NETWORK+ EXAM CompTIA Textbook Notes Flashcards

1
Q

Missing Route Issues

A
  • Use ping and traceroute/tracert to identify where network path fails
  • Check routing table
  • Missing static route
  • Dynamic protocol failure
  • Device configuration review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routing Loop Issues

A
  • Incorrect path information causes
    packet to circulate until TTL is
    exhausted
  • Use traceroute to diagnose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Asymmetrical Routing Issues

A
  • Return path different to forward path
  • Issues
  • Inconsistent latency
  • Security appliances dropping return packets
  • Analyze traceroute output and investigate routing tables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Low Optical Link Budget Issues

A
  • Consider PHY/data link layer issues when routing across WANs
  • Poor connectivity across fiber link
  • Loss budget expresses amount of loss from attenuation, connectors,
    and splices measured in dB
  • Loss budget must be less than power budget (transceiver transmit
    power and receive sensitivity)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Model

A

Layer 1 – Physical
Layer 2 – Data link
Layer 3 – Network
Layer 4 – Transport
Layer 5 – Session
Layer 6 – Presentation
Layer 7 – Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Application Layer 7

A

End User Layer
Protocols: SMTP, HTTP
program that opens what was sent or creates what was sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Presentation Layer 6

A

Syntax Layer
JPEG/ASCII/EBDIC/TIFF/GIF/PICT
encrypt and decrypt (if needed)
formats data to be presented to the application layer and can be viewed as “translator” for network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Session Layer 5

A

synch and send to ports (logical ports)
Logical Ports: RPC/SQL/NFS/NetBIOS names/Stateful Inspection Firewall
allows session establishment between processes running on different stations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Transport Layer 4

A

TCP Host to Host, Flow Control
Packet Filtering
TCP/SPX/UDP
ensures delivery of messages error free, in sequence, no losses or duplicates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network Layer 3

A

Packets “letter”, contains IP address
Packet Filtering
Routers: IP/IPX/ICMP
TTL, Firewall
Controls the operation of the subnet, deciding which physical path data takes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Link Layer 2

A

Frames “envelope”, contains MAC address
Switch/Bridge/WAP/NIC/Ethernet/PPP/SLIP
[NIC card > Switch > NIC card]
Provides error-free transfer of data frames from one node to another over the physical layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical Layer 1

A

Physical Structure (signal layer)
Cables, hubs, modem, transceivers, media converters…
Transmission and reception of the unstructured raw bit stream over the physical medium.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network Protocol two principal functions:

A

Addressing and Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Addressing

A

describing where data messages should go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulating

A

describing how data messages should be packaged for transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

At each layer what must two nodes be running to communicate?

A

the same protocol at each layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Same Layer Interaction

A

communication between nodes at the same layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Adjacent Layer Interaction

A

To transmit or receive communication on each node each layer provides services for the layer above and uses the services of the layer below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Process of Encapsulation

A

When a message is sent from one node to another, it travels down the stack of layers on the sending node, reaches the receiving node using the transmission media, and then passes up the stack on that node. At each level (except the physical layer), the sending node adds a header to the data payload, forming a “chunk” of data called a protocol data unit (PDU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Physical Topology

A

The layout of nodes and links as established by the transmission media. An area of a larger network is called a segment. A network is typically divided into segments to cope with the physical restrictions of the network media used, to improve performance, or to improve security. At the Physical layer, a segment is where all the nodes share access to the same media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Physical Interface

A

Mechanical specifications for the network medium, such as cable specifications, the medium connector and pin-out details (the number and functions of the various pins in a network connector), or radio transceiver specifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Devices that operate at the Physical Layer 1:

A

Transceiver—The part of a network interface that sends and receives signals over the network media.
Repeater—A device that amplifies an electronic signal to extend the maximum allowable distance for a media type.
Hub—A multiport repeater, deployed as the central point of connection for nodes.
Media converter—A device that converts one media signaling type to another.
Modem—A device that performs some type of signal modulation and demodulation, such as sending digital data over an analog line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Logical Topology

A

A layer 2 segment might include multiple physical segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

End Systems or Host Nodes

A

Nodes that send and receive information
This type of node includes computers, laptops, servers, Voice over IP (VoIP) phones, smartphones, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

intermediate system or infrastructure node

A

A node that provides only a forwarding function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Devices that operate at the data link layer include:

A

Network adapter or network interface card (NICs)—An NIC joins an end system host to network media (cabling or wireless) and enables it to communicate over the network by assembling and disassembling frames.
Bridge—A bridge is a type of intermediate system that joins physical network segments while minimizing the performance reduction of having more nodes on the same network. A bridge has multiple ports, each of which functions as a network interface.
Switch—An advanced type of bridge with many ports. A switch creates links between large numbers of nodes more efficiently.
Wireless access point (AP)—An AP allows nodes with wireless network cards to communicate and creates a bridge between wireless networks and wired ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

ACL

A

A network ACL is a list of the addresses and types of traffic that are permitted or blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

heterogenerous

A

networks using a variety of physical layer media and data link protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Main appliance working at layer 3:

A

the router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

End to End or Host to Host Layer

A

Transport Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which layer assigns port numbers to network applications?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Segments at the Transport Layer

A

on the sending host, data from the upper layers is packaged as a series of layer 4 PDUs and each segment is tagged with the apps port number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which layers in the OSI model is the port number ignored?

A

At the network and data link layer and it becomes part of the data payload and is invisible to the routers and switches that implement the addressing and forwarding functions of these layers. At the receiving host, each segment is decapsulated, identified by its port number, and passed to the relevant handler at the application layer. Put another way, the traffic stream is de-multiplexed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Functions in the Session Layer

A

establishing a dialog, managing data transfer, and then ending (or tearing down) the session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What protocol does not encapsulate any other protocols or provide services to any protocol

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

At layer 2, the SOHO router implements the following functions to make use of its physical layer adapters:

A

ethernet switch and wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What connects a SOHO router to the internet?

A

WAN interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

PSTN

A

The Public Switched Telephone Network is where Most SOHO subscriber Internet access is facilitated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

CPE

A

customer premises equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

demarcation point/demarc

A

point at which the telco’s cabling enters the customer premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Internet Assigned Numbers Authority (IANA)

A

manages allocation of IP addresses and maintenance of the top-level domain space. IANA is currently run by Internet Corporation for Assigned Names and Numbers (ICANN). IANA allocates addresses to regional registries who then allocate them to local registries or ISPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Internet Engineering Task Force (IETF)

A

focuses on solutions to Internet problems and the adoption of new standards, published as Requests for Comments (RFCs). Some RFCs describe network services or protocols and their implementation, while others summarize policies. An older RFC is never updated. If changes are required, a new RFC is published with a new number. Not all RFCs describe standards. Some are designated informational, while others are experimental.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Bandwidth

A

The more bandwidth available in the media, the greater the amount of data that can be encoded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A

The Ethernet protocol governing contention and media access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Fast Link Pulse

A

Fast Ethernet codes a 16-bit data packet into this signal advertising its service capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

unshielded twisted pair (UTP)

A

Modern buildings are often flood-wired using UTP cabling.
Most twisted pair cable used in office networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

two methods for terminating Ethernet(RJ-45) connections:

A

T568A and T568B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

T568A Standard

A

gGoBbObrBR
green/white, green, orange/white, blue, blue/white, orange, brown/white, brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

T568B Standard

A

oOgBbGbrBR
orange/white, orange, green/white, blue, blue/white, green, brown/white, brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

plenum cable

A

typically in false ceiling and must not emit a lot smoke, be self-extinguishing
uses treated PVC or FEP
data cable is marked CMP/MMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

General purpose (nonplenum) cabling

A

uses PVC (polyvinyl chloride) jackets and insulation
marked CMG/MMG or CM/MP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Riser cabling

A

Cabling that passes between two floors
conduit must be fire-stopped
data cable marked CMR/MPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

coax cable

A

made of two conductors that share the same axis, hence the name (“co” and “ax”)
The core conductor of the cable is made of copper wire (solid or stranded) and is enclosed by plastic insulation (dielectric). A wire mesh (the second conductor), which serves both as shielding from EMI and as a ground, surrounds the insulating material. A tough plastic sheath protects the cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Coax cables are categorized using

A

the Radio Grade (RG) standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Twinaxial (or twinax) cable

A

similar to coax but contains two inner conductors
used for datacenter 10GbE and 40GbE up to 5 m for passive cables and 10 m for active cable types.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

SMF

A

Single Mode Fiber :
small core (8-10 mcrions)
long wavelength
support data rates 100Gbps
OS1 indoor
OS2 outdoor
suitable for WAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

MMF

A

Multimode Fiber:
large core (62.5 or 50 microns)
shorter wavelength
less expensive than SMF
no high signaling speed/no long distance as single mode
suitable for LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

MMF is graded by Optical Multimode (OM) categories, defined in the ISO/IEC 11801 standard:

A

OM1/OM2—62.5-micron cable is OM1, while early 50-micron cable is OM2. OM1 and OM2 are mainly rated for applications up to 1 Gbps and use LED transmitters.
OM3/OM4—these are also 50-micron cable, but manufactured differently, designed for use with 850 nm Vertical-Cavity Surface-Emitting Lasers (VCSEL), also referred to as laser optimized MMF (LOMMF). A VCSEL is not as powerful as the solid-state lasers used for SMF, but it supports higher modulation (transmitting light pulses rapidly) than LED-based optics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Straight Tip (ST)

A

push-and-twist locking mechanism connector

multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Subscriber Connector (SC)

A

push/pull design
single- or multimode
commonly used for Gigabit Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Local Connector (LC) (also referred to as Lucent Connector)

A

tabbed push/pull design
widely adopted form factor for Gigabit Ethernet and 10/40 GbE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Mechanical Transfer Registered Jack (MTRJ)

A

small-form-factor duplex connector with a snap-in

multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

fiber ethernet standard specifications

A

100BASE-FX
100BASE-SX
1000BASE-SX
1000BASE-LX
10GBASE-SR
10GBASE-LR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Physical Contact (PC)

A

The faces of the connector and fiber tip are polished so that they curve slightly and fit together better, reducing return loss (interference caused by light reflecting back down the fiber).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

UltraPhysical Contact (UPC)

A

This means the cable and connector are polished to a higher standard than with PC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Angled Physical Contact (APC)

A

The faces are angled for an even tighter connection and better return loss performance. APC cannot be mixed with PC or UPC. These connectors are usually deployed when the fiber is being used to carry analog signaling, as in Cable Access TV (CATV) networks. They are also increasingly used for long distance transmissions and for Passive Optical Networks (PON), such as those used to implement Fiber to the x (FTTx) multiple subscriber networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Horizontal Cabling

A

Connects user work areas to the nearest horizontal cross-connect. A cross-connect can also be referred to as a distribution frame. Horizontal cabling is so-called because it typically consists of the cabling for a single floor and so is made up of cables run horizontally through wall ducts or ceiling spaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Backbone Cabling

A

Connects horizontal cross-connects (HCCs) to the main cross-connect (optionally via intermediate cross-connects). These can also be described as vertical cross-connects, because backbone cabling is more likely to run up and down between floors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Telecommunications Room

A

Houses horizontal cross-connects. Essentially, this is a termination point for the horizontal cabling along with a connection to backbone cabling. An equipment room is similar to a telecommunications room but contains the main or intermediate cross-connects. Equipment rooms are also likely to house “complex” equipment, such as switches, routers, and modems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Entrance Facilities/Demarc

A

Special types of equipment rooms marking the point at which external cabling (outside plant) is joined to internal (premises) cabling. These are required to join the access provider’s network and for inter-building communications. The demarcation point is where the access provider’s network terminates and the organization’s network begins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

punchdown block

A

comprises a large number of insulation-displacement connection (IDC) terminals
The IDC contains contacts that cut the insulation from a wire and hold it in place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Copper wire termination

A

terminated using a distribution frame or punchdown block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

66 block

A

older distribution frame used to terminate telephone cabling and legacy data applications(pre CAT5)
50rows of 4 IDC terminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

110 block

A

(developed by AT&T) is a type of distribution frame supporting 100 MHz operation (Cat 5) and better

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

punchdown tool

A

used to terminate fixed cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

cable crimper

A

used to create patch cords
fixes a plug to a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

block tool

A

terminates a group of connectors in one action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

fusion splicer

A

permanent joint with lower insertion loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Small Form Factor Pluggable (SFP)

A

uses LC connectors and is also designed for Gigabit Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Enhanced SFP (SFP+)

A

updated specification to support 10 GbE but still uses the LC form factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Multi-Source Agreement (MSA)

A

ensure that a transceiver from one vendor is compatible with the switch/router module of another vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Quad small form-factor pluggable (QSFP)

A

Quad small form-factor pluggable (QSFP) is a transceiver form factor that supports 4 x 1 Gbps links, typically aggregated to a single 4 Gbps channel. Enhanced quad small form-factor pluggable (QSFP+) is designed to support 40 GbE by provisioning 4 x 10 Gbps links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Wavelength Division Multiplexing (WDM)

A

means of using a strand to transmit and/or receive more than one channel at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Bidirectional (BiDi) transceivers

A

support transmit and receive signals over the same strand of fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Coarse Wavelength Division Multiplexing (CWDM)

A

supports up to 16 wavelengths and is typically used to deploy four or eight bidirectional channels over a single fiber strand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Dense Wavelength Division Multiplexing (DWDM)

A

provisions greater numbers of channels (20, 40, 80, or 160). This means that there is much less spacing between each channel and requires more precise and expensive lasers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

point-to-point WDM topology

A

each transceiver is cabled to a multiplexer/demultiplexer (mux/demux). The single fiber strand is run to a mux/demux at the other site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

optical add/drop multiplexers (OADM)

A

can insert and remove signals for a particular wavelength channel on a ring topology

90
Q

repeater

A

overcomes the distance limitation by boosting the signal at some point along the cable run
works at the physical layer 1

91
Q

media converter

A

used to transition from one cable type to another

92
Q

The following media conversions are typical:

A

Single mode fiber to twisted pair—These powered converters change light signals from SMF cabling into electrical signals carried over a copper wire Ethernet network (and vice versa).
Multimode fiber to twisted pair—A different media converter model is required to convert the light signals carried over MMF media.
Single mode to multimode fiber—These passive (unpowered) devices convert between the two fiber cabling types.

93
Q

hub

A

each end system node is wired to a central intermediate system
All node interfaces are half-duplex, using the CSMA/CD protocol, and the media bandwidth (10 Mbps or 100 Mbps) is shared between all nodes.

94
Q

bridges

A

An Ethernet bridge works at the data link layer (layer 2) to establish separate physical network segments while keeping all nodes in the same logical network. This reduces the number of collisions caused by having too many nodes contending for access.

95
Q

Layer 2 switch

A

performs the same sort of function as a bridge, but in a more granular way and for many more ports than are supported by bridges. Each switch port is a separate collision domain. Gigabit Ethernet and Ethernet 10 GbE cannot be deployed without using switches.

96
Q

microsegmentation

A

the switch establishes a point-to-point link between any two network nodes

97
Q

heather fields in an ethernet frame:

A

Preamble | SFD | Destination MAC | Source MAC | Ether Type |Payload | FCS

98
Q

the preamble and SFD in an ethernet frame are used for:

A

clock synchronization and as part of the CSMA/CD protocol to identify collisions early.

99
Q

Cyclic Redundancy Check (CRC) or Frame Check Sequence (FCS)

A

error checking field contains a 32-bit (4-byte) checksum

100
Q

A MAC/EUI address

A

48 bit (6 byte) identifier

101
Q

I/G bit

A

The I/G bit of a MAC address determines whether the frame is addressed to an individual node (0) or a group (1).

102
Q

Address Resolution Protocol (ARP)

A

determine which MAC address is associated with an IP address on the local network

103
Q

Internet Control Message Protocol (ICMP)

A

used to report errors and send messages about the delivery of a packet

104
Q

ping

A

utility sends a configurable number and size of ICMP request packets to a destination host

105
Q

INCORRECT DNS ISSUES

A

If you can successfully perform all connectivity tests by IP address but cannot ping by host name, then this suggests a name resolution problem.

106
Q

routing table

A

stores info about the location of other IP networks and hosts

107
Q

The following main parameters define a routing entry:

A

Protocol - source of the route
Destination - most specific des prefix(longest mask) will be selected as the forwarding path if there is more than one match
Interface - used to forward a packet along the chosen route can be represented as IP address of interface or layer 2 interface ID
Gateway/next hop - IP address of next router along the path to destination

108
Q

directly connected routes

A

IP network or subnet for each active router interface is automatically added to the routing table

109
Q

static routes

A

manually added to the routing table and only changes if edited by the administrator

110
Q

default route

A

special type of static route that identifies the next hop router for a destination that cannot be matched by another routing entry

destination address 0.0.0.0/0 (IPv4) or ::/0 (IPv6) is used to represent default route

111
Q

If the packet can be delivered to a directly connected network via an Ethernet interface, the router uses ______ or ______ to determine the interface address of the destination host.

A

ARP (IPv4) or Neighbor Discovery (ND in IPv6)

112
Q

If the packet can be forwarded via a gateway over an Ethernet interface, it ___________________ into the new frame.

A

inserts the next hop router’s MAC address

113
Q

If the packet can be forwarded via a gateway over another type of interface (leased line or DSL, for instance), _______________ in an appropriate frame type.

A

the router encapsulates the packet

114
Q

If the destination address cannot be matched to a route entry, the packet is either ________________________________________.

A

forwarded via the default route or dropped(and the source host is notified that it was undeliverable).

115
Q

hop count

A

each router along a packet’s path counts as one hop

116
Q

Time To Live (TTL)

A

number of secs a packet can stay on the network without being discarded when TTL 0 the packet is discarded to prevent badly addressed packets from permanently circulating the network

117
Q

fragmentation IPv4 vs IPv6

A

IPv4 the ID, flags and fragment offset IP header fields are used to record the sequence in which the packets were sent and if the IP diagram has been split between frames
IPv6 does not allow routers to perform fragmentation. The host performs path MTU discovery to see if it fits the MTU and crafts IP diagrams that will fit the smallest MTU.

118
Q
A
119
Q

Dynamic routing protocol

A

uses an algorithm and metrics to build and maintain a routing information base

120
Q

Learned route

A

A route that was communicated to a router by another router

121
Q

Distance vector

A

Algorithm used by routing protocols that select a forwarding path based on the next hop router with the lowest hop count to the destination network.

122
Q

Convergence

A

Process whereby routers running dynamic algorithms agree on the network topology

123
Q

Autonomous system number

A

A network under the administrative control of a single owner

124
Q

Interior Gateway Protocol IGP

A

Identifies routes with an AS

125
Q

Exterior Gateway Protocol

A

advertise routes between autonomous systems replaced by BGP

126
Q

Routing Information Protocol RIP

A

Distance Vector
IGP
UDP (port 520 or 521)
highest AD

127
Q

Enhanced Interior Gateway Routing Protocol (EIGRP)

A

Distance Vector/Hybrid
IGP
Native IP (88)
uses bandwidth and delay as default elements
sends updates when first establishes with network and when topology changes using multicast addresing

128
Q

Open Shortest Path First (OSPF)

A

Link State
suited for large organizations with multiple redundant paths between networks
Hierarchical
IGP
Native IP (89)

129
Q

Boarded Gateway Protocol BGP

A

Path Vector
EGP
TCP (port 179)
allows comms with routers in separate autonomous systems
BGP within AS referred to as IBGP
BGP between AS referred to as EBGP

130
Q

to help prevent looping the maximum hop count in RIP allowed is

A

15

131
Q

RIP Versions

A

RIPv1
RIPv2
RIPng (next generation)

132
Q

RIPv1

A

classful protocol and uses inefficient broadcasts to communicate updates over UDP port 520

133
Q

RIPv2

A

supports classless addressing, authentication, and uses more efficient multicast transmissions over UDP port 520.

134
Q

RIPng

A

version of protocol designed for IPv6 uses UDP port 521

135
Q

maximum hop count allowed in EIGRP is

A

255

136
Q

link state vs distance vector algorithm

A

link state uses a topology table of the whole network to select routes vs distance vector chooses the closest router and selects its route that way
link state more expensive than distance vector

137
Q

Network Layer Reachability Information (NLRI)

A

classless network prefixes that BGP works with

138
Q

Classless Inter-Domain Routing (CIDR)

A

CIDR also known as “supernetting” uses bits normally assigned to the network ID to mask the complexity of the subnet and host addressing scheme within that network

139
Q

Variable Length Subnet Masking (VLSM)

A

allows to allocate ranges of IP addresses to subnets that match the predicted need for numbers of subnets and hosts per subnet more closely

140
Q

edge routers

A

placed at the network perimeter
provides access to the internet
can do framing to repackage data from WAN to private LAN

141
Q

internal routers

A

no public interface
designed to implement required network topology

142
Q

subinterfaces/ virtual interface

A

configuring a router physical interface with multiple virtual interfaces connected to a separate virtual LAN (VLAN) ID over a trunk

143
Q

Layer 3 Switch

A

optimized for routing between VLANs
can use static and dynamic routing to identify which VLAN an IP address should be forwarded to

144
Q

route command

A

used to view and modify the routing table of end system

145
Q

traceroute tool (linux)

A

allows to test the path between two nodes with a view to isolating the node or link that is causing the issue
uses UDP probe by default

146
Q

tracert command (windows)

A

uses ICMP echo request probes by default
allows to test the path between two nodes with a view to isolating the node or link that is causing the issue

147
Q

optical link budget

A

the amount of loss suffered by all components along a fiber transmission path calculated by using attenuation, connectors, and splices.

148
Q

client server vs peer to peer networks

A

client server some nodes act as clients and servers are more powerful computers vs peer to peer network each end system acts as both client and server

149
Q

Local Area Network (LAN)

A

confined to a single geo location

150
Q

Campus Area Network (CAN)

A

LAN that spans multiple nearby bldgs

151
Q

datacenter

A

network hosts only servers and storage

152
Q

Wireless Local Area Network (WLAN)

A

LANs based on Wi-Fi
public WAN referred to as hotspots

153
Q

Wide Area Network (WAN)

A

network of networks connected by long distance links

154
Q

Metropolitan Area Network (MAN)

A

smaller than WAN city wide network encompassing multiple bldgs

155
Q

Personal Area Network (PAN)

A

a person might establish a close range network between devices such as phones, tablets, headsets, and printers

156
Q

network topology

A

describes the physical or logical structure of the network in terms of nodes and links

157
Q

physical network topology

A

describes placement of nodes and how connected by the network media

158
Q

logical network topology

A

flow of data through network

159
Q

point to point link

A

single link established between two nodes
can be physical or logical topology

160
Q

star topology

A

each endpoint is connected to a centra forwarding node such as a hub,switch, router

161
Q

hub and spoke topology

A

Network connectivity between multiple virtual private clouds where one virtual private cloud (VPC) acts as a hub and the other VPCs are peered with it but not with each other.

162
Q

mesh topology

A

commonly used in WAN
each device has point to point link with every other device on the network
excellent redundancy

163
Q

partial mesh networks

A

provisioning so many interfaces links can be difficult so with partial mesh nodes can forward packets to a destination by learning the network topology
packets can take multiple routes through network

164
Q

ring topology

A

each node is wired to its neighbor in a closed loop

165
Q

bus topology

A

all nodes attached directly to a single segment
a fault on the cable and nodes are unable to communicate

166
Q

hybrid topology

A

mixture of 2 or more topologies

167
Q

hierarchical star

A

also known as tree topology
corporate networks are often designed in a hierarchical

168
Q

three tiered network hierarchy

A

access, distribution, and core

169
Q

access or edge layer

A

allows end user service, such as computers, printers, and smartphones to connect to network

170
Q

distribution/aggregation layer

A

provides fault tolerant interconnections between different access blocks and either the core or other distribution blocks

171
Q

application specific integrated circuit (ASIC)

A

while a router uses a generic processor and firmware to process incoming packets a layer 3 switch uses ASIC

172
Q

core layer

A

provides a highly available backbone
provides redundant traffic paths

173
Q

spanning tree protocol (STP)

A

means for bridges or switches to organize themselves into a hierarchy
operates by default if supported by switch

174
Q

root port

A

port that forwards up to the root via intermediate switches

175
Q

designated port

A

port that can forward traffic down through the network with the least cost

176
Q

blocking or non designated port

A

creates a loop

177
Q

rapid spanning tree protocol (RSTP)

A

creates outages of a few seconds or less
blocking, listening, and disabled states are aggregated into a discarding state

178
Q

switching loop

A

where flooded frames circulate the network perpetually

179
Q

broadcast storm

A

traffic that is recirculated and amplified by loops in a switching topology causing network slowdowns and crashing swiches

180
Q

If a broadcast storm occurs on a network where STP is enabled, investigate the potential causes:

A

Verify compatible versions of STP are enabled on all switches.

Verify the physical config of segments that use the legacy equipment, such as ethernet hubs.

Investigate networking devices in the user environment and verify that they are not connected as part of a loop. Typical sources problems include unmanaged desktop switches and VoIP handsets.

181
Q

TCP

A

Transmission Control Protocol provides guaranteed comms using acknowledgements to ensure delivery.
Unicast only

182
Q

Main Fields of a TCP segment are:

A

Source Port, Destination Port, Sequence Number, Ack Number, Data Length, Flags, Window, Checksum, Urgent Pointer, Options

183
Q

TCP three way handshare

A

SYN, SYN-ACK, ACK

184
Q

TCP Connection Teardown

A

FIN, ACK, ACK

185
Q

How to observe TCP connections

A

use netstat tool

186
Q

User Datagram Protocol (UDP)

A

nonguaranteed method of comms with no ack or flow control

use with multicast and broadcast

187
Q

structure of UDP datagram

A

Source Port, Destination Port, Message Length, Checksum

188
Q

UDP vs TCP header size

A

UDP header size is 8 and TCP is 20 bytes or more

189
Q

IP scanner

A

tool that performs host discovery and can establish the overall logical topology of the network in terms of subnets and routers

190
Q

nmap

A

used for IP scanning

191
Q

netstat

A

allows to check the state of ports on the local host

192
Q

port scanner

A

utility that can probe a host to enumerate the status of TCP and UDP ports

193
Q

protocol analyzer

A

utility that can parse the header and payloads of protocols in captured frames for display and analysis

194
Q

DHCP

A

automatic method of assigning IP addresses to hosts

195
Q

scope

A

range of addresses and options configured for a single subnet

196
Q

reservation

A

mapping of a MAC address or interface ID to a specific IP address within the DHCP server’s address pool

197
Q

DHCP relay

A

agent configured to provide forwarding of DHCP traffic between subnets

198
Q

IP helper

A

can be configured on routers to allow set types of broadcast traffic to be forwarded to an interface

199
Q

SLAAC

A

IPV6 stateless address autoconfiguration can locate routers and generate host address with a suitable net prefix automatically

200
Q

ff02::1:2

A

used to discover a DHCP server

201
Q

host name

A

assigned to a computer by administrator unique on the local network

202
Q

fully qualified domain name

A

provides a unique identity for the host belonging to a particular network

203
Q

domain name system (DNS)

A

global hierarchy of distributed name server databases that contain information on domains and hosts within those domains

204
Q

iterative lookups

A

DNS query type whereby a server responds with information from its own data store only

205
Q

recursive lookup

A

DNS query type whereby a server submits additional queries to other servers to obtain the requested information

206
Q

resource records

A

allows DNS name server to resolve queries for names and services hosted in the domain into IP addresses

207
Q

auhtorative name server

A

DNS server designated by a name server record for the domain that holds a complete copy of zone records

208
Q

forward lookup vs reverse lookup zones

A

forward lookup zones can contain records listed previously
a reverse DNS query returns the host name associated with given IP address the info is stored as PTR

209
Q

Sender Policy Framework (SPF) and DomainKeys Identified Email (DKIM)

A

used to validate the origin of email and reject spam configured in DNS as txt records

210
Q

primary DNS zones

A

zone records held on the server are editable

211
Q

secondary DNS zones

A

server holds a read only copy of the zone

212
Q

cache DNS only

A

dont maintain a zone

213
Q

authoritative DNS

A

holds complete records for a domain

214
Q

DNS spoofing

A

attacker is able to supply a false name resolution to clients

215
Q

internal DNS

A

domains used on the private network only

216
Q

external DNS

A

records that internet clients must be able to access

217
Q

nslookup

A

cross-platform command tool for querying DNS resource records

218
Q

dig

A

domain information groper is a utility to query a DNS and return info about a particular domain name

219
Q

recursive DNS lookup

A

if the queried server is not authoritative, it does take on the task of querying other name servers until it finds the requested record or times out

220
Q

iterative DNS lookup

A

a name server responds to a query with either the requested record or the address of a name server at a lower level in the hierarchy that is authoritative for the namespace

221
Q
A