Network + Flashcards

1
Q

Application Layer

A

dns, dhcp, ftp, https, ldap, ntp, pop3, ssh, sip, smtp, telnet, tftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Presentation Layer

A

jpeg, midi, mpeg, tls, ssl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session Layer

A

H323, netbios, zip, l2tp, l2f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer

A

tcp, udp, firewalls, loadbalancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Layer

A

icmp, igmp, IPsec, IPv4, IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Link Layer

A

ARP, ATM, FDDI, Frame Relay, PPP, Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical

A

Ethernet, dsl, isdn, wifi, 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit Switching

A

T1/E1/E3,T3, ISDN, POTS, PTSN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T1 Info

A

T1- 24 DSP 1.544 Mbps
More than one frame is sent at once with super frame and extended super frame
E1- 30 channels compared to 24 in T1 2.048 Mbps
T3- 672 DSP 44.7 Mbps
E3- 34.4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Point to Point

A
Point to Point Protocol- Layer 2 used
with dedicated leased lines such as T1,
E1, T3 and E3; uses control protocols
and offers multi link interface (multiple
physical connections bonded together)
error detection, authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PAP, CHAP, MSChap

A

Used in PPP Point to Point Protocol- Layer 2; used
with dedicated leased lines such as T1,
E1, T3 and E3; uses control protocols
and offers multi link interface (multiple
physical connections bonded together)
error detection, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Switching

A

SONET, ATM, DSL, FRAME RELAY, MPLS, CABLE MODEM, SATELLITE, WIRELESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MPLS

A

MPLS is used in provider networks, where forwarding decisions are made based on an MPLS label 32bit header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATM

A

53 byte cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sonet Data rates

A

OC1 51.84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 445

A

SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port 1720

A

H323

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 139

A

Netbios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IEEE Standards

A

IEEE 802.3ad link aggregation enables you to group Ethernet interfaces at the physical layer to form a single link layer interface, also known as a link aggregation group (LAG) or bundle.

IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.

  1. 1D is the IEEE MAC Bridges standard, which includes Bridging, Spanning Tree and others.
  2. 3af is the standard that defines Power over Ethernet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FF00::/8

A

multicast range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2000::/3

A

global range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FC00::/7

A

unique local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FE80::/10

A

APIPA addressing; link local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

568 B

A

OW O; GW B; BW G; BW B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Syslog Severity

A

Even Awesome Cisco Engineers Will Need Ice Cream Daily
Emergency- most severe
Alert- immediate attention
Critical- less severe but needs addressing to prevent interruption of service
Errors-conditions that do not make system unusable
Warnings- notification operations failed to complete
Notifications- state changes
Information- info about normal operation of system
Debug- troubleshooting

26
Q

IP Sec Phase 1

A

Phase 1 - A bidirectional ISAKMP SA is established between peers to provide a secure management channel (IKE in main or agressive mode) Phase 2 - Two unidirectional IPsec SAS are established for data transfer using separate keys (IKE quick mode)

27
Q

2 IPSec modes

A

2 IP sec modes- transport and tunnel;

transport used for client to site or local; IP header not authenticated

tunnel site to site- entire packet is encrypted

Authentication Headers (AH) provides connectionless data authentication for IP datagrams and provides protection against replay attacks

Encapsulating Security Payloads (ESP) provides confidentiality, connectionless data integrity, data-origin authentication, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality. It encrypts.

Internet Security Association and Key Management Protocol (ISAKMP) provides a framework for authentication and key exchange,

28
Q

Main Mode vs Quick Mode

A

Make sure you know that Main mode uses a three-stage negation process
stage one is the negotiation of the security suites to be used,
stage two is referred to as the Diffie-Hellman key exchange
stage three is the authentication stage between the clients using the chosen authentication method.
An important fact to remember is that the strength of the Main mode connection will then dictate the strength of the quick mode negotiations within it once the connection is established.

Aggressive- achieves results of main using only 3 packets

The Quick mode phase of the connection is used to conduct the actual transfer of data, creating a separate security association (SA) from within the Main mode connection.

29
Q

AH vs ESP header

A

AH - authentication only; ESP- data confidentiality and authentication

30
Q

Layer 3 redundancy

A

HSRP- cisco; active and standby
GLBP- gateway load balancing protocol- cisco
VRRP= Virtual Router Redundancy Protocol-open standard of HSRP
LACP- multiple links between devices; appear as a logical link
Content engine- caching functions
Content Switches- load balancers

31
Q

Admin distance

A
Stat- 1
EIGRP-90
OSPF-110
RIP-120
EXTERNAL EIGRP- 170
32
Q

Three 5.0 Ghz standards in wireless

A

802.11 a and 802.11n and 802.11 ac

33
Q

Four 2.4 Ghz standards in wireless

A

802.11, 802.11b, 802.11g, 802.11n

34
Q

Only DSSS transmission standards in wireless

A

802.11 B and 802.11 G

35
Q

70 m indoors wireless

A

802.11 ac and 802.11n

36
Q

Bandwidth of 54 mbps

A

802.11 a, 802.11g

37
Q

Bandwidth of 11 mbps wireless

A

802.11b

38
Q

Bandwidth of >300 mbps

A

802.11n

39
Q

Bandwidth of >3 Gps with MU-MIMO

A

802.11ac

40
Q

10 base T media and bandwidth

A

Cat 3, 10 Mbps

41
Q

100 base TX media and bandwidth

A

Cat 5 or higher, 100 mbps

42
Q

1000 base TX media and bandwidth

A

Cat 6 or higher 1 gbps

43
Q

1000 base SX media and bandwidth and distance

A

MMF, 220M, 1 gbps

44
Q

1000 base LX media and bandwidth and distance

A

MMF- 550; SMF- 5km, 1 gbps

45
Q

1000 base ZX media and bandwidth and distance

A

SMF, 70 km

46
Q

Certificate based mutual authentication of client and the network; relies on client side and server side certificates to provide authentication; certificates must be managed on both client and server (drawback). purely on PKI certificates. This means that each supplicant must have its own certificate installed.

A

eap - tls

47
Q

extension of esp-tls that provides for certificate based mutual authentication through an encrypted tunnel. only requires server side certificates; The peer can use other authentication methods such as Challenge-Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), and Microsoft CHAP (MS-CHAP) v2. This type can encapsulate non EAP authentications E.g. PPP & CHAP. It also doesn’t require every supplicant to have its own certificate installed.

A

eap-ttls

48
Q

Flexible Authentication via Secure Tunneling
Designed by Cisco to replace LEAP
Three parts
In band provisioning via Diffie-Hellman.
The client is provided with a shared secret.
Tunnel establishment. A tunnel is
established between the server and the
client. EAP-FAST authenticates by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically.

A

eap-fast

49
Q

Protected Extensible Authentication Protocol
Originally, EAP assumed that communications would
be secure; therefore, it did not provide a mechanism to
secure the data being transmitted.
This protocol corrects this by providing a secure TLS tunnel
A server-side certificate is used to create a PKI tunnel

A

PEAP

50
Q

the maximum amount of time a client is forced to renew dhcp address from existing dhcp server

A

7/8 or 87.5

51
Q

period of time a client can claim an IP address provided by dhcp

A

lease period

52
Q

address that replaces the broadcast ipv4 and allows for machines to contact all machines with a specific service to offer such as a router or dns server

A

anycast address

53
Q

protocol that handles the built-in security that ipv6 incorporates to encrypt packet data

A

ipsec

54
Q

address assigned manually to ensure that an address stays on a private network and is not routed

A

unique local

55
Q

similar to APIPA; address that is unicast that computer gives itself

A

link local

56
Q

single address on a single interface forming a direct line of communication

A

unicast address

57
Q

routable address used to setup a host to host link on public internet

A

global unicast

58
Q

address used to receive data intended for many destinations simultaneously

A

multicast address

59
Q

periodic message sent to a network providing info about the network address and other network paramaters

A

router advertisement

60
Q

learning data link layer addresses for ipv6 machines located in the same physical or broadcast domain

A

neighbor discovery

61
Q

host generated message to force an IPv6 gateway device to advertise its network capabilities

A

router solicitation