AR's Notes Flashcards

1
Q

peer-to-peer network

A

decentralized network architecture where each device in the network can act as both client and server, allowing direct sharing of resources, data, and services among all connected devices without need for a central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

client-server network

A

multiple client devices connect to central server to access shared resources, services, and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network backbone

A

main infrastructure that interconnects various segments of a computer network, providing central pathway for data exchange
- composed of high-speed, high-capacity links and core routers or switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

mesh topology

A

each host connected to every other host, creating network with no central connecting point
- high availability and redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

core layer

A

backbone of network, handling high-speed packet switching
- responsible for fast and reliable routing of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

distribution layer

A
  • acts as intermediary between core and access layers, managing routing, filtering, and WAN access
  • aggregates data received from access layer switches before transmitted to core layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

access layer

A

network’s point of entry for devices and end users, connecting them to network
- includes switches and APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

spine and leaf architecture

A

two layer network topology that is highly scalable and minimizes latency by ensuring every leaf switch is separated by no more than 2 switches from any other leaf switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

collapsed core architecture

A

merges core and distribution layers into single layer
- ideal for small to medium networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

north-south traffic

A

flow of network traffic between data center and outside world, involving client-to-server communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

east-west traffic

A

traffic flow within the data center, including server-to-server, and server-to-storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

multicast

A
  • data sent from one or more sources to multiple destination simultaneously
  • efficient for apps where same data needs to be delivered to multiple recipients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

anycast

A

data sent to nearest or best destination as determined by routing protocols
- commonly used in DNS and CDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

broadcast

A

message sent from one sender to all potential receivers within network segment
- not supported in IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OSI Layer 1

A
  • physical
  • converts bits into electrical signal over copper cables or pulses of light for fiber optics
  • hubs, cables, connectors, modems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OSI layer 2

A
  • data link
  • provides communication within same network via MAC addresses
  • transmits frames, converts info into bits
  • switches and bridges, APs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OSI layer 3

A
  • Network
  • provides communication between different networks via IP addresses
  • routers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OSI Layer 4

A
  • transport
  • handles end-to-end communication either via TCP or UDP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

OSI layer 5

A
  • session
  • provides dialog control by allowing multiple persistent connections
  • duplexes
  • NFS (network file system), SQL, NetBIOS, RPC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OSI layer 6

A
  • Presentation
  • gets data ready for application layer by converting, encoding, translating. encrypting, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

OSI layer 7

A
  • application
  • generates data to be transmitted, processes data that is received
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SMTP

A
  • simple mail transfer protocol
  • port 25
  • application layer
  • sending messages from email client to email server/ between servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SNMP

A
  • simple network management protocol
  • port 161
  • application layer
  • managing devices on IP networks, V3 is best
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

HTTP

A
  • port 80
  • application layer
  • stateless protocol, each command executed independently
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

FTP

A
  • file transfer protocol
  • port 20/21
  • application layer
  • transfer of computer files between client and server
  • does not encrypt traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Telnet

A
  • port 23
  • application layer
  • virtual terminal connections, insecure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TFTP

A
  • trivial file transfer protocol
  • port 69
  • application layer
  • no authentication file transfer, used in controlled environments because simple and lacks security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

POP3

A
  • port 110
  • application layer
  • retrieves emails from remote server
  • used for infrequent access or offline operation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IMAP

A
  • port 143
  • application layer
  • email retrieval and storage
  • messages can be kept on server and synced across multiple devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What layer does SSL/TLS operate on?

A

Transport layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Network layer protocols

A

IP, ICMP, RIP, OSPF, BGP, IGMP, IPX, IPSec, NAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

MAC layer

A

sublayer of datalink that manages protocol access
- responsible for addressing and channel access control mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

logical link control layer

A

upper sublayer of data link layer that provides flow control and error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Data link layer protocols

A

ARP, PPP, L2TP, ethernet, FDDI, asynchronous transfer mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Layer 1 protocols

A

EIA/TIA-232, HSSI, ISDN, DSL, 10BASE….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

router

A
  • network layer
  • directs data packets between different networks based on IP addresses
  • uses routing tables, provides network security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

switch

A
  • data link layer (2)
  • forwards data based on MAC address
  • creates separate collision domains for each port
  • used to connect devices within same network or VLAN
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

load balancer

A

distributes incoming network traffic across multiple servers
- operates at various layers of OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

CDN
(content delivery network)

A

globally distributed network of proxy servers
- cache content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Class A IP

A

1.0.0.0 = 126.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Class B IP

A

128.0.0.0 - 191.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Class C IP

A

192.0.0.0 - 223.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

APIPA

A

169.254.0.0 - 169.254.255.255
- self assigned by host when DHCP request fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

loopback address

A

127.0.0.0 - 127.255.255.255
- used for testing network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

subnetting

A

allows for more efficient use of organization’s allocated IP address space by enabling creation of logically segmented networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SFTP

A
  • port 22
  • extension of SSH to provide secure method for file transfer
  • application layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

SSH

A
  • port 22
  • cryptographic, provides secure channel over unsecured network
  • encrypts all traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

DNS

A
  • port 53
  • naming system, translates domain names to IP addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

DHCP

A
  • port 67/68
  • 67 for server and 68 for client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

HTTPS/TLS

A
  • port 443
  • provides secure web browsing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SMTP TLS

A
  • port 587
  • secure email transmission with encrypted data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

POP3 over SSL

A
  • port 995
  • secure retrieval of email from remote server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

IMAP over SSL

A
  • port 993
  • secure IMAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

NTP

A
  • network time protocol
  • port 123
  • synchronizes clocks of computers over network
  • high precision time correction
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

LDAP

A
  • port 389
  • accessing and maintaining distributed directory information services over IP network
  • storing user credentials and groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

LDAP over SSL (LDAPS)

A
  • port 636
  • secured LDAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

SMB

A
  • server message block
  • port 445
  • used for network file sharing, for windows and IP-based comm.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Syslog

A
  • port 514
  • message logging to track and record system messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

SQL server

A
  • port 1433
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

RDP

A
  • port 3389
  • microsoft protocol that enables remote connections to other computers
  • graphical interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

SIP

A
  • session initiation protocol
    -port 5060
  • signaling protocol for sessions
  • fundamental to VoIP, enabling establishment of call sessions and multimedia distribution
  • app layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

ICMP

A
  • internet control message protocol
  • manage and troubleshoot network issues, error reporting, providing feedback
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

GRE

A
  • generic routing encapsulation
  • tunneling protocol by Cisco that creates virtual point-to-point link
  • commonly used for VPNs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

IPSec

A
  • transport mode and tunnel mode
  • securing internet communications and establishing VPNs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

802.3 standards

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

copper cable speeds

A

up to 40 Gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

fiber cable speeds

A

above 100 Gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

copper cable distances

A

up to 1100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

fiber cable distance

A

up to 40 km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

coaxial cables

A

used for broadband internet, supporting high speed data transmission
- television and satellite
- RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

BNC connector

A
  • secure locking connector
  • used in old bus and ring networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

F connector

A

twisting hand screw commonly found on cable modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

single mode fiber

A
  • long distance communication
  • minimizes attenuation and dispersion over distances
  • used in telecomm. and cable TV networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

MMF

A
  • larger diameter fibers that allow multiple modes of light to propagate simultaneously
  • within building or campus networks
  • popular for LANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

ST connector

A
  • fiber optic
  • used in SMF installations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

SC connector

A
  • fiber optic
  • square
  • snaps-in
  • used in SMF and MMF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

LC connector

A
  • fiber optic
  • little
  • snaps in
  • small form factor
  • SMF and MMF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Twinaxial

A

used for high-speed, short-distance coper 10 Gb or 40 Gb ethernet
- shielded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Twisted pair cable

A
  • 8 wires, 4 pairs
  • most used in homes and offices
  • least expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

RJ11 connector

A
  • twisted pair
  • 4 pin
  • dial-up modems and analog phones
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

RJ45 connector

A
  • twisted pair
  • 8 pin
  • desktops, laptops, servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Twisted pair categories

A

cat standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Cat 5

A
  • 100 Mbps
  • 100 meters
  • older networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Cat 5e

A
  • 1000 Mbps/1Gbps
  • 100 m distance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Cat 6

A
  • 10Gbps/55 meters
  • 1 Gbps/100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Cat 6a

A
  • 10Gbps
  • 100 m
  • thicker wires
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Cat 7

A

10 Gbps, 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Cat 8

A
  • 25 - 40 Gbps
  • 30 m
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

crossover cables

A

used to connect like devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

straight-through cables

A

used to connect unlike devices
ex: router to switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

SFP (small form-factor pluggable)

A

optical module transceiver used for data and telecomm.
- up to 4.25 Gbps
- + is up to 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

QSFP - quad

A

connector used for fiber optic or electrical copper connections
- speeds up to 28 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

VXLAN

A
  • network virtualization tech
  • extends Layer 2 segments, enabling creation of large number of virtualized LANs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

SASE (security access service edge)

A

emerging frameworks combining network security functions with WAN capabilities
- integrates services and functions directly into network fabric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

SSE (security service edge)

A

centralized various security services provided in cloud

96
Q

IPv6 addressing

A
  • 128 bit addresses
  • improves routing efficiency, enhances security
97
Q

tunneling

A
  • IPv6 method used to transmit packets over existing IPv4 infrastructure
  • allows coexistence of both protocols
  • encapsulates IPv6 packets within IPv4 packets
98
Q

dual stack

A

network where devices run both IPv4 and IPv6 simultaneously

99
Q

NAT64

A

network address translation that facilitates communication between IPv4 and IPv6 devices

100
Q

routing

A

process of selecting paths in a network along which to send network traffic

101
Q

interior gateway protocols

A

route LAN in one location to LAN in another

102
Q

exterior gateway protocols

A

route one customer’s WAN link to another customer’s WAN link

103
Q

distance-vector

A

hops-based routing protocol that forwards packets using path with fewest number of hops

104
Q

link-state

A

bandwidth-based routing protocol that forwards packet using path with highest bandwidth

105
Q

RIP (routing information protocol)

A

uses hop count as metric, with max of 15 hops
- v1 is classful, v2 is classless
- good for small to medium networks
- older

106
Q

OSPF

A
  • link state routing protocol
  • fast convergence and supports large networks
  • suitable for large, complex networks
  • load balancing and fault tolerance
107
Q

EIGRP

A
  • distance vector and link state combined
  • supports VLSM and CIDR, provides loop-free paths and load balancing
  • suitable for medium to large networks with Cisco
108
Q

BGP

A
  • essential for inter-domain routing on the internet
  • crucial for ISPs and large enterprises
109
Q

prefix length

A

number of contiguous bits of network mask set to 1

110
Q

port tagging/802.1Q

A

inserting VLAN identifier into ethernet frames to distinguish between different VLANs on a trunk link
- multiple VLANS can share a single physical connection

111
Q

native VLAN

A

default VLAN on trunk port that carries untagged traffic

112
Q

spanning tree protocol

A

helps prevent network loops in ethernet topology by creating spanning tree that logically blocks redundant paths
- routes effectively

113
Q

port aggregation

A

combines multiple network ports into single group, increasing bandwidth and providing redundancy for higher data throughput and reliability
- consolidates multiple links between switches or switches/servers

114
Q

port mirroring/spanning

A

allows redistribution of traffic from one port to another

115
Q

jumbo frames

A
  • larger than 1500 bytes and up to 9000 bytes
  • can reduce overhead and improve performance in high-throughput networks
116
Q

2.4GHz

A
  • long range because better wall penetration
  • slower data rates
  • higher rate of interference
117
Q

5 GHz

A

provides faster data rates at short distances
- less interference

118
Q

802.11h

A

enhances 802.11 by adding support for dynamic frequency selection and transmit power control

119
Q

802.11a

A
  • 5GHz
  • 54 Mbps
  • wifi 1
120
Q

802.11b

A
  • 2.4 GHz
  • 11 Mbps
  • wifi 2
121
Q

802.11g

A
  • 2.4 GHz
  • 54 Mbps
  • wifi 3
122
Q

802.11n

A
  • 2.4, 5 GHz
  • 600 Mbps
  • wifi 4
123
Q

802.11ac

A

2.4, 5 GHz
- 3.5 Gbps
- wifi 5

124
Q

802.11ax

A

2.4, 5 GHz
- 9.6 Gbps
- wifi 6

125
Q

BSS (basic service set)

A

group of wireless devices operating with same AP

126
Q

BSSID

A

serves as MAC address for a wireless AP
- essential when multiple APs deployed

127
Q

omni-directional antennas

A
  • transmits signal in all directions
  • most common
  • shorter range
128
Q

yagi antenna

A
  • directional
  • focus wireless signal up to a mile
129
Q

parabolic antenna

A
  • directional
  • focus wireless signal up to 8 miles
130
Q

Ad hoc network

A

decentralized and do not rely on pre-existing infrastructure

131
Q

infrastructure networks

A

rely on fixed routers, most common network type

132
Q

WPA2

A
  • PSK via CCMP
  • encrypts with AES
133
Q

WPA3

A
  • SAE via GCMP
  • encrypts with AES
134
Q

enterprise authentication

A

uses more secure approach by employing RADIUS server to manage user’s authentication individually
- stronger security

135
Q

MDF

A

primary hub of network’s cabling system
- centrally located

136
Q

IDF

A

serves as secondary hub, positioned to reduce distance data must travel between MDF and end users
- located on each floor or section

137
Q

PDU

A

designed to distribute electric power to various components within network or data center

138
Q

NFV

A
  • network functions virtualization
  • decoupling network functions from hardware devices
  • flexible deployment and management
139
Q

NAT gateway

A

allows instances in private subnet to connect to internet

140
Q

SLAAC

A
  • stateless address auto-configuration
  • IPv6 feature that allows device to automatically configure own IP address without DHCP
141
Q

recursive DNS

A

DNS server takes on responsibility of retrieving data from other DNS servers on behalf of client

142
Q

forward zone

A

resolve domain name to IP address
- records like A, AAAA, MX

143
Q

reverse zone

A

handles mapping of IP addresses back to domain names
- used in reverse DNS lookups

144
Q

DNSSEC

A
  • DNS security extensions
  • enhances DNS security by providing authentication of DNS data, verifying integrity and ensuring it has not been tampered with
  • used digital signatures
145
Q

DNS over HTTPS (DoH)

A

encrypts DNS queries
- routes queries through HTTPs protocol

146
Q

CNAME

A

maps alias name to true domain name

147
Q

PTR

A

maps IP address to domain name
- opposite of A or AAAA record

148
Q

IPAM

A
  • IP address management
  • organizing, tracking, managing IP address space within network
  • helps prevent IP conflicts
149
Q

SNMP traps

A

unsolicited messages sent from SNMP-enabled device to management station, notifying it of significant events or conditions

150
Q

syslog collector

A

tool used for gathering log data generated by devices within a network

151
Q

RPO

A

max acceptable amount of data loss measured in time before disaster occurs

152
Q

RTO - time objective

A

targeted duration of time within which business process must be restored to avoid unacceptable consequences

153
Q

MTBF

A

calculated average time between failures of a system

154
Q

MTTR

A

average time required to repair a failed component

155
Q

cold sites

A
  • most affordable
  • no equipment, connections, or data
  • takes days to weeks to recover
156
Q

warm sites

A
  • contains some equipment and connections, but out of date configurations and data sets
  • hours to days to recover
157
Q

hot sites

A
  • most expensive but fastest recovery
  • contains all equipment, connections, recent configurations
158
Q

site-to-site VPN

A

connects entire networks to each other

159
Q

client-to-site VPN

A
  • remote access VPN
  • allows individual clients to connect to corporate network securely over the internet
160
Q

clientless VPN

A

allows users to securely access network resources through web browser without installing dedicated VPN client software

161
Q

split tunnel VPN

A

only network traffic from corporate site passes through VPN tunnel, while other traffic accesses internet directly
- reduces load on VPN gateway but exposes security risks

162
Q

full tunnel VPN

A

all of client’s internet traffic is routed through VPN to corporate network
- increases security but leads to higher bandwidth usage and slower performance

163
Q

integrity methods

A
  • checksums and cryptographic hash functions
  • digital signatures
  • access controls
164
Q

risk

A

probability of a threat exploiting a vulnerability

165
Q

IAM

A
  • identity and access management
  • framework of business processes, policies, and technologies that facilitate management of electronic or digital identities
  • controls user access
166
Q

Mandatory access control (MAC)

A
  • security models where access rights regulated by central authority based on different levels of security clearance
  • common in government and military, permissions set/enforced by systems admin
167
Q

discretionary access control (DAC)

A
  • resource owners decides on access levels; flexible
  • risks of users granting excessive access
168
Q

role based access control

A

assigns permissions based on user’s role within organization

169
Q

rule-based access control

A

based on set of rules defined by systems admin

170
Q

attribute-based access control

A

uses policies that evaluate attributes of users, environment, resources
- provides fine-grained control

171
Q

SAML (security assertion markup language)

A
  • between an identity provider and service provider
  • used for SSO, enterprise-level especially
172
Q

OAuth

A

open standard for access delegation, used to access user’s data without exposing user credentials

173
Q

honeynet

A

network of honeypots

174
Q

honeyfile

A

decoy files that appear legit and contain attractive data

175
Q

honeytoken

A

broader term that refers to any decoy data or token inserted into a system

176
Q

network segmentation

A

dividing network into smaller segments or subnets to improve security and performance

177
Q

ICS (industrial control system)

A

systems used in industrial production

178
Q

PKI (public key infrastructure)

A

framework used to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption

179
Q

logic bomb

A

code inserted into software that will set off a malicious function when specified conditions are met

180
Q

UDP floods

A

attacker overwhelms random ports on targeted host with IP packets containing UDP datagrams
- slows down/crashes system

181
Q

SYN floods

A

type of DoS attack that targets TCP connection sequence 3-way handshake

182
Q

reflected DDoS

A

attackers forces third-party servers to direct traffic to victim
- ex: IP spoofing

183
Q

VLAN hopping

A

network attack that exploits vulnerabilities to send packets from one VLAN to another, bypassing Layer 2 security measures

184
Q

MAC flooding

A

attacker overwhelms network switch with fake MAC. address, leading to switch acting like a hub and broadcasting all incoming traffic to all ports

185
Q

ARP spoofing

A

attacker sends falsified ARP messages over LAN resulting in linking of attacker’s MAC address with IP address of a legit computer

186
Q

ARP poisoning

A

sending malicious ARP messages to local network, allowing attacker to intercept, modify, or block data

187
Q

DNS tunneling

A

encoding data of other programs or protocols in DNS queries and responses

188
Q

session hijacking

A

done by stealing session tokens, allowing impersonation of the victim and unauthorized access to systems or information

189
Q

SSL stripping

A

attacker downgrades secure HTTPS connection to unencrypted HTTP connection

190
Q

endpoint protection

A

installing security software on individual devices (endpoints) like antivirus, anti-malware, firewalls, IDS.

191
Q

host-based firewall

A

controls network traffic to and from a single host, managing what traffic is allowed based on predefined security rules

192
Q

802.1X

A

IEEE standard for port-based network access control
- used to authenticate devices

193
Q

how does 802.1X work?

A
  1. device attempt to connect
  2. authenticator blocks all traffic except 802.1X traffic
  3. supplicant/client device sends credentials to authenticator
  4. authenticator forwards to authentication server
  5. server approves credentials and instructs authenticator to allow access
194
Q

EAP (extensible authentication protocol)

A

supports multiple authentication mechanisms
- used in PPP, RADIUS, 802.1X

195
Q

packet filtering firewalls

A
  • basic
  • inspects packets and permits/denies based on source/destination IP, ports, protocols
196
Q

stateful inspection firewall

A
  • track state of active connections and make decisions based on context of the traffic
197
Q

NGFW (next gen firewalls)

A
  • more advances, integrates functionalities like deep packet inspection, IPS, app awareness
198
Q

screened subnet/DMZ

A

subnetwork that contains/exposes organization’s external-facing services to an untrusted network, usually the internet

199
Q

7 steps of troubleshooting

A
  1. identify problem
  2. establish theory
  3. test theory
  4. establish plan of action
  5. implement solution/escalate
  6. verify full system functionality
  7. document findings
200
Q

identify problelm

A
  • gather information
  • question users
  • see if anything changed
  • duplicate problem
201
Q

establish theory of probable cause

A
  • question the obvious
  • consider multiple approaches
  • top-bottom or bottom-top OSI
  • divide and conquer
202
Q

crosstalk

A

signal transmitted on one cable or channel interferes with signal on another cable or channel
- using incorrect or low quality cable can increase the risk of crosstalk

203
Q

CRC errors (cyclic redundancy check)

A

mismatch in the data checksum, indicating data corruption during transmission

204
Q

runts

A

packs smaller than minimum allowed sign, usually less than 64 bytes

205
Q

root bridge

A

central reference point in an STP-enabled network

206
Q

incorrect VLAN assignment issues

A

network segmentation issues where devices on different VLANs unable to communicate as intended
- security vulnerabilities

207
Q

incorrect subnet mask issues

A
  • leads to improper network segmentation, causing devices to fail in communicating with each other
208
Q

bottlenecking

A

particular part of network limits overall performance, creating a point of congestion
- insufficient bandwidth or overloaded network devices

209
Q

latency

A

time it takes for data to travel from source to destination

210
Q

jitter

A

variability in packet arrival times, affecting quality of real-time communications

211
Q

protocol analyzer/packet capture

A

captures data packets traveling over network, allows for detailed analysis of network traffic

212
Q

ping

A

sends ICMP echo requests to target host to test connectivity and measure round-trip time for messages sent to target device

213
Q

traceroute/tracert (windows)

A

traces path packets take from source to destination, showing each hop along the route

214
Q

NSlookup

A
  • windows
  • queries DNS servers to find IP address associated with hostname or to get DNS information about a domain (dig)
215
Q

dig

A
  • linux
  • get DNS information about a domain
216
Q

Tcpdump

A
  • linux
  • command-line packet filter
217
Q

netstat

A

displays network connections, routing tables, and other network interface stats

218
Q

ipconfig/ifconfig

A

displays or configures network configuration of a device
- ipconfig = windows
- ifconfig = older Linux
- ip = modern Linux

219
Q

arp

A

displays or modifies IP-to-MAC address translation tables used by arp

220
Q

nmap

A

network scanning tool that discovers devices and services on a network by sending packets and analyzing responses

221
Q

LLDP

A
  • link layer discovery protocol
  • network discovery protocol used to discover and share information between network devices, used to identify network topology, troubleshoot connectivity issues
222
Q

speed tester

A

tool used to measure performance of network connection by testing upload/download speeds

223
Q

toner

A

tool used to trace and identify individual wires or cables within a bundle

224
Q

cable tester

A

verifies integrity and performance of network cables; tests for continuity, signal strength, and wiring faults such as shorts, opens, cross connections
- essential for validating new cable installations and diagnosing existing cable issues

225
Q

network tap

A

hardware device that provides way to access data flowing across network cable
- creates copy of data packets

226
Q

visual fault locator

A

tool used to identify faults in fiber optic cables

227
Q

show mac-address-table

A

displays MAC address table of network switch

228
Q

command that displays routing table of router or layer 3 switch

A

show route

229
Q

command that provides detailed information about status and configuration of network interfaces

A

show interface

230
Q

command that displays current configuration of network device

A

show config

231
Q

command that displays ARP table

A

show arp

232
Q

command that displays information about VLAN configurations on a switch

A

show vlan

233
Q

command that provides information about the power status and consumption of PoE devices

A

show power

234
Q

reverse proxy

A

provides for protocol-specific inbound traffic. Reverse proxies can publish applications from the corporate network to the Internet in this way.

235
Q
A