Dion N10-008 Practice Test #1 Flashcards
What type of network device operates at layer 1 of the OSI model and requires connected devices to operate at half-duplex using CSMA/CD?
Hub
CSMA/CD
Carrier Sense Multiple Access / Collision Dection
The collision recovery procedure can be likened to what happens at a dinner party, where all the guests talk to each other through a common medium (the air). Before speaking, each guest politely waits for the current speaker to finish. If two guests start speaking at the same time, both stop and wait for short, random periods of time (in Ethernet, this time is measured in microseconds). The hope is that by each choosing a random period of time, both guests will not choose the same time to try to speak again, thus avoiding another collision.
Why Half-Duplex?
What is the network ID associated with the host located at 192.168.0.123/29?
192.168.0.120
/29 means the subnet will have 8 IP address (32-29=3. 2^3 = 8 address, 2^3 - 2 = 6 hosts)
Since the address go up to 256, subtract 8 from 256 a bunch of times (17 times for this example, getting to 120-128, until you get to the range the host is located in
Analog Modem
Converts digital signals to analog tones, which can be carried over analog telephone lines (DSL being another type that is carried over telephone connection - uses RJ11)
DOCSIS Modem
Coaxial cable modem with F type connector, transmits data over the existing cable television lines
What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?
An evil twin - masquerades as a legitimate WiFi access point
This is considered an On-Path attach
ARP Spoofing
an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host, SUCH AS THE DEFAULT GATEWAY, causing any traffic meant for that IP address to be sent to the attacker instead.
LDAP (Lightweight Directory Access Protocol) Port
389
SLP (Service Location Protocol)
protocol or method of organizing and locating the resources (such as printers, disk drives, databases, email directories, schedulers, etc.) in a network - alternative to LDAP in newer networks - uses port 427
What happens to data as it travels from Layer 1 to Layer 7 in the OSI Model
De-encapsulation
in order to be at Layer 1, the data would have needed to already have been encapsulated in order to travel to Layer 7
fdx
full duplex
Severity Level 0
Emergency
most severe
Severity Level 3
error
Severity Level 4
warning
Severity Level 1
alert
Severity Level 6
information
Severity Level 2
critical condition
Severity Level 7
debugging
Microsoft SQL port
1433
MySQL port
3306
SQLnet port
1521
how to request a new IP address on the command line , i.e. if two machines have the same one
ipconfig /release | ipconfig /renew
only doing ipconfig /renew would renew the exisiting DHCP lease
NAC
Network Access Control
It is an APPROACH to network security, with Port Security being an example of a NAC
Port Security
Also known as Persistent MAC - used with ports - only allows network connection to the computer with the original MAC address
SMF
Single Mode Fiber
nbstat -R
purge and reload the cache name table from the LMHOST file on a windows workstation
used when trying to connect to a windows server using NetBIOS, which stores a local cached name table in LMHOSTS file on each client – so if an entry in a client’s file is pointing to the wrong IP, it would cause a connectivity issue and this command would reload the cached name table
RTO
Recovery Time Objective
Duration of time and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences associated with a break in continuity
What technology combines with functionality of a firewall, malware scanner and other security appliances into one device?
UTM
(On the practice test, other options are IPS and IDS. These are SYSTEMS, and the question asks for a DEVICE)
SMB port
139 and 445
NTP port
123
Network Time Protocol
The Network Time Protocol goes 123
IMAP Port
143
Syslog port
514
RST Flag
Used in TCP connections when the sender feels something has went wrong and wants to terminate the connection
used for something ‘bad’ (unlike FIN in TCP (?))
SNMPv3 options
AuthPriv - authenticate and encrypt traffic
AuthNoPriv - no authentication and no encryption