the login credentials of a user in order to access private data.
Channel
- This consists of the media that provides the pathway over which the message travels from source to destination.
Startup
- All the applications and services that are configured to automatically begin at startup can be enabled or disabled by opening the task manager from this tab. The Startup tab is shown in Figure 4.
Services
- All the installed services are listed here so that they can be chosen to start at startup. The Services tab is shown in Figure 3
Zero-day attacks
- Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Boot
- Any installed operating system can be chosen here to start. There are also options for Safe boot, which is used to troubleshoot startup. The Boot tab is shown in Figure 2.
Firewall
- By default, Windows uses Windows Firewall to limit communication with devices on the network. Over time, rules may no longer apply. For example, a port may be left open that should no longer be readily available. It is important to review firewall settings periodically to ensure that the rules are still applicable and remove any that no longer apply.
Availability
- Data availability assures users of timely and reliable access to data services for authorized users.
Confidentiality
- Data confidentiality means that only the intended and authorized recipients can access and read data.
Integrity
- Data integrity assures users that the information has not been altered in transmission, from origin to destination.
Firewall filtering
- Firewall filtering blocks unauthorized access into and out of the network. This may include a host-based firewall system that prevents unauthorized access to the end device, or a basic filtering service on the home router to prevent unauthorized access from the outside world into the network.
Tools
- Many common operating system tools can be launched directly from this tab. The Tools tab is shown in Figure 5.
Weak or no password
- Many people choose weak passwords or do not use a password at all. It is especially important to make sure that all accounts, especially the Administrator account, have a very strong password.
Message Destination (receiver)
- The destination receives the message and interprets it.
File Area
- The main area of the partition where files and directories are stored.
Unknown or unmanaged services
- There are many services that run behind the scenes. It is important to make sure that each service is identifiable and safe. With an unknown service running in the background, the computer can be vulnerable to attack.
Antivirus and antispyware
- These applications help to protect end devices from becoming infected with malicious software.
System Files
- These are hidden files that store information about other volumes and file attributes
Spyware/Adware
- These are types of software which are installed on a user's device. The software then secretly collects information about the user.
Denial of service attacks
- These attacks slow or crash applications and processes on a network device.
Viruses, worms, and Trojan horses
- These contain malicious software or code running on a user device.
Access control lists (ACL)
- These further filter access and traffic forwarding based on IP addresses and applications.
Intrusion prevention systems (IPS)
- These identify fast-spreading threats, such as zero-day or zero-hour attacks.
Windows Boot Process
BIOS init phaase - Firmware ids and inits hardware devices then runs POST - BIOS detecs MBR of a disk - Starts Bootmgr.exe - Bootmgr.exe finds Winload.exe - Winload.exe enforces KMCS to load signed drivers - Winload loads Ntoskrnl to set up HAL - Pass to SMSS to load user environment
Which feature describes using personal tools to access information and communicate across a business or campus network?
BYOD
How does BYOD change the way in which businesses implement networks?
BYOD provides flexibility in where and how users can access network resources
Why are networks converging?
Before converged networks, networks were separate, used different technologies, had its own rules, standards, and were not able to communicate with each other. With a converged network all these devices can have standardized rules, use the same technologies to communicate, and be able to be used in the same environment.
Which network infrastructure might an organization use to provide secure and safe access to individuals who work for a different organization but require access to the organization's data?
Extranet
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.
False
True or false? The right-most part of an IP address is used to identify the network that a device belongs to.
False
As networks evolve, we have learned that there are four basic characteristics that network architects must address to meet user expectations:
Fault Tolerance Scalability Quality of Service (QoS) Security
Which step of the communication process is concerned with properly identifying the address of the sender and receiver?
Formatting
What are two important registry items and why?
HKEY_LOCAL_MACHINE: Windows configurations are stored on this key, including information about services that start each boot. HKEY_CURRENT_USER: The key has stored information about services, that start only when the user logs into the computer.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet
Which connections are specialized ports on a networking device that connect to individual networks?
Interface
This standards organization is responsible for IP address allocation and domain name management.
Internet Assigned Numbers Authority
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.
Internet Engineering Task Force
Message Timing
Message timing is also very important in network communications. Message timing includes the following: Flow Control - This is the process of managing the rate of data transmission. Flow control defines how much information can be sent and the speed at which it can be delivered. For example, if one person speaks too quickly, it may be difficult for the receiver to hear and understand the message. In network communication, there are network protocols used by the source and destination devices to negotiate and manage the flow of information. Response Timeout - If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly. The person may repeat the question or instead, may go on with the conversation. Hosts on the network use network protocols that specify how long to wait for responses and what action to take if a response timeout occurs. Access method - This determines when someone can send a message. Click Play in the figure to see an animation of two people talking at the same time, then a "collision of information" occurs, and it is necessary for the two to back off and start again. Likewise, when a device wants to transmit on a wireless LAN, it is necessary for the WLAN network interface card (NIC) to determine whether the wireless medium is available.
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?
Multicast
Which connection physically connects the end device to the network?
NIC
HKEY_LOCAL_MACHINE
Several aspects of Windows configuration are stored in this key, including information about services that start with each boot.
HKEY_CURRENT_USER:
Several aspects related to the logged in user are stored in this key, including information about services that start only when the user logs on to the computer.
Network Protocols
The rules of initiating, interrupting, and continuing communication on a computer network.
5 - Session
The session layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
Message Size
The size restrictions of frames require the source host to break a long message into individual pieces that meet both the minimum and maximum size requirements. The long message will be sent in separate frames, with each frame containing a piece of the original message. Each frame will also have its own addressing information. At the receiving host, the individual pieces of the message are reconstructed into the original message.
standards-based protocol suite
This means it has been endorsed by the networking industry and approved by a standards organization. This ensures that products from different manufacturers can interoperate successfully.
Open standard protocol suite
This means it is freely available to the public and can be used by any vendor on their hardware or in their software
Alternate Data Streams
Ways in which data can be appended to a file (intentionally or not) and potentially obscure evidentiary data. In NTFS, alternate data streams become an additional file attribute.
Message formating
When a message is sent from source to destination, it must use a specific format or structure. Message formats depend on the type of message and the channel that is used to deliver the message.
Local Security Policy
Windows tool used to set local security policies on an individual system.
Which feature uses the same cellular technology as a smart phone?
Wireless broadband
Which of these is the name for the capacity of a medium to carry data?
bandwidth