Network Concepts Flashcards

1
Q

CSMA/CA

A

Carrier Sense Multiple Access/Collision Avoidance

It is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSMA/CD

A

Carrier Sense Multiple Access/Collision Detection

It is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium, such as an electrical bus or a band of the electromagnetic spectrum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WAF

A

A Web Application Firewall protects web applications by monitoring and filtering traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WPA

A

WiFi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UTM

A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSPF

A

Open Shortest Path First

Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It uses a link state routing (LSR) algorithm and falls into the group of interior gateway protocols (IGPs), operating within a single autonomous system (AS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI

A

Open System Interconnection Model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TPM

A

Trusted Platform Module

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACL

A

Access Control List.

Operates in levels 3 and 4 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

STP

A

Span Tree Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SNAT

A

Source Network Address Translation or Static Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NAT

A

Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PAT

A

Port Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IDF

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

GSM

A

Global System for Mobile Communication

GSM (Global System for Mobile communication) is a digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TDM

A

Time Division Multiplexing

Time-division multiplexing (TDM) is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CDMA

A

Code Division Multiple Access

Everybody communicates at the same time. Each call uses a different code. Codes are used to filter each call on the receiving side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

PSTN

A

Public Switched Telephone Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Banner Grabbing

A

When a malicious user gains access to an open port and uses it to probe a host to gain information and access, as well as learn details about running services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Sticky MAC

A

Port security feature where dynamically learned MAC address are retained when an interface comes back online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

SIEM

A

Security Information and Event Manager

Software that can be configured to evaluate data logs from IDP and IPS firewalls and proxy servers in order to detect significant events that require the attention of IT staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

DOCSIS

A

Data Over Cable Service Internet Specification

Speeds up to 70 Mbps download. 7 Mbps upload.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IRP

A

Identity Registration Protocol

Protocol designed to eliminate conflicts with protocols using the same ports by allowing applications to register their name, email address, UserID, current IPv6 and other information with the company’s Domain Identity Registry server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

SLA

A

Service-Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

OTDR

A

Optical Time Domain Reflectometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

SIP

A

Session Initiator Protocol

It is a signaling protocol used for initiating, maintaining, and terminating real-time sessions that include voice, video and messaging applications.
Ports 5060 and 5061

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NTP

A

Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

H.323

A

VoIP standard that handles initiation, setup, and delivery of VoIP sessions
Port 1720

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

SMB

A

Service Message Block

It is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

RTP

A

Real-Time Transport Protocol

It is a network protocol for delivering audio and video over IP networks. RTP is used in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications including WebRTC, television services and web-based push-to-talk features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

IPsec

A

IP Security

It is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

CSU/DSU

A

Channel Service Unit/ Data Service Unit

It is a hardware device about the size of an external modem that converts a digital data frame from the communications technology used on a local area network (LAN) into a frame appropriate to a wide-area network (WAN) and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

IP Helper

A

Internet Protocol Helper (IP Helper)

Assists network administration of the local computer by enabling applications to retrieve information about the network configuration of the local computer, and to modify that configuration. IP Helper also provides notification mechanisms to ensure that an application is notified when certain aspects of the local computer network configuration change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Jumbo Frame

A

Usually 9000 bytes long or anything over 1500. Used in SAN systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

MTU

A

Maximum Transmission Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DLP

A

Data Lost Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

AUP

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

NDA

A

Non-Disclosure Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

SLA

A

Service-Level Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Data Exfiltration

A

Unauthorized transfer of data from a computer or other device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

GRE

A

Generic Routing encapsulation

It is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links or point-to-multipoint links over an Internet Protocol network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

LACP

A

Link Aggregation Control Protocol

It is a standards-based method to control the bundling of several physical network links together to form a logical channel for increased bandwidth and redundancy purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

EAP-PEAP

A

EAP-Protected Extensible Authentication Protocol (EAP-PEAP) is a protocol that creates an encrypted (and more secure) channel before the password-based authentication occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Network Baselines

A

Network Baselines are ideal performance metrics obtained by measuring your network for a particular time period. Baseline statistics provide a way to validate your current network status by determining recommended performance standards, hence, helping admins to find the “normal” operating level of network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

MDIX

A

Medium Dependent Interface Crossover.

Automatically can convert a straight through connection to crossover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

BGP

A

Border Gateway Protocol (Advanced distance-vector or path vector. EGP Type)

Refers to a gateway protocol that enables the internet to exchange routing information between autonomous systems (AS). As networks interact with each other, they need a way to communicate. This is accomplished through peering. BGP makes peering possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

LLDP

A

Link Layer Discovery Protocol

It is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors on a local area network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Performance Baseline

A

Performance measurements as the benchmark to compare all future measurements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

MITM

A

Man-In-the-Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

SCP

A

Secure Copy Protocol

It helps to transfer computer files securely from a local to a remote host. It is somewhat similar to the File Transfer Protocol “FTP”, but it adds security and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

IS-IS

A

Intermediate System to Intermediate System.

EGP Type. Advanced distance-vector or path vector. It is a single autonomous system (AS), also called a routing domain, that consists of end systems and intermediate systems. End systems are network entities that send and receive packets. Intermediate systems send and receive packets and relay (forward) packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

VRRP

A

Virtual Router Redundancy Protocol

It is a computer networking protocol that provides for automatic assignment of available Internet Protocol (IP) routers to participating hosts. This increases the availability and reliability of routing paths via automatic default gateway selections on an IP subnetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

OC-1 Circuit

A

Optical Carrier-1. It is a type of high-speed dedicated circuit.
The base speed for OC-1 is 51.84 Mbps. Using this as a base we have the following:
OC-2 circuit is 51.84 * 3 = 155.52 Mbps
OC-3 circuit is 51.84 * 12 = 622.08 Mbps
So on and so for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

TDM

A

Time Division Multiplexing

It is a method of transmitting and receiving independent signals over a common signal path by means of synchronized switches at each end of the transmission line so that each signal appears on the line only a fraction of time in an alternating pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

DSCP

A

Differentiated Services Code Point

(DSCP) is a means of classifying and managing network traffic and of providing quality of service (QoS) in modern Layer 3 IP networks. It uses the 6-bit Differentiated Services (DS) field in the IP header for the purpose of packet classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

authPriv

A

Communication with authentication and privacy. SNMP option to ensure the data transferred is confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Throttling

A

Limitation in the communication speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Bandwidth Quota

A

QoS policy that allows to configure the bandwidth cap that a costumer can upload or download at a given time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

PRI

A

Primary Rate Interface

PRI and SIP are two methods used to connect a place of business to a regional telephone network. Both require PBX equipment where the interchange between the facility and the public can take place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Session Hijacking

A

Also known as TCP session hijacking, is a method of taking over a web user session by surreptitiously obtaining the session ID and masquerading as the authorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

NAC

A

Network Access Control

It is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

UNC

A

Universal Naming Convention

UNC is a PC format for specifying the location of resources on a local area network (LAN). UNC uses the following format: \server-name\shared-resource-pathname.
For example, to access the file test.txt in the directory examples on the shared server silo, you would write: \silo\examples\test.txt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Smurf Attack

A

A Smurf attack is a form of a distributed denial of service (DDoS) attack that renders computer networks inoperable. The Smurf program accomplishes this by exploiting vulnerabilities of the Internet Protocol (IP) and Internet Control Message Protocols (ICMP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

SFP

A
SFP stands for small form-factor pluggable. It is a compact, hot-swappable optical transceiver module that used in telecommunications and data communications networks. 
IT IS THE OPTICAL TRANSRECEIVER WHERE FIBERS CONNECTS!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

FQDN

A

Fully qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

VLAN Hopping

A

Virtual local area network hopping (VLAN hopping) is a method of attacking the network resources of the VLAN by sending packets to a port not usually accessible from an end system. The main goal of this form of attack is to gain access to other VLANs on the same network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

RSA

A

The Rivest Shamir Adleman (RSA) Authentication Mechanism is used to simplify the security environment for the Flexible Management Topology. It supports the ability to securely and easily register new servers to the Flexible Management topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

NOC

A

A network operations center (NOC) is a centralized location where IT teams can continuously monitor the performance and health of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

SSL VPN

A

Establishes a secure session that can be initiated using a web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

PTP

A

Precision Time Protocol

Used to synchronize clocks throughout a computer network. At difference of NTP, PTP is accurate to microseconds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

PPTP

A

Point-to-point tunneling. Protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP networks. OUTDATED! UNSECURED!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

NAS

A

Network Attached Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

DAS

A

Direct Attached Storage

A type of storage that is attached directly to the computer without going through the network.

78
Q

ISCSI

A

Internet Small Computer Systems Interface
It is a Transport layer protocol that runs on top of TCP to allow fast transmissions over LANs, WANs, and the Internet. It can work on a twisted-pair Ethernet network with ordinary Ethernet NICs. iSCSI is an evolution of SCSI (Small Computer System Interface), which is a fast transmission standard used by internal hard drives and operating systems in file servers. The advantages of iSCSI over Fibre Channel are that it is not as expensive, can run on the already established Ethernet LAN by installing iSCSI software (called an iSCSI initiator) on network clients and servers, and does not require as much special training for IT personnel. Some network administrators configure iSCSI to use jumbo frames on the Ethernet LAN. iSCSI architecture is very similar to FC. The primary difference is that Ethernet equipment and interfaces can be used throughout the storage network. In fact, this is the primary advantage of iSCSI over other options, making it relatively straightforward to implement.

79
Q

FC

A

Fiber Channel
It is a storage networking architecture that runs separately from Ethernet networks to maximize speed of data storage and access. Although FC can run over copper cables, fiber-optic cable is much more commonly used. Fibre Channel requires special hardware, which makes it an expensive storage connection technology. FC switches connect servers with each other and the outside network. Instead of NICs, FC devices communicate through HBAs (host bus adapters).

80
Q

SAN

A

Storage Area Network

Network composed of switches and routers dedicated to the storage and management of data. These devices are interconnected using Fiber Channel and iscsi even though the latter is slower.

81
Q

AUP

A

Acceptable Use Policy

82
Q

SLA

A

Service-Level agreement

83
Q

NDA

A

Non-Disclosure Agreement

84
Q

MOU

A

Memorandum of Understanding

85
Q

SOP

A

Standard Operating Procedure

86
Q

FCoE

A

Fiber Channel over Ethernet

Encapsulate Fiber Channel frames over Ethernet networks

87
Q

DTLS

A

Datagram Transport Layer Security

(DTLS) is a communications protocol providing security to datagram-based applications by allowing them to communicate in a way designed to prevent eavesdropping, tampering, or message forgery. Designed specifically for streaming communications.

88
Q

BPDU

A

A bridge protocol data unit (BPDU) is a data message transmitted across a local area network to detect loops in network topologies.

89
Q

Out-of-band

A

Is a method of remotely controlling and managing critical IT asset and network equipment using a secure connection through a secondary interface that is physically separate from the primary network.

90
Q

ATM

A

Asynchronous transfer mode (ATM) is a switching technique used by telecommunication networks that uses asynchronous time-division multiplexing to encode data into small, fixed-sized cells. This is different from Ethernet or internet, which use variable packet sizes for data or frames.

91
Q

PRP

A

Parallel Redundancy Protocol (PRP) is a network protocol standard for Ethernet that provides seamless failover against failure of any network component. This redundancy is invisible to the application. PRP nodes have two ports and are attached to two separated networks of similar topology. PRP can be implemented entirely in software, i.e. integrated in the network driver. Nodes with single attachment can be attached to one network only.

92
Q

VLSM

A

Variable Length Subnet Mask

93
Q

File Hashing

A

A message digest, or hash, is a signature that identifies some amount of data, usually a file or message.

94
Q

tcpdump

A

tcpdump is a packet analyzer that is launched from the command line. It can be used to analyze network traffic by intercepting and displaying packets that are being created or received by the computer it’s running on. It runs on Linux and most UNIX-type operating systems.

95
Q

pathping

A

Command that is a combination of ping and tracert.

96
Q

ISDN

A

ISDN or Integrated Services Digital Network is a circuit-switched telephone network system that transmits both data and voice over a digital line. You can also think of it as a set of communication standards to transmit data, voice, and signaling. These digital lines could be copper lines.
Basic rate interface −It allows us to send small amounts of data at lower speeds. Primary rate interface − It allows us to send large amounts of data at higher speeds. Broadband ISDN − It relies on fibre optics.

97
Q

infiniBand

A

InfiniBand is a channel-based fabric that facilitates high-speed communications between interconnected nodes. An InfiniBand network is typically made up of processor nodes, such as PCs, servers, storage appliances and peripheral devices. It also has network switches, routers, cables and connectors.

98
Q

CASB

A

A cloud access security broker (CASB) is an on-premises or cloud-based security policy enforcement point between cloud service consumers and providers.
A CASB acts as a gatekeeper, allowing organizations to extend the reach of their security policies beyond their own infrastructure. CASBs typically offer the following: Firewalls to identify malware and prevent it from entering the enterprise network.

99
Q

L2TP

A

Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.

100
Q

dig

A

Linux CLI command. Domain information gropper. Similar to nsloopup but more powerful.

101
Q

iptables

A

Iptables is used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. It enables a computer to act as a packet-filtering firewall.

102
Q

IPAM

A

IP address management (IPAM) is a method for planning, tracking, and managing IP address space on a network. It is the administration of DNS and DHCP.

103
Q

MDF

A

Main Distribution Frame

104
Q

CCMP

A

Counter Mode Cipher Block Chaining Message Authentication Code Protocol.
CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM mode) of the Advanced Encryption Standard (AES) standard.

105
Q

Hashing

A

Hashing is the process of transforming any given key or a string of characters into another value.

106
Q

Signatures

A

Identifiable patterns of code that are known to indicate specific vulnerabilities, exploits, or other undesirable traffic.

107
Q

NGFW

A

Next Generation Firewall. Also call layer 7 firewalls.

108
Q

EUI-64

A

Extended Unique identifier.
Used to obtain the 64 bits needed for an IPv6 address by using the 48 bits of the device mac. Inserts a fixed 16 bits value in the middle and inverts the value of the seventh bit

109
Q

CRC

A

Cyclic Redundancy Check.

Algorithm used to ensure that the data at the destination matches the data issued from the source. Used in the trailer of the Ethernet frame.

110
Q

Root guard

A

Root guard is an STP feature that is enabled on a port-by-port basis; it prevents a configured port from becoming a root port. Root guard prevents a downstream switch (often misconfigured or rogue) from becoming a root bridge in a topology.

111
Q

Root Bridge

A

Single bridge on a network selected by STP to provide the basis of all subsequent path calculations.

112
Q

TDMA

A

Time Division Multiple Access

A method of multiplexing in which signals from several sources on a channel are separated by time slots.

113
Q

Flood guards

A

Tools to prevent DoS attacks

114
Q

OCSP

A

Online Certificate Status Protocol

Used to maintain the security of a server and other network resources and used for obtaining the revocation of an x.509 digital certificate.

115
Q

Jitter

A

Jitter is a variance in latency, or the time delay between when a signal is transmitted and when it is received

116
Q

VPC

A

Virtual Private Cloud

A virtual network that is a version of a physical network.

117
Q

VSAN

A

Virtual Storage Area Network

Logical partition in a SAN

118
Q

Exports Controls

A

U.S. laws and regulations that regulate and restrict the release of critical technologies, information, and services to foreign nationals for reasons of national security.

119
Q

SDN

A

Software Defined Networking

A centralized approach to networking that removes most of the decision-making powers from network devices and instead handles that responsibility at a software level.

120
Q

CAN

A

Controlled Area Network

Used in cars and in automation.

121
Q

On-boarding

A

Installing an agent in a device to allow access to a network.

122
Q

Off-boarding

A

Removing the on-boarding agent. Methods include remote wipe.

123
Q

Round Robin

A

Round robin load balancing is a simple way to distribute client requests across a group of servers. A client request is forwarded to each server in turn. The algorithm instructs the load balancer to go back to the top of the list and repeats again.

124
Q

Public Facing Device

A

Any free or paid application or system that the public can access.

125
Q

TOE

A

TCP offload engine is a function used in network interface cards (NIC) to offload processing of the entire TCP/IP stack to the network controller. By moving some or all of the processing to dedicated hardware, a TCP offload engine frees the system’s main CPU for other tasks.

126
Q

Kerberos

A

Client validation. Verify the identity of clients and securely exchange information after a client logs on to a system.

127
Q

MIB

A

Management Information Base (SNMP logs)

List of objects managed by the NMS

128
Q

NMS

A

Network Management System (SNMP logs)

At least one network management console, which may be a server or workstation, depending on the size of the network, collects data from multiple managed devices at regular intervals in a process called polling

129
Q

OID

A

Object Identifier (SNMP logs)

It is a number assigned to each assigned object in the MIB.

130
Q

site-to-site VPN

A

Tunnels that connect multiple sites on a WAN

131
Q

client-to-site VPN

A

Or host to site. Remote clients establish tunnels with a private network through VPNs.

132
Q

PPP

A

Point-to-Point
Direct private connection over fiber lines. (leased lines). It is a layer 2 communication protocol that enables a workstation to connect to a server using a serial connection such as DSL or Dial-up. Uses authentication protocols such as MS-CHAPv2 and EAP

133
Q

Nmap

A

Network mapping command can show active ports and status.

134
Q

PEAP

A

Protected EAP.

Tunnel based TLS tunnel. Creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process. As shown in Figure 10-32, PEAP is called the outer method. Then another form of EAP is used for the inner method, which is the process that occurs inside the protected tunnel. The most common inner method is EAP-MSCHAPv2, which runs an MS-CHAPv2 session inside the tunnel, perhaps to a RADIUS server and beyond to Active Directory.

135
Q

EAP-FAST

A

EAP-Flexible Authentication via Secure Tunneling

It is also a form of tunneled EAP. It was developed by Cisco and works similarly to PEAP, except faster. The most important difference with EAP-FAST is that it uses PACs (Protected Access Credentials), which are somewhat similar to cookies that websites store on a user’s computer to track their activities. A PAC is stored on the supplicant device for speedier establishment of the TLS tunnel in future sessions.

136
Q

intermediate certificate

A

Intermediate certificates branch off root certificates like branches of trees. They act as middle-men between the protected root certificates and the server certificates issued out to the public. There will always be at least one intermediate certificate in a chain, but there can be more than one.

137
Q

802.1x

A

Uses RADIUS to authenticate

138
Q

802.1q

A

Supports VLAN encapsulation

139
Q

802.1af

A

PoE 15.4 Watts

140
Q

802.1at

A

PoE + 25.5 Watts

141
Q

VRF

A

Virtual Routing and Forwarding

Enables the coexistence of multiple virtual routers.

142
Q

CIFS

A

Common Internet File System

File system protocol used to access files. Obsolete. Succeeded by SMB

143
Q

BaaS

A

BaaS, also known as mobile backend as a service (MBaaS), is a way of connecting mobile apps to cloud-based services. Instead of using mobile middleware, BaaS creates a unified application programming interface (API) and software developer kit (SDK) to connect mobile apps to back-end services like cloud storage platforms. This includes key features like push notifications, social networking integration, location services and user management.

144
Q

MTBF

A

Mean Time Between Failures

The average amount of time that will pass before the next failure is expected to occur.

145
Q

MTTR

A

Mean Time to Repair

The average amount of time required to repair a device or restore service.

146
Q

RFP

A

Request for Proposal

147
Q

SNR

A

Signal-to-Noise Ratio

The proportion of noise to the strength of a signal.

148
Q

Dual Stack

A

Dual stack means that devices are able to run IPv4 and IPv6 in parallel. It allows hosts to simultaneously reach IPv4 and IPv6 content, so it offers a very flexible coexistence strategy.

149
Q

6to4

A

6to4 is an Internet transition mechanism for migrating from Internet Protocol version 4 (IPv4) to version 6 (IPv6) and a system that allows IPv6 packets to be transmitted over an IPv4 network (generally the IPv4 Internet) without the need to configure explicit tunnels.

150
Q

ISATAP

A

It is an IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network.

151
Q

FCS

A

Frame Check Sequence

Ensures that the data at the destination exactly matches the data issued from the source using the CRC algorithm.

152
Q

LLC

A

Logical Link Control

A sublayer of layer 2 that is primary concern with multiplexing, flow and error control, and reliability.

153
Q

Rainbow Tables

A

A rainbow table attack is a password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a database. Applications don’t store passwords in plaintext, but instead encrypt passwords using hashes. After the user enters their password to login, it is converted to hashes, and the result is compared with the stored hashes on the server to look for a match. If they match, the user is authenticated and able to login to the application.

154
Q

NFS

A

Network File System

Allows users to access files located on a remote computer and treat the files and directories as if they were local.

155
Q

CARP

A

Common Address Redundancy Protocol

A protocol that allows a pool of computers or interfaces to share one or more IP addresses. It is a free alternative to HSRP and VPRP

156
Q

SQL

A

Structured Query Language

It is a standardized program language that is used to manage relational databases and perform various operations on the data in them.

157
Q

SQL Injection

A

It is the placement of malicious code in SQL statements via webpage input.

158
Q

VoIP gateway

A

Device that converts signals from an analog phone into IP data that can travel over the internet and vice versa

159
Q

VoIP PBX

A

Private Branch Exchange. Dedicated phone switch or virtual switching device that connects and manages calls within a private organization and manages all connections that exit the network through a VoIP gateway.

160
Q

VoIP endpoint

A

An end user device or application that gives the user access to VoIP services on a network.

161
Q

Load Balancer

A

Makes use of CPU/RAM usage to help maintain performance and availability.

162
Q

Syslog

A

System Log

It is a standard for generating storing, and processing messages about events in a system.

163
Q

ASCI

A

Application-Specific Integrated Circuit.

It is a microchip designated for a special application such a particular kind of transmission protocol or a hand-held computer.

164
Q

MPLS

A

Multi-Protocol Label Switch

A networking technology that routes traffic using the shortest path based on “labels” rather than network addresses.

165
Q

RBAC

A

Role-Based Access Control

A method of access control where a network administrator assigns only the privileges and permissions necessary for a user to perform the role required by an organization

166
Q

Role Separation

A

Implemented to enforce checks and balances. Meaning each user can only be a member of a single group in order to perform any tasks at all. This is used to remove root access to unprivileged users

167
Q

DHCP Snooping

A

DHCP snooping is a security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. The DHCP snooping feature performs the following activities: Validates DHCP messages received from untrusted sources and filters out invalid messages.

168
Q

Implicit Deny

A

An ACL rule which ensures that any traffic the ACL does not explicitly permit is denied by default.

169
Q

AH

A

Authentication Header (AH) is a protocol and part of the Internet Protocol Security (IPsec) protocol suite, which authenticates the origin of IP packets (datagrams) and guarantees the integrity of the data.

170
Q

iPerf

A

Network testing tool that can create TCP and UDP data streams and measure the throughput of a network that is carrying them.

171
Q

NetFlow Analyzer

A

Tool deployed to perform monitoring, troubleshooting and Indepth inspection interpretation, and synthesis of traffic flow data.

172
Q

Channel Bonding

A

Two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices. Also known as Ethernet Bonding.

173
Q

EIRP

A

Effective Isotropic Radiated Power

It is a calculation used to estimate the radiated output power of an isotropic antenna.

174
Q

Dynamic ARP Inspection

A

Dynamic ARP Inspection (DAI) is a security feature in MS switches that protects networks against man-in-the-middle ARP spoofing attacks

175
Q

FHRP

A

First Hop Redundancy Protocol (FHRP) is a hop redundancy protocol that is designed to provide redundancy to the gateway router within the organization’s network by the use of a virtual IP address and virtual MAC address.

176
Q

Piggyback

A

Attack when the hacker uses somebody else’s connection like wiretapping.

177
Q

PPPoE

A

Point-to-Point over Ethernet

PPP running over an Ethernet network. Relies on circuit switching.

178
Q

DMVPN

A

(Dynamic Multipoint VPN) is a routing technique we can use to build a VPN network with multiple sites without having to statically configure all devices. It’s a “hub and spoke” network where the spokes will be able to communicate with each other directly without having to go through the hub. Encryption is supported through IPsec which makes DMVPN a popular choice for connecting different sites using regular Internet connections

179
Q

RFC1918

A

Request for Comment 1918. Address allocation for private internet.

180
Q

FIM

A

File Integrity Monitoring
Also known as change monitoring, examines operating system files, Windows registries, application software, Linux system files, and more, for changes that might indicate an attack.

181
Q

mGRE

A

Multipoint GRE

It is a protocol that can be used to enable one note to communicate with many nodes. It can be used for Point-to-Multipoint links using which one node can transmit data to many nodes.

182
Q

hub-and-spoke

A

A hub-and-spoke network, often called star network, has a central component that’s connected to multiple networks around it. The overall topology resembles a wheel, with a central hub connected to points along the edge of the wheel through multiple spokes. A hub is a central network zone that controls and inspects ingress or egress traffic between zones: internet, on-premises, and spokes.

183
Q

RTO

A

Recovery Time Objective

It is the maximum time for restoring a network or application and regaining access to data after an unplanned disruption.

184
Q

Clientless VPN

A

A clientless SSL VPN is a browser-based VPN that allows a remote user to securely access the corporate resources.

185
Q

Client VPN

A

A VPN client is a software based technology that establishes a secure connection between the user and a VPN server. Some VPN clients work in the background automatically, while others have front-end interfaces that allow users to interact with and configure them.

186
Q

SSL Inspection

A

It is a way to identify malicious activity that occurs via encrypted communication channels. Similar to HTTP inspection and TLS inspection.

187
Q

SONET

A

Synchronous optical networking and synchronous digital hierarchy are standardized protocols that transfer multiple digital bit streams synchronously over optical fiber using lasers or highly coherent light from light-emitting diodes. At low transmission rates data can also be transferred via an electrical interface.

188
Q

Root Certificate

A

A root certificate is a digital certificate that belongs to the issuing Certificate Authority. It comes pre-downloaded in most browsers and is stored in what is called a “trust store.” The root certificates are closely guarded by CAs (Certificate Authority).

189
Q

Server Certificate

A

The server certificate is the one issued to the specific domain the user is needing coverage for.

190
Q

MSA

A

An MSA (master service agreement) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.

191
Q

MLA

A

An MLA (master license agreement) grants a license from a creator, developer, or producer, such as a software producer, to a third party for the purposes of marketing, sublicensing, or distributing the product to consumers as a stand-alone product or as part of another product.