Network Fundamentals Flashcards
Fundamentals from ITPRO
Name The command line Commands to see the ip address configurations
Ipconfig
ifconfig - linux
ip address - latest linux
trongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used with individual usernames and passwords for each client. MAC filtering does not use a password or preshared key. WEP uses a pre-shared key to secure a wireless network, but WPA uses a stronger encryption standard than WEP.
You are working as a network administrator and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal?
Port security, also known as persistent MAC learning or Sticky MAC, is a security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online. This is a security feature that can be used to prevent someone from unplugging their office computer and connecting their laptop to the network jack without permission since the switch port connected to that network jack would only allow the computer with the original MAC address to gain connectivity.
Applications layer
Upper Layer
Provides application network access
dhcp, dns, ftp, smtp, pop3
presentation layer
Upper Layer
Formats application
ssl, ssh, compression, encryption, decryption, encoding
session layer
upper layer
establishes, maintains and terminates session communication
netbios, rpc, smb, sockets
Transport layer
lower layer
tcp/udp
sequencing and segmentation unless UDP
Network Layer
lower layer
Routing, Logical Addressing
IP,ICMP,NAT,OSPF
Data Link Layer
lower layer
flow control, acknowledgements,
detection
determine access to the media
sub layers:
Logical Link control(LLC)
Media Access Control(MAC)
Ethernet, ATM, MPLS, PPP, STP
Physical
Lower Layer
Electrical and Mechanical
Copper, Fiber, IEEE, 1394, BASE standards
how many headers on a Frame
layer 6 through layer 2 and then its handed off to be sent across physical media
data unit on network/data link
packet on the network
frame on the data
data on layer 7
payload - the data as it begins the encapsulation process as it moves down the osi stack
what is being added to the data on layer 4
the tcp/udp headers are added
what is being added to the data on layer 3
ip header
what is being added to the data on layer 2
Ethernet Header
What is an MTU?
The size of the frame
Network Topologies
the way links and nodes are arranged
the layout of the components that make up a network
Topology:
backbone cable
nodes are linking in
terminators on both ends
Vampire taps
broadcasts to all machines
Bus
Topology
connected in a circle or token
deterministic
Talking Stick
one computer goes down and they all go down
Ring
Topology
all devices are connected to the central device
if a node goes down it doesnt drop the signal
there is a single point of failure
Star
Can WAN’s connect other LAN’s together?
YES
MPLS Network
Multiple networks connected through the ISP’s network
Storage that is needed to be accessed at high speeds across the network when people need Data fast and quick
Storage Area Network(SAN)
Creating a logical representation of a component through software or
recreating a pc part in a virtual environment
Virtualization
- virtual machines
-virtual network devices
-virtual network devices such as firewall, switches, or routers