Dion Flashcards

1
Q

Broadcast domain

A

Routers break up broadcast domains.

All ports on hubs and switches are in the same broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collision domain

A

Switches and routers break up collision domains.

All ports on a hub are in the same collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RADIUS

A

A RADIUS (Remote Authentication Dial-In User Service) server is a central server that authenticates and authorizes remote users who access a network. RADIUS servers receive authentication requests from RADIUS clients, such as routers, firewalls, or VPNs. The RADIUS server verifies the user’s credentials and returns an authorization decision to the client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RST

A

RST (reset) is a TCP flag that is used to terminate a connection when the sender senses that something has gone wrong with the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FIN

A

FIN (finish) is a TCP flag that is used to request that a connection be terminated. This usually occurs at the end of a session and allows the system to release the system resources that were previously reserved for this connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SYN/ACK

A

SYN (synchronize) and ACK (acknowledge) are TCP flags used during the TCP three-way handshake at the beginning of a connection.

Sender: SYN
Receiver: SYN-ACK
Sender: ACK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Port security

A

Also known as MAC learning or Sticky MAC, this type of port security allows a switch to remember dynamically learned MAC addresses when the switch or interface is restarted or goes offline. The switch will only allow the computer with the original MAC address to connect via that switchport.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NetBIOS

A

NetBIOS, similar to DNS, allows primarily Windows machines to connect to each other by using a name rather than an IP address.

The “nbtstat -R” command will purge and reload the cached name table from the LMHOST file on their Windows workstation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

eDiscovery

A

A form of digital investigation that attempts to find evidence in email, business communications and other data that could be used in litigation or criminal proceedings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DOCSIS modem

A

DOCSIS modems are cable modems that use coaxial cable with an F connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Analog modem

A

Analog modems convert digital computer signals to tones that can be carried over POTS (telephone) lines. These cables use RJ-11 connectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

UTM

A

A Unified Threat Management appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

BGP

A

Border Gateway Protocol is a type of Exterior Gateway Protocol that allows Autonomous Systems on the internet to exchange routing information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Geo-IP

A

Geo-IP/Geolocation identifies the country of origin of a host based on IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.1q

A

802.1q is a standard that allows traffic from several different VLANs to be transmitted across one trunk port. The traffic is then split up and appropriately sent to the correct VLANs once it reaches the other switch.

Trunking allows VLANs to be split up across separate physical switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RDP port number

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

802.11g specs

A

2.4GHz and up to 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DHCP snooping

A

DHCP snooping are techniques used to improve the security of a DHCP infrastructure. This feature determines whether traffic sources are trusted or untrusted and is used to protect against rogue DHCP servers.

On Cisco networking devices, the “show config” command will display information including whether or not DHCP snooping is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Plenum-rated cable

A

Plenum-rated cables are designed to not burn as easily as normal cables. They are meant to be used in plenum spaces, which are used for air circulation.

PVC network cables can be hazardous because they create a noxious gas when burnt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RPO

A

The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WPS Attack

A

A WPS attack is a type of attack where a hacker exploits vulnerabilities in Wi-Fi Protected Setup (WPS) to gain access to a network. The most common method is a brute force attack, where the hacker uses a password generating tool to guess the PIN associated with the access point.

There are only 100 million possible PINs for WPS and and a design flaw exists that essentially lowers the number of possible PINs even further.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ipconfig /release
ipconfig /renew

A

These commands are used together in order to get a new dynamic IP address from the DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fusion splicer

A

Tool that joins two pieces of fiber optic cable together. This is used to repair breaks or simply make extra-long cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

802.11a specs

A

5GHz at up to 54 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

802.11b specs

A

2.4GHz and up to 11 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Emergency change management

A

An emergency change approval board (ECAB) can be executed extremely quickly to gain approval, and then the documentation can be completed after the change is made.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

802.11n specs

A

2.4GHz and up to 108 Mbps.
5.0GHz and up to 600 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Type 1 hypervisor

A

Sits on top of bare-metal server hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Wiring diagram

A

Wiring diagrams clearly label which cables are connected to which ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

802.11ac specs

A

5GHz and up to 5.5Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Syslog levels

A

0 - Emergency: The system is unusable
1 - Alert: Immediate action is needed
2 - Critical: Critical conditions
3 - Error: Error conditions
4 - Warning: Warning conditions
5 - Notice: Normal but significant condition
6 - Informational: Informational messages
7 - Debug: Debug-level messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Wardriving

A

Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

authPriv

A

authPriv is an SNMPv3 option that ensures communications are sent with authentication (via MD5 and SHA) and encryption (DES and AES).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

802.3af

A

Defines the Power over Ethernet (PoE) standard.

15.4W of DC power to each device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

802.1x

A

A network authentication protocol that opens ports for network access when an organization authenticates a user’s identity (usually RADIUS) and authorizes them for access to the network.

This is commonly used in captive portals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Dynamic ARP Inspection

A

Dynamic ARP Inspection allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Time-division multiplexing

A

Allows for two or more signals or bitstreams to be transferred in what appear to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel.
This technology, used in single PRI (ISDN or T-1) services, allows video calls, data, and other network services to be transmitted over the circuits of the traditional PSTN (Public Switched Telephone Network).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

LDAP port

A

Lightweight Directory Access Protocol runs on port 389.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

SNMP

A

Simple Network Management Protocol uses UDP ports 161 and 162.

A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol and refers to a specific device setting and its status.

OIDs point to network objects stored in a database called the Management Information Base (MIB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

LACP

A

The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

OSPF

A

Open Shortest Path First is a dynamic link-state routing protocol. OSPF is an Interior Gateway Protocol and does support IPv4 and VLSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Crossover cable

A

A crossover cable is said to connect “like devices to like devices.” In practice, they’re used to connect PCs to other PCs and routers to PCs.

On a cable tester, the wires would appear to cross over each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Patch/straight-through cable

A

A patch cable will connect switches/hubs to routers/PCs.

On a cable tester, the wires would appear to go straight from one end to the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Rollover cable

A

A rollover cable is used to connect directly to a device’s console port to make programming changes to the device.

On a cable tester, the wires would appear to go from one pin to the opposite pin (as if reflected in a mirror).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NAC

A

Network Access Control is a cybersecurity technique that restricts unauthorized users and devices from accessing a private network. NAC is a set of rules, protocols, and processes that govern access to network-connected resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SIEM

A

A security information and event management (SIEM) system provides real-time analysis of security alerts generated by applications and network hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

TACACS+

A

TACACS+ is a Cisco proprietary AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices. TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

OTDR

A

An Optical Time Domain Reflectometer is used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximate location for the break in meters or feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

LDAPS

A

Lightweight Directory Access Protocol Secure (LDAPS) uses port 636 and is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network that is encrypted using an SSL or TLS connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

NDA

A

A non-disclosure agreement (NDA) is a documented agreement between two parties that define what data is considered confidential and cannot be shared outside of that relationship. An NDA is used to protect an organization’s intellectual property.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

SQLNet/Net8

A

SQLNet uses port 1521, and is a relational database management system developed by Oracle that is fully compatible with the structured query language (SQL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

ATM

A

ATM (Asynchronous Transfer Mode) networks operate at OSI layer 2 and use cells rather than frames. Cells have a shorter length (53 octets or bytes) that allows for faster switching of the cells across the network.

ATM is sometimes found in SONET networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

WPA

A

Wi-Fi Protected Access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Bandwidth

A

Bandwidth is the maximum rate of data transfer across a given network. Bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

WINS server

A

The Windows Internet Name Service (WINS) can accept NetBIOS name registrations and queries. WINS servers maintain a database of NetBIOS name to IP address mappings for WINS clients on the network and speed up NetBIOS name resolution by eliminating broadcasts.

WINS servers do not use the same FQDNs that DNS servers do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Degaussing

A

Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Signal-to-noise ratio

A

Compares the level of a desired signal to the level of background noise. A high SNR on a wireless network is good and means faster speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Pre-action fire suppression system

A

A pre-action system minimizes the risk of accidental release from a wet pipe system. With a pre-action system, both a detector actuation like a smoke detector and a sprinkler must be tripped prior to water being released.

59
Q

Multimeter

A

A multimeter is a measuring instrument that can measure the voltage, resistance (ohms), and amperage of a cable or conduit.

60
Q

Jitter

A

Jitter is a network condition that occurs when a time delay in the sending of data packets over a network connection occurs. A jitter is simply a variation in the delay of the packets, and this can cause some strange side effects, especially for voice and video calls.

61
Q

Control Plane Policing (CoPP)

A

Control Plane Policing (CoPP) is a Quality of Service (QoS) mechanism, primarily on Cisco equipment, that protects a device’s route processor from unnecessary traffic. It allows users to configure a QoS filter that manages the traffic flow of control plane packets. This protects the control plane from malicious network attacks like Denial of Service (DoS) attacks.

62
Q

5G

A

5G cellular technology is made up of three different types: low-band, mid-band, and high-band mmWave technology. Low-band 5G reaches an average speed of 55 Mbps with a theoretical speed of 150 Mbps. Mid-band 5G reaches an average speed of 150 Mbps with a theoretical speed of 1.5 Gbps. High-band 5G reaches an average speed of 3 Gbps with a theoretical speed of up to 70 Gbps.

63
Q

MPLS

A

Multi-protocol label switching (MPLS) is a mechanism used within computer network infrastructures to speed up the time it takes a data packet to flow from one node to another. The label-based switching mechanism enables the network packets to flow on any protocol. This is commonly used in WANs.

64
Q

Giant

A

A giant is any Ethernet frame that exceeds the 802.3 frame size of 1518 bytes.

65
Q

Runt

A

A runt is an ethernet frame that is less than 64 bytes in size.

66
Q

CRC

A

Cyclic Redundancy Checksum (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data as it transits the network. If the checksum generated by the sender doesn’t match the one calculated by this interface upon receipt, a CRC error is counted and the packet is rejected.

67
Q

Piggybacking

A

A piggybacking attack is a social engineering attempt by cyber threat actors in which they trick employees into helping them gain unauthorized access into the company premises. The big difference between tailgating and piggybacking is permission (piggybackers are given permission by authorized personnel).

68
Q

Convergence

A

In a converged network, all routers “agree” on what the network topology looks like.

This occurs in networks that use dynamic routing.

69
Q

IP scanner

A

An IP scanner is used to monitor a network’s IP address space in real-time and identify any devices connected to the network. Essentially, the tool will send a ping to every IP on the network and then creates a report of which IP addresses sent a response.

70
Q

Port scanner

A

A port scanner is used to determine which ports and services are open and available for communication on a target system.

71
Q

Netflow analyzer

A

A NetFlow analyzer is used to perform monitoring, troubleshooting, inspection, interpretation, and synthesis of network traffic flow data. They can calculate metrics like bandwidth utilization, top talkers, top applications, and protocols.

72
Q

Hub and spoke topology

A

Similar to a star topology but referring to a WAN.

73
Q

VNC

A

VNC (virtual network computing) is a remote access tool and protocol, similar to Microsoft’s RDP. It is used for screen sharing on Linux and macOS.

74
Q

Patch antenna

A

A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern. Patch antennas can be directional or omnidirectional.

75
Q

Whip antenna

A

A whip antenna is a vertical omnidirectional antenna that is usually utilized in indoor environments. A whip antenna is omnidirectional and cannot be used for directional use cases.

76
Q

Optical link budget

A

An optical link budget is a calculation that considers all the anticipated losses along the length of a fiber optic connection. Signal loss across a fiber optic cable occurs naturally due to the distance of the cable, as well as from losses due to multiplexing, bends in the cable, imperfect connections, patches, or splices along the fiber optic cable.

77
Q

Base-S Ethernet standards

A

Any Ethernet standard that contains Base-S signifies a short range connection that uses MULTIMODE fiber.

78
Q

Dirty fiber optic connectors

A

When fiber optic connectors become dirty, signal loss can cause severe problems and performance issues. Something as simple as oil from a technician’s hand can render a fiber connector dirty and cause a loss of signal. The technician would need to use appropriate cleaning cloth to clean the dirty connectors and restore the service.

79
Q

POP3 port number

A

TCP 110

80
Q

POP3 over SSL/TLS port number

A

TCP 995

81
Q

RS-232

A

RS-232 is a standard for serial communication transmission of data. A DB-9 connector is often found on a rollover or console cable and is used to connect a router to a laptop using the RS-232 serial transmission protocol for configuring a network device.

82
Q

Route poisoning

A

Route poisoning is a method to prevent a router from sending packets through a route that has become invalid within computer networks. This is achieved by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable.

83
Q

Virtual terminal limit

A

You can set a limit of how many virtual terminals can simultaneously remotely connect to a switch. The default virtual terminal limit is 32 on Cisco devices, but you can configure it to allow between 1 and 64 simultaneous connections.

84
Q

DWDM

A

Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used to increase bandwidth in MANs (metropolitan area networks). DWDM uses as many as 32 light wavelengths on a single fiber, where each wavelength can support as many as 160 simultaneous connections.

85
Q

Application-aware firewall

A

An application-aware firewall can make decisions about what applications are allowed or blocked by a firewall, as opposed to simply using IP addresses and port numbers.

This differs from stateful/stateless inspection firewalls which do not operate at OSI layers 6 or 7.

86
Q

Kerberos

A

Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet. Kerberos uses strong encryption to protect its information.

87
Q

Captive portal

A

A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a wireless network before they are granted broader access to network resources.

In general, captive portals are implemented by using an HTTP redirect, an ICMP redirect, or a DNS redirect.

88
Q

Discovery protocols

A

Discovery protocols such as SNMP, LLDP (Link Layer Discovery Protocol) and ping are able to get detailed information such as the IP addresses, system version, and device information from supporting devices directly.

89
Q

Bluejacking

A

Bluejacking is when an attacker sends unsolicited messages to a victim’s Bluetooth-enabled device.

90
Q

Snort

A

Snort is a network based intrusion detection system. Snort will check the packets against all of the IDS alert rules before sending out alerts and allowing the packet to continue its journey.

91
Q

T-568A

A

white/green, green, white/orange, blue, white/blue, orange, white/brown, brown

Crossover cables use T-568A on one side and T-568B on the other side.

92
Q

T-568B

A

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown

Straight-through cables use T-568B on both ends.

93
Q

Deauthentication attack

A

A deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point by sending a deauthentication frame to the victim’s machine. This causes the wireless client to disconnect from the wireless network and then reconnect. During that reconnection, an attacker can conduct a packet capture of the authentication handshake and use that to attempt to brute force the network’s pre-shared key.

94
Q

show route

A

The “show route” command is used on a Cisco networking device to display the current state of the routing table for a given network device. To determine if Ethernet0/0 is connected using OSPF or EIGRP, you would need to use the “show route” command to display the current status.

95
Q

Frequency jamming

A

Frequency jamming is the disruption of radio signals through the use of an over-powered signal in the same frequency range. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.

96
Q

nmap

A

nmap, or Network Mapper, is a cross-platform, open-source tool used to scan IP addresses and ports on a target network, and to detect running services, applications, or operating systems on that network’s clients, servers, and devices.

97
Q

SRV

A

A DNS service (SRV) record specifies a host and port for specific services such as voice over IP (VoIP), instant messaging, and others.

98
Q

PTR

A

PTR records are used for the Reverse DNS (Domain Name System) lookup. Using the IP address, you can get the associated domain/hostname. An A record should exist for every PTR record.

99
Q

SOA

A

A Start of Authority (SOA) resource record indicates which Domain Name System (DNS) server is the best source of information for the specified domain.

100
Q

Repeater

A

A repeater is a networking device that receives a signal and then rebroadcasts it to extend the distance covered by a network. A repeater can operate either as a wired or wireless repeater.

101
Q

VDI

A

Virtual Desktop Infrastructure (VDI) is a software technology that separates the desktop environment from the physical client device that is used to access it. VDI hosts desktop environments on a centralized server and deploys them to end-users on request. The desktop images run within virtual machines (VMs) and are delivered to end clients over a network.

102
Q

DOCSIS cable

A

Data Over Cable Service Interface Specification (DOCSIS) is used to connect a client’s local area network to a high-bandwidth internet service provider over an existing coaxial/HFC cable TV system.

HFC stands for hybrid fiber-coaxial.

103
Q

Fiber light meter

A

A fiber light meter, also known as an optical power meter, is used to measure the power in an optical signal over a fiber optic cable. A fiber light meter could be used to test if the cable is broken, but it would not be able to determine where the break in the fiber cable is located.

104
Q

RTP

A

The Real-time Transport Protocol (RTP) is a network protocol that delivers audio and video over IP networks. It’s used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services, and web-based push-to-talk features.

105
Q

ESD

A

Electrostatic discharge (ESD) is a sudden transfer of electric charge between two objects, such as a human and a computer component. ESD can damage sensitive electronic parts, such as the motherboard, CPU, RAM, or hard drive, by creating tiny holes or burns in their circuits.

106
Q

TXT

A

The DNS text (TXT) record lets a domain administrator enter text into the Domain Name Systems. The TXT record was originally intended as a place for human-readable notes. However, now it is also possible to put some machine-readable data into TXT records. TXT records are a key component of several different email authentication methods (SPF, DKIM, and DMARC) that help an email server determine if a message is from a trusted source.

107
Q

RAS

A

A remote access server (RAS) or remote desktop gateway is a type of server that provides a suite of services to connect users to a network or the Internet remotely.

108
Q

DNSSEC

A

The Domain Name System Security Extensions (DNSSEC) is a suite of extension specifications by the Internet Engineering Task Force for securing data exchanged in the Domain Name System in Internet Protocol networks.

109
Q

Teredo tunneling

A

Teredo is a transition technology that gives full IPv6 connectivity for IPv6-capable hosts that are on the IPv4 Internet but have no native connection to an IPv6 network.

110
Q

iSCSI

A

iSCSI stands for Internet Small Computer System Interface. It’s a storage area networking (SAN) protocol that allows you to send block storage from storage arrays or devices to client computers.

iSCSI network performance can be improved by enabling jumbo frames (over 1500 bytes).

111
Q

mGRE

A

Multipoint GRE (mGRE) is a protocol that can be used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network. The mGRE protocol is often used in Dynamic Multipoint VPN (DMVPN) connections.

112
Q

QoS

A

Quality of Service (QoS) is a traffic control process that helps companies adjust their overall network traffic based on the requirements of specific time-sensitive applications. QoS reduces common quality degradation issues such as: Packet loss, Network jitter, High latency. QoS can prioritize specific high-performance applications.

Quality of Service usually operates at either Layer 2 or Layer 3 of the OSI model, depending on if you are using CoS (layer 2) or DSCP (layer 3).

113
Q

Non-persistent agent

A

In a NAC environment, a non-persistent agent is used to access the device during a one-time check-in at login. The non-persistent agent is software the client runs (usually from a browser) as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect.

114
Q

CSU/DSU

A

A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that converts digital data frames from the communications technology used on a local area network (LAN) into frames appropriate to a wide-area network (WAN) and vice versa. A CSU/DSU is used to terminate a T1 connection at the customer’s site.

115
Q

Zero trust

A

Zero-trust is a security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

116
Q

PPTP

A

Point-to-Point Tunneling Protocol (PPTP) is an obsolete network protocol that is rarely used today. It was originally designed to create an encrypted tunnel across dial-up connections. PPTP is considered obsolete because it has many known security issues.

117
Q

OC-12

A

OC-12 is a type of fiber optic cable.

118
Q

NFC

A

Near-Field Communication (NFC) is a set of communication protocols for communication between two electronic devices over a distance of 4 cm or less. NFC is used with payment systems like Apple Pay, Samsung Pay, and Google Pay since it supports two-way communication, unlike RFID which only supports one-way data transfers.

119
Q

RFID

A

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects.

120
Q

MX

A

An MX record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic.

121
Q

CNAME

A

A CNAME record is a canonical name or alias name, which associates one domain name as an alias of another (like beta.diontraining.com and www.diontraining.com could refer to the same website using a CNAME).

122
Q

Asymmetric Routing

A

Asymmetric routing is when network packets leave via one path and return via a different path (unlike symmetric routing, in which packets come and go using the same path).

123
Q

Duplicate MAC address

A

A duplicate MAC address occurs when two or more devices are responding to data requests as if they are the only device on the network with that physical address. One indication of this occurring is when a switch continually changes the port assignments for that address as it updates its content-addressable memory (CAM) table to reflect the physical address and switchport bindings.

This will cause the switchports to continually flap by going up and down as the assignments are updated within the CAM table.

124
Q

Statement of Work

A

A Statement of Work (SOW) is a document that outlines all the work that is to be performed, as well as the agreed-upon deliverables and timelines.

125
Q

DHCP port numbers

A

UDP 67 (server)
UDP 68 (client)

126
Q

SSH port number

A

TCP 22

127
Q

Telnet port number

A

TCP 23

128
Q

Signal reflection

A

Metal and glass are considered highly reflective materials which can cause poor cellular service and connectivity within office buildings that use intricately designed glass walls and ceilings. If a large amount of reflection occurs, signals can be weakened and cause interference at the receiver’s device. In addition to reflection, some of the radio waves can also pass through the glass and refract into different directions of travel. Both reflection and refraction can decrease the signal strength between the transmitter and the receiver.

129
Q

Traffic shaping

A

Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds.

130
Q

WAF

A

A web application firewall (WAF) is a security tool that protects web applications from cyber threats, vulnerabilities, and attacks. WAFs monitor and filter HTTP traffic between a web application and the internet.

131
Q

Crosstalk

A

Crosstalk is defined as an effect caused by the unintentional and undesired transmission (leakage) of a signal from one cable to another. When abused, a cable’s shielding could be damaged and the cable may no longer be made up of the same consistency, leading to crosstalk.

Crosstalk can also occur when cable pairs are not completely twisted.

132
Q

IGMP snooping

A

IGMP stands for Internet Group Management Protocol. It’s a layer 3 protocol that allows multiple devices to share an IP address and receive the same data. IGMP is used to set up multicasting on networks that use the Internet Protocol version 4 (IPv4).

133
Q

T1

A

T1 can transmit 24 telephone calls at a time because it uses a digital carrier signal (DS-1). DS-1 is a communications protocol for multiplexing the bit streams of up to 24 telephone calls simultaneously. The T1’s maximum data transmission rate is 1.544 Mbps.

134
Q

Switch spoofing

A

Switch spoofing is when an attacker configures their machine to report itself as a switch. This is usually done as a way to hop VLANs.

135
Q

DLP

A

Data loss prevention (DLP) systems are used to ensure that end-users do not send sensitive or critical information outside the corporate network. These DLP products help a network administrator control what data end users can transfer.

136
Q

DNS port number

A

53

137
Q

Split horizon

A

A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.

138
Q

IP helper

A

DHCP IP Helper addresses enable a single DHCP server to provide DHCP IP addresses to every PC on the network, regardless of whether they are on the same broadcast domain as the DHCP server or not.

139
Q

3G

A

3G cellular technology is made up of two different technologies: HSPA+ and EV-DO. HSPA+ (Evolved High-Speed Packet Access) is a 3G standard used for GSM cellular networks and can support up to a theoretical download speed of 168 Mbps and a theoretical upload speed of 34 Mbps. EV-DO (Evolution-Data Optimized) is a 3G standard used for CDMA cellular networks and can support up to 3.1 Mbps downloads.

140
Q

Autonomous system number

A

An ASN (or Autonomous System Number) is used to control routing with BGP routing protocols to route traffic across the network. An Autonomous System (AS) is a group of one or more IP prefixes (lists of IP addresses accessible on a network) run by one or more network operators that maintain a single, clearly defined routing policy. Network operators need Autonomous System Numbers (ASNs) to control routing within their networks and to exchange routing information with other Internet Service Providers (ISPs).

141
Q

SCADA

A

SCADA (supervisory control and data acquisition) networks work off an ICS (industry control system) and maintain sensors and control systems over large geographic areas.

142
Q

CCMP

A

CCMP, also known as AES CCMP, is the encryption mechanism that has replaced TKIP, and it is the security standard used with WPA2 wireless networks.

143
Q

hostname

A

The hostname command is used to view or change a computer’s hostname and domain. On a Windows system, the hostname, computer name, and NetBIOS name are all the same.

144
Q
A