Network + Flashcards

2
Q

what are networks used for ?

A

networks are used to make connections between machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

server

A

a device that provides resources to the rest of the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is a client ?

A

a device used by an end-user to access the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a wireless access point

A

a device that allows wireless devices to connect into a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a switch?

A

a device that connects network devices together

operates at layer 2 of the OSI model

switches learn MAC address’s by analyzing incoming traffic, when it sees a mac address not in its table it adds it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what can switches learn ?

A

switches can learn what devices are on what ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary function of a Router?

A

used to connect two different networks together and forwards traffic to and from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Media in a network?

A

connects two devices or a device to a switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the point of a Wide Area Network or WAN?

A

physically connects two geographical dispersed networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does the client server model work?

A

uses a dedicated server to provide access to files, scanners, printers and other resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

benefits of the client to server model ?

A
  • administration and backup are easier under this model
  • centralized administration
  • easier management
  • better scalability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

disadvantages of the client server model

A

-higher cost
- requires specialized OS
-requires dedicated resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the peer to peer model?

A

peers share resources files/printers directly with others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

benefits of the peer to peer model

A
  • lowcost
  • no dedicated resource
  • No specialized OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

drawbacks of the peer to peer model

A

decenetralized managament
inefficient for large networks
poor scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pan?

A

personal area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

examples of a Pan network ?

A

bluetooth devices
Usb devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

explain a LAN or local area network ?

A

connects components within a limited distance
up to a few hundred feet
small offices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what standard does ethernet use ?

A

ethernet uses the IEEE 802.3 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what standard does wifi use ?

A

wifi uses the 802.11 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what is a CAN or campus area network ?

A

connects LANs that are building centric across a university, industrial park or business park

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what does a MAN metropolitian area network connect?

A

connects scattered locations across a city or metro area ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

WAN wide area network

A

connects geographically disparate internal networks and consists of leased lines or VPNs
covers a large geographic area
the internet is the largest WAN avaliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Wan distance?

A

world wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
MAN distance
city or county
26
CAN distance
campus area or business park
27
LAN distance
room or building
28
PAN distance
around a person
29
what does phsical mean in a network
how devices are connected by media
30
what does logical mean in a network
how the actual network traffic flows
31
Bus topology ?
uses a single cable where each device taps into by using either a vampire tap or a T connector
32
Ring topology ?
uses a cable running in a circular loop where each device connects to the ring but data travels in a singular direction
33
Ring topology: Token ring ?
ring topology that uses an electronic token to prevent collosions when communicating on the network
34
Ring topology: what does FDDI use ? explain FDDI
uses two counter rotating rings for redundancy
35
star topology ?
- most popular phsical LAN topology - the central point of a star network is most likely going to be a switch
36
what is a drawback to a star topology ?
if the central device fails the whole network fails
37
Wireless: infastructure mode ?
uses a wireless access point as a centralized point and supports wireless security controls
38
Wireless: Ad Hoc mode ?
decentralized wireless network which creates P2P connections and does not require a router or access
39
Wireless mesh topology ?
interconnection of different types of nodes, devices, or radios
40
what does OSI stand for ?
OSI stands for open systems interconnection model
41
what are the 7 layers of the OSI model starting from Layer 1?
1. phsical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
42
what is the phsical layer?
- where transmission of bits across the network occurs includes phsical and electrical network characteristics
43
what does the phsical layer decide ?
the phsical layer decides the topology of the network
44
what is asynchronous communication?
uses start and stop bites to indicate when transmissions occur from the sender to the reciever
45
what is a good example of asynchronous communication ?
something like a voicemail is a good example
46
what is synchronous communication ?
uses a refrence clock to coordinate the transmissions by both the sender and the reciever
47
broadband communication ?
divides our bandwidth into seperate channels
48
what is baseband communication ?
uses all availiable frequencies on a medium (cable to transmit data)
49
what is time division multiplexing ?
each session takes a turn using time slots to share the medium between users
50
what is multiplexing ?
multiplexing is getting more out of a limited network
51
what are some examples of Physical layer devices ?
- cable - ethernet - coaxial - hubs - access points - media converters
52
what do layer 1 devices primarily do ?
usually they repeat what they are told.
53
what is the primary function of the data link layer?
packages data into frames and transmit those frames on the network
54
what do the first and second parts of a MAC address represent ?
the first 6 digits in a MAC address are the vendor code the second 6 are the unique value
55
Logical link control LLC ?
provides connection services and allows acknowledgment of receipt of messages
56
what are some examples of devices at the data link layer?
NIC's Bridges Switches
57
what is the primary function of layer 3 the network layer?
forwards routing traffic with logical addressing - the routing layer - fragments frames to travers different networks
58
what are two common layer 3 protocols ?
IPV4 and IPV6
59
what is the big question at layer 3?
the big question at layer 3 is how data should be forwarded or routed.
60
how does Packet switching / routing work ?
data is divided into packets and then forwarded based on IP address
61
what is circuit switching ?
dedicated communication link is established between two devices for the duration of the communication Like a phone call
62
what is message switching ?
data is divided into messages which may be stored then forwarded
63
what do routers maintain ?
a routing table
64
what is ICMP?
sends error messages and operational info to an IP address most commonly used ICMP is ping
65
what are common devices found on layer 3?
Routers multi-layer switches ip and routers are the most common
66
what do we call the transport layer?
the transport layer is the dividing line between what we call the upper layers of the OSI model and the lower layers of the OSI model
67
when we talk about segments and datagrams what layer are we talking about?
we are talking about the transport layer
68
what are two protocols in the transport layer?
- TCP -UDP
69
transmission control protocol ?
connection oriented protocol that is a reliable way to transport segments across the network
70
what is the UDP user datagram protocol ? EXPLAIN
connectionless protocol that is an unreliable way to transport segments across the network
71
what does connectionless mean ?
connectionless means it doesn't have to wait for connections
72
EXAM: layer 4 what is layer 4 associated with
layer 4 is associated with segments almost exclusively because we use it with TCP - TCP and UDP operate at layer 4
73
what is UDP very good for ?
udp is very good for audio and visual streaming
74
windowing ?
allows the clients to adjust the amount of data in each segment
75
what are some examples of layer 4 devices?
- TCP & UDP - WAN accelerators - Load balancers and firewalls
76
what is the primary function of the session layer ?
keeps conversations separate to prevent intermingling of data - manages communication between devices start, stop ,restart - tunneling occurs at this layer
77
how do sessions work in three steps ?
set up maintain tear down
78
explain setting up a session
checking of user credentials and assigning numbers to sessions to help identify them
79
explain tearing down a session
ending of a session after the transfer is done or when the other party disconnects
80
what is the primary focus of the presentation layer?
formats the data to be exchanged and secures the data with proper encryption - Character encoding
81
what should we remember when we think about layer 6?
when you think about layer 6 remember data formatting and encryption the presentation layer is responsible for formatting and encryption
82
what is data formatting ?
data is formatted by the computer to have compatibility between different devices
83
encryption ?
used to scramble the data in transit to keep it secure from prying eyes and provide data confidentiality
84
what is the primary function of layer 7?
provides application level services where users communicate with the computer
85
what are some things found on layer 7?
- email applications - web browsing - DNS - FTP -RDP
86
what are the 4 layers of the tcp ip model >
1. network interface 2. internet 3. transport 4. application
87
what makes up the application layer in the tcp/ip model?
the top three layers of the OSI model are all called the application layer in the TCP/IP model so the session presentation and application layers
88
what is the network interface layers function in the TCP/ip model ?
describes how to transmit bits across the network and determines how the network medium is going to be used
89
what is the function of the internet layer in the TCP/IP model ?
data is taken and packaged into IP datagrams
90
what are some examples of protocols in the internet layer for the TCP/IP model
IP ICMP ARP Reverse ARP this is essentially the network layer of the OSI model so IP's - ARP etc
91
what is the transport layers function in the TCP/IP model ?
defines the level of service and the status of the connection being used by TCP, UDP, or RTP -support for end to end services - support fo multiplexing - support for port numbers mapping
92
what is the application layer's function in the TCP/IP model ?
dictates how programs are going to interface with the transport layer by conduction session management
93
what is a port ?
logical opening on a system representing a service or application thats listening and waiting for the traffic
94
how many ports are there
65,535
95
how many well known or reserved ports are there ?
the well known or reserved port are 0-1023
96
ephermal ports ?
1024-65,535
97
what does an IPv4 packet consist of ?
- source address -destination address - ip flags - protocol
98
secure shell ssh
port 22 provides secure remote control of another machine using a text based environment
99
secure file transfer protocol SFTP
port 22 provides secure file transfers
100
Telnet
port 23 provides insecure remote control of another machine . remote access via the command prompt
101
simple mail transfer protocol SMTP
port 25 provides the ability to send emails over the network
102
Domain name services DNS
port 53 converts domain names to IP addresses and IP addresses to domain names
103
what port does Dynamic host control protocol or DHCP run on ?
ports 67,68 automatically provide network parameters to your clients such as their assigned ip address, subnet mask, default gateway, and the DNS server they should use
104
what port is trivial file transfer protocol TFTP? What is TFTP typically used for ?
port 69 UDP used as a lightweight file transfer method for sending configuration files or network booting of an operating system usually used for sending or recieving config file from a router or switch
105
Hyper text transfer protocol HTTP
port 80 used for insecure web browsing
106
what port is POP3? what is POP3 used for ?
port 110 used for recieving incoming emails
107
Network Time protocol NTP
port 123 UDP used for keeping accurate time within a network
108
Network basic input/output system NetBios
port 139 TCP used for file or printer sharing in a windows network
109
internet mail application protocol IMAP
port 143 TCP a newer method of retrieving incoming emails which imporves upon the older POP3
110
simple network management protocol SNMP
ports 161,162 UDP used to collect data about network devices and monitor there status
111
Lightweight directory access protocol LDAP
ports 389 TCP used to provide directory services to your network
112
Hypertext transfer protocol secure HTTPS
port 443 used for secure web browsing
113
server message block SMB
port 445 TCP used for windows file and printer sharing services
114
system logging protocol syslog
port 514 UDP used to send logging data back to a centralized server
115
simple mail transfer protocol transport layer security SMTP TLS
port 587 TCP secure and encrypted way to send emails
116
Lighweight directory access protocol secure
port 636 provide directory services in a secure way
117
POP3 over SSL
port 995 secure and encrypted way to recieve emails
118
structured query language server protocol SQL
port 1433 used for communication from a client to the database engine
119
Microsoft structured query language
port 3306 used for communication from a client to Mysql database engine
120
Remote Desktop protocol RDP
port 3389 provides graphical remote control from another client to a server
121
what is TCP what layer of the OSI model is it on?
TCP is a transport layer protocol that operates at layer 4 of the OSI model
122
how does TCP work ?
TCP operates by conducting a three way handshake between a client and a server and then establishes the connection
123
what is TCP considered?
TCP is considered connection oriented
124
what is UDP considered ?
UDP is considered fast and easy to use
125
what is ICMP
ICMP is used to communicate information about network connectivity isssues back to the sender ping is a great example of ICMP
126
Generic routing encapsulation or GRE?
used as a simple and effective way to create a tunnel called a GRE tunnel over a public network
127
do GRE tunnels provide us with any encryption ?
They do not
128
Internet Protocol Security IPsec
used to protect one or more data flowes between peers and it uses encryption
129
what security controls will implemeting IPSec accomplish for us ?
1. data confidentiality 2. data integrity 3. origin authentication 4. Anti-replay
130
what two protocols does IPSec use to achieve encryption ?
AH and ESP
131
IPSec: AH authentication header?
a protocol within IPSec that provides integrity and authentication
132
IPSec: Encapsulating Security Payload or ESP?
provides encryption and integrity for the data packets sent over IPSec
133
what are the three types of media?
1. copper 2. fiber optic 3. wireless
134
what is media ?
matariel used to transmit data over the network
135
what are the three types of copper media ?
1. coaxial 2. twisted pair 3. serial
136
what are f-type connectors ?
F-type connectors are a screw on type of connector
137
what are the two types of twisted pair cabeling ?
UTP or STP
138
what does UTP stand for ?
UTP stands for unshielded twisted pair
139
what does STP stand for
shielded twisted pair
140
what are the two ways someone can get access to a network ?
Deterministic and Contention based
141
deterministic ?
very organized and orderly and requires an electronic token to transmit. Like a student in a classroom getting called on
142
contention based networks ?
very chaotic and can transmit whenever possible.
143
what is the problem with contention based networks ?
you can have collosions
144
does ethernet use a contention or deterministic method ?
contention
145
how does ethernet prevent collosions ?
Ethernet prevents colisions with CSMA/CD
146
Carrier sense multiple access with collision detection CSMA/CD?
prevents collosions by using carrier-sensing to defer transmissions until no other stations are transmitting.
147
what is a collision domain ?
each area of the network that shares a single segment is known as a collision domain collision domain devices in a group whose frames can collide with each other
148
what does adding an ethernet switch do for our network ?
increases scalability of a network by creating multiple collision domains
149
bandwidth?
measures how many bits the network can transmit per second
150
how far can multi-mode fiber reach?
multimode fiber can reach distances of 200-500 meters
151
how far can single mode fiber travel ?
single mode fiber can go up to 40 kilometers
152
how far can copper cables transmit data ?
maximum distance of a 100 meters
153
Using cat 6 at 100 meters what will the speed be ?
Using CAT 6 at 100 meters will limit the speed from 10 Gbps to 1 Gbps
154
what speed will you get using CAT 6 at under 55 meters.
Using CAT 6 at under 55 meters can reach 10 Gbps of speed
155
what type of fiber should we use for long distances ?
single mode fiber
156
what sort of fiber do we need to use with long distances ?
fiber for long distances you need to use single mode
157
what is a hub?
also known as a multi-layer repeater it is a layer 1 device that connects multiple network devices and workstations.
158
what are the three types of hubs ?
1. Passive hub 2. active hub 3. smart hub
159
Passive hub ?
repeats signal with no amplification
160
Active hub ?
repeats signal with amplification
161
smart hub ?
active hub with enhanced features like SNMP
162
how does a bridge make forwarding decisions?
analyzes source MAC address and makes intelligent forwarding decscions based on the destination MAC in the frames
163
switch ?
also known as a multiport bridge it is a layer 2 device that connects multiple network segments together .
164
what is a switch essentially?
a switch is essentially a multi-port bridge
165
what layer does a router operate at ?
a router is a layer three device
166
what is a router?
layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information
167
what is a layer 3 switch ?
makes layer 3 routing decisions and then interconnects entire networks not just the network segments
168
EXAM: switch ?
layer 2 device focused on MAC addresses
169
Exam: router ?
layer 3 device focused on IP addresses
170
what are some additional features switches can offer ?
1. VLANs 2. Trunking 3. STP 4. Link aggregation 5. power over ethernet 6. Port monitoring 7. User authentication
171
what is link aggregation?
combines multiple phsical connections into a single logical connection to minimize or prevent congestion
172
what is the standard for link aggregation ?
IEEE 802.3ad
173
are switches full duplex ?
switches are full duplex which means every port can operate at 100mbps
174
power over ethernet ?
supplies electrical power over ethernet and requires cat 5 or higher copper cable.
175
what is the benfit of power over ethernet ?
the benefit of power over ethernet is instead of needing two seperate cables for power and data you can use one cord for both
176
port mirrioring ?
makes a copy of all traffic destined for a port and sends it to another port
177
switches can provide additional features such as ?
1. port mirrioring 2. secure shell ssh 3. ot-of-band-management 4. first hop redundancy 5. MAC filtering 6. traffic filtering
178
out-of-band management ?
keeps all network configurations devices on a seperate network
179
First hop redundancy
uses hot standby router protocol to create a virtual IP and MAC addresses to provide active and stanby routers
180
How do devices such as a switch do traffic filtering at layer 2 ?
permits or denies traffic based on a device's MAC address
181
what is the standard for spanning tree protocol ?
802.1d
182
spanning tree protocol STP ?
permits redundant links between switches and prevents loopong of network traffic STP is the IEEE 802.1d standard
183
shortest path bridging SPB
used instead of STP for larger network environments
184
VLAN ?
allows different logical networks to share the same phscial hardware and provides added security and efficiency
185
when do routers start to come into play ?
Routers start to come into play once we leave our local area network
186
Definition: Router
forwards traffic between subnets, between an an internal and external network or between two external networks
187
what makes a broadcast domain
each subnet or external network is going to be its own broadcast domain
188
can a multi layer switch function as a router ?
if you are using an external switch it is functioning as a router
189
how do routers make decisions?
routers make there routing decisions by using a routing table
190
Routing table?
helps determine which route entry is the best fit for the network
191
how do routers map an IP address to a MAC address?
routers use an arp cache to map an IP address to a given MAC address
192
what are the three different sources that a router can use ?
1. Directly connected route 2. Static route 3. Dynamic route
193
Routing: Directly connected route ?
learned by physical connections between routers
194
Routing: static route ?
- manually configured by an admin - there is always one default standard route in every router that is 0.0.0.0/0
195
Routing: Dynamic routing ?
learned by exchanging information between routers routers send routes to other routes
196
what are the two ways we can prevent routing loops ?
1. split horizon 2. Poising reverse
197
Split Horizon ?
prevents a route learned on one interface from being advertised back out on the same interface.
198
Poising reverse ?
causes a route received on one interface to be advertised back out on the same interface with a metric considered to be infinite
199
what are the two different types of dynamic routing protocols ?
1. internal 2. external
200
Internal dynamic routing protocols?
1. interior gateway protocol IGP - operates within an autonomous system - Example: Intranet We use this routing protocol to route within our internal networks
201
External dynamic routing protocols ?
1. Exterior gateway protocol EGP - operate between autonomous systems - example Internet BGP is one of the most commonly used routing protocols for EGP
202
Routing: Distance vector ?
Distance vector routing algorithm simplifies the routing process by assuming the cost of every link is one unit. Therefore, the efficiency of transmission can be measured by the number of links to reach the destination. In Distance vector routing, the cost is based on hop count
203
Routing: convergence ?
time it takes for routers to update their routing table in response to a topology change
204
Routing: hold down timer ?
prevents updates for a specific period of time and speeds up convergence
205
Routing: hop count ?
number of routers from the source router through which data must pass to reach the destination network
206
Routing: Link state routing protocol ?
requires all the routers to know about the paths that all other routers can reach in the network every node constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes. Examples of link state routing protocols include OSPF and ISIS
207
Routing: what is RIP or the routing information protocol?
Interior routing protocol a distance vector protocol that uses hop count - maximum number of hops it can do is 16
208
RIP features
1. updates every 30 seconds 2. easy to configure 3. Runs over UDP
209
open shortest path first OSPF?
1. a link state protocol that uses cost 2. interior gateway protocol
210
Routing: OSPF?
OSPF is known as a classless protocol, classless routing protocols are those protocols that include subnet mask information when the routing table or updates are exchanged
211
Routing: intermediate system to intermediate system or IS-IS? interior or exterior protocol ?
a link state protocol that also uses cost and functions like the OSPF protocol but is not widely popular - interior routing protocol
212
Routing: Enhanced interior gateway routing protocol EIGRP?
hybrid of distance vector and link state protocols that uses bandwidth and delay - interior routing protocol cisco protocol
213
Routing: what is BGP or border gateway protocol? Is BGP an interior or exterior routing protocol ?
a path vector that uses the number of autonmous system hops instead of router hops/ bgp is an external routing protocol - this is more concerned with how many systems you have to go through
214
Routing: route belivability ?
if a route has a lower administrative distance the route is more believable
215
network address translation NAT?
translates private IP addresses to public IP addresses for routing over public networks
216
What are the three different types of address translation ?
1. DNAT Dynamic NAT 2. SNAT static NAT 3. PAT port address translation
217
NAT: DNAT dynamic nat
automatically assigns an IP address from a pool and gives a one to one translation
218
NAT: SNAT static nat
manually assign an IP address and gives one to one translation static Nat was primarily used as a security feature
219
NAT: PAT port address translation
most common one used today sharing on one public IP by multiple private IP addresses which gives a many to one translation
220
inside local ?
private ip address refrencing an inside device
221
inside global ?
public IP address refrencing from an inside device
222
outside global?
public IP address referencing an outside device 
223
Outside local ?
private IP address refrencing an outside device
224
Outside local
private ip address refrencing an outside device
225
multicast routing ?
multicast sender sends traffic to a class D IP address known as a multicast group main goal of multicast routing is to send the traffic only to devices that wish to recieve the traffic the two primary protocols used for multicast routing are IGMP and PIM
226
what are the two primary ways of doing multicast routing ?
IGMP internet group management protocol PIM protocol independent multicast
227
IGMP internet group management protocol
lets routers know which interfaces have multicast recievers and allow clients to join a multicast group
228
PIM protocol independent multicast ?
routes multicast traffic between multicast enabled routers
229
Virtualization
allows multiple virtual instances to exist on a single physical server
230
Hypervisor
enables virtualization to occur and emulates the physical hardware
231
Popular hypervisors
VMWare ESXi Microsoft Hyper-V Virtual box Vmware Workstation
232
what is a bare metal hypervisor ?
bare metal hypervisor is when you just run the hypervisor as the OS
233
Network attached storage NAS?
disk storage delivered as a service over TCP/IP
234
Storage area network SAN?
specialized LAN that transfers data at block level with a special protocol To the users it looks and acts like a local drive A storage area network or storage network is a computer network which provides access to consolidated, block-level data storage. SANs are primarily used to access data storage devices, such as disk arrays and tape libraries from servers so that the devices appear to the operating system as direct-attached storage
235
Fiber channel FC?
special purpose hardware providing 1-16 GBPS of storage area network speed
236
what is Fiber channel over ethernet or FCOE what purpose does it serve in our networks?
removes the need for specialized hardware and runs FC over ethernet frames
237
IP small computer systems interface ISCSI
lowers cost and relies on configuration that allows jumbo frames over the network
238
InfiniBand ?
virtualized storage technology that uses a switched fabric topology and features very high throughput and very low latency
239
what problem does a virtual switch solve?
overcomes the problem of all virtual servers being on one broadcast domain
240
Virtual desktop?
a desktop computer that is run on a browser using the web
241
software defined networking SDN?
provides an easy to use front end to configure physical and virtual devices through a network
242
what is the purpose of VOIP? What does VOIP do for our networks?
digitizes voice traffic to be treated like other traffic on the network
243
what protocol does VOIP use ?
VOIP uses a protocol known as SIP Sip is used to setup and manage voip sessions SIP can also extend voice communication to include video conferencing, instant messaging, file transfers and more
244
Session initiation protocol SIP?
used to setup, maintain, and tear down calls
245
private cloud ?
systems and users only have access with other devices inside the same private cloud or system
246
public cloud ?
systems and users interact with devices on public networks such as the internet and other clouds
247
Hybrid cloud ?
combination of public and private clouds
248
community cloud ?
collaborative effort where infrastructure is shared between several orgs from a specific community with the same concerns
249
Network as a service Naas
allows for the outsourcing of a network service provider
250
Infrastructure as a service IaaS
allows for the outsourcing of infrastructure of the servers and desktops to a service provider
251
Software as a service SaaS
users interact with a web based application and the details of how it works are hidden – examples of Saas products include m065 and google docs
252
Platform as a service Paas
provides a platform for companies that develop applications without the need for infrastructure – digital ocean 
253
Desktop as a service Daas
provides a desktop environment that is accessible through the internet in the form of a cloud desktop or virtual desktop environment
254
Cloud: elasticity?
attempts to match the resources allocated with the actual amount of resource needed at any given point and time
255
Cloud: what is elasticity focused on ?
elasticity is focused on meeting the sudden increase and decreases in a workload
256
Cloud: scalability ?
handles the growing workload required to maintain good performance and efficiency for a given software or application
257
Is scalability a long term approach ?
Scalability is common to be used long term elastic approaches can change every day or every minute
258
Cloud: vertical scaling ?
increases the power of the existing resources in the working environment
259
cloud: horizontal scaling ?
adding additional resources to help handle the extra load being experienced adding additional instances instead of moving to a larger instance size
260
cloud: multitenancy
allowing customers to share computing resources in a public or private cloud
261
what are the benefits of multitenancy solutions ?
1. better storage 2. better use of resources 3. lower overall cost
262
Virtual machine VM escape ?
occurs when an attacker break out of one of the isolated VMs and begins to directly interact with the underlying hypervisor
263
infrastructure as code IAC ?
enables managing and provisioning of infrastructure through code instead of through manual processes
264
how do we use IAC effectively ?
To use IAC effectively we need to use scripted automation and orchestration
265
Cloud: orchestration ?
process of arranging or coordinating the installation and configuration of multiple systems
266
Snowflake system?
any system that is different from the standard configuration template
267
Cloud: private direct connection ?
extends pre-existing on premise data center into the providers network to directly connect to your virtual private cloud network establishes a secure, dedicated connection from your infrastructure into AWS.
268
Cloud: datacenter ?
any facility that businesses and other orgs use to organize, process, store, and disseminate large amounts of data
269
Cloud: what are the three main layers in a three tiered hierarchy ?
1. core 2. Distribution aggregation 3. access edge
270
Three tiered hierarchy: explain the Core what is the core's function in the three tiered hierarchy
- big fast expensive routers - backbone of the cloud network
271
Three tiered hierarchy: distribution aggregation what is the function of the distribution aggregation layer in the cloud three tired hierarchy
- provides boundary definitions by implementing ACL's and policies - layer three switches - packets are being properly routed
272
Three tiered hierarchy: access edge
- connect to endpoint devices - regular switches
273
what are the 4 layers we need to be aware of with SDN?
1. Application layer 2. control layer 3. infrastructure layer 4. management plane
274
SDN layer: application layer ?
focuses on the communication resource requests or info about the network as a whole
275
SDN layer: control layer?
uses the information from the application and decides how to route a packet on the network
276
SDN layer: infrastructure layer?
contains the network devices that receive information about where to provide the data and then perform those movements
277
SDN layer: Management plane?
used to monitor traffic conditions and the status of the network.
278
what can we achieve with a spine and leaf architecture
By using a spine and leaf architecture we can give faster speeds and lower latency than the traditional three-tiered hierarchy
279
Traffic Flows Datacenter: North-South?
North: traffic that is exiting the datacenter South: traffic that is entering the datacenter
280
Traffic Flows Datacenter: East-west?
refers to dataflows within a datacenter
281
deterministic ?
very organized and orderly requires an electronic token to transmit. Like a student raising his hand and getting called on
282
contention based ?
very chaotic and can transmit whenever possible the problem with this method is you have collisions
283
what sort of network access method does ethernet use ?
ethernet uses contention based network access
284
how does ethernet prevent collisions?
ethernet prevents collisions with something known as CSMA/CD
285
Carrier sense multiple access collision detection CSMA/CD?
prevents collisions by using carrier sensing to defer transmissions until no other stations are transmitting
286
Collision domain ?
each area of the network that shares a single segment is known as a collision domain
287
What does ethernet switching do for our networks?
increases scalability of a network by creating multiple collision domains
288
what does bandwidth mean in networking ?
measures how many bits the network can transmit per second
289
what is the maximum distance of copper cables ?
100 meters
290
what are the metrics of CAT 6 cables?
Using CAT 6 at 100 meters will limit the speed from 10 Gbps to 1 Gbps
291
using CAT 6 at 55 meters what sort of speeds can you get ?
Using CAT 6 at under 55 meters can reach 10 Gbps of speed
292
what are the distances typically associated with multi mode fiber ?
Multimode fibers deal with shorter distances something in the 200 to 500 meter range
293
should we use multimode fiber or single mode fiber for long distances ?
use single mode fiber for long distances
294
what sort of fiber should we use for short distances ?
you need to use multimode fiber for short distances
295
Network Devices: Hub
also known as a multiport repeater it is a layer 1 device that connects multiple network devices and workstations
296
what are the three types of hubs ?
1. passive hub 2. active hub 3. smart hub
297
Hubs: passive hub ?
repeats single with no amplification
298
Hubs: active hub ?
repeats signal with amplification used for long distances
299
Hubs: smart hubs ?
active hub with enhanced features like snmp
300
Network devices: bridge ?
analyzes source MAC addresses and makes intelligent forwarding decisions based on the destination MAC in the frames
301
Network Devices: switch ?
also known as a multiport bridge, it is a layer 2 device that connects multiple network segments together. A switch is essentially a multi-port bridge
302
Network devices: Router?
Layer 3 device that connects multiple networks and makes forwarding decisions based on logical network information
303
Network Devices: layer 3 switch ?
makes layer 3 routing decisions and then interconnects entire networks not just network segments
304
what layer does a switch operate on and what does it focus on ?
layer 2 device focused on MAC addresses
305
what layer does a router operate on and what is it focused on ?
layer three device focused on IP addresses
306
what are the additional features switches can offer?
VLAN's Trunking STP Link aggregation Power over ethernet Port monitoring User authentication
307
Switching Features: Link Aggregation ?
combines multiple physical connections into a single logical connection to minimize or prevent congestion
308
what is the standard for link aggregation ?
Link aggregation standard IEEE 802.3ad
309
what problem does link aggregation solve in a network ?
link aggregation is a solution for the problem of congestion. congestion can occur when all ports operate at the same speed
310
are switches full duplex or half duplex ?
switches are full duplex which means every port can operate at 100mbps
311
what is the standard for power over ethernet?
802.3at
312
Power over ethernet?
supplies electrical power over ethernet and requires cat 5 or higher copper cable. the benefit of this is instead of needing two separate cables for power and data you can use one for booth
313
Port monitoring or mirroring ?
makes a copy of all traffic destined for a port and sends it to another port
314
what is out of band management ?
keeps all network configuration devices on a separate network
315
first hop redundancy ?
FHRP is used to prevent network failure at a default gateway. This is achieved by configuring multiple routers with the same IP address and Mac address, thus presenting an illusion of a single virtual router to the hosts in a Local Area Network (LAN). this helps with redundancy
316
MAC filtering ?
permits or denies traffic based on a devices MAC address
317
Traffic filtering ?
permits or denies traffic based on IP address or application ports
318
what is IT governance ?
It governance is used to provide a comprehensive security management framework for the org
319
How is IT governance achieved ?
1. Policies 2. standards 3. baseline 4. Guidelines 5. Procedures
320
what is a security policy ?
defines the role of security inside of an org and establishes the desired end state for the security program
321
what are the three different categories for security policies ?
1. organizational 2. system specific 3. issue specific
322
what is an organizational policy ?
provides frameworks to meet the business goals and define the roles, responsibilities, and teams associated with it
323
what are system specific policies ?
these address the specific technology, application, network or computer
324
what are issue specific policies ?
addresses a specific security issue such as email privacy, employee termination procedures, or other specific issues
325
what are standards ?
implements a policy in an org
326
Baseline ?
creates a reference point in network architecture and design
327
Guideline ?
recommended action that allows for exceptions and allowances in unique situations and recommends actions
328
Procedures ?
detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions
329
Change management ?
structured way of changing the state of a computer system, network, or IT procedure
330
incident response plan ?
contains instructions on how to help network and system admins, detect, respond to, and recover from network security incidents
331
incident response plans are broken into 6 core phases
1. preparation 2. identification 3. containment 4. Eradication 5. recovery 6. lessons learned
332
Disaster recovery plan ?
Documents how an org can quickly resume work after an unplanned incident
333
Business continuity plan ?
outlines how a business will continue operating during an unplanned disruption in service
334
System life cycle plan ?
describes the approach to maintaining an asset from creation to disposal
335
what is the 5 phase lifecycle used for all of our systems and networks.
1. planning 2. design 3. transition 4. operations 5. retirement
336
standard operating procedure ?
a step-by-step instructions compiled by an org to help its employees carry out routine operations
337
Password policies ?
a set of rules created to improve computer security by motivating users to create and properly store secure passwords
338
acceptable use policies?
a set of rules that restricts the ways in which a network resource may be used and sets guidelines on how it should be used
339
BYOD policies ?
allows employees to access enterprise networks and systems using there personal devices
340
remote access policies ?
a document which outlines and defines acceptable methods of remotely connecting to the internal network
341
Onboarding policies ?
A documented policy that describes all the requirements for integrating a new hire into the company and its cultures
342
Offboarding policy ?
A documented policy that covers all the steps to successfully part ways with an employee who's leaving the company
343
Security policies ?
a document that outlines how to protect the organizations systems, networks and data from threats
344
DLP policies?
A document defining how orgs can share and protect data Goal of a data loss prevention policy minimizes accidental or malicious data loss
345
NDA agreement ?
Defines what data is confidential and cannot be shared outside of the relationship 
346
Memorandum of understanding MOU?
non-binding agreement between two or more organizations to detail what common actions they intend to take 
347
Service level agreement SLA ?
Documents the quality, availability, and responsibilities agreed upon by a service provider and client 
348
what is network management ?
the process of administering and managing computer networks
349
what is a physical network diagram ?
shows the actual physical arrangement of the components that make up the network
350
What is a Logical Network Diagram?
illustrates the flow of data across a network and shows how devices communicate with each other 
351
what is a radio frequency wireless site survey ?
Planning and designing of a wireless network to deliver the required wireless solution
352
Wired site survey?
determines If a site has the right amount of power, space, and cooling to support a new upgrade or installation 
353
what are baseline configs?
set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on
354
what is network performance monitoring ?
monitors the performance from the end user's workstation to the final destination they are trying to reach 
355
what are the three key metrics for network performance ?
1. latency 2. Bandwidth 3. Jitter
356
what is Latency ?
time it takes for data to reach its destination across the network. latency is reported in milliseconds
357
what is bandwidth ?
maximum rate of data transfer across a given network.
358
what is throughput ?
this is the actual measure of how much data is successfully transferred from the source to the destination
359
explain Jitter ?
when a time delay in the sending of data packets over a network connection occurs
360
what do sensors do for us in our networks ?
monitor a device's temperature, CPU usage, and memory which could indicate if it is operating properly or is about to fail
361
what is a minor temperature threshold ?
monitor a devices temperature CPU usage and memory which could indicate if it is operating properly or if it is about to fail
362
what is a major temperature threshold ?
used to set off an alarm when temperature reaches dangerous conditions.
363
what are the two ways to measure data in our networks ?
In order to measure traffic in our network we can either use full packet capture or netflow data
364
what is full packet capture ?
captures the entire packet, including the header and the payload for all traffic entering and leaving a network
365
what is flow analysis ?
relies on a flow connector to record the metadata and statistics about network traffic rather then recording each frame
366
what is netflow?
defines a particular traffic flow based on the different packets that share the same characteristics.
367
Zeek?
passively monitors a network like a sniffer but only logs full packet capture of data of potential interest
368
MRTG multi router traffic grapher?
creates graphs showing traffic flows through the network interfaces of routers and switches by polling the appliances using snmp
369
Interface statistics: flush
used to count selective packet discards SDP that have occurred 
370
Interface statistics: selective packet discards
drops low priority packets when the CPU is too busy so it can save capacity for higher priority packets as a form of Qos
371
Interface statistics: runt
an ethernet frame that is less than 64 bytes in size 
372
Interface statistics: giant
any ethernet frame that exceeds the 802.3 frame size of 1518 bytes 
373
Interface statistics: throttle
occurs when the interface fails to buffer the incoming packets 
374
Interface statistics: CRC
CRC number of packets received that failed the cyclic redundancy checksum or CRC check upon receipt
375
Interface statistics: Frame
used to count the number of packets where a CRC error and a non-integer number of octets was received
376
Interface statistics: ignored
used to count the number of packets that the interface ignored since the hardware interface was low on internal buffers
377
Interface statistics: underrun
number of times the sender has operated faster then the router can handle, causing buffers or packets dropped
378
Interface statistics: babble
used to count any frames that are transmitted and are larger than 1518 bytes  Babble is for transmission giant is for received
379
Interface statistics: late collision
used to count the number of collision that occur after the interface has started transmitting its frame
380
Interface statistics: deferred
used to count the number of frames that were transmitted successfully after waiting because the media was busy 
381
Interface statistics: output buffer failure
number of times a packet was not output from the output hold queue because of a shortage of shared memory
382
what does the CIA triad stand for ?
1. confidentiality 2. integrity 3. availability
383
how do we ensure confidentiality in our networks ?
keep data private and safe using encryption and authentication to access resources
384
explain what encryption does for us in our networks ?
ensures the data can only be read or decoded by the intended recipient
385
what is symmetric encryption ?
sender and receiver use the same key to encrypt and decrypt a message
386
what are the three main types of symmetric encryption out there ?
1. DES 2. Triple DES 3. AES
387
what is Data encryption standard DES? How long is the key for DES ? Is DES considered weak or strong encryption by today's standards ?
a 56-bit encryption key to secure data. today this is considered weak encryption
388
explain Triple DES how many keys does it use?
uses three 56-bit keys which gives a total key strength of 168 bits
389
what is the Advanced Encryption Standard or AES? what keys is it available in?
Preferred symmetric encryption standard today and is available in 128-bit, 192-bit, and 256-bit keys
390
which is faster symmetric or asymmetric encryption ?
Symmetric encryption is almost a 1000x faster than asymmetric encryption
391
what sort of overhead is needed when an org is using symmetric encryption ?
The overhead with symmetric encryption is making sure that all the users have the key who need to use it
392
what is asymmetric encryption ?
Sender and receiver use different keys to encrypt and decrypt a message
393
Public key infrastructure or PKI?
gives secure email exchanges and web browsing and solves the problem of having to distribute the keys ahead of time  
394
how does PKI help with email security ?
PKI is where we encrypt the data from an email sender to an email receiver
395
what does integrity mean inside our networks ?
ensures data was not modified in transit and verifies it came from its original source
396
how do we ensure we have integrity in our networks ?
We ensure we have integrity in our networks and applications by using hashing
397
what is hashing ?
runs a string of data through an algorithm, creates a hash that serves as a unique individual fingerprint for a file or data set
398
what does availability mean in our networks ?
measures data accessibility and is increased by designing redundant networks
399
what is a threat ?
a person or event that has the potential for impacting a valuable resource in a negative manner
400
what is a denial of service attack ?
occurs when one machine continually floods a victim with request for services
401
explain a TCP SYN flood ?
occurs when an attacker initiates multiple TCP sessions but never completes them
402
smurf attack ?
occurs when an attacker sends a ping to a subnet broadcast address with a source IP spoofed to be that of the victim server
403
distributed denial of service attack ?
occurs when an attacker uses multiple computers to ask for access to the same server at the same time
404
botnet ?
a collection of compromised computers under the control of a master node
405
zombie ?
any of the individually compromised computers within a botnet
406
explain an on path or man in the middle attack
occurs when an attacker puts themselves between the victim and the intended destination
407
session hijacking ?
occurs when an attacker guesses the session ID that is in use between a client and a server and takes over the authenticated session
408
DNS poisioning
occurs when an attacker manipulates known vulnerabilities within DNS to reroute traffic from one site to a fake version of the site
409
what was created to combat DNS poisioning ?
DNSSEC was created to combat DNS poisioning
410
what is DNSSEC?
uses encrypted digital signatures when passing DNS information between servers to help protect it from poisoning
411
explain a rogue DHCP server
a DHCP server on a network which is not under the administrative control of the network admins
412
spoofing ?
occurs when an attacker masquerades as another person by falsifying their identity
413
IP spoofing ?
modifying the source address of an IP packet to hide the identity of the sender or impersonate another client
414
what layer of the OSI model does IP spoofing occur
IP spoofing is focused at layer 3 of the OSI model
415
MAC spoofing ?
changing the MAC address to pretend the use of a different network interface card or device
416
what is MAC filtering ?
relies on a list of all known and authorized MAC addresses
417
what is ARP spoofing ?
sends falsified ARP messages over a local area network
418
what is the purpose of ARP?
the purpose of ARP is to create a binding between a MAC address and an IP address inside of a LAN
419
how do we prevent ARP poisoning in a network ?
to prevent ARP poisoning set up good VLAN segmentation within your network
420
what is VLAN hopping ?
ability to send traffic from one VLAN to another, bypassing the VLAN segmentation you have configured with your layer 2 networks
421
what are the two ways attackers can accomplish VLAN hoping ?
1. Double tagging 2. Switch spoofing
422
VLAN hoping: Double tagging ?
connecting to an interface on the switch using access mode with the same VLAN as the native untagged VLAN on the trunk
423
VLAN hoping switch spoofing ?
Attempting to conduct a dynamic trunking protocol DTP negotiation
424
what is malware ?
designed to infiltrate a computer system and possibly damage it without the users consent or knowledge
425
what is a virus ?
made up of malicious code that is run on a machine without the users knowledge and infects it whenever that code is run
426
what is a worm ?
a piece of malicious software that can replicate itself without user interaction
427
explain a trojan horse ?
a piece of malicious software disguised as a piece of harmless or desirable software
428
ransomeware?
restricts access to a victims computer system or files until a ransom or payment is received
429
what is spyware?
gathers information about you without your consent
430
what is a rootkit ?
designed to gain administrative control over a computer system or network device without being detected
431
rogue access point ?
a wireless acess point that has been installed on a secure network without authorization from a local network admin
432
Shadow IT?
use of IT systems, devices, software applications, or services without the explicit approval of the IT department
433
Evil Twin Attack ?
wireless access point that uses the same SSID as your own network
434
De-Authentication attack ?
attempt to interupt communication between an end user and the wireless access point
435
Wireless interception ?
captures wireless data packets as they go across the airwaves
436
what is social engineering ?
any attempt to manipulate users to reveal confidential information or perform actions detrimental to a systems security
437
what is phising ?
sending an email in an attempt to get a user to click on it
438
Spearphising ?
more targetd form of phising
439
what is whaling?
focused on key executives within an org or other key leaders, executives and managers in the company.
440
what is tailgating ?
entering a secure portion of the organizations building by following an authorized person into the area without their knowledge or consent
441
what is an insider threat ?
an employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company
442
what is a posture assessment ?
asesses cyber risk posture and exposure to threats caused by misconfiguration and patching delays
443
what are the 4 main steps of a security posture assessment ?
1. Define mission critical components 2. identify strengths weaknesses and security issues 3. strengthen your position 4. stay in control
444
what is a business risk assessment ?
used to identify understand and evaluate potential hazards in the workplace
445
what is a process assessment ?
the disciplined examaniation of the processes used by the org against a set of criteria
446
what is a vendor assessment ?
the assessment of a prospective vendor to determine if they can effectively meet the obligations and the needs of the business
447
what is least privilege ?
using the lowest level of permissions or privielegs needed in order to complete a job function or admin task
448
Discretionary access control or DAC ?
- an access method where access is determined by the owner of the resource
449
what are the two main challanges when using DAC?
1. every object in a system has to have an owner 2. Each owner must determine the access rights and permissions for each object
450
Mandatory access control MAC?
An access control policy where the computer system gets to decide who gets access to what objects
451
Role based access control RBAC
An access control model that is controlled by the system but focuses on a set of permissions versus an individual permission Creating groups makes it easy to control permissions based around actual job functions
452
Zero trust ?
a security framework that requires users to be authenticated and authorized before being granted access to applications and data
453
what are the 4 key principles you need to follow to implement zero trust in your network ?
1. Reexamine all default access controls 2. Employ a variety of prevention techniques and defense in depth 3. Enable real-time monitoring and controls to identify and stop malicious activity quickly 4. Ensure the networks zero-trust architecture aligns to a broader security strategy
454
what is defense in depth ?
cybersecurity approach in which a series of defensive mechanisms are layered in order to protect valuable data and information
455
explain a DMZ ?
a perimeter network that protects an organizations internal local area network from untrusted traffic only allows people from the outside internet to access certain resources within your network
456
explain a screened subnet ?
subnet in the network architecture that uses a single firewall with three interfaces to connect three dissimilar networks Used in networks that have both public and private areas, a screened subnet lets users access the internet without exposing the local area network to internet-based cyber attacks or data breaches. It does this by establishing a network between an internal network and an external/presumed hostile network, such as the internet. This ensures that there is no single vulnerable point that could potentially compromise the entire enterprise network. It uses three network interfaces: Interface 1 is the public interface connected to the internet. Interface 2 connects to the demilitarized zone (DMZ) to which hosted public services are attached. Interface 3 connects to the intranet to provide access to and from internal networks. The subnet's main purpose is to isolate the DMZ and its publicly accessible resources from the intranet, thereby minimizing external attention and possible attacks on that subnet. The architecture makes it more difficult to attack the intranet, especially when a properly configured firewall is combined with the use of private IP addresses on one or both of these subnets. Even if the firewall itself is compromised, an attacker won't be able to access the intranet.
457
Separation of duties
prevents fraud and abuse by distributing carious tasks and approval authorities across a number of different users
458
MFA?
authenticates or proves an identity using more than one method
459
MFA: something you know?
a. Usernames b. Passwords c. PIN d. Answers to questions
460
MFA: something you have ?
a. smartcards b. RSA key fobs c. RFID tags
461
MFA: something you are?
a. fingerprints b. Retina scans c. Voice prints
462
MFA: something you do?
a. How you sign your name b. How you draw a pattern
463
MFA: Somewhere you are?
a. Geotagging b. geofencing
464
Authentication ?
the process of determining whether someone or something is who or what it claims to be
465
LDAP?
validates a username and password combination against an LDAP server as a form of authentication The Lightweight Directory Access Protocol is a common method of accessing data over the network.
466
Kerberos?
focused on authentication and authorization with a windows domain environment
467
Remote authentication dial-in user service RADIUS
provides centralized administration of dial-up, VPN, and wireless network authentication
468
Terminal access controller access control system plus TACACS+
used to perform the role of an authenticator in an 802.1x network
469
802.1x
a standardized framework that’s used for port-based authentication on both wired and wireless networks
470
There are three roles required to authenticate with 802.1x ?
1. supplicant a. Device or user requesting access to the network 2. authenticator a. Switch wireless access point 3. Authentication server a. Centralized device that performs the authentication
471
extensible authentication protocol EAP?
allows for numerous different mechanisms of authentication
472
EAP-MD5?
utilizes simple passwords and the challenge handshake authentication process to provide remote access authentication
473
EAP-TLS
uses public key infrastructure with a digital certificate being installed on both the client and the server
474
EAP-TTLS
requires a digital certificate on the server and a password on the client for its authentication
475
EAP-FAST
uses a protected access credential to establish mutual authentication between devices
476
PEAP
uses server certificates and Microsoft's AD databases to authenticate a clients password
477
Network access control NAC
ensures a device is scanned to determine its current state of security prior to being allowed network access
478
persistent agent
a piece of software installed on a device requesting access to the network
479
Non-persistent agent
requires the users to connect to the network and go to a web based captive portal to download an agent on their devices
480
what is one of the most common network access control standards ?
IEEE 802.1x
481
where is IEEE 802.1x used ?
used in port-based network access control
482
NAC: Time-Based
defines access periods for given hosts using a time-based schedule / only logging in during approved times
483
NAC: Location-based
evaluates the location of the endpoint requesting access using IP or GPS geolocation
484
NAC: Role based adaptive NAC
reevaluates a device's authentication when its being used to do something / looking at the role of the device and figure out if it is doing something it should or should not be able to do
485
NAC: Rule-based
uses a complex admission policy that might enforce a series of rules with the use of logical statements
486
Efuse
an electronic detection mechanism that can record the version of the IOS used by a switch
487
what does OSI stand for ?
open systems interconnection model
488
what is layer 1 of the OSI model ?
layer 1 is the physical layer
489
describe what happens at layer 1 the physical layer of the OSI model
- Where transmission of bits across the network occurs and includes physical and electrical network characteristics - Data is transferred in bytes at this layer series of 1s and 0s
490
what does the physical layer decide about the network ?
The physical layer also decides the topology of the network
491
what is an issue to be aware of at layer 1
Another issue to be aware of at layer 1 is how is communication synchronized
492
what is asynchronous communication ?
Asynchronous communication is something like a voicemail, the communication happens out of sync or out of time uses start and stop bits to indicate when transmissions occur from the sender to the receiver
493
what is synchronous communication ?
uses a reference clock to coordinate the transmissions by both the sender and receiver
494
what is broadband ?
divides our bandwidth into separate channels
495
what is baseband communication ?
uses all available frequencies on a medium (cable) to transmit data A telephone is a good example of baseband communication Aka using all the bandwidth allocated to that phone line Baseband uses a reference clock Wired home ethernet network is also going to use baseband
496
what is TDM or time division multiplexing ?
Each session takes a turn using time slots to share the medium between users
497
Statistical time-division multiplexing
Dynamically allocates the time slots on an as-needed basis
498
Frequency division multiplexing
Divides the medium (that cable) into channels based on the frequency and each session is transmitted over different channel
499
what is multiplexing ?
multiplexing is getting more out of a limited network 
500
what are some examples of devices at the physical layer ?
Cable Ethernet Coaxial Hubs Access points Media converters Layer 1 devices simple repeating what they are told
501
what is the main function of the data link layer ?
Packages data into frames and transmits those frames on the network
502
what is media access control or MAC ?
Physical addressing system of a device which operates on a logical topology Uses a 48 byte address assigned to a network interface card
503
how are the digits in a MAC address divided ?
The first 6 digits in a mac address are the vendor code the second 6 digits are the unique value
504
Logical Link Control LLC?
provides connection services and allows acknowledgment of receipt of messages
505
what does LLC or logical link control provide ?
LLC provides basic error control functions
506
what is run on the application layer
services /apps web browsers files
507
what is run on the presentation layer
encoding compression encryption
508
what is the session layer used for ?
managing sessions
509
explain protocols in laymen terms
a set of rules or a way for computers to do things
510
Please do not throw sasuage pizza away
Phsical datat link network transport session presentation application
511
in the TCP/IP model what are the three layers from the OSI model that make up the application layer
application presentation session
512
what is the order of the IP protocl stack we use today
Application transport network Data link phsical
513
what are the two most common protocols in the transport layer of the TCP/IP protocol stack
TCP & UDP
514
what protocl does DNS use ?
UDP
515
what layer of the TCP/IP protocol stack does IP addresses operate ?
the network layer or internet layer
516
what do we call information transmitted at the internet layer of the TCP/IP protocol stack ?
Packets
517
what networking device is looking at the layer 3 or network layer packets ?
routers
518
what is layer 2 of the TCP/IP protocol stack
data link layer network internet layer
519
what is ARP used for ?
arp is used to map IP address's to MAC adresses's
520
what do we call information that is sent over the data link layer of the tcp/ip model
frames
521
what layer of the TCP/IP protocol stack does encapsulation start?
the application layer
522
what layer of the tcp/ip protocol stack does decapsulation start ?
the phsical layer
523
what is a demarcation point ?
a spot where we connect our network to an internet service provider
524
what does GRE stand for ?
Generic routing encapsulation
525
what is an overlay network ?
an overlay network is a computer network that is layered on top of another network
526
what does an underlay network represent ?
underlay network represents the actual interfaces and paths that are being used as traffic is being forwarded on networks
527
topology ?
how networks are layed out.
528
what are some things we should keep in mind when troubleshooting network issues ?
1. device configuration reviews 2. routing tables 3. interface status 4. VLAN assignments 5. Network performance baselines
529
what do most networking devices have for configurations ?
most network devices have two configs a startup config and a running config
530
Networking devices: startup config ?
stored in NVRAM and contains the commands needed to initially configure a router
531
Networking devices: running config?
actively being used by the router at that moment
532
what command can we use to see the startup config for a router ?
show startup-config
533
what command can we use to see the running config for a router ?
show running-config
534
how can we display the routing table on a windows machine ?
"route print"
535
how would we display the routing table on a linux command line ?
route - n
536
Net Troubleshoot: VLAN Assignment / Tagging?
practice of segmenting an IT organazations network, seperating users into respective network sections
537
what is a network performance baseline ?
defines the normal working conditions of an enterprise network infastructure
538
What is the purpose of the DHCP service ?
assigns devices with an IP address and also provides them a subnet mask, default gateway and DNS server.
539
What is the purpose of the DNS service ?
converts domain names to IP addresses using hierarchical and decentralized system of naming
540
what is a DNS zone transfer ?
sharing of information between DNS servers about which domain names they have and there associated IP addresses
541
what is the purpose of the Network Time Protocol or NTP ?
Synchronizes clocks between systems communicating over a packet switched variable latency data network
542
what must DHCP provide for each client to effectively access the internet?
DHCP must provide and IP address, subnet mask, default gateway and DNS server to each client to effectively access the internet
543
Explain a DHCP reservation ?
DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user devices
544
What does DHCP do for our networks ?
provides an IP address to every machine on the network and eliminates configuration errors
545
DHCP: Scope ?
a list of valid IP addresses available for assignment or lease to a client computer or endpoint device on any given subnet
546
DHCP: Reservation ?
excludes some IP addresses being handed out to devices unless they meet a certain condition
547
As a network admin how does DHCP help us out ?
with DHCP we can automate setup of all our devices when they join the network
548
DHCP: what happens when a device joins the network ?
when a device joins the network its going to do what we call a discovery "hey DHCP server I need an IP address"
549
DHCP: what are the 4 steps of the DHCP process ?
1. Discover 2. Offer 3. Request 4. Acknowledge D.O.R.A
550
DHCP: what 4 pieces of information do network clients get from DHCP?
1. IP address 2. Subnet Mask 3. Default Gateway IP 4. DNS Server IP
551
DHCP relay ?
DHCP relay is used when the client device and the DHCP server are not located on the same subnet or network
552
Does DHCP operate using TCP or UDP
UDP
553
DNS: What does the domain name service help us do ?
helps network clients find a website using human-readable hostnames instead of numeric IP addresses
554
DNS: what are some examples of fully qualified domain names or FQDN ?
Examples of fully qualified domain names www.diontraining.com Mail.diontraining.com Ftp.diontraining.com
555
What are the different levels of the DNS hierarchy?
1. Root - Answers requests in the root zone 2. Top-level domain - .com .net 3. Second-level domain - Diontraining.com google.com 4. Subdomain - Support.diontraining.com 5. Host - Refers to a specific machine
556
DNS Records: A ?
links a hostname to an IPV4 address
557
DNS Records: AAAA?
links a hostname to an IPv6 address
558
DNS Records: CNAME?
points a domain name to another domain or subdomain essentially a domain redirect
559
DNS Records: MX?
Directs email to a mail server
560
DNS Records: SOA?
stores important information about a domain or zone ?
561
DNS Records: PTR?
corelates an IP address with a domain name These are essentially the opposite of A records
562
DNS Records: TXT?
Adds text into the DNS record
563
DNS Records: SRV?
specifies a host and port for a specific service
564
DNS Records: NS?
Type of DNS server that stores all the DNS records for a given name
565
DNS: Zone transfer ?
sends DNS records data from the primary nameserver to the secondary nameserver. Zone transfers use the TCP protocol to transfer data
566
DNS: reverse DNS lookup ?
determines what the domain name is for a given IP address.
567
DNS: forward lookup ?
uses DNS to find the IP address for a given network
568
Internal DNS ?
allows cloud instances on the same network to access each other using internal DNS names
569
External DNS?
records created around the domain names from a central authority and used on the public internet An external DNS is a publicly accessible third-party domain name server that's generally open for anyone on the internet to access and update. External DNS allows you to query for the IP address of a domain. An external DNS provider is also known as a public DNS provider.
570
DNS: Time to Live TTL
tells the DNS resolver how long to cache a query before requesting a new one 
571
DNS: Recursive lookup?
DNS server communicates with several other DNS servers to hunt down the IP address and return to the client
572
NTP?
synchronizes clocks between systems communicating over a packet-switched variable-latency data network
573
what is the easiest way to describe NTP?
Essentially keeps all the devices on the same time
574
what port and protocol does NTP use?
NTP data is going to be sent over UDP using port 123
575
wireless analyzer
ensures you have the proper coverage and helps prevent overlap between wireless access points coverage zones and channels
576
protocol analyzer
used to capture and analyze signals and data traffic over a communications channel Example wireshark
577
Packet capturing tool
used to capture packets running over a network connection in real time and then save them for later analysis
578
What is wireshark ?
wireshark is both a protocol analyzer and has packet capture functionality
579
What is a bandwidth speed test ?
verifies the real world throughput from a client device all the way out to the internet and back this is like the WIFI speed tests you do at work
580
what is real world throughput ?
the speed from your client to the endpoint device and back.
581
IPERF?
gathers an active measurement of the maximum achievable bandwidth of an IP based network Iperf is a tool for network performance measurement and tuning. It is a cross-platform tool that can produce standardized performance measurements for any network. Iperf has client and server functionality, and can create data streams to measure the throughput between the two ends in one or both directions
582
NetFlow Analyzer ?
performs monitoring troubleshooting and in-depth inspection, interpretation and synthesis of traffic flow data
583
TFTP?
protocol for exchanging files between two TCP/IP machines port 69
584
What is the ping command used for ?
ping checks the connectivity between two devices and usually is used to see if a device is up and is often used for network troubleshooting
585
how would you ping an IPV6 address ?
ping can use IPV6 with the -6 option.
586
traceroute / tracert
displays the path between device and its destination showing the source and destination IP address for each hop along the way
587
what is a hop when we are talking about traceroute ?
a hop is any router or firewall that is in the path of the transmission from the client to the destination
588
what is the purpose of the ipconfig command ?
Ipconfig displays all of the current TCP/IP network config values and refreshes DHCP and DNS settings for a windows client/ server
589
using Ipconfig how would we release the current IP address ?
ipconfig /release
590
how would we attempt to get a new IP address using the ipconfig command ?
Ipconfig /renew
591
how would we attempt to get all the IP info and DHCP info using the Ipconfig command ?
Ipconfig /all
592
what is the equivalent of IP config on a linux system
ifconfig
593
how do we learn more about a specific interface with ifconfig ?
ifconfig -v eth0
594
what does the IP command do on a linux operating system ?
Ip – assigns an address to a network interface or configures network interface parameters on a Unix, Linux, or OSX operating system
595
what is the nslookup tool used for ?
used to query the DNS to provide the mapping between domain names and IP addresses or other DNS records
596
how would you do a forward lookup using the nslookup tool ?
nslookup google.com
597
how would we do a reverse lookup using the nslookup tool ?
nslookup 8.8.8.8
598
explain the dig command
used to conduct queries against DNS nameservers and is only available for Linux, Unix and OS X systems by default
599
what is the ARP command used for ?
ARP command is used to display and modify entries in the address resolution protocol cache on a system.
600
what is the command for viewing the ARP cache ?
arp -a
601
what is the route command used for ?
route is used to view and manipulate the IP routing table in a windows osx or linux system
602
what is a default route ?
route that takes effect when no other route is available for an IP destination address
603
how would we print a routing table on a windows machine ?
route print
604
what is the nbtstat command used for ?
used to view the current connection and statistics for devices communicating using the NetBIOS over TCP/IP protocol
605
what is the netstat command used for ?
displays information for IP based connections on a client including its current sessions its source and destination IP's and port numbers.
606
what is the tcpdump command used for on linux systems?
Tcpdump – allows for the display of TCP/IP and other packets being transmitted or received over the network to the clients screen
607
what is a network platform ?
1. routers 2. switches 3. firewalls refers to any of these above items regardless of the brand or manufacturer
608
what does the show interface command do ?
displays statistics for the network interfaces on the device
609
what does the show config command do ?
show config - displays the current system configuration on the screen
610
what is VTP?
VLAN trunking protocol multiple VLANS in a single link
611
what is a collision in regards to networking ?
occurs when two hosts on the network transmit at the same time which causes the signals to combine on the network medium
612
where do collisions occur in networks ?
collisions can occur in both wired and wireless networks
613
what is a collision domain ?
network segment where simultaneous data transmissions collide with each other
614
how do we break apart collision domains ?
Use any layer 2 device to break apart collision domains like a switch or a bridge
615
how can we as a network admin overcome and excessive collision issue ?
1. turn off auto negotiation 2. hardcode to lower speed 3. change to half duplex.
616
what is a broadcast storm ?
occurs when a network system is overwhelmed by continuous or multicast or broadcast traffic A broadcast storm or broadcast radiation is the accumulation of broadcast and multicast traffic on a computer network. Extreme amounts of broadcast traffic constitute a "broadcast storm". It can consume sufficient network resources so as to render the network unable to transport normal traffic.
617
what is a broadcast domain ?
a logical division of a computer network where all nodes can reach each other by broadcast at the data link layer
618
what networking device can we use to break subnets into separate broadcast domains ?
we can use a router
619
what are the couple main causes for a broadcast storm occurring in your network ?
1. too large singular broadcast domain 2. large volume of DHCP requests 3. loops are created in the switching environment
620
what are the three main ways we can prevent broadcast storms from happening ?
1. enable bridge protocol data units 2. enforce a maximum number of MAC address's per port 3. break up large broadcast domains using routers and layer 3 switches
621
Duplicate Addresses: Logical domain manager ?
listens to multicast messages on a network and keeps track of the MAC addresses being used
622
what will port security help us with in our network ?
to prevent issues on your network relating to duplicate MAC addresses you can enable port security on your switches.
623
what is a duplicate IP address or Ip address conflict
occurs when another computer on the same network has an identical IP to another workstation or server on the same network (This can also be a DHCP server issue)
624
how does duplicate IP addressing usually happen?
Duplicate IP addressing issues usually come from using static IP address's
625
what are the three main causes for duplicate IP addresses in a network ?
Static IP address issue DHCP server issue Rogue DHCP server
626
Routing issues: multicast flooding
no specific host is associated with the multicast MAC address in the CAM table of the switch. To fix this issue we need to disable multicast traffic on the switchport
627
What is asymmetrical routing ?
Network packets leave via one path and return via a different path
628
Routing issues: missing routes ?
when a router cannot reach a destination because there is a missing route in the routing table
629
Loops: Switching / Bridging loops
occurs whenever there is more than one path between the source and the destination devices.
630
How do we prevent a switching loop?
to prevent a switching loop you have to enable STP or spanning tree protocol
631
what is the bottom line with switching loops ?
switching loops are usually an issue with how stp is configured
632
what are routing loops ?
formed when an error occurs in the operation of the routing algorithm and creates a circular route amongst a group of network devices
633
what are two ways to prevent routing loops in our network ?
split horizon route poisoning
634
Routing: What is split horizon ?
routing configuration that stops a route from being advertised back in the direction where it came from. In computer networking, split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned
635
Routing: Route poisoning ?
increasing a routers metric to an infinitely high number after detecting one of its connected routes has failed Route poisoning is a method of quickly forgetting outdated routing information from other router's routing tables by changing its hop count to be unreachable (higher than the maximum number of hops allowed) and sending a routing update.
636
Routing: hold down timer ?
prevents bad routes from being restored and passed to other routers by accident
637
what does DHCP do when a client joins the network ?
automatically assigns an IP address, subnet mask, default gateway and DNS servers IP address to a client when it joins the network
638
Rogue DHCP server ?
a DHCP server on a network which is not under the administrative control of the network admins
639
what are the three ways rogue DHCP servers can be prevented
1. DHCP snooping 2. Port Security 3. Intrusion Detection system
640
What is DHCP scope exhaustion ?
Occurs when the DHCP server runs out of Valid IPs to assign to the clients requesting access on the network
641
what 4 pieces of information do clients need to communicate reliably on a network ?
1. IP address 2. Subnet Mask 3. Default Gateway IP 4. DNS Server IP
642
What is a host based firewall ?
runs on an individual computer or device connected to the network to protect that one device
643
what is a network based firewall ?
Deployed in line with the network traffic flow to monitor and filter incoming and outgoing network traffic based on established rule sets.
644
firewall issues are commonly broken down into three main things
Access to protected resources from unprotected networks is not working Access to unprotected resources from protected networks is not working Access to the firewall and its configurations is not working
645
firewall issues are one of two things.
Issues can usually be broken down into "either traffic is not going through the firewall or not going to the firewall properly "
646
ACL?
provides security by blocking unauthorized users and allowing authorized users to access specific resources
647
What command would we use to view firewall rules on a network based firewall
show access lists
648
What are the 4 things to keep in mind when writing an ACL?
When writing an ACL rule keep these things in mind Ensure there are no typos in your rules Verify the protocol and port numbers referenced by the rule are correct Verify the source and destination addresses are referenced by the rule Did you include the correct IP and subnet mask Verify the order of rules is being verified correctly
649
what are two common questions to ask yourself when troubleshooting DNS?
Are the A records and CNAME records properly created ? We can verify this using NSlookup Is the TTL or time to live set properly
650
What is DNS latency ?
time and delay that occurs whenever users request a particular domain name
651
How do we solve DNS latency issues as a network admin ?
by using DNS servers that are closer to our users
652
What do issues with NTP usually boil down too ?
NTP packets not being received NTP packets not being processed NTP packets have errors or packet lost
653
How do we usually solve NTP issues ?
Ensure proper connection between clients and servers Verify communication between clients and servers using MAC address Verify communication between clients and servers using the IP addresses
654
what is bandwidth ?
theoretical speed of data going across the network 
655
what is throughput ?
actual speed of data on the network 
656
wireless Received Signal Strength Indication RSSI ?
estimated measure of the power level that a radio frequency client device is receiving from a wireless access point or wireless router (otherwise known as signal strength)
657
Wireless: Vertical antenna ?
radio frequency waves extend outward in all directions away from the antenna and the wireless access point to an equal power level
658
Wireless: Dipole Antenna ?
produces radio frequency waves extending outward in two directions
659
Wireless: Yagi Antenna ?
a unidirectional antenna that sends the radio frequency waves in only one direction (commonly used for site to site connections)
660
Wireless Parabolic Grid Antenna ?
allows the radio waves to be transmitted in only one direction over a longer distance then a yagi
661
Wireless: what antennas are we more likely to use for indoor use ?
For indoor use you are more likely to use omnidirectional and unidirectional antennas
662
Wireless: Channel Utilization?
a statistic or measure of the amount of airtime utilization that occurs for a particular frequency or channel
663
where should our channel utilization be in our network to have a fast wireless network ?
In order to have a fast wireless network you want to keep your channel utilization under 30% to have a faster wireless network
664
What do access points and clients form when they operate on the same channel ?
Access points and clients form a single broadcast domain when they operate on the same channel
665
What is Clear Channel Assessment or CCA ?
listens to see if another device is actively transmitting on the channel before attempting to send frames on the channel
666
When a wireless client attempts to connect to a wireless network it goes through a 7 step process
Wireless client sends a probe request to discover any 802.11 wireless networks in proximity to itself (broadcast message) Receiving access point checks to see if it can support the data rate the client requested Wireless client sends a low-level 802.11 authentication frame to the access point to begin authentication Access point receives the authentication frame and responds with an acknowledgment to continue the handshake Wireless client chooses the access point it wants to associate with and sends an association request Access point processes the association request if the information sent matches its capabilities Client is fully connected and associated and can now conduct any data transfer it needs and use the wireless network
667
When a wireless client is connecting to the AP and the network it has to do the following
Scan airwaves Find access points Request association Authenticate Contact the DHCP server
668
wireless: Coverage ?
a measure of how much area around a wireless transmitter is there sufficient signal strength for wireless devices to utilize 
669
What are a couple ways we can increase coverage to a wireless area ?
Signal booster Larger antenna Wireless repeater Second access point
670
Wireless: interference ?
occurs when multiple wireless networks communicate on the same channel using the same frequency
671
Wireless: multipath reception ?
occurs when the transmitted signal bounces off walls and other phsical objects and then is redirected to the reciever
672
Wireless: What are the ways a client can be disconnected from an Access point.
1. Idle timeout 2. Session timeout 3. Manual deletion 4. Wireless network change 5. Authentication timeout 6. Access point radio reset
673
Captive portals ?
Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication. The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. This defines port security. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.
674
explain what the physical layer is in our networks
where transmission of bits across the network occurs data is transferred in bytes at this layer series of 1s and 0s
675
explain network availability
measure of how well a computer network can respond to connectivity and performance demands that are placed on it
676
what does availability mean in our networks ?
being up and operational
677
what does reliability mean in our networks ?
not dropping packets
678
what is Mean time to repair MTTR ?
measures average time it takes to repair a network device when it breaks
679
Mean time between failures MTBF?
measures average time between when failures occur on a device
680
How can redundancy be achieved ?
redundancy is achieved using a single device or multiple devices
681
explain network interface card teaming
using a group of network interface cards for load balancing and failover on a server or other device
682
Hot standby router protocol HSRP?
Cisco's proprietary first hop redundancy protocol which allows for an active and a standby router to be used together
683
Virtual router redundancy protocol VRRP?
IETF's open standard variant of HSRP which allows for an active router and multiple standby routers 
684
Gateway load balancing protocol GLBP?
Cisco's proprietary first-hop redundancy which focuses on load balancing over redundancy Cisco protocol
685
Link Aggregation control Protocol LACP
achieves redundancy by having multiple links between the network devices where load balancers over multiple links can occur
686
what do we need to keep in mind when designing redundant networks ?
Examine technical and operational goals What is the function of this network What are you trying to accomplish with this network Identify the budget to fund high availability features This can get really expensive Categorize business applications into profiles Establish performance standards for high availability solutions Define how to manage and measure the high availability solutions
687
what are the 4 options when we talk about recovery sites ?
Cold site Warm site Hot site Cloud site
688
Cold site
an available building that does not have any hardware or software in place or configure Recovery with a cold site is going to be slow and time consuming
689
Warm site
an available building that already contains a lot of the equipment Recovery is going to be fairly quick
690
Hot site
an available building that already has the equipment and data in place and configured Very minimal downtime but this is very expensive
691
Cloud site
allows for the creation of a recovery version of an organizations enterprise network in the cloud
692
Recovery time objective ?
duration of time and service level within which a business process must be restored after a disaster to avoid unacceptable consequences
693
Explain a full backup ?
complete backup of every single file on a machine
694
incremental backup ?
only backs up data that changed since the last backup
695
Differential backup
only backs up the data since the last full backup 
696
Uninterruptible Power Supply UPS?
provides emergency power to a load when the input power source or main power fails
697
Power Distribution Unit PDU
Distributes electric power to racks of computers and network equipment located within a data center 
698
what are the three main types of WAN connections in a business ?
1. dedicated lease lines 2. circuit switched 3. packet switched connections
699
WAN: dedicated lease line ?
logical connection that connects two sites through a service providers facility or a telephone
700
how would you describe a dedicated leased line?
a dedicated lease line is a single pipe going from your service providers office to your business office
701
WAN: circuit switched connection ?
connection is brought up only when needed similiar to making a phone call. essentially this is full access when you need it but when you dont need it its not there
702
WAN: packet switched connection ?
works like an always-on dedicated lease line but multiple customers share the same bandwidth
703
what are the options for wireless wan connections ?
1. cellular 2. microwave 3. satelite 4. high-frequency radio
704
what are the three technoogies we may find when dealing with 3G
1. WCDMA 2. HSPA 3. HSPA +
705
WAN: wideband code division multiple access or WCDMA?
used by the UTMS standard and could reach data speeds of up to 2 MBPS
706
WAN: high speed packet access HSPA?
reaches speeds of up to 14.4 mbps and is sometimes referred to as 3.5 G
707
WAN: High speed packet access evolution HSPA+?
reaches speeds of up to 50 MBPS and is sometimes reffered to as 3.75 G
708
what are the three differentbands 5G comes with ?
low-band, mid-band, high-band as you go up in the bands you get higher speeds but less coverage
709
GSM global system for mobile communication ?
a cellular tech that takes the voice during a call then converts it to digital data
710
Code division multiple access ?
a cellular technology that uses code division to split up a channel
711
microwave connection?
uses a beam of radio waves in the microwave requency range to transmit info between two fixxed locations
712
statelite connection ?
a method osusing communication satelites located in space to connect a user to the internet
713
Channel service unit data service unit or CSU/DSU?
terminates the digital signals at the customers location
714
EXAM: what are T1s and D1s ?
these are dedicated leased lines
715
what is the speed of a T1 connection ?
T1 has a speed of 1.544 mbps
716
what is the speed of a T3 connection ?
T3 has a speed of 44.7 MBPS
717
what is the speed of an E1 connection ?
E1 has a speed of 2.0 mbps
718
what is metro ethernet?
less expensive and more common than specialized serial ports used in a CSU/DSU environment service provider gives you an ethernet jack that you can plug into your router An increasingly popular leased line is one called Metro Ethernet. This is ethernet that you would connect in a regional area or a city area and be able to simply have ethernet at both ends of the connection. We would normally use a T1, or E1, or some other type of WAN. So this is not something that you commonly see, but you can obviously see the advantages. All of your equipment already has ethernet on it, so why not simply plug-in and not use any additional equipment just to connect sites together.
719
point-to-poit PPP connection ?
commonly used layer 2 protocol on dedicated lease lines to transmit multiple layer 3 protocols such as IP and IPX
720
what cann PPP connections use for authentication ?
PAP CHAP
721
PAP or passsword authentication protocol ?
performs one-way authentication between a client and a server
722
How does the Challenge-handshake authentication protocol or CHAP perform authentication?
performs one way auth using a three-way handshake
723
how secure are PAP credentials ?
they are not secure at all because they are sent in the clear
724
how secure are credentials when using the CHAP authentication methods ?
chap uses hashed credentials which are way more secure then PAP
725
Point-to-point over ethernet or PPPOE?
a network protocol for encapsulation point-to-point protocol frames inside ethernet frames
726
explain cable modems ?
uses a cable television infastructure that is made up of hybrid fiber-coax distribution network
727
what are HFC and doxis associated with ?
cable modems
728
how do cable modems transmit and recieve data ?
cable modems transmit and recieve over cable television infastructure
729
Where are satelite modems used and what are the potential drawbacks ?
used in remote, rural, or disconnected locations where other connections are not available weather can weaken signals satelite usually has higher latency because of the distance it has to travel
730
Plain old telephone service or POTS?
runs on public switchedtelephone network PTSN which consists of all telephone carriers from around the world
731
Integrated Services Digital Network ISDN?
an older technology designed to carry voice, video, or data over B bearer channels / puts and bind channels together
732
Frame relay?
creates virtual circuits to connect remote LANs to WANs Wan technology was a departure from circuit switched T1s with frame relay lan traffic is encapsulated into frame relay frames Frame relay was replaced with MPLS MPLS is the defualt for WAN's nowadays
733
SONET
layer 1 tech that uses fiber as its media and has high data rates which range from 155 mbps to 10 gbps or more multiplex digital signals over optical cable
734
what does ATM deal with ?
ATM deals with Fiber and SONET networks
735
Multiprotocol label switching MPLS?
allows traffic to be dynamically routed based on load conditions and path availability / this is primarily used by service providers on there backbone networks
736
Dynamic multiport virtual private network DMVPN?
allows internet to be used as WAN connection for secure site-to-site communication - allows remote sites to build the VPN between each other and tear it down - cisco protocol
737
Software-defined wide area network SD-WAN ?
allows for leveraging any combo of transport services to securely connect users to their applications / essentially a software based WAN architecture
738
Multipoint generic routing encapsulation MGRE?
Enables one node to communicate with many other nodes essentially creating a point-to-multipoint link MGRE is often used in DMVPN
739
what can you use MGRE for ?
You can use MGRE at your main office to connect branch offices back to it
740
what is MGRE usually combined with ?
MGRE is usually going to be combined with DMVPN MGRE is used to create tunnels from one node to multiple nodes
741
what is bandwidth ?
theoretical speed of data going across the network
742
throughput ?
actual speed of data on the network
743
Received Signal Strength Indication RSSI ?
estimated measure of the power level that a radio frequency client device is receiving from a wireless access point or wireless router (otherwise known as signal strength)
744
Effective Equivalent Isotropic Radiated Power EIRP?
maximum power radiated from an ideal isotropic antenna, given its antenna gain, and the transmitter power of the radio frequency system
745
what is an omnidirectional antenna considered ?
An omnidirectional antenna is considered Isotropix
746
what are most wireless AP's going to use?
Most wireless access points are going to use omni directional antennas
747
Vertical antenna?
radio frequency waves extend outward in all directions away from the antenna and the wireless access point to an equal power level
748
Dipole antenna?
produces radio frequency waves extending outward in two directions
749
Yagi antenna?
a unidirectional antenna that sends the radio frequency waves in only one direction (commonly used for site to site connections)
750
Parabolic grid antenna?
allows the radio waves to be transmitted in only one direction over a longer distance than a yagi antenna (commonly used for site to site connections)
751
what antennas are we most likely to use inside ?
For indoor use you are more likely to use omnidirectional and unidirectional antennas
752
Polarization?
the orientation of the electric field or transmission from the Antenna
753
do most wifi networks use vertical or horiziontal ?
Most Wi-Fi networks use vertical polarization
754
Channel Utilization?
a statistic or measure of the amount of airtime utilization that occurs for a particular frequency or channel
755
what should our channel utilization be at to have a fast wireless network ?
In order to have a fast wireless network you want to keep your channel utilization under 30% to have a faster wireless network
756
Access points and clients form a single broadcast domain when they operate on the same channel
expand on this
757
Clear Channel Assessment CCA?
listens to see if another device is actively transmitting on the channel before attempting to send frames on the channel
758
Site survey?
process of planning and designing a wireless network to provide the required wireless solution
759
When a wireless client attempts to connect to a wireless network it goes through a 7 step process
1. Wireless client sends a probe request to discover any 802.11 wireless networks in proximity to itself (broadcast message) 2. Receiving access point checks to see if it can support the data rate the client requested 3. Wireless client sends a low-level 802.11 authentication frame to the access point to begin authentication 4. Access point receives the authentication frame and responds with an acknowledgment to continue the handshake 5. Wireless client chooses the access point it wants to associate with and sends an association request 6. Access point processes the association request if the information sent matches its capabilities Client is fully connected and associated and can now conduct any data transfer it needs and use the wireless network
760
When a wireless client is connecting to the AP and the network it has to do the following ?
Scan airwaves Find access points Request association Authenticate Contact the DHCP server
761
Coverage?
a measure of how much area around a wireless transmitter there is sufficient signal strength for wireless devices to utilize
762
how do we determine coverage with wireless networks ?
by conducting a wireless site survey
763
how do we increase coverage to a wireless area ?
Signal booster Larger antenna Wireless repeater Second access point
764
Interference?
occurs when multiple wireless networks communicate on the same channel using the same frequency
765
Attenuation?
reduction of signal strength between the transmission and receipt of the signal
766
Multipath reception?
occurs when the transmitted signal bounces off walls and other physical objects and then is redirected to the receiver
767
There are lots of reasons a client can be disassociated from an access point these include
Idle timeout Session timeout Manual deletion Wireless network change Authentication timeout Access point radio reset
768
Service set Identifier SSID?
a natural language name used to identify a wireless network in an 802.11 network
769
Captive portals?
a web page displayed to newly-connected WI-FI users before being granted broader access to network resources
770
Captive portal: HTTP redirect?
redirects all traffic to a web server which then redirects them to a captive portal using a 302 HTTP status code
771
Captive portal: Icmp redirect?
sends error messages and operational information indicating the success or failure of communicating with another IP address
772
Captive portal: DNS redirect?
the client is redirected by the onboard DNS server to the captive portal webpage
773
Captive portals and radius ?
Captive portals usually rely on 802.1x, and 802.1x uses RADIUS for authentication. The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. This defines port security. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server.
774
what is Network availability?
measure of how well a computer network can respond to connectivity and performance demands that are placed upon it
775
Availability?
being up and operational
776
Reliability?
not dropping packets
777
Mean time to repair MTTR?
measures average time it takes to repair a network device when it breaks / want this to be a very small number
778
Mean Time Between Failures MTBF?
measures average time between when failures occur on a device / want this to be a very large number
779
how is redundancy achieved ?
Redundancy is achieved using a single device or multiple devices
780
Network interface card teaming ?
using a group of network interface cards for load balancing and failover on a server or other device
781
Layer 3 redundancy?
used if the default gateway goes down and clients couldn’t leave the subnet
782
Hot standby router protocol HSRP?
cisco's proprietary first-hop redundancy protocol which allows for an active and a standby router to be used together
783
Virtual Router Redundancy protocol VRRP?
IETF's open standard variant of HSRP which allows for an active router and multiple standby routers
784
Gateway load balancing protocol GLBP?
Cisco's proprietary first-hop redundancy which focuses on load balancing over redundancy
785
Link Aggregation control Protocol LACP?
allows the user to combine numerous physical Ethernet links into one logical link, which helps create load balancing in the interfaces.
786
When looking at designing redundant networks keep in mind the following ?
1. Examine technical and operational goals a. What is the function of this network b. What are you trying to accomplish with this network 2. Identify the budget to fund high availability features a. This can get really expensive 3. Categorize business applications into profiles 4. Establish performance standards for high availability solutions Define how to manage and measure the high availability solutions
787
There are really 4 options when we talk about recovery sites
Cold site Warm site Hot site Cloud site
788
Cold site?
an available building that does not have any hardware or software in place or configure Recovery with a cold site is going to be slow and time consuming
789
Warm site?
an available building that already contains a lot of the equipment Recovery is going to be fairly quick
790
Hot site?
an available building that already has the equipment and data in place and configured Very minimal downtime but this is very expensive
791
Cloud site?
allows for the creation of a recovery version of an organizations enterprise network in the cloud
792
Recovery time objective or RTO ?
duration of time and service level within which a business process must be restored after a disaster to avoid unacceptable consequences
793
what question does RTO answer for us ?
RTO answers the question of how much time did it take to recover after the notification of a business process disruption
794
what should we use for low RTO situations ?
Use either a hot site or a cloud site for low RTO situations
795
Recovery point Objective RPO?
interval of time during a disruption before data lost exceeds the Business Continuity plan maximum allowable threshold or tolerance
796
Different backups ?
Full backup – complete backup of every single file on a machine Incremental backup – only backs up data that changed since the last backup Differential backup – only backs up the data since the last full backup Snapshot – read only copy of your data from a point in time
797
Uninterruptible Power Supply UPS?
provides emergency power to a load when the input power source or main power fails
798
Power Distribution Unit PDU?
Distributes electric power especially to racks of computers and network equipment located within a data center
799
How do we provide power to our servers during a blackout ?
Generally a PDU is combined with a UPS or generator to provide power during a blackout
800
Wet pipe system?
using a sprinkler system and pipes that always contain water – a leak in the pipe could be very dangerous we should not use this
801
Quality of service QOS
enables strategic optimization of network performance based on different types of traffic 
802
There are different categories of QOS what are the three big ones we need to be aware of?
Delay Jitter Drops
803
QOS: Delay?
the time a packet travels from the source to the destination – measured in miliseconds – this is a big deal with voice or streaming video
804
QOS:` Jitter ?
uneven arrival of packets which is especially harmful in VOIP traffic 
805
QOS: Drops?
occurs during link congestion when a routers interface queue overflows and cause packet loss
806
Effective bandwidth?
is going to be the lowest bandwidth of the device in the network stream
807
what is the purpose of QOS?
to categorize traffic, apply a policy, and prioritize traffic in accordance with a Qos Policy a family of evolving Internet standards that provides ways to give preferential treatment to certain types of IP traffic
808
QOS: what are the three different mechanisms you can use when categorizing your traffic ?
best effort No QOS traffic is first in and first out Integrated services Hard QOS Traffic has strict bandwidth reservations Differentiated services Soft QOS Has differentiation of data types where routers and switches can make decisions based on markings and fluctuate traffic
809
how do we classify traffic with QOS ?
Classification Traffic is placed into different categories Marking Alters bits within a frame, cell, or packet which indicates handling of traffic Congestion Management Determines the order in which packets are sent out an interface based on priorities assigned to those packets Congestion avoidance Newly avoided packets would be discarded if the devices output queue fills to capacity Policing and shaping Policing – typically discards packets exceeding the configured rate limit Shaping - Allows buffer to delay traffic from exceeding the configured rate Link efficiency Packet payload is compressed to conserve bandwidth VOIP payload can be reduced by 50%
810
are there collosions with full duplex mode ?
no collosions cannot happen in full duplex mode
811
loopback plug ?
useful for testing physical ports sends traffic out one port and right back into the port
812
how does a network device determine if a specific packet is the start of a new traffic flow ?
tcp flags
813
SD-WAN?
software defined networking in a wide area network a WAN built for the cloud
814
LAG and mirrioring ?
port bonding / link aggregation multiple interfaces acts like one big interface
815
LACP ?
link aggregaton control protocol you can combine 4 10 GB ports to equal 40GB ports
816
what is the network layer sometimes referred to as ?
the routing layer! IP addresses operate at the network layer
817
what is the maximum supported distance of a 1000 base-T copper cable
100 meters
818
what are the three main types of copper media ?
coaxial twisted pair serial
819
what is an RG-6 cable typicaly used for ?
RG-6 is commonly used by ISP's to connect internet to your home
820
what are the two main connector used when it comes to coaxial cables ?
F-type BNC
821
what is an f-type connector ?
commonly used in cable tv this is a skrew in type of connection
822
what is a BNC connector
this is a push in connector used with coaxial cable
823
what are twinaxial cable used for ?
twinaxial cables are used for very short range high speed connections between devices
824
what is the most commonly used LAN cable ?
twisted pair you use these at work all the time its on every desk at flagship
825
what is the best range for UTP and STP to operate ?
0-100 meters
826
what are the two connector types used with twisted pair cabeling ?
RJ45 RJ11
827
what are RJ45 connectors typically used for ?
commonly used for data transfer
828
what is the standard for trunking ?
802.1q
829
Compare and contrast ethernet standards and there maximum supported distance.
1000base-T 100 meters 10Gbase-T 100 meters 40G base-t - 30 meters
830
what protocols are used for incoming mail communication ?
IMAP and POP3 are used for incoming mail communication
831
what is required to get data from one side of the network to the other ?
1. Server IP address 2. protocol = TCP/UDP 3. Server application port number 4. client IP address 5. protocol 6. client port number
832
Unicast ?
one station sending information to another station web surfing and file transfers are unicast traffic
833
PDU protocol data unit?
a protocol data unit is a unit of transmission the PDU's are different groups of Data at different OSI layers Ethernet operates on a frame of data the TCP PDU is a segment the UDP PDU is a datagram
834
RSTP rapid spanning tree protocol
802.1W RSTP has a faster convergence this took the convergence time from 30 to 50 seconds to 6 you can use both STP and RSTP in a network and they can coexist
835
What are the common Interior Gateway protocols ?
OSPF RIP EIGRP
836
what version of OSPF would we use for IPV6
OSPF v3
837
how long is an IPV6 address in bytes ?
128 bits long
838
what are the private IP address ranges ?
10.0.0.0-10.255.255.255 172.16.0.0-172.31.255.255 192.168.0.0-192.168.255.255
839
where are jumbo frames commonly used ?
in a SAN network environment
840
What are ACL's used for in our networks ?
ACL's are used to deny or allow traffic
841
what protocl is EAP a part of ?
802.1x