Exam Flashcards

1
Q

Class A IP

A

10.0.0.0 - 10.255.255.255
24 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Class B IP

A

172.16.0.0 - 172.31.255.255
20 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Class C IP

A

192.168.0.0 - 192.168.255.255
16 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11a

A

5 GHz
54 Mbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.11b

A

2.4 GHz
11 Mbit/s
better range than A, more frequency conflict

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11g

A

2.4 Ghz
- 54 Mbit/s
-backwards compatible with b
- frequency conflicts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11n

A
  • 5 GHz / 2.4
  • 600 Mbit/s
    -MIMO
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11ac

A

5 GHz
- up to 160 MHz
- increased channel bonding
faster data transfer
- MU-MIMO
- 6.9 Gbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11ax

A

wifi 5
- 5 GHz / 2.4 GHz
- 1201 megabits/s
- MU-MIMO
orthogonal frequency division
9.6 Gbit/s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PRTG

A

a lightweight standalone tool which will allow the administrator to easily scan for IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process?

A

two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sender Policy Framework (SPF)

A

TXT-based record that lists IP addresses or names of servers that can send email from a particular domain and combats sending of span

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SRV (service record)

A

contains service name and port for a particular application
- locates VoIP or media servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MX record

A

identifies email server for the domain
- must have associated A or AAAA record, not point to CNAME

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ICANN manage?

A

generic top level domains, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

recursive lookup

A

server queries other name servers until it finds requested record or times out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

iterative lookup

A

name server responds to query with either requested record or the address of a name server at lower level in hierarchy that is authoritative for the namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

one DHCP server for multiple subnets

A
  • DHCP relay: forwarding DHCP traffics between subnets
  • UDP forwarding: more general application of DHCP relay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP port

A

143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP

A

port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SMTPS

A

587

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

POP3 port

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

POP3 SSL

A

995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IMAP SSL

A

port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

active FTP

A

client sends PORT command specifying chosen port and server opens data connection between that port and TCP port 20 on server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RTCP

A

session on each RTP stream that monitors the quality of the connection and provides reports that the network stacks can use to tune QoS parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SIP

A
  • session initiation protocol
  • end user devices such as IP-enabled handsets or client and server web conference software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Microsoft SQL server port

A

TCP 1433
- allows clients to connect to database server over network and allow replication traffic to move between database servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

WSD/Airprint

A

allows for secure connections to a print device and allows it to advertise service capabilities over the network, provides plug-and-play installation for Windows and iOS devices, and uses bidirectional status messaging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SSL/TLS port

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Telnet

A

port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SSH port

A

port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SYSLOG port

A

UDP 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SNTP

A
  • simple network time protocol
  • UDP 123
  • host that supports SNTP cannot act as time source for other hosts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Syslog alert, code 2

A

critical level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

behavioral threat research

A

narrative commentary describing examples of attacks and the tactics, techniques, and procedures (TTPs) gathered through primary research sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

reputational threat intelligence

A

consists of lists of IP addresses and domains associated with malicious behavior and signatures of known file-based malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

TACACS+

A

TCP 49

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

process assessment

A

involves identifying critical systems and assets that support mission essential functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Bastion servers

A

hosts in perimeter and not fully trusted
- proxy and web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

CPE

A
  • customer premises equipment
  • equipment owned, managed, and supported by the customer as it falls beyond the demarcation point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

CWDM

A
  • coarse wavelength division multiplexing
  • supports up to 16 wavelengths and typically deploys four or eight bidirectional channels over a single fiber strand.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

WDM

A
  • wavelength division multiplexing
  • a means of using a strand to transmit or receive more than one channel at a time.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

BiDi

A
  • bidirectional
  • support, transmit, and receive signals over the same strand of fiber. This uses WDM to transmit the transmit (Tx) and receive (Rx) signals over slightly shifted wavelengths.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

DWDM

A
  • dense wavelength division multiplexing
  • provisions a greater number of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

cable crimper

A

creates a patch cord that fixes a plug to a cable. The tools are specific to the type of connector and cable, although some have modular dies supporting a range of RJ-type plugs. Many crimpers also come with cable stripping capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

block tool

A

terminates a group of connectors in one action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

punchdown tool

A

terminates a fixed cable and fixes conductors into an IDC. There are different IDC formats (66, 110, BIX, and Krone) that require different blades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

APC

A

Angled Physical Contacts (APCs) make for an even tighter connection and better return loss performance. APCs cannot mix with PC faces or UPCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

UPC

A

the cable and connector are polished to a higher standard than with PC.
- ultra physical contact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

PC (physical contact)

A

faces of the connector and fiber tip are polished so that they curve slightly and fit together better, reducing return loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Demarcs

A

special types of equipment rooms marking the point at which external cabling (located outside the plant) joins to the internal cabling (located on the premises).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

cladding

A

reflects signals back into the waveguide as efficiently as possible so that the light signal travels along the waveguide by multiple internal reflections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

stackable switches

A

switches can connect together and operate as a group. The sysadmin can manage the switch stack as a single unit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

NIC teaming/port aggregation

A

combines two or more separate cabled links into a single logical channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IGRP

A
  • interior gateway routing
  • older routing protocol, which is classful. Classful routing protocols do not carry subnet masks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

RIPv2 (routing internet protocol)

A

dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting. The Internet has shifted towards a hierarchical routing structure by reengineering classful schemes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

EIGRP

A
  • enhanced interior gateway routing protocol
  • dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting. Routers at the top of the hierarchy need to store only the high-level network prefixes.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

OSPF

A
  • open shortest path first
  • dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

BGP (border gateway protocol)

A

a path vector type that is part of the Exterior Gateway Protocol (EGP) class and runs over Transmission Control Protocol (TCP) port 179.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

SMB port

A

TCP 139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the lowest ANSI/TIA/EIA copper Ethernet cabling category available in the form of shielded/foiled twisted pair (S/FTP), and is often recommended for use in healthcare settings?

A

Cat 6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cat 6

A

support 10GBASE-T standard speeds at a distance of up to 180 ft. (55 m).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Cat 5e

A

supports a maximum speed of 1 Gbps at a maximum distance of up to 328 ft (100 m)
- 1000BASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Cat 7

A

support 10GBASE-T standard speeds at a distance of up to 328 ft (100 m).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Cat 8

A

support speeds up to 40 Gbps up to 100 ft (30 m)
- 40GBASE-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Straight tip (ST)

A

early bayonet-style connector with a twist-and-push locking mechanism. ST was primarily used for multimode networks, however, it is no longer routinely utilized in Ethernet deployments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

MTRJ

A

a small-form-factor duplex connector with a snap-in design that is used in multimode networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Local Connector (LC)

A

small-form-factor connector with a push/pull tabbed design. The LC form factor is commonly used for Gigabit Ethernet and 10/40 GbE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Subscriber Connector (SC)

A

a push/pull connector that allows for easy insertion and removal. It may be utilized in either single-mode or multimode mode. It is frequently used in Gigabit Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

WPA3

A

the Simultaneous Authentication of Equals (SAE) protocol replaces the 4-way handshake, which has been found to be vulnerable to various attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

WEP

A

old protocol that is no longer safe to use, though it does not use the SAE protocol. WEP uses an outdated RC4 stream cipher to encrypt traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

WPA

A

designed to fix critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

WPA2

A

pre-shared key (PSK) authentication uses a passphrase to generate the key that is used to encrypt communications. It is also referred to as group authentication because a group of users share the same secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

latency

A

the time it takes for a transmission to reach the recipient, measured in milliseconds (ms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

jitter

A

a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

implicit TLS protocol

A

SMTPS
- establishes the secure connection before any SMTP commands (HELO, for instance) are exchanged. This is also referred to as implicit TLS and only represents encryption at the level of the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

STARTTLS

A

command that upgrades an existing unsecure connection to TLS. This is also referred to as explicit TLS or opportunistic TLS and only represents encryption at the level of the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

ipV6 interface ID

A

last 64 digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

TCP SYN (-sS) scan

A
  • appropriate for half-open scan
  • technique is faster as the scanning host sends a SYN packet to request a connection but does not complete the handshake. This method is typically used for stealthier scans, as it is less likely to be logged.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

TCP connect (-sT) scan

A
  • complete three-way handshakes
  • more visible in logs, not half-open
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

active TAP

A

a powered device that performs signal regeneration and can capture all packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

passive TAP

A

an unpowered device that physically copies the signal from the cabling to a monitor port. The monitor port will receive every frame, however, signal regeneration is not performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Switched Port Analyzer (SPAN)

A

also known as port mirroring or port monitoring, allows the capture of network data as it flows through a network switch. Corrupt frames are dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

The control plane

A

The network makes decisions about how traffic should be prioritized and where it should be switched, which, in turn, keeps the network itself operational.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

The management plane

A

comprises traffic that allows remote administration and monitoring of network appliances, such as SSH, SNMP, NetFlow, and syslog. Management traffic is typically directed to the appliance’s loopback address.

83
Q

Recovery Point Objective (RPO)

A

the amount of data loss that a system can sustain, measured in time units.

84
Q

Maximum Tolerable Downtime (MTD)

A

states the requirement for a business function. Downtime is calculated from the sum of scheduled service intervals (Agreed Service Time) plus unplanned outages over the period.

85
Q

RTO (recovery time objective)

A

the period following a disaster that an individual IT system may remain offline

86
Q

reverse proxy server

A

provides for protocol-specific inbound traffic. Reverse proxies can publish applications from the corporate network to the Internet in this way.

87
Q

forwarding proxy server

A

provides for protocol-specific outbound traffic. A multipurpose forward proxy is one configured with filters for multiple protocol types, such as HTTP, FTP, and SMTP.

88
Q

nontransparent proxy server

A

the client must be configured with the proxy server address and port number to use it.

89
Q

transparent proxy server

A
  • AKA forced/intercepting
  • intercepts client traffic without the client having to be reconfigured. A transparent proxy must be implemented on a switch or router or other inline network appliance
90
Q

spanning tree protocol (STP)

A

allows bridges or switches to organize themselves into a hierarchy. Each switch determines the shortest path to the root bridge by exchanging information with other switches. STP information is packaged as bridge protocol data unit (BPDU) multicast frames

91
Q

Neighbor Discovery (ND)

A

performs some of the functions on an IPv6 network that ARP and ICMP perform under IPv4, such as address autoconfiguration, redirection, prefix discovery, and local address resolution.

92
Q

ARP protocol

A

task of resolving an IP address to a hardware address.

93
Q

trunk port

A

carries all the VLAN-to-VLAN traffic that must be routed

94
Q

stub resolver

A
  • acts as an intermediary between the application requiring DNS resolution and a recursive DNS resolver.
  • function of a resolver is to perform recursive queries in response to requests from client systems
95
Q

recursive DNS name servers

A

rely on authoritative DNS nameservers to tell them where to find certain domains.

96
Q

root name server

A

a name server that manages the root zone of the Internet’s Domain Name System. It directly responds to queries for root zone records and returns a list of authoritative name servers for the relevant top-level domain for all other requests.

97
Q

split tunnel VPN

A

client accesses the Internet directly using its “native” IP configuration and DNS servers

98
Q

full tunnel VPN

A

Internet access is mediated by the corporate network, which will alter the client’s IP address and DNS servers and may use a proxy.

99
Q

access/edge layer

A

allows end-user devices, such as computers, printers, and smartphones to connect to the network.

100
Q

distribution/aggregation layer

A

offers fault-tolerant linkages between distinct access blocks and either the core or other distribution blocks.

101
Q

core layer

A

provides a highly available network backbone. Routers or layer 3 switches in the core layer form a complete mesh topology with distribution layer switches

102
Q

Common Address Redundancy Protocol (CARP)

A

enables multiple hosts to share an IP address on the same network segment so that they can act as a default gateway.

103
Q

Virtual Router Redundancy Protocol (VRRP)

A

allows the automatic assignment of IP routers to act as a default gateway on a single subnet.

104
Q

Hot Standby Router Protocol (HSRP)

A

allows multiple physical routers to serve as a single default gateway for a subnet, but it is a proprietary protocol developed by Cisco.

105
Q

At what layer of the OSI model are all hosts identified by a specific MAC address?

A

Data link layer

106
Q

bridge

A

connects different networks and treats them as if they were one network

107
Q

Data Link layer

A

transfers data between nodes on the same logical segment
- ARP tables located here
- bridges

108
Q

ethernet header

A

encapsulates onto a packet at the data link layer

109
Q

IP header

A

provides logical addressing and packet forwarding between different networks
- wraps TCP segment at network layer

110
Q

mGRE (multipoint generic routing encapsulation)

A

version of GRE protocol that supports point-to-multipoint links, such as hub and spoke dynamic VPN

111
Q

Multiprotocol label switching (MPLS)

A

operates as overlay network to configure point-to-point or point-to-multipoint links between nodes

112
Q

NFV (network function virtualization)

A

provisions virtual network appliances such as switches, routers, and firewalls

113
Q

logical bus topology

A

nodes receive the data transmitted all at the same time, regardless of physical wiring layout of the network

114
Q

ad hoc topology

A

wireless adapter allows connections to and from other devices, AKA IBSS

115
Q

physical network topology

A

describes placement of nodes and how they are connected by the network media

116
Q

logical network topology

A

describes flow of data through the network regardless of its physical layout

117
Q

leased line

A

dedicated T1 or DS1 digital signal circuit

118
Q

twinaxial

A

or data center 10 GbE (unofficially referred to as 10GBASE-CR) and 40 GbE (40GBASE-CR4) interconnections of up to about 5 meters for passive cable types and 10 meters for active cable types

119
Q

SQLnet port

A

TCP 1521

120
Q

MySQL port

A

TCP 3306

121
Q

Trap command

A

used when agent informs monitor of a notable event, such as port failure

122
Q

Get command

A

used for software to query the agent for a single object identifier

123
Q

Yagi antenna

A

unidirectional signal for point-to-point wireless bridge connections
- common for outdoor use and long distances

124
Q

static dish antenna

A

parabolic or dome shaped antenna that is unidirectional
- expensive

125
Q

torus antenna

A

donut shaped
- similar to round wireless routers businesses mount in office ceiling
- not good for outdoors

126
Q

parabolic grid antenna

A
  • dome with rectangular feature with grid-like openings
  • expensive up-front and maintenance
127
Q

independent basic service set (IBSS)

A

ad hoc topology where the wireless adapter allows connections to and from other wireless devices

128
Q

SNMP trap

A

agent that informs the SNMP monitor of a notable event
- sysadmin can set threshold for triggering traps for each value

129
Q

giant

A

frame that is larger than the max permissible size (1518 bytes)

130
Q

runt

A

frame smaller than minimum size (64 bytes for ethernet)
- collision usually causes them

131
Q

baseline

A

snapshot of a known good configuration and how a device operates at that known good configuration

132
Q

link state

A

measures whether an interface is working or not
- configure link state of a given port on a switch or router to turn it on or off

133
Q

NetFlow

A

packet analyzer that can measure network traffic statistics

134
Q

bandwidth

A

total capacity to process network traffic

135
Q

Memorandum of understanding (MOU)

A

prelim or exploratory agreement to express an intent to work together

136
Q

floor plan

A

detailed diagram of wiring and port locations

137
Q

rack diagram

A

records position of each appliance in the rack

138
Q

wiring diagram

A

shows detailed info about termination of twisted pairs in RJ-45 or RJ-48C jack or IDC

139
Q

site survey

A

critical planning tool to ensure WLAN delivers acceptable data rates to supported number of devices in physical locations

140
Q

IDFs

A

intermediate distribution frames
- provide termination for access layer switches that serve a given area
- essential for distributing network connections from the MDF to specific locations or devices within a facility, ensuring comprehensive network access and efficiency in communication flow

141
Q

MDF

A
  • main distribution frame
  • location for distribution/core level internal switching
  • serves as location for termination of external WAN circuits
142
Q

mean time between failures

A
  • total operational time divided by number of failures
  • KPI measuring expected lifetime of a product
143
Q

Mean time to repair (MTTR)

A

mean time it takes to correct fault to point of restoration and recovery of network services
- KPI

144
Q

Maximum tolerable downtime (MTD)

A

states requirement for a business function, used to measure level of high availability

145
Q

cold site

A
  • takes longer to setup
  • may be an empty building with a lease agreement in place to install whatever equipment the company requires when necessary
146
Q

hot site

A

can failover almost immediately
- site is already within organization’s ownership and is ready to deploy

147
Q

warm site

A

requirement that latest data set will need to be loaded

148
Q

Cluster

A

group of servers, each known as node, that provides redundancy and fault tolerance for critical applications

149
Q

IEEE 802.1X standard

A

defines a PNAC mechanism, which means that the switch/router performs some sort of authentication of the attached device before activating the port

150
Q

PNAC

A
  • port based network access control
  • switch/router performs type of authentication of attached device before activating port
151
Q

TACACS+

A

authenticates admin access to routers and switches
- TCP port 49

152
Q

RADIUS

A

used in VPN implementation, manages remote and wireless authentication infrastructures

153
Q

on-path attack

A

form of eavesdropping where attacker makes an independent connection between two victims and steals information to use fraudulently

154
Q

deauthentication attack

A

sends a stream of spoofed de-auth frames to cause a client to deauthenticate from the AP

155
Q

DNS poisoning

A

compromises name resolution, redirects users to fraudulent sites

156
Q

ARP poisoning

A

attacker redirects IP address to MAC address of a computer that is not the intended recipient

157
Q

war driving

A

practice of using wifi sniffer to detect WLANs and then either using unsecured ones or trying to break into them with WEP and WPA cracking tools

158
Q

DRDoS attack

A
  • distributed reflection denial of service
  • adversary spoofs the victim’s IP address and attempts to open connections with servers which direct responses to the victim server, rapidly consuming bandwidth
159
Q

amplification attack

A

attacker implements an amplification factor and dramatically increases the bandwidth sent to a victim during DDoS attack

160
Q

logic bomb

A

malicious program or script set to run under particular circumstances

161
Q

pharming

A

means of redirecting users from legitimate website to malicious one
- corrupts the way the computer performs internet name resolution

162
Q

crypto-malware

A

ransomware that encrypts data files and user is unable to access files without obtaining the private encryption key

163
Q

extensible authentication protocol

A

access point that can implement a similar port-security mechanism to switches
- allows for device authentication using digital certificates

164
Q

SNMP version 3

A

supports encryption of data logs as they travel over the network to a target system like an analytics server

165
Q

private VLAN

A

applies an additional layer of segmentation by restricting the ability of hosts within a VLAN to communicate directly with one another

166
Q

control plane policing

A

policy that is designed to mitigate the risk from route processor vulnerabilities

167
Q

DHCP snooping

A

causes switch to inspect DHCP traffic arriving on access ports to ensure host is not trying to spoof its MAC address
- can be. used to prevent rogue DHCP servers from operating on the network

168
Q

out of band management

A

allows access to the network when the network is down
- can be used to remotely reboot devices

169
Q

AUX port

A

designed to connect an analog modem and provide remote access over a dial-up link

170
Q

management port

A

configuring virtual network interface and IP address on the device to use for management functions and connecting to it via one of the normal ethernet ports

171
Q

transport mode

A

used to secure communication between hosts on a private network

172
Q

tunnel mode

A

used for communication between VPN gateways across an unsecured network

173
Q

full tunnel

A

allows internet access that is mediated by the corporate network that will alter client’s IP address and DNS servers may use proxy

174
Q

IPSec

A

used to secure IPv4/6 communications on local networks and as remote access protocol

175
Q

encapsulating security payload (ESP)

A

provides confidentiality, IA, used to encrypt packet rather than simply calculating a hash
- attaches three fields to the packet, header, trailer, and integrity check

176
Q

Authentication header protocol

A

performs a cryptographic hash on the whole packet, including IP header

177
Q

cable certifier

A

used to verify that a cable meets its specifications such as bandwidth and frequency

178
Q

punchdown tool

A

assist in inserting wires into patch panels or punch down blocks

179
Q

loopback plug

A

connector used for diagnosing transmission problems on parallel and serial ports

180
Q

short

A

happens when two conductors join, usually because insulating wire is damaged or poorly wired connector

181
Q

fusion splicer

A

joins two fiber optic cables together by performing a precise alignment between the two strands and then permanently joining them

182
Q

cable crimper

A

creates a patch cord and fixes a plug to a cable
- RJ-45 connector to an ethernet cable

183
Q

optical time-domain reflectometer

A

locates breaks in fiber by sending light pulses down the cable and timing how long it takes for any reflections to bounce back from the break

184
Q

multimeter

A

testing electrical circuits

185
Q

cable tester

A

reports detailed info on cable’s physical and electrical properties, including crosstalk, attenuation, noise, and resistance

186
Q

optical spectrum analyzer (OSA)

A

ensure each channel has sufficient power

187
Q

command that displays NetFlow accounting statistics

A

show ip cache flow

188
Q

command that displays status and stats for NetFlow accounting data export

A

show ip flow-export

189
Q

command that gives network performance utility that can generate TCP and UDP traffic to test bandwidth, latency, and packet loss

A

command that displays NetFlow IP entries

190
Q

packet sniffer

A

interrogate frames received by a network adapter using a special driver
- read packets on a port and save the information to a file on disk

191
Q

packet/protocol analyzer

A

software used in conjunction with packet sniffer
- used later to examine data gathered from packet sniffer

192
Q

tcpdump command-line

A

common packet analyzer used to display contents of .pcap files

193
Q

Nmap

A

highly adaptable, open-source network/port scanner used to scan hosts/ports to locate services and detect vulnerabilities

194
Q

OUTPUT chain

A

firewall ruleset for outgoing connections

195
Q

INPUT chain

A

firewall ruleset for incoming connections

196
Q

FORWARD chain

A

firewall ruleset for connections passing through server

197
Q

PREROUTING chain

A

handled packets that have just arrived and determines via priority how to handle the packets depending on whether it is used for local processing or forwarding
- processed first before other chains

198
Q

Netcat

A

utility tool that uses TCP/UDP connections to read and write in a network
- used for both attacking and security

199
Q

IPAM service

A
  • internet protocol address management
  • scans DHCP and DNS servers and logs IP address usage to database
  • can be used to remotely manage and reconfigure DHCP and DNS server
200
Q

iptables command

A

used to edit rules enforced by Linux kernel firewall

201
Q

polarization

A

refers to the orientation of the wave propagating from the antenna to maximize signal strength

202
Q

CATV

A

cable access TV

203
Q

HFC

A

hybrid fiber coax
- combine with fiber optic core network with coax links to CPE

204
Q

top-of-rack switch model

A

switch models designed to provide high-speed connectivity to a rack of server appliances

205
Q

IGP

A
  • interior gateway protocol
  • identifies routes WITHIN an AS
206
Q

EGP

A
  • exterior gateway protocol
  • identifies routes BETWEEN autonomous systems
207
Q

what are coaxial cable terminated using?

A

F type connectors

208
Q

basic service set

A

AP mediates communications between client devices and can also provide a bridge to a cabled network segment

209
Q

North-South

A

traffic that enters or leaves the data center from a system physically residing outside the datacenter
- North = exiting
- South = entering

210
Q

East-West Traffic

A

data flow within a datacenter. For example, if we are using a spine and leaf architecture, any data flow between the various servers in the datacenter, even if it goes between different leaves, would be considered east-west traffic