Other Questions Flashcards
What is ARP?
Address Resolution Protocol
Used to map IP network addresses to the MAC addresses used by a data link protocol
Given the following network address: 192.168.1.0/25, what is the last usable IP address in this subnet?
Also explain why?
192.168.1.126
/25 means 128 IP addresses
Minus 2 for the network address and the broadcast address
A network engineer needs to create subnets within a Class A network. The engineer decides to use a certain subnet mask. How many possible hosts are available per subnet if the subnet mask is 255.255.0.0?
Also explain why?
65534 possible hosts
Class A network with a subnet mask 255.255.0.0 means /16 subnet. This means there are 16 bits available for host addresses (32 total bits - 16 network bits = 16 host bits). The formula to calculate the number of hosts is 2^n - 2, where n is the number of host bits. In this case, 2^16 - 2 = 65536 - 2 = 65534 hosts. The ‘-2’ accounts for the network and broadcast addresses
What is traffic shaping?
AKA Packet Shaping
A congestion management method that controls bandwidth usage by network traffic. It can be used to prioritize, limit, or guarantee bandwidth to specific traffic types to prevent network congestion
delaying certain packet types—based on their content—to ensure that other packets have a higher priority. This can help to ensure that latency is reduced for critical applications.
Which topology provides the highest redundancy?
Mesh
Each network node is connected to every other node. If one connection fails, there are still multiple paths for data to take.
What is the ‘dig’ command?
Domain Information Grouper
Used in Linux to troubleshoot DNS related issues. It can be used to pull up a wealth of DNS record information, which can help determine where a problem might lie.
True or False:
The “ping” command uses the ICMP protocol to test network connectivity
True
The ping command does use the Internet Control Message Protocol (ICMP). It works by sending ICMP Echo Request packets to the target host and waiting for an Echo Reply, testing network connectivity and response time.
What is IPSec?
Internet Protocol Security
Provides security at the network layer, including data encryption and secure communication between hosts
What is CRC?
Cyclical Redundancy Check
These errors usually indicate a problem with the cabling or a faulty port, as they are generally related to physical layer issues
nslookup
Command-line tool is best used to diagnose DNS servers. It can help find DNS details, like IP addresses of a particular computer, or the domain name and IP address of the DNS server for a particular organization.
MPLS
Multiprotocol Label Switching
Uses label-switching routers and label-edge routers to forward packets.
MPLS is a protocol-agnostic routing technique designed to speed up and shape traffic flows across enterprise wide area and service provider networks
QoS
SLA
Service Level Agreement
Define the level of service expected by a customer from a supplier, laying out the metrics by which that service is measured, and the remedies or penalties, if any, should the agreed-upon levels not be achieved
APIPA
Automatic Private IP Addressing
-when a DHCP server can’t be contacted.
169.254.0.1 - 169.254.255.254
Troubleshooting Methodology
Identify the problem
Establish a theory of probable cause
Test the theory to determine the cause
Establish Plan of Action
Implement Solution
Verifying full system functionality Document findings
OSI Model Layers
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
What is the purpose of the Time-to-Live (TTL) field in an IP packet?
The TTL field in an IP packet is decremented by one each time the packet passes through a router. If the TTL field reaches zero, the packet is discarded, preventing it from looping indefinitely around the network.
What is the purpose of Spanning Tree Protocol (STP) in a local area network (LAN)?
Spanning Tree Protocol (STP) is a network protocol that prevents switching loops (also known as bridge loops), which can cause broadcast radiation, by creating a spanning tree within networks that have redundant paths.
Port 53
DNS
(query and zone transfers)
Port 443
HTTPS
What is a typical function of a load balancer?
Load balancers distribute network traffic across multiple servers to ensure no single server becomes overwhelmed with too much traffic.
OSPF
Open Shortest Path First
An interior gateway protocol used to exchange routing information within a single Autonomous System (AS).
BGP
Border Gateway Protocol
An exterior gateway protocol typically used to route traffic between different AS.
Port 25
SMTP
Simple Mail Transfer Protocol
Port 161
SNMP
System Network Management Protocol
Which routing protocol uses the DUAL algorithm to build and maintain routing tables?
Enhanced Interior Gateway Routing Protocol (EIGRP) uses the Diffusing Update Algorithm (DUAL) to create and manage routing tables and ensure there are no routing loops.
True or False:
A company implemented a VPN to secure remote access to its network. This solution alone will guarantee that data cannot be intercepted during transmission.
False
While a VPN does encrypt data for secure transmission, it alone does not guarantee that data cannot be intercepted. There are still potential vulnerabilities like a man-in-the-middle attack or malware on a user’s computer. Other security measures should be in place to ensure comprehensive network security.
Port 20
FTP
Port 21
FTP Secure
Port 22
SSH
Port 23
Telnet
Port 67
DHCP Server
Port 68
DHCP Client
Port 69
Trivial File Transfer Protocol
Port 80
HTTP
Port 110
POP3
Port 123
NTP (Network Time Protocol)
Port 143
IMAP
Port 161
SNMP
Port 389
LDAP
Lightweight Directiroy Access Protocol
Port 445
SMB
Server Message Block
Port 514
Syslog
Port 587
SMTP TLS
Port 636
LDAPS
Port 993
IMAP SSL
Port 995
POP3 SSL
Port 1433
SQL
Port 1521
SQLNet
Port 3306
MySQL
Port 3389
RDP
Port 5060/5061
Session Initiation Protocol
802.11a
5GHz, 54Mbps
802.11b
2.4GHz, 11Mbps
Frequency issues
802.11g
2.4GHz, 54Mbps
Backwards compatible w/802.11b
Frequency issues
802.11n
2.4GHz or 5GHz
600Mbps
40MHz channel
MIMO
802.11ac
5GHz
160MHz
Eight MU-MIMO streams
7Gbps
802.11ax
2.4GHz or 5GHz
20, 40, 80, and 160 MHz
1,201 Mbps
OFDMA
What is ATM?
Asynchronous Transfer Mode
What are SFP, SFP+ and QSFP?
Types of transceivers
SFP (Small Form-factor Pluggable)- Eletrical to Optical
SFP+(Enhanced
True or False:
In modern Ethernet networks, a twisted-pair copper cable can have a TIA/EIA-568A standard on one end and TIA/EIA-568B standard on the opposite end forms
False
Shielded Twisted-Pair (STP) cabling reduces what kind of interference?
Crosstalk and EMI
What is the Three Way Handshake for TCP?
1- Client SYN
2- SYN/ACK
3- Client ACK
On-path attack
Formerly man-in-the-middle attacks
a specific type of spoofing attack where a threat actor
compromises the connection between two hosts and transparently intercepts and
relays all communications between them. The threat actor might also have the
opportunity to modify the traffic before relaying it.
DoS attack
Denial of Service
causes a service at a given host to fail or to
become unavailable to legitimate users. Resource exhaustion DoS attacks focus
on overloading a service by using up CPU, system RAM, disk space, or network
bandwidth. It is also possible for DoS attacks to exploit design failures or other
vulnerabilities in application software. A physical DoS attack might involve cutting
telephone lines or network cabling or switching off the power to a server.
802.1x
Port-based Network Access Control (NAC)