CCST Networking Flashcards
Three main Windows network config tools are:
1) Settings app
2) Control Panel
3) command line
IPv6 link local addresses begin with…
FE80
Three tools to get network info on a Mac station:
1) GUI
2) CLI
3) System Information app (under Utilities in Finder)
In a Mac, any settings changed by ifconfig might be overwritten by…
configd
Two Linux commands to display network config info are…
1) ip
2) ifconfig
What four issues does the RINA (Recursive InterNetwork Architecture) model address?
Error control
Flow control
Multiplexing
Marshaling
Cable-based internet service to the home is covered by what set of standards?
DOCSIS (Data Over Cable Service Interface Specification)
What size keys does WEP use?
64 or 128
What size keys does WPA use?
256
WPA-PSK creates a public key using what information?
The SSID
Where does WPA get its public key from?
An external server
Which is more appropriate for a home network, WPA or WPA-PSK?
WPA-PSK
Which is more appropriate for a corporate wifi, WPA or WPA-PSK?
WPA
Four types of last-mile layer 1 technologies are:
1) Fixed wireless access (FWA)
2) Fiber to the neighborhood/curb using GPON (Gigabit Passive Optical Network)
3) DOCSIS (cable)
4) MAN using ROADM (reconfigurable optical add-drop multiplexer)
Peering points are…
Where ISPs connect to other ISPs, can be public or private
Settlement-free peering is…
when two ISPs want to connect and believe the traffic each way will be roughly equal
Open peering is…
when an ISP provides connectivity to an organization for free
Two types of spine-and-leaf fabrics are…
1) Clos
2) butterfly
Early crossbar and Strowger fabrics were replaced by…
Clos
IPv4 packet fragmentation has been largely replaced by…
Path MTU discovery
What do PA and PI stand for?
Provider-Assigned (addresses)
Provider-Independent
What does “grammar” refer to?
Context describing what a set of bits contains
What does a “dictionary” refer to?
How to translate a set of bits into data
How many connections are involved in an FTP session and what are they used for?
Two - control and data
Hybrid cloud models use…
A combo of public and private clouds
Multi-cloud models use…
More than one cloud provider
What are the three main security goals?
Confidentiality, Integrity, and Availability
Five types of network documentation:
1) Network diagrams
2) Descriptions
3) Baselines
4) Failure reports
5) Hardware and software
Refactoring is the solution to…
technical debt
The frequency of an electronic signal or wave is defined as…
how often the signal changes polarity
Far-end crosstalk is…
the amount of interference between two copper wires carrying different signals (one being external noise)
In the 10BASE-2 spec, the -2 stands for…
thin coax or “thinnet”
In the 10BASE-5 spec, the -5 stands for…
thick coax or “thicknet”
How many pairs of twisted copper wires are used in the 1000BASE-T spec?
4 (all 8 wires)
The main standard covering wifi technologies is…
802.11
What organization oversees wifi standards?
IEEE
What are the responsibilities of the mobile core?
Authentication of users, tunnel endpoint termination in the RAN, user location tracking, and usage/billing
You know bandwidth and throughput, but what is “goodput”?
The amount of data transmitted without error
What does Mike’s TraceRoute test?
Delay and jitter across a network - Linux only (are they seriously going to ask about this?)
Two types of network diagrams…
Physical
Logical
What is a CRAC?
Computer Room Air Conditioner
What is a hot aisle?
When pairs of racks are placed back to back
iperf does or does not measure latency?
Does not (it measures throughput only)
What does a firewall block by default?
Blocks all traffic coming into the data center from the outside, but permits all traffic going out
True or false: WPA authentication is based on TKIP encryption
true
True or false: WPA uses a static WEP key
true
True or false: WPA cannot use RADIUS
false
What encryption does WPA2 use?
AES (as opposed to TKIP)
“Nonblocking” means…
a network will never drop data, it will instead reject the connection setup
Four characteristics of fabrics are:
1) Repeatable
2) Regular
3) Nonplanar
4) use fan-outs
“Noncontending” means…
A network will not reject any incoming data at the edge
IPv6 multicast addresses begin with…
FF00::/8
Unique local IPv6 addresses are not internet-routable, and start with…
FD00::/8
What is the IPv6 loopback address?
::1/128
Four types of exploits are:
email phishing, MITM, spoofing, DDoS.
What is a route prefix?
The subnet mask, e.g. /27
What wireless frequency provides the longest range?
2.4Ghz