ALL THINGS IP Flashcards

1
Q

SLAAC

A

STATELESS ADDRESS AUTO CONFIGURATION

IPV6 …device uses the prefix and its own MAC address to create an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ccmp

A

Counter Mode Cipher Block Chaining Message Authentication Code Protocol or CCM mode Protocol is an encryption protocol designed for Wireless LAN products that implements the standards of the IEEE 802.11i amendment to the original IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCPv6

A

Dynamic Host Configuration Protocol version 6 is a network protocol for configuring Internet Protocol version 6 hosts with IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Link-Local

A

ipv6 fe80:: (like ipv4 apipa)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

class a

A

privet 10.0.0.1 255.0.0.0

public 1 to 126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

csu/dsu

A

csu network provider

dsu is ethernet side connects to (DTE) “router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPA

A

RC4 and TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vlsm

A

variable length subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

class e

A

240 to 255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

smart jack

A

NIU network interface unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

APIPA

A

169.254.0.0 to 169.254.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ipv6 loop back

A

loopback address is 0:0:0:0:0:0:0:1 or ::1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIDR

A

classless interdomain routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

class d

A

224 to 239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EUI-64

A

(Extended Unique Identifier) is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID. However, a MAC address is 48 bit and the interface ID is 64 bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ipv6 multicast

A

ff00::/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

class c

A

public 192 to 223

privet 192.168.0.0 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

virtual ip

A

does not correspond to actual physical device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

WPA2

A

AES and CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

loop back ipv4

A

127.0.0.1 to 127.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AES

A

advanced encryption standard, replaced RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

class b

A

public 128 to 191

privet 172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RC4

A

RC4 is a stream cipher and variable-length key algorithm. This algorithm encrypts one byte at a time (or larger units at a time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many Bytes in a frame

A

1500 and a minimal 46 bytes of data, even if this means the host has to pad the frame before transmitting it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CARP

A

Common Address Redundancy Protocol (CARP) is an open standard that creates a redundancy group to share an IP address.

Router protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

HSRP

A

Hot Standby Router Protocol (HSRP) is a Cisco standard similar to CARP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

MPLS VPN

A

Multiprotocol Label Switching Layer 3 (MPLS L3) virtual private network (VPN). This will allow all offices to connect to the same single-routed network and connect directly to the cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

LACP

A

Link Aggregation Control Protocol (LACP) is a standard that assigns multiple physical links to a logical interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Identify the problem.

A
Gather information.
Duplicate the problem, if possible.
Question users.
Identify symptoms.
Determine if anything has changed.
Approach multiple problems individually.
30
Q

Establish a theory of probable cause.

A

Question the obvious.
Consider multiple approaches.
Top-to-bottom/bottom-to-top OSI model
Divide and conquer

31
Q

Test the theory to determine cause.

A

Once theory is confirmed, determine next steps to resolve problem.
If theory is not confirmed, re-establish new theory or escalate.
Establish a plan of action to resolve the problem and identify potential effects,
Implement the solution or escalate as necessary,
Verify full system functionality and if applicable implement preventive measures.
Document findings, actions, and outcomes.

32
Q

Wavelength mismatch

A

Multi-mode fiber is designed to operate at 850 and 1300 nanometers (nm), while single-mode fiber is optimized for 1310 and 1550 nm. If the wrong wavelength is implemented or a device is added to the network that operates at the wrong wavelength, signal loss will occur.

33
Q

1000BaseLX range

A

1000BASE-LX can run over both single mode fiber and multimode fiber with a distance of up to 5 km and 550 m, respectively.

34
Q

1000base sx range

A

between 220 meters and 550 meters

35
Q

DHCP snooping

A

a security feature configured on switches that acts like a firewall between untrusted hosts and trusted DHCP servers

36
Q

ARP inspection

A

a security feature on switches that validates ARP packets in a network. It determines the packet validity by performing an IP-to-MAC address binding inspection stored in a trusted database before forwarding the packet to the appropriate destination. All ARP packets with invalid IP-to-MAC address bindings that fail the inspection will be dropped.

37
Q

pptp

A

(VPN) Point-to-point tunneling protocol, old and out of date, basic encryption not secure,

38
Q

l2tp

A

(VPN) IPsec encryption, Layer Two Tunneling Protocol.

39
Q

MAC address filtering

A

a security feature configured on switches that will allow or deny traffic based on the MAC address from which the communication comes.

40
Q

stateful firewall

A

Dynamic, aware of the state of a connection, do not have to open up a large range of ports to allow communication, no probles with protocols that use multi ports.

41
Q

VLAN assignments

A

Virtual LANs (VLANs) are assigned to individual switch ports. Devices on the same switch can then be assigned to separate VLANs so that their traffic is isolated.

42
Q

stateless firewall

A

ACL’s, works fast, Stateless firewalls, however, only focus on individual packets, using preset rules to filter traffic, allow or deny.

43
Q

SSTP

A

Secure Socket Tunneling Protocol, SSTP is a mechanism to encapsulate Point-to-Point Protocol (PPP) traffic over an HTTPS protocol, great for client to worksite.

44
Q

T1

A

T1 - 1.544 Mbps, 650 feet maximum cable length, UTP/STP/coaxial cable T1 line is a communications transmission service that uses 2 twisted pair copper wires to transmit and receive data or voice traffic

45
Q

T3

A

T3 - 44.736 Mbps, 450 feet maximum cable length, coaxial cable

46
Q

E1

A

E1 - 2.048 Mbps, 650 feet maximum cable length, UTP/STP/coaxial cable

47
Q

E3

A

E3 - 34.368 Mbps, 450 feet maximum cable length, coaxial cable

48
Q

signature-based IDS

A

relies upon a database that contains the identities of possible attacks.

49
Q

network-based IDS

A

is attached to the network in a place where it can monitor all network traffic

50
Q

anomaly-based IDS

A

detects activities that are unusual

there is an initial learning period before anomalies can be detected. Once the baselines are established,

51
Q

behavior-based IDS

A

looks for behavior that is not allowed and acts accordingly.

52
Q

IPSEC what is AH

A

AH does not perform encryption, it is a quicker standard than ESP
AH uses a hash algorithm to compute a hash value on both the payload and header of a packet, ensuring integrity of the packet.
AH provides data integrity, data origin authentication, and an optional replay protection service

53
Q

IPSEC what is ESP

A

ESP can be used with confidentiality only, authentication only, or both confidentiality and authentication. When ESP provides authentication functions, it uses the same algorithms as AH, but the coverage is different.
ESP is not used to digitally sign packet headers.

54
Q

AH and ESP may be used separately or in combination

A

An IPsec Security Association (SA) is a simplex (one-way) connection that may be used to negotiate ESP or AH parameters. If two systems communicate via ESP, they use two SAs, one for each direction.

55
Q

IPSEC

A

IPSec uses encapsulation security payload (ESP) and Authentication header (AH) as security protocols for encapsulation.

56
Q

quarantine network

A

would be set up in an office for computer and mobile devices that do NOT comply with the network access control (NAC) policies. A NAC server would hold the policies that would control access to the network. If computers or mobile devices did not have the appropriate security controls configured, they would be placed on the quarantine network to isolate them

57
Q

What is another term for a demilitarized zone (DMZ)?

A

screened subnet

58
Q

Error rate

A

metric that can be used to tool to indicate the reliability of the network. A segment with a high error rate would be less reliable than a segment with a low error rate. The error rate is usually expressed as a percentage.

59
Q

Utilization

A

is a measurement of how much of the capacity of the network is being used. For example, a utilization of 40% would mean that 40% of the total capacity of the network is being used.

60
Q

Packet drops

A

occur when a data package transmitted from one device fails to reach another device, measured as packet loss. Packet loss can be measured with the ping utility. If you add “-n 100” at the end of a ping command, as in ping www.somesite.com –n 100, you will end up with a report that tells you the percentage of packet loss.

61
Q

VNC

A

Virtual Network Computing, VNC products are widely and freely available for Windows, OS X (MacOS), Linux, Android, iOS, and Chrome. Second, many VNC products are easy to set up and use, interoperate among multiple versions, and work well through corporate and personal firewalls. Of the items listed it is the best no-cost option.

62
Q

MAC filtering

A

Media Access Control (MAC) filtering allows the administrator to restrict device access to the network based on the MAC address associated with the Network Interface Card (NIC) on that device. The administrator can set up a permission list (filter) on the router where only devices with specific MAC addresses are allowed on the network. A MAC address is uniquely associated with a NIC, and is analogous to a Vehicle Identification Number (VIN) on an automobile. In essence, the MAC address is the serial number of the NIC.

63
Q

802.1X

A

IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC)

64
Q

EAP

A

Extensible Authentication Protocol (EAP) is an authentication framework that is used in local area networks (LANs) and dial-up connections. EAP is used primarily in wireless communication for authentication among clients and a wireless LAN.

65
Q

EAP-TLS

A

(Transport Layer Security) provides for certificate-based and mutual authentication of the client and the network.

66
Q

PEAP

A

PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. PEAP is designed to provide more secure authentication for 802.11 WLANs (wireless local area networks) that support 802.1X port access control.

67
Q

Rack diagrams

A

Rack diagrams depict the placement of network equipment, such as routers, switches, hubs, patch panels, servers, and more, in a standard 19”-wide cabinet called a rack. Rack diagrams are particularly useful when planning server rooms and networking closets, as the diagrams allow the engineer to determine the proper placement of equipment prior to the physical buildout. They also serve as a tool to help locate equipment for maintenance or repair.

68
Q

SLIP

A

Is an older point-to-point protocol that enables the transmission of TCP/IP communications over a serial connection. SLIP only supports TCP/IP, and SLIP does not support error checking or automatic configuration of network protocol parameters. You cannot use SLIP to establish a VPN connection

69
Q

PPP

A

PPP supports error checking and automatic configuration of network protocol parameters. Multilink PPP is a communications protocol that enables a computer to use two PPP ports to provide greater bandwidth.

70
Q

diversity antenna system

A

technique that can be used to improve radio communication and maximize the chance of a packet getting through at a given time and in a given position between a receiver and transmitter in a non-static environment.
A diversity antenna system avoids multipath distortion.