Dion Flashcards
Broadcast domain
Routers break up broadcast domains.
All ports on hubs and switches are in the same broadcast domain.
Collision domain
Switches and routers break up collision domains.
All ports on a hub are in the same collision domain.
RADIUS
A RADIUS (Remote Authentication Dial-In User Service) server is a central server that authenticates and authorizes remote users who access a network. RADIUS servers receive authentication requests from RADIUS clients, such as routers, firewalls, or VPNs. The RADIUS server verifies the user’s credentials and returns an authorization decision to the client.
RST
RST (reset) is a TCP flag that is used to terminate a connection when the sender senses that something has gone wrong with the connection.
FIN
FIN (finish) is a TCP flag that is used to request that a connection be terminated. This usually occurs at the end of a session and allows the system to release the system resources that were previously reserved for this connection.
SYN/ACK
SYN (synchronize) and ACK (acknowledge) are TCP flags used during the TCP three-way handshake at the beginning of a connection.
Sender: SYN
Receiver: SYN-ACK
Sender: ACK
Port security
Also known as MAC learning or Sticky MAC, this type of port security allows a switch to remember dynamically learned MAC addresses when the switch or interface is restarted or goes offline. The switch will only allow the computer with the original MAC address to connect via that switchport.
NetBIOS
NetBIOS, similar to DNS, allows primarily Windows machines to connect to each other by using a name rather than an IP address.
The “nbtstat -R” command will purge and reload the cached name table from the LMHOST file on their Windows workstation.
eDiscovery
A form of digital investigation that attempts to find evidence in email, business communications and other data that could be used in litigation or criminal proceedings.
DOCSIS modem
DOCSIS modems are cable modems that use coaxial cable with an F connector.
Analog modem
Analog modems convert digital computer signals to tones that can be carried over POTS (telephone) lines. These cables use RJ-11 connectors.
UTM
A Unified Threat Management appliance enforces a variety of security-related measures, combining the work of a firewall, malware scanner, and intrusion detection/prevention.
BGP
Border Gateway Protocol is a type of Exterior Gateway Protocol that allows Autonomous Systems on the internet to exchange routing information.
Geo-IP
Geo-IP/Geolocation identifies the country of origin of a host based on IP address.
802.1q
802.1q is a standard that allows traffic from several different VLANs to be transmitted across one trunk port. The traffic is then split up and appropriately sent to the correct VLANs once it reaches the other switch.
Trunking allows VLANs to be split up across separate physical switches.
RDP port number
3389
802.11g specs
2.4GHz and up to 54 Mbps
DHCP snooping
DHCP snooping are techniques used to improve the security of a DHCP infrastructure. This feature determines whether traffic sources are trusted or untrusted and is used to protect against rogue DHCP servers.
On Cisco networking devices, the “show config” command will display information including whether or not DHCP snooping is enabled.
Plenum-rated cable
Plenum-rated cables are designed to not burn as easily as normal cables. They are meant to be used in plenum spaces, which are used for air circulation.
PVC network cables can be hazardous because they create a noxious gas when burnt.
RPO
The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.
WPS Attack
A WPS attack is a type of attack where a hacker exploits vulnerabilities in Wi-Fi Protected Setup (WPS) to gain access to a network. The most common method is a brute force attack, where the hacker uses a password generating tool to guess the PIN associated with the access point.
There are only 100 million possible PINs for WPS and and a design flaw exists that essentially lowers the number of possible PINs even further.
ipconfig /release
ipconfig /renew
These commands are used together in order to get a new dynamic IP address from the DHCP server.
Fusion splicer
Tool that joins two pieces of fiber optic cable together. This is used to repair breaks or simply make extra-long cables.
802.11a specs
5GHz at up to 54 Mbps.
802.11b specs
2.4GHz and up to 11 Mbps.
Emergency change management
An emergency change approval board (ECAB) can be executed extremely quickly to gain approval, and then the documentation can be completed after the change is made.
802.11n specs
2.4GHz and up to 108 Mbps.
5.0GHz and up to 600 Mbps.
Type 1 hypervisor
Sits on top of bare-metal server hardware.
Wiring diagram
Wiring diagrams clearly label which cables are connected to which ports.
802.11ac specs
5GHz and up to 5.5Gbps
Syslog levels
0 - Emergency: The system is unusable
1 - Alert: Immediate action is needed
2 - Critical: Critical conditions
3 - Error: Error conditions
4 - Warning: Warning conditions
5 - Notice: Normal but significant condition
6 - Informational: Informational messages
7 - Debug: Debug-level messages
Wardriving
Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone.
authPriv
authPriv is an SNMPv3 option that ensures communications are sent with authentication (via MD5 and SHA) and encryption (DES and AES).
802.3af
Defines the Power over Ethernet (PoE) standard.
15.4W of DC power to each device.
802.1x
A network authentication protocol that opens ports for network access when an organization authenticates a user’s identity (usually RADIUS) and authorizes them for access to the network.
This is commonly used in captive portals.
Dynamic ARP Inspection
Dynamic ARP Inspection allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings.
Time-division multiplexing
Allows for two or more signals or bitstreams to be transferred in what appear to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel.
This technology, used in single PRI (ISDN or T-1) services, allows video calls, data, and other network services to be transmitted over the circuits of the traditional PSTN (Public Switched Telephone Network).
LDAP port
Lightweight Directory Access Protocol runs on port 389.
SNMP
Simple Network Management Protocol uses UDP ports 161 and 162.
A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol and refers to a specific device setting and its status.
OIDs point to network objects stored in a database called the Management Information Base (MIB).
LACP
The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.
OSPF
Open Shortest Path First is a dynamic link-state routing protocol. OSPF is an Interior Gateway Protocol and does support IPv4 and VLSM.
Crossover cable
A crossover cable is said to connect “like devices to like devices.” In practice, they’re used to connect PCs to other PCs and routers to PCs.
On a cable tester, the wires would appear to cross over each other.
Patch/straight-through cable
A patch cable will connect switches/hubs to routers/PCs.
On a cable tester, the wires would appear to go straight from one end to the other.
Rollover cable
A rollover cable is used to connect directly to a device’s console port to make programming changes to the device.
On a cable tester, the wires would appear to go from one pin to the opposite pin (as if reflected in a mirror).
NAC
Network Access Control is a cybersecurity technique that restricts unauthorized users and devices from accessing a private network. NAC is a set of rules, protocols, and processes that govern access to network-connected resources.
SIEM
A security information and event management (SIEM) system provides real-time analysis of security alerts generated by applications and network hardware.
TACACS+
TACACS+ is a Cisco proprietary AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices. TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.
OTDR
An Optical Time Domain Reflectometer is used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximate location for the break in meters or feet.
LDAPS
Lightweight Directory Access Protocol Secure (LDAPS) uses port 636 and is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network that is encrypted using an SSL or TLS connection.
NDA
A non-disclosure agreement (NDA) is a documented agreement between two parties that define what data is considered confidential and cannot be shared outside of that relationship. An NDA is used to protect an organization’s intellectual property.
SQLNet/Net8
SQLNet uses port 1521, and is a relational database management system developed by Oracle that is fully compatible with the structured query language (SQL).
ATM
ATM (Asynchronous Transfer Mode) networks operate at OSI layer 2 and use cells rather than frames. Cells have a shorter length (53 octets or bytes) that allows for faster switching of the cells across the network.
ATM is sometimes found in SONET networks.
WPA
Wi-Fi Protected Access (WPA) is an improved encryption scheme for protecting Wi-Fi communications designed to replace WEP. WPA uses the RC4 cipher and a temporal key integrity protocol (TKIP) to overcome the vulnerabilities in the older WEP protection scheme.
Bandwidth
Bandwidth is the maximum rate of data transfer across a given network. Bandwidth is more of a theoretical concept that measures how much data could be transferred from a source to a destination under ideal conditions.
WINS server
The Windows Internet Name Service (WINS) can accept NetBIOS name registrations and queries. WINS servers maintain a database of NetBIOS name to IP address mappings for WINS clients on the network and speed up NetBIOS name resolution by eliminating broadcasts.
WINS servers do not use the same FQDNs that DNS servers do.
Degaussing
Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed.
Signal-to-noise ratio
Compares the level of a desired signal to the level of background noise. A high SNR on a wireless network is good and means faster speeds.