Network+ Concepts Flashcards

1
Q

TCP/IP Model

A
aka TCP/IP stack or the DoD model.  
It is an alternative to the OSI Model.
4 layers vs 7 layers to OSI model
-Application
-Transport
-Internet
-Network Interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI Model

A

aka OSI stack. Open Systems Interconnection Model is a framework used to describe the functions of a networking system. There are 7 layers.
Please Do Not Throw Sausage Pizza Away

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Physical Layer

A

OSI model Layer 1 - Electrically or optically transmitting raw unstructured data bits across the network. “physical” resources
Examples of Layer 1:
-Cable (Ethernet, fiber optic)
-Radio frequencies (Wi-Fi, Bluetooth)
-Infrastructure devices (network hubs, Wireless Access Points, Media converters) [devices that work at the bit layer; whatever comes in, goes out; simple dumb devices].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Link Layer

A

OSI model Layer 2
Layer 2 devices view networks logically.
data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer.

Data link layer has two sub-layers:

  • media access control (MAC), provides flow control and multiplexing for device transmissions over a network.
  • logical link control (LLC), provides flow and error control over the physical medium

Examples at Layer 2:

  • Network Interface Cards (NIC)
  • Bridges
  • Switches
  • MAC addresses
  • –They are smarter devices that can use logic to send specific information to specific devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Layer

A
OSI model Layer 3
Forwards traffic (routing) using logical addresses (e.g. IPv4 or IPv6)
-Logical addressing
-Switching (i.e. routing; not switches as in Layer 2)
-Route discovery and selection
-Connection services
-Bandwidth usage
-Multiplexing strategy

Alt Summary
Receiving frames from the data link layer, and delivering them to their intended destination based on the addresses contained inside the frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Transport Layer

A

Layer 4 - This layer is the same in the OSI model and TCP/IP stack.
The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts.
Examples of the transport layer is TCP or the Transmission Control Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session Layer

A

OSI model Layer 5
The session layer controls the conversations between different computers. A session or connection between machines is set up, managed, and termined at layer 5. Session layer services also include authentication and reconnections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Presentation Layer

A

OSI model, Layer 6
Responsible for formatting the data exchanged and securing that data with proper encryption so it can be presented.
Think data formatting and encryption at Layer 6.
Examples of Layer 6 are:
-scripting languages [because they’re formatting data] (ex. HTML, XML, PHP, JavaScript, etc
-Standard text (ASCII, EBCDIC, UNICODE) [ways of displaying the 1s and 0s]
-Pictures (GIF, JPG, TIF, SVG, PNG, etc)
-Video files (MP4, MPG, MOV, etc)
-Encryption (TLS and SSL)

The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application Layer (OSI)

A
OSI model Layer 7
Provides application-level services and is where the users communicate with the computer.
Application here=file transfer or network transfer, not IE or Word
Examples at Layer 7:
-Email (POP3, IMAP, SMTP)
-Web browsing (HTTP, HTTPS)
-Domain Name Service
-File Transfer Protocol (FTP, FTPS)
-Remote Access (Telnet, SSH)
-Simple Network Management Protocol

At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partners, resource availability, and synchronizes communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application Layer (TCP/IP)

A

DoD model Application layer includes layers 5,6,7 of the OSI model (Session, Presentation, Application). Defines TCP/IP applications protocols and how programs interface with the transport layer service. This is the layer the end-user interacts with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transport layer

A

Transport layer is the same in OSI and TCP/IP. Provides communications session management between hosts and defines level of service and status of connection used for transport. TCP, UDP, RTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet layer

A

Same as the Network layer of the OSI model. Packages data into IP datagrams and routes these IP datagrams between hosts across the network. Contains source and destination IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Interface layer

A

Combines the Physical and Data Link layers from the OSI model. Concerned with physical and electrical characteristics. It describes how to transmit bits across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data on the Application, Presentation, Session layers (Layers 5,6,7) is called….

A

data (OSI model).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data on the Transport layer (Layer 4) is called….

A

segments (OSI models).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data on the Network layer (Layer 3) is called….

A

packets (OSI model).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Data on the Data Link layer (Layer 2) is called….

A

Frames (OSI model).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data on the Physical layer (Layer 1) is called….

A

Bits (OSI model).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Do Some People Fear Birthdays? (mnemonic)

A

Data, Segments, Packets, Frames, Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a session (Layer 5)?

A

A session is like a convo that must be kept separate from others to prevent intermingling of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What happens when setting up a session?

A

Check user credentials and assign a number to the session and determine who begins sending data. [Classroom example]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What happens when maintaining a session?

A

Transfer of data across the network, reestablish a session if it gets disconnected, and acknowledging data received. [Classroom example]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What happens when tearing down a session?

A

Ending a session due to mutual agreement (after the data transfer is done) or one party disconnects. [Classroom example]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What devices or protocols are used at Layer 5?

A

H.323 or H.264 (used to set-up, maintain and tear down voice and video connections) which operate over RTP [real time protocol] AND

NetBIOS is used to share files over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RTP

A

Real Time Protocol is used for streaming audio and video usually in a two-way format (like an audio or video call)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data Formatting

A

Data is formatted by the computer to have compatibility between different devices.
ASCII (ex. A = 65) text based language to ensure data is readable
GIF
JPG
PNG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Encryption

A

Scrambles the data in transit to keep it secure and confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Application Services

A

Unite communicating components from more than one network application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Service Advertisement

A

When applications send out announcements to other devices on the network to state the services they offer:
such as a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Media Access Control (MAC)

A

Physical addressing system that uses a 48-bit address assigned to a network interface card (NIC) by manufactures.
Each character is 4 bits. The first 6 digits of the code indicates the manufacturer, the second half identifies the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Logical Link Control (LLC)

A

Provides connection services and allows acknowledgement of receipt of messages.
LLC is a basic form of flow control and basic error control funcions using a check sum. If the last bit is odd, the sum of the digits should be odd; if the last bit is even, the sum should be even.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Isochronous mode (Layer 2)

A

Network devices use a common reference clock source and create time slots for transmission with less overhead than synchronous or asynchronous methods, because both devices know when they can communicate and for how long.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Synchronous (Layer 2)

A

Network devices agree on clocking method to indicate beginning and end of frames and can used control characters or separate timing channels.
There isn’t much gap time so that’s a draw back of synchronous mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Asynchronous (Layer 2)

A

Network devices reference their own internal clocks and use start/stop bits.
The drawback is there’s no control of when the the devices are allowed to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Logical addressing

A

In the Network Layer (Layer 3), routing traffic to devices using IPv4, IPv6 and other logical addresses
Old examples are Apple Talk or IPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IPv4 Address

A

4 sets of numbers, separated by dots
Dotted octet notation
1 byte = 8 bits
32 bits or 4 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Packet Switching

A

aka routing, where data is divided into packets and forwarded based on its IP address.
Packets can take a different route, as long as they make it to the correct destination.
-Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Circuit Switching

A

Dedicated communication link is established between two devices.
-Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Message Switching

A

Data is divided into messages, similar to packet switching, except these messages may be stored THEN forwarded
-Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

ICMP

A

Internet Control Message Protocol is used to send error messages and operation information about an IP destination.
-Common example are ping and trace route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Trace route

A

Example of ICMP which traces the route a packet takes through the network and tells you each router along the way, so you can see which routes were up and down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What devices and protocols do you find on Layer 3?

A

The Network Layer

  • Routers
  • Multilayer switches (a router and a switch combined)
    • -Switches are Layer 2 UNLESS it’s multilayer switch
  • IPv4 protocol
  • IPv6 protocol
  • Internet Control Message Protocol (ICMP; port 1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Coax

A

Coaxial Cable, oldest form of copper wire. The centre core transmits the data. Braided metallic shield protects against data loss and EMI.
Two flavors: RG-6 (thicker) & RG-59 (thinner)
Two connectors: BNC (push and twist) & F-type (screws on to the jack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Twisted Pair Cable

A

Copper; most popular physical LAN media type.
4 pairs of two wires each.
Each pair is twisted.
More twists = more EMI connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

UTP

A

Unshielded Twisted Pair copper cable. Cheaper because there is no shield.
Bends easily, easy to work with.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

STP

A

Shielded Twisted Pair copper cable. Same as UTP but with shielding.
Shielding helps minimize EMI.
More expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

RJ45

A

1 of 3 connectors for twisted pair copper cable.
Most common. 8 pins on the connector.
Ethernet only uses 4 pins.
Other 4 pins can be used for other stuff (ex. power over ethernet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

RJ11

A

6 pin connector, standard phone line.

Usually 2 or 4 pins are used. One for the ring, one for the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

DB9 or DB25

A

Used for RS232 cables (aka Serial cables)
Ex DB9 = 9pin D-subminiature connector
Remember:
Serial connector, RS232, used for external modems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Maximum throughput for Cat 3

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Maximum throughput for Cat 5

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Maximum throughput for Cat 5e

A

1000 Mbps (aka 1 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Maximum throughput for Cat 6

A

1000 Mbps (aka 1 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Maximum throughput for Cat 6a

A

10000 Mbps (aka 10 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Maximum throughput for Cat 7

A

10000 Mbps (aka 10 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the maximum distance of Cat 3 - Cat 7 cable?

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Straight-Through Patch Cable

A

Both ends of the cable have matching pin outs (T568B cable)
These connect DTE (Data Terminating Equipment) [eg laptops and desktops] to DCE (Data Communications Equipment) [e.g. switches, modems]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

T568B pin / wire order

A
Used on Patch cables
1 - white / orange (Tx+)
2 - orange (Tx-)
3 - white / green (Rx+)
4 - blue
5 - white / blue
6 - green (Rx-)
7 - white / brown
8 - brown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DTE

A

Data Terminating Equipment, such as laptops & routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

DCE

A

DCE (Data Communications Equipment) [e.g. switches, modems]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Crossover Cable

A

‘Send’ and ‘receive’ pins of the cable are swapped in the end pin outs.
Used for connecting two of the same kind of device (e.g. DTE to DTE, or DCE to DCE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

T568A pin / wire order

A
Used on Crossover cables
1 - white / green (Rx+)
2 - green (Rx-)
3 - white / orange (Tx+)
4 - blue
5 - white / blue
6 - orange (Tx-)
7 - white / brown
8 - brown
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

MDIX

A

An automated way modern switches can electronically simulate the right kind of cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Plenum Cable

A

Special UTP/STP cable that has a fire retardant outer insulator.
Plenum is for things you cannot see (in the wall, in the ceiling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Non-plenum Cable

A

PVC - Normal UTP/STP rated cable;

You can ONLY use this where you can SEE the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Fiber Optic Cable

A

Uses light from an LED or laser to transmit information through a glass fiber
Pros:
-No EMI
-It can go really far (no 100 meter limit like Cat 3-7)
-Greater data-carrying capacity (measured in Tbps)

Cons:

  • very expensive
  • hard to work with
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

MMF

A

Multimode Fiber is used for shorter distances than single-mode fiber.
MMF has a larger core size which allows for multiple modes of travel for the light signal.
Normally used for patch cable uses: router to switch, switch to server, usually less than 1 kilometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

SMF

A

Single mode fibers are sending light in one direction for miles and miles; long distance only.
Small core size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Fiber Optic Connectors

A

4 types:

  • Subscriber Connecter (SC)
  • Straight Tip Connector (ST)
  • Lucent Connector (LC)
  • Mechanical Transfer Registered Jack (MTRJ)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Subscriber Connecter (SC)

A

Fiber optic connector
Remember: Stick and click
Usually uses an APC (Angled Physical Contact; 45 degree angle) connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Straight Tip Connector (ST)

A

Fiber optic connector

Remember: Stick and twist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Lucent Connector (LC)

A

Fiber optic connector

Remember: Love connector (because there’s two side by side)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Mechanical Transfer Registered Jack (MTRJ)

A

Fiber optic connector
Remember: very small. usually used for routers. takes up less space; half the size of the others
Usually uses a UPC (Ultra Physical Contact; mostly flat) connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What are the advantages of fiber optic cable?

A
  • Higher bandwidth
  • Covers longer distances
  • immune to EMI
  • better security (harder to tap into)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What are the advantages of copper cable?

A
  • Less expensive
  • Easier to install
  • tools are cheap
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is a Media Converter?

A

It convert media from one format to another (light to electricity / electricity to light) (fiber to coax, copper to wireless, fiber to copper, etc); any Layer 1 to Layer 1
-Layer 1 device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is a transceiver?

A

Devices that can send and receive data. They can be bidirectional or duplex.
Example: GBIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What does bidirectional communication mean?

A

aka: half duplex
devices take turns communicating (like a walkie-talkie; a person can send or receive, but not both)
You can only use half the bandwidth all the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is duplex communication?

A

aka: full duplex
Device are able to communicate at the same time.
ex. a phone call (not like a walkie talkie)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

GBIC

A

Standard, hot-pluggable gigabit Ethernet transceiver.
It can take in copper or fiber as its connector, then transmit that information into the network

It is in routers and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

SFP

A

Small Form-factor Pluggable (aka mini-GBIC; because it’s about half the size) is a compact, hot-pluggable optical module (so it can be used for fiber)
This transceiver that can support 4.25 Gbps
It does the same thing as a GBIC.
It can be pulled in or out of the device without turning off the router or switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

SFP+

A

Enhanced SFP
Compact, hot-pluggable optical module (so it can be used for fiber) transceiver
It supports up to 16 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

QSFP

A

Quad Small Form-Factor Pluggable
Compact, hot-pluggable optical module (so it can be used for fiber) transceiver
It supports up to 100 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Cable Distribution System

A

Uses an organized system that is hierarchical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Punch Down Blocks

A

located in either the main distribution frame or the intermediate distribution frame (IDF)

  • 66 block was used for phones and older Cat 3 networks. The proximity of the cables caused crosstalk and is a bad choice for higher speed (Cat 5) LAN networks
  • 110 Block is used for higher-speed networks. Requires Cat 5 or above cabling (less crosstalk because there is more space)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Patch Panels (Copper)

A

Devices with easy-to-use jacks on the front to connect wiring from the jack to a network switch in a flexible manner.
Patch panels are very inexpensive. It’s disposable so if you’re going to un/re-plugging lots of times, it better to use a patch panel than the switch because the switch is very expensive (you could damage it)
-Back of the panel has punch downs like a 110-block
-Front has RJ-45 jacks
-You plug from port 1 on the switch to port 1 on the patch panel.
–To move a connection, you unplug from the patch panel and move it to a different port on the patch panel; don’t unplug from the switch (to lower risk of damaging the ports on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Patch Panels (Fiber)

A

Connect fiber jacks throughout building to a single patch panel in network closet

  • There are no punch down blocks
  • They use LC, ST, and SC connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Toner probe

A

aka Fox and hound

used to find which port is tied to the patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

BNC

A

Connector for coax (Bayonet Nut Coupling) A commonly used plug and socket for video and networking applications that provides a tight connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Origins of Ethernet

A

Originally run over

  • coaxial cables (10Base5, 10Base2)
  • vampire taps
  • Ethernet changed to copper twisted pair (UTP, STP)
    • -10Base-T (10 mbps max speed, T=twisted pair); these were CAT-3 networks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Deterministic

A

Very organized and orderly.

Requires and electronic token to transmit (e.g. Token Ring networks) – Classroom example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Contention-based

A

Very chaotic and you can transmit whenever you want (e.g. ethernet networks) – Pub example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

CSMA/CD

A

Carrier Sense Multiple Access / Collision Detection:
Ethernet devices transmit based on a principle called CSMA/CD to deal with the problems in Contention-based method.
Carrier sense=listen for a spot; listen to the wire, start talking if it’s not busy
Multiple Access=(start talking)Everyone has access to the wire and can start talking whenever they want
Collision detect=detect an error, wait a short, then transmit again. Each sending source chooses a random time to wait before retransmitting (ex. 120 ms backoff) or 30ms backoff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Collision Domains

A

Comprised of all the devices on a shared Ethernet segment (everything on the same cable or hub)

  • -Devices operate at half-duplex when connected to a hub.
  • -Devices must listen before they transmit to avoid collisions when operating as CSMA/CD
  • -Making collision domains smaller reduces collisions and more efficient (pub example; 20 group at one table vs 5 tables of four people)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Collision Domains with Switches

A

Ethernet switches increase scalability of the network by creating multiple collision domains (each plug on a switch is a collision domain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

BGP

A

Border Gateway Protocol (BGP) refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS). … BGP makes peering possible. Without it, networks would not be able to send and receive information with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

10BASE-T

A

Cat3, 10 mbps
10=10mbps
T=twisted pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

100BASE-TX

A

Cat 5 or higher, 100 mbps

TX=fast internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

1000BASE-TX

A

Cat 6 or higher, 1 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

1000BASE-SX

A

MMF (multi-mode) fiber, 1 Gbps, 220 meters max

“S” is not single (aka single-mode fiber)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

1000BASE-LX

A

MMF, 1 Gbps, 500 meters max

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

1000BASE-LX

A

SMF, 1 Gbps, 5km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

1000BASE-ZX

A

SMF, 1 Gbps, 70km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Hub

A

Layer 1 devices used to connect multiple network devices/workstations. aka multiport repeaters

Not used often in modern networks; switches are mostly used instead.

On a chart=square icon with an arrow pointing in both directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Passive hub

A

Repeats signal with no amplification (like a spliter).
A passive hub is part of the 100m distance limitation.
Layer 1 devices used to connect multiple network devices/workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Active hub

A

Repeats signal with amplification; it boosts the signal and restarts the 100m distance limit.
Layer 1 devices used to connect multiple network devices/workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Smart hub

A

Active hub with enhance features like SNMP, so you can configure and manage that hub from a distance.
Layer 1 devices used to connect multiple network devices/workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Collision Domains

A

Hubs (Layer 1) are used to connect multiple network segments together and each LAN segment becomes a separate collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Bridge

A

Bridges analyze source MAC addresses and populate an internal MAC address table.
They make intelligent forwarding decisions based on destination MAC address in the frames.
Creates a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Switch

A

Layer 2 device used to connect multiple network segments together. They use MAC addresses
Each port on a switch is its own collision domain.
Switches are a hub+bridge aka multiport bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

ARP packet

A

ARP broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address. When a machine recognizes the IP address as its own, it sends a reply so ARP can update the cache for future reference and proceed with the communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Router

A

Layer 3 device used to connect multiple networks together. They use IPV4 and IPV6.
Routers make forwarding decisions based on logical network address information.
Routers are usually more feature rick and support a broader range of interface types than multilayer switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Layer 3 Switch

A

Layer 3 device used to connect multiple network segments together. It can make Layer 3 routing decisions and interconnect entire networks (like a router), not just network segments (like a switch).
Basically a switch+router
Each port is it’s own broadcast domain and collision domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is the effective range of HDMI cable?

A

Only about 20 ft. You need to use a media converter for longer distances so you can convert to ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What is Link Aggregation?

A

802.3ad
Allows for combination of multiple physical connections into a single logical connection.
With this, bandwidth available is increased and the congestion is minimized or prevented.
If the switch only has a 100 mbps connection, it could combine 4 ports for a virtual 400mbps connection.
If you have a 24 port switch, you should be safe to use 4 ports for Link Aggregation.
This is an ethernet switch feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

PoE

A

Power over Ethernet
-PoE 802.3af (provides up to 15.4 watts)
-PoE+ 802.3at (provides up to 25.5 watts)
Supplies electrical power over Ethernet and requires Cat5 or higher copper cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

PSE

A

Power Sourcing Equipment provides power to other devices.

Pins 1, 2, 3, and 6 provide power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

PD

A

Powered Devices such as VoIP phone or WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Port Monitoring or Mirroring

A

Helpful to analyze packet flow over a network as it makes a copy of all traffic destined for a port and sends it to another port.
You mirror a port to another port then your network analyzing machine (ex. Wireshark) can listen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

User Authentication

A

802.1x
For security purposes, switches can require users to authenticate themselves before gaining access to the network.
Once authenticated, a key is generated and shared between the supplicant (device wanting access) and the switch (authenticator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

What are the three methods for switch management and authentication?

A

1) SSH (port 22) can be used for remote management of the switch over the network
2) Console port is for local (in-person) administration of the switch. Use a rollover cable (DB-9 to RJ-45).
3) OOB (out-of-band) management. All network configuration devices on a separate network. This management network is only for admins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

First-Hop Redundancy

A

Hot Standby Router Protocol (HSRP) uses virtual IP and virtual MAC addresses to provide an “active router” and a “standby router”.
The PC only sees the virtual router, and the virtual router sends the traffic to the available router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

HSRP

A

Hot Standby Router Protocol (HSRP) is a Cisco-proprietary protocol.
It uses virtual IP and virtual MAC addresses to provide an “active router” and a “standby router”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

What are First-Hop Redundancy protocols?

A
  • HSRP (Hot Standby Router Protocol) is a Cisco-proprietary protocol – this is the most popular.
  • GLBP (Gateway Load Balancing Protocol), Cisco-proprietary.
  • VRRP (Virtual Router Redundancy Protocol) which is an open-source protocol.
  • CARP (Common Address Redundancy Protocol) which is an open-source protocol.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

MAC Filtering

A

Permits or denies traffic based on a device’s MAC address to improve security.
-Layer 2 blocking (because it’s uses MAC addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Traffic Filtering

A

Multilayer switch may permit or deny traffic based on IP addresses or applications ports.

  • Layer 3 blocking is IP addresses
  • Layer 4 blocking is Ports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

QoS

A
Quality of Service
Forwards traffic based on priority markings
Example:
-Phone/voice traffic has a high priority
-PCs using TCP are lower priority
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

STP

A

Spanning Tree Protocol (802.1D)

  • Permits redundant links between switches
  • prevents looping of network traffic
  • Uses Root Bridges and non-root bridges
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

How much down time a year do you get with the five 9s?

A

99.999% uptime = 5 min of downtime a year

Redundancy means you maintain uptime even if one device goes down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

SPB

A

Shortest Path Bridging

Used instead of STP (802.1D) for larger network environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What happens if STP is not used?

A

MAC address table corruption can occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Broadcast Storms

A

If broadcast frame is received by both switches, they can forward frame to each other. Multiple copies of the frame are forwarded, replicated, and forwarded again until the network is consumed with the forwarding many copies of the same initial frame.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Root Bridge

A

A switch is elected to act as a reference point for a spanning tree.
The Switch with the lowest bridge ID (BID) is elected as the root bridge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

BID

A

Bridge ID is made up of a priority value and a MAC address (with the lowest value considered root).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Root Port

A

Every non-root bridge has a single root port.
This is the port closest to the root bridge in terms of cost.
If costs are equal, the lowest port number is chosen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Link Costs

A

Associated with the speed of the link.
-the lower the link’s speed, the higher the cost
Faster cables have a lower cost.
Slower cables have a higher cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Designated Port

A

Every network segment has at least one designated port.
This is the port closest to the root bridge in terms of cost.
All ports on the root bridge are designated ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Non-Designated Port

A

Ports that block traffic to create a loop-free topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Ports involved in STP can go through different states:

A
  • Non-designated ports do not forward traffic during normal operation BUT they doe receive bridge protocol data units (BPDUs)
  • -If a link in the topology goes down, the non-designated port detects the failure and determines whether it needs to transition to a forwarding state
    • -Blocking - BPDUs are received but not forwarded; used in the beginning and on redundant links
    • -Listening - Populates MAC address table; does not forward frames
    • -Learning - Processes BPDUs; the switch determines its role in the spanning tree
    • -Forwarding - if the port decides it needs to become a designated port or a root port, it will start forwarding the frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

VLAN

A

Virtual Local Area Network

Allows different logical networks to share the same physical hardware and provides added security and efficiency

141
Q

VLAN Trunking

A
  1. 1q
    - Multiple VLANs transmitted over the same physical cable.
    - VLANS are each tagged with a 4-byte identifier
    - Tag Protocol Identifier (TPI)
    - Tag Control Identifier (TCI)
142
Q

VPN Concentrator

A

One of the devices that can terminate VPN tunnels, although firewalls can also perform this function

143
Q

Stateful Firewalls

A

Allows traffic that originates from inside the network and goes out to the internet AND
It blocks traffic originating from the internet from getting into the network

144
Q

NGFW

A

Next-Generation Firewall conducts deep packet inspection at Layer 7. It detects and prevents attacks and is much more powerful than a basic stateless or stateful firewalls.
It continually connects o cloud resources for latest information on threats

145
Q

At what level of the OSI model do basic firewalls work?

A

basic stateless or stateful firewalls work at the Network Layer or the Transfer Layer.
NGFW work at the Application Layer

146
Q

IDS / IPS

A

Intrusion Detection or Prevention Systems
IDS recognizes attacks through signatures and anomalies
IPS recognizes and responds to threats.
These are host or network based devices.

147
Q

DNS

A

Domain Name System converts domain names to IP addresses (like the contact list on a smartphone)

148
Q

FQDN

A

Domain name under a Top-Level Domain and represents a web server, mail server, or file server

  • service (www/ftp/mail).domain name.top level domain
  • www.diontraining.com
  • ftp.arris.com
149
Q

URL

A

Uniform Resource Locator

  • -https://www.diontraining.com
  • -http://ftp.wingnut.edu
150
Q

A record

A

DNS Address record maps hostname to IPv4 address

151
Q

AAAA record

A

DNS Address record maps hostname to IPv6 address

152
Q

CNAME

A

DNS Cononical name is an alias for existing record;

-diontraining.com = www.diontraining.com

153
Q

MX

A

DNS Mail exchange record maps domain name to email server

154
Q

NS

A

DNS, Name Server – it denotes the authoritative name server for the domain

155
Q

PTR

A

DNS, Pointer record refers to canonical name; used for reverse DNS lookups

156
Q

SOA

A

DNS, Start of Authority provides authoritative info about DNS zone; contact information, primary name server, refresh times

157
Q

SRV

A

DNS, Generalized service location record; newer protocol that doesn’t require specific protocols records like MX, CNAME, etc.

158
Q

TXT

A

DNS, designed to hold human readable code originally; used now to hold machine readable data like DomainKeys Identified Email (DKIM), Sender Policy Framework (SPF), and opportunistic encryption

159
Q

DHCP

A

Dynamic Host Configuration Protocol automates process so the majority of devices on a network automatically receive IP addresses, subnet masks, default gateways, and DNS server addresses

160
Q

What are the four steps of DHCP to a new device?

A

DORA

  1. Discover
  2. Offer
  3. Request - Device requests to take the offered IP address
  4. Acknowledge - DHCP acknowledgement
161
Q

Proxy Server

A

Device that makes a request to external network on behalf of a client.
It is used for security to perform content filtering and logging.
This middleman is added protection
the proxy server can also keep a local copy

162
Q

Content Engine

A

aka Caching Engines
These dedicated appliances that perform the caching functions of a proxy server.
They are much more efficient that a proxy server.
–Branch office example; HQ doesn’t need one

163
Q

Content Switches

A

aka Load Balancer
Distributes incoming request across the various servers in the server farm.
Content switch distributes requests to the various servers based on workload.

164
Q

What is a native VLAN?

A

One of the VLANs that is untagged. All other VLANs are tagged with a 4 byte tag (Tag Protocol Identifier/Tag Control Identifier).

165
Q

What are the advantages of using virtual servers?

A
  1. Considerable cost savings for an IT budget
  2. Allows physical servers to be consolidated, which also saves on power and cooling costs too
  3. Multiple NICs increase bandwidth available
166
Q

What is a hypervisor?

A

A specialized software that enables virtualization to occur.
It emulates the physical hardware.
aka - VMM, virtual machine monitor.
–VMWare’s ESXi is freeware
–Virtual Box is also freeware
–Microsoft has Hyper-V
–VMWare’s Workstation (desktop environment)

167
Q

Hypervisor - Type 1

A

Bare-metal hypervisor. The hypervisor is the O/S

168
Q

What are Virtual Storage Solutions?

A

NAS (network attached storage) and SAN (storage area network)

169
Q

NAS

A

Network attached Storage is disk storage delivered as a service over TCP/IP

170
Q

SAN

A

Storage Area Network is a specialize LAN designed for data transfer / storage.
It transfers data at block level with special protocol (instead of TCP/IP).
–Use fiber for faster speed

171
Q

FC

A

Fibre Channel is special purpose hardware providing 1-16 Gbps
-aka FCoE (fibre channel over ethernet) or iscsi

172
Q

FCoE

A

Fibre Channel over Ethernet removes the need for specialized hardware and runs over Ethernet networks.

173
Q

iSCSI

A

(IP Small Computer System Interface)
Lowers cost and is built using Ethernet switches (<10 Gbps).
It relies on configuration allowing jumbo frames over the network
–Not good for large networks that need fast, high quality storage

174
Q

Infiniband

A

Virtualized Storage; switched fabric topology for high-performance computing which comes with very high throughput (>600 Gbps) and very low latency (half a microsecond)

175
Q

Virtual desktops are NOT good for

A

…gaming, video editing, etc. (i.e. low performance requirements).
VDIs are good for low performance applications and they lower the Total Cost of Ownership (TCO).

176
Q

SDN

A

Software Defined Networking.

Provides the admin with and easy-to-use front end to configure physical and virtual devices throughout the network

177
Q

Private Cloud

A

Systems and users only have access with other devices inside the same private cloud or system. Most secure.

178
Q

NaaS

A

Network as a Service (think virtual routers, virtual switches and virtual firewalls)
Outsourcing a network to a service provider; it is hosted off-site at the service provider’s data center and the customer is billed for usage.

179
Q

IaaS

A

Infrastructure as a Service (think virtual servers and desktops, VDI)
Allows outsourcing of the infrastructure of the servers or desktops to a service provider where it is hosted off-site at the service provider’s data center and the customer is billed for usage.

180
Q

SaaS

A

Software as a Service

User interacts with a web-based application for a monthly fee

181
Q

PaaS

A

Platform as a Service

provides a development platform for companies that are developing applications without the need for infrastructure.

182
Q

What is the standard for wireless networking?

A

IEEE 802.11

183
Q

Infrastructure Mode for wireless devices

A

Wireless devices communicate with other wireless or wired devices though a wireless router or access point.

The alternative is Ad Hoc mode, where devices connect directly to each other (peer-to-peer)

184
Q

What is an other name for wireless Ad Hoc mode?

A

IBSS (Independent Basic Service Set)

It contains only clients or devices, with no APs (Ad Hoc WLAN).

185
Q

BSS

A

Basic Service Set

Only one AP connect to the network (ex. small office home office SOHO)

186
Q

ESS

A

Extended Service Set

Contains multiple APs to provide coverage (ex. a college campus)

187
Q

AP Placement

A

Need overlap to prevent holes

BUT should not use overlapping frequencies

188
Q

How much coverage overlap should 2.4 GHz AP placement have?

A

10-15%

189
Q

What should you avoid with 5 GHz AP placement?

A

The same channels should be separated by at least two cells instead of one.

190
Q

What is a site survey?

A

A wireless survey used to determine coverage areas. They produce a heat map with coverage.

191
Q

Types of wireless antennas

A

Omnidirectional
Unidirectional (ex. right, left, yagi antenna)
Parabolic (satellite dish)

192
Q

What is a yagi antenna used for?

A

Puts out power over a longer distance, usually to connect one building to another

193
Q

What are the three types of Spread Spectrum Wireless Transmissions?

A

1) Direct-Sequence Spread Spectrum (DSSS) – Commonly used today
2) Orthogonal Frequency-Division Multiplexing (OFDM) – Commonly used today
3) Frequency-Hopping Spread Spectrum (FHSS) – not used much in commercial applications

194
Q

DSSS

A

Direct-Sequence Spread Spectrum
Modulates data over an entire range of frequencies using a series of signals known as chips.
Cons:
–They are more susceptible to environmental interference and use entire frequency spectrum to transmit
–Have slower bandwidth
–Popular on 2.4 GHz
–Used on wireless B, G, N

195
Q

FHSS

A

Frequency-Hopping Spread Spectrum is not used much in commercial applications

  • -Frequency-hopping is used as a security measure like the military
  • -It wastes bandwidth when we’re not communicating on that frequency.
196
Q

OFDM

A

Orthogonal Frequency-Division Multiplexing
Uses slow modulation rate with simultaneous transmission of data over 52 data streams.
This allows for higher data rates while resisting interference between data streams

197
Q

Which channels will avoid overlapping frequencies in the 2.4 GHz band?

A

Channels 1, 6, and 11 if you’re talking about Wireless B, G or N

198
Q

What are the band, maximum bandwidth and transmission meth for 802.11a?

A

5 GHz, 54 Mbps, OFDM
It was fast, but expensive to make.
Most used by businesses in the 1990s.

199
Q

What are the band, maximum bandwidth and transmission meth for 802.11b?

A

2.4 GHz, 11 Mbps, DSSS

Commonly used by household devices such as security cameras, baby monitors, walkie talkies

200
Q

What are the band, maximum bandwidth and transmission meth for 802.11g?

A

2.4 GHz, 54 Mbps, OFDM or DSSS

201
Q

What are the band, maximum bandwidth and transmission meth for 802.11n?

A

2.4 GHz, 5 GHz, Both!

> 300 Mbps (channel bonding), OFDM

202
Q

What are the band, maximum bandwidth and transmission meth for 802.11ac?

A

5 GHz, >3 Gbps (with MU-MIMO), OFDM

203
Q

RFI

A

Radio Frequency Interference is caused by using similar frequencies to WLAN

Examples of things that cause RFI:

  • Other Wi-Fi devices (overlapping channels)
  • Microwave ovens (2.4 GHz)
  • Wireless security systems (2.4 GHz)
  • Physical obstacles
  • Signal Strength (configurable on some devices)
204
Q

CSMA/CA

A

Carrier Sense Multiple Access/Collision Avoidance
WLAN uses CSMA/CA to control access to medium, which Ethernet uses CSMA/CD.
CSMA/CA listens for transmission to determine if it is safe to transmit.

205
Q

What are steps that CSMA/CA uses?

A

1) Sends RTS (Ready to Send) packet if channel is clear
2) The device waits for acknowledgment
3) If a device receives an RTS, it will respond with a CTS packet (Clear to Send)
4) If no CTS is received, it will back off and resend an RTS

206
Q

What is a Pre-shared Key (wireless)?

A
Both AP and client uses the same encryption key.
Three examples of pre-shared keys:
1) WEP (wired equivalent privacy)
2) WPA (Wi-Fi Protected Access)
3) WPA2 (Wi-Fi Protected Access 2)
207
Q

What are the cons of a pre-shared key?

A

1) Scalability is difficult if the key is compromised
2) All the clients must know the password.

This is only for small environments.

208
Q

TKIP

A

Temporary Key Integrity Protocol was used by WPA to replace the initialization vector.
TKIP uses 48 bit

209
Q

What did WPA use for encryption?

A

RC4 (Rivest Cipher 4)

210
Q

What did WPA use to make sure data was not modified in transit?

A

MIC (Message Integrity Check), like a hash

211
Q

WPA2 (Wi-Fi Protected Access 2)

A

Created as part of 802.11i
Integrity checking through Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
AES encryption 128 or 256 bit key

2 different modes:

  • -personal mode (with pre-shared keys)
  • -Enterprise mode with centralized authentication
212
Q

What should I think about when I see CCMP?

A

WPA2 security

213
Q

What should I think about when I see WEP?

A

IV (initialization vectors), 24 bit code in the clear
This is the biggest flaw in WEP
WEP is weak; WEP is bad; WEP uses initialization vectors

214
Q

What should I think about when I see WPA?

A

TKIP and RC4

215
Q

What should I think about when I see WPA2?

A

CCMP is the integrity protocol

AES is encryption

216
Q

Air Crack-ng

A

Utility to capture wireless packets and use algorithms to determine th pre-shared key.
Comes standard on Kali Linux which is used for Pentesting

217
Q

Network Authentication 802.1x

A

Each user authenticates with their own credentials (used in wired and wireless networks).
Protects against Air Crack-ng

218
Q

What is EAP?

A

Extensible Authentication Protocol is authentication performed using 802.1x
There are 3 modes of EAP:
1. EAP-FAST (Flexible Authentication via Secure Tunneling
2. EAP-MD5
3: EAP-TLS

219
Q

What is NAC?

A

Network Admission Control permits or denies access to the network based on characteristics of the device instead of checking user credentials.
Machine gets put into a quarantine area before admitting them to the network
e.g. checking the O/S and antivirus version

220
Q

What is a captive portal?

A

Web page that appears before the user is able to access the network resources

221
Q

What is geofencing?

A

GPS or RFID defines real-world boundaries where barriers can be active or passive. Device can send alerts if it leaves the area.

222
Q

What is dotted decimal notation?

A

IPv4 address are divided into 4 separate numbers, divided by dots.

  • Each of these divisions are called octets
  • Octets have an 8-bit assigned value.
  • networkbits.networkbits.networkbits.Hostbits
223
Q

Classes of IP addresses?

A

Default subnet mask is assigned by first octet, classful masks if using default subnet mask
There are four classes:
Address 1st Classful Classful
–Class– –Octet– –Mask– –Mask–
Class A: 1 - 126 255.0.0.0 /8
Class B: 128 - 191 255.255.0.0 /16
Class C: 192- 223 255.255.255.0 /24
Class D: 224 - 239 N/A N/A

224
Q

What are Routable IPs?

A

Publicly-routable IP addresses are globally managed by ICANN.
Public IPs must be purchased though your ISP before usage

225
Q

What is ICANN?

A

Internet Corporation for Assigned Names and Numbers
It’s broken up into sub organization by region:
ARIN, LACNIC, AFNIC, APNIC, and RIPE NCC
ISPs buy them and lease them to individuals

226
Q

What are Private IPs?

A

Private IPs can be used by anyone but it’s only routable inside your local area network.

227
Q

What is NAT?

A

Network Address Translation allows for routing of private IPs though a public IP

228
Q

What are the ranges for Private IP addresses?

A

There are three classes.
Address Address Default Subnet
–Class– –Range– –Mask–
Class A: 10.0.0.0 - 10.255.255.255 255.0.0.0
Class B: 172.16.0.0 - 172.31.255.255 255.255.0.0
Class C: 192.168.0.0 - 192.168.255.255 255.255.255.0

229
Q

What are the loopback addresses?

A

127.x.x.x
Refer tot he device itself and used for testing.
These are most commonly used as 127.0.0.1

230
Q

What is APIPA?

A

Automatic Private IP Addresses
Dynamically assigned by OS when DHCP server is not available and when the IP address is not assigned manually.
Range of 169.254.x.x

231
Q

What is unicast (IPv4 data flows)?

A

Data travels from a single source device to a single destination device.

232
Q

What is multicast (IPv4 data flows)?

A

Data travels from a single source device to a multiple (but specific) destination devices.

233
Q

What is broadcast (IPv4 data flows)?

A

Data travels from a single source device to all devices on a destination network.

234
Q

What are the 4 pieces of information needed by a device (for IP address)?

A
  • IP Address
  • Subnet mask
  • Default Gateway (router)
  • DNS or WINS (Win Server)

DHCP gives these all out.

235
Q

What is Zero Configuration (zeroconf)?

A

An automatic assignment technology (similar to APIPA, but with more features)
Can resolve computer names to IP addresses without DNS server on local network
–mDNS - Multicast Domain Name Server

236
Q

Binary conversion chart

A

128 / 64 / 32 / 16 / 8 / 4 / 2 / 1

237
Q

What is subnetting?

A

It’s when you take a large network and split it up into small networks.
Creating a subnet involves borrowing bits from the original host portion and adding them to the network portion to make a smaller network.

238
Q

Split Horizon

A

Prevents loops

239
Q

OTDR

A

Think: Optical, Fiber

240
Q

Number of Created Subnets =

A

2 to the power of s

-s is the number of borrowed bits

241
Q

Number of assignable IP Addresses =

A

2h-2
h is the number of host bits

*** -2 is because every network has to have two IP addresses

242
Q

What does a subnet mask do?

A

It defines the network portion of an IPv4 address.
Network portion if a binary 1
Host portion if binary 0

243
Q

What are the network and host sections of Class A, Class B, and Class C email addresses?

A
  • In a Class A network address (1-126), the first octet is for the network & the last three octets are for the host – 16.7 million possible hosts
  • In a Class B network address (128-191), the 1st and 2nd octet are for the network, the 3rd & 4th octets are for the host – about 64k IPs available to be assigned to hosts
  • In a Class C network address (192-223), the 1st 2nd 3rd octets are for the network, only the 4th is for the host – Only 256 IPs available to be assigned to hosts

There are four classes:
Address 1st Classful Classful
–Class– –Octet– –Mask– –Mask–
Class A: 1 - 126 255.0.0.0 /8
Class B: 128 - 191 255.255.0.0 /16
Class C: 192- 223 255.255.255.0 /24

244
Q

What are subnet masks?

A

Subnetting takes a large network and splits it up into small network.
Default Classful Subnet masks are rarely going to be the optimal subnet for the subnet size.
Subnet masks modify the subnet to create networks that are better scoped.

245
Q

What numbers are on the binary conversion chart?

A

128 / 64/ 32/ 16/ 8/ 4/ 2/ 1

246
Q

Why are subnets beneficial?

A

1) More efficient use of IP addresses than classful default

2) Subnets enable the creation or more networks (VLANs, etc) so that’s good for security.

247
Q

What makes a classful subnet mask?

A

Having either all 1s or all 0s in an octet (ex. /8, /16, /24)

248
Q

What makes a classless subnet mask?

A

Having octets that are not homogenous.

249
Q

What is the formula to calculate the number of subnets you can create?

A

Number of created subnets = 2 to the s power
s = the number of borrowed bits

For example:

  1. 11111111.11111111.00000000 (/24)
  2. 11111111.11111111.10000000 (/25)
250
Q

What is the formula for the number of assignable IP addresses you can create?

A

The number of assignable IP addresses = 2h-2

251
Q

Why does the formula for the number of assignable IP addresses have -2?

A

Because every network must have a

  • Network ID (the first IP address)
  • Broadcast (the last IP address)
252
Q

CIDR

A

Classless Inter-Domain Routing
Used to summarize contiguous networks; called route aggregation
Instead of advertising multiple individual routes,
the routes can be summarized and advertised as a single route

253
Q

VLSM

A

Variable Length Subnet Mask
Allows subnets of various sizes to be used and requires a routing protocol that supports it including:
RIPv2, OSPF, IS-IS, EIGRP, BGP

254
Q

How many Subnets and IPs are in a /24 subnet?

A

1 subnet

256 IPs

255
Q

How many Subnets and IPs are in a /25 subnet?

A

2 subnets

128 IPs each

256
Q

How many Subnets and IPs are in a /26 subnet?

A

4 subnets

64 IPs each subnet

257
Q

How many Subnets and IPs are in a /27 subnet?

A

8 subnets

32 IPs each subnet

258
Q

How many Subnets and IPs are in a /28 subnet?

A

16 subnets

16 IPs per subnet

259
Q

How many Subnets and IPs are in a /29 subnet?

A

32 subnets

8 IPs per subnet

260
Q

How many Subnets and IPs are in a /30 subnet?

A

64 subnets

4 IPs per subnet

261
Q

How many bits in a IPv4 vs IPv6?

A

IPv4 has 32-bit address

IPv6 has a 128-bit address

262
Q

What are the benefits of IPv6?

A
  • Much larger address space
  • No broadcast IP
  • No fragmentation
  • No Maximum Transmission Unit (MTU) size
  • IPv6 can co-exist with IPv4 (aka dual-stack)
  • Simplified header (only 5 fields vs 12 field on IPv4)
263
Q

What is MTU (only in IPv4)?

A

Maximum Transmission Unit is the max packet size.
if the packet went over that size, the packet would have to be fragmented and the pieces sent separately.
This was inefficient

264
Q

Hexadecimal notation is used for IPv6

A

0-9 & A,B,C,D,E,F
Each digit is 4 bits
Consecutive groups of 0s can be summarized as “::”
ex. 2018::4815:54ae

265
Q

How can you tell the difference between a MAC address and an IPv6 address?

A

MAC address always have 12 digits

266
Q

What are the three types of IPv6 addresses?

A

1) Globally Routable Unicast Addresses - Begins with 2000 to 3999
2) Link-Local Address - Begins with FE80; only used on the LAN
3) Multicast address - Begins with FF

267
Q

What is the EU164 process?

A

IPv6 uses auto configuration to discover the current network and selects its own host ID based on it’s MAC using this process

268
Q

NDP

A
Neighbor Discovery Protocol 
Used by IPv6 to learn the Layer 2 addresses on the network.
It performs the following services:
-Router Solicitation
-Router Advertisement
-Neighbor Solicitation
-Neighbor Advertisement
-Redirect
269
Q

What are the three types of IPv6 data flows?

A
  • Unicast
  • Multicast
  • Anycast (replaces broadcast) - Designed to let one host initiate the efficient updating of router tables for a group of hosts
270
Q

What are the main functions of a router?

A

1) Route traffic to flow between subnets or networks
2) Each subnet or network will be on its own broadcast domain
3) Routers are Layer 3 devices that separate broadcast domains, but multilayer switches are used also

271
Q

What are Routing Decisions?

A

Contains Layer 3 –> Layer 2 mapping.
Routers use ARP caches to map an IP address to a given MAC address.
The router makes packet-forwarding decisions based on their internal routing tables.

272
Q

What are Routing Tables?

A

A table kept by the router to help determine which route entry is the best fit for the network.
A route entry with the longest prefix is the most specific network.

273
Q

What is a Split Horizon?

A

Prevents a route learned on one interface from being advertised back out of that same interface. This prevents routing loops.

274
Q

What is a Poison Reverse?

A

Causes a route received on one interface to be advertised back out of that same interface with a metric considered to be infinite (i.e. with a really high cost so no one would use it). This prevents routing loops.

275
Q

What is RIP?

A

Routing Information Protocol is an interior gateway protocol (IGP) and a distance vector protocol; it wants the shortest hop count – max of 15 hops, 16 is infinite.
Oldest dynamic routing protocol.
Provides updates every 30 seconds (so it’s are to maintain convergence).
Easy to configure.
Runs over UDP.

276
Q

What is OSPF?

A

Open Shortest Path First is an interior gateway protocol (IGP). It uses link-state protocol (i.e. cost) to determine route.

277
Q

What is IS-IS?

A

Intermediate System to Intermediate System is an interior gateway protocol (IGP). It uses link-state protocol (i.e. cost) to determine route.
It functions like OSPF, but it is not as popular or as widely used.

278
Q

What is EIGRP?

A

Enhanced Interior Gateway Routing Protocol is an interior gateway protocol (IGP). It is an advanced distance-vector protocol that uses bandwidth and delay, making it a hybrid of distance vector and link-state.
This is Cisco-only. Not as popular as OSPF.

279
Q

What is BGP?

A

External Gateway Protocol. It is also path vector that uses the number of autonomous system hops (instead of router hops).
This is the backbone of the internet.
Slow convergence.

280
Q

What is Route Believability?

A

Some routing protocols are considered more believable than others, so routers use an index of believability called AD (administrative distance).
If a route has lower AD, the route is more believable.

281
Q

What are Metrics (as assigned to routes)?

A
Metrics are the values assigned to a route. Lower metrics are preferred over higher metrics.
A metric is based on factors like:
-Hop count
-Believability
-Reliability
-Bandwidth
-Delay
-Cost
282
Q

What is NAT?

A

Network Address Translation is used to conserve the limited supply of IPv4 addresses. It translates private IP addresses to public IP addresses for routing over public networks.

283
Q

What is PAT?

A

Port Address Translation is when multiple private IP addresses share one public IP. It is a many-to-one translation. Commonly used in small networks.

284
Q

What is DNAT?

A

Dynamic Network Address Translation IP address is automatically assigned from a pool. This gives us a many to many translation.
A public IP address is borrowed from and returned to a pool to get out to the internet (like a family of four with two cars; you use the car, then put the keys back on the hook).

285
Q

What is SNAT?

A

Static NAT manually assigns IP addresses.
One to one translations.
Used as a security feature (smoke screen).

286
Q

What are the four types of NAT IP addresses?

A
Inside local (private IP address referencing an inside devices)
Inside global (public IP address referencing an inside device)
Outside local (private IP address referencing an outside device)
Outside global (public IP address referencing an outside device)
287
Q

What is Multicast Routing?

A

Sending traffic to a Class D IP address (aka the Multicast group). The goal is to send the traffic only to the devices that want it.

  • IGMP (Internet Group Management Protocol)
  • PIM (Protocol Independent Multicast)
288
Q

What is IGMP?

A

IGMP (Internet Group Management Protocol) is used by clients and routers to let routers know which interfaces have multicast receivers and allows clients to join a multicast group.

289
Q

What is PIM?

A

Protocol Independent Multicast routes multicast traffic between multicast -enabled routers.
Multicast routing protocol forms a multicast distribution tree.

290
Q

What is PIM-DM?

A

PIM Dense Mode uses periodic flood and prune behavior to form optimal distribution tree.
It causes a negative performance impact on the network and is rarely used in modern networks.

291
Q

What is PIM-SM?

A

PIM Sparse Mode initially used a shared distribution tree, which may not be optimal, but eventually creates an optimal distribution tree through shortest path tree (SPT) switchover

292
Q

What is HSPA+?

A

High-Speed Packet Access has advancements over LTE and 4G and can provided wireless broadband up to 84 mbps.

293
Q

What is WiMAX?

A

Worldwide Interoperability for Microwave Access is an alternative to DSL/Cellular and a wireless fixed location service (set it up and leave it in one place, due mostly to it’s larger antenna).
Slower than WiFi.

294
Q

What is a CSU/DSU?

A

Channel Service Unit / Data Service Unit terminates the digital signals from the ISP at the customer location.
You plug the CSU/DSU into the router.

295
Q

Digital signal measurements

A
T1 = 1.544 Mbps / 24 voices channels
T3 = 44.736 Mbps / 672 voice channels
E1 = 2 mbps / 30 voice channels
296
Q

What is PPP?

A

PPP is commonly used Layer 2 protocol on dedicated leased lines to simultaneously transmit multiple Layer 2 protocols (IP, IPX, etc)

  • Multilink interface; allows multiple physical connections to be bonded together into a logical interface
  • Looped link detection
  • Error detection; frames with errors can be detected and discarded
  • Authentication; device on the other end can authenticate the connection
297
Q

What is PAP?

A

Password Authentication Protocol performs one-way authentication betwn client and server
-Credentials are sent in clear text (BAD!)

298
Q

What is CHAP?

A

Challenge Handshake Protocol is safer because credentials are hashed (also MS-CHAP)

299
Q

What is PPPoE?

A

PPP over Ethernet allows authetication using PAP or CHAP at Layer 2

300
Q

What is DSL?

A

A Digital Subscriber Line

  • ADSL; 8 mbps download, 1.54 upload - voice and data on the same line. Max distance DSLAM 18000 ft
  • SDSL; symmetric DSL, 1.54 upload and download; no simultaneous voice and data; dedicated access
  • VDSL; 52 mbps upstream, 12 mbps downstream; max DSLAM is 4000 ft.
301
Q

What is HFC and DOCSIS?

A

These are terms indicate a cable network or cable modem.

  • HFC is Hybrid Fiber-Coax is CATV infrastructure containing coax and fiber cabling.
  • DOCSIS is Data-over-Cable Service Interface Specifications specifies ranges for upstream and downstream data transmission
302
Q

What are the primary issues with satellite connections?

A

Delays (due to distance traveled) and weather conditions can interrupt service.

303
Q

What is POTS?

A

Plain Old Telephone Service runs on public switched telephone network (PSTN; aka analog phone service) consists of telephone carriers from around the world.

304
Q

What is SONET?

A

Synchronous Optical Network is a Layer 1 technology using fiber as media. It has high data rates (155mbps-10gbps). It transports Layer 2 encapsulation (like ATM).
Covers large areas.

305
Q

What is ATM?

A

Asynchronous Transfer Mode is a Layer 2 WAN technology that operates using PVCs (Permanent Virtual Circuits) and SVCs (Switched Virtual Circuits).
It’s similar to Frame Relay, except all frames are transferred as fixed-length (cells) as its protocol data unit (PDU)

306
Q

How many bytes are the payload and header in ATM?

A

53 byte cell:
-payload is 48 bytes
-header is 5 bytes.
Because the size is standard, it enables really fast transfer.

307
Q

WAN Technology bandwidths

A
  • Frame Relay: 56kbps - 1.544 mbps
  • T1 - 1.544 mbps
  • T3 - 44.736 mbps
  • ATM - 155 mbps (OC-3) – 622 mbps (OC-12)
  • SONET: 51mbps (OC-1) - 159 gpbs (OC-3072)
308
Q

What are three types of symmetric encryption? (Confidentiallity)

A

Both the sender and the receiver have the same key:

  • DES (Data Encryption Standard)
  • 3DES (Triple DES)
  • AES (Advanced Encryption Standard)
309
Q

What is DES?

A

Data Encryption Standard is symmetric encryption.

  • 56-bit key
  • Used by SNMPv3
  • Considered weak by today’s standards
310
Q

What is 3DES?

A

Triple DES is symmetric encryption.

  • Uses three 56-bit keys (168-bit total)
  • Encrypt, decrypt, encrypt
311
Q

What is AES?

A

Advanced Encryption Standard is symmetric encryption.

  • Used by WPA2
  • It is available in 128, 192, and 256-bit keys
312
Q

What is Asymmetric Encryption?

A

Uses different keys for sender and receiver. It can be used to securely exchange emails.

  • public key
  • private key
313
Q

How do you confirm Integrity (CIA)?

A

Hashing is an algorithm that runs a string of data and creates a hash or hash digest. It serves as a unique fingerprint for that file.

314
Q

What is MD5?

A

Message Digest 5 is a hashing algorithm

-128-bit hash digest

315
Q

What is SHA-1?

A

Secure Hash Algorithm 1

-160-bit hash digest

316
Q

What is SHA-2?

A

Secure Hash Algorithm 256

-256-bit hash digest

317
Q

What is CRAMMD5

A

Challenge-Response Authentication Mechanism MD5

318
Q

What are are common vulnerability scanning tools used by network administrators?

A

Nessus, Zenmap, and nmap

319
Q

What is Syslog?

A

Routers, switches and servers can send their log info to a common syslog server for analysis.

320
Q

What are the levels of Syslog?

A
0 - Emergencies
1 - Alerts
2 - Critical
3 - Errors
4 - Warnings
5 - Notifications
6 - Informational
7 - Debugging
321
Q

What are the Troubleshooting steps?

A
  1. Define the problem.
  2. Hypothesize the probable cause.
  3. Test the hypothesis
  4. Create an action plan
  5. Implement the Action plan
  6. Verify the problem resolution
  7. Create a post-mortem report.
322
Q

What is an ESD strap?

A

It’s a strap with an alligator clip that discharges the static buildup in your body into a grounded object instead of damaging the electrical components.

323
Q

Why is static electricity dangerous?

A

Static discharge can be several thousands of volts at a low amperage.
THis can damage routers, switches and chips.

324
Q

When do you use a multimeter?

A

It can verify if a cable is broken.
–A copper cable should have 0 resistance.
–If it has high resistance or overload means it’s broken.
Use a multimeter with copper cabling to verify continuity, resistance, amperage, or voltage.
Also used to test source power to a device or a device’s own power supply.

325
Q

What is a Loopback device?

A

Connects transmit pins (or fibers) to receive pins to test network interfaces.

326
Q

What is a Cable Tester?

A

It verifies the continuity for each wire in the cable to ensure there are no breaks.
Verifies the pinouts of the connectors.

327
Q

What is a Cable Certifier?

A

Used with existing cable to determine its category or test data throughput.

  • -It works as a cable tester, but also does a lot more.
  • -Can be used to determine the length of the cable and make sure it’s crimped properly.
  • -It identifies the frequency range supported by the cable, data throughput
328
Q

What is a Butt Set?

A

Test equipment tools used by telephone technicians to check for dial tone or verify that a call can be placed from the line. Telephone or DSL

329
Q

What is a Toner Probe?

A

It allows technicians to generate a tone at one end of a connection and use the probe to audibly detect the wire pair connected to the tone generator.
–AKA, Fox and hound

330
Q

What is a TDR or an OTDR?

A
  • -Time Domain Reflectometer (TDR) Locates breaks in copper cables and provides an estimate of severity and distance to the break
  • -Optical TDR is for fiber
331
Q

What does a Speed Test do?

A

Verifies the throughput from client to Internet and determines overall connection speed to the Internet by downloading a large file from the test server and uploading the file to the server

332
Q

What is a Throughput Tester?

A

A device you put in your network that has multiple network interfaces and can generate high volumes of pseudo-random data for wired and wireless networks.
Used on networks to observe how the network performs under heavy load.

333
Q

What is a BERT?

A

Bit Error Rate Tester;
generates patterns at one end of a link and analyzes the received patterns for errors.
Useful for troubleshooting interference on cable or fiber

334
Q

What is a Protocol Analyzer?

A

-AKA – Network sniffer (ex. Wireshark, Ethereal)

Traffic can be captured from the network and reviewed for problems in the communications between devices.

335
Q

What is a Wireless Analyzer?

A

Software that conducts wireless survey to ensure proper coverage and prevent non-desired overlap.

336
Q

What does the ARP command show?

A

The MAC address (Layer 2) for a known IP address (Layer 3)
arp-a: displays the current arp table
arp-d: deletes the ARP mapping
arp-s:

337
Q

What does Tracert (Trace rt)?

A

Displays the path between your device and the destination IP address; shows each route hop

338
Q

What does nbtstat do?

A

Displays NetBIOS information for IP-based networks and a listing of the NetBIOS device names learned by the the PC.

339
Q

What does netstat do?

A

Displays information for IP-based connections on a PC including current sessions, source and destination addresses and port numbers

340
Q

What is Route poisoning?

A

Route poisoning is a method to prevent a router from sending packets through a route that has become invalid within computer networks.

341
Q

What must be added to a VLAN with a gateway to add security to it?

A

VLANs can be protected with an ACL. Without a properly configured ACL, there is no additional security provided by a VLAN.

342
Q

What should be implemented to allow wireless network access for clients in the lobby using a password key?

A

WPA2 allows the use of a preshared key for wireless network access.

343
Q

What is MIB?

A

Management Information Base (MIB) is used for managing all entities on a network using Simple Network Management Protocol. It would allow whatever tool to interpret the information received correctly.

344
Q

Which encryption type is MOST likely used for securing the key exchange during a client-to-server VPN connection?

A

ISAKMP is used in IPSec, which is commonly used in securing the key exchange during the establishment of a client-to-server VPN connection.

345
Q

Which WAN technology relies on virtual circuits and point-to-multipoint connections?

A

Frame Relay is a WAN technology that specifies the physical and data link layers of digital telecommunications channels using a packet switching methodology.
It supports the use of virtual circuits and point-to-multipoint connections.
It is commonly used to connect multiple smaller corporate office locations back to a larger centralized headquarters.

346
Q

Which device should you use to allow different network segments to communicate with each other?

A

A router or a layer 3 switch is used to allow different network segments and broadcast domains to communicate with each other.

347
Q

What type of cable would you use to connect to a console port on a router or switch?

A

a router or switch’s console port is connected using a rollover cable, which has an RS-232 (DB-9) port on one side and an RJ-45 on the other.

348
Q

Would an AM radio station interrupt a DOCSIS connection?

A

Yes. DOCSIS is how cable modems operate by sending radiofrequency waves over coaxial cables. AM frequencies can interfere with DOCSIS.