Exam Flashcards
Class A IP
10.0.0.0 - 10.255.255.255
24 bits
Class B IP
172.16.0.0 - 172.31.255.255
20 bits
Class C IP
192.168.0.0 - 192.168.255.255
16 bits
802.11a
5 GHz
54 Mbit/s
802.11b
2.4 GHz
11 Mbit/s
better range than A, more frequency conflict
802.11g
2.4 Ghz
- 54 Mbit/s
-backwards compatible with b
- frequency conflicts
802.11n
- 5 GHz / 2.4
- 600 Mbit/s
-MIMO
802.11ac
5 GHz
- up to 160 MHz
- increased channel bonding
faster data transfer
- MU-MIMO
- 6.9 Gbit/s
802.11ax
wifi 5
- 5 GHz / 2.4 GHz
- 1201 megabits/s
- MU-MIMO
orthogonal frequency division
9.6 Gbit/s
PRTG
a lightweight standalone tool which will allow the administrator to easily scan for IPs
A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process?
two
Sender Policy Framework (SPF)
TXT-based record that lists IP addresses or names of servers that can send email from a particular domain and combats sending of span
SRV (service record)
contains service name and port for a particular application
- locates VoIP or media servers
MX record
identifies email server for the domain
- must have associated A or AAAA record, not point to CNAME
What does ICANN manage?
generic top level domains, DNS
recursive lookup
server queries other name servers until it finds requested record or times out
iterative lookup
name server responds to query with either requested record or the address of a name server at lower level in hierarchy that is authoritative for the namespace
one DHCP server for multiple subnets
- DHCP relay: forwarding DHCP traffics between subnets
- UDP forwarding: more general application of DHCP relay
IMAP port
143
SMTP
port 25
SMTPS
587
POP3 port
110
POP3 SSL
995
IMAP SSL
port 993
active FTP
client sends PORT command specifying chosen port and server opens data connection between that port and TCP port 20 on server
RTCP
session on each RTP stream that monitors the quality of the connection and provides reports that the network stacks can use to tune QoS parameters
SIP
- session initiation protocol
- end user devices such as IP-enabled handsets or client and server web conference software
Microsoft SQL server port
TCP 1433
- allows clients to connect to database server over network and allow replication traffic to move between database servers
WSD/Airprint
allows for secure connections to a print device and allows it to advertise service capabilities over the network, provides plug-and-play installation for Windows and iOS devices, and uses bidirectional status messaging.
SSL/TLS port
443
Telnet
port 23
SSH port
port 22
SYSLOG port
UDP 514
SNTP
- simple network time protocol
- UDP 123
- host that supports SNTP cannot act as time source for other hosts
Syslog alert, code 2
critical level
behavioral threat research
narrative commentary describing examples of attacks and the tactics, techniques, and procedures (TTPs) gathered through primary research sources.
reputational threat intelligence
consists of lists of IP addresses and domains associated with malicious behavior and signatures of known file-based malware
TACACS+
TCP 49
process assessment
involves identifying critical systems and assets that support mission essential functions
Bastion servers
hosts in perimeter and not fully trusted
- proxy and web
CPE
- customer premises equipment
- equipment owned, managed, and supported by the customer as it falls beyond the demarcation point.
CWDM
- coarse wavelength division multiplexing
- supports up to 16 wavelengths and typically deploys four or eight bidirectional channels over a single fiber strand.
WDM
- wavelength division multiplexing
- a means of using a strand to transmit or receive more than one channel at a time.
BiDi
- bidirectional
- support, transmit, and receive signals over the same strand of fiber. This uses WDM to transmit the transmit (Tx) and receive (Rx) signals over slightly shifted wavelengths.
DWDM
- dense wavelength division multiplexing
- provisions a greater number of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.
cable crimper
creates a patch cord that fixes a plug to a cable. The tools are specific to the type of connector and cable, although some have modular dies supporting a range of RJ-type plugs. Many crimpers also come with cable stripping capabilities.
block tool
terminates a group of connectors in one action.
punchdown tool
terminates a fixed cable and fixes conductors into an IDC. There are different IDC formats (66, 110, BIX, and Krone) that require different blades.
APC
Angled Physical Contacts (APCs) make for an even tighter connection and better return loss performance. APCs cannot mix with PC faces or UPCs
UPC
the cable and connector are polished to a higher standard than with PC.
- ultra physical contact
PC (physical contact)
faces of the connector and fiber tip are polished so that they curve slightly and fit together better, reducing return loss
Demarcs
special types of equipment rooms marking the point at which external cabling (located outside the plant) joins to the internal cabling (located on the premises).
cladding
reflects signals back into the waveguide as efficiently as possible so that the light signal travels along the waveguide by multiple internal reflections.
stackable switches
switches can connect together and operate as a group. The sysadmin can manage the switch stack as a single unit.
NIC teaming/port aggregation
combines two or more separate cabled links into a single logical channel
IGRP
- interior gateway routing
- older routing protocol, which is classful. Classful routing protocols do not carry subnet masks.
RIPv2 (routing internet protocol)
dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting. The Internet has shifted towards a hierarchical routing structure by reengineering classful schemes.
EIGRP
- enhanced interior gateway routing protocol
- dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting. Routers at the top of the hierarchy need to store only the high-level network prefixes.
OSPF
- open shortest path first
- dynamic routing protocol that supports classless addressing, required for both subnetting and supernetting.
BGP (border gateway protocol)
a path vector type that is part of the Exterior Gateway Protocol (EGP) class and runs over Transmission Control Protocol (TCP) port 179.
SMB port
TCP 139
What is the lowest ANSI/TIA/EIA copper Ethernet cabling category available in the form of shielded/foiled twisted pair (S/FTP), and is often recommended for use in healthcare settings?
Cat 6a
Cat 6
support 10GBASE-T standard speeds at a distance of up to 180 ft. (55 m).
Cat 5e
supports a maximum speed of 1 Gbps at a maximum distance of up to 328 ft (100 m)
- 1000BASE-T
Cat 7
support 10GBASE-T standard speeds at a distance of up to 328 ft (100 m).
Cat 8
support speeds up to 40 Gbps up to 100 ft (30 m)
- 40GBASE-T
Straight tip (ST)
early bayonet-style connector with a twist-and-push locking mechanism. ST was primarily used for multimode networks, however, it is no longer routinely utilized in Ethernet deployments.
MTRJ
a small-form-factor duplex connector with a snap-in design that is used in multimode networks.
Local Connector (LC)
small-form-factor connector with a push/pull tabbed design. The LC form factor is commonly used for Gigabit Ethernet and 10/40 GbE.
Subscriber Connector (SC)
a push/pull connector that allows for easy insertion and removal. It may be utilized in either single-mode or multimode mode. It is frequently used in Gigabit Ethernet
WPA3
the Simultaneous Authentication of Equals (SAE) protocol replaces the 4-way handshake, which has been found to be vulnerable to various attacks.
WEP
old protocol that is no longer safe to use, though it does not use the SAE protocol. WEP uses an outdated RC4 stream cipher to encrypt traffic.
WPA
designed to fix critical vulnerabilities in the earlier wired equivalent privacy (WEP) standard.
WPA2
pre-shared key (PSK) authentication uses a passphrase to generate the key that is used to encrypt communications. It is also referred to as group authentication because a group of users share the same secret.
latency
the time it takes for a transmission to reach the recipient, measured in milliseconds (ms)
jitter
a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery.
implicit TLS protocol
SMTPS
- establishes the secure connection before any SMTP commands (HELO, for instance) are exchanged. This is also referred to as implicit TLS and only represents encryption at the level of the transport layer.
STARTTLS
command that upgrades an existing unsecure connection to TLS. This is also referred to as explicit TLS or opportunistic TLS and only represents encryption at the level of the transport layer.
ipV6 interface ID
last 64 digits
TCP SYN (-sS) scan
- appropriate for half-open scan
- technique is faster as the scanning host sends a SYN packet to request a connection but does not complete the handshake. This method is typically used for stealthier scans, as it is less likely to be logged.
TCP connect (-sT) scan
- complete three-way handshakes
- more visible in logs, not half-open
active TAP
a powered device that performs signal regeneration and can capture all packets.
passive TAP
an unpowered device that physically copies the signal from the cabling to a monitor port. The monitor port will receive every frame, however, signal regeneration is not performed.
Switched Port Analyzer (SPAN)
also known as port mirroring or port monitoring, allows the capture of network data as it flows through a network switch. Corrupt frames are dropped.
The control plane
The network makes decisions about how traffic should be prioritized and where it should be switched, which, in turn, keeps the network itself operational.