N10-007.5 Flashcards

1
Q

Port Aggregation

A

Joining multiple network device ports together for increased bandwidth and redundancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Reliability

A

The measure of how error-free a network transmits packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Marking

A

Alters bits within a frame, cell, or packet to indicate how a network should treat that traffic. Marking alone does not change how a network treats a packet. Other tools (such as queuing tools) can, however, reference markings and make decisions (for example, forwarding decisions or dropping decisions) based on those markings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(Unix) traceroute

A

A UNIX command that displays every router hop along the path from a source host to a destination host on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

nbtstat

A

Displays NetBIOS information for IP-based networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(Unix) dig

A

Can resolve an FQDN to an IP address on UNIX hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

route

A

Can add, modify, or delete routes in the IP routing table of Microsoft Windows and UNIX hosts. In addition, the route command can be used to view the IP routing table of Microsoft Windows hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

nslookup

A

Can resolve an FQDN to an IP address on Microsoft Windows and UNIX hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

tracert

A

A Microsoft Windows–based command that displays every router hop along the path from a source host to a destination host on an IP network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

netstat

A

Can display a variety of information about IP-based connections on a Windows or UNIX host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

nmap

A

This management tool permits the scanning of the network for hosts and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

tcpdump

A

A common packet analyzer that runs under the command line. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

host

A

Can resolve an FQDN to an IP address on hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Linux) iptables

A

The software firewall that is included with most Linux distributions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cable Certifier

A

Used to determine the category and the data throughput of a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Time Domain Reflectometer (TDR)

A

Detects the location of a fault in a copper cable by sending an electric signal down the copper cable and measuring the time required for the signal to bounce back from the cable fault. A TDM can then mathematically calculate the location of the fault.

17
Q

Syslog

A

A syslog-logging solution consists of two primary components: syslog servers (which receive and store log messages sent from syslog clients) and syslog clients (which can be a variety of network devices that send logging information to a syslog server).

18
Q

security information and event management (SIEM)

A

These products seek to monitor the network for security issues and notify personnel should issues arise.

19
Q

Management Information Base (MIB)

A

This is the database of variables that exist on an SNMP-managed device.

20
Q

ATM Cells are at which layer of the OSI model?

A

Layer 2 (cells are also known as frames)

21
Q

Port Scanning

A

The process of scanning for open TCP or UDP ports on the network.

22
Q

Change Management Documentation

A

This important documentation explains the process whereby changes are permitted in the network. This often consists of a series of approvals and testing steps.

23
Q

Intermediate Distribution Frame (IDF) Documentation

A

The documentation related to a distribution frame in a central office or customer premises, which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames.

24
Q

Virtual Network Computing (VNC)

A

An alternative to RDP, VNC allows the access of a desktop from another system on the network.

25
Q

bit-error rate tester (BERT)

A

Has a pattern generator (generates a variety of bit patterns) and error detector (which is synced with the pattern generator and can determine the number of bit errors) and can calculate a BER for the tested transmission link

26
Q

Bandwidth

A

The measure of network throughput capable on a network media or path.

27
Q

Layer 2 Forwarding (L2F)

A

A VPN protocol designed (by Cisco Systems) with the intent of providing a tunneling protocol for PPP. Like L2TP, L2F lacks native security features.

28
Q

pathping

A

Pathping is a TCP/IP based utility (command-line tool) that provides useful information about network latency and network loss at intermediate hops between a source address and a destination address. Similar to tracert/traceroute

29
Q

Remote Authentication Dial-In User Service (RADIUS)

A

A UDP-based protocol used to communicate with an AAA server. Unlike TACACS+, RADIUS does not encrypt an entire authentication packet, but only the password. However, RADIUS offers more robust accounting features than TACACS+. Also, RADIUS is a standards-based protocol, whereas TACACS+ is a Cisco proprietary protocol.

30
Q

Authentication Header (AH)

A

An IPSec protocol that provides authentication and integrity services. However, it does not provide encryption services.

31
Q

IP Security (IPSec)

A

A type of VPN that provides confidentiality, integrity, and authentication.

32
Q

Advanced Encryption Standard (AES)

A

AES is typically considered the preferred symmetric encryption algorithm. AES is available in 128-bit key, 192-bit key, and 256-bit key versions.

33
Q

Kerberos

A

A client/server authentication protocol that supports mutual authentication between a client and a server. Kerberos uses the concept of a trusted third party (a key distribution center) that hands out tickets to be used instead of a username and password combination.

34
Q

RSA

A

A popular and widely deployed asymmetric encryption algorithm.

35
Q

BPDU Guard

A

The ability of a switch to block a port where unexpected BPDUs are arriving from another switch or attacker.