Block 6 Flashcards
What kind of network is a small area, single building, small group of buildings or small number of computers?
Local area network (LAN)
What is a large area network with a substantial number of computers?
Wide area network (WAN)
Multiple LANs connected together is called what?
Wide area network (WAN)
____ is a large public network and is the largest WAN
Internet
What is a private network called?
Intranet
What is a private network that is accessible to select outside users?
Extranet
WANs may consist of ____, ____ and/or ____
- Campus area network (CANs)
- Metropolitan area network (MANs)
- Global area network (GANs)
CANs consist of what?
- Campus area
- School campus
- University
MANs consist of what?
A few city blocks
GANs consist of what?
Connection points around the globe
What do servers do?
Share resources, serve/manage network resources such as e-mail, files and printers
What do clients do?
Request access to shared resources/acces network resources such as host computers, printers and cameras
What do network classifications depend on?
The role played by the computer
What is a large network that has one or more computers acting as servers and the rest as clients called?
Client/server network
What is a network where computers act as both clients and servers?
Peer-to-peer network
____ is a circuit card inside a network device which enables it to access a network
Network interface card (NIC)
What is a unique identifier for a device?
Media access control (MAC) address
Where is the MAC address utilized?
Either on the NIC or motherboard
____ is architecture of the network (cables, connectors, signaling)
Ethernet
What defines everything about modern network HARDWARE?
Ethernet
What are examples of network media?
- Coaxial cables
- Twisted pair
- Fiber optics
- Wireless components
What is referred to as, the language the machines on the network use?
Software
Operating systems, protocols, TCP/IP suites are examples of what?
Software
Programs used to accomplish tasks like file sharing or web browsing are called what?
Applications
Word processors, spreadsheets and slide presentations are examples of what?
Applications
What is needed to connect LANs?
- Physical or wireless connection
- Routers
- IP adressess
Network components provide intelligent direction so data can flow WITHIN LANs via ____ and BETWEEN LANs via ____
- Switches
- Routers
Physical topologies dictate what?
Precisely how devices/wires connect
Logical topologies dictate what?
How SIGNALS travel from one device to another
____ topology is where all devices are connected by one cable
Bus topology
What are the characteristics of bus topology?
- Used in early networks
- Break/improper termination causes REFLECTION
- Single point of failure
____ topology is where every computer system is connected together in a complete loop (making it vulnerable to a single point of failure)
Ring topology
____ topology is where all devices connected to a single device
Star topology
Which topology when a break occurs it only affects a single machine (single point of failure)?
Star topology
____ topology is where each node is connected with multiple links, providing multiple paths between any two nodes
Mesh topology
____ is created by Organization of Standardization (ISO)
Open system interconnect (OSI) reference model
What is the standardized common language between hardware and software
Open systems interconnect (OSI) reference model
What is Layer 1 of the OSI model?
Physical layer (layer 1)
What is the function of the Physical layer (Layer 1)?
Determines how data is placed on the network MEDIA (cabling, connectors, hubs and NICs)
What is Layer 2 of the OSI model?
Data link layer (layer 2)
What is Layer 3 of the OSI model?
Network layer (layer 3)
What is Layer 4 of the OSI model?
Transport layer (layer 4)
What is Layer 5 of the OSI model?
Session layer (layer 5)
What is Layer 6 of the OSI model?
Presentation layer (layer 6)
What is Layer 7 of the OSI model?
Application layer (layer 7)
What is the function of the data link layer (Layer 2)?
Gathers and completes the elements that make up the whole DATA FRAME and then passes it to the physical layer (MAC ADDRESSING)
What is the function of the network layer (Layer 3)?
- Routing
- Logical addressing (IP addressing)
What is the function of the transport layer (Layer 4)?
Breaks data into smaller, more manageable chunks for transmission (FRAGMENTATION)
What is the function of the session layer (Layer 5)?
Manages and terminates sessions between programs on devices
What is the function of the presentation layer (Layer 6)?
Manages and translates between the session layer and the application layer
What is the function of the application layer (Layer 7)?
Represents network-related program code and functions computers need to INITIATE SERVICE REQUESTS
____ is a sub layer of of the data link layer (Layer 2) that is responsible for ERROR-CORRECTION and FLOW-CONTROL
Logical Link Control (LLC)
Which OSI layer is responsible for addressing networking devices by using the physical address (MAC address)?
Data link layer (Layer 2)
____ (Layer ____) refers to protocols that programs use, not the programs themselves (OSI model)
- Application layer
- Layer 7
The OSI model consists of how many layers?
Seven
The TCP/IP layers consists of how many layers?
Four
Upon the development of the ____ suite, the TCP/IP model became more widely used than the ____
- TCP/IP (4 Layers)
- OSI model (7 Layers)
Which model is also referred to as the Internet Model
TCP/IP model
A set of rules that govern the procedures used to exchange information between devices is called what?
Protocols
What is similar to a language, that helps computers communicate with each other?
Protocols
What is the first layer of the TCP/IP model?
Link/network layer
What is second layer of the TCP/IP model?
Internet layer
What is the third layer of the TCP/IP model?
Transport layer
What is fourth layer of the TCP/IP model?
Application layer
Which layer of the TCP/IP model acts as Layer 1 and 2 of the OSI model, acting as the physical layer and MAC addressing?
Link/network layer
Which layer of the TCP/IP model acts as Layer 3 of the OSI model, handling logicial/IP addressing and routing?
Internet layer
Which layer of the TCP/IP model acts as Layer 4 and 5 of the OSI model?
Transport layer
Connection oriented (TCP) data delivery requires ____ between ____ and ____ before a message is sent (guaranteed data delivery)
- Stable connection
- Client
- Server
Connectionless (UDP) data delivery will send information ____ someone is on the other end to receive it (no guaranteed data delivery)
Without verifying
Which layer of the TCP/IP model acts as the top 3 layers of the OSI model, using ports to give each application a unique number that identifies the protocol it uses?
Application layer
What are three common application layer protocols of the TCP/IP application layer?
- Hypertext transfer protocol (HTTP)
- File transfer protocol (FTP)
- Simple mail transfer protocol (SMTP)
___ is the protocol that makes webpages work, and uses port 80
Hypertext transfer protocol (HTTP)
____ is the protocol that transfers files between clients and servers, and uses ports 20 and 21
File transfer protocol (FTP)
____ is the main protocol used to send electronic mail on the internet, and uses port 25
Simple mail transfer protocol (SMTP)
Which network media consists of a center conductor surrounded by an insulating material and a concentric outer conductor?
Coaxial Cable
Coaxial cable was the original cabling used in what?
Ethernet networking
Coaxial cables use ____connector and ____ connector
- BNC
- F-type
____ is the most common network media used in modern IP networking
Twisted pair
Twisted pair is two insulated copper wires twisted together over their length (T/F)
True
What are the two types of twisted pair cabling?
- Unshielded twisted pair (UTP)
- Shielded twisted pair (STP)
In shielded twisted pair (STP), ____ surrounds the pair of wires to prevent ____ and ____
- Metal foil
- Interference
- “Crosstalk”
Twisted pair uses ____ connector
RJ-45
Twisted pair uses what to provide guidance on how to make twisted pair cabling to a RJ-45 connector?
Wiring standards T568A and T568B
Twisted pair wiring standard T568A is mostly commonly used standard in America (T/F)
False (T568B)
What are the four types of twisted pair cable configurations?
- Straight-through cable
- Cross-over cable
- Rollover cable
- Loopback cable
On twisted pair cable config ____, the pins on the end of the cable match and is used for connecting to a computer to a switch.
Straight-through cable
On twisted pair cable config ____, the TX and RX pins are swapped on the opposite end of the cable and is used for connecting similar devices
Cross-over cable
On twisted pair cable config ____, the pins are exactly opposite on the ends of the cables and is used connect the administrator’s system to the console port of a Cisco router or switch
Rollover cable
On twisted pair cable config ____, it connects the transmit pins to the receive pins on the same system and is used for troubleshooting a system
Loopback cable
What are the different categories of twisted pair cabling?
- CAT 1
- CAT 3
- CAT 5
- CAT 5e
- CAT 6/6a
Which twisted pair category is, 1 Mbps speed and is used for telephone voice, not for data communications?
CAT 1
Which twisted pair category is, 10 Mbps speed and is used for voice and data over Ethernet at 10 Mbps or 10BaseT?
CAT 3
Which twisted pair category is, 100 Mbps speed and is used for voice and data over Ethernet at 100 Mbps or 100BaseT?
CAT 5
Which twisted pair category is, 1 Gbps speed and is used for voice and data Ethernet at 1000 Mbps or 1000BaseT?
CAT 5e
Which twisted pair category is, 10 Gbps?
CAT 6/6a
What are the characteristics of optical fiber?
- Expensive to purchase and install
- Good for long distance
- Good for high speeds
What are the two types of optical fibers?
- Single-mode
- Multi-mode (more commonly used)
What are the two types of optical fiber connectors?
- Straight tip (ST)
- Subscriber connector (SC)
Which optical fiber connector uses a twist locking system and operate much like a BNC copper connector?
Straight tip (ST) (AKA stick-and-twist)
Which optical fiber connector has a square molded plastic body and push-pull locking features?
Subscriber connector (SC)
75.110.227.18 is an example of what?
Dotted decimal
01001011.01101110.11100011.00010010 is an example of what?
IP address (in binary)
____ consists of 4 octets, each made up of 8 bits and totals 32 bits
IPv4 IP address (in binary)
Each octet in an IP address ranges from 0 to 255 (T/F)
True
IPV4 Class ____ = 1-126
Class A
IPV4 Class ____ = 128-191
Class B
IPV4 Class ____ = 192-223
Class C
IPV4 Class ____ = 224-239
Class D
IPV4 Class ____ = 240-254
Class E
Classful addressing system has IP addresses without ____
Subnets
In IPv4 what is a value used to help devices distinguish the host’s netwrok?
Subnet mask
In IPv4 what is used to differentiate networks from one another?
Network ID
A network ID can be assigned to a specific computer or device
False
The ____ is the portion of the IP address used to get specific host information for that part of the network
Host ID
In IPv4 what is used for dividing a network into subnetworks?
Subnet ID
____ addressing system has IP addresses with subnets
Classless
CIDR
Classless Inter-Domain Routing (CIDR)
____ is the address in your subnet that allows communication with all the nodes in your ____
- Broadcast Address
- Subnet
What is the purpose of IPv6?
To replace the 32 bit (IPv4) addressing as the internet infrastructure is upgraded
IPv6 addresses the major issue with IPv4, which is what?
Shortage of IP addresses
____ consists of 8 groups (hexquads), each made up of 16 bits and totals 128 bits
IPv6 IP address
What are the characteristics of a hub?
- Layer 1 device
- Repeats the frame down every network cable connected
- Half duplex
What are the characteristics of a bridge?
- Layer 2 device
- Software or hardware based
- Creates a connection between two separate computer networks or to divide one network into two
- Uses MAC addresses
Which network device filters and forwards traffic between two or more segments of a network based on MAC addresses?
A bridge
____ is when a bridge stops traffic from crossing one network segment to the next
Filtering
____ is when a bridge passes traffic originating in one network segment to the other
Forwarding
What are the characteristics of a switch?
- Physically connects devices together on a LAN
- Layer 2 device (uses MAC addresses)
- Full duplex
What are the characteristics of a router?
- Connects networks together
- Layer 3 device
- Logical addressing (IP addresses)
IEEE
Institute of Electrical and Electronic Engineers
Which standard handles the architecture, security, management, and internetworking of local area networks LANs, MANs, and WANs standardized by IEEE 802.1?
IEEE 802.1
What are key tasks of IEEE 802.1?
- Develop standards that regulate network management
- LAN/MAN management
- MAC bridging
- Data encryption
- Manage network traffic
Which standard defines Logical Link Control?
IEEE 802.2
____ is a sub layer of the ____ layer
- Logical link control
- Data link (Layer 2)
Which standard handles traffic management (flow and error control) over the physical media?
IEEE 802.2
In 1973 Xerox introduced what would be come ____
IEEE 802.3
In 1982 IEEE made ____ the 802.3 standard
Ethernet
Which standard defines Ethernet cables and communication standards?
IEEE 802.3
CSMA/CD
Carrier sense multiple access/collision detection
What determines which computer will use the shared media and checks before placing data on the media to avoid collision?
CSMA/CD
If CSMA/CD detects a collision, both devices ____, ____ and ____ the transmission at a ____ time interval
- Stop
- Wait
- Resend
- Randomized
What is an ongoing activity of a data station to detect whether another station is transmitting?
Carrier sense
What is it called when two devices use the same media at the same time and the data collides and is corrupted?
A collision
Where collisions might occur on a network is called?
Collision domain
____ is traffic that is designed for all hosts on a network
A broadcast
A limited/local broadcast DOES NOT pass a ____
Router
ISP
Internet service provider
____ connects the network to the internet service provider (ISP) and to other LANs
Router
What is a hardware-based device used to interconnect network components?
A switch
A switch takes the data from the ____ and sends it to the correct node via the ____
- Router
- MAC address
What is a node?
A device on a network
What are the characteristics of a switch?
- Physically connects devices
- Manages flow of data across the network
- Maximizes security and efficiency
- Is “intelligent”
Switches have the ability to learn, are adaptable to media speed, and have low latency (T/F)
True
Ports are ____ by default
Open
What is used by administrators to configure the switch at the physical location and uses rollover cables?
Console port
What are some of the main switching protocols used?
- Synchronous optical network (SONET)
- Asynchronous transfer mode (ATM)
- Multiprotocol label switching (MPLS)
- Spanning-tree protocol (STP)
____ is the standard for synchronous data transmission on optical fiber (in the US and Canada)
Synchronous optical network (SONET)
Europeans call SONET ____
- Synchronous digital hierarchy (SDH)
SONET standardized ____ for transferring digital data over ____
- Multiplexing protocols
- Fiber optic cables
SONET also provides ____, ____ and ____ communication
- Voice
- Data
- Video
SONET is capable of transferring data at more than ____
1 Gbps
What is a high-speed multiplexing and switching method with integrated voice, video and data on one connection, using short and fixed-length packets called “cells” to transfer information?
Asynchronous transfer mode (ATM)
____ are short and fixed-length packets that transfer information
Cells
ATM was developed and designed to unify ____ and ____
- Telecommunication networks
- Computer networks
Asynchronous transfer mode (ATM) operates at the ____ three layer(s) of the ____
- Lowest
- OSI reference model
Multiprotocol label switching (MPLS) operates at a layer that is between layers ____ and ____ of the OSI model and is referred to as ____ protocol
- Two
- Three
- Layer 2.5
What was designed to provide a unified data-carrying service for both circuit-based clients and packet-switching clients which provide a datagram service model?
Multiprotocol label switching (MPLS)
Switches utilize ____ to find loops from redundant links and stops them by turning certain ports off until they are needed
Spanning tree protocol (STP)
Spanning tree protocol (STP) ensures a ____ by detecting network issues such as ____, ____ and ____
- Loop-free network
- Broadcast storms
- Multiple frame copies
- Logical loops
____ is a redundant connection within a network, that is used for troubleshooting but can sometimes cause problems
A loop
What occurs when a network system becomes overwhelmed by multicast or broadcast traffic?
Broadcast storm
During a broadcast storm, ____ continue to propagate ____ over and over on all redundant paths producing an endless amount of traffic
- Switches
- Broadcasts
During a broadcast storm the ____ can consume enough network resources to render a network unable to pass ____
- Excessive data
- Normal traffic
What occurs when there are multiple paths to a single destination and frames are sent down those path simultaneously?
Multiple frame copies
Where can ports be assigned one of three roles within a spanning tree instance?
Root bridge
Root bridge is a ____ device (switch) that is in control of managing ____
- Layer 2
- Spanning tree protocol (STP)
A designated port is one that is ____ and ____ traffic
- Active
- Forwarding
A root port provides a ____ to the root bridge from the non-root bridge to receive ____ and ____
- Constant connection
- Advertisements
- Updates
What happens after a switch has determined the best path to the root bridge and the root ports and designated ports are assigned?
All other ports are placed in the blocking state to prevent loops
What readjusts for topology changes automatically?
Root bridge
When there is a topology change switches use ____ and ____ states to re-compute and select the ____ to the root bridge
- Listening
- Learning
- New path
What occurs when bridges and switches have completed the transition to reassign port states to either the forwarding or blocking mode?
Convergence
What happens during convergence?
Not traffic will be passed across the network
____ state will not forward frames (switches), it only listens and processes bridge protocol data units (BPDUs)
Blocking state
____ state listens to BPDUs and ensures no loops occur before passing data frames
Listening state
BPDUs
Bridge protocol data units
____ state learns the MAC address / builds the MAC address filter table (frames are not forwarded)
Learning state
____ state is when the bridge port is able to send and receive data
Forwarding state
____ is LAN technology that allows us to create multiple domains on a single switch versus having multiple switches containing one domain each
Virtual LAN (VLAN)
VLAN is a grouping of ____ into a single ____
- Network devices
- Broadcast domain
What is the basic reason for splitting a network into VLANs?
To reduce congestion on a large LAN
VLAN is like a ____, in that it partitions the network into logical segments, which provides better admin and management of ____
- Router
- Multicast traffic
What are the benefits of a VLAN?
- Flexibility and scalability
- Increased security
- No geographical barrier
A wireless local area network (WLAN) links two or more ____ using a wireless ____
- Devices
- Distribution method
Wireless mode ____ is the default mode in most routers or switches, where the router acts like a central connection point for all wireless clients to access
AP mode
Wireless mode ____ acts as a Wi-Fi adapter for a device connected to one of the ethernet ports and is on a DIFFERENT subnet than the AP router
Client mode
Wireless mode ____ acts as a Wi-Fi adapter for a device connected to one of the ethernet ports and is on the SAME subnet as the AP router
Client bridged mode
Wireless mode ____ extends the range of your signal, can be attached to the router via wired or wireless connection and is on a DIFFERENT subnet as the AP router
Repeater mode
Wireless mode ____ extends the range of your signal, can be attached to the router via wired or wireless connection and is on the SAME subnet as the AP router
Repeater bridged mode
Wireless mode ____ is peer to peer wireless connection that allows clients to connect to each other as required without involving central access points
Ad-Hoc mode
CSMA/CA
Carrier sense multiple access/collision avoidance
What is dfferent about CSMA/CA and CSMA/CD?
CSMA/CA avoids collisions rather than detects them
Which standard sets specifications for implementing wireless local area networks (WLANs)?
IEEE 802.11
Standard ____ implements WLANs at throughput of 11 Mbps and 2.4 GHz
IEEE 802.11b
Standard ____ implements WLANs at throughput of 54 Mbps and 5 GHz
IEEE 802.11a
Standard ____ implements WLANs at throughput of 54 Mbps and 2.4 GHz
IEEE 802.11g
Standard ____ implements WLANs at throughput of 600 Mbps and 2.4/5 GHz
IEEE 802.11n
Which standard is also referred to as White-Fi and Super Wi-Fi and allows WLAN operation in the TV white space spectrume?
IEEE 802.11af
Which standard has an expected multi station WLAN throughput of at least 1 gigabit per second and a single link throughput of at least 500 megabits per second (500 Mbit/s)?
IEEE 802.11ac
Bluetooth is a wireless networking protocol for ____, used mostly for devices such as ____, ____ and ____
- Short-range
- Wireless keyboard
- Wireless mouse
- Cell phones
What is a device that produces a coherent beam of optical radiation by stimulating electronic, ionic or molecular transitions to higher energy levels so that they emit energy when they return to lower energy levels?
A laser
Laser are used for ____ data transmission systems utilizing ____ transmission lines
- High-speed
- Fiber optic
What are the advantages of wireless?
- Cheaper (no cables)
- Mobility
What are the disadvantages of wireless?
- Reliability
- Security
- Reduced management control
What are the security concerns of wireless?
- War driving
- Rouge access points
____ is searching for Wi-Fi networks by a person in a moving vehicle, using a portable device
War driving
What are some wireless security implemenetations?
- Service set ID (SSID)
- MAC address filtering
- Data encryption
Wireless equivalent privacy (WEP) is a security algorithm for the ____ standard, and provides ____ comparable to that of a traditional wired network
- IEEE 802.11
- Data confidentiality
What is an intermediate measure that is stronger then WEP but not as strong as WPA2?
Wi-Fi protected access (WPA)
What is a stronger encryption algorithm than WEP and WPA?
WPA2
WAN covers multiple distance areas, which may spread across the entire world (T/F)
True
What is a key difference between WAN and LAN technologies?
Scalability
WAN technologies generally function at the ____ of the OSI model
Lower three levels
What is defined as a collection of networks under a common administration that share a common routing strategy?
Autonomous system
Most autonomous systems (AS) DO NOT share a direct link with each other and must route data traffic through other AS that agree to carry the traffic (T/F)
True
____ are routers that perform routing functions between machines and networks that are within or between autonomous systems
Gateways
What are a responsible for routing WITHIN an AS?
Interior gateway
What are a responsible for routing BETWEEN AS?
Exterior gateways
Default gateway is an ____ on a ____ network device that serves as an access point to or from a network
- IP address
- Layer 3
What is the setting that is configured on the hosts to provide them with a path to leave the LAN to some remote network?
Default gateway
What creates an encrypted tunnel from one computer or remote network to a private network through the internet?
Virtual private network (VPN)
What is a unified communications platform that provides services such as session management, voice/VoIP, video, messaging and web conferencing?
Cisco Unified Call Manager
Cisco Unified Call manager removes the need for ____ and is capable of storing data securely via ____
- Multiplexing equipment
- Cloud
What are the benefits of the Cisco Unified Call Manager?
- Reliable
- Lower cost of ownership
- Interoperability and standards support
- Scalability for up to 40,000 users, extendable to 80,000 users
What is a transfer protocol that describes a method for establishing and terminating user online session, including multimedia content exchange?
Session initiation protocol (SIP)
What are the most common applications of session initiation protocol (SIP)?
- Voice and video calls
- Instant messaging
- Internet protocol (IP) networks
____ was designed to setup a “session” between two points and to be a modular, flexible component of the internet architrcture?
Session initiation protocol (SIP)
What defines the protocols used to provide audio-visual communication sessions on any pack network?
H.323
____ addresses call signaling and control, multimedia transport and control, and bandwidth control for point-to-point and multi-point conferences
H.323
H.323 is most widely used for ____ followed by ____
- VoIP
- Videoconferencing
VoIP is a technique for routing ____ over ____
- Telephone calls
- The internet
What provides different priority to different applications, users, or data flows to guarantee a certain level of performance?
Quality of service (QoS)
What are the principles of QoS?
- Latency
- Jitter
- Dropped packets
- Low throughput
- Errors
- Out-of-delivery
What is latency?
The amount of time it takes for a packet to reach its destination (lag)
____ is variation in delay that can seriously affect the quality of steaming audio and/or video
Jitter
What is it called when packets do not make it to the distant end and disrupting communications because the intended message is not complete?
Dropped packets
Low throughhput is when a ____ may be ____ for real-time multimedia services (streaming) due to too many devices using the same resources
- Data stream
- Too low
Packets that are corrupted due to bit errors caused by noise and interference is referred to as what?
Errors
What is called when packets arrive out of order, scrambling the intended message when it arrives at the distant end?
Out-of-order delivery
What are advantages of port number filtering?
- Fast
- Low resource-consuming
- Supported by many network devices
- Does not implement the application-layer payload (not compromising user privacy)
What are disadvantages of port number filtering?
- Only useful for the applications which use fixed port numbers
- Easy to cheat by changing the port number in the system
____ inspects the actual payload of the packet and detects the applications and services regardless of the port number
Deep packet inspection
What are disadvantages of deep packet inspection?
- Slow
- Requires a lot of processing power
- Signatures must be kept up to date
- Encryption makes this method impossible
____ is a field in an IP packet that enables different levels of service to be assigned to network traffic
Differentiated services code point (DSCP)
DSCP field places data packets into a limited number of traffic classes instead of the requirements of the individual flow (T/F)
True
In DSCP fields each traffic class can be managed differently, ensuring preferential treatment for higher-priority traffic on the network (T/F)
True
____ is sensitive traffic the operator has an expectation to deliver on time
Sensitive traffic
In DSCP Best Effort Traffic is all other kinds of ____ traffic
Non- detrimental
The category of traffic that is generally limited to the delivery of spam and traffic created by worms, botnets and other malicious attacks is called what?
Undesired traffic
Redundancy uses ____ of critical components/devices, increasing ____ of the system
- Duplication
- Reliability
What are the two major concerns for redundancy?
- Network device redundancy
- Redundant power solutions
What comes in various sizes and can sustain network operations for only a limited time in the event of an outage?
Uninterruptible power supplies (UPS)
What is the name of a built in backup power supply?
Redundant power supply
____ are designed to protect entire buildings for sustained periods of time to ensure mission critical devices remain functional
Facility generators
What eliminates single points of failure in a network?
Network equipment redundancy
What provides a solution for network managers who require higher bandwidth between servers, routers and switches?
Link aggregation
EtherChannel is a technology used to allow grouping of several ____ ethernet links to create one ____ ethernet link
- Physical
- Logical
EtherChannel is a port link aggregation technology used primarily on ____ switches
Cisco
What does EtherChannel look at to decide which physical link to send data over?
- Source MAC address
- Destination MAC address
- Source IP address
- Destination IP address
- Source port
- Destination port
What are the benefits of EtherChannel?
- Increased bandwidth
- Redundancy
- If a link fails the traffic will go onto another link almost instantly
- If that same link recovers it will join the EtherChannel again automatically
What is a standard for exchanging network management information between network devices?
Simple network management protocol (SNMP)
Network administrators us SNMP to monitor and map ____ and ____
- Network availability performance
- Error rates
What are the types of SNMP?
- SNMP version 1
- SNMP version 2
- SNMP version 3
Physical security consists of ____
Hardware safegaurds
Logical security consists of ____
Software safegaurds
What defines what users can do with the server’s shared resources?
Administrative access control
What are the types of threats to a network?
- Unauthorized admin access
- Malware
- Virus
- Worm
- Macro virus
- Trojan horse
- RootKit
- Adware
- Spyware
- Social engineering
- Phishing
- Man-in-the-middle attacks
- Denial of service (DOS)
- Physical intrusion
- Attacks on wireless networks
- Rogue access points
- Evil twins
Any program or code designed to do something on a system or network that you don’t want to have happen, is called what?
Malware
____ is a program that has two jobs: to replicate and to activate
Virus
What functions similar to a virus though it replicates exclusively through networks?
A worm
What is a macro?
A group of commands that you can run at once
When a file is opened, the ____ runs automatically creating havoc on a system
Macro virus
What is a piece of malware that looks or pretends to do one thing while, at the same time, doing something malicious?
Trojan horse
A Trojan Horse that takes advantage of
very low-level operating system functions to hide
itself from all but the most aggressive of
antimalware tools, is called what?
RootKit
What monitors the types of websites you frequent and uses that information to generate targeted advertisements?
Adware
____ is a function of any program that sends information about your system or your actions over the internet
Spyware
What is the process of using or manipulating people inside the network environment to gain access to that network from the outside?
Social engineering
Phishing is when the attacker poses as some sort of trusted site, like an online version of your bank or credit card company to trick you into updating your financial information (T/F)
True
When a person inserts themselves into a conversation between two others, covertly intercepting traffic thought to be only between those other people, it is called what?
Man-in-the-middle attack
What is accomplished by flooding the network with so many requests that it becomes overwhelmed and stops functioning?
DOS attack
What are two ways to guard against physical intrusion?
- Protecting servers
- Protecting clients
Dumpster diving is a form of ____
Physical intrusion
What are two attacks on wireless networks?
- Leeching
- Cracking wireless encryption
____ is an unauthorized wireless access point installed on the network
Rogue access point
____ is a rogue access point that looks like a legitimate access point
Evil twin
What are the two main types of firewalls?
- Software firewall
- Hardware firewall
What are the firewall filtering methods?
- MAC address filtering
- Packet/IP address filtering
- Port filtering
____ filtering is the method that firewalls use to prevent the passage of any TCP or UDP segments or datagrams through any port other than the ones prescribed by the system administrator
Port filtering
What is designed to analyze data, identify attacks, and respond to the intrusion (passive)?
Intrusion detection system (IDS)
What is similar to IDS but has the capability to react?
Intrusion prevention system (IPS)