CCNA Flashcards
Firewall
device that protects networks by montioring traffic and prevents unwanted traffic from accessing network.
ARP (Address Resolution Protocol)
Translates the IP address of a device to a MAC address
Can a device act as a client and server?
Yes and example
client
requests a service from a server. Example
DNS (Domain name system)
A protocol that translates web addresses like www.google.com to IP addresses such as 192.65.52.21. Like a phonebook for computers.
Home IP address
192.168.0.1 or 192.168.1.1
Used to connect to home network(router). This IP address is like a secret code that helps the devices in your house talk to each other and send and receive data.
IP address (Internet Protocol address)
Unique address that identifies a device in a network
Local host
127.0.0.1, this is your computer itself and used for testing programs or trying out new things without anyone else seeing.
Mac Address (Media Access Control address)
AKA physical address, unique address assigned to NIC in a device
Network
A group of connected devices that share resources such as files, pictures, etc.
Network Topology
Diagram of the arrangement of devices in a network
Open Systems Interconnection Model
7 layer model that describes how computer systems communicate over a network. (Physical, Data Link, Network, Transport, Session, Presentation, Application)
Phishing
A fraudulent email that contains malware or to get sensitive data. It may seem legit.
Ransomware
deny a user or organization access to file unless a payment to made to hacker
Router
Router is used to send data over internet and between LANS
Server
provides a client with a service, Example:
Social Engineering
manipulating someone to perform actions or get confidential information
Spoofing attack
attacker pretends to be a person, organization, etc to get confidential information. Example:
Techniques to perform Reconnaissance Atttack
- Gather info about target and find target’s network address(whois, google, organization website, etc)
- Ping sweep-to find active IP addresses
3.Port scan(Nmap, Superscan, etc)
4.Run vulnerability scanner- with identified ports, determine the type and version of OS running on the host(Nipper, SAINT, etc)
5.Run exploitation-discover vulnerable services that can be exploited.
Trojan Horse
is a type of malware that appears legitimate and safe, but is actually malware
Virus
A malicious piece of computer code designed to spread from device to device.
What is Ethernet
Networking technology that is used in a wired LAN or WAN to create connections between devices using protocols.
Static Route
A route that you manually configure in a routing table
Next Hop
The hop data has to go through to make it to the destination