Other Concepts Flashcards
Study other concepts from N10-009
Multimeter
primarily used for testing power supplies, both AC and DC
for high voltage, AC mode is used
can also be used with DC but usually with a range under 27 volts
(from practice questions on lognpacific)
nmap
1) scan open and closed ports on a remote system for audits
2) validate firewall is open to accept requests from an application
3) scan all ports from a specific host or range of hosts
4) negotiate w/ TLS to discover the encryption key strength used
What is the first step towards tracking down a rough DHCP server?
Identify its IP address by using ipconfig on the affected machine
Routing table symbol “S*”
will appear at the beginning of a routing table entry
indicates that it is a static (S) route and default gateway - any traffic that does not specifically match any other routing table entries will be sent through here
3 Tiered Network Architecture
1) Core - servers, web apps, databases, etc.
2) Distribution - midpoint between enduser and core resources, comm. btw switches, manages the path to the end user
3) Access - where the end user connects, end stations, printers, etc.
Collapsed Core Network Architecture
2 Tier model
combines the ‘Core’ and ‘Distribution’ into one layer
This option is simplified and less expensive than 3 Tiered, but there are less options for redundancy
VXLAN
Virtually Extensible LAN
i.e. connecting different data cents together - they may have different connectivity (copper vs fiber) or different IP schemes but regardless their apps and traffic need to flow
There would be a switch in one data center with a VXLAN tunnel endpoint that routes the traffic to another data center with a similar switch that has a VXLAN tunnel
They are like VLANS, but VLANs are more limited in the number and size, and also are Layer 2 which is non-routable, whereas VXLAN are Layer 3
Jumbo frames
up to 9216 bytes
usually 9000 bytes is the accepted high end
Ethernet frames by default are 1500 bytes
WEP
Wired Equivalence Privacy
RC4 stream cipher for authn and encryption, with a 24 bit initialization vector (IV), and 64-bit or 128-bit keys
static master key must be manually entered into each device
WPA
WiFi Protected Access
interim standard when developing something better than WEP
also based on RC4 but introduced TKIP (Temporal Key Integrity Protocol)
WPA2
ratified by IEEE in 2004 as 802.11i
uses AES encryption and CCMP (Counter Mode with Cipher Block Chaining Message)
backwards compatible with WPA - it supports TKIP as a fallback for devices that don’t support CCMP
introduced more seamless roaming with Pairwise Master Key (PMK) caching or pre-authn when moving between access points
WPA3
mandates the adoption of Protected Management Frames
standardizes 128-bit encryption suite
Personal uses AES-128 and CCMP-128
replaces WPA2’s PSK 4-way handshake with Simultaneous Authn of Equals (SAE)
GCMHP and GMAC -> something mentioned by Professor Messer that I have to get more info about