General Questions Part 2 Flashcards

1
Q

RJ-11 Connector

A

Registered Jack 11 - 6 position, 2 conductor cable (6P2C) - This is the standard telephone cable used in households.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

RJ-45 Connector

A

Registered Jack 45 - 8 position, 8 conductor cable (8P8C) - This is the standard Ethernet cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BNC Connector

A

Bayonet Neill-Concelman - Coaxial cable connector, used in DS3 WAN links. The cable is often rigid and bulky.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DB-9, DB-25 Connector

A

D-Sub-miniature or D-Sub - These cable connectors range in size from 9 pins all the way to 50 pins on a single connector end. Ranges from A to E and each connector in the range has a different pin number, often used on older hardware such as modems, printers, and other peripherals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

F-Connector

A

Standard cable television connector, typically paired with RG-6 coaxial cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fiber Communication

A

Transmission by light in the visible spectrum. Has no RF signal which makes it very difficult to monitor/tap/listen in on. The signal is slow to degrade and can be sent over miles. No RF interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Multi-Mode Fiber

A

Short-range communications, up to 2 kilometres, inexpensive light source, ie LED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Single-Mode Fiber

A

Long-range communications, up to 100 kilometres, expensive light source, ie lasers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UPC (Connector)

A

Ultra-Polished Connector - Ferrule end-face radius polished at a zero degree angle, high return loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

APC (Connector)

A

Angle-Polished Connector - Ferrule end-face radius polished at an eight degree angle, lower return loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ST Connector

A

Straight Tip Connector - half-twist bayonet connector with rounded ends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SC Connector

A

Square Connector - round tip that simply uses push and pull force to connect and disconnect connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

LC Connector

A

Lucent Connector - this is a smaller square connector that often has a tab that can be pressed down much like the RJ-45 to ensure a secure connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MT-RJ

A

Mechanical Transfer Register Jack - A connector for two fibers in a very small form factor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T568A

A

Wiring Standard color code used for wiring eight-position RJ-45 modular plugs. Provides backward compatibility to both one pair and two pair USOC wiring schemes. A is more common in Europe. Cable end:

White-Green
Green
White-Orange
Blue
White-Blue
Orange
White-Brown
Brown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T568B

A

Wiring Standard color code used for wiring eight-position RJ-45 modular plugs. Provides backward compatibility to only one pair of the USOC wiring schemes. B is more common in the USA. Cable end:

White-Orange
Orange
White-Green
Blue
White-Blue
Green
White-Brown
Brown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Straight-through cable

A

A cable that has both modular plugs on the ends with the same pin-outs. Also called patch cables. Pin 1 matches to pin 1, pin 2 matches to pin 2, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cross-over cable

A

A cable that has different modular plug pin-outs on each end of the cable. Used when connecting a workstation to a workstation or a switch to a switch. Many devices these days do not need a cross-over cable to connect the devices, instead they use Auto-MDI-X which can automatically detect when to use a straight-through cable vs. a cross-over cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cable Infrastructure

A

Wire that runs from workstations to patch panels in networking closets. Patch panels then run cable to switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

66 Block

A

A type of punchdown block used to connect sets of wires in a telephone system. Used more often for analog voice, but can also be used for some digital links. Need to use wire and a punchdown tool to clip wires into block. Punchdown blocks were the predecessor to patch panels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

110 Block

A

A type of punchdown block used to terminate runs of on-premises wiring in a structured cabling system. The designation 110 is also used to describe a type of insulation displacement contact (IDC) connector used to terminate twisted pair cables. Need to use wire and a punchdown tool to clip wires into block. Punchdown blocks were the predecessor to patch panels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Copper Patch Panel

A

Punch-down block on one side, RJ-45 connector on the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fiber Distribution Panel

A

Permanent fiber installation - Patch panel at both ends. Fiber can’t be bent so you’ll often find soft looping of the fiber cables in the Distribution panel which is called a service loop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Transceiver

A

An adapter/converter that is both a transmitter and a receiver. Provides a modular interface so you can add the transceiver that matches your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Duplex Communication

A

Two fibers, one fiber only permits transmits and the other that only permits receives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Bi-Directional (BiDi) Transceivers

A

A fiber that allows traffic in both directions over a single fiber (signals use two different wavelengths). Can reduce the number of fiber runs by half.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

GBIC (Transceiver)

A

Gigabit Interface Converter - Relatively early and large devices that support both copper and fiber that is common on Gigabit networks. Standard was effectively replaced by SFPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SFP (Transceiver)

A

Small Form-factor Pluggable - Commonly used to provide 1 Gbit/s fiber, 1 Gbit/s copper also available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SFP+ (Transceiver)

A

Enhanced Small Form-factor Pluggable - Same size as SFP transceivers and is common with 10 Gigabit Ethernet. Supports data rate up to 16 Gbit/s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

QSFP (Transceiver)

A

Quad Small Form-factor Pluggable - 4-channel SFP with each channel providing 1 Gbit/s for a total of 4 Gbit/s. Essentially 4 SFPs in one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

QSFP+ (Transceiver)

A

Enhanced Quad Small Form-factor Pluggable - 4-channel SFP with each channel providing 10 Gbit/s for a total of 40 Gbit/s. Essentially 4 SFP+s in one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

100BASE-TX

A

100BASE-TX also called “Fast Ethernet” can carry traffic at the nominal rate of 100 Mbit/s. Often carried over Category 5 or better and can run a maximum of 100 meters between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

1000BASE-T

A

1000BASE-T also called “Gigabit Ethernet” can carry traffic at the nominal rate of 1 Gbit/s. Often carried over Category 5 or better twisted pair copper cables and can run a maximum of 100 meters between devices. Frequency use of 125 MHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

1000BASE-SX

A

1000BASE-SX can carry traffic at the nominal rate of 1 Gbit/s. This is Gigabit Ethernet using NIR (Near Infrared) light wavelength. Often carried over multi-mode fiber and can run a maximum of 220 meters to 500 meters, depending on fiber type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

1000BASE-LX

A

1000BASE-LX can carry traffic at the nominal rate of 1 Gbit/s. This is Gigabit Ethernet using long wavelength lasers. Carried over both Multi-mode and Single-mode fiber. Multi-mode can run a maximum of 550 meters whereas the Single-mode fiber can run a maximum of 5 kilometers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

10 Gbit/s Ethernet

A

10GBASE-T can carry traffic at the nominal rate of 10 Gbit/s. Often carried over Category 6 or better twisted pair copper cables and can run varying lengths depending on cabling used. Cat 6 can run a maximum of 55 meters, both Cat 6A (Augmented) and Cat 7 can run a maximum of 100 meters. Frequency use of 500 MHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Hub

A

A hub is a network hardware device used for connecting multiple network devices or workstations together. It acts as a repeater so traffic going in one port is repeated to every other port on the hub in half-duplex communication mode. A hub works at the physical layer (layer 1) of the OSI model. Hubs also participates in collision detection, forwarding a jam signal to all ports if it detects a collision.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Bridge

A

A bridge is a computer networking device that creates a single aggregate network from multiple communication networks or network segments, “bridges” networks together. Bridges allow the ability to connect different topologies and different physical networks together. Bridges operate at the OSI Layer 2 and most bridges these days are simply wireless access points. Bridges distributes traffic based on MAC address and makes forwarding decisions in software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Switch

A

OSI layer 2 device which forwards traffic based on data link address. Switches are the core of an enterprise network and can provide Power over Ethernet (PoE).

Routers inside of switches are sometimes called “layer 3 switches”.

  • Switch (Layer 2)
  • Router (Layer 3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Router

A

OSI layer 3 device which routes traffic between IP subnets. Capable of supporting both copper and fiber networks and can connect diverse network types together.

Routers inside of switches are sometimes called “layer 3 switches”.

  • Switch (Layer 2)
  • Router (Layer 3)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Firewall

A

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules, filters traffic by port number, and can encrypt traffic in and out of the network. Firewalls often sit on the ingress/egress of the network and most firewalls operate at layer 3 of the OSI model.

42
Q

Wireless access point (WAP)

A

OSI layer 2 device that extends the wired network onto the wireless network. A WAP is a bridge.

43
Q

Wireless range extender

A

A device that takes an existing signal from a wireless router or wireless access point and rebroadcasts (repeater) it to extend the reach of a wireless network.

44
Q

Multilayer switches

A

A multilayer switch is a network device that has the ability to operate at higher layers of the OSI model. A multilayer switch can perform the functions of a switch as well as that of a router. A switch (Layer 2) and router (Layer 3) in the same physical device. Switching still operates at OSI Layer 2, routing still operates at OSI Layer 3.

  • Switch (Layer 2)
  • Router (Layer 3)
45
Q

Wireless networks

A

Wireless networks are often accompanied by physical networks and the wireless portion is just an extension to the physical network. Typically wireless networks ino office don’t just have a single access point and the access points may not even be in the same building. When moving between a wireless and physical connection in the same network, the transition is seamless. Wireless networks might have different access policies, security policies, and AP configs.

46
Q

Wireless LAN controllers

A

Wireless LAN controllers are used in combination with the Lightweight Access Point Protocol (LWAPP) to manage light-weight access points in large quantities by the network administrator or network operations center. The WLAN controller automatically handles the configuration of wireless access-points from a single “pane of glass”. The controller offers centralized management of WAPs, performance and security monitoring, report on access point use, and can be paired with access points.

47
Q

Balancing the load

A

Balancing the load is the ability to balance traffic across two or more WAN links without using complex routing protocols like BGP. This ability is invisible to the end-user and is frequently done in large-scale implementations such as web server farms and database farms. These servers are fault tolerant and server outages have no effect.

48
Q

Load balancer

A

A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications. Load balancers offer faster response times, caching, prioritization, QoS, and encryption/decryption.

49
Q

IDS and IPS

A

Intrusion Detection System / Intrusion Prevention
System. Both systems watch network traffic and known exploits against operating systems, applications, etc. such as buffer overflows, cross-site scripting, other
vulnerabilities. Intrusion Detection System will alarm or alert if an abnormality is detected. Intrusion Prevention
System stops threats before they get into the network

50
Q

Proxy Server

A

A proxy server acts as a gateway between you and the internet. It’s an intermediary server separating end users from the external websites they browse. Proxies receive user requests and sends the request on their behalf (the proxy). Useful for caching information, access control, URL filtering, and content scanning. Some applications may need to know how to
use the proxy and some proxies are invisible (transparent).

51
Q

Application proxies

A

An application proxy sits between the protected network and the network you want to be protected from. Every time an application makes a request, the application intercepts the request to the destination system. The application proxy initiates its own request, as opposed to actually passing the client’s initial request.

52
Q

VPN concentrator

A

A VPN (Virutal Private Network) concentrator is a type of networking device that provides secure creation of VPN connections and delivery of messages between VPN nodes. It is a type of router device, built specifically for creating and managing VPN communication infrastructures. VPN concentrator are often integrated into a firewall and can provide encryption/decryption to the access device.

53
Q

Remote access VPN

A

A remote access VPN works by creating a virtual tunnel between an employee’s device and the company’s network. This tunnel goes through the public internet but the data sent back and forth through it is protected by encryption and security protocols to help keep it private and secure. It’s essentially on-demand access from a remote device.

54
Q

AAA framework

A

Authentication, Authorization, and Accounting.

Identification - This is who you claim to be
Authentication - Prove you are who you say you are
Authorization - Based on your identification and authentication, what access do you have?
Accounting - Resources used, login time, data sent and received, logout time, etc.

55
Q

RADIUS (protocol)

A

RADIUS (Remote Authentication Dial-in User Service) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. One of the more common AAA protocols because it’s supported on a wide variety of platforms and devices such as routers, switches, and firewalls.

56
Q

UTM/All-in-one security appliance

A

UTM (Unified Threat Management) is an approach to information security where a single hardware or software installation provides multiple security functions. UTM simplifies information-security management by providing a single management and reporting point for the security administrator rather than managing multiple products from different vendors. Instead of having several single-function appliances, all needing individual familiarity, attention and support, network administrators can centrally administer their security defenses from one computer. UTM’s can provide URL filter/content inspection, malware inspection, spam filter, CSU/DSU, router and switch, firewall, IDS/IPS, bandwidth shaper, and VPN endpoint.

57
Q

NGFW

A

NGFW (Next-Generation Firewalls) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functions, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory). NGFW’s are Layer 7 (application layer) firewalls,

58
Q

Content filtering

A

Content filtering is the idea of allowing or blocking traffic based on the data that’s inside of data packets. Specifically, data that’s in the application section of the packet itself. This allows for corporate control of outbound and inbound data and can be used to filter sensitive materials, control of inappropriate content, used as parental controls, or as a compliment to an Anti-virus, anti-malware.

59
Q

Network Virtualization

A

Network Virtualization is the process of combining hardware and software network resources along with network functionality into a single, software-based administrative entity, a virtual network. Network virtualization involves platform virtualization, often combined with resource virtualization.

60
Q

Hypervisor

A

A hypervisor (or virtual machine manager, VMM) is computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one or more virtual machines is called a host machine, and each virtual machine is called a guest machine.

61
Q

What is a NAS?

A

NAS (Network Attached Storage) is a file-level (as opposed to block-level) computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. NAS is specialized for serving files either by its hardware, software, or configuration. It is often manufactured as a computer appliance.

62
Q

Jumbo Frame

A

Jumbo frames are Ethernet frames with more than 1500 bytes of payload, the limit set by the IEEE 802.3 standard. Conventionally, jumbo frames can carry up to 9,216 bytes (9,000 is the accepted norm). Many Gigabit Ethernet switches and Gigabit Ethernet network interface cards can support jumbo frames. Some Fast Ethernet switches and Fast Ethernet network interface cards can also support jumbo frames. Jumbo frames increase transfer efficiency as fewer packets need to be switched/routed.

63
Q

Fibre Channel (FC)

A

FC (Fibre Channel) is a high-speed data transfer protocol (commonly running at 1, 2, 4, 8, 16, 32, 64, and 128 gigabit per second rates) providing in-order, lossless delivery of raw block data. Fibre Channel is primarily used to connect computer data storage to servers in storage area networks (SAN) in commercial data centers. Fibre Channel networks form a switched fabric because the switches in a network operate in unison as one big switch. Fibre Channel typically runs on optical fiber cables within and between data centers, but can also run on copper cabling.

64
Q

FCoE

A

FCoE (Fibre Channel over Ethernet) is a computer network technology that encapsulates Fibre Channel frames over Ethernet networks. This allows Fibre Channel to use 10 Gigabit Ethernet networks (or higher speeds) while preserving the Fibre Channel protocol. No special networking hardware needed, but FCoE is not routable.

65
Q

iSCSI

A

iSCSI (Internet Small Computer Systems Interface) is an Internet Protocol (IP) based storage networking standard for linking data storage facilities, making a remote disk look and operate like a local disk. It provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network. Is often used to manage storage over long distances and can be managed quite well in software. iSCSI was created by IBM and Cisco, now an RFC standard.

66
Q

InfiniBand

A

InfiniBand (IB) is a computer networking communications standard used in high-performance computing that features very high throughput and very low latency. InfiniBand is also used as either a direct or switched interconnect between servers and storage systems, as well as an interconnect between storage systems. InfiniBand is popular in research and supercomputers, with speeds as high as 100 Gbit/sec and 200 Gbit/sec being common. Links can be aggregated for higher throughput (4x, 8x, 12x links). Copper and Fiber options are available using QSFP connectors.

67
Q

DSL

A

DSL (Digital Subscriber Line) is a family of technologies that are used to transmit digital data over telephone lines. In telecommunications marketing, the term DSL is widely understood to mean asymmetric digital subscriber line (ADSL), the most commonly installed DSL technology, for Internet access. The reason it’s called ADSL is because the download speed is faster than the upload speed (asymmetric). Has a range of 10,000 feet from the central office (CO).

68
Q

Metro Ethernet

A

A Metro Ethernet network is a metropolitan area network (MAN) that is based on Ethernet standards. It is commonly used to connect subscribers to a larger service network or the Internet. Businesses can also use metropolitan-area Ethernet to connect their own offices to each other.

69
Q

Cable broadband

A

Cable broadband is a method of delivering high-speed Internet to residences and businesses using cable television infrastructure. While DSL uses old-fashioned copper telephone wires, cable broadband uses the same coaxial copper cables that deliver sound and video to cable television subscribers. Allows transmission across multiple frequencies and can accommodate different traffic types.

70
Q

MPLS

A

MPLS (Multiprotocol Label Switching) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses, thus avoiding complex lookups in a routing table and speeding traffic flows. The labels identify virtual links (paths) between distant nodes rather than endpoints. MPLS can encapsulate packets of various network protocols, hence the “multiprotocol” reference on its name. MPLS supports a range of access technologies, including T1/E1, ATM, Frame Relay, and DSL.

71
Q

MPLS pushing and popping

A

Push: When an IP packet enters an MPLS domain, the ingress node adds a new label to the packet between the Layer 2 header and the IP header.

Pop: When a packet leaves the MPLS domain, the label is popped out of (removed from) the MPLS packet.

72
Q

ATM (WAN Technology)

A

ATM (Asynchronous Transfer Mode) is a telecommunications standard for carriage of user traffic, including telephony (voice), data, and video signals. ATM was developed to meet the needs of the Broadband Integrated Services Digital Network (ISDN) and designed to integrate telecommunication networks. Additionally, it was designed for networks that must handle both traditional high-throughput data traffic and real-time, low-latency content such as voice and video. ATM is a core protocol used in the SONET/SDH backbone of the public switched telephone network (PSTN) and in the Integrated Services Digital Network (ISDN), but has largely been superseded in favor of next-generation networks based in Internet Protocol (IP) technology.

73
Q

Frame relay

A

Frame relay is a packet-switching telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between endpoints in wide area networks (WANs). LAN traffic is encapsulated into frame relay frames and Frames are passed into the “cloud”. Originally designed for transport across Integrated Services Digital Network (ISDN) infrastructure, it is still in use today but has been effectively replaced by MPLS (Multiprotocol Label Switching).

74
Q

PPP

A

PPP (Point-to-Point Protocol) - A data link layer (layer 2) communications protocol between two routers directly without any host or any other networking in between. It can provide connection authentication, transmission encryption, error detection, and compression.

75
Q

PPPoE

A

PPPoE (Point-to-Point Protocol over Ethernet) - A network protocol for encapsulating PPP (Point-to-Point Protocol) frames inside Ethernet frames. Common on DSL networks and PPP can provide connection authentication, transmission encryption, error detection, and compression.

76
Q

DMVPN

A

DMVPN (Dynamic Multipoint Virtual Private Network) - A dynamic tunneling form of a virtual private network (VPN) supported on Cisco IOS-based routers, Huawei AR G3 routers and USG firewalls, and on Unix-like operating systems. Creates a dynamic mesh VPN network without having to pre-configure all possible tunnel end-point peers, including IPsec (Internet Protocol Security) and ISAKMP (Internet Security Association and Key Management Protocol) peers.

77
Q

SIP trunking

A

SIP (Session Initiation Protocol) trunking is a method of sending voice and other unified communications services over the internet. It works with an IP-PBX (Private Branch Exchange). SIP trunking replaces traditional telephone lines or PRIs (Primary Rate Interface). It acts as a control protocol for VoIP

  • Traditional PBX connectivity uses T1/ISDN
  • 23 voice channels, 1 signaling channel
  • When the lines are full, you get a busy signal
  • Use SIP/VoIP to communicate to an IP-PBX provider
  • More efficient use of bandwidth
  • Less expensive than ISDN lines
  • More phone system options
78
Q

Demarcation point

A

The Demarcation point or the Demarc is the point where your on-premises physical wired network ends and the with Internet Service Provider’s network begins. The Demarcation point is used everywhere from enterprise offices to your own home.

79
Q

CSU/DSU

A

A CSU/DSU (Channel Service Unit/Data Service Unit) is a hardware device about the size of an external modem that sits between the router and the circuit which converts a digital data frame from the local area network (LAN) into a frame appropriate for a wide-area network (WAN), controlled by the network provider, the ISP. The DSU connects to the DTE (Data Terminal Equipment).

80
Q

Internal operating procedures

A

Organization policies, processes, and procedures. Documentation is the driving factor behind organization policies, such as how to’s, testing routines, change control, downtime procedures, facilities issues, software upgrades, etc. The IOP needs to be accessible so that everyone can review and understand the policies.

81
Q

Logical network maps

A

Network diagrams, or maps, are visuals that use symbols/icons/shapes to depict the different objects and connections in a network. Logical network diagrams focus in on how traffic flows across the network, IP addresses, admin domains, how domains are routed, control points, and so on.

82
Q

Physical network maps

A

Network diagrams, or maps, are visuals that use symbols/icons/shapes to depict the different objects and connections in a network. A physical network diagram will, ideally, show the network topology exactly as it is: with all of the devices and the connections between them. Because physical diagrams depict all of the physical aspects of the network, they will likely include: ports, cables, racks, servers, specific models, and so on.

83
Q

Change management

A

Change management is how a change to the network or production environment is managed. Change management is often involved when there is an upgrade to software, firewall configuration change, or when modifying switch ports. Change management needs to have clear policies as changes will occur very frequently and can often be overlooked or ignored.

84
Q

Labeling

A

Labeling is simply identifying your devices and wiring with sufficient labels so that if you were to leave, someone else could comprehend what something does and where it goes. Best practice is to create a standardized format so that everything is consistent.

85
Q

System labeling

A

System used to uniquely identify workstation, servers, and other devices on the network. Often done using asset tags, system names, and serial numbers. These identifiers need to be clearly visible to both users and admins.

86
Q

Circuit labeling

A

Circuit labeling is labeling of WAN network devices such as the Demarc interface, the CSU/DSU (Channel Service Unit/Data Service Unit), router, WAN provider Circuit ID, WAN provider phone number.

87
Q

Patch panel labeling

A

Labeling ports on a patch panel to identify the use of a specific port. Patch panels don’t have a lot of real estate for labeling so incremental numbers and letters are often used as descriptors.

88
Q

Baselines

A

A baseline is a performance metric which is used as a point of reference. Often used to identify anomalies, application response time, network throughput, etc.

Examine the past to predict the future which is useful for planning.

89
Q

(FCIP)

A

FCIP (Fibre Channel over IP) is an Internet Protocol (IP) created for storage technology. It encapsulate Fibre Channel data into IP packets allowing Fibre Channel tunneling often used to connect servers and storage over geographical distances.

90
Q

DOCSIS

A

DOCSIS (Data Over Cable Service Interface
Specification) is an international telecommunications standard that permits the addition of high-speed data transfer to an existing cable television (CATV) system. It is used by many cable television operators to provide Internet access over their existing hybrid fiber-coaxial (HFC) infrastructure.

91
Q

SAN

A

SAN (Storage Area Network) is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage. A SAN typically is a dedicated network of storage devices not accessible through the local area network (LAN).

92
Q

Loop protection

A

Loop protection consists of enabling STP (spanning tree protocol) on network switches. Looping can be taken advantage of by attackers to initiate DoS attacks because of its repetitive nature. When transmissions loop, they needlessly consume bandwidth and disrupt network services and often times are somewhat difficult to troubleshoot.

93
Q

BPDU guard

A

BPDU (Bridge Protocol Data Unit) Guard feature is used to protect the Layer 2 Spanning Tree Protocol (STP) Topology from BPDU related attacks. BPDU Guard feature must be enabled on a port that should never receive a BPDU from its connected device. If a switch port which is configured with Spanning Tree Protocol (STP) PortFast feature, it must be connected to an end device. BPDU guard disables the port upon BPDU reception if PortFast is enabled on the port. The disablement effectively denies devices behind such ports from participation in STP.

94
Q

Root guard

A

Root guard allows the device to participate in STP as long as the device does not try to become the root. If root guard blocks the port, subsequent recovery is automatic. Recovery occurs as soon as the offending device ceases to send superior BPDUs.

95
Q

Flood guard

A

Flood guards serve as preventive control against denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks. Flood guards are available either as standalone devices or as firewall components. It is capable of monitoring network traffic to identify DoS attacks in progress generated through packet flooding and can be configured to specify the maximum number of source MAC addresses on a particular interface. Once the maximum has been exceeded, port security activates and usually the interface is disabled by default. Flood guards maintain a list of every source MAC address.

96
Q

DHCP snooping

A

DHCP Snooping is a layer 2 security technology incorporated into the operating system of a capable network switch that drops DHCP traffic determined to be unacceptable. DHCP Snooping prevents unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients. The DHCP Snooping feature performs the following activities:

  • Validates DHCP messages from untrusted sources and filters out invalid messages.
  • Builds and maintains the DHCP Snooping binding database, which contains information about untrusted hosts with leased IP addresses.
  • Utilizes the DHCP Snooping binding database to validate subsequent requests from untrusted hosts.
97
Q

Segmenting the network

A

Network segmentation is the concept of taking a computer network and breaking it down, logically and physically, into multiple smaller fragments. This is done to increase performance, security, compliance, and makes change control much easier.

98
Q

Physical segmentation

A

Physical segmentation involves breaking down a large network into many smaller physical components. It normally involves investing in additional hardware such as switches, routers, and access points. While physical segmentation can seem like the easy approach to breaking up a network, it’s often very costly and can lead to unintended issues.

99
Q

Logical segmentation

A

Logical segmentation is the more popular method of fragmenting a network into manageable chunks. Typically, logical segmentation doesn’t require new hardware, provided the infrastructure is already managed. Instead, logical segmentation uses concepts already built into network infrastructure such as creating separate virtual local area networks (VLANs) that share a physical switch, or dividing different asset types into different Layer 3 subnets and using a router to pass data between the subnets.

100
Q

DMZ

A

A DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a physical or logical subnet that separates an internal local area network (LAN) from other untrusted networks, usually the public internet.