S Flashcards
IGP
operates within autonomous system
EGP
operates between autonomous system
Distance-Vector Protocols
distributes routing information without having an actual map of network topology
Link-State Protocol
each router determines the best path on it’s own
Path-Vector Protocol
distributes routing information but operates differently from distance vector (BGP)
LWAP
ap that uses controller
What are the seven layers in order of encapsulation?
application, presentation, session, transport, network, data link, physical
What is the PDU’s in order?
data, data, data, segment, packet, frame, bit
What is on header at Layer 4?
source and destination port #
What is on header at layer 3?
source and destination IP Address and Control Information
What is on header at layer 2?
source and destination Mac address. A trailer is added for error detection (checksum)
How many bits in an IPv6 address?
128 Bits
What format is IPv6?
Hexadecimal
How many bits are in an IPv6 field?
16 Bits
What is the IPv6 loopback address?
::1
What is the IPv6 unspecified address?
::
TCP header window size
flow control
TCP header first 16 bits
source port
TCP flags
URG, ACK, PSH, RST, SYN, FIN
Protocol for VLAN tagging
802.1Q
Rapid STP
802.1W
Multiple STP
802.1S
Where does 802.1Q insert the VLAN Tag?
After the source mac address
How many bytes is the VLAN tag?
4 bytes
Class A
10.0.0.0 - 10.255.255.255
Class B
172.16.0.0 - 172.31.255.255.255
Class C
192.168.0.0 - 192.168.255.255
RFC 1918
Private addresses
DHCP Process
D.O.R.A, Discovery, Offer, Request, Acknowledgement
Default location for Linux syslog and rsyslog files
/var/log
Default location for Linux syslog and rsyslog configuration files
/etc
DNS record A
mapping of IPv4
DNS record AAAA
mapping of IPv6
DNS record MX
E-mail. maps domain for MTA (Mail Transfer Agents)
DNS record PTR
pointer: returns only name (reverse DNS Lookups)
DNS record TXT
Text records
DNS record NS
identifies authoritative DNS server for a domain (name server)
Vulnerability
weakness in a protocol or system
Threat
the likely hood of that vulnerability being used against you
Exploit
When the vulnerability is used against you
Remote Exploit
exploit that works over the network without any prior access to target
What layer is a transparent firewall?
layer 2, no routing capabilities
What is SPAN?
Local Switched Port Analyzer.