da Flashcards

1
Q

Microsoft CHAP (MS-CHAP)

A

Microsoft-enhanced version of CHAP
*Two-way authentication.
*Hashed credential
*Most secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAP Sent in the clear

CHAP Hashed credentials

MS-CHAP Hashed credential and most secure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP Relay

A

Forwards DHCP packets between clients and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Hypervisor

A

VMWare ESXi
Microsoft Hyper-V
VirtualBox
VMWare Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Attached Storage (NAS)

A

Disk storage delivered as a service over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage Area Network (SAN)

A

Specialized LAN that transfers data at block-level with a special protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

InfiniBand

A

Virtualaized storage technology that uses a switched fabric topology and features very high throughput and very low latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software-Defined Networking (SDN)

A

Provides an easy to use front end to configure physical and virtual devices throughout the ntework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Private Branch Exchange (PBX) and VoIP

A

Outsources a telephone system by utilizing VoIP to send all data to the provider and then connecting it to the telephone system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bandwidth Speed Test

A

Verifies the real-world throughput from a client device all the way out to the Internet and back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

iPerf

A

Tool that measuers maximum achievable bandwidth on an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NetFlow Analyzer

A

*Monitoring
*Troubleshooting
*In-depth inspection, interpretation and synthesis of traffic flow data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terminal Emulator

A

Allows a host computer to access another computer through a command-line interface or a graphical one using either Telnet or SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP Scanner

A

Used to search for and detect IP addresses and other information related to devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Platform

A

Refers to any router, switch, or firewall regardless of the brand or manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic NAT (DNAT)

A

Automatically assigns an IP address from a pool and gives a one-to-one translation to access external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Address Translation (NAT)

A

Used to conserve the limited supply of IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static NAT (SNAT)

A

Manually assigns an IP address and gives a one-to-one translation (access external)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port Address Translation (PAT)

A

Sharing of one public IP by multiple private IP addresses which gives a many-to-one translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multicast Routing

A

Multicast sender sends traffic to a Class D IP address, known as a multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Access Control List (ACL)

A

Set of rules applied to router interfaces or FW that permit or deny certain traffic (IP/port/MAC)

22
Q

In-Band Management

A

Managing devices through the use of Telnet or SSH protocols over the network

23
Q

Out-of-Band Management

A

Connecting to and configuring different network devices using an alternate path or management network

24
Q

Secure Socket Layer (SSL)

A

Provides cryptography and reliability using the upper layers of the OSI model, specifically L 5, 6, & 7

25
Q

Transport Layer Security (TLS)

A

Provides secure web browsing over HTTPS

26
Q

Datagram Transport Layer Security (DTLS)

A

UDP-based version of the TLS protocol, which operates a bit faster due to having less overhead

27
Q

Access Control List (ACL)

A

A list of permissions associated with a given system or network resource

28
Q

Explicit Deny

A

Blocks matching traffic

29
Q

Implicit Deny

A

Blocks traffic to anything not explicitly specified

30
Q

Wireless Client Isolation

A

Prevents wireless clients from communicating with one another

31
Q

Guest Network Isolation

A

Keeps guests away from your internal network communications

32
Q

Pre-Shared Key (PSK)

A

Secures Wireless networks, including those protected with:
WEP
WPA
WPA2
WPA3

33
Q

Layer 3 Redundancy

A

Used if the default gateway goes down and clients couldn’t leave the subnet

34
Q

Multipathing

A

Creates more than one physical path between the server and its storage devices for better fault tolerance and performance

35
Q

Delay

A

The time a packet travels from source to destination

36
Q

Jitter

A

Uneven arrival of packets which is especially harmful in VoIP traffic

37
Q

Drops (packet)

A

Occurs during link congestion when a router’s interface queue overflows and causes packet loss

38
Q

Network Performance Monitoring

A

Monitors the performance from the end user’s workstation to the final destination they are trying to reach

39
Q

Latency

A

Time that it takes for data to reach its destination across a network

40
Q

Jitter

A

When a time delay in the sending of data packets over a network connection occurs

41
Q

Full Packet Capture

A

Captures the entire packet, including the header and the payload for all traffic entering and leaving a network

42
Q

NetFlow

A

Defines a particular traffic flow based on the different packets that share the same characteristics

43
Q

Zeek

A

*Passively monitors a network like a sniffer
*Only logs full packet capture data of potential interest

44
Q

Broadcast Storm

A

Occurs when a network system is overwhelmed by continuous multicast or broadcast traffic

45
Q

Broadcast Address

A

Layer2
FF:FF:FF:FF:FF:FF

Layer3
255.255.255.255

46
Q

Broadcast Domain

A

A logical division of a computer network where all nodes can reach each other by broadcast at the data link layer

47
Q

Logical Domain Manager

A

*Listens to multicast messages
*Keeps track of the MAC address being used

48
Q

Multicast Flooding

A

*Switch is not multicast aware and treats multicast as broadcast
*Enable IGMP on multicast aware switches

49
Q

Host-Based Firewall

A

Runs on an individual computer or device connected to the network to protect that one device

50
Q

Network-Based Firewall

A

Deployed in line with the network traffic flow to monitor and filter incoming and outgoing traffic based on established rule sets