Seriously, Ariel Flashcards

1
Q

Pen Testing

A

the practice of testing a computer system, network, or web application to find security vulnerabilities that an attacker could exploit. Penetration testers only do this with permission of the organization that owns the system, network, or web application and within the bounds of their scope of work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fiber light meter

A

AKA optical power meter

used to measure the power in an optical signal over a fiber optic cable

A fiber light meter could be used to test if the cable is broken, but it would not be able to determine where the break in the fiber cable is located

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OTDR

A

Optical Time Domain Reflectometer

used by organizations to certify the performance of new fiber optics links and detect problems with existing fiber links. An OTDR can identify if a fiber cable is broken and provide an approximately location for the break

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cable tester

A

cable tester is used to verify the electrical connections in a twisted pair or coaxial cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Loopback adapter

A

plug that is used to test the physical port or interface on a network device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Media converter

A

a Layer 1 device that changes one type of physical network connection to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

incident response plan

A

a set of instructions to help our network and system administrators detect, respond to, and recover from network security incidents. These types of plans address issues like cybercrime, data loss, and service outages that threaten daily work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

System life cycle plan

A

AKA life cycle planning

describes the approach to maintaining an asset from creation to disposal. In the information technology world, we normally have a 5-phase lifecycle that is used for all of our systems and networks: Planning, Design, Transition, Operations, and Retirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AUP

A

acceptable use policy

set of rules applied by the owner, creator, or administrator of a network, website, or service, that restrict the ways in which the network, website, or system may be used and sets guidelines as to how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

BYOD Policy

A

A bring your own device policy allows, and sometimes encourages, employees to access enterprise networks and systems using personal mobile devices such as smartphones, tablets, and laptops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least privilege

A

the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Zero trust

A

a security framework that requires all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Giant

A

any ethernet frame that exceeds the 802.3 frame size of 1518 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Runt

A

an ethernet frame that is less than 64 bytes in size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encapsulation

A

a process by which a lower-layer protocol receives data from a higher-layer protocol and then places the data into the data portion of its frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CRC

A

Cyclic Redundancy Checksum

error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data as it transits the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Channel Bonding

A

a practice commonly used in IEEE 802.11 implementations in which two adjacent channels within a given frequency band are combined to increase throughput between two or more wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Broadcast

A

IPv4 only

Broadcast communication has one sender, but it sends the traffic to every device on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Anycast

A

IPv6 only

communications are sent to the nearest receiver in a group of receivers with the same IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multicast

A

a technique used for one-to-many communication over an IP network. The central location sends a signal to subscribed devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Unicast

A

communication only has one sender and one receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DLP

A

Data Loss Prevention

systems are used to ensure that end-users do not send sensitive or critical information outside the corporate network. These DLP products help a network administrator control what data end users can transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PaaS

A

Platform as a Service

a complete development and deployment environment in the cloud, with resources that enable you to deliver everything from simple cloud-based apps to sophisticated, cloud-enabled enterprise applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

IaaS

A

Infrastructure as a Service

a type of cloud computing service that offers essential compute, storage, and networking resources on-demand, on a pay-as-you-go basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

SaaS

A

Software as a Service

allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

DaaS

A

Desktop as a Service

a cloud computing offering where a service provider delivers virtual desktops to end-users over the Internet, licensed with a per-user subscription. DaaS is often called Virtual Desktop Infrastructure (VDI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

MAC Spoofing

A

a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. Public wireless networks can be configured to use MAC filtering to block access to devices once they reach a certain time limit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

IP Spoofing

A

a method of modifying the source address in the packet header to make the receiving computer system think the packet is from a trusted source, such as another computer on a legitimate network, and accept it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Dictionary attack

A

Type of password
attack that compares encrypted
passwords against a predetermined list
of possible password values

a method of breaking into a password-protected computer, network, or other IT resource by systematically entering every word in a dictionary or list file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Brute-force attack

A

consists of an attacker submitting every possible combination for a password or pin until they crack it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

EAP

A

The Extensible Authentication Protocol (EAP) is a framework in a series of protocols that allows for numerous different mechanisms of authentication, including things like simple passwords, digital certificates, and public key infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

10GBase-SR

A

10 Gigabit Ethernet over fiber

Short Range
– Multimode fiber
– 26 to 400 meters, depending on the fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

10GBASE-LR

A

10 Gigabit Ethernet over fiber

Long range
– Single-mode fiber
– 10 kilometers maximum range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

100BASE-TX

A

100 megabit Ethernet

“Fast Ethernet”
– Category 5 or better twisted pair copper - two pair
– 100 meters maximum length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

10GBASE-T

A

10 Gig Ethernet over copper
– 4-pair balanced twisted-pair
* Frequency use of 500 MHz
– Well above the 125 MHz for gigabit Ethernet
* Category 6
– Unshielded: 55 meters, Shielded: 100 meters
* Category 6A (augmented)
– Unshielded or shielded: 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Broadcast storm

A

The result of an excessive amount of broadcast or multicast traffic on a computer network. A broadcast storm can consume sufficient network resources and render the network unable to transport normal network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Asymmetric routing

A

when network packets leave via one path and return via a different path (unlike symmetric routing, in which packets come and go using the same path)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

OSI Layer 1

A

Physical Layer

The physics of the network
– Signaling, cabling, connectors
– This layer isn’t about protocols

Signaling, cabling, connectors (Cable, NIC, Hub)

Electrical signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

OSI Layer 2

A

Data Link Layer

The basic network “language”
– The foundation of communication
at the data link layer
* Data Link Control (DLC) protocols
– MAC (Media Access Control) address on Ethernet
* The “switching” layer

(Frame, MAC address, EUI-48, EUI-64, Switch)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

OSI Layer 3

A

Network Layer

  • The “routing” layer
  • Internet Protocol (IP)
  • Fragments frames to traverse different networks

(IP address, router, packet)

IP Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

OSI Layer 4

A

Transport Layer

The “post office” layer – Parcels and letters
* TCP segment (Transmission Control Protocol) and UDP datagram (UserDatagram Protocol)

TCP encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

OSI Layer 5

A

Session Layer

Communication management between devices – Start, stop, restart
* Half-duplex, full-duplex
* Control protocols, tunneling protocols

Link the presentation to the transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

OSI Layer 6

A

Presentation Layer

  • Character encoding
  • Application encryption
  • Often combined with the Application Layer

Encoding and encryption (SSL/TLS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

OSI Layer 7

A

Application Layer

The layer we see - HTTP, FTP, DNS, POP3

GMail, Twitter, Facebook

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Encapsulation

A

Describing how data messages should be packaged for
transmission. Encapsulation is like an envelope for a letter, with the distinction
that each layer requires its own envelope. At each layer, the protocol adds fields
in a header to whatever data (payload) it receives from an application or other
protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

TCP Flags

A

The flags control the payload
– SYN - Synchronize sequence numbers
– PSH - Push the data to the application without
buffering
– RST - Reset the connection
– FIN - Last packet from the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

MTU

A

Maximum Transmission Unit

Maximum IP packet to transmit – But not fragment

The payload can normally be between 46 and 1500 bytes.
The upper limit of the payload is also referred to as the maximum transmission
unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Star topology

A
  • Hub and spoke
  • Used in most large and small networks
  • All devices are connected to a central device
  • Switched Ethernet networks
    – The switch is in the middle

each endpoint node is connected to a central forwarding node,
such as a hub, switch, or router. The central node mediates communications
between the endpoints. The star topology is the most widely used physical
topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Ring Topology

A

each node is wired to its neighbor in a closed loop.
A node receives a transmission from its upstream neighbor and passes it to its
downstream neighbor until the transmission reaches its intended destination.
Each node can regenerate the transmission, improving the potential range of the
network.

Still used in many Metro Area Networks (MANs) and Wide Area Networks (WANs)
– Dual-rings
– Built-in fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Bus topology

A

All nodes attach directly to a single cable segment via cable taps

A physical bus topology with more than two nodes is a shared access topology,
meaning that all nodes share the bandwidth of the media. Only one node can be
active at any one time, so the nodes must contend to put signals on the media.

A signal travels down
the bus in both directions from the source and is received by all nodes connected
to the segment. The bus is terminated at both ends of the cable to absorb the signal
when it has passed all connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Mesh Topology

A

Multiple links to the same place – Fully connected
– Partially connected
* Redundancy, fault-tolerance, load balancing
* Used in wide area networks (WANs) – Fully meshed and partially meshed

commonly used in WANs, especially public networks like the
Internet. In theory, a mesh network requires that each device has a point-to-point
link with every other device on the network (fully connected).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Peer-to-peer

A

All devices are both clients and servers – Everyone talks to everyone
* Advantages
– Easy to deploy, Low cost
* Disadvantages
– Difficult to administer
– Difficult to secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Client-server

A
  • Central server
    – Clients talk to the server
  • No client-to-client communication
  • Advantages
    – Performance, administration
  • Disadvantages
    – Cost, complexity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

LAN

A

Local Area Network

  • A building or group of buildings – High-speed connectivity
  • Ethernet and 802.11 wireless
    – Any slower and it isn’t “local”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

MAN

A

Metropolitan Area Network

  • A network in your city
    – Larger than a LAN, often smaller than a WAN
  • Common to see government ownership – They “own” the right-of-way
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

WAN

A

Wide Area Network

  • Generally connects LANs across a distance – And generally much slower than the LAN
  • Many different WAN technologies – Point-to-point serial, MPLS, etc. – Terrestrial and non-terrestrial
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

WLAN

A

Wireless LAN

  • 802.11 technologies
  • Mobility within a building or geographic area * Expand coverage with additional access points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

PAN

A

Personal Area Network

  • Your own private network
    – Bluetooth, IR, NFC
  • Automobile
    – Audio output
    – Integrate with phone
  • Mobile phone
    – Wireless headset
  • Health
    – Workout telemetry, daily reports
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

CAN

A

Campus Area Network
Corporate Area Network

  • Limited geographical area – A group of buildings
  • LAN technologies
    – Fiber connected, high speed Ethernet
  • Your fiber in the ground – No third-party provider
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

NAS

A

Network Attached Storage

– Connect to a shared storage device
across the network
– File-level access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

SAN

A

Storage Area Network

– Looks and feels like a local storage device
– Block-level access
– Very efficient reading and writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

MPLS

A

Multiprotocol label switching

  • Packets through the WAN have a label – Routing decisions are easy
  • Labels are “pushed” onto packets as they enter the MPLS cloud by an edge router
  • Labels are “popped” off on the way out

operates as an overlay network to
configure point-to-point or point-to-multipoint links between nodes regardless of
the underlying physical and data link topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

mGRE

A

Multipoint Generic Router Encapsulation

– Used extensively for Dynamic Multipoint VPN (DMVPN) – Common on Cisco routers
* Your VPN builds itself
– Remote sites communicate to each other
* Tunnels are built dynamically, on-demand
– A dynamic mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

SD-WAN

A

Software Defined Networking in a Wide Area Network
– A WAN built for the cloud
* The data center used to be in one place – The cloud has changed everything
* Cloud-based applications communicate directly to the cloud – No need to hop through a central point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Demarcation point

A

The point where you connect with the outside world
– WAN provider
– Internet service provider

  • You connect your CPE
    – Customer premises equipment or “customer prem”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Smartjack

A
  • Network interface unit (NIU)
    – The device that determines the demarc – Network Interface Device,
    Telephone Network Interface
  • Smartjack
    – More than just a simple interface – Can be a circuit card in a chassis
  • Built-in diagnostics – Loopback tests
  • Alarm indicators
    – Configuration, status
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

NFV

A

Network Function virtualization

  • Replace physical network devices with virtual versions – Manage from the hypervisor
  • Same functionality as a physical device
    – Routing, switching, load balancing, firewalls, etc.
  • Quickly and easily deploy network functions – Click and deploy from the hypervisor
  • Many different deployment options – Virtual machine, container,
    fault tolerance, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Hypervisor

A
  • Virtual Machine Manager
    – Manages the virtual platform and guest
    operating systems
  • Hardware management
    – CPU, networking, security
  • Single console control – One pane of glass
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

vSwitch

A
  • Virtual switch
    – Move the physical switch into the virtual environment
  • Functionality is similar to a physical switch
    – Forwarding options, link aggregation,
    port mirroring, NetFlow
  • Deploy from the hypervisor
    – Automate with orchestration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

vNIC

A
  • A virtual machine needs a network interface
    – A vNIC
  • Configured and connected through the hypervisor
    – Enable additional features
    – VLAN, aggregation, multiple interfaces
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

RG-6

A

Coaxial cable

used in television/digital cable and high-speed Internet over cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

RG-59

A

Coaxial cable

used as patch cables
Not designed for long distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Cat 5

A

100BASE-T & 1000BASE-T
UTP
100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Cat 5e

A

1000BASE-T
UTP or F/UTP
100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Cat 6

A

10GBASE-T
UTP
Unshielded: 55m
Shielded: 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Cat 6a

A

10GBASE-T
F/UTP
100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Cat 7

A

S/FTP
10GBASE-T
100m

GG45/
TERA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Cat 8

A

40GBASE-T
S/FTP
30m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

T568A

A

RJ45 Pin assignment:

White and Green
Green
White and Orange
Blue
White and Blue
Orange
White and Brown
Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

T568B

A

RJ45 Pin assignment:

White and Orange
Orange
White and Green
Blue
White and Blue
Green
White and Brown
Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Elements of Fiber Optic Cable

A

Core: provides the transmission path for the light signals (waveguide)

Cladding: reflects signals back into the waveguide as efficiently as possible so
that the light signal travels along the waveguide by multiple internal reflections

Buffer coating: protective plastic coating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

MMF

A

Multi-mode Fiber

Short-range communication, up to 2km
Inexpensive light source; LED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

SMF

A

Single-mode Fiber
Long-range communication, up to 100km
Expensive light source; laser beams
support data rates up to 100 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

UPC

A

Ultra-polished connectors

– Ferrule end-face radius polished at a zero degree angle
– High return loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

APC

A

Angle-polished connectors

– Ferrule end-face radius polished at an eight degree angle
– Lower return loss, generally higher insertion loss than

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

LC

A

Local connectors
push down for removal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

ST

A

Straight Tip
plug and twist/untwist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

SC

A

Subscriber connector
push/pull

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

MT-RJ

A

Mechanical Transfer Registered Jack

Fiber connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

RJ-11

A

Copper connector
Telephone & DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

RJ-45

A

Copper connector
ethernet

90
Q

F-Connector

A

copper connector
cable television
RG-6

91
Q

Media Converter

A

A device that converts one media signaling type to another.

92
Q

Transceiver

A

Transmitter and receiver

The part of a network interface that sends and receives signals
over the network media

93
Q

SFP & QSFP

A

Transceiver Form-Factors

Small Form-factor Pluggable
-1Gbit/s fiber

Quad Small Form-factor Pluggable
-4 channel SFP = Four 1Gbit/s = 4Gbit/s

94
Q

Duplex & BiDi

A

Duplex communication is two fibers; one to transmit and one to receive

Bi-Directional is two fibers that both allow transmission and reception

95
Q

Copper patch panel

A

Punch-down block on one side and RJ45 connectors on the other

Allows for the run to the desk to go unchanged

96
Q

Fiber distribution panel

A
  • Permanent fiber installation
  • Patch panel at both ends
  • Fiber bend radius - Breaks when bent too tightly
  • Often includes a service loop
    – Extra fiber for
    future changes
97
Q

66 block

A
  • A patch panel for analog voice
    – And some digital links
  • Left side is patched to the right
    – Easy to follow the path
  • Wire and a punch-down tool
    – No additional connectors required
  • Generally replaced by 110 blocks
    – Still seen in many installations
98
Q

110 block

A
  • Wire-to-wire patch panel
    – No intermediate interface required
  • Replaces the 66 block
    – Patch Category 5 and Category 6 cables
  • Wires are “punched” into the block
    – Connecting block is on top
  • Additional wires punched into connecting block
    – Patch the top to the bottom
99
Q

Krone block

A
  • An alternative to the 110 block
    – Common in Europe
100
Q

BIX

A

Building Industry Cross-connect

  • Created in the 1970s by Northern Telecom
    – A common block type
  • Updated through the years
    – GigaBIX performance is better than the
    Category 6 cable standard
101
Q

Baseband vs broadband

A

Baseband uses single frequency using the entire medium

Broadband uses many frequencies, sharing the medium

102
Q

WDM

A

Wavelength-Division Multiplexing

– Bidirectional communication over a single strand of fiber
* Use different wavelengths for each carrier
– Different “colors”

103
Q

CWDM

A

Coarse Wavelength-Division Multiplexing – 10GBASE-LX4 uses four 3.125 Gbit/sec carriers at four different wavelengths

104
Q

DWDM

A

Dense Wavelength-Division Multiplexing
– Multiplex multiple OC carriers into a single fiber
– Add 160 signals, increase to 1.6 Tbit/s

105
Q

127.0.0.1 - 127.255.255.254

A

Loopback address

106
Q

240.0.0.1 - 254.255.255.254

A

Reserved addresses
Class E address

107
Q

DHCP

A

Dynamic Host Configuration Protocol
– Provides automatic addresses and
IP configuration for almost all devices

108
Q

169.265.1.0 - 169.254.254.255

A

APIPA

link local address
No forwarding by routers

if assigned you either are working on a network that doesn’t have a DHCP server or the DHCP server is not functioning

109
Q

NAT

A

Network Address Translation

When a device changes it’s IP address when communicating outside the network.

Facilitated by the router; it translates the private IP address to a public IP address

110
Q

Dual stack

A

hosts and routers can run both IPv4 and IPv6 simultaneously and
communicate with devices configured with either type of address.

111
Q

NDP

A

Neighbor Discovery Protocol

Replaces the IPv4 ARP

Operates using multicast

performs some of the functions on an IPv6
network that ARP and ICMP perform under IPv4

112
Q

SLAAC

A

Stateless Address Autoconfiguration

Automatically configure an IP address without a DHCP server

113
Q

Port 23

A

Telnet

114
Q

Port 22

A

SSH
Secure shell

115
Q

Port 53

A

DNS

116
Q

Port 25

A

SMTP

117
Q

Port 110

A

POP3

118
Q

Port 143

A

IMAP

119
Q

ICMP

A

Internet Control Message Protocol
– “Text messaging” for your network devices
* Another protocol carried by IP – Not used for data transfer
* Devices can request and reply
to administrative requests
– Hey, are you there? / Yes, I’m right here.
* Devices can send messages when things don’t go well – That network you’re trying to reach
is not reachable from here
– Your time-to-live expired, just letting you know

120
Q

IPSec

A

Internet Protocol Security

121
Q

SOA

A

Start of Authority

Describes the DNS zone details
* Structure
– IN SOA (Internet zone, Start of Authority)
with name of zone
– Serial number
– Refresh, retry, and expiry timeframes – Caching duration/TTL (Time To Live)

122
Q

(A) & (AAAA)

A

IPv4 address & IPv6 address

123
Q

CNAME

A

Canonical name records

A name is an alias of another, canonical name

s used to configure an alias for an
existing address record (A or AAAA).

124
Q

SRV

A

Service records

Find a specific service

Where is the Windows Domain Controller? Where is the instant messaging server? Where is the VoIP controller?

Identifies where a device is

125
Q

MX

A

Mail exchanger record

Determines the host name for the mail server - this isn’t an IP address; it’s a name

126
Q

NS

A

Name server record

List the name servers for a domain

NS records point to the name of the server

127
Q

PTR

A

Pointer record

The reverse of an A or AAAA record

Reverse DNS lookup

128
Q

TXT

A

Text record

Human readable text information

*SPF protocol
(Sender Policy Framework)
– Mail servers check that incoming mail
really did come from an authorized host

*DKIM (Domain Keys Identified Mail) – Digitally sign your outgoing mail

129
Q

NTP

A

Network Time Protocol

Time synchronization for devices

130
Q

Port 123

A

NTP

131
Q

NTP Stratum Layers

A

Stratum 0
-atomic lock; very accurate

Stratum 1
-synchronized to stratum 0
-primary time servers

stratum 2
-sync’d to stratum 1

132
Q

Three Tier Architecture

A

Core
-Web servers, databases, applications

Distribution
– A midpoint between the core and the users – Communication between access switches
– Manage the path to the end users

Access
– Where the users connect
– End stations, printers

133
Q

SDN

A

Software Defined Networking

Networking devices have different functional planes of operation
– Data, control, and management planes

134
Q

Infrastructure layer / Data plane

A

– Process the network frames and packets
– Forwarding, trunking, encrypting, NAT

135
Q

Control layer / Control plane

A

– Manages the actions of the data plane
– Routing tables, session tables, NAT tables – Dynamic routing protocol updates

136
Q

Application layer / Management plane

A

– Configure and manage the device

137
Q

Spine and leaf architecture

A
  • Each leaf switch connects to each spine switch
    – Each spine switch connects to each leaf switch
  • Leaf switches do not connect to each other – Same for spine switches
  • Top-of-rack switching
    – Each leaf is on the “top” of a physical network rack
    – May include a group of physical racks
  • Advantages
    – Simple cabling, redundant, fast
  • Disadvantages
    – Additional switches may be costly
138
Q

East-west traffic

A

– Traffic between devices in the same data center
– Relatively fast response times

139
Q

North-south traffic

A

– Ingress/egress to an outside device
– A different security posture than east-west traffic

140
Q

PBX

A

Private Banch Exchange

– The “phone switch”
– Connects to phone provider network – Analog telephone lines to each desk

141
Q

VoIP PBX

A

– Integrate VoIP devices with a corporate phone switch

142
Q

Distance-vector protocol

A

Information passed between routers contains network details
* How many “hops” away is another network?
* The deciding “vector” is the “distance”

RIP (Routing Information Protocol),
EIGRP (Enhanced Interior Gateway Routing Protocol)

143
Q

RIP

A

Routing Information Protocol

Distance-vector routing protocol

144
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol

Distance-vector routing protocol

145
Q

Link-state routing protocols

A

Information passed between routers is related to the current connectivity
– If it’s up, you can get there.
– If it’s down, you can’t.

  • Consider the speed of the link
    – Faster is always better, right?

OSPF

146
Q

BGP

A

Border Gateway Protocol

– Determines route based on paths, network policies, or
configured rule-sets

Hybrid routing protocols

147
Q

Traffic Shaping

A

AKA packet shaping

Control by bandwidth usage or data rates
* Set important applications to have higher priorities than other apps
* Manage the Quality of Service (QoS)
– Routers, switches, firewalls, QoS devices

Prioritizing traffic types

148
Q

What are the ethernet field frames?

A

Preamble
SFD
Dest. MAC
Source MAC
Type
Payload
FCS

149
Q

Half-duplex

A

A device cannot send and receive simultaneously

150
Q

Full duplex

A

Data can be sent and received at the same time

151
Q

CSMA/CD

A

Carrier Sense Multiple Access Collision Detect

For half-duplex only

  • Listen for an opening
    – Don’t transmit if the network
    is already busy
  • Send a frame of data
    – You send data whenever you can
    – There’s no queue or prioritization
  • If a collision occurs
    – Transmit a jam signal to let everyone know
    a collision has occurred
    – Wait a random amount of time, then retry
152
Q

ARP

A

Address Resolution Protocol

Determine a MAC address based on an IP address

153
Q

802.3af

A

PoE

154
Q

802.1Q

A

Ethernet trunking

155
Q

Trunking

A

Adding a VLAN header to an ethernet frame

VLAN communicating over a single link between switches

156
Q

STP

A

Spanning Tree Protocol

Routing loop protection between switches

157
Q

802.1D

A

STP

158
Q

STP Port States

A
  • Blocking - Not forwarding to prevent a loop
  • Listening - Not forwarding and cleaning the MAC table
  • Learning - Not forwarding and adding to the MAC table
  • Forwarding - Data passes through and is fully operational
  • Disabled - Administrator has turned off the port
159
Q

LAG

A

Link aggregation or port bonding

Multiple interfaces acts like one big interface

160
Q

Port mirroring

A

– Copy traffic from one interface to another
– Used for packet captures, IDS
– Mirror traffic on the same switch
– Mirror traffic from one switch to another

  • Examine a copy of the traffic
    – Port mirror (SPAN), network tap
  • No way to block (prevent) traffic
161
Q

802.3x

A

Flow control

send message to another device to pause for a moment before sending more data

162
Q

Straight through cable

A

Connect workstations to network devices
– Workstation to switch
– Router to switch

163
Q

Crossover cable

A
  • Connect MDI to MDI
  • Connect MDI-X to MDI-X
  • Auto-MDI-X is on most modern Ethernet devices – Automatically decides to cross-over
  • This is obviously not 568A on one side and 568B on the other – 568A and 568B are cabling standards
    – The TIA-568 standard does not define Ethernet (or other)
    crossover cables
164
Q

802.11a

A

5GHz
54Mb/s
small range

165
Q

802.11b

A

2.4GHz
11Mb/s
long range; more frequency issues

166
Q

802.11g

A

2.4GHz
54Mb/s
Backwards compatible

167
Q

802.11n

A

5GHz and/or 2.4GHz
40 MHz
600 Mb/s

MIMO

168
Q

802.11ac

A

5 GHz
up to 160Mhz
MU-MIMO
7 Gbps

169
Q

802.11ax

A

5GHz and/or 2.4GHz
20, 40, 80, and 160 MHz
1,201 Mbps or 10Gbps
8 bidirectional MU-MIMO

170
Q

Omnidirectional antennas

A

Signal is evenly distributed on all sides

  • Good choice for most environments – You need coverage in all directions
  • No ability to focus the signal
    – A different antenna will be required
171
Q

Yagi antenna

A

Very directional and high gain

172
Q

Parabolic antenna

A

Focus the signal to a single point

Better for long distance

173
Q

WPA

A

Replaced WEP

Uses RC4 with TKIP

174
Q

WPA2

A

Uses CCMP

Has PSK brute-force problem

175
Q

WPA3

A

Uses GCMP and AES and SAE

176
Q

WPA2/3 Personal vs Enterprise

A

Personal will use a PSK while Enterprise will use 802.1x authentication

177
Q

CDMA

A
  • Code Division Multiple Access
    – Everyone communicates at the same time – Each call uses a different code
    – The codes are used to filter each call on the
    receiving side
  • Used by Verizon and Sprint
    – Handsets are controlled by the network provider – Not much adoption elsewhere
178
Q

GSM

A

Global System for Mobile Communications – Mobile networking standard
* 90% of the market
– Originally an EU standard - Worldwide coverage
* Used by AT&T and T-Mobile in the United States
– Move your SIM card (Subscriber Identity Module)
from phone to phone
* Original GSM standard used multiplexing – Everyone gets a little slice of time

179
Q

LTE

A

Long Term Evolution (LTE) - A “4G” technology
– Converged standard (GSM and CDMA providers) – Based on GSM and
EDGE (Enhanced Data Rates for GSM Evolution
– Standard supports download rates of 150 Mbit/s
* LTE Advanced (LTE-A)
– Standard supports download rates of 300 Mbit/s

180
Q

5G

A
  • Significant performance improvements – At higher frequencies
    – Eventually 10 gigabits per second
    – Slower speeds from 100-900 Mbit/s
  • Significant IoT impact
    – Bandwidth becomes less of a constraint – Larger data transfers
    – Faster monitoring and notification
  • Additional cloud processing
181
Q

Latency

A

Delay between the request and the response

182
Q

Jitter

A

time between frames

183
Q

SNMP

A

Simple Network Management Protocol

Database of data (MIB)

The database contains OIDs. Every variable in the MIB has a corresponding OID

184
Q

SNMP Trap

A

Alarm/alert that is sent reactively to the management workstation

185
Q

Syslog

A

System log collection

186
Q

Severity Levels

A

0 - Emergency - The system is unusable
(kernel panic)
1 - Alert - A fault requiring immediate
remediation has occurred
2 - Critical - A fault that will require
immediate remediation is
likely to develop
3 - Error - A nonurgent fault has
developed
4 - Warning - A nonurgent fault is likely to
develop
5 - Notice - A state that could potentially
lead to an error condition
has developed
6 - Informational - A normal but reportable
event has occurred
7 - Debug - Verbose status conditions
used during development
and testing

187
Q

Netflow

A

Gather traffic statistics from all traffic flows

  • Probe and collector
    – Probe watches network communication
    – Summary records are sent to the collector
  • Usually a separate reporting app – Closely tied to the collector
188
Q

Disaster recovery plan

A

A comprehensive plan
– Recovery location
– Data recovery method
– Application restoration
– IT team and employee availability

189
Q

Continuity of operations planning (COOP)

A

There needs to be an alternative
– Manual transactions
– Paper receipts
– Phone calls for transaction approvals
* These must be documented and tested before a problem occurs

190
Q

System life cycle

A
  • Managing asset disposal
    – Desktops, laptops, tablets, mobile devices
  • Disposal becomes a legal issue
    – Some information must not be destroyed – Consider offsite storage
  • You don’t want critical information in the trash – People really do dumpster dive
    – Recycling can be a security concern
191
Q

SOP

A

Standard operating procedures
* Organizations have different business objectives – Processes and procedures
* Operational procedures
– Downtime notifications, facilities issues
* Software upgrades - Testing, change control
* Documentation is the key
– Everyone can review and understand the policies

192
Q

SLA

A

Service Level Agreement

– Minimum terms for services provided
– Uptime, response time agreement, etc.
– Commonly used between customers and service
providers

193
Q

MOU

A

Memorandum of Understanding

– Both sides agree on the contents of the memorandum – Usually includes statements of confidentiality
– Informal letter of intent; not a signed contract

194
Q

NDA

A

Non-disclosure agreement

Confidentiality agreement between parties
– Information in the agreement should not be disclosed
Protects confidential information – Trade secrets, business activities – Anything else listed in the NDA
Unilateral or bilateral (or multilateral) – One-way NDA or mutual NDA
Formal contract - Signatures are usually required

195
Q

AUP

A

Acceptable use policies

  • What is acceptable use of company assets?
    – Detailed documentation
    – May be documented in the Rules of Behavior
  • *
    Covers many topics
    – Internet use, telephones, computers,
    mobile devices, etc.
    Used by an organization to limit legal liability – If someone is dismissed, these are the
    well-documented reasons why
196
Q

FHRP

A

First Hop Redundancy Protocol
– Your computer is configured with a single
default gateway
– We need a way to provide availability if the
default gateway fails

197
Q

VRRP

A

Virtual Router Redundancy Protocol
– The default router isn’t real
– Devices use a virtual IP for the default gateway
– If a router disappears, another one takes its place – Data continues to flow

198
Q

RTO

A

Recovery time objective

Time it takes to get the system up and running

199
Q

RPO

A

Recovery Point Objective

– How much data loss is acceptable? – Bring the system back online;
how far back does data go?

200
Q

MTTR

A

Mean time to repair

Time required to fix the issue

201
Q

MTBF

A

Mean time between failures

Predict the time between outages

202
Q

CIA Triad

A

Confidentiality
* Certain information should only be known to certain people

Integrity
* Data is stored and transferred as intended
– Any modification to the data would be identified

Availability
* Information is accessible to authorized users – Always at your fingertips

203
Q

Zero-day attacks

A

The vulnerability has not been detected or published

204
Q

RADIUS

A

Remote Authentication Dial-in User Service

Centralize authentication for users
– Routers, switches, firewalls
– Server authentication
– Remote VPN access, 802.1X network access

205
Q

TACACS

A

Terminal Access Controller Access-Control System
– Remote authentication protocol

206
Q

LDAP

A

Lightweight Directory Access Protocol

Protocol for reading and writing directories
over an IP network

LDAP is the protocol used to query
and update an X.500 directory
– Used in Windows Active Directory, Apple
OpenDirectory, OpenLDAP, etc.

207
Q

Kerberos

A

Network authentication protocol
– Authenticate once, trusted by the system

208
Q

802.1X

A

Port-based Network Access Control (NAC) – You don’t get access to the network until
you authenticate

209
Q

Posture assessment

A

You can’t trust everyone’s computer
– BYOD (Bring Your Own Device)
– Malware infections / missing anti-malware – Unauthorized applications

Before connecting to the network, perform a health check – Is it a trusted device?
– Is it running anti-virus? Which one? Is it updated?
– Are the corporate applications installed?
– Is it a mobile device? Is the disk encrypted?
– The type of device doesn’t matter - Windows, Mac,
Linux, iOS, Android

210
Q

SIEM

A

Security Information and Event Management – Logging of security events and information
* Security alerts
– Real-time information
* Log aggregation and long-term storage
– Usually includes advanced reporting features
* Data correlation
– Link diverse data types
* Forensic analysis
– Gather details after an event

211
Q

DoS

A

Denial of service
* Force a service to fail – Overload the service

211
Q

On-path Attacks

A

man-in-the-middle

attacker sits between you and your destination

Redirects your traffic
– Then passes it on to the destination
– You never know your traffic was redirected
* ARP poisoning
– ARP has no security
– On-path attack on the local IP subnet

212
Q

DNS poisoning

A

Modify the DNS server
– Requires some crafty hacking
* Modify the client host file
– The host file takes precedent over DNS queries

Send a fake response to a valid DNS request
– Requires a redirection of the original request or the
resulting response
– Real-time redirection
– This is an on-path attack

213
Q

VLAN hopping

A

“Hop” to another VLAN - this shouldn’t happen
* Two primary methods
– Switch spoofing and double tagging

214
Q

Rogue DHCP server

A

IP addresses assigned by a non-authorized server – There’s no inherent security in DHCP
* Client is assigned an invalid or duplicate address – Intermittent connectivity, no connectivity

215
Q

DAI

A

Dynamic ARP inspection

Prevent those nasty on-path attacks
– Stops ARP poisoning at the switch levelq

216
Q

DHCP snooping

A

IP tracking on a layer 2 device (switch)
– The switch is a DHCP firewall
– Trusted: Routers, switches, DHCP servers
– Untrusted: Other computers, unofficial DHCP servers
* Switch watches for DHCP conversations
– Adds a list of untrusted devices to a table
* Filters invalid IP and DHCP information – Static IP addresses
– Devices acting as DHCP servers
* Other invalid traffic patterns

217
Q

Rolled cable

A

standard for RJ-45 to serial communications

Connect to Ethernet devices without using a switch – Use your crossover cable

218
Q

802.3af

A

PoE

219
Q

Attenuation

A

Gradual diminishing of signal over distance

220
Q

Port 1433

A

Microsoft sql

221
Q

Port 3306

A

mysql

222
Q

Port 1521

A

sqlnet

223
Q
A