N10-009-Section_3 Flashcards

1
Q

IPAM

A

IP Address Management. IPAM software us used to track and manage IP Addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SLA

A

Service Level Agreement - defines the scope and the quality of the service provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Production Configuration

A

The most current config that is running, the config that will be deployed to new devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backup Configuration

A

A backup of the configuration in case an update or config change goes wrong. A VM snapshot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Baseline/Golden Configuration

A

A baseline for creating and testing production configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SNMP

A

Simple Network Management Protocol - Tool that allows us to manage network devices - Requires an agent on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Managed Device

A

A device setup for SNMP - UPD 161, Encrypted TSL 10161 Listening ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SNMP Manager

A

Software to manage SNMP devices - UDP 162 and TLS 10162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MIB

A

Management Information Base - A device will keep a database of information ready for requests from a management device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Get (SNMP)

A

The NMS sending a “Get” request to the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Trap (SNMP)

A

Setup on the device itself. A trigger that will report to the manager if a certain criteria is met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Walk (SNMPWalk)

A

Batch process of Get - Asking several requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP v1

A

First, Structured tables, in-the-clear, no encryption, limited commands, no encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SNMP Community

A

Organization of Managed Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NMS

A

In networking, an NMS (Network Management System) is a software or hardware solution designed to monitor, manage, and maintain computer networks. It provides tools and functionalities that help administrators oversee the performance, health, and configuration of network devices such as routers, switches, servers, and other IT infrastructure components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SNMP v2c

A

SNMPv2c (Simple Network Management Protocol version 2c) is an enhancement over SNMPv1, providing improvements such as better performance and more efficient error handling, but it still has security limitations. The “c” in SNMPv2c stands for community-based security, which means that it uses community strings (like in SNMPv1) for authentication, rather than more advanced methods like those introduced in SNMPv3. Not Encrypted like V3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMP v3

A

SNMPv3 (Simple Network Management Protocol version 3) is the latest version of SNMP and addresses many of the security vulnerabilities found in earlier versions (SNMPv1 and SNMPv2c). While SNMPv1 and SNMPv2c rely on community strings for authentication, SNMPv3 introduces features for enhanced security, including authentication, encryption, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

OID (SNMP)

A

Object ID - A MIB will contain a database of information with OIDs so a query knows how to ask for certain data. Looks like 1.3.6.1.2.11.23 - each number refers to a category of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Community Strings (SNMP)

A

In SNMP (Simple Network Management Protocol), community strings act as passwords for controlling access to network devices. They are used to authenticate and authorize management stations (like network monitoring tools) to interact with network devices such as routers, switches, and servers. These community strings are sent in plaintext (in SNMP versions 1 and 2c), which makes them vulnerable to interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authentication (SNMP)

A

Authentication (SNMP) refers to the methods used to verify and secure the identity of users or devices communicating via the Simple Network Management Protocol (SNMP). Authentication ensures that only authorized entities can access or manage network devices such as routers, switches, and servers through SNMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

NetFlow

A

Summary of stats based on the flows of traffic traversing the network. Works with a probe and collector, the probes are placed somewhere in the network and report back to the collector. Software then queries the collector for data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SIEM

A

System Information and Event Management - Takes all kinds of network data and puts them in a management console that can be used to view and analyze.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

List the 2 important parts of SIEM

A

Aggregation: we can grab data from different places and are storing, Correlation: checking for patterns in the data that might reveal issues or other occurences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Syslog

A

Syslog (System Logging Protocol) is a standardized protocol used for collecting, forwarding, and storing log messages from various devices within a network, such as routers, switches, firewalls, and servers. It provides a way for devices to log events and send those logs to a centralized server, known as a Syslog server, for monitoring, analysis, and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Port Mirroring

A

You can duplicate all data coming through a port on another port so you can monitor what data is going in an out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SPAN

A

Switched Port Analyzer. Another name for a Port Mirror

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

DRP

A

Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Backup Plan Assessment

A

Records how much data might be lost and how much can be restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RPO

A

Recovery Point Objective - state of the backup when the data is recovered - how much data will be lost after the recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

RTO

A

Recovery Time Objective - The amount of time needed to recovery full functionality from when the org ceases to function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

List the 2 types of data when it comes to backups

A

Configuration Data and State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Configuration Data (Disaster Recovery)

A

Router settings, configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

State Data (Disaster Recovery)

A

Example would be convergence between routers, user data from an AD server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Full Backup

A

Backup of everything, takes a long time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Differential Backup

A

Backup all changes since the last full backup - Only need 2 backups to restore - the last full backup and the most recent differential backup - Fewer backups, but larger backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Incremental Backup

A

Only backs up changes from the last backup of any type - To retore, you need the full backup and all other incremental backups - More backups, but smaller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Local Backups

A

Separate backups stored locally on hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Offsite Backup

A

Backups stored offsite - for safety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cloud Backup

A

Work great - but takes a while to run - Many cloud providers will do a continuous incremental backup after the initial backup is made

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

MTTF (Disaster Recovery)

A

Mean Time to Failure - The time between the last and the next failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

MTTR (Disaster Recovery)

A

Mean Time to Recovery/Repair - Downtime, average time to repaire, time from the point of failure to the point of recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

MTBF (Disaster Recovery)

A

Mean Time Between Failure - Time between the start of the last failure and the start of the next failure - This time will include MTTF and MTTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

BCP (Disaster Recovery)

A

Business Continuity/Contengency Plan - Plan to keep the business going in times of disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Cold Backup Site

A

Takes weeks to bring online - just another office space with no operational equipment - pretty much have to set the whole thing up. Cheapest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Warm Backup Site

A

Takes a few days to bring online - some operational equipment/computers but limited

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Hot Backup Site

A

Ready to go - maybe take a few hours - the Hot site syncs with the main office so everything is ready - expensive to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Cloud Site

A

Data is in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Backup Site requirements

A

Make sure its far enough away so that the disaster that effected the main site doesn�t also affect the backup site - needs sufficient internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Order of Restoration (Disaster Recovery)

A

Sample: Power restored and working, Wired LAN, ISP link, AD/DNS/DHCP, Accounting Servers, Sales and accounting workstations, video production servers, video production workstations, wireless AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Failover

A

The process of making a backup site happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Alternative Processing Sites (Disaster Recovery)

A

Larger orgs might have different sites to host certain data - orgs might make deals with other orgs to use resources in time of need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Alternative Business Practices (Disaster Recovery)

A

How to use different accounting software, or how to take credit card payments in the event our main method goes down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

After Action Reports (Disaster Recovery)

A

Documentation of everything that happened in a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Site Resiliency

A

The process of moving from site to site to avoid/prevent disaster

55
Q

Active-Passive

A

Network Redundancy. 2 devices are installed and configured, one is working and the other just waits for the first one to fail then it will take over

56
Q

HA

A

High Availability - What can and is done to make sure data is always available to access - Load Balancing,

57
Q

Active-Active (HA)

A

An Active-Active configuration in server or data center environments refers to a setup where multiple servers, typically at least two, are simultaneously active and processing requests. This design aims to increase both availability and load balancing, ensuring that even if one server fails, the other(s) can continue to handle the workload without downtime.

58
Q

VRRP (HA)

A

VRRP (Virtual Router Redundancy Protocol): A standards-based protocol similar to HSRP, designed to allow multiple routers to share a virtual IP address and provide failover in case one router becomes unavailable.

59
Q

HSRP (HA)

A

HSRP (Hot Standby Router Protocol): A Cisco proprietary protocol that allows multiple routers to work together to present the appearance of a single virtual router to end devices.

60
Q

GLBP (HA)

A

GLBP (Gateway Load Balancing Protocol): Another Cisco proprietary protocol that provides both redundancy and load balancing by distributing traffic across multiple routers while still maintaining a single virtual gateway IP address.

61
Q

DORA

A

Steps of DHCP, Discover=Find a DHCP server, Offer=Get an offer, Request=Lock in the offer, Acknowledge=DHCP server confirmation

62
Q

DHCP options

A

IP address/Subnet/DNS arent the only thing that can be configured using DHCP. There are 256 values that can be configured by DHCP

63
Q

SLAAC (DHCP)

A

SLAAC (Stateless Address Autoconfiguration) Used in IPv6. Self-Configuration: Devices independently configure their IPv6 addresses using information provided by router advertisements (RAs). These RAs are sent by routers on the network. Stateless: There is no central server keeping track of which devices are assigned which addresses. The router sends a prefix in an RA message and devices combine this prefix with their interface identifier (often derived from the MAC address) to create a unique IPv6 address.

64
Q

Stateless Addressing

A

Assigning an IPv6 address to yourself, automatically. No separate server, no tracking of IP or MAC addresses, no lease time.

65
Q

NDP

A

Neighbor Discovery Protocol. Replaces ARP, NDP uses multicast instead of broadcasts.

66
Q

SLAAC

A

Stateless Address AutoConfiguration. Automatically configures an IP address without a DHCP server for IPv6

67
Q

DAD

A

Duplicate Address Detection. A process in IPv6 that checks for duplicate IPv6 addresses on the network.

68
Q

RS

A

Part of NDP. Router Solicitation. An IPv6 device can send out a packet to ask if there are any routers on the network. Sent to ff02::2

69
Q

RA

A

RA (Router Advertisement) is a message sent by routers in an IPv6 network to inform hosts about network parameters and facilitate automatic configuration. It is part of the Neighbor Discovery Protocol (NDP), which operates in IPv6 (replacing functions previously handled by ARP and DHCP in IPv4). Routers can send unsolicited RAs

70
Q

IPv6 bits

A

128 address

71
Q

Aggregation (IPv4-6)

A

Where all networks and subnetworks are layed out logically. 1.x.x.x is the top of the internet, 1.25.x.x and 1.43.x.x are subnetworks connected to it, and 1.25.23.x, 1.43.76.x are sub-subnetworks connected to those. This way, routing can be done quickly and logically. But this doesn�t actually work in practice cause of complexities. IPv6 can properly use aggregation and therefore is faster

72
Q

IPv6 Self-configuration

A

IPv6 addresses auto configure themselves - No ARP, no NAT, no DCHP (although there is some backwards compatibility)

73
Q

Fe80::

A

The first section of a link local IPv6 address - fe80:0000:0000:0000

74
Q

Link Local IPv6 Address

A

The IP address self-generated by each host - The first section of a link local IPv6 address - fe80:0000:0000:0000 - second part is generated from the MAC address through EUI-64

75
Q

EUI-64

A

An algorithm that turns a MAC address into the last portion of a Link Local IPv6 Address - ff-fe is added to the middle of the MAC address - Some hosts will use a Randomizer to generate the last 4 sections for security reasons

76
Q

List shorthands for IPv6

A
  1. You can drop the leading 0s. 2. You can reduce any long string of 0000s to just “::” but only once in the address
77
Q

List the 2 IPv6 Address for each Host

A

Link Local Address: Generated by the host - Internet Address: Generated and given by the gateway

78
Q

Subnetmask for IPv6

A

Is almost always /64 - Everything is CIDR with IPv6

79
Q

Dual Stack (IPv6)

A

Means you’re running IPv4 and IPv6

80
Q

Neighbor solicitation (IPv6)

A

A message sent from a client to all clients on an IPv6 network using ICMP v6 to give their MAC and IPv6 Address. The clients will respond and send out neighbor advertisements

81
Q

Neighbor advertisement (IPv6)

A

Response from clients on an IPv6 network - clients send out their addresses and MAC to everyone else on the network

82
Q

ICMP v6 (IPv6)

A

ICMP but for IPv6 - Internet Control Message Protocol - Works on the Internet layer of the TCP/IP model. No Port numbers in ICMP. Really isn’t any data - Ping is ICMP, doesn�t really send data, just want to check if someone is there and responding. ARP is also ICMP.

83
Q

Temporary IPv6 Address

A

Clients will spin up several IPv6 addresses and can alternate using them for more security

84
Q

Router Prefix (IPv6)

A

Networks up the tree will generate IPv6 prefixs and info for routers via DHCP v6

85
Q

gTLD/TLD

A

Generic Top Level Domains. .com .org .edu

86
Q

ccTLD/TLD

A

Country Code Top Level Domains. .us, .ca, .uk

87
Q

Local Name Resolution

A

When you might need to override the DNS server, to access a test server, or if the DNS server is misconfigured. Your computer has a hosts file, and it contains a list of IP addresses and host names. The entries in the Hosts file are preferred. Not all apps look to the Hosts file

88
Q

Forward Lookup

A

Device sends an FQDN to the DNS server, the server responds with an IP address

89
Q

Reverse Lookup

A

Device sends and IP address to the DNS server, the server responds with an FQDN

90
Q

Recursive DNS Queries

A

Describes the phenomenon of a DNS server discovering a record. The server will first ask the root DNS server where www.professormesser.com is, the root server will respond with the location of the .com TDL server. The requesting server can then ask the .com server, then the .com server will respond with the location of the professormesser.com nameserver, which will in turn tell the requesting server the IP of www.professormesser.com

91
Q

Resolver (DNS)

A

The device making a DNS request

92
Q

DNSSEC

A

DNSSEC (Domain Name System Security Extensions) is a set of extensions to the DNS (Domain Name System) that adds security to prevent certain types of attacks, such as DNS spoofing or cache poisoning. It ensures the authenticity and integrity of DNS responses, protecting against malicious actors who may try to inject fake DNS records into the network.

93
Q

DoH

A

DoH (DNS over HTTPS) is a protocol that encrypts DNS queries and responses by sending them over HTTPS (the same protocol used for secure web traffic). It enhances privacy and security by preventing third parties from intercepting or tampering with DNS requests.

94
Q

DoT

A

DoT (DNS over TLS) is another protocol designed to enhance the privacy and security of DNS queries by encrypting them. Similar to DNS over HTTPS (DoH), DoT ensures that DNS queries and responses are transmitted securely, but it uses TLS (Transport Layer Security), the same encryption protocol used to secure other internet communications like HTTPS, instead of HTTPS itself.

95
Q

Secondary Domain Name

A

Google / totalsem / starpt

96
Q

WWW

A

As opposed to mail.totalsem.com or ftp.totalsem.com. WWW can indicate the webserver of the domain. WWW is the host (A record) for the website. As ‘totalsem.com’ is the domain, not necessarily the website.

97
Q

Authoritative Server

A

A kind of DNS server that has final authority within a domain. It�s the server that knows the IP addresses for the domain

98
Q

Root Hints

A

The list of root servers and their IP addresses. The Root servers are the highest authority in DNS.

99
Q

Interior DNS

A

A local DNS server that uses an internal domain that isnt out on the internet

100
Q

Lookup zones

A

Classification of DNS records - Forward lookup, Reverse Lookup

101
Q

Forward Lookup

A

Forward Lookup Zone - can resolve a name to an IP address - A record, mx record, cname

102
Q

Reverse Lookup

A

Can resolve IP address back to domain name - a way mail servers can check if the mail came from the place it says it is coming from - the name is the network ID backwards followed by .in-addr.arpa - 50.168.192.in-addr.arpa

103
Q

SOA

A

Start of Authority - The primary DNS server for the domain

104
Q

Name Server

A

(NS) - Other DNS servers in the domain

105
Q

A Record

A

DNS - a host address and name - IPv4 only

106
Q

AAAA Record

A

DNS - a host address and name - but for IPv6

107
Q

CNAME

A

Canonical Name - so you don�t have to type www. This is a DNS record that points totalsem.com to www.totalsem.com

108
Q

MX Record

A

Mail Exchange Record - a special host record for mail.

109
Q

SVR Record

A

Server Record - Service location record - Points to a server that has a service -

110
Q

TXT Record

A

Just some text - used to be just like a notes sections in the DNS software - but now SPF and DKIM use the text records

111
Q

PTR

A

Reverse of an A record - Maps IP address to FQDN. Used to perform Reverse Lookups

112
Q

SPF

A

SPF (Sender Policy Framework) is a DNS record type used to prevent email spoofing by specifying which mail servers are authorized to send emails on behalf of a domain.

113
Q

DKIM

A

DKIM (DomainKeys Identified Mail) is an email authentication method that allows the recipient to verify that an email was sent by the legitimate owner of the domain and that it hasn’t been tampered with during transit. It does this by adding a digital signature to the email. Public Key goes in the DKIM TXT record

114
Q

NS Record

A

NameServer records. Points to the NameServers

115
Q

NTP

A

Network Time Protocol - Uses UDP to synchronize time - Uses Port 123 - synchronizes time through time zones

116
Q

PTP

A

PTP (Precision Time Protocol) is a network protocol used to synchronize clocks across a computer network with high accuracy. It is defined in IEEE 1588 and is widely used in applications requiring precise timing, such as telecommunications, industrial automation, financial systems, and scientific experiments. Usually runs on a separate piece of hardware

117
Q

NTS

A

NTS (Network Time Security) is a security extension to the Network Time Protocol (NTP), designed to enhance the security of time synchronization over the internet. It was introduced to address vulnerabilities in NTP that could be exploited by attackers, such as man-in-the-middle attacks, time spoofing, and denial-of-service (DoS) attacks.

118
Q

NTS-KE

A

Network Time Security Key Exchange. Another server that authenticates the NTP requests and responses via TLS. The client will ask the NTS-KE server for an authentication cookie, it will then take that cookie to the NTP server for a valid timestamp

119
Q

VPN Concentrator

A

An Encryption/Decryption access device, often integrated into a firewall.

120
Q

Endpoint 1 (VPN)

A

The virtual NIC a VPN creates on your laptop

121
Q

Endpoint 2 (VPN)

A

The VPN server at the location you are connecting to

122
Q

VPN Tunnel

A

The connection of endpoint 1 to endpoint 2

123
Q

PPTP

A

Point to Point Tunneling Protocol - A kind of VPN Protocol used by Microsoft

124
Q

L2TP/IPsec

A

Layer 2 Tunneling Protocol Over IPSec - Used mostly by Cisco

125
Q

SSTP

A

SSL Tunneling Protocol - More common

126
Q

IKEv2

A

IKEv2, or Internet Key Exchange version 2, is a protocol used to set up secure, authenticated communications for virtual private networks (VPNs). Developed by the Internet Engineering Task Force (IETF), IKEv2 is part of the IPsec (Internet Protocol Security) suite, which provides a framework for secure communications over IP networks.

127
Q

Client-to-Site VPN

A

Model of VPN - Traditional Office use VPN - Connects a computer to the office

128
Q

Site-to-Site VPN

A

Always on, a VPN tunnel from two sites where all data is always encrypted while travelling through the tunnel

129
Q

Clientless VPN

A

Usually runs inside of a browser running HTML5. Doesn�t require any client.

130
Q

Split Tunnel

A

Only some (work) traffic goes through the VPN Concentrator

131
Q

Full Tunnel

A

All traffic coming from your machine goes to the VPN Concentrator

132
Q

TightVNC

A

Tight Virtual Network Computing - a kind of RDP - VNC is cross platform, Windows to Mac

133
Q

TightVNC Port

A

5900

134
Q

Jump box/Server

A

A single server through which you can connect to many servers. SSH/VPN to the jump server