NETWORK+ Flashcards

PASS THE EXAM

1
Q

Layer 1 (OSI)

A

PHYSICAL: physical layer is where the raw bitstream is physically transmitted over a physical medium

BONUS
(includes translating bits to electricity, light, or radio signals and controlling the rates at which they are sent over the chosen medium)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Layer 1 PDU

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Layer 2 (OSI)

A

DATA LINK: establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Layer 2 PDU

A

frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Layer 3 (OSI)

A

NETWORK: One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Layer 3 PDU

A

packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 4 (OSI)

A

TRANSPORT:accept data from the session layer, split it up into smaller units if need be, pass these to the Network layer, and ensure that all the pieces arrive correctly at the other end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Layer 4 PDU

A

segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 5 (OSI)

A

SESSION: creates communication channels, called sessions, between devices
-Start, Stop, Restart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 5 PDU

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 6 (OSI)

A

PRESENTATION: takes any data transmitted by the application layer and prepares it for transmission over the session layer; encrypts, SSL/TSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 6 PDU

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 7 (OSI)

A

APPLICATION: used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users.
(HTTP,POP3, FTP, DNS, SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer PDU

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP Flags

A

In the protocol header, TCP uses flags to manage connections and traffic flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SYN

A

SYNCHRONIZATION: Used to create a TCP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ACK

A

ACKNOWLEDGMENT: Used to acknowledge the reception of data or synchronization packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

PSH

A

PUSH: Instruct the network stacks to bypass buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

URG

A

URGENT: Indicates out-of-band data that must be processed by the network stacks before normal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FIN

A

FINISH: Gracefully terminate the TCP connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RST

A

RESET: Immediately terminate the connection and drop any in-transit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Payload

A

Data sent in terms of packets and individual packets containing a header and the data which is sent by the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

MTU

A

Maximum Transmission Unit
-a measurement representing the largest data packet that a network-connected device will accept. (smaller=faster)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IP Header

A

smallest message entity exchanged via the Internet Protocol across an IP network. consist of a header for addressing and routing, and a payload for user data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Ethernet Header

A

contains destination and source MAC addresses as its first two fields.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TCP Header

A

tracks the state of communication between two TCP endpoints. (slower than UDP) 20-60 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

UDP Header

A

source port, destination port, packet length (header and data), and a simple (and optional) checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Mesh Topology

A

a network configuration in which computers are linked to one another by numerous redundant connections.
(no switch or hub)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Star Topology (Hub and Spoke)

A

connects each node to a central hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Bus Topology

A

network communication takes place over a single bus or channel. network communication takes place over a single bus or channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ring Topology

A

a type of network configuration where devices are connected in a circular manner, forming a closed loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Hybrid Topology

A

made up of two or more topologies
(expenisve , needs MSAL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

P2P

A

Peer to Peer
- a decentralized platform whereby two individuals interact directly with each other, without intermediation by a third party. (equally privileged)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Client-Server

A

consists of a single central computer functioning as a server and directing several other computers(clients)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

LAN

A

Local Area Network
-a collection of devices connected together in one physical location, such as a building, office, or home.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

MAN

A

Metropolitan Area Network
-a computer network that connects computers within a metropolitan area,
(bigger than LAN, smaller than WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

WAN

A

Wide Area Network
-spans beyond a single building or large campus to include multiple locations spread across a specific geographic area, or even the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

WLAN

A

Wireless Local Area Network
-links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
(ex wifi)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

PAN

A

Personal Area Network
-connects electronic devices within a user’s immediate area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CAN

A

Campus Area Network
-made up of an interconnection of local area networks within a limited geographical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SAN

A

Storage Area Network
-network of storage devices that can be accessed by multiple servers or computers, providing a shared pool of storage space. Each computer can access storage on the SAN as though they were local disks connected directly to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

SDWAN

A

Software Defined Wide Area Network
- a virtual WAN architecture that allows enterprises to leverage any combination of transport services – including MPLS, LTE and broadband internet services – to securely connect users to applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

MPLS

A

Multiprotocol Label Switching
- routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks.
(technique for speeding up network connections)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

mGRE

A

Multipoint Generic Routing Encapsulation
-connect multiple remote sites through a VPN
multiple endpoints, resulting in a point to multipoint topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

GRE

A

Generic Routing Encapsulation
-developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Demarcation Point

A

the point at which the telephone company’s wiring ends and the customer’s wiring begins
(public to private)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Smartjack

A

(intelligent network interface device, INID)
similar to NID but with newer technology and additional features. commonly used for complex types of telecom services, such as T1 lines (Verizon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

vSwitch

A

Virtual switches are also used to establish connections between virtual and physical networks and to carry a VM’s traffic to other VMs or a physical network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

vNic

A

a virtualized Network Interface Card, used by a Virtual Machine as its network interface.
A VNIC is assigned a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

NFV hypervisor

A

Network functions virtualization
-replacement of network hardware with virtual machines. The virtual machines use a hypervisor to run networking software and processes such as routing and load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hypervisor

A

a software that you can use to run multiple virtual machines on a single physical machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Leased Lines

A

a reserved circuit between two communication points that is always active and rented monthly.
Leased lines are dedicated, meaning that any bandwidth associated with the leased line is solely for private, organizational use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Broadband

A

various high-capacity transmission technologies that transmit data, voice, and video across long distances and at high speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

ADSL

A

Asymmetric digital subscriber line
- a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DOCSIS

A

Data Over Cable Service Interface Specification
-international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Cat 5

A

100Mbs
100mhz
1000Base-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Cat 5e

A

1Gbps (1000Mbs)
100mhz
1000Base-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Cat 6

A

10Gbps
250mhz
10GBase-T
Unshielded: 55 m
Shielded: 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Cat 6a

A

10Gbps
500mhz
10GBase-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Cat 7

A

10Gbps
600mhz
10GBase-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Cat 8

A

40Gbps
2000mhz
40GBase-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

RG-6

A

Coaxial cable and satellite signal transmission for residential or commercial installations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Twinaxial

A

similar to coaxial cable, but with two inner conductors in a twisted pair instead of one
(cheap fast)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

T568A

A

White/Green
Green
White/Orange
Blue
White/Blue
Orange
White/Brown
Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

T568B

A

White/Orange
Orange
White/Green
Blue
White/Blue
Green
White/Brown
Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

SMF

A

Single-Mode Fiber
-a single glass fiber strand used to transmit a single mode or ray of light
(laser, higher bandwiths)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

MTRJ

A

Mechanical Transfer Registered Jack
-the connector houses two fibers and mates with locating pins on the plug.
(small form factor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

APC

A

Angled Physical Connect
- 8°angel, minimizing the back reflection as a result
(GREEN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

UPC

A

Ultra Physical Contact
-polished with no angle
(BLUE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

F-Type connector

A

“over the air” terrestrial television, cable television and universally for satellite television and cable modems,
(RG-6/U r RG-59/U cable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

SFP

A

Small Form-Factor Pluggable
-provide required optical or electrical reach via copper or fiber optic cables
(transmit and receive at same time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

SFP+

A

Enhanced Form-Factor Pluggable
-an updated SPF version that supports higher speeds up to 10Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

QSFP

A

Quad Small Form-Factor Pluggable
-supports a maximum data transfer rate of up to 4 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

QSFP+

A

Enhanced Quad Small Form-Factor Pluggable
-supports a higher data transfer rate of up to 10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Punchdown block 66

A

older blocks which only supported up to CAT3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Punchdown block 110

A

support up to CAT6 and provide better bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Krone Punchdown block

A

European/UK connector
open-ended contact slots at a 45-degree angle to the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Bix Punchdown block

A

proprietary block developed originally by Nortel Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

10BASE T

A

maximum speed of 10 Mbps, uses twisted-pair copper cabling
(home networks and small businesses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

100BASE TX

A

maximum speed of 100 Mbps and also uses twisted-pair copper cabling to connect devices
(large LAN’s, office networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

100BASE FX

A

1300nm multimode light.
maximum length: 2 kilometers for full duplex over multimode optical fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

100BASE SX

A

850nm light
-up to 300 meters.
-lower cost alternative to 100Base-FX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

1000BASE SX

A

850nm multimode light over multimode fibers.
maximum length is 500 m, can reach longers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

1000BASE LX

A

1300 or 1310nm single mode fiber and laser.
maximum lenght 5km-10km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

10GBASE SR

A

a port type for multi-mode fiber and uses 850 nm lasers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

10GBASE LR

A

10-Gbps Ethernet standard that operates at ranges of up to 25 kilometers two 1310-nm single-mode fibers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

CWDM

A

Coarse Wavelength-Division Multiplexing
-up to 18 wavelength channels transmitted over a dark fiber at the same time.
wavelenghts:1310nm and 1550nm.
70km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

DWDM

A

Dense Wavelength-Division Multiplexing
-up to 80 simultaneous wavelength channels, 0.8nm apart.
connections can be amplified, used for transmitting data much longer distances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Bidirectional WDM

A

Bidirectional wavelength-division multiplexing
-transmission of optical channels on a fiber propagating simultaneously in both directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

RFC1918

A

networking equipment assigns IP addresses in a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

NAT

A

Network Address Translation
- a way to map multiple private addresses inside a local network to a public IP address before transferring the information onto the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

PAT

A

Port Address Translation
-allows a single public IP address to be used by multiple devices within a private network.
accomplished by assigning each device a unique port number and routing incoming traffic accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

APIPA

A

Automatic Private IP Addressing
-devices automatically assign IP addresses to themselves when they cannot get an IP address from a Dynamic DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

EUI-64

A

Extended Unique Identifier
-allows a host to assign iteslf a unique 64-Bit IP Version 6 interface identifier
(no need for manual DHCP in IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Multicast

A

one-to-many and many-to-many real-time communication over an IP infrastructure in a network
(simultaneously)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Unicast

A

one-to-one transmission from one point in the network to another point
(one sender, one receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Anycast

A

multiple machines to share the same IP address, sent to closest device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

MMF

A

Multimode fibers
-for transporting light from a laser source to the place where it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Broadcast

A

ensures each node’s transmissions are received by all other nodes in the network; single communications channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Multicast IPV6 range

A

FF00::/8
-one to may

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Unicast IPV6 range

A

FC00::7
-packets to interface, private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Global Unicast IPV6 range

A

2000::/3
-internet routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Link-local address IPV6 range

A

FE80::/10
-non-routable (like APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Link Local

A

automatically assign IP address when no other assignment method available (like APIPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Loopback address

A

127.0.0.1
-allows the machine to connect to and communicate with itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Default Gateway

A

address of your router/ modem
(hardware that sits between user’s home network and the rest of the internet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Classless VLSM

A

Variable Length Subnet Mask
- all subnet masks can have varying sizes.
enables network engineers to use multiple masks for different subnets of a single class A, B or C network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Class A public

A

1-127
-255.0.0.0
large number of hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Class A private

A

10.0.0.0 to 10.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Class B public

A

128-191
-255.255.0.0
medium to large sized networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Class B private

A

172.16.0.0 to 172.31.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Class C public

A

192-223
-255.255.255.0
small local area networks (LANs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Class C private

A

192.168.0.0 to 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Class D

A

224-239
not allocated to hosts and are used for multicasting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Class E

A

240-255C
reserved for research purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

CIDR

A

Classless Inter-Domain Routing
-IP address and a suffix that indicates network identifier bits in a specified format
ex: /24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Tunneling

A

allows for the movement of data from one network to another.
(encapsulation TCP, VPN encryption, private across public)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Dual Stack

A

supports the simultaneous use of both IPv4 and IPv6 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Router Advertisement

A

for IPv6 auto-configuration and routing.
When enabled, messages are sent by router periodically and in response to solicitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

SLAAC

A

Stateless Address Auto-Configuration
-enables each host on the network to auto-configure a unique IPv6 address without device keeping track of which address is assigned to which node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Subinterfaces

A

virtual interface created by dividing one physical interface into multiple logical interfaces
(layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

DHCP Scope

A

range of IP addresses that a DHCP server can distribute to clients on a specific network segment.
defines the pool of available addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

DHCP Exclusion Ranges

A

addresses taken from a DHCP scope that the DHCP server is not allowed to hand out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

DHCP Reservation

A

lets you assign a specific IP address to a specific device or whenever the device connects to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

DHCP Lease Time

A

default lease time for the DHCP server is 24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

DHCP Relay

A

provides a way for DHCP clients to communicate with DHCP servers when none are available on its local subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

IP Helper/UDP Forwarding

A

forward broadcast and multicast packets received for a specific IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

CNAME

A

Canonical Name
-resource record in the Domain Name System that maps one domain name to another.
(convenient when running multiple services from a single IP address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

MX

A

Mail Exchange
-a DNS record that routes emails to specified mail servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

SOA

A

State of Authority (DNS)
-the email address that you used to register your domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

PTR

A

Pointer (DNS)
-provides the domain name associated with an IP address
(opposite of “A”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

TXT

A

Text
-stores text notes on a DNS serverS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

SRV

A

Service
-used to identify computers hosting specific services
(locate controllers in AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

NS

A

Name Server
-indicates which DNS server is authoritative for that domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Root DNS servers

A

the topmost part of a website’s address and represents the ground level of the website’s identity
EX: poop.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Zone Transfers

A

process of copying the contents of the zone file on a primary DNS server to a secondary DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Authoritative Name Severs

A

the final holder of the IP of the domain you are looking for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

TTL

A

like a stopwatch for how long to keep a DNS record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

DNS Caching

A

temporary DNS storage on a device that contains DNS records of already visited domain names, uses TTL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Reverese DNS

A

takes an IP address and returns the domain name associated with that IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Reverse Lookup

A

resolve IP addresses to names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Forward Lookup

A

resolve names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Recursive Lookup

A

one DNS server communicates with several other DNS servers to hunt down an IP address and return it to the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Irerative Lookup

A

client communicates directly with each DNS server involved in the lookup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

NTP

A

Network Time Protocol
-protocol that allows the synchronization of system clocks (from desktops to servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Stratum

A

hierarchy of time servers in an NTP network
Stratum level (0-15) indicates the device’s distance to the reference clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Access/Edge

A

Part 1: part of the network which enables the users to connect to the wired Ethernet Network
(Ethernet Switches, Hubs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Distribution/Aggregation Layer

A

Part 2: network grows beyond a certain size, it must be divided into multiple local (Access Layer) networks
(Routers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Core

A

Part 3:
backbone of a network, used to connect multiple Distribution Layer devices together
(most powerful layer, fiber, redundancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Software Defined Network

A

a network architecture approach that enables the network to be intelligently and centrally controlled, or ‘programmed,’ using software applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Application Layer (SDN)

A

network programs and applications that communicate the desired network behavior and requirements to the underlying SDN control layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Control Layer (SDN)

A

connects the application layer and the infrastructure layer
(admin control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Infrastructure Layer (SDN)

A

underlying network of physical switches and routers in the network
These devices forward network traffic to their destinations based on rules/policies from controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Management Plane

A

handles high-level network management and operations including network monitoring and customer billing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Spine and Leaf

A

data center network topology that consists of two switching layers—a spine and leaf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Top-of-Rack Switching

A

uses network switches to connect servers and other devices in the same rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Backbone

A

part of computer network which interconnects networks, providing a path for the exchange of information between different LANs or subnetworks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

SAN

A

Storage Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

FCoE

A

Fibre Channel over Ethernet
enables Fibre Channel (FC) communications to run directly over Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Fibre Channel

A

connect computer data storage to servers in storage area networks (SAN) in commercial data centers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

iSCSI

A

Internet Small Computer Systems Interface
-allows the SCSI command to be sent end-to-end over local-area networks (LANs), wide-area networks (WANs) or the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

SaaS

A

Software as a service
-allows users to connect to and use cloud-based apps over the Internet
(office 365, pay as you go)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

IaaS

A

Infrastructure as a Service
-provides on-demand access to computing resources such as servers, storage, networking, and virtualization
(hardware)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

PaaS

A

Platform as a Service
-includes everything developers need to build, run, and manage applications
(test, programming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

DaaS

A

Desktop as a Service
-a service provider delivers virtual desktops to end users over the Internet, licensed with a per-user subscription

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

IaC

A

Infrastructure as code
ability to provision and support your computing infrastructure using code instead of manual processes and settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

VPN

A

virtual private network
- stay private online by encrypting the connection between your device and the internet

168
Q

Layer 2 Switch

A

used to reduce data traffic on a LAN
(MAC address only)

169
Q

Layer 3 Switch

A

operate VLANs and improve security
(routing between network segments)

170
Q

Hub

A

connects multiple PCs to a single network
(OSI layer 1)

171
Q

Switch

A

connects multiple devices on a single computer network

172
Q

Bridge

A

creates a single, aggregate network from multiple communication networks or network segments

173
Q

load balancer

A

process of distributing traffic among multiple servers to improve a service or application’s performance and reliability.

174
Q

Proxy Server

A

agent or intermediary for the user, passing through all Web requests and responses.

175
Q

Repeater

A

node that amplifies incoming signals and rebroadcasts them over a wider area or higher network layer than the original signal.

176
Q

Voice Gateway

A

used to connect the enterprise VoIP network with the telecommunications provider

177
Q

IPS

A

Intrusion Prevention System
-takes action to block the attempted intrusion or otherwise remediate the incident.

178
Q

IDS

A

Intrusion Destection System
-provide an alert about a potential incidentF

179
Q

Firewall

A

monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

180
Q

VPN Headend

A

termination point for the VPN tunnels

181
Q

RIP

A

Routing Information Protocol
- distance-vector protocol that uses hop count to determine the best path
(distance:120)

182
Q

OSPF

A

Open Shortest Path First
-a link-state routing protocol used to find the best path between the source and the destination router using its own Shortest Path First
(distance:110)

183
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol
- a distance-vector protocol to automate routing configuration and decisions on a network.
(distance:90)
(hybrid of link state and distance vector)

184
Q

BGP

A

Border Gateway Protocol
- exterior gateway protocol that enables exchange of routing and reachability info between autonomous systems (AS) on the internet.

185
Q

Link State

A

send info about directly connected links to all the routers in the network

186
Q

Distance Vector

A

send their entire routing table to directly connected neighbors

187
Q

Default Route

A

the route that takes effect when no other route is available for an IP destination address

188
Q

Administrative distance

A

a measure of the trustworthiness of the source of the routing information
(lower better/wins)

189
Q

Traffic Shaping (packet shaping)

A

bandwidth management technique that delays the flow of certain types of network packets in order to ensure network performance for higher priority applications.

190
Q

QoS

A

Quality of Service
-refers to any technology that manages data traffic to reduce packet loss, latency and jitter on a network.

191
Q

port tagging/802.1q

A

trunk ports will link switches, and access ports will link to end devices
(802.3)

192
Q

LACP

A

Link Aggregation Control Protocol
- enables you to bundle several physical ports together to form a single logical channel (LAG)
(802.3az)

193
Q

Full Duplex

A

simultaneous data transmission and receptions over one channel.
device capable of bi-directional network data transmissions at the same time

194
Q

Half Duplex

A

devices can only transmit in one direction at one time

195
Q

Flow Control

A

ensures that the transmitting device does not send more data to the receiving device than it can handle

196
Q

Port Mirroring

A

on a network switch to send copy of network packets seen on one switch port (or an entire VLAN) to a network monitoring connection on another switch port.

197
Q

Port Security

A

enables you to configure each switch port with a unique list of the MAC addresses of devices that are authorized to access the network through that port.

198
Q

Jumbo Frames

A

Ethernet frames with more than 1500 bytes of payload, limit set by IEEE 802.3 standard
(up to 9000 bytes)

199
Q

MDIX

A

auto-medium-dependent interface crossover
-automatically detects the required cable connection type and configures the connection appropriately

200
Q

MAC address table

A

media access control address tables
where the switch stores information about the other Ethernet interfaces to which it is connected on a network

201
Q

PoE

A

Power over Ethernet
802.3af , an deliver 15.4 watts over Cat5 cables.

202
Q

PoE+

A

Power Over Ethernet +
802.3at ,can deliver up to 30 watts over Cat 5 cables with 25.5 watts available to devices.

203
Q

STP

A

Spanning Tree Protocol
IEEE 802.1D, a loop-prevention protocol that allows switches to communicate with each other in order to discover physical loops in a network.
(layer 2)

204
Q

Blocking (STP)

A

Receives BPDUs only
When a device is connected, the port will first enter the blocking state

205
Q

Listening (STP)

A

The switch will listen for and send BPDUs.

206
Q

Learning (STP)

A

Builds bridging table
The switch will receive a superior BPDU, will stop sending its own BPDUs, and will relay the superior BPDUs.

207
Q

Forwarding (STP)

A

Sends/receives user data
The port is forwarding traffic.

208
Q

Disabled (STP)

A

The result of an administrative command that will disable the port.

209
Q

CSMA/CD

A

Carrier-sense multiple access with collision detection
-use a shared medium, where multiple devices connect to the same physical network segment.
(MAC)

210
Q

ARP

A

Address Resolution Protocol
-connects an always-changing IP address to a fixed media access (MAC) address

211
Q

NDP

A

Neighbor Discovery Protocol
-ability of an IPv6 host to automatically generate its own IPv6 address

212
Q

802.11a

A

5GHz
20MHz
54Mbps
(WiFi 2) (OFDM)

213
Q

802.11b

A

2.4GHz
20MHz
11Mbps
(WiFi 1) (DSSS)

214
Q

802.11g

A

2.4GHz
20MHz
54Mbps
(WiFi 3) (DSSS, OFDM)

215
Q

802.11n

A

2.4GHz/5.4GHz
20MHz/40MHz
600Mbps
(WiFi 4)(OFDM, MIMO)

216
Q

802.11ac

A

5GHz
20/40/80/160MHz
1.3Gbps
(WiFi 5) (OFDM, MU-MIMO)

217
Q

802.11ax

A

2.4GHz/5.4GHz
20/40/80/160MHz
10-12Gbps

218
Q

SSID

A

Service Set Identifier

219
Q

BSS

A

Basic Service Set (1 AP)
-group of wireless devices served by a a single Access Point (AP)

220
Q

ESS

A

Extended Service Set (more than 1 AP)
-User can go from one cell to another without connection interrupt. combining one more Access Point in a switched network

221
Q

IBSS

A

Independent Basic service Set (Ad Hoc, 0 AP)
-directly communicate together without any need to an Access Point

222
Q

WPA

A

Wi-Fi Protected Access
-used TKIP 256 bit
( temporal key integrity protocol)

223
Q

WPA2 personal (PSK)

A

relies on a shared passcode for access and is usually used in home environments.
(AES, Advanced Encryption Standard)

224
Q

CDMA

A

Code-division multiple access
- protocols used in (3G and 2G) wireless communication

225
Q

GSM

A

Global System for Mobile Communications
-(2G) standard employing time-division multiple-access (TDMA) spectrum-sharing, issued by the European Telecommunications Standards

226
Q

MIMO

A

Multiple-Input Multiple-Output
-wireless technology that uses multiple transmitters and receivers to transfer more data at the same time

227
Q

Mu-MIMO

A

multi-user, multiple input, multiple output
-allows a single access point (AP) to transmit data to multiple devices simultaneously.
802.11ac Wave 2 (Wi-Fi 5)

228
Q

Bandwith

A

how much data can be downloaded or uploaded from your computer

229
Q

Latency

A

amount of time it takes for a data packet to go from one place to another

230
Q

Jitter

A

time delay between when a signal is transmitted and when it’s received over a network connection

231
Q

Traps

A

SNMP PDU
an agent can send an unrequested message to the manager to notify about an important event.

232
Q

OID

A

Object Identifier
-an address that is used to differentiate between devices within the MIB hierarchy

233
Q

MIB

A

Management Information Base
-formatted text file within the SNMP manager designed to collect information and organize it into a hierarchical format

234
Q

Traffic Logs

A

whenever traffic hits a rule which has been enabled for logging

235
Q

Audit Logs

A

produced and stored on the device each time a user makes a change to the configuration of a device.

236
Q

Syslog

A

a protocol that computer systems use to send event data logs to a central location for storage.

237
Q

Syslog level 0

A

Emergency- system is unusable

238
Q

Syslog level 1

A

Alert-action must be taken immediately

239
Q

Syslog level 2

A

Critical-critical conditions

240
Q

Syslog level 3

A

Error - error conditions

241
Q

Syslog level 4

A

Warning - warning conditions

242
Q

Syslog level 5

A

Notice - normal, but significant condition

243
Q

Syslog level 6

A

Informational - informational messages

244
Q

Syslog level 7

A

Debug - debug level messages

245
Q

CRC

A

cyclic redundancy check
- network method designed to detect errors in the data and information transmitted over the network

246
Q

CRC error

A

when a device (network device or host connected to the network) receives an Ethernet frame with a CRC value in the FCS field of the frame that does not match the CRC value

247
Q

Giant Frame

A

any frame whose size exceeds the maximum transmission unit (MTU) passes 1500bytes

248
Q

Runt frame

A

a frame that is smaller than the minimum frame size for IEEE-802.3 standard frames (ethernet 64bytes)

249
Q

Encapsulation error

A

indicates that router has a layer 3 packet to forward and is lacking some element of the layer 2 header that it needs to be able to forward the packet toward the next hop.

250
Q

Baelines

A

a snapshot, a collection of metrics about a network at a time of normal use

251
Q

Netflow Data

A

Source and destination IP address
(TCP/UDP)

252
Q

Change Management

A

collective term for all approaches to prepare, support, and help individuals, teams, and organizations in making organizational change

253
Q

Incident Response Plan

A

written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.

254
Q

Disaster Recovery Plan

A

process of maintaining or reestablishing vital infrastructure and systems following a natural or human-induced disaster

255
Q

AUP

A

document outlining rules and guidelines for using an organization’s IT resources, including networks, devices, and software
defines acceptable and prohibited behaviors

256
Q

Onboarding and offboarding employee

A

procedures that mark the beginning and conclusion of an employee’s tenure with an organization

257
Q

Data Loss Prevention

A

identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data

258
Q

Floor Plan

A

identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data

259
Q

Rack Diagram

A

visual representation of the organization of IT equipment within a server rack used to track and manage data center assets.

260
Q

IDF

A

intermediate distribution frame
-a remote room or closet connected to the MDF, in which you can expect to find hubs and patch panels.

261
Q

MDF

A

Main Distribution Frame
-main computer room for servers, hubs, routers, DSL’s, etc. to reside

262
Q

Logical network Diagram

A

illustrates the flow of information through a network and shows how devices communicate with each other

263
Q

Wiring Diagram

A

A diagram that shows how a circuit works logically and electrically

264
Q

site survey report

A

helps visualize the wireless network coverage areas and data rates.

265
Q

Baseline Configurations

A

or gold build, is the standard, approved configuration of a system.

266
Q

NDA

A

non-disclosure agreement
-a legally binding contract that establishes a confidential relationship.
protect their intellectual property and confidential information

267
Q

SLA

A

service-level agreement
-agreement between a service provider and a customer.

268
Q

MOU

A

memorandum of understanding
-nonbinding agreement that states each party’s intentions to take action, conduct a business transaction, or form a new partnership.

269
Q

Multipathing

A

creating more than one physical path between the server and its storage devices. (SAN)

270
Q

Load Balancing

A

the method of distributing network traffic equally across a pool of resources that support an application.

271
Q

NIC teaming

A

Network Interface Card teaming
- process of combining multiple network cards together for performance, load balancing, and redundancy reasons

272
Q

Switches

A

allows two or more IT devices, such as computers, to communicate with one another.

273
Q

Routers

A

managing traffic between networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.

274
Q

Firewalls

A

barrier between two networks identifying and blocking cyber threats while allowing appropriate traffic through.

275
Q

UPS

A

uninterruptible power supply
- provide backup power, protecting equipment from damage in the event of grid power failure

276
Q

PDU

A

power distribution unit
- a device with multiple power outlets that provides electrical protection and distributes power to IT equipment within a rack

277
Q

Active-active

A

Client machines connect to a load balancer that distributes their workloads across multiple active servers

278
Q

Active-passive

A

Client machines connect to the main server, which handles the full workload, while a backup server remains on standby, only activating in the event of a failure.

279
Q

VRRP

A

Virtual Router Redundancy Protocol
- IP routing redundancy protocol designed to allow for transparent failover at the first-hop IP router.

280
Q

FHRP

A

first hop redundancy protocol
- protect the default gateway used on a subnetwork by allowing two or more routers to provide backup for that address

281
Q

MTTR

A

Mean time to repair
-the average time it takes to repair a system

282
Q

MTBF

A

Mean Time Between Failure
-measures the mean time between repairable product or service failures

283
Q

RTO

A

Recovery Time Objective
-measures the quantity of time that passes during an incident before reaching the business continuity plan’s (BCP) threshold of acceptability

284
Q

RPO

A

Recovery Point Objective
-defines the quantity of data (or service time) that can be lost before unacceptable consequences occur.

285
Q

CIA

A

confidentiality, integrity and availability

286
Q

CVE

A

common vulnerabilities and exposures
-system provides a reference method for publicly known information-security vulnerabilities and exposures.

287
Q

Zero Day

A

vulnerability or security hole in a computer system unknown to its owners, developers or anyone capable of mitigating it.

288
Q

Least Privelege

A

a user is given the minimum levels of access – or permissions – needed to perform his/her job functions.

289
Q

Role Based Access

A

a method of restricting network access based on the roles of individual users within an enterprise

290
Q

Zero Trust

A

no one is trusted by default from inside or outside the network, and verification is required from everyone trying to gain access to resources on the network

291
Q

Defense in depth

A

strategy that leverages multiple security measures to protect an organization’s assets

292
Q

network segmentation enforcement

A

network security technique that divides a network into smaller, distinct sub-networks

293
Q

Perimeters Network (DMZ)

A

a separate network used for placing web servers, e-mail servers, FTP servers and other public servers to gain access from or to the internet.

294
Q

Separation of Duties

A

an attempt to ensure that no single individual has the capability of executing a particular task/set of tasks.

295
Q

NAC

A

Network Access Control
-the process of restricting unauthorized users and devices from gaining access to a corporate or private network.

296
Q

Honeypot

A

designed to look, feel, and act just like a network packed tight with valuable resources (to catch hackers)

297
Q

TACACS+

A

Terminal Access Controller Access-Control System
used for administrative access to network devices such as routers and switches or devices in the network
-separates Authentication, Authorization, and Accounting.

298
Q

RADIUS

A

Remote Authentication Dial-In User Service
-a networking protocol that authorizes and authenticates users who access a remote network.

299
Q

Kerberos

A

protocol for authenticating service requests between trusted hosts across an untrusted network, such as the internet

300
Q

802.1X (NAC)

A

authenticates the port, and port security manages network access for all MAC addresses, including that of the client

301
Q

EAP

A

Extensible Authentication Protocol
-used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other)

302
Q

posture assessment

A

builds a baseline view of your organisation’s security capabilities end-to-end. The ultimate aim of such an assessment is to build maturity in the organisation’s cyber resilience strategy to minimise the risk of cyber-attacks and data breaches.

303
Q

SIEM

A

Security information and event management
-is a security solution that helps organizations detect threats before they disrupt business.

304
Q

On path attack (MITM)

A

attackers place themselves between two devices (often a web browser and a web server) and intercept or modify communications between the two

305
Q

DNS Poisoning

A

fake info is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website.

306
Q

VLAN Hopping

A

allows an attacker to send frames to a device on a different VLAN.

307
Q

ARP Spoofing

A

attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network.

308
Q

Rogue DHCP

A

DHCP server on a network which is not under the administrative control of the network staff

309
Q

Rogue AP

A

Rogue Access Point
-a wireless access point plugged into an organization’s network that the security team does not know exists.

310
Q

Evil Twin

A

An evil twin attack is a rogue Wi-Fi access point (AP) that masquerades as a legitimate one,

311
Q

MITM

A

when a hacker or compromised system sits in between two uncompromised people or systems and deciphers the information they’re passing to each other, including passwords

312
Q

Mac Spoofing

A

a commonly employed tactic by malicious actors to alter the Media Access Control (MAC) address of their device to mimic that of another device present on the network.

313
Q

IP Spoofing

A

creation of Internet Protocol packets with a false source IP address, for the purpose of impersonating another computing system

314
Q

deauthentication

A

sending deauthentication frames to target devices, causing them to disconnect from the network and temporarily denying them access

315
Q

RA Guard

A

Router Advertisement Guard
provides support for allowing the network administrator to block or reject unwanted or rogue router advertisement (RA) guard messages that arrive at the network device platform.

316
Q

Port Security

A

enables you to configure each switch port with a unique list of the MAC addresses of devices that are authorized to access the network through that port.

317
Q

DAI

A

Dynamic ARP Inspection
protects networks against man-in-the-middle ARP spoofing attacks

318
Q

Control Plane Policing

A

mechanism that allows us to policy the coming traffic to the Control Plane.

319
Q

Private VLANs

A

LAN is used to connect a group of devices such as computers and printers to a server via cables, VLANs allow multiple LANs and associated devices to communicate via wireless internet.

320
Q

Disable unneeded switchports

A

Unused or “empty” ports within any network device pose a security risk, as someone might plug a cable into them and connect an unauthorised device to the network

321
Q

Enable DHCP snooping

A

snooping feature determines whether traffic sources are trusted or untrusted.

322
Q

ACL

A

Access Control List
-made up of rules that either allow access to a computer environment or deny it

323
Q

Role-based access

A

a method of restricting network access based on the roles of individual users within an enterprise

324
Q

Firewall Explicit/Implicit deny

A

Explicitly allows traffic that matches the rule to pass, and then implicitly denies everything else
disallows any traffic through the firewall that isn’t explicitly (specifically created rule) set.

325
Q
  • Wireless client isolation
A

“client isolation,” “AP isolation” and “SSID isolation,” prevents users on a Wi-Fi network from reaching other devices in the same Wi-Fi network (SSID) as well as computers and servers in the wired network

326
Q

PSK

A

Preshared keys
-secret key that has been established between the parties who are authorized to use it by means of some secure method

327
Q

EAP

A

Extensible Authentication Protocol
-used to pass the authentication information between the supplicant (the Wi-Fi workstation) and the authentication server (Microsoft IAS or other).

328
Q

Geofencing

A

allows businesses to target specific geographic areas and deliver personalized, location-based content or offers to their target audience

329
Q

Site-to-site VPN

A

allow multiple users’ traffic to flow through each VPN tunnel

330
Q

Client-to-site VPN

A

a type of VPN that connects a single device, such as a laptop or smartphone, to a remote network, such as a corporate or cloud network.

331
Q

clientless vpn

A

Users connect through a web browser and use HTTPS connections

332
Q

Split tunnel

A

sending part of your traffic through a VPN and part of it through the open network

333
Q

full tunnel

A

using your VPN for all your traffic,

334
Q

VNC

A

Virtual network computing
is a screen-sharing tool that also lets the remote computer take control.
(RDP doesn’t screen share)

335
Q

In-band management

A

used to manage devices through telnet/SSH, using the network itself as a media

336
Q

out-of-band management

A

uses terminal server that is connected to a management port of each controlled device.

337
Q

Detection methods

A

-Camera
- Motion detection
- Asset tags
- Tamper detection

338
Q

Prevention methods

A
  • Employee training
  • Access control hardware
  • Badge readers
  • Biometrics
  • Locking racks
  • Locking cabinets
  • Access control vestibule
    (previously known as a mantrap)
  • Smart lockers
339
Q

Asset disposal

A
  • Factory reset/wipe configuration
  • Sanitize devices for disposal
340
Q

1.network troubleshooting methodology

A

Identify the problem:
- Gather information
- Question users
- Identify symptoms
- Determine if anything has changed
- Duplicate the problem, if possible
- Approach multiple
problems individually

341
Q

2.network troubleshooting methodology

A

Establish a theory of probable cause:
- Question the obvious
- Consider multiple approaches
- Top-to-bottom/
bottom-to-top OSI model
- Divide and conquer

342
Q

3.network troubleshooting methodology

A

Test the theory to determine the cause:
- If the theory is confirmed, determine
the next steps to resolve the problem
- If the theory is not confirmed,
reestablish a new theory or escalate

343
Q

4.network troubleshooting methodology

A

Establish a plan of action to resolve the
problem and identify potential effects

344
Q

5.network troubleshooting methodology

A

Implement the solution or
escalate as necessary

345
Q

6.network troubleshooting methodology

A

Verify full system functionality
and, if applicable, implement
preventive measures

346
Q

7.network troubleshooting methodology

A

Document findings, actions,
outcomes, and lessons learned

347
Q

Throughput test

A

Ping, Iperf, and Wireshark

348
Q

Rollover cable

A

type of null-modem cable that is used to connect a computer terminal to a router’s console port

349
Q

Crossover cable

A

to connect two computers or similar devices directly together, such as computers or hubs

350
Q

Attenuation

A

loss of communication signal strength that is measured in decibels.

351
Q

Open

A

When an intended connection is missing

352
Q

Short

A

unintended connection exists

353
Q

Duplex Mismatch

A

causes problems when both ends of the connection attempt to transfer data at the same time

354
Q

TX/RX reverse

A

Transmit and receive reversed
-occurs when a cross over cable is used with two devices that should be using a straight through cable

355
Q

Wire Map

A

a simple test that confirms that each wire is terminated correctly, with no opens or shorts

356
Q

OTDR

A

Optical Time Domain Reflectometer
-device that tests the integrity of a fiber cable and is used for the building, certifying, maintaining, and troubleshooting fiber optic systems.

357
Q

Fusion splicers

A

the machine used to weld (fuse) two optical fibers together

358
Q

Spectrum Analyzers

A

measures and displays signal amplitude (strength) as it varies by frequency within its frequency range (spectrum)

359
Q

Fiber light meter

A

a special light meter that measures how much light is coming out of the end of the fiber optic cable

360
Q

Protocol analyzer

A

to monitor data traffic and analyze captured signals as they travel across communication channels.

361
Q

Port Scanner

A

probe a host or server to identify open ports

362
Q

iperf

A

measure throughput

363
Q

Netflow Analyzers

A

monitoring, troubleshooting, and in-depth examination, interpretation, and analysis of network traffic flow data.

364
Q

RSSI

A

Received Signal Strength Indicator
-relative received signal strength in a wireless environment, in arbitrary units

365
Q

TFTP server

A

Trivial File Transfer Protocol (UDP/69)
a simple protocol for exchanging files between two TCP/IP machines

366
Q

EIRP

A

Equivalent isotropic radiated power
-the total radiated power from a transmitter antenna times the numerical directivity of the antenna in the direction of the receiver

367
Q

Routing Table

A

data table stored in a router or a network host that lists the routes to particular network destinations, and in some cases, metrics associated with those routes.

368
Q

VLAN Assignment

A

It allows authentication, authorization, and accounting of remote users who want to access network resources
(RADIUS)

369
Q

Network Performance Baseline

A

a set of metrics used in network performance monitoring to define the normal working conditions of an enterprise network infrastructure

370
Q

Collisons

A

when two or more data packets try to occupy the same network channel at the same time.

371
Q

Multicast Flooding

A

a way to distribute routing protocols updates quickly to every node in a large network.

372
Q

Switching loops

A

when network switches are connected together in such a way that network traffic loops around infinitely instead of traversing the hops needed to travel from source to destination

373
Q

Asymmetrical routing

A

has multiple routes for incoming and outgoing network traffic.

374
Q

Routing loops

A

an issue that occurs when the routers forward packets such that the same single packet ends up back at the same router

375
Q

AAAA

A

Authentication, Authorization,
Accounting, Auditing
-maps a domain name to the IP address (Version 6) of the computer hosting the domain.

376
Q

AES

A

Advanced Encryption Standard
-an algorithm that uses the same key to encrypt and decrypt protected data

377
Q

BNC

A

British Naval Connector/Bayonet Neill-Concelman
-miniature quick connect/disconnect radio frequency connector used for coaxial cable

378
Q

CAM

A

Content Addressable Memory (table)
-system memory construct used by Ethernet switch logic which stores information such as MAC addresses available on physical ports with their associated VLAN Parameters.

379
Q

CRC

A

Cyclic Redundancy Check
a network method designed to detect errors in the data and information transmitted over the network

380
Q

CSMA/CA

A

Carrier-Sense Multiple
Access with Collision Avoidance
- reduce the frequency of these collisions and provide a plan at the same time on how to proceed if a collision does occur

381
Q

CSU

A

Channel Service Unit
-converts a digital data frame from local area network (LAN) communication technology into a frame appropriate for a wide area network (WAN) and vice versa.

382
Q

DLP

A

Data Loss Prevention
-identifies and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data

382
Q

DWDM

A

Dense Wavelength Division Multiplexing
-an optical transmission technology that uses multiple wavelengths of light to combine several data streams onto a single optical fiber.

382
Q

DSU

A

Data Service Unit
converts a digital data frame from local area network (LAN) communication technology into a frame appropriate for a wide area network (WAN) and vice versa. (CSU/DSU)

383
Q

EIA

A

Electronic Industries Association
-specializes in ensuring compatibility and interchangeability between equipment from different manufacturers.

383
Q

EUI

A

Extended Unique Identifier
a method we can use to automatically configure IPv6 host addresses

384
Q

ESP

A

encapsulating security payload
authentication mechanism authenticates only the IP datagram portion of the IP packet.

385
Q

GBIC

A

Gigabit Interface Converter
- modular transceiver that is typically used to connect a device, such as a switch or router, to a network via a fiber optic or copper cable.

386
Q

GSM

A

Global System for Mobile Communications
-European Standard

387
Q

HA

A

High Availability
-operate at a high level, continuously, without intervention, for a given time period.

387
Q

ICS

A

Industrial Control System
-combinations of control components (e.g., electrical, mechanical, hydraulic, pneumatic) that act together to achieve an industrial objective

388
Q

IGMP

A

Internet Group Management Protocol
-a protocol that allows several devices to share one IP address so they can all receive the same data

388
Q

MAC

A

Media Access Control/Medium Access Control
-layer that controls the hardware responsible for interaction with the wired or wireless transmission medium.

389
Q

mGRE

A

Multipoint Generic Routing Encapsulation
-used to connect multiple remote sites through a VPN

390
Q

MIB

A

Management Information Base
-a hierarchical database that contains configuration and other vital management information of SNMP devices in the form of data objects.

390
Q

NAS

A

Network Attached Storage
-a file-dedicated storage device that makes data continuously available for employees to collaborate effectively over a network.

391
Q

NFV

A

Network Function Virtualization
- virtual machines use a hypervisor to run networking software and processes such as routing and load balancing.

392
Q

NGFW

A

Next-Generation Firewall
-security appliance that processes network traffic and applies rules to block potentially dangerous traffic.
Newer firewall, better

393
Q

NIC

A

Network Interface Card
-a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.

394
Q

OSI

A

Open Systems Interconnection
-a framework for transmitting messages between any two entities in a network

395
Q

PAT

A

Port Address Translation
-an extension of Network Address Translation (NAT) that permits multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses.

395
Q

PTR

A

Pointer Record
-provides the domain name associated with an IP address. (DNS, opposite of “A”)

396
Q

QoS

A

Quality of Service
-control traffic and ensure the performance of critical applications with limited network capacity.

397
Q

RFC

A

Request for Comment
-contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.

398
Q

RTSP

A

Real Time Streaming Protocol
-a network protocol used for controlling the delivery of real-time multimedia data, such as audio and video, over IP networks

399
Q

SCADA

A

Supervisory Control and Data Acquisition
-used for controlling, monitoring, and analyzing industrial devices and processes

399
Q

SFP

A

Small Form-factor Pluggable
-allows devices to communicate with one another through data transmission

399
Q

SIP

A

Session Initiation Protocol
-a signaling protocol that enables the Voice Over Internet Protocol (VoIP) by defining the messages sent between endpoints and managing the actual elements of a call.

400
Q

SMB

A

Server Message Block
-enables file sharing, printer sharing, network browsing, and inter-process communication (through named pipes) over a computer network

400
Q

SSL

A

Secure Sockets Layer
-communication protocol, or set of rules, that creates a secure connection between two devices or applications on a network

400
Q

URL

A

Uniform Resource Locator
-a location or address identifying where documents can be found on the internet.

400
Q

VIP

A

Virtual IP
- IP addresses that are not tethered to particular machines.

400
Q

TKIP

A

Temporal Key Integrity Protocol
-encrypts each data packet with a unique encryption key.

400
Q

TLS

A

Transport Layer Security
-encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see what you transmit

400
Q

TX/RX

A

Transmit and Receive

401
Q

TIA/EIA

A

Telecommunications Industry
Association/Electronic Industries Alliance
-

402
Q

WDM

A

Wavelength Division Multiplexing
-increases bandwidth by allowing different data streams at different frequencies to be sent simultaneously over a single optical fiber network