N10-007.5 Flashcards
Port Aggregation
Joining multiple network device ports together for increased bandwidth and redundancy.
Reliability
The measure of how error-free a network transmits packets.
Marking
Alters bits within a frame, cell, or packet to indicate how a network should treat that traffic. Marking alone does not change how a network treats a packet. Other tools (such as queuing tools) can, however, reference markings and make decisions (for example, forwarding decisions or dropping decisions) based on those markings.
(Unix) traceroute
A UNIX command that displays every router hop along the path from a source host to a destination host on an IP network.
nbtstat
Displays NetBIOS information for IP-based networks.
(Unix) dig
Can resolve an FQDN to an IP address on UNIX hosts.
route
Can add, modify, or delete routes in the IP routing table of Microsoft Windows and UNIX hosts. In addition, the route command can be used to view the IP routing table of Microsoft Windows hosts.
nslookup
Can resolve an FQDN to an IP address on Microsoft Windows and UNIX hosts.
tracert
A Microsoft Windows–based command that displays every router hop along the path from a source host to a destination host on an IP network.
netstat
Can display a variety of information about IP-based connections on a Windows or UNIX host.
nmap
This management tool permits the scanning of the network for hosts and services.
tcpdump
A common packet analyzer that runs under the command line. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached.
host
Can resolve an FQDN to an IP address on hosts.
(Linux) iptables
The software firewall that is included with most Linux distributions.
Cable Certifier
Used to determine the category and the data throughput of a cable
Time Domain Reflectometer (TDR)
Detects the location of a fault in a copper cable by sending an electric signal down the copper cable and measuring the time required for the signal to bounce back from the cable fault. A TDM can then mathematically calculate the location of the fault.
Syslog
A syslog-logging solution consists of two primary components: syslog servers (which receive and store log messages sent from syslog clients) and syslog clients (which can be a variety of network devices that send logging information to a syslog server).
security information and event management (SIEM)
These products seek to monitor the network for security issues and notify personnel should issues arise.
Management Information Base (MIB)
This is the database of variables that exist on an SNMP-managed device.
ATM Cells are at which layer of the OSI model?
Layer 2 (cells are also known as frames)
Port Scanning
The process of scanning for open TCP or UDP ports on the network.
Change Management Documentation
This important documentation explains the process whereby changes are permitted in the network. This often consists of a series of approvals and testing steps.
Intermediate Distribution Frame (IDF) Documentation
The documentation related to a distribution frame in a central office or customer premises, which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames.
Virtual Network Computing (VNC)
An alternative to RDP, VNC allows the access of a desktop from another system on the network.
bit-error rate tester (BERT)
Has a pattern generator (generates a variety of bit patterns) and error detector (which is synced with the pattern generator and can determine the number of bit errors) and can calculate a BER for the tested transmission link
Bandwidth
The measure of network throughput capable on a network media or path.
Layer 2 Forwarding (L2F)
A VPN protocol designed (by Cisco Systems) with the intent of providing a tunneling protocol for PPP. Like L2TP, L2F lacks native security features.
pathping
Pathping is a TCP/IP based utility (command-line tool) that provides useful information about network latency and network loss at intermediate hops between a source address and a destination address. Similar to tracert/traceroute
Remote Authentication Dial-In User Service (RADIUS)
A UDP-based protocol used to communicate with an AAA server. Unlike TACACS+, RADIUS does not encrypt an entire authentication packet, but only the password. However, RADIUS offers more robust accounting features than TACACS+. Also, RADIUS is a standards-based protocol, whereas TACACS+ is a Cisco proprietary protocol.
Authentication Header (AH)
An IPSec protocol that provides authentication and integrity services. However, it does not provide encryption services.
IP Security (IPSec)
A type of VPN that provides confidentiality, integrity, and authentication.
Advanced Encryption Standard (AES)
AES is typically considered the preferred symmetric encryption algorithm. AES is available in 128-bit key, 192-bit key, and 256-bit key versions.
Kerberos
A client/server authentication protocol that supports mutual authentication between a client and a server. Kerberos uses the concept of a trusted third party (a key distribution center) that hands out tickets to be used instead of a username and password combination.
RSA
A popular and widely deployed asymmetric encryption algorithm.
BPDU Guard
The ability of a switch to block a port where unexpected BPDUs are arriving from another switch or attacker.