Nationals 01 Flashcards
This layer of the OSI model includes pin layouts, voltages, cable specifications, hubs, and network interfaces.
Physical Layer
This layer of the OSI model communicates directly with the media that transmits bits
Physical Layer
This layer of the OSI model consists of a media access control layer (MAC) and logical link control layer (LLC)
Data Link
This layer of the OSI model ensures messages are delivered to proper LAN devices using MAC addresses
Data Link
This layer of the OSI model includes specifications for MAC addresses, Switches, ARP, and DHCP
Data Link
This layer of the OSI model manages logical device addressing, tracking device locations on network, and determining best path for moving data
Network
This layer of the OSI model includes internet protocol (IP), internet control message protocol (ICMP), and router information protocol (RIP)
Network
This layer of the OSI model segments and reassembles data from upper layers to be united on the same data stream.
Transport
This layer of the OSI model provides logical connection between sending and destination hosts, flow control, and error recovery
Transport
This layer of the OSI model includes user datagram protocol (UDP) and transmission control protocol (TCP)
Transport
This layer of the OSI model provides dialogue control between devices and coordinates communication between systems
Session
This layer of the OSI model ensures that an application’s data is separate from other user’s application data
Session
This layer of the OSI model includes specifications for NetBIOS and point to point tunneling protocol (PPTP)
Session
This layer of the OSI model is responsible for compression, encryption, and code formatting.
Presentation
This layer of the OSI model includes specifications for moving picture experts group (MPEG) and secure sockets layer (SSL)
Presentation
This layer of the OSI model includes specifications for hyper text transfer protocol (HTTP), file transfer protocol (FTP), simple mail transfer protocol (SMTP), and real-time transport protocol (RTP)
Application
This layer of the OSI model includes hardware specifications for voice over IP and Bluetooth devices
Application
This is layer one of the OSI model
Physical Layer
This is layer two of the OSI model
Data Link Layer
This is layer three of the OSI model
Network Layer
This is layer four of the OSI model
Transport Layer
This is layer five of the OSI model
Session Layer
This is layer six of the OSI model
Presentation Layer
This is layer seven of the OSI model
Application Layer
This establishes a secure connection to an organization’s private network using a public network such as the internet
Virtual Private Network (VPN)
This device provides a client PC the ability to tunnel into a LAN from the internet via an encrypted connection.
VPN Server or Endpoint
Comcast provides these tools to customers who wish to set up a VPN
Internet Connection, IP Gateway (or Modem), Static IP Address
These are two options for configuring a VPN endpoint
Assign a Static IP or Configure Port Forwarding
This is the demarc Comcast is responsible for when troubleshooting a customers VPN
IP Gateway / Modem
This is a network scheme in which portions of a network are connected to the internet, but information sent is encrypted
A VPN
A VPN encypted connection is also known as this
A Tunnel
Some VPNs may have this effect on a customers internet connection
Slow it down
Connections established to a VPN server are inherently this
latent
Three causes of VPN server connection latency
Distance and route, Simultaneously connected clients, Encryption protocols, Network Firewalls
A VPN connection speed is only as fast as this
The slowest link in the connection
This can only be disabled if the customer has a static block loaded on the device
WAN Firewall
This person should be present when installing new services at a customer’s business
The customer’s IT administrator
A business may want this feature enabled when they have their own router
Bridge mode
Static IPs will not route when this feature is enabled
Bridge mode
Disables the routing functions of the modem
Bridge mode
This feature can be enabled on a BWG/CBR to transparently bridge all customer ethernet traffic while enabling Xfinity Wifi
Advanced Bridge mode
This feature can be enabled on a BWG/CBR to transparently pass all ethernet traffic to the modem while disabling Xfinity Wifi
Basic Bridge mode
This prevents unauthorized access to or from a private network
Firewall
All messages entering or leaving the internet pass through this on the Comcast IP gateway
Firewall
This IP gateway feature allows an inbound connection request to be forwarded to a specific machine on the local network
Port Forwarding
This IP gateway feature is used to restrict outbound connections to a specific port and IP address
Port Blocking/Port Management
This IP gateway feature forwards all inbound traffic to a single specified local IP address
DMZ
Allow IP address to bypass the firewall
DMZ
This IP gateway feature translates a useable WAN IP’s inbound and outbound traffic to a specified local IP address
NAT/1 to 1 Network Address Translation
This IP gateway feature is a way to automate port forwarding based on outbound traffic on predetermined ports
Port Triggering
When a customer does not have an on site IT person, and requires services not covered by comcast, we can refer them to this Company
HelloTech
This device provides firewall protection, user access management, and advanced security features
Comcast Business IP Gateway
The Comcast Business IP gateway provides these features
Firewall protection, user access management, advanced security features
There are this many Ethernet ports on the back of the Comcast Business Router
8
There are this many telephone ports on the back of the Comcast Business Router
8
Ports 1, 3, 5, and 7 of the CBR and CBR2 are this version of registered jack
RJ14
Ports 2, 4, 6, and 8 of the CBR and CBR2 are this version of registered jack
RJ11
The backup battery backs up these lines on a CBR
phone lines 1 and 2
This Comcast Business device has built in WiFi 6 capabilities
CBR2
When installing the CBR2 over Epon, customers are limited to this many X1 boxes.
8
This color light indicates a 2.5Gbps ethernet connection on port 5 or 6 of the CBR2
Blue
The power LED will be lit this color when the CBR2 is using the backup battery for power.
Amber
This Comcast Business device can connect over HFC or EPON
CBR2
This Comcast Business device has 6 LAN ports.
CBR2
These Comcast Business devices support both phone and internet capabilities
CBR/CBR2
This must be installed along with the CBR2’s internal backup battery for voice customers over EPON
a UPS for the EPON device
This utility can be used to troubleshoot network issues by sending a packet to a specified address and waiting for a reply
Ping
This utility can be used to troubleshoot network issues by sending a packet to a specified host and showing how many hops the packet requires to reach the host
Traceroute
This should be done before replacing a previously working device
Record all of the settings
This is a frequent cause of connectivity issues for Comcast Business internet customers
Customer network problems
These type of IP Addresses are in a subnet block
Network, Routable, Gateway, Broadcast
These two steps can be taken to identify a duplicated static IP issue
Ping the static gateway IP and then unplug the modem
DHCP
Dynamic Host Configuration Protocol
Static IPs and Bridge Mode can be enabled/disabled without needing to log into the GUI through this tool
Tech360
The option to load static IP can be found in this location in Tech360
The modem’s context menu
Comcast Policy prohibits technicians from working on customer equipement past this point
Demarcation Point
The BWG/CBR combine these two pieces of internet gear
Modem and Router
This is a cloud internet security product offering SMB customers the ability to protect their business by customizing internet experiences at their sites
Comcast Business Security Edge
This Comcast business product automatically scans outgoing internet traffic requests to identify and block malware, phishing, and botnet cyber-attacks
Comcast Business Security Edge
This Comcast Business product allows customers to customize a block page and internet scheduling policies, provides a dashboard for internet activity details, has web filtering capabilities, and provides a regular activity report
Comcast Business Security Edge
This Comcast Business product works by redirecting DNS queries to Akamai DNS servers.
Comcast Business Security Edge
Cyber secrity add on for CB
security edge
Comcast Business Security Edge does not provide these types of protection
endpoint, VPN, Firewall, Antivirus
Software intended to damage or disable computers or computer systems
Malware
Network of hijacked zombie computers that are remotely used to steal data, send spam email, and perform DDoS attacks
Botnet
Most commonly deployed cyber threat
Phishing
This cyberattack is used to collect sensitve information through legitimate-looking websites and emails
Phishing
This Comcast business service provides DNS based threat defense and content filtering
SecurityEdge
SecurityEdge DNS is updated this often to stay current on potential threats.
Every 10 minutes
SecurityEdge DNS ignores this when processing a DNS request
Custom DNS settings on devices
Software intended to damage or disable computers or computer systems
Malware
Network of hijacked zombie computers that are remotely used to steal data, send spam email, and perform DDoS attacks
Botnet
Most commonly deployed cyber threat
Phishing
This cyberattack is used to collect sensitve information through legitimate-looking websites and emails
Phishing
This WiFi Pro feature allows customers to create a customized welcome page when the public WiFi is accessed
Splash Page
This Wifi Pro feature allows customers to capture analytics on connected and nearby clients through the WiFi Pro networks
Customer Analytics
This WiFi Pro feature provides a Facebook, Twitter, Instagram login to the customer on the guest splash page
Social Network Integration
This WiFi Pro feature provides customers with the ability to schedule while WiFi is broadcast from the business
WiFi Network Scheduling
This Wifi Pro feature provides customers with the ability to allocate a set limit for the downstream/upstream traffic on the guest WiFi network
Bandwidth Allocation
This Wifi Pro feature provides customers with the ability to allocate time limits to your guest’s WiFi usage sessions
Session Timeout
This Wifi Pro feature provides customers with the ability to prevent access to content deemed unacceptable by the business
WiFi Content Filtering
This Wifi Pro feature provides customers with the ability to Schedule and receive on-demand reporting on business analytics obtained from the WiFi Pro networks
Reporting
The WiFi Pro networks can be configured from this website
comcastwifipro.com
WiFi Pro access points can be provisioned with either of these two tools
Field Provisioning Portal or Tech360
WiFi Pro provisioning will typically take this long
10-15 minutes
These LEDs will be lit green upon successful WiFi Pro AP provisioning
All LEDs
WiFi Pro Access point coverage is approximately this
2500 Sq Ft
The maximum CAT5 run from the modem to WiFi Pro access point is this
300 Ft
The limit on the ceiling height for WiFi Pro device placement is this
20ft
WiFi Pro access points need these ports open
UDP 3851, TCP/UDP 80, and TCP 443
This is the maximum amount of concurrent users per WiFi Pro Access Point
60 users
This is the maximum amount of concurrent users per WifFi Pro Access Point radio
30 users
WiFi Pro is compatible with these additional bolt-on Business Internet services
Security Edge and Connection Pro
This Comcast Business product will back up mission critical items in the event of a service or power outage
Connection Pro
This is the download and upload speed of the connection pro when in backup
10mbps download and 1mbps upload
This is the amount of time Connection Pro can be on battery backup
8 hours with External UPS or 1 internal battery, 16 with 2 internal batteries
This is the wired throughput on the Connection Pro 1.0
300 Mbps
This is the wired throughput on the Connection PRo 2.0
1 gig
Connection Pro utilizes these LTE service providers
Verizon and AT&T
Connection Pro will not back up devices configured with this
Static IP
This equipment allows a group of phone stations to access a common set of telephone lines.
Key or PBX System
This equipment enables operators to deliver up to eight lines of telephony, tiered data, and other advanced Internet Protocol (IP) services
eMTA or Embedded Multimedia Terminal Adapter
This is required for all devices supporting business voice service.
Battery
This is a Telco standard device for connecting multiple telephone wires at a common point
66 Block/Punch-down Block
This is a device used to connect data wiring at a common point.
110 Block