Network Services Flashcards

1
Q

AAA Framework

A

A framework for intelligently controlling access to networks and systems through authentication, authorization, and accounting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Accounting

A

Part of the AAA framework that is a record-keeping mechanism, recording user actions on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Part of the AAA framework that involves the unique identifying information for each user of a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorization

A

Part of the AAA framework that involves what a particular user is allowed to do on a system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Best Effort

A

The least strict QoS category using a first in, first out manner in which packets are not reordered in any way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Class of Service (CoS)

A

A mechanism for managing traffic in a network by grouping similar types of traffic together and treating each class with its own level of priority. For example, voice and video traffic is more sensitive to latency than email traffic, and therefore would be given a higher CoS priority value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Class-Based Weighted Fair Queuing (WFQ)

A

An extension to the Weighted Fair Queuing (WFQ) functionality that provides support for user-defined traffic classes based on match criteria, such as protocols, access control lists (ACLs), and input interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classification and Marking

A

A QoS mechanism used for identifying traffic flows and assigning markings within the packet headers, which are used to group them together. This is recommended to happen as close to the source of the traffic as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Committed Burst (Bc)

A

The amount of traffic in bits (for shaping) or bytes (for policing) that are deposited into the token bucket during a timing interval, used for Committed Information Rate (CIR) calculation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Committed Information Rate (CIR)

A

The average speed of data in the network over a period of one second. This can be calculated by dividing the Committed Burt rate (Bc) by the Timing Interval (Tc), or CIR = Bc / Tc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Congestion Avoidance

A

A QoS mechanism used to prevent a queue from filling to capacity, which will happen if the rate of ingress traffic is greater than the rate at which the traffic can be successfully processed on an egress interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Device Hardening

A

The process of applying a collection of best practice procedures in order to secure a network device, such as disabling unnecessary services or closing unneeded ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Differentiated Services Code Point (DSCP)

A

A 6-bit code found within a Type of Service (ToS) byte that is used for traffic classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DiffServ

A

The most commonly used QoS category, used to differentiate between network flows and assign specific policies to those flows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dynamic Network Address Translation (NAT)

A

A version of NAT which maps a private IP address to a public IP address from an available group of public IP addresses, known as a NAT pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explicit Congestion Notification (ECN)

A

The final 2 bits in a Type of Service (ToS) byte used to notify networks about congestion, with the goal of reducing packet loss and delay by decreasing the transmission rate until the congestion clears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

File Transfer Protocol (FTP)

A

A client-server protocol used to transfer files between systems using authentication with the TCP protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

FTP with SSL (FTPS)

A

A variant of File Transfer Protocol (FTP) that uses Secure Sockets Layer (SSL) technology to provide encryption, in addition to the authentication offered by FTP. This requires a valid SSL certificate in order to function correctly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Generic Routing Encapsulation (GRE)

A

A very flexible type of VPN tunnel that can encapsulate nearly any type of data, but does not provide any data security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Global Synchronization

A

Also referred to as TCP Synchronization, this is a situation that occurs when all flows within a network simultaneously experience TCP Slow Start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Honeypot Deployment

A

The tactic of configuring vulnerable decoy hosts or networks that do not contain sensitive information, in order to redirect malicious attacks away from critical infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IEEE 802.1p Marking

A

The additional 4 bytes added to a frame in order to indicate a Layer 2 priority using a Class of Service (CoS) value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Inside Global Address

A

A public IP address that represents one or more inside local IP addresses to the outside world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Inside Local Address

A

A private IP address that is assigned to a host in the inside, local network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IntServ

A

The most strict QoS category, which creates strict bandwidth reservations for specific applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

IP Security (IPsec)

A

Used as the primary protocol of the Internet, IPsec provides a tunnel with added features of confidentiality, integrity, authentication, and anti-replay.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Low Latency Queuing (LLQ)

A

An extension of Class-Based Weighted Fair Queuing (CBWFQ) that adds a priority queue to the scheduler in order to provide guaranteed bandwidth and low delay.

28
Q

Management Information Base (MIB)

A

A database found on an SNMP agent containing multiple object identifiers (OIDs) used for monitoring.

29
Q

Multi-factor Authentication (MFA)

A

A technique for providing security that requires multiple methods of authentication from a user.

30
Q

Network Address Translation (NAT)

A

The translation of a private, internal IP address into a public, external IP address that is reachable over the Internet.

31
Q

Network Segmentation

A

Logically subdividing a network into different segments through the use of VLANs and DMZs, in an attempt to prevent specific users from accessing specific network resources.

32
Q

Network Time Protocol (NTP)

A

A protocol used to synchronize clocks to a central time reference source. This protocol communicates using UDP port 123.

33
Q

Object Identifier (OID)

A

A component of a device’s Management Information Base (MIB) that identifies the current status of a particular device characteristic, such as temperature.

34
Q

Outside Global Address

A

The translated address of an outside host as seen from the outside network.

35
Q

Outside Local Address

A

The translated address of an outside host as seen from the inside network.

36
Q

Penetration Testing

A

Methods of launching an authorized attack on your own network in order to evaluate its level of security.

37
Q

Per-Hop Behaviors (PHBs)

A

A collection of 21 DSCP values selected by the IEFT, each of which have a unique name, relative priority value, and a drop profile used by Weighted Random Early Detection (WRED).

38
Q

Policing

A

A QoS mechanism that drops traffic when it violates a particular QoS policy.

39
Q

Port Address Translation (PAT)

A

An extension of Network Address Translation (NAT) that permits multiple private IP addresses to be translated into a single public IP address, with a different port assigned to each translation. Also referred to as NAT Overload.

40
Q

Port Mapping

A

An extension of static NAT that allows external access to protected, inside network hosts by remapping the destination IP address and port number of the communication.

41
Q

Quality of Service (QoS)

A

Guidelines used to ensure dependable network performance by addressing concerns such as bandwidth, latency, and error rates.

42
Q

Queuing

A

A QoS mechanism used to store traffic until it can be processed. This often involves creating multiple queues for different traffic types and assigning traffic to these specific queues.

43
Q

RADIUS

A

An open-standard protocol used to provide AAA services for controlling network access. RADIUS combines AAA services into a single function and used UDP communication, encrypting only the password.

44
Q

Remote Access VPN

A

A method of allowing individual users to remotely access a private network through use of a VPN tunnel, typically requiring client software to be installed that is used to initiate tunnel formation. One VPN tunnel is required for each user connecting back to the network.

45
Q

Role Separation

A

The principle of assigning different sets of permissions to different categories of users, in an attempt to prevent conflicts of interest.

46
Q

Secure FTP (SFTP)

A

A variant of File Transfer Protocol (FTP) that uses Secure Shell (SSH) to send FTP information securely.

47
Q

Shaping

A

A QoS mechanism that delays excess traffic using a buffer, or queuing mechanism, in order to hold packets and shape the flow when the date rate is higher than expected.

48
Q

Simple Network Management Protocol (SNMP)

A

An application layer protocol used to manage and monitor network devices across multiple manufacturers or vendors.

49
Q

Site-to-Site VPN

A

A method of connecting geographically separated networks over broadband through use of an IPsec tunnel. This connection would be transparent to client devices, and would pass multiple clients traffic over a single tunnel.

50
Q

SNMP Agent

A

A local network device being monitored by a central SNMP manager, sending information to the manager through trap notifications.

51
Q

SNMP Community String

A

A component found in SNMP that functions similar to a user ID or a password. If the community string is the same on both sides of an SNMP communication, the requested information is successfully passed along.

52
Q

SNMP EngineID

A

A hexadecimal value assigned an SNMP entity, used only in SNMP version 3. The EngineID must be a unique value on the network, and is used to generate a key for authenticated messages.

53
Q

SNMP Manager

A

A centralized SNMP device that monitors and retrieves information from SNMP agents, arriving as trap notifications.

54
Q

SNMP Trap

A

A notification event sent by an SNMP agent back to the SNMP manager, triggered by a specific condition on the device. Common SNMP Trap notifications include power loss, hardware failure, and other major events.

55
Q

SNMP version 1

A

The oldest version of SNMP using plaintext authentication, lacking in the area of security.

56
Q

SNMP version 2c

A

A sub-version of SNMP version 2 which added an Inform command, where an SNMP manager would send out an Inform reply to an SNMP agent upon the receipt of an SNMP Trap. This version still uses plaintext authentication.

57
Q

SNMP version 3

A

An update to SNMP featuring enhanced security through encryption, integrity checking, and authentication services. SNMP version 3 uses an EngineID to identify each SNMP entity.

58
Q

Static Network Address Translation (NAT)

A

A version of NAT that creates a one-to-one mapping of a private IP address to a public IP address.

59
Q

Stratum

A

A stratum number is used to measure the trustworthiness of a time source in NTP. Stratum 0 devices are the most accurate, including atomic and GPS clocks.

60
Q

Syslog

A

A standard messaging protocol allowing for the monitoring of multiple device status regardless of manufacturer or vendor. Syslog severity ranges from Level 0 to 7, Level 0 being the most severe emergency condition and Level 7 representing troubleshooting or debugging information.

61
Q

TACACS+

A

A Cisco-proprietary protocol used to provide AAA services for controlling network access. TACACS+ separates all AAA functions and uses TCP communication, encrypting the entire packet.

62
Q

TCP Slow Start

A

A situation that occurs when a single TCP communication flow reduces its window size.

63
Q

Timing Interval (Tc)

A

The interval at which tokens are deposited in the token bucket, used for Committed Information Rate (CIR) calculation.

64
Q

Trivial File Transfer Protocol (TFTP)

A

A client-server protocol used to transfer files between systems with no authentication using the UDP protocol. A common use is in VoIP deployments, where a Cisco IP phone boots up and downloads a configuration file from a TFTP server.

65
Q

Type of Service (ToS) Byte

A

The additional 8 bits (1 byte) added to a frame in order to indicate a Type of Service (ToS) priority value. These markings are indicated at Layer 3, which are able to cross a router boundary where Class of Service (CoS) markings cannot.

66
Q

Weighted Fair Queuing (WFQ)

A

A legacy queuing mechanism recommended for the default traffic class. WFQ does not allow any one application to dominate the use of network bandwidth.

67
Q

Weighted Random Early Detection (WRED)

A

A QoS congestion avoidance mechanism that can start dropping random packets when a queue depth exceeds a specific threshold