N10-009-Section_6_Bonus Flashcards

1
Q

List the 4 layers of the TCP/IP Stack

A

Application, Transport, Internet, Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the Application layer (TCP/IP)

A

Represents data users, encode and controls the dialog (Maps to the Application, Presentation, and Session layers of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the Transport layer (TCP/IP)

A

Supports communication between end devices across a diverse network (Maps to the Transport layers of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the Internet layer (TCP/IP)

A

Provides logical addressing and determines the best path through the network (Maps to the Internet layer of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the Link layer (TCP/IP)

A

Controls the hardware devices and media that make up the network (Maps to the Data-Link and physical layers of the OSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SONET

A

Backbone of the internet, as opposed to Ethernet as a standard, SONET works with higher level systems / Tier 1 internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define ARP

A

Address Resolution Protocol - If a computer has an IP address for another computer but doesn�t have the MAC, it will send out a broadcast to ask for the MAC associated with that IP so it can send frames to that computer. ARP resolves MAC addresses from IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command can you run to see the stored ARP data on a computer (Windows)

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Whats the Broadcast Address for ARP

A

FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define IANA

A

Internet Assigned Numbers Authority - They made up the classes of IP addresses and hand IP ranges out to RIR (Regional Internet Registries)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define RIR

A

Regional Internet Registries - organizations in charge of managing internet/ip standards for large sections of the world (North America, Asia, etc,,,) - RIRs give IP addresses to ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ::1

A

Loopback address for IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Static NAT (SNAT)

A

Static NAT is a one-to-one mapping between a private IP address and a public IP address. This means that each private IP address is permanently mapped to a specific public IP address. One-to-One Mapping: Each private IP is always mapped to the same public IP, regardless of when or how many times the private device communicates with external networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dynamic NAT (DNAT) (pooled NAT)

A

Dynamic NAT automatically maps a private IP address to a public IP address from a pool of available public IPs. Unlike Static NAT, the mapping is not fixed and can change every time the private device sends traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Port Triggering

A

Can trigger a different port to forward when receiving on a defined port. Example: FTP, you can set port forwarding to trigger ports 20 and 21 when a request is sent on port 20. Conditional Port Forwarding. Closes the forwarded port after the session is finished

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cisco IOS

A

Cisco CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is IGMP?

A

Internet Group Management Protocol - Works on the Internet layer of the TCP/IP model. Used in Multicast, a video server will assign the data to a multicast address. 1 video stream can enter a network and the router will propagate the data to all computers who are requesting the stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is in the IGMP Packet?

A

Source Address, Group Address, Checksum, Type - The group address is a multicast address that all computers on a network, who are requesting the video, can use to receive the stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is tracert (Windows) or traceroute (Linux)

A

Command that allows you to check all the hops from your router to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Pathping

A

Same as tracert but it uses a different protocol so it can succeed where tracert might fail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Wireshark

A

A protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Netstat

A

Command that will show the active connections on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Netstat -n

A

Presents the results numerically (no dns names, just IP addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Netstat -b

A

Shows the executable for each connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Netstat -bn

A

Netstat with b and n switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Netstat -a

A

Shows all active ports, even those without connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Netstat -r

A

Shows the local routing table - nothing to do with netstat - same as route print

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Microsoft IIS

A

Internet Information Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Apache

A

Open source web server software (vs IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of the Anonymous account on an FTP Server

A

This account allows public access to the FPT server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Traditional TLS (In Email Encryption)

A

Used the standard unencrypted ports to start the connection then switched over to the encrypted ports. IMAP 143 -> 993, POP 110 -> 995, SMTP 25 -> 465 (or 587)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

TLS

A

TLS (Transport Layer Security) is a cryptographic protocol designed to provide secure communication over a computer network. It ensures:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

STARTTLS

A

Still TLS, but at no time was it in an unencrypted state - All 3 protocols worked on 587 (although you may find questions that state it uses 465)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

SSH uses an authentication key

A

SSH uses an authentication key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is SNTP?

A

Simple Network Time Protocol - Uses UDP to synchronize time - Uses Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Stratum 0 (Network Time)

A

A level of time keeping devices that keep near perfect time - Atomic clocks, GPS, Radio Waves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Stratum 1-15 Server/Clients (Network Time)

A

Servers that synchronize within a few milliseconds of the stratum 0 devices, and so on and so forth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Exhausted DHCP scope

A

You’ve run out of addresses in the set scope (192.168.1.2-254) - Sometimes this can be because the lease time is set for too long and a bunch of devices still have leases that are no longer connected to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Net view

A

Lists what computers your computer can see within the workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Net user

A

Lists who you are in terms of the network - what computer you are on and what the account name is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Net view \<computer_name></computer_name>

A

Lists the shares that the designated computer has available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Net use

A

Can map a drive - net use w: \server\share

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Net share

A

Share a resource - net share nickname=C:\users\zach.lee\myfolder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Net accounts

A

Lists settings for account - password expiration and length info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Net start

A

Lists the network based services that are running on the system - can also start a stopped service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Net stop

A

Turn off a service - net stop “world wide Web Publishing Service”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

NetBIOS

A

NetBIOS (Network Basic Input/Output System) is a software interface and networking protocol that allows applications on separate computers to communicate over a local area network (LAN). It was developed in the 1980s and is often used in Windows networks. This service also resolves names across a network, computers can communicate by name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

LLMNR

A

The new NetBIOS - Linked Local Multicast Name Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Windows Name Resolution

A

On a domain, its done through DNS, but off domain, there are options like NetBIOS and LLMNR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Nbtstat -n

A

Lists what the computer’s name is and if it is registered under said name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Registered Names

A

Windows systems keeps track if its name and propagates it through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Nbtstat -c

A

Lists the cache of names your computer knows about - doesn�t keep the cache for long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Nbtstat -a (system_name)

A

Like running nbtstat on another computer - shows its name information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Nbtstat -r

A

Lists stats on what the computers been doing on the network - what computers it’s been talking to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Nbtstat -R

A

Uppercase R - clears remote cache table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Nbtstat -RR

A

Uppercase RR - Rebroadcasts your registered information out on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Dynamic DNS (DDNS)

A

A service that automatically updates DNS records. If you have a device or server with a DHCP address, its difficult to map this to a domain name cause it might change. DDNS will keep track of these changes so its not an issue. There is a DDNS client on the device or router that will update the DDNS server if its IP address changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Ipconfig /displaydns

A

Lists the DNS cache on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Nslookup

A

Name saver lookup - Most DNS servers are locked down and wont respond - You can get the answer to “Is this a DNS server?” and “is it running”? - Know what the output of this command looks like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DIG

A

Domain information groper - doesn�t come with windows - Needs software like EzDig - Can test DNS servers and query them for information - Most DNS servers are locked down and won’t respond - You can get the answer to “Is this a DNS server?” and “is it running”?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

CIA of security

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Non-repudiation

A

Non-repudiation in network security is a method to ensure that a user or a system cannot deny the authenticity of their actions or communications. It provides proof of data integrity and authenticity, typically through mechanisms like digital signatures and encryption, making it possible to verify the origin and integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Symmetric Encryption

A

A method of encryption in which data can be encrypted and decrypted with the same key - To decrypt you need an algorithm and the key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Asymmetric Encryption

A

Uses a public key and a private key - Public key to encrypt, private key to decrypt. (Key pair) - An algorithm is used to create a private and public key pair. The two are tied together mathematically, but cannot be derived from each other. Each side of the encryption has their own pair. Each side gives the other a copy of their public key. When sending info to side B, Side A can use Side B’s public key to encrypt the data, then send it to side B, then B can decrypt with its private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Hash

A

An algorithm that will transform a chunk of data to a fixed size value (no matter the length of the original data) - This can be used to verify that data has not changed or is the same. Take the input data and run it through the Hash, then match the output of the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

List types of common Hashes

A

MD5, SHA1 and SHA2 (SHA2 = SHA256, and more)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Authentication Attributes (AAA)

A

Something you do (Signature), Something you exhibit (typing speed), Someone you know (Signed Cert from a trusted source), Someone you are (Location)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

MAC (AAA)

A

Mandatory Access Control - Label is put on the resource and that defines what you can do with the resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

DAC (AAA)

A

Discretionary Access Control - Owner can be added to the resource - other people can be readers and writers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Radius provides AAA (Just a note)

A

Radius provides AAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Radius Supplicant

A

The device - Computer / phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Radius Client

A

The Access Point that has been setup for Radius

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Radius Server

A

The server through which authentication is done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Radius Database

A

Part of the radius server but might not be the radius server itself. Could be a domain controller the radius server checks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

TACACS+ User

A

The person signing in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

TACACS+ Client

A

A router / switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

TACACS+ Server

A

The server through which authentication is done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Kerberos

A

Designed to do Authentication for local area networks. Kerberos is a Microsoft Product and a copy of Windows Server must be bought to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Key Distribution Center

A

When a computer is setup to be Domain Controller it automatically becomes a Kerberos KDC. KDC consists of 2 services, Authentication service and Ticket Granting Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

TGT

A

Ticket Granting Ticket - Given to a computer after authentication by the Authentication Service (Computer is now authenticated, but not authorized), the computer then timestamps the TGT and gives it back to the Ticket Granting Service, TGS timestamps it again and sends a Token back to the computer. The token can be used to authenticate to other computers on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

EAP

A

Extensible Authentication Protocol - Allows multiple authentication methods to interplay with each other. Kerberos is mostly used over wired networks, PPP is used over wireless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

EAP PSK

A

EAP Pre-shared key - Common key everyone uses to login

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

PEAP

A

Protected Extensible Authentication Protocol - uses standard username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

EAP MD5

A

EAP-MD5 (Extensible Authentication Protocol - Message Digest 5) is an authentication method used in network security, particularly in wireless and PPP (Point-to-Point Protocol) environments. It employs the MD5 hashing algorithm to provide authentication for a user or device attempting to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

EAP TLS

A

EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) is a highly secure EAP authentication method widely used in wireless networks and VPNs. It leverages TLS (the same protocol used for HTTPS) to provide strong mutual authentication between clients and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

EAP TTLS

A

EAP-TTLS (Extensible Authentication Protocol - Tunneled Transport Layer Security) is an EAP authentication method that enhances security by encapsulating client authentication within a secure TLS tunnel. It provides flexibility in how user credentials are transmitted while maintaining robust encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Single Sign On

A

Single password and username used to authenticate through multiple devices and resources - Managed by AD (or something else)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Federated Systems

A

Systems on the same domain - the same domain means they have a trust relationship with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Unsigned Cert

A

No third party vouching for the cert - it�s a cert created in house - Can be used if there is another level of trust somewhere, like “you work for me” so you trust the cert I generated is legit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Web of Trust

A

Multiple users who trust each other. Over time, there is a bunch of people who trust other people who trust other people etc� Difficult to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Change the default password on switches (just a note)

A

Change the default password on switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Data VLAN

A

Traditional VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Voice VLAN

A

Prioritizing Voice traffic to improve Qos for voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

InterVLAN Routing

A

Virtualization of a Router so VLANs on the same switch can talk to each other without a separate router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

You can use a router to connect between 2 VLANs (just a note)

A

You can use a router to connect between 2 VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

802.1Q

A

Protocol that allows trunking to happen across switches from different manufacturers - Needs to be enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

VTP

A

VLAN Trunking Protocol - Cisco Proprietary - Used to automate the updating of multiple VLAN switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Consol/Rollover/Yost Cable

A

Cable used to connect a computer to a switch or device. Uses the console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Enable (Cisco IOS)

A

To enter privileged mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

> (Cisco IOS)

A

Regular mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

(Cisco IOS)

A

Privileged mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Show running-config (Cisco IOS)

A

Gives information about the switch configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Show interface fa 0/1 (Cisco IOS)

A

Shows the information for Fast Ethernet port 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Runts (Cisco IOS)

A

Packets that are underneath the required Ethernet standard amount of bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Giants (Cisco IOS)

A

Packets that are over the required Ethernet standard amount of bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Show route

A

Command that could be on a layer 2 switch or router - displays the routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Copy run start (Cisco IOS)

A

To save your configuration changes - copys the altered configuration to the running configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Switch Port

A

Cisco coined the term - a port with no IP address - to differentiate it from router ports or network card ports - Don�t work on layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Root Bridge

A

Root switch - when switches are plugged in they negotiate based on distance to each switch which switch should be the boss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Root Guard

A

Solution to prevent malicious switches from being plugged in and designating themselves as the root bridge. Once the Root Bridge is established, the MAC address is cached so that all switches know if there is an imposter trying to act as the Root Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

BPDU Guard

A

Bridge Protocol Data Units Guard - Ports can be configured to only work for computers and not for other switches. This guards against another switch being plugged in. When switches are plugged in they send out BPDUs and the ports with BPDU Guard enabled, will disable themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

DHCP Snooping

A

You can designate ports on a switch to know that they are connected to a DHCP server, that way if another DHCP server is plugged in the switch can detect and ignore/disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Port Bonding / Port Aggregation

A

Combining 2 ports on a switch to increase bandwidth. If you have a trunk port that is overwhelmed, you can bond another port to it to help with the load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Port Bonding Setup

A

Create a group first, then add the ports to that group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Port-Channel

A

A group in a cisco switch for port bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Bonded ports active vs passive

A

One port needs to be active on one of the 2 devices (or both ports active). If both are passive it won’t work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Round Robin via DNS

A

A DNS server that can load balance to multiple servers hosting the same information - All servers will be in a lookup zone

118
Q

DNS Delegation (Load Balancing)

A

The DNS server will have reverse lookup zones to see where the client is coming from, then it can delegate that traffic to the closest server

119
Q

Server-side load balancing

A

Requires some software that is in the same location as the server - This software/box can manage the load for a group of servers

120
Q

Clustering

A

Servers can have a separate network they can talk to each other on, this way they can verify data and make sure they all are the same

121
Q

Interior Firewall

A

A Robust firewall that sits between our computers and a DMZ - Or another section of your network that needs to be blocked

122
Q

DNS and IPv6

A

DNS can be a little difficult on IPv6 cause addresses are aggregated and distributed from on high by DHCPv6, your clients will often get DNS server info from the router<ISP. Most of the time this is fine, but if you need to use an internal DNS server it can mess things up

123
Q

VNC

A

Remote Desktop Client - Unencrypted

124
Q

Tunnel

A

Tunnel is when you create a secure connection between two networks or devices, then run an app through the secure connection - SSH creates a secure connection, then VNC runs on the SSH connection so it is secure - Tunning is to provide encryption where there normally isnt

125
Q

BWDM or BWM

A

Bidirectional Wavelength Division Multiplexing - Fiber technology - Allows a single fiber connection to carry multiple signals by using a different wavelength and/or color

126
Q

DWDM

A

Dense Wavelength Division Multiplexing - More popular than BWDM, Allows a single fiber connection to carry multiple signals by using a different wavelength and/or color - Supports 150 signals

127
Q

CWDM

A

Coarse Wavelength Division Multiplexing - Simpler than DWDM but cheaper

128
Q

Private WANs

A

Private WANs (Wide Area Networks) are networks that connect geographically dispersed locations using private, dedicated connections instead of public infrastructure like the internet. These networks are typically used by organizations to securely connect their various sites (such as branch offices, data centers, and remote locations) over long distances.

129
Q

MPLS

A

Private WAN technology - Multiprotocol Label Switching - Provides more efficient connections - Uses a label system within packets to direct

130
Q

Metro-Ethernet/optical

A

Private WAN technology - Metropolitan Area Network (MAN) Secure Private Network within a city that doesn�t use the internet, so doesn�t need to be as secure. Cheaper

131
Q

Symmetric DSL

A

Download and upload are the same

132
Q

Asymmetric DSL

A

Higher speed download than upload

133
Q

DSL Filter

A

Would plug into a telephone and filter out the DSL noise

134
Q

VDSL

A

Very High bit rate DSL - Same tech but uses fiber

135
Q

MAC Address Clone

A

Cable modems don’t like when the MAC address of what they are plugged into changes. MAC Address Clone is how a router can grab and use the MAC address from a computer to make the cable modem happy

136
Q

ICA

A

The company Citrix used Independent Computing Architecture for the first remote desktops

137
Q

CSMA/CA

A

Carrier-Sense Multiple Access with Collision Avoidance - Part of 802.11 - Wireless clients don�t send anything unless the coast is clear to avoid collisions

138
Q

DSSS

A

Digital Sequence Spread-Spectrum - Old - One form of the actual transmission of data - the Singal is spread across the sub frequencies of a single channel so that if one copy gets stopped the others get through

139
Q

OFDM

A

Orthogonal frequency-driven multiplexing - Newer - One form of the actual transmission of data - Wider range of spread than DSSS - used on 5Ghz spectrum

140
Q

DHCP issue limiting

A

You can limit the amount of DHCP leases that can be distributed for security reasons

141
Q

Remote Management (Access Points)

A

Allows you to connect wirelessly to the AP instead of plugging straight in

142
Q

Client Isolation

A

Means clients can connect to the AP, but not to each other, even though they are on the same broadcast domain

143
Q

Deauthentication Attack

A

When software is used on a network to trick clients into thinking they need to re-connect (re-authenticate) to the wifi so they can connect to the Evil Twin

144
Q

List 4 environmental interference for WiFi

A

Reflection (Metal), Refraction (Glass), Absorption (Concrete), and Attenuation (Distance)

145
Q

Mesh Network (Wireless)

A

Uses Mesh WAPs - Uses 1 main WAP - other nodes communicate among each other and transmit back to the WAP

146
Q

Changes to the network (wifi-profile) can cause slowness

A

Forget and re-connect

147
Q

Over capacity (Wireless)

A

Causes slowness - not enough WAPs for the clients

148
Q

List the 4 parts of Virtualization

A
  1. Computer, 2. Hypervisor, 3. Virtual Machine, 4. VDHX
149
Q

Type 2 Hypervisor

A

Hypervisor that runs ontop of the OS (Hyper-V)

150
Q

Type 1 Hypervisor

A

Hypervisor that boots up as the computer - VMWare?

151
Q

Scalability (Cloud)

A

Benefit of virtualization - the ability to take a VM and add more system resources

152
Q

Security Implications (Cloud)

A

Cloud providers can setup different accounts with different permissions to hold to the principle of least privilege

153
Q

VDI

A

Virtual Desktop Interface - Not the same as DaaS - more in-house servers that provide a windows (or other) desktop and apps - Like how a student can login with a chromebook

154
Q

Automation (IaC)

A

Automation in IT is the process of using scripts or tools to perform repetitive tasks without human intervention. It covers a wide range of tasks, from installing software and deploying applications to testing code and monitoring systems.

155
Q

Orchestration (IaC)

A

Orchestration involves coordinating and managing a series of automated tasks across multiple systems or services to achieve a goal. It�s typically used to manage more complex workflows where multiple automated tasks need to interact in a specific order.

156
Q
A

Orchestration goes beyond individual task automation to handle the entire process or workflow, which might involve multiple services, environments, or dependencies.

157
Q

Distributed Switching

A

Centralized configuration of multiple switches on a network

158
Q

SAN Controller

A

Device that manages the SAN storage - connects with a special connection - Fiber Channel or iSCSI or Fiber Channel over Ethernet (FCoE)

159
Q

Multipathing (SAN)

A

Several Network Cards/Paths to connect the SAN. For redundancy

160
Q

HBA

A

Host Bus Adapter - connects a computer to a Fiber Channel connection

161
Q

Pod (Classic DC)

A

A group of racks served by a single top of rack switch (or 2 for redundancy)

162
Q

Infrastructure Plane/Layer

A

Infrastructure Plane: SDN - This plane consists of the physical and virtual networking devices (switches, routers, etc.) that make up the network�s hardware layer. It underpins all other planes, as it includes the tangible elements through which data flows.

163
Q

Application Plane/Layer

A

Application Plane: The application plane in SDN contains network applications and services that can request resources from the control plane. These applications can include things like security, load balancing, or network monitoring tools, providing functionality based on network insights and control policies.

164
Q

PDU

A

Power Distribution Unit - Takes AC from the grid and usually converts to DC (but not always) distributes the power to the devices in a rack -

165
Q

Logical Network Diagram

A

Diagram of IP addresses and how stuff connects - not concerned with how stuff is laid out physically

166
Q

Baseline Configurations

A

Documentation of the baseline CPU/Power and other usages so it can be compared against times of high usage or issues

167
Q

CAN

A

Campus Area Network - several buildings connected together

168
Q

PAN

A

Personal Area Network - bluetooth devices that are connected

169
Q

Unified Communications

A

Voip on steroids - Phones/systems with cameras/mics and screens for video conferencing/real time - Has devices and servers that support

170
Q

Video Conferencing vs Real Time video

A

Video Conferencing is one way, everyone can hear/see the speaker - with Real Time everyone can talk at once (Teams)

171
Q

UC Device

A

Unified Communications Device - Camera Phone

172
Q

UC Gateway

A

Unified Communications Gateway - Device to connect UC devices to other UC devices across networks

173
Q

Medianet (UC)

A

A bunch of UC Gateways that work together to promote QoS for UC traffic

174
Q

RTP (UC)

A

Realtime Transfer Protocol - used in Unified Communications - UDP port 5004, 5005

175
Q

SIP (UC)

A

Session Initiation Protocol - used in Unified Communications - TCP ports 5060, 5061

176
Q

H.323 (UC)

A

International Telecommunication Union protocol - controls and switches how audio/video travel over a network TCP port 1720

177
Q

MGGP (UC)

A

Media Gateway Control Protocol - UDP/TCP ports 2427, 2727

178
Q

ICS

A

Industrial Control Systems - Where automation is used to control processes

179
Q

Controller / ICS Server (ICS)

A

A PC that controls some part of an industry machine - can be sensors or actuators

180
Q

Interface (ICS)

A

The place where a human can interact with the ICS server and monitor or make changes

181
Q

DCS (ICS)

A

Distributed Computer/Control Systems - Extension of ICS - Several systems each controlled by an ICS server, then a main DCS server to control them all

182
Q

SCADA (ICS)

A

Supervisory Control and Data Acquisition - Designed for long distance stuff like Oil piplines or railways - ICS systems need to be more ready to control cause it may take time before a human can get onsite and interact - SCADA has a remote terminal unit (not used in traditional ICS)

183
Q

PLC (ICS)

A

Programmable Logic Controller - A computer (no monitor/keyboard) to run a system, usually has a special OS that is for the machine

184
Q

HMI (ICS)

A

Human Machine Interface - a computer with an interface specific to the machine being monitored

185
Q

Security Risks

A

Dangers that can expose a network to attacks

186
Q

Business Risks

A

Dangers that can interfere will daily operations and productions

187
Q

AUP

A

Acceptable Use Policy - Document that states the limits of use on a device, defines ownership of the device, defines what websites you can access or what software you can use

188
Q

RAP

A

Remote Access Policy - Defines how you can connect to a network from outsite the network, you have to use a VPN, or an Ipsec VPN

189
Q

Password Policy

A

Defines the password requirements

190
Q

IT Safety Policy

A

How to lift heavy objects, equipment handling and safety

191
Q

NDA

A

Nondisclosure Agreement - binds you to silence about certain things

192
Q

License Restriction

A

Any ruleset that controls how you handle licensing for certain products, usage, transfer of licenses (to another entity) License renewal

193
Q

International Export Control

A

Restrictions on information that is sent outside the US, military info, nuclear info, license keys

194
Q

Strategic Change

A

Strategic Change: This type of change involves long-term goals and typically affects the organization’s overall direction or objectives. Strategic changes might include adopting new technologies to stay competitive, aligning network design with business goals, or implementing wide-scale security policies. They are often high-level, planned changes that require significant resources and planning because they impact the organization�s future path.

195
Q

Infrastructure Change

A

Infrastructure Change: This is more focused on modifying the network�s physical or virtual infrastructure to improve performance, scalability, or reliability. Infrastructure changes might include upgrades to network hardware (like routers, switches), introducing more bandwidth, or making adjustments to support new software applications. These changes are generally operational and are often performed as part of routine network maintenance.

196
Q

List the steps of a Change Request

A
  1. Type of Change, 2. Configuration Process, 3. Rollback Process, 4. Potential Impact, 5. Notification (of the org, to the change)
197
Q

Last step of change management

A

Documentation

198
Q

List the 2 types of Threat Assessments

A

External Threats, Internal Threats

199
Q

External Threats

A

Malware, hackers, social engineers

200
Q

Internal Threats

A

Employees - bad actors or accidents

201
Q

Vulnerability Assessment

A

Old computer, unpatched software

202
Q

Posture assessment

A

Posture Assessment refers to the evaluation of an organization�s overall security status. This process involves examining the network, devices, software, policies, and user behavior to determine how well they align with security best practices and regulatory requirements. A posture assessment aims to identify vulnerabilities, assess potential threats, and determine the level of risk the organization faces.

203
Q

List the 2 types of Business Risk Assessments

A

Vendor Assessment, Process Assessment

204
Q

VIP

A

Single IP address that several servers in a cluster use. So from the outside it only looks like one server, but the inside has redundancy and load balancing

205
Q

Fault Tolerance

A

The ability of a system to withstand disruptive events or component failure

206
Q

Single Point of Failure

A

Artosis Pylon

207
Q

MOU

A

Memorandum of Understanding - Defines an agreement between two parties, used where a legally binding contract is inappropriate - All hospitals in a city make an MOU to take each others patients in case of a disaster

208
Q

MSA

A

Multi-Source Agreement - Serves in lou of a standard - Two companies can agree to make parts for their proprietary equipment that work with each other. Might eventually become a standard

209
Q

SOW

A

Statement of Work - Legal contract between two parties (vendor and customer) - Defines services to be performed, time frame/deliverables, defines milestones/progress

210
Q

List the 4 steps of the first responder (Incident Response and Forensics)

A
  1. Secure the area, 2. Document the Scene, 3. Collect Evidence, 4. Interface with Authorities
211
Q

Chain of Custody

A

Paper trail of who has what access to what evidence as it progresses through authorities

212
Q

Legal hold

A

Process of an organization preserving and organizing data in anticipation of a pending legal case

213
Q

Electronic Discovery (e-discovery)

A

The process of requesting the data and providing it in a legal way

214
Q

BYOD Policy

A

Allows user to bring their own device for work purposes. The policy can define how the device is used and what may be wiped in the offboarding process.

215
Q

COBO

A

Corporate-owned, Business only - Business owns all devices

216
Q

COPE

A

Corporate-owned, personally Enabled - Business owned, but the user will receive some guidelines on how they can use the device for personal stuff

217
Q

CYOD

A

Choose your own device - Users can

218
Q

Defense In Depth

A

A layered system of security measures. 1. Perimeter, 2. Network, 3. Host/Endpoint, 4. Application, 5. Data

219
Q

Perimeter Layer (Defense In Depth)

A

Doors/locks

220
Q

Network Layer (Defense In Depth)

A

Security can be implemented using network segmentation enforcement (VLANs) and network access control

221
Q

Host/Endpoint Layer (Defense In Depth)

A

Endpoint security, updates

222
Q

Application Layer (Defense In Depth)

A

Apps can be tested on a VM to make sure they don�t create vulnerabilities on the network

223
Q

Data Layer (Defense In Depth)

A

Separation of duties - no user has access to every part of a system or process, encryption probably

224
Q

Volume Attack

A

A type of DoS attack, just a ton of nonsense to deny service, ping flood, UDP flood

225
Q

Protocol Attack

A

A type of DoS attack, does something unusual with the underlying protocol (DNS, HTTPS) that causes the server to do weird things and keep it from answering quickly. Syn Flood, or SYN/TCP attack. Client will continuously send SYNs to the server and never wait for a SYN ACK response.

226
Q

Application Attack

A

A type of DoS attack, attacks the application directly that keeps the app on the server from resolving quickly. Slow Loris Attack - client will initiate the session with the server, and never respond making the server wait for responses that never come

227
Q

Amplification Attack

A

Smurf attack - Attacker spoofs the websites IP address so everyone on the network starts talking back to the target

228
Q

C&C

A

Command and Control - when malware is propagated from a single computer throughout a network to create a botnet

229
Q

Typosquatting

A

URL highjacking - www.googel.com

230
Q

Domain Highjacking

A

When an org doesn�t update their domain and someone else grabbed it first

231
Q

Replay Attack

A

A Replay Attack is a type of network attack where an attacker intercepts valid data transmissions and re-sends them to deceive the recipient into thinking it�s legitimate communication. In essence, the attacker “replays” or duplicates a previously captured message to gain unauthorized access or perform an action on behalf of the sender.

232
Q

Downgrade Attack

A

Makes a server provide a downgraded level of security (for a webpage) so it can be exploited

233
Q

Session Highjacking

A

Two people are already talking, and someone gets in the middle of the session and injects information

234
Q

DoD 5220.22-M

A

Department of Defense standard for wiping data - drive has to face at least 3 passes of reformatting

235
Q

Adware

A

Not exactly malicious, but annoying

236
Q

Spyware

A

Keyloggers, hides and tracks data

237
Q

RAT

A

A Remote Access Trojan (RAT) is a type of malware that provides an attacker with unauthorized remote access to a victim’s computer. Once a RAT is installed on a target system, it allows the attacker to monitor user behavior, access sensitive information, activate the webcam or microphone, capture keystrokes, and control files and applications remotely.

238
Q

Ransomware/Crypto-malware

A

Locks a computer/files until you pay

239
Q

Backdoor (malware)

A

Opening in a software for maintenance

240
Q

List kinds of Social Engineering

A

Dumpster Diving, Phishing/Whaling, Shoulder Surfing, Eavesdropping, Tailgating/piggypacking, Access Control Vestibule (Mantrap), Masquerading (impersonating)

241
Q

CVE

A

Common Vulnerabilities and Exposure - A list of common vulnerabilities. Each vulnerability has an ID number

242
Q

CAN

A

CVE Numbering Authority

243
Q

Zero-day vulnerability

A

The unknown flaw that a hacker finds

244
Q

Zero-day exploit

A

The method the hacker uses to attack the vulnerability

245
Q

Zero-day Attack

A

An attack with no known vulnerability, the attack itself (in the 3 steps)

246
Q

Deterrent Physical Control

A

Outside Lighting, Signage (warning sign), Security Guards

247
Q

Preventative Physical Control

A

Fence, Mantrap, Air gaps (separates important cables from everything else), Safe/Cabinets, Locks, Cable Locks, Screen Filters

248
Q

K Ratings

A

Strong Fences that can stop vehicles (15,000lb). K4=30mph, K8=40, K12=50

249
Q

Detective Physical Tools

A

Alarms, Cameras, Motion Detectors, Log FIles

250
Q

Compensating and Corrective Controls

A

Security Guard Guarding a broken fence

251
Q

DAI

A

Dynamic ARP Inspection - Cisco - Compiles a list of known-good MACs and Ips

252
Q

Switch Port Protection

A

Term for port security

253
Q

Disable Unused Switch Ports

A

Or unneeded network services such as ICMP

254
Q

RA Guard

A

RA is unsecure, RA guard protects from rogue RA messages

255
Q

CoPP

A

Control Plane Policing (CoPP) is a feature used in networking devices (such as routers and switches) to protect the control plane by regulating and controlling traffic destined for it. The control plane is responsible for processing network control traffic (like routing updates, management protocols, and ICMP messages). If left unprotected, it can be overwhelmed by malicious or excessive traffic, leading to degraded performance or even denial of service.

256
Q

Bastion Host

A

The router on the internet side of a DMZ

257
Q

Network Firewall (Hardware Firewall)

A

The firewall at the edge of a network

258
Q

UTM

A

Unified Threat Management - Firewall/VPN Endpoint/Proxy/Anti-Malware - Threat Management at every level

259
Q

Stateless Firewalling

A

Original Firewall - Filters based primarily on IPs and MAC - Weakness is that you have to identify and tell the firewall literally what to block - it�s a dumb firewall

260
Q

Stateful Firewalling

A

Smart Firewall - Creates a State Table - Keeps track of what is going out so that it expects what will be coming back in

261
Q

DPI (Firewalling)

A

Deep Packet Inspection - Firewalls can look and block based on application and context - Application or Context Aware (runs at Layer 7 of OSI)

262
Q

Network Monitoring

A

Link State, Temperature, Electrical Load, Duplex and Speed, Send and receive traffic, CRC errors, Giants and Runts, Encapsulation Errors

263
Q

Error Rate

A

Frames or Packets that are malformed or fractured

264
Q

Packet Drops

A

Measure the amount of packets a device can’t handle

265
Q

FIM

A

File Integrity Monitoring (FIM) is a security control that tracks and detects changes to files and directories in a system. It helps ensure the integrity of critical system and configuration files by monitoring for unauthorized or suspicious modifications, additions, or deletions.

266
Q

Normalization

A

The act of a database creating different tables to subset data in smaller chunks (Clinic_Location_Information, Clinic_ISP_Info, instead of all in the same row)

267
Q

WORM

A

Write Once, Read Many

268
Q

Splunk

A

Software - system Monitoring software/graphs

269
Q

ArcSight

A

Software - system Monitoring software/graphs

270
Q

ELK

A

Elasticsearch, Logstash, Kibana - Software - system Monitoring software/graphs

271
Q

Transmitter (TX)/Receiver (RX) transposed

A

Transmitter (TX)/Receiver (RX) Transposed refers to a common connectivity issue where the transmit (TX) and receive (RX) connections are swapped between two devices during cable setup. This miswiring prevents proper communication because the transmitting signal from one device fails to align with the receiving signal of the other device.

272
Q

Mismatch (Transceivers)

A

Mismatch (Transceivers) refers to an incompatibility or misalignment between the specifications or operational parameters of transceivers, which can lead to communication errors, degraded performance, or failure to establish a connection.

273
Q

Signal Strength (Transceivers)

A

Signal Strength (Transceivers) refers to the power level of a transmitted or received signal in a transceiver system. A transceiver, which combines both a transmitter and receiver, relies on signal strength to determine the quality and reliability of communication.

274
Q

IIoT

A

Industrial Internet of Things - IoT but for industry

275
Q

Jump Box/Host

A

Jump Box/Jump Host in the context of CompTIA Network+ refers to a secure, controlled system that acts as an intermediary or “gateway” for accessing and managing devices or systems within a network, typically in a secured or isolated environment (e.g., DMZ or internal network).

276
Q

In-Band vs Out-of-Band management

A

In-Band vs Out-of-Band Management refers to two methods of accessing and managing network devices like routers, switches, and servers for configuration, troubleshooting, and maintenance.

277
Q

Prefix Length

A

In networking, prefix length refers to the number of bits used to represent the network portion of an IP address. It is commonly expressed in CIDR (Classless Inter-Domain Routing) notation, where the prefix length is written after the IP address, separated by a slash (e.g., 192.168.1.0/24). The prefix length determines how many bits of the IP address are used to identify the network, and the remaining bits identify hosts within that network.

278
Q

VIP

A

VIP (Virtual IP Address) is an IP address that is not tied to a specific physical network interface or device but instead represents an abstracted address used in various networking scenarios. A VIP allows for better management, load balancing, and redundancy across a network.

279
Q

VLAN Database

A

A VLAN Database is a configuration on network devices (such as switches or routers) that contains the list of VLANs (Virtual Local Area Networks) configured within the network. This database is used to manage VLAN IDs, their associated names, and sometimes the VLAN-specific settings like ports, IP addresses, and routing configurations. It helps network devices understand the structure of VLANs in the network and how to handle traffic accordingly.

280
Q

OWE

A

In wireless networking, OWE stands for Opportunistic Wireless Encryption. It is a security feature introduced as part of the Wi-Fi Alliance’s WPA3 standard to enhance the security of open Wi-Fi networks (those without a password). This connection blocks connection to other devices on the network.

281
Q

CAPWAP

A

Control and provisioning of WAPs - Manages multiple WAPs from one place

282
Q

Port-side Exhaust/Intake

A

In the context of networking, rack or server management, the terms port-side exhaust and port-side intake typically refer to the airflow direction and positioning of cooling systems in data centers or server racks. These terms are especially relevant for managing server cooling and optimizing airflow to prevent overheating and ensure the efficient operation of networking equipment and servers.

283
Q

Direct Connect (Cloud)

A

Direct Connect (often referred to as AWS Direct Connect, but also applicable in other cloud environments) is a cloud service offering that provides a dedicated, private network connection between a user�s on-premises infrastructure and a cloud service provider (such as Amazon Web Services - AWS, Microsoft Azure, or Google Cloud). The primary goal of Direct Connect is to provide a more reliable, consistent, and secure network connection compared to using the public internet.

284
Q

Network Security Groups (Cloud)

A

Network Security Groups (NSGs) are a key component of cloud security, particularly in services like Microsoft Azure and other cloud platforms. NSGs act as virtual firewalls that control inbound and outbound traffic to and from network interfaces (NICs), virtual machines (VMs), subnets, or other cloud resources within a Virtual Network (VNet).

285
Q

Network Security Lists (Cloud)

A

Network Security Lists (NSLs) are a security feature in cloud environments, specifically in services like Oracle Cloud Infrastructure (OCI), that allow you to define security rules to control traffic flow to and from resources within a Virtual Cloud Network (VCN).

286
Q

TFTP

A

Port 69 - TFTP (Trivial File Transfer Protocol) is a simple, connectionless file transfer protocol that is primarily used for transferring small files over a local network. TFTP is based on UDP (User Datagram Protocol), which makes it faster than protocols like FTP or SFTP but also less reliable because it does not have built-in error recovery mechanisms or connection management.

287
Q

NTP (Port)

A

Port 123

288
Q

Syslog (port)

A

Port 514 - Syslog (System Logging Protocol) is a standardized protocol used to collect and store log messages from network devices, servers, and other systems in a network. It allows for centralized logging and monitoring of system events, making it easier for administrators to track and troubleshoot issues.

289
Q

LDAP Over SSL or LDAPS

A

Port 636 - LDAP over SSL (often referred to as LDAPS) is a secure version of the Lightweight Directory Access Protocol (LDAP), which is used for accessing and maintaining distributed directory information services over a network. LDAPS encrypts the LDAP communication by using SSL/TLS (Secure Sockets Layer/Transport Layer Security) to secure the connection between the client and the LDAP server.

290
Q

SQL Server (Port)

A

1433

291
Q

SIP (Port)

A

5060/5061