Network+ 12 Flashcards

1
Q

time domain reflectometer (TDR) for copper cabling or an optical time domain reflectometer (OTDR) for fiber-optic cabling to locate the cable fault to find break in cable.

A toner probe allows you to place a tone generator at one end of a connection (for example, someone’s office) and use a probe on a punch-down block to audibly detect to which pair of wires the tone generator is connected. A toner probe, therefore, comes in two pieces: the tone generator and the probe.

A spectrum analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. The primary use of the spectrum analyzer is to measure the power of the spectrum of known and unknown signals.

A

TDR etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SNMP manager : An SNMP manager runs a network management application.

SNMP agent : is a piece of software that runs on a managed device (for example, a server, router, or switch).

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MIB : Interfaces and their details, such as errors, utilization, discards, packet drops, resets, speed and duplex, system memory, utilization of bandwidth, storage, CPU, and memory, are able to be monitored and reported via SNMP. Information about a managed device’s resources and activity is defined by a series of objects.

A

MIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SNMP message types = Get: An SNMP get message retrieves information from a managed device.

Set : set message sets a variable in a managed device or triggers an action on a managed device.

Trap : is an unsolicited message sent from a managed device to an SNMP manager, which can notify the SNMP manager about a significant event that occurred on the managed device.

A

SNMP Message Types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMPv1 and SNMPv2c use community strings to gain read-only access or read-write access to a managed device. You can think of a community string like a password.

A

SNMPv1/v2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SNMPv3 = Security model: Defines an approach for user and group authentications (for example, SNMPv1, SNMPv2c, and SNMPv3). Security level: Defines the type of security algorithm performed on SNMP packets.

noAuthNoPriv (no authorization, no privacy) security level uses community strings for authorization and does not use encryption to provide privacy.

authNoPriv (authorization, no privacy) security level provides authorization using hashed message authentication code (HMAC) with Message Digest 5 (MD5) or Secure Hash Algorithm (SHA). However, no encryption is used.

authPriv (authorization, privacy) security level offers HMAC MD5 or SHA authentication and provides privacy through encryption. Specifically, the encryption uses the Cipher Block Chaining (CBC) Data Encryption Standard (DES) (DES-56) algorithm.

Integrity: Using hashing algorithms, SNMPv3 ensures that an SNMP message was not modified in transit.

Authentication: Hashing allows SNMPv3 to validate the source of an SNMP message.

Encryption: Using the CBC-DES (DES-56) encryption algorithm, SNMPv3 provides privacy for SNMP messages, making them unreadable by an attacker who might capture an SNMP packet.

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Syslog messages and SNMP traps can be used to trigger notification messages that may be sent via email and SMS. Syslog servers: A syslog server receives and stores log messages sent from syslog clients. Syslog clients : various types of network devices can act as syslog clients and send logging information to a syslog server.

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Microsoft Windows incorporates the Event Viewer application, which allows you to view various log types, including application, security, and system logs. These logs can be archived for later review. They can be used to spot network trends and serve as data for creating baselines.

A

Event Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPSec: IPSec provides a standards-based method of ensuring secure authentication, integrity, and confidentiality over the VPN. SSL/TLS/DTLS: These standards permit the use of standard web browsers for secure VPN communications.

Site-to-site VPN: This VPN type connects one entire network site to another; such as a headquarters location to a branch office.

Client-to-site VPN: This VPN type permits you to use network management software on a client system and connect over the VPN to a network site.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VNC: Virtual Network Computing is similar to RDP; it permits the access of a remote system as if you were sitting in front of it.

Out-of-band management: You can use a modem or a console router to ensure your network management traffic does not share the same network with data. This additional separation helps to keep data secure and to preserve precious bandwidth for user data.

A

VNC etc …

How well did you know this?
1
Not at all
2
3
4
5
Perfectly