Term
| What is the OSI Layer Model? and how many layers are in it? |
|
Definition
Open Systems Interconnection model
7- Application 6- Presentation 5- Session 4- Transport 3- Network 2- Data Link 1- Physical |
|
|
Term
| What are the four TCP/IP Layers? |
|
Definition
4- Application 3- Transport 2- Internet 1- Network Interface |
|
|
Term
| What is the Max size of a Frame? |
|
Definition
|
|
Term
|
Definition
| Devices on a network that send and receive data in discreet chunks called Frames, have destination and source mac addresses |
|
|
Term
| Where are Frames Created? |
|
Definition
| Frames are created and destroyed inside the NIC (Network Interface Card) |
|
|
Term
|
Definition
| a Media Access Control address is a unique 48-bit identifier. |
|
|
Term
|
Definition
| Original Equipment Manufacturer |
|
|
Term
|
Definition
Cyclic Redundancy Check
error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. |
|
|
Term
| What is a Unicast Transmission |
|
Definition
| Addressed to a single device on a network |
|
|
Term
| What is a broadcast transmission |
|
Definition
| Sent to every device on a broadcast domain |
|
|
Term
| What does a broadcast address look like? |
|
Definition
|
|
Term
|
Definition
| Help direct packet traffic between the source and destination |
|
|
Term
|
Definition
| TCP is connection Oriented, UDP is connectionless |
|
|
Term
| Where does a computer get the MAC Address? |
|
Definition
| A unique MAC address is built into every Network Interface Card (NIC) |
|
|
Term
| What is a chunk of data that has been sent out of a NIC called? |
|
Definition
|
|
Term
| What is a Star Bus Topology |
|
Definition
| Connected in like a star, all around, considered a hybrid technology. |
|
|
Term
| What is a fully meshed topology? |
|
Definition
| When each host is interconnected. |
|
|
Term
| What is Logical Topology? |
|
Definition
| The electronic circuit flow of frames. |
|
|
Term
|
Definition
| Radio Grade, it specifies the thickness of conductors, insulation, and shielding. |
|
|
Term
|
Definition
| Has two conductors, one center point, and a tubular conducting layer. |
|
|
Term
|
Definition
specific type of coaxial cable, often used for low-power video and RF signal connections
Has a 75ohm rating and uses a threaded f-type connector |
|
|
Term
| What is the EIA/TIA 568A/568B? |
|
Definition
| Wiring Standards for how wires are connected to a connector. 568B is the predominant standard. |
|
|
Term
| What is the 568B Wiring Standard |
|
Definition
|
|
Term
| What is the 568A Wiring Standard |
|
Definition
|
|
Term
|
Definition
| Unshielded Twisted Pair. Subject to signal interference from environmental factors. |
|
|
Term
| Modern Twisted Pair has _ or more pairs of cable |
|
Definition
|
|
Term
| What is the Speed of Cat 3? |
|
Definition
|
|
Term
| What is the speed of Cat 5 and 5e? |
|
Definition
| 100-1000mbps @ 100 meters |
|
|
Term
| What is the speed and length of Cat 7? |
|
Definition
| 10 Gbps, @ 100 meters, shielded. |
|
|
Term
| What do UTP cat ratings define? |
|
Definition
| Speed and cable length specifications |
|
|
Term
| What are Cat 6a and Cat 7 both rated for? |
|
Definition
| 10 Gbps and up to 100 meter length. |
|
|
Term
| Multimode cables carry ___ signals |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
What kind of connector is this on the left side?
[image] |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
| Single-mode cables carry ____ signals |
|
Definition
|
|
Term
| What is Plenum-rated cable? and what is non-plenum or PVC considered? |
|
Definition
| Most fire resistant. non is not considered fire or smoke resistant. |
|
|
Term
| What is Riser Rated Cable |
|
Definition
| Used in vertical applications such as cable runs between floors. |
|
|
Term
| What is the IEEE 802.3 standard for? |
|
Definition
|
|
Term
| What is the IEEE 802.11 standard for? |
|
Definition
|
|
Term
| What does IEEE Stand for? |
|
Definition
| The Institute of Electrical and Electronics Engineers |
|
|
Term
| What are all the CAT Ratings and Speeds/Cable Run Lengths? |
|
Definition
|
|
Term
| What does an Ethernet frame consist of? |
|
Definition
| a preamble, destination MAC, source MAC, data type, data, pad, and FCS |
|
|
Term
| how much data can a Jumbo frame carry? |
|
Definition
|
|
Term
|
Definition
| Frame Check Sequence, is used for error detection. |
|
|
Term
|
Definition
| carrier sense multiple access / collision detection |
|
|
Term
| What does 10Base5 and 10Base2 require? |
|
Definition
| Terminating resistors at both ends of a segment (cable) |
|
|
Term
| What should you always use when connecting to 10Base2? |
|
Definition
|
|
Term
| What does MSAU stand for? |
|
Definition
|
|
Term
|
Definition
| runs at 10mbps over Cat 3 or better. can have 1024 nodes per switch, and runs a max of 100 meters between switch and node. |
|
|
Term
| What is an 8P8C connector |
|
Definition
|
|
Term
| what is a straight-through cable? |
|
Definition
| a patch cable that uses the same wiring standard on both ends. Most commonly used. |
|
|
Term
| what is a crossover cable? |
|
Definition
| a cable with different wiring standards on each end, usually to connect a machine directly to another or connecting switches directly. |
|
|
Term
| Switches forward frames based on ___? |
|
Definition
|
|
Term
| What do switches do to map ports and host devices? |
|
Definition
| Create and use MAC Address Tables. |
|
|
Term
| 10Base5 connects to a network card with a ____ connector |
|
Definition
|
|
Term
|
Definition
100mbps 1024 nodes per hub 100 meters Cat 3 |
|
|
Term
|
Definition
100 mbps 1024 nodes per hub Multimode 2 KM |
|
|
Term
| what does half-duplex mean? |
|
Definition
| Allows transmission of signals in both directions but not simultaneously. |
|
|
Term
|
Definition
| Special port on a switch or hub that reverses the transmit and receive circuits. Basically a pre-crossover port. Straight through cables would work in an uplink port. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Gigabit Interface Converter.
[image] |
|
|
Term
|
Definition
Small form-factor pluggable
[image] |
|
|
Term
|
Definition
| Quad small form-factor pluggable designed for 40Gbps Ethernet [image] |
|
|
Term
|
Definition
|
|
Term
|
Definition
Telecommunications Industry Association
they specify the wiring standards for structured cabling. |
|
|
Term
| Patch Panels terminate one end of ____ |
|
Definition
|
|
Term
|
Definition
| a type of punch block used to terminate runs on a structured cabling system. to distribute copper wired networks. There's also a 66 block although its older and not used as much. (non-VoIP) |
|
|
Term
|
Definition
| Main distribution frame : primary equipment room |
|
|
Term
|
Definition
| U or unit, standard height for components in a rack |
|
|
Term
| What is a Demarc/extension? |
|
Definition
| seperates the telecom company's property from your responsibility. |
|
|
Term
| What is a fiber distribution panel? |
|
Definition
| used to distribute fiber-optic networks |
|
|
Term
|
Definition
Optical TDR (time domain reflectometer)
TDR shows length of cable and helps pinpoint mid-cable breaks. |
|
|
Term
|
Definition
| Near-end crosstalk, and far-end crosstalk |
|
|
Term
| What is Continuity testing? |
|
Definition
| Shows if the cable has any breaks. |
|
|
Term
|
Definition
| tool to test the NICs ability to send and receive. |
|
|
Term
|
Definition
|
|
Term
| What do tone generators do? |
|
Definition
| create a signal for the probe to pickup at the switch area. |
|
|
Term
|
Definition
| Address Resolution Protocol. Resolves IP Addresses. Used when the IP is known but needs the MAC address. Arp -a to see cache. |
|
|
Term
| What numbers can you NOT use for a HOST ID? |
|
Definition
|
|
Term
| What does a host use a subnet mask for? |
|
Definition
| to know if the destination is local or remote |
|
|
Term
| What is the default gateway for? |
|
Definition
| Router, hosts use to to forward traffic to remote networks. |
|
|
Term
|
Definition
Internet Assigned Numbers Authority.
oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System, media types, and other Internet Protocol-related symbols and Internet numbers |
|
|
Term
|
Definition
| divides network IDs into two or more networks. |
|
|
Term
| What is classful subneetting? |
|
Definition
first effort to divide network IDs. Class A, B, and C licenses.
[image] |
|
|
Term
|
Definition
| Classless Inter-Domain Routing |
|
|
Term
| Each broadcast domain must have only one ____ |
|
Definition
|
|
Term
|
Definition
| Enables a single DHCP server to service more than one broadcast domain. |
|
|
Term
|
Definition
Automatic Private IP Addressing
IP looks like (169.254.x.x) |
|
|
Term
| what does a private ip address start with? |
|
Definition
|
|
Term
| What is a loopback address for IPv4 an IPv6? |
|
Definition
|
|
Term
| What are other special internal IPs? |
|
Definition
172.16.x.x
172.31.x.x
192.168.x.x |
|
|
Term
| What do all routers have to show a list of ip addresses? |
|
Definition
|
|
Term
| What are well known ports? |
|
Definition
|
|
Term
| what does every TCP packet have? |
|
Definition
|
|
Term
| clients generate ephemeral port numbers that are always between? |
|
Definition
|
|
Term
|
Definition
| Packet Address Translation. Translates internal IPs to an internet address and tracks the packets. |
|
|
Term
|
Definition
| a unit of data that is routed between an origin and a destination. |
|
|
Term
|
Definition
| Static Network Address Translation - sends specific traffic to one internal ip address. |
|
|
Term
|
Definition
| Dynamic NAT - has a limited pool of Internet addresses to give to a number of internal devices. |
|
|
Term
| SOHO routers ship with ___ enabled |
|
Definition
|
|
Term
| Older routers may call NAT _____ |
|
Definition
|
|
Term
|
Definition
| 20 and 21 File Transfer Protocol |
|
|
Term
|
Definition
| allows external devices to have internal communications through a router. |
|
|
Term
|
Definition
| Opens an alternative assigned port when the initial port is contacted. |
|
|
Term
| Enabling the DMZ when setting up port forwarding places that device ____ |
|
Definition
| outside the protection of the router |
|
|
Term
| All home routers have a default : |
|
Definition
|
|
Term
| Router WAN connections are commonly ____ clients by default |
|
Definition
|
|
Term
| SOHO routers are for small groups btwn ____ and can have built-in capability for : |
|
Definition
5-6 devices.
Switches, Firewalls, and WAPs |
|
|
Term
SOHO routers often have _____ interfaces
enterprise routers typically have their own ____ |
|
Definition
web-based interfaces
OS interface |
|
|
Term
|
Definition
| a fixed route that is manually configured and persistent |
|
|
Term
| use ____ or ____ to display current known routes from the routing table |
|
Definition
| route print or netstat -r |
|
|
Term
|
Definition
| information for destination, subnet mask, gateway, and NIC |
|
|
Term
|
Definition
Maximum Transmission Unit
the size of the largest protocol data unit (PDU) that can be communicated in a single network |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Border Gateway Protocol, hybrid protocol. Primary for the internet. |
|
|
Term
|
Definition
|
|
Term
| Dynamic routing protocols use metrics to determine routes and are either ___ or ____ |
|
Definition
| Distance Vector or Link State |
|
|
Term
|
Definition
Interior Gateway Protocol and Exterior Gateway Protocol
IGP is used to exchange routing information with an Autonomous System (AS)
EGP is used for determining network reachability between AS' and makes use of IGPs to resolve routes. |
|
|
Term
| BGP is the EGP protocol used for: |
|
Definition
| Inter-Autonomous System Routing |
|
|
Term
|
Definition
| Routing Information Protocol. Distance Vector Interior Gateway protocol that uses hop count to determine routes. |
|
|
Term
| What is RIPs max hop count? |
|
Definition
|
|
Term
|
Definition
| Open Shortest Path First. Link state protocol. IGP |
|
|
Term
| What is a Distance Vector Protocol? |
|
Definition
| routing protocol that uses distance of numbers of routers a packet has to pass. |
|
|
Term
| What is a link-state protocol? |
|
Definition
| a routing protocol used that is performed by every switching node in a network where they construct a map of the connectivity and calculates the best logical path to use (OSPF) is a link-state protocol. |
|
|
Term
| What is the job of a router? |
|
Definition
| To connect networks with different network IDs |
|
|
Term
| What is the role of port numbers in ip headers? |
|
Definition
| Port numbers identify the sending and receiving processes between the two hosts. |
|
|
Term
| Port Forwarding allows what? |
|
Definition
| Outside access to to hosts on the LAN side of a NAT router. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Protocol Data Unit. information used by different protocols provided in frame segments. |
|
|
Term
| Ethernet Frames are used by : |
|
Definition
|
|
Term
|
Definition
| Transmission Control Protocol is connection-oriented; 2-way communication initiated by a 3-way handshake process (syn, syn-ack, ack) |
|
|
Term
|
Definition
| User Datagram Protocol is connectionless-oriented, has low overhead with one-way communication. |
|
|
Term
|
Definition
| Internet Control Message Protocol: works at the Internet(2) layer in the TCI\IP model and the Network (3) in the OSI Model |
|
|
Term
| Multicast Addresses always start with |
|
Definition
|
|
Term
| What commands display the hops through a router to reach a destination? |
|
Definition
| tracert for Windows and traceroute for Linux |
|
|
Term
| using the alternative command ____ can get a quicker ping response from the routers |
|
Definition
|
|
Term
|
Definition
| a protocol analyzer, integrated with a frame capture tool |
|
|
Term
|
Definition
| displays the traffic flow of Ethernet frames, and can drill down into the frame-viewing various protocols, ports, timelines, and services. |
|
|
Term
| What command lists all open ports and network connections on a computer? |
|
Definition
|
|
Term
|
Definition
| presents all results numerically |
|
|
Term
|
Definition
| shows the executable for every connection |
|
|
Term
|
Definition
| shows the executable and process id for every connection |
|
|
Term
|
Definition
shows all active ports
Check if a web server is running. |
|
|
Term
|
Definition
| shows the local routing table |
|
|
Term
|
Definition
| Internet Information Services |
|
|
Term
| the ____ command downloads and the ___ uploads |
|
Definition
|
|
Term
| FTP is not an ______ protocol |
|
Definition
| encrypted. SFTP is more secure. |
|
|
Term
| FTP servers listen on port __ and send data on ___ |
|
Definition
|
|
Term
|
Definition
| Simple Mail Transfer Protocol on port 25 |
|
|
Term
|
Definition
110
Assumes access by only one client |
|
|
Term
|
Definition
|
|
Term
| What are email port numbers after Implementing TLS? |
|
Definition
| IMAP 143 ->993 Encrypted POP3 110 -> 995 Encrypted SMTP 25 -> 465 Encrypted |
|
|
Term
| the STARTTLS extension uses only one port for encrypted communication |
|
Definition
|
|
Term
|
Definition
| Runs on TCP port 23. unencrypted |
|
|
Term
|
Definition
| Secure Shell. Runs over TCP port 22. fully encrypted, almost replaced telnet. |
|
|
Term
|
Definition
UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
port 513. not secure. replaced by SSH |
|
|
Term
|
Definition
| Network Time Protocol. used for clock synchronization. uses port 123. Hundreds of NTP servers worldwide. |
|
|
Term
|
Definition
IP Address Management tools:
track and manage allotted ip addresses, keeping address requirement available for server and VM farms. |
|
|
Term
| Ping uses which IP layer Protocol? |
|
Definition
| ICMP - The internet control message protocol is on layer 3 (network) of the OSI Model and layer 2 of the TCP\IP model. (internet) |
|
|
Term
| What is the primary purpose of netstat? |
|
Definition
| Displays all connections to and from a host computer. |
|
|
Term
| TCP uses the ___ message to close a connection |
|
Definition
|
|
Term
|
Definition
| Domain Name System - resolves FQDNS (fully qualified domain names) to IP addresses. |
|
|
Term
| What are examples of Top-level domains? |
|
Definition
|
|
Term
|
Definition
Start of Authority
Type of resource record in the DNS containing administrative information about the zone. |
|
|
Term
| what is a DNS A record for? |
|
Definition
|
|
Term
| what is a dns AAAA record for? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| CNAME record creation makes an alias name or ____ |
|
Definition
|
|
Term
| What does a reverse lookup zone do? |
|
Definition
| Resolves an ip address to an FQDN, used by mail servers. |
|
|
Term
| TXT records, DKMI, and SPF are used to ____ |
|
Definition
| identify email users and reduce spam. |
|
|
Term
| the hosts file contains ___ |
|
Definition
| ip addresses and their names. Every computer that runs TCP/IP has one. it takes precedence over DNS |
|
|
Term
| this command shows all user information |
|
Definition
|
|
Term
| this command shows detailed information about currently mapped drives and devices and sets drive names for shares. |
|
Definition
|
|
Term
| this command creates and configurees network shares |
|
Definition
|
|
Term
| This command shows everything that is on the network. |
|
Definition
|
|
Term
| this command shows workstation account settings such as password length etc. |
|
Definition
|
|
Term
| this command allows you to start and stop a service |
|
Definition
|
|
Term
| This is an old protocol that manages connections based on the names of computers within a LAN |
|
Definition
|
|
Term
| ___is a protocol that allows hosts to name resolution for hosts on the same local link |
|
Definition
| LLMNR - Link Local Multicast Name Resolution |
|
|
Term
| a network utility tool for Netbios that displays connections for TCP but has some issues with LLMNR |
|
Definition
|
|
Term
| Enables you to use a DHCP assigned IP address for connection |
|
Definition
|
|
Term
|
Definition
| Domain information groper. can be used to check status of a DNS server |
|
|
Term
|
Definition
| queries the DNS to obtain domain name or ip address mapping. |
|
|
Term
| where is the HOSTS file in a windows pc? |
|
Definition
| C:\Windows\System32\Drivers\etc |
|
|
Term
| For making TCP\IP secure, what is the acronym to go by? |
|
Definition
| CIA Confidentiality Integrity Availability |
|
|
Term
| What uses a public and private key? |
|
Definition
|
|
Term
| public keys ____, private keys _____ |
|
Definition
encrypt, decrypt
public key also sends a hash of the Web page |
|
|
Term
| for two people to communicate, they must exchange _____ |
|
Definition
|
|
Term
| What are Hashes used for? |
|
Definition
| to verify data integrity . they are always a fixed value in size. |
|
|
Term
|
Definition
| common hashes. Hashing is the transformation of a string of characters into a usually shorter-fixed length value or key that represents the original string. |
|
|
Term
| Authentication requires sharing of these three things __ |
|
Definition
| something you know, something you have, or something you do |
|
|
Term
| Federated system trust is inherited from a ___ |
|
Definition
|
|
Term
|
Definition
| Mandatory Access Control (not same as mac address) uses labels. |
|
|
Term
|
Definition
| Discretionary Access Control. Gives creators control over permissions |
|
|
Term
|
Definition
| role-based access control. uses groups |
|
|
Term
| What is RADIUS and what ports does it use? |
|
Definition
Remote Authentication Dial-in User Service
UDP ports 1812-1813 and udp ports 1645-1646. |
|
|
Term
| what is TACACS+ and what port does it use. |
|
Definition
Terminal Access Controller Access-Control System Plus TCP
protocol that handles authentication, authorization, and accounting (AAA) services.
port 49 |
|
|
Term
|
Definition
Key Distribution Center
part of a cryptosystem intended to reduce the risks inherent in exchanging keys |
|
|
Term
|
Definition
Protected Extensible Authentication Protocol
Encapsulates the EAP protocol within an encrypted TLS tunnel. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| secure EAP. EAP enables flexible authentication. |
|
|
Term
|
Definition
| handles authentication and authorization for wired networks. Relies heavily on time stamps |
|
|
Term
|
Definition
| Security Assertion Markup Language. Used to manage multiple apps using a single account. |
|
|
Term
| What do you use for single sign-on in a LAN? |
|
Definition
|
|
Term
|
Definition
| Provides a variety of service provider samples. |
|
|
Term
|
Definition
Public Key infrastructure
A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. |
|
|
Term
| Certificates include a ____ and at least one _____ |
|
Definition
| public key and digital signature |
|
|
Term
| What is a 443 error for a certificate? |
|
Definition
| A self-signed certificate can throw this error. it hasn't been issued by a CA (certificate authority) |
|
|
Term
| What is a digital signature? |
|
Definition
| a hash of an encrypted data chunk that sender and receiver both have. |
|
|
Term
|
Definition
| Tunnels can encapsulate unencrypted protocols to create encrypted communication channels. Often used with remote access connections. |
|
|
Term
|
Definition
| Virtual Private Network. provides a secure tunnel connection for remote computers to get to a designated endpoint. |
|
|
Term
| what is a client-to-site VPN? |
|
Definition
| connects remote computer to a local network. |
|
|
Term
| what is a site-to-site VPN? |
|
Definition
| connects distant networks into a single network |
|
|
Term
|
Definition
| Virtual LAN. splits one broadcast domain into two or more broadcast domains. |
|
|
Term
|
Definition
| they move traffic from all VLANs between switches. enables VLANs to be on more than one. |
|
|
Term
| higher-end switches offer _______ |
|
Definition
|
|
Term
|
Definition
| can be used to connect to and manage a switch or router. |
|
|
Term
| Cisco routers and switches use |
|
Definition
|
|
Term
|
Definition
| Bridge Protocol Data Units Guard is a cisco method allowing only non-switch devices to connect to the switch |
|
|
Term
|
Definition
| a layer 2 security tech built into the OS of a switch that drops DHCP traffic determined to be unacceptable. This is used to prevent rogue DHCP servers offering IP addresses. |
|
|
Term
| Switch ports do not use ip addresses or work with layer |
|
Definition
|
|
Term
| Switch interconnections use ___ to detect looping by deactivating the port, if necessary. |
|
Definition
| STP. Spanning Tree Protocol. |
|
|
Term
|
Definition
| protects the STP attack of replacing with a rogue root bridge. |
|
|
Term
|
Definition
| The Root Bridge (Switch) is a special bridge at the top of the STP tree. |
|
|
Term
|
Definition
| Link Aggregation Control Protocol. Cisco protocol to perform port bonding. |
|
|
Term
|
Definition
| links switchports to increase bandwidth |
|
|
Term
|
Definition
| enables traffic flowing through one port to be monitored on another. Enables admins to remotely inspect traffic. |
|
|
Term
|
Definition
| Quality of Service. helps better manage available bandwidth. one type is traffic shaping. |
|
|
Term
|
Definition
| Intrusion Detection System. detects and reports possible attacks to admins. |
|
|
Term
|
Definition
| Intrusion Prevention System. runs in-line with networks and acts to stop detected attacks. |
|
|
Term
| a firewall _____, IDS ____, and IPS _____ |
|
Definition
| filters, notifies, acts to stop. |
|
|
Term
|
Definition
| hides the clients from the server by forwarding messages. Can be reconfigured for caching, content filtering, and firewall capability. |
|
|
Term
|
Definition
| hide the server, and can provide load balancing and caching for high activity pages. |
|
|
Term
|
Definition
can route to the most available server, either configured by a list (round robin) or by least response time.
can be configured as client-side or server side. Server side uses a sophisticated hardware device within the server. |
|
|
Term
|
Definition
| Demilitarized Zones, used to protect public-facing servers by creating an isolated area for those devices. |
|
|
Term
| two ____ are used in a DMZ: one allowing unsolicited traffic to the public service, and the second maintaining isolation of the private network |
|
Definition
|
|
Term
| what would be the best solution to make an encrypted tunnel using SSH? |
|
Definition
| piggyback an existing tunnel program onto SSH |
|
|
Term
|
Definition
Neighbor Discovery Protocol
Multicast based protocol similar to ARP for IPv6
IPv6 Machines talk to each other and auto-configure. |
|
|
Term
|
Definition
|
|
Term
| ipv6 addresses have _ segments seperated by _ colons |
|
Definition
|
|
Term
| ipv6 address have to IPs: a ___ and a ___ |
|
Definition
| link-local address and internet address |
|
|
Term
| the second part of the IPv6 address using EUI-64 is generated from the |
|
Definition
| MAC address. creates a unique 64-bit ID automatically. |
|
|
Term
| IPv6 uses _____ to access internet route information |
|
Definition
| router solicitations/advertisements |
|
|
Term
| If you are on IPv4 you need a tunneling protocol to get to the ____ |
|
Definition
|
|
Term
| What are the Carrier Speeds and Channels? |
|
Definition
|
|
Term
| original telephone systems used _____ multiplexing. today they use _____ |
|
Definition
| frequency division multiplexing, time division multiplexing. |
|
|
Term
| E1 and E3 are _____ carriers |
|
Definition
|
|
Term
| What are is the first SONET Optical level and speed? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Multiprotocol Label Switching
routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses |
|
|
Term
|
Definition
Asynchronous Transfer Mode
Packet switching technology |
|
|
Term
|
Definition
| packet switching protocol that specifies the physical and data link layers of channels. |
|
|
Term
| an ISP will give a username and password dial-up using the ____ protocol |
|
Definition
|
|
Term
|
Definition
| Digital Subscriber Line. Asymettric is common. DSL filtering is used to clear the phone line of noise. |
|
|
Term
|
Definition
| come from the company and use F-type connectors. |
|
|
Term
|
Definition
| cable from dish to modem, 75ohms, suitable for long distance runs. |
|
|
Term
|
Definition
| Integrated Service Digital Network. ran at two speeds: 64kbps and 128kbps. has a telephone number. |
|
|
Term
|
Definition
| Broadband over power lines |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Supervisory Control and Data Acquisition. handle ICS (industrial control systems) over a large area. |
|
|
Term
| What are the key pieces of Advanced Remote Control Systems? |
|
Definition
| programmable logic controller, human machine interface, and a remote terminal unit. |
|
|
Term
| Cable modems use which network standard? |
|
Definition
|
|
Term
|
Definition
| carries a single digitized voice call at 64kbps. 24 DS0 lines can be combined (multiplexed) to create a DS1 line with a 1.544 mbps bandwidth. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Direct-sequence spread-spectrum
significantly improves protection against interfering (or jamming) telecom signals, especially narrowband and makes the signal less noticeable |
|
|
Term
|
Definition
| a Wireless Access Point, is a bridging device that connects into an ethernet network and communicates via radio waves to wireless clients. |
|
|
Term
|
Definition
| Carrier sense multiple access with collision avoidance. is the method used to prevent wireless collisions. |
|
|
Term
| What are all the Wireless Standards, bandwidths, and speeds? |
|
Definition
|
|
Term
| What are all the Antenna Types? |
|
Definition
| Dipole, Patch, Directional/Yagi, Directional/Parabolic, SMA(subminiature version A) |
|
|
Term
| What are the wireless security protocols? |
|
Definition
|
|
Term
| To make your wifi more secure what 3 things would you do? |
|
Definition
| Disable SSID broadcast, use MAC filtering, and limit the number of DHCP-issued addresses. |
|
|
Term
|
Definition
| the act of driving around and mapping the location and state of wireless access points |
|
|
Term
|
Definition
| drawing a symbol on the sidewalk indicating the current state of a present WAP. |
|
|
Term
|
Definition
| Wi-fi protected setup is a one button setup of wireless devices and it can be a security threat. |
|
|
Term
| Enterprise wireless systems have what? |
|
Definition
| multiple WAPs that can all have the same wireless controller for configuration setup. |
|
|
Term
| Wireless controllers can do what? |
|
Definition
| monitor traffic, set up various zones or access areas, and defines services access to specific WAP destinations. |
|
|
Term
| what does ad-hoc mode best describe? |
|
Definition
| A wireless network comprised of only peer computers. |
|
|
Term
| What is the difference between emulation and virtualization? |
|
Definition
| Emulation emulates hardware that isn't on the machine. Virtualization runs off of actual physical hardware to create more environments. Saves power and consolidates hardware. |
|
|
Term
| A private cloud with contracted management is a considered a |
|
Definition
|
|
Term
| What are the four clouds to remember? |
|
Definition
| public, private, community, and hybrid. |
|
|
Term
|
Definition
| Virtual Private Cloud. depends on the services requested. services are very flexible, expandable. |
|
|
Term
| What is IaaS, PaaS, and SaaS? |
|
Definition
| Cloud Models. Infrastructure as a service and Platform as a service. and Software as a service. |
|
|
Term
|
Definition
| the current state of a virtual system. |
|
|
Term
|
Definition
Host bus adapter.
connects a computer, which acts as the host system, to other network and storage devices. The terms are primarily used to refer to devices for connecting SCSI, Fibre Channel and SATA devices. |
|
|
Term
|
Definition
| Network Attached Storage at the file-level. |
|
|
Term
|
Definition
| Storage Area Network at block level. SANS either use Fibre channel or ISCSI. SANS are very expensive but well worth the money for an enterprise environment. it hosts files using shared protocols such as SAMBA or Apple File Share. |
|
|
Term
|
Definition
| High Speed Packet Access. 3G cellular technology |
|
|
Term
|
Definition
|
|
Term
| What are the specs of bluetooth? |
|
Definition
| 2.4GHz, 100 meters, 3 Mbps |
|
|
Term
| What are the specs of NFC |
|
Definition
Near Field Communication (NFC) close-range communication 13.56 MHz 4 cm distance 424 Kbps |
|
|
Term
| What are ANT/ANT+ used for? |
|
Definition
| Health appliances. they run in 2.4 GHz band, range is 20 meters, and speed is 20 Kbps. |
|
|
Term
|
Definition
| infrared technology. uses infrared light, 1+ meter range, transfer speed of 1 Gbps, requires line-of-sight. |
|
|
Term
| What are the mobile deployment options |
|
Definition
COBO: Corporate Owned, Business Only COPE: Corporate Owned, Personally Enabled CYOD: Choose your own Device BYOD: Bring your own device |
|
|
Term
|
Definition
Network Access Control
A NAC system can deny network access to noncompliant devices, place them in a quarantined area, or give them only restricted access to computing resources, thus keeping insecure nodes from infecting the network. |
|
|
Term
| What is mobile on-boarding? |
|
Definition
| the process of making a network available to BYOD mobile devices. I.E portal sign-in page. |
|
|
Term
| Access control on a SOHO router can be decided using what two things? |
|
Definition
| Whitelisted or Blacklisted MAC addresses. |
|
|
Term
| What power management methods are often used for critical systems? |
|
Definition
| Dual Power Supplies with redundant circuitry |
|
|
Term
| What are the pros and cons of offsite recovery options? |
|
Definition
| cold: Takes weeks to bring online, basic office space, no equipment, cheapest. warm: takes days to bring online, some equipment but little or no data hot: takes hours to bring online, real-time synchronization, almost all data ready after an update. most expensive option. |
|
|
Term
| Mission Critical equipment should have a known: |
|
Definition
| Mean Time To Failure (MTTF), Mean Time to Repair (MTTR), and Mean Time Between Failures (MTBF). |
|
|
Term
|
Definition
|
|
Term
| What is the difference between incremental and differential backups? |
|
Definition
Differential: Backup of all the changes since the last full backup
Incremental: Only backs up changes made from last backup |
|
|
Term
|
Definition
| National Institute of Standards and Technology |
|
|
Term
|
Definition
| Memorandum of Understanding. |
|
|
Term
|
Definition
|
|
Term
| What are examples of high availability methods? |
|
Definition
| Raid array, redundant power supply, UPS, clustering, and failover systems. it means that services aren't lost. |
|
|
Term
|
Definition
| Distributed Denial-of-service. an malicious attack on a system using a network of zombies (computers or network devices) sent to overload a system and prevent others from accessing it. |
|
|
Term
| DoS attacks can broadly be broken down into: |
|
Definition
| volumetric, protocol, and application attacks |
|
|
Term
| What is the difference between a virus and malware? |
|
Definition
Viruses do things to files and then propagate
Malware collects keystrokes and information. polymorphic and armored malware are hard to detect and destroy. |
|
|
Term
|
Definition
| A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. |
|
|
Term
|
Definition
| malicious software that escalates privileges to execute other things on a computer. |
|
|
Term
| What is the difference between a stateful and stateless firewall? |
|
Definition
Stateless firewalls use pattern analysis and heuristics to decide which packets should be blocked. and filter based off ports and ip addresses.
Stateful Firewalls examine each packet to decide which packets should be blocked. and track the state of conversations. |
|
|
Term
|
Definition
| Man-in-the-middle. A type of attack where someone "gets in the middle" of communicating devices to steal information. |
|
|
Term
|
Definition
| Unified Threat Management |
|
|
Term
|
Definition
| Filter traffic based on specific criteria, can be network or host based, comes in hardware and software varities. |
|
|
Term
| context-and application-aware firewalls filter based on: |
|
Definition
|
|
Term
|
Definition
| any machine directly exposed to the public internet |
|
|
Term
| What are examples of user account management? |
|
Definition
| Role seperation, Access Control Lists (ACL), and privileged account security. |
|
|
Term
| What are parts of the hardening process? |
|
Definition
| Patching, firmware, and driver updates. |
|
|
Term
| What are the three types of physical controls? |
|
Definition
| Deterrent, preventative, and detective. |
|
|
Term
| _____ are temporarily used if a control is compromised or vulnerable. |
|
Definition
|
|
Term
|
Definition
| a free program that can scan a system and identify any open ports, services, and devices. |
|
|
Term
|
Definition
| Simple Network Management Protocol. uses UDP port 161 or 10161 when using TLS. SNMP managed devices run an agent that talks with a Network Management Station (NMS) |
|
|
Term
| SNMPv1 is _____, SNMPv2 added basic ______, SNMPv3 added ____ |
|
Definition
| unencrypted, encryption, TLS |
|
|
Term
| What are the types of logs in Event Viewer? |
|
Definition
| Application, Security, Setup, System. |
|
|
Term
|
Definition
| Security Information and Event Management. SIEM tools aggregate and correlate data, allowing organization into valuable info. |
|
|
Term
| What is the Network Troubleshooting Theory? |
|
Definition
To find the problem, gather information, identify the symptoms, question users, see if there have been changes.
Establish a theory of probable cause, use the OSI model, consider future prevention methods.
Test the theory, isolate variables, establish plan of action, plan out steps, implement, verify, and test. |
|
|
Term
| What Wireless standards have a 2.4 GHz band? |
|
Definition
802.11
802.11b
802.11.g
802.11n is dual band |
|
|
Term
| What Wireless standards are 54 Mbps? |
|
Definition
|
|
Term
| What is RTP and what port is it on? |
|
Definition
Real-time transport protocol. Used for delivering media-based data.
TCP Ports 5004 & 5005 |
|
|
Term
| What is SIP and what port is it on? |
|
Definition
Session Initiation Protocol. Used to create and end sessions for media connections.
TCP 5061 UDP 5060 |
|
|
Term
| What is H.323 and what port is it on? |
|
Definition
A signaling protocol that provides multimedia comms over a network.
TCP 1720 |
|
|
Term
| What is MGCP and what port is it on? |
|
Definition
Media Gateway Control Protocol. Used as a call control and communication protocol for VoIP networks.
UDP 2427, 2727 |
|
|
Term
| What is DHCP and what port is it on? |
|
Definition
Dynamic Host Configuration Protocol. Dynamically assigns ip information.
UDP 67, 68 |
|
|
Term
| What is LDAP and what port is it on? |
|
Definition
Lightweight Directory Access Protocol. Provides directory services
TCP 389
LDAPS over SSH: TCP 636 |
|
|
Term
| What is the NetBIOS and what ports is it on? |
|
Definition
Network Basic Input/Output System. Provides network communication services for LANs that use NetBIOS.
TCP 139
UDP 137,138 |
|
|
Term
| What is rsh and what port is it on? |
|
Definition
Remote Shell: allows commands to be executed from a remote user.
TCP 514 |
|
|
Term
| What is RTSP and what port is it on? |
|
Definition
Real-time streaming protocol: communicates with a media server and controls playback of files.
TCP/UDP 554 |
|
|
Term
| What is SCP and what port is it on? |
|
Definition
Secure Copy: provides a secure file-transfer service over SSH.
TCP 22 |
|
|
Term
|
Definition
a notification from an snmp agent to a manager. TCP/UDP 162
used to inform an SNMP manager when an important event happens at the Agent leve |
|
|
Term
| What is telnet and what port is it on? |
|
Definition
Used to connect to a remote host via a terminal emulator.
TCP 23 |
|
|
Term
| What is TFTP and what port is it on? |
|
Definition
Trivial File Transfer Protocol: transfer files with a remote host (no user auth)
UDP 69 |
|
|
Term
| What is SMTP and what port is it on? |
|
Definition
Simple Mail Transfer Protocol: Used for sending email
TCP port 25 |
|
|
Term
| What is SMB and what port is it on? |
|
Definition
Server Message Block: used to share files, printers, and other network resources.
TCP 445 |
|
|
Term
| What is DNS and what port is it on? |
|
Definition
Domain Name System
TCP/UDP 53 |
|
|
Term
| What is SNTP and what port is it on? |
|
Definition
Simple Network Time Protocol: Supports time synchronization among network devices. UDP 123
Simplified version of NTP |
|
|
Term
| What is the number of channels on a T1 line and what is the speed? |
|
Definition
| 24 Channels and 1.544 Mbps |
|
|
Term
| What is the number of channels on a T3 line and what is the speed? |
|
Definition
| 672 Channels and 44.736 Mbps |
|
|
Term
| What is the number of channels on a E1 line and what is the speed? |
|
Definition
| 32 channels and 2.048 Mbps |
|
|
Term
| What is the number of channels on a E3 line and what is the speed? |
|
Definition
| 512 Channels and 34.368 Mbps |
|
|
Term
| What is the Class A IP address range and possible number of hosts? |
|
Definition
|
|
Term
| What is the Class B IP address range and possible number of hosts? |
|
Definition
|
|
Term
| What is the Class C IP address range and possible number of hosts? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Fiber Optic, Multimode, 500 meters |
|
|
Term
|
Definition
| Fiber Optic, single-mode or multi-mode, 5km |
|
|
Term
|
Definition
|
|
Term
|
Definition
| SONET, 10 gigabit, Cat 6 (6-55m), Cat6a (100m) |
|
|
Term
|
Definition
| Synchronous Optical Networking |
|
|
Term
|
Definition
| Coaxial, 50 Ohm rating and has a locking BNC connector |
|
|
Term
| What is Circuit Switching? |
|
Definition
| The opposite of packet switching - creates a hard wired circuit between two nodes. |
|
|
Term
| Cost is not included in what request? |
|
Definition
|
|
Term
| 100BaseTX speed and length |
|
Definition
|
|
Term
| Which protocol maps ip addresses to layer 2 addresses? |
|
Definition
|
|
Term
| Which network solution provides at least 50 mbps of bandwidth and supports full duplex communication? |
|
Definition
|
|
Term
| What is a secure email protocol? |
|
Definition
| STLS (start transport layer security) |
|
|
Term
| What are 2 examples of asymmetric encryption? |
|
Definition
| Eliptical Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) |
|
|
Term
| What are 2 examples of symmetric encryption? |
|
Definition
| Blowfish and Data Encryption Standard (DES) |
|
|
Term
| What does the S stand for in fiber optic ratings? |
|
Definition
|
|
Term
| What does the W stand for in fiber optic ratings? |
|
Definition
|
|
Term
| What is Thicknet and THinnet and what impedence do they have? |
|
Definition
|
|
Term
| TCP and UDP work at what layer of the OSI Model? |
|
Definition
|
|
Term
| what layer of the OSI model does the PPP protocol work at? |
|
Definition
|
|
Term
| What protocol is associated with monitoring devices on a network? |
|
Definition
| SNMP (simple network management protocol) |
|
|
Term
| the commands and responses passed between SNMP managers are sent as what? |
|
Definition
| PDUs (Protocol Data Units) |
|
|
Term
|
Definition
| attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. |
|
|
Term
| Which fiber technology is best defined as Fast Ethernet? |
|
Definition
| 100BaseT, any 100Base is Fast Ethernet. Although T would be the main. |
|
|
Term
|
Definition
| Establishes documented performance level for later comparison. |
|
|
Term
| Which device can determine the length of a cable? |
|
Definition
| TDR (Time Domain Refloctometer) |
|
|
Term
|
Definition
Certificate Revocation List
a list of digital certificates that have been revoked by the issuing Certificate Authority |
|
|
Term
| To check the configuration of a port on a switch, what tool would you most likely use? |
|
Definition
|
|
Term
| what is an initialization vector attack? |
|
Definition
| Wireless network attack that modifies the IV of an encrypted wireless packet during transmission. Common. |
|
|
Term
| What is a long run fiber optic cable that supports gigabit speeds? |
|
Definition
|
|
Term
| What is the max distance of 1000Base-LX multi-mode fiber optic cable? |
|
Definition
|
|
Term
| what tool is best used to determine what workstations are affected in an attack? |
|
Definition
|
|
Term
| Redundand Systems, Raid Arrays, and _____ achieve High Availability |
|
Definition
|
|
Term
| What does L stand for in fiber optic cable names? |
|
Definition
| Long Distance, usually a few thousand meters |
|
|
Term
| What does E stand for in fiber optic cable names? |
|
Definition
| Extra long distance, tens of thousands of meters |
|
|
Term
|
Definition
Link Local Multicast Name Resolution
protocol based on the DNS packet format that allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link. |
|
|
Term
| What 6 things should you consider when setting up a wireless network? |
|
Definition
| Interference, Reflection, Refraction (Bend), Absorption, and Attenuation (distance), and Antenna placement |
|
|
Term
| What tool would you use to check different bands to asses a wireless network? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What are the ports for the Session Initiation Protocol? |
|
Definition
|
|
Term
| What port is the signaling protocol H.323? |
|
Definition
|
|
Term
| What is the port for the Media Gateway Control Protocol? |
|
Definition
|
|
Term
| What ports is the Lightweight Directory Access Protocol? |
|
Definition
|
|
Term
| What port is LDAPS over SSH? |
|
Definition
|
|
Term
| What are the port numbers for NetBios? |
|
Definition
|
|
Term
| What port is the Network News Transport Protocol on? |
|
Definition
|
|
Term
| What is the port number for remote shell? |
|
Definition
|
|
Term
| What is the port number for the Dynamic Host Configuration Protocol? |
|
Definition
|
|
Term
| what are the port numbers for the Real Time Transport Protocol? |
|
Definition
|
|
Term
| What are the port numbers for the Real Time Streaming Protocol? |
|
Definition
|
|
Term
| What are the port numbers for Secure Copy? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| What port is the Trivial File Transfer Protocol on? |
|
Definition
|
|
Term
| What port is the Simple Mail Transfer Protocol on? |
|
Definition
|
|
Term
| What is the port number for the Server Message Block? |
|
Definition
|
|
Term
| If you have a connection to your wifi but aren't getting to your internet what is most likely the problem? |
|
Definition
| Wrong password, check for an APIPA address. |
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11? |
|
Definition
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11a? |
|
Definition
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11b? |
|
Definition
| 2.4 GHz, 11 Mbps, 115 feet |
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11g? |
|
Definition
| 2.4 GHz, 54 Mbps, 125 feet |
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11n? |
|
Definition
| 2.4 GHz or 5 GHz, 150 Mbps, 230 feet |
|
|
Term
| Whats the GHz, max indoor range and speed of 802.11ac? |
|
Definition
| 5 GHz, 866 Mbps, 115 feet |
|
|
Term
|
Definition
Internet Group Management Protocol
operates between a host and a router on the Network layer of the OSI model (3)
A network designed to deliver a multicast service uses IGMP |
|
|
Term
| What colors are multimode and single mode fiber cables? |
|
Definition
| Multimode are orange and single mode are yellow. |
|
|
Term
|
Definition
|
|
Term
| What port is secure SNMP on? |
|
Definition
|
|
Term
| What is the port for SNMP? SecureSNMP? |
|
Definition
|
|
Term
| What does auto-sensing on a NIC do? |
|
Definition
| determines link duplex, speed, and bandwidth |
|
|
Term
| What's the connection for 10Base5? |
|
Definition
| 10Base5 is connected by dropping a cable from a tranceiver directly to the NIC |
|
|
Term
| A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following? |
|
Definition
|
|
Term
| Enterprise WAPS with a common __ work cooperatively |
|
Definition
|
|
Term
| Broadcast storms can be an indication of what? |
|
Definition
| Someone plugged in a switch without implementing STP |
|
|
Term
|
Definition
|
|
Term
| Whats the best way to discover why a user is getting a slow internet connection? |
|
Definition
|
|
Term
| What would be parts of Contingency planning? |
|
Definition
| Backup Site, Restoration of order of operations, business continuity, and disaster recovery. |
|
|
Term
| what are 2 advantages Switches have over hubs? |
|
Definition
| Switches have smaller collision domains and hubs require crossover cables. |
|
|
Term
| What part of a mobile NAC is not exclusive to it? |
|
Definition
| Two-factor authentication |
|
|
Term
| A honeynet is a network of ____ |
|
Definition
| honeypots - devices on a network that create vulnerabilities to lure in attacks. |
|
|
Term
|
Definition
| Network Intrusion Detection System |
|
|
Term
| Character encoding, Data compression, and encryption/decryption take place at what layer of the OSI model? |
|
Definition
| The Presentation layer (6) |
|
|
Term
| What layer of the OSI model does the protocol FTP reside at? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| An Ethernet switch forwards LAN traffic from connected devices based on the information stored in |
|
Definition
|
|
Term
| an IPv4 address is __ bits |
|
Definition
|
|
Term
| an ipv6 link-local address is equivalent to an IPv4s ____ |
|
Definition
|
|
Term
| An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called: |
|
Definition
| NCP - Network Control Protocol |
|
|
Term
| What typically applies to a request that doesn't match the criteria defined in an ACL? |
|
Definition
|
|
Term
| a _____ switch enables configuration for an entire network using a single interface |
|
Definition
|
|
Term
| .224-339 is is a class ____ address |
|
Definition
|
|
Term
| .240-254 is a class _ address |
|
Definition
| E, reserved for future use |
|
|
Term
| ___ is a technology is an approach to cloud computing that facilitates network management and enables programmatically efficient network configuration in order to improve network performance and monitoring |
|
Definition
| SDN - Software Defined networking |
|
|
Term
| Whats the formula for calculating the number of connections in a fully meshed topology? |
|
Definition
n=number of devices/nodes
n-1
n(n-1)/2 |
|
|
Term
|
Definition
Variable Length Subnet Mask
Subnetting subnets into more specific ranges as to not have extra hosts |
|
|
Term
|
Definition
Class of Service
a way of managing traffic in a network by grouping similar types of traffic together with its own set priorities. |
|
|
Term
|
Definition
| networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS. |
|
|
Term
|
Definition
| Enhanced Interior Gateway Protocol is an advanced distance-vector routing protocol that is used for automating routing decisions and configuration. |
|
|
Term
|
Definition
| Global System for Mobile Communication |
|
|
Term
|
Definition
Time Division Multiple Access
Divides each cell channel into three time slots in order to increase the amount of data that can be carried. |
|
|
Term
|
Definition
| nameserver records. used if you want to break your domain into subdomains. |
|
|
Term
|
Definition
| Voip private box exchange is a business system that goes over a LAN or WAN instead of circuit switched networks |
|
|
Term
| What does a UTM appliance entail? |
|
Definition
| Every appliance has a firewall, VPN, and Intrusion Prevention System. |
|
|
Term
|
Definition
a VMM (virtual machine monitor) that manages and runs the VMs. (HyperV, etc).
Type 2 hypervisor runs on top of OS
Type 1 hypervisor runs directly on top of hardwarer. |
|
|
Term
|
Definition
| Infiniband, networking standard used in high-performance computing that features very high throughput and very low latency. |
|
|
Term
|
Definition
Internet Small Computer System Interface.
Creates harddrives for a virtualized environment. |
|
|
Term
|
Definition
| Fiber Channel Over Ethernet |
|
|
Term
|
Definition
Point-To-Point Protocol over Ethernet.
Encapsulates ppp frames inside ethernet frames. Was used for tunneling packets over a DSL connection |
|
|
Term
|
Definition
Dynamic Multipoint VPN.
DMVPN provides the capability for creating a dynamic-mesh VPN network without having to pre-configure (static) all possible tunnel end-point peers, including IPsec |
|
|
Term
|
Definition
| enables the end point’s PBX to send and receive calls via Internet |
|
|
Term
|
Definition
Channel Service Unit / Data Service Unit.
digital-interface device used to connect data terminal equipment (DTE), such as a router, to a digital circuit, such as a Digital Signal 1 (DS1) T1 line |
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Security Protocol.
Secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network. used in VPNs |
|
|
Term
|
Definition
| Software-Defined Networking. like SNMP but for cloud computing. |
|
|
Term
|
Definition
Virtual Private Address.
For one-to-many NAT, a VIP address is advertised from the NAT device (often a router), and incoming data packets destined to that VIP address are routed to different actual IP addresses (with address translation) |
|
|
Term
|
Definition
Rapid Spanning Tree Protocol
Faster convergence with topology changes than STP. backwards-compat. |
|
|
Term
| What layer of the OSI model is PPP, ATM, and Frame Relay located? |
|
Definition
|
|
Term
What layer of the OSI model is ICMP and IGMP?
Also ipv4, ipv6 and IPsec |
|
Definition
|
|
Term
| What layer of the OSI Model is TCP and UDP? |
|
Definition
|
|
Term
| What layer of the OSI Model is NetBIOS and RTP? |
|
Definition
|
|
Term
| What layer of the OSI Model is SIP, DNS, FTP, HTTP, NFS, NTP, SMTP, SNMP, Telnet, DHCP, TLS, and RADIUS at? |
|
Definition
| the Application layer (7) |
|
|
Term
| What is the channel bandwidth for 802.11a, b, and g? |
|
Definition
|
|
Term
| Which wireless standard introduced Channel Bonding? |
|
Definition
|
|
Term
|
Definition
| Cloud Access Security Broker. sits between an organizations infrastructure and a clouds and acts as a security gatekeeper. |
|
|
Term
| What DNS record maps a domain name to a list of mail servers? |
|
Definition
|
|
Term
| What DNS record specifies a host port and information to find specific services on the network? |
|
Definition
|
|
Term
| The IEEE 802.11n standard specifies available channel bandwidth options of: |
|
Definition
|
|
Term
| The IEEE 802.11ac standard specifies a maximum channel bandwidth of: |
|
Definition
|
|
Term
|
Definition
| Time to Live - Hop limit mechanism |
|
|
Term
| A Reverse lookup zone returns a: |
|
Definition
| Domain name for a given IP address |
|
|
Term
| A Forward lookup zone returns a: |
|
Definition
| IP address for a given Domain name |
|
|
Term
| a modular network device designed to provide a seamless link between different types of network interfaces |
|
Definition
|
|
Term
|
Definition
| Optical signals to electrical signals |
|
|
Term
| an SFP can convert signals back and forth from |
|
Definition
|
|
Term
| SFP+ has a data transfer rate of |
|
Definition
|
|
Term
| QSFP offers data transfer rates of up to: |
|
Definition
|
|
Term
| A type of Ethernet interface that automatically detects the required cable connection type |
|
Definition
|
|
Term
| A device designed to filter and transfer data packets between dissimilar types of computer networks is called: |
|
Definition
|
|
Term
| a network bridge forwards decisions in: |
|
Definition
|
|
Term
| a network switch forwards decisions in: |
|
Definition
|
|
Term
| A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: |
|
Definition
|
|
Term
|
Definition
| Next-generation firewall. application specific layer 7 |
|
|
Term
| VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: |
|
Definition
| PSTN (public switched telephone network) and a POTS |
|
|
Term
| An application software used to selectively block access to certain websites is an example of: |
|
Definition
|
|
Term
| technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links? |
|
Definition
|
|
Term
| lower-cost alternative to Fibre Channel technology? |
|
Definition
|
|
Term
| high-speed alternative to Fibre Channel technology? |
|
Definition
|
|
Term
| Packet switching technologies such as MPLS, ATM and Frame Relay are used for connecting devices on a : |
|
Definition
|
|
Term
| VPN type enables direct communication links between remote hosts on a WAN? |
|
Definition
|
|
Term
| A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: |
|
Definition
|
|
Term
What is this a Cisco symbol for?
[image] |
|
Definition
|
|
Term
What is this a Cisco symbol for?
[image] |
|
Definition
|
|