Short Definitions Flashcards

Become Familiar with common terms

1
Q

Private Cloud

A

A cloud infrastructure operated solely for a single organisation that can be managed internally or by a third party and host internally or externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Public Cloud

A

When the cloud is rendered over a network that is open for public use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Community Cloud

A

Shares infrastructure between several organisations from a specific community that can be managed internally or by a third party and hosted internally or externally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hybrid Cloud

A

Two or more clouds (private, public or community) that retain unique names but are bound together, offering the benefits of multiple deployment models

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMP

A

Simple Network Management Protocol is a protocol that governs network management. The protocol reports on whether a device is functioning properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DoS - reflective/amplified

A

Uses potentially legitimate thridparty component to send the attack traffic to a victim, hiding the attackers identity. The attackers send packets to the reflector servers with a source IP address set to their victim’s IP, indirectly overwhelming the victim with the response packets. DNS and NTP servers are particularly susceptible to this attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DoS - Smurfing

A

a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. The target of the attack is flooded with packets, causing performance to decline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DoS - Friendly/Unintentional

A

a DoS attack that is carried out by devices that have legitimate access to the attacked server. This can occur as part of a DDoS where the legitimate device is a botnet. It could also occur when a user inadvertently causes a DoS attack due to initialising multiple requests that hang up the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS - Physical Attack

A

an attack where an attacker attacks a device in such a way as to permanently put it out of commission. Also referred to as permanent DoS, this attack may involve affecting the firmware or infecting the device with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cable tester

A

Verifies that a cable is good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Crimper

A

Attaches media connectors to the ends of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Loopback Plug

A

Echoes signals over a port to ensure it is working properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multimeter

A

Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current and resistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Punchdown Tool

A

Attaches cable to a patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Toner Probe

A

Includes a tone generator and a tone locater to locate the ends of a cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Shorts

A

Shorts occur when two copper connectors touch each other, resulting in current flowing through that short because the short has lower resistance. Use a cable tester to determine if a short has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Opens

A

Opens occur when there is a break or improper termination in the cabling that prevent current from flowing through a circuit. Use a cable tester to determine if an open has occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Bad Connector

A

A bad connector will cause a connection to be unsuccessful. You can either replace the entire cable or replace the connector depending on the length of run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bad Wiring

A

Bad wiring, like a bad connector, will cause a connection to be unsuccessful. If the wiring is the problem, it is best to replace the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Split Pairs

A

A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs. It most commonly occurs when a punch-down block is wired incorrectly or when RJ-45 connectors are crimped onto the wrong wires. In both these situations, you will need to rewrite the block or connector.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Tx/Rx reversed

A

A straight-through cable has the same transmit (Tx) or receive (Rx) leads at each end, while they are reversed at one end in a crossover cable. A straight-through cable connects dissimilar devices, while a crossover cable connects like devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MDIX (Medium dependent interface crossover)

A

Allows a switch port to properly configure its leads as Tx or Rx. If a network device does not support MDIX you MUST use the appropriate cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Bad SFP/GBIC module (Cable or Transceiver)

A

Switches can include Gigabit interface converter (GBIC) and small form-factor pluggable (SFP) modules. If one of these modules goes bad, you can either replace it if possible. Otherwise the switch will have to be replaced. To determine if the module has failed you need to use an LC loopback tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What can effect copper cabling transmissions?

A

EMI/RFI, crosstalk, cable misplacement, signal attenuation and distance limitations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical Network Diagram

A

Includes cable lengths and types, server names, IP addresses, server roles, network equipment locations and number of network users. Also referred to as network maps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Network Baseline

A

Includes performance statistics for your network. Without a baseline you cannot determine if performance improvements have occurred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Logical Network Diagram

A

Includes server roles, domain architecture, protocols used and trust relationships

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Wiring Schematic

A

The wiring schematic emphasises the flow of the network. It includes equipment symbols and lines that indicate the flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Procedures

A

Set forth steps that must be taken to enforce the network owner’s policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Policies

A

Set forth the network rules, including the who, what and when of the rules. Policies tell what the rules are, who is covered by the rule and when the rule applies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Regulations

A

Governmental guidelines that a re written by federal or state agencies based on the laws passed by a federal or state government

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Service Legal Agreement (SLA)

A

Defines the minimum level of service that will be provided. An SLA is often implemented between an Internet Service Provider (ISP) and the company obtaining services from the ISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Memorandum of Understanding (MOU)

A

Defines the roles and parameters of an agreement between two parties. It is often not a legally binding document. Some companies will use MOUs to define services within the organisation such as the services that will be provided by the IT department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Master Service Agreement (MSA)

A

Specifies payment terms, product warranties, intellectual property ownership, dispute resolution and other aspects between two parties. It will be used to govern all future statements of work (SOWs) between the two parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Disaster Recovery Plan (DRP)

A

A document that sets forth the policies, tools and procedures designed to enable the recovery or continuation of vital infrastructure and systems that are needed to support critical business functions. DRPs are often seen as subsets of business continuity plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Business Continuity Plan (BCP)

A

A plan that is designed to ensure that the business can produce their products or continue their work at acceptable levels following a disruptive incident. Unlike a DRP a BCP targets incidents such as the loss of a key member of an organisation or how the organisation responds in the event of a device failing or something that would cause a similar network disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

VDSL

A

Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate at 51 to 55 megabits per second over cable lengths of up to 1000ft or 300 metres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ADSL

A

Asymmetric DSL (ADSL) up to 6.1Mbps downstream, up to 640Kbps upstream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

HDSL / SDSL

A

High bit rate DSL (HDSL) and Symmetric DSL (SDSL) both provide data transmission rates up to 1.544Mbps in North America and 2.048Mbps in Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

DSL

A

DSL lines use UTP/STP cabling. The maximum length for ADSL is 18,000ft. The maximum length for HDSL is 12,000ft. The maximum length for VDSL is 4,000ft. DSL is a packet-switched network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

UTP Category 1 Cable

A

Up to 4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

UTP Category 2 Cable

A

Up to 4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

UTP Category 3 Cable

A

Up to 10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

UTP Category 4 Cable

A

Up to 16 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

UTP Category 5 Cable

A

Up to 100Mbps up to 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

UTP Category 5e Cable

A

Up to 1000 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

UTP Category 6 Cable

A

Up to 1000 Mbps or 1Gbps up to 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

UTP Category 6a Cable

A

Up to 10Gbps up to 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

UTP Category 7 Cable

A

Up to 10Gbps up to 100m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

UTP Category 8 Cable

A

Up to 40 Gbps and 30m, 100m when supporting 10Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Types of Media Converters

A
  • Single-mode fibre to Ethernet
  • Multi-mode fibre to Ethernet
  • Fibre to coaxial
  • Single-mode fibre to Multi-mode fibre
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

DHCP Term - Lease

A

A single IP address that is being used by a DHCP client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

DHCP Term - Option

A

A parameter that can be used to assign router, DNS server and other information to DHCP clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

DHCP Term - Scope

A

A range of possible IP addresses that a DHCP server can assign

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

DHCP Term - Reservation

A

An allocation of a single IP address to a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Loopback Interface

A

Allows you to test to ensure that the local network interface is working properly. The IPv4 address for the locate loopback is 127.0.0.1, and the IPv6 address for the loopback is ::1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Routing Loop

A

A network problem that happens when a data packet continually loops through the same routers over and over. This is a problem associated with Distance Vector Protocols, such as RIP and RIPv2. Methods for dealing with loops include maximum hop count, split horizon, route poisoning and hold down times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Routing Table

A

A data table that lists the routes to particular network destinations. They can be stored on a router or a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Default Route

A

The route that takes effect when no other route can be determined for a given destination. All pacKets for destinations not established in the routing table are sent via the default route. In most cases the default route is the router closest to the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Interior Gateway Routing protocols versus Exterior Gateway Protocols

A

Protocols that route between autonomous systems or routing domains are referred to as Exterior Gateway Routing Protocols. Interior Gateway Protocols discover paths between networks within the same organisational boundary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Autonomous Numbers Authority (AS)

A

Numbers assigned to network operators by the Internet Assigned Numbers Authority (IANA) and the Regional Internet Registries (RIRs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Route Distribution

A

When you take a route from one routing protocol and distribute it to another protocol. By default routers only advertise and share routes with other routers running the same protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Hot Standby Router Protocol (HSRP)

A

A Cisco proprietary first-hop redundancy protocol (FHRP) designed to allow for transparent fail-over of the first-hop IP router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Route Aggregation

A

Minimises the number of routing tables required in an IP network organising network layer IP addresses in a hierarchical way so that addresses are topologically significant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Shortest Path Bridging (SPB)

A

A routing protocol that identifies loop-free shortest paths to help with traffic engineering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Role Separation

A

Involves dividing server duties amongst two or more servers to reduce an attack profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Penetration Testing

A

Using hacking methodologies and tools to test the security of a clients network on behalf of the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

File Integrity Monitoring

A

Helps to identify unauthorised changes to files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Honeypot

A

A file or object on a network designed to lure in a hacker, often to divert attention from other resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

PAT

A

Port Address Translation provides port address translation. When using PAT you are able to share a single public IP address among multiple computers on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

NAT

A

Network Address Translation provides network address translation. This is based on the individual private IP addresses of the NAT clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

APIPA

A

Automatic Private IP Addressing is a private addressing scheme. In APIPA clients that are configured to obtain a dynamic IP address and cannot locate a DHCP server will assign themselves an IP address in the APIPA range (169.254.x.x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

DHCP

A

Dynamic Host Configuration Protocol is a dynamic IP addressing scheme whereby DHCP servers assign IP addresses based on the DHCP client requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

RFC 1918

A

RFC 1918 was used to create the standards for assigning IP address within a private network to various pieces of networking equipment. It facilitated the expansion of usable IP addresses under IPv4 to prevent the exhaustion of public addresses available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

T1

A

1.544Mbps, 650ft, UTP/STP/Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

T3

A

44.736Mbps, 450 ft, Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

E1

A

2.048Mbps, 650ft, UTP/STP/Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

E3

A

34.368Mbps, 450 ft, Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

802.11a

A

5GHz, up to 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

802.11b

A

2.4GHz, up to 11Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

802.11g

A

2.4GHz, up to 54Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

802.11n

A

2.4/5GHz, up to 600Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

802.11ac

A

5GHz, up to 1.3Gbps

84
Q

802.11ax

A

2.4/5/6GHz, up to 9.6Gbps

85
Q

UTM

A

Unified threat Management - This device bundles multiple security functions into a single physical or logical device. Features included could be IPS, IDS, anti-virus, anti-malware, anti-spam, NAT and other functions

86
Q

FTP

A

File Transfer Protocol - 20, 21

87
Q

SSH, SFTP

A

Secure Shell, Secure File Transfer Protocol - 22

88
Q

TELNET

A

23 - Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines. It follows a user command TCP/IP networking protocol that creates remote sessions.

89
Q

SMTP

A

Simple Mail Transfer Protocol - TCP 25, Application Layer

90
Q

DNS

A

Domain Name Server - 53

91
Q

DHCP

A

Dynamic Host Configuration Protocol - 67, 68

92
Q

TFTP

A

69 - Trivial File Transfer Protocol (TFTP) is a simple protocol that provides basic file transfer function with no user authentication.

93
Q

HTTP

A

HyperText Transfer Protocol - 80

94
Q

POP3

A

110 - Post Office Protocol version 3 is an email message retrieval protocol that uses TCP 110. Application layer

95
Q

NTP

A

Network Time Protocol - UDP 123

96
Q

NetBIOS

A

NetBIOS provides three distinct services: Name service for name registration and resolution (ports: 137/udp and 137/tcp) Datagram distribution service for connectionless communication (port: 138/udp) Session service for connection-oriented communication (port: 139/tcp)

97
Q

IMAP

A

TCP port 143 - Internet Message Access Protocol is an internet protocol for e-mail retrieval. IMAP4 works at the application layer of the OSI model

98
Q

SNMP

A

Simple Network Management Protocol - 161/162

99
Q

LDAP

A

The Lightweight Directory Access Protocol (LDAP) is a vendor-neutral software protocol used to lookup information or devices within a network. Whether you want to build a central authentication server for your organization or want to simplify access to internal servers and printers, LDAP is the answer. - 389

100
Q

HTTPS

A

HyperText Transfer Protocol Secure - 443

101
Q

SMB

A

Server Message Block - 445 - The Server Message Block protocol (SMB protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports and other resources on a network.

102
Q

Syslog

A

System Log - 514 - a type of logging that allows a system administrator to monitor and manage logs from different parts of the system. It can be used to track events and errors, as well as provide information about system performance.

103
Q

SMTP TLS

A

Simple Mail Transport Protocol Transport Layer Security - 587 - encrypts data as it traverses a network.

104
Q

LDAPS

A

Lightweight Directory Access Protocol Secure - 389 - uses TLS/SSL as a transmission protocol.

105
Q

IMAP over SSL

A

IMAP traffic travel over a secure socket to a secure port, typically TCP port 993.

106
Q

POP3 over SSL

A

The POP3S protocol over port 995 provides for secure email downloads by using SSL/TLS encryption.

107
Q

SQL Server

A

Structured Query Language Server - 1433 - is a programming language for storing and processing information in a relational database.

108
Q

SQLnet

A

The SQLNET protocol is used by Oracle SQL servers to execute SQL commands from clients, including load balancing and application-specific services. Support of stateful firewall and NAT services requires that you configure the SQLNET ALG for TCP port 1521.

109
Q

H.323

A

H. 323 is one of the oldest standards which are generally used for VoIP telephony and video conferencing. It is a system of various protocols and elements that allows transferring media data over packet networks. - 1720

110
Q

MGCP

A

The Media Gateway Control Protocol (MGCP) is a telecommunication protocol for signaling and call control in hybrid voice over IP (VoIP) and traditional telecommunication systems. - 2427/2727

111
Q

MySQL

A

MySQL is a relational database management system - 3306

112
Q

RDP

A

The Remote Desktop Protocol (RDP) is a protocol, or technical standard, for using a desktop computer remotely. - 3389

113
Q

RTP

A

Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data. - 5004/5005

114
Q

SIP

A

5060/5061 - The Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, and terminating communication sessions that include voice, video and messaging applications. SIP is used in Internet telephony, in private IP telephone systems, as well as mobile phone calling over LTE (VoLTE).

115
Q

Gateway

A

A gateway is used to connect networks that use different protocols

116
Q

CSU/DSU

A

A Channel Service Unit/Digital Service Unit is a device typically required by leased lines, such as T1 lines, to terminate their media connection to your LAN

117
Q

Wireless NIC

A

Wireless Network Interface Card is designed specifically for wireless networks. It is the piece of hardware that enables wireless communication for a computer

118
Q

Device Density

A

The ratio of users to access points

119
Q

Wireless Controller

A

A centralised device that can be used to manage multiple wireless access points

120
Q

VLAN pooling

A

assigns IP addresses to wireless clients from a pool of IP subnets and their associated VLANs

121
Q

Antenna Properties

A

Gain, Beamwidth, Transmission angle

122
Q

ICMP

A

Internet Control Message Protocol sends error messages indicating, for example, that a requested service is not available or that a host or router could not be reached. It operates on the Internet layer of the Internet protocol suite (TCP/IP)

123
Q

UDP

A

User Datagram Protocol sends messages, called datagrams, to other hosts on an internet protocol (IP) network without prior communications to set up special transmission channels or data paths. It operates on the Transport Layer of the internet protocol suite (TCP/IP model)

124
Q

TCP

A

Transmission Control Protocol provides reliable, ordered and error-checked delivery of data between applications running on hosts communicating over an IP network. It operates on the Transport Layer of the internet protocol suite (TCP/IP). TCP is the protocol used by the World Wide Web, Email, Remote administration and file transfer applications

125
Q

CoS

A

Class of Service implements packet tagging in a local area network. It tags the different types of traffic, such as video streaming or VoIP. the tag is a value between 0 and 8, with 0 being the highest priority

126
Q

QoS

A

Quality of Service uses the CoS tag to determine which traffic gets priority but Qos does not implement the tags. Layer 3 technology that allows the network to provide increased levels of service based on the type of traffic. Can provide dedicated bandwidth and control jitter

127
Q

Traffic Shaping

A

The overall mechanism that encompasses Cos, QoS and differentiated services

128
Q

Differentiated services (Diffserv)

A

Uses CoS classifications for identification and subsequently utilises the QoS parameters to differentiate traffic. It is the term used for end-to-end QoS model

129
Q

X.25

A

A WAN protocol that is used to create a continuous link between two offices. It employs switches, routes and circuits to produce the best route to transfer data at any given time

130
Q

MTBF

A

MTBF - Mean Time Between Failures is the average, or mean time between failures on a device or system. It is an expression of reliability

131
Q

MTTR

A

Mean Time To Recover is the average, or mean, time that it takes to recover or restore a system. In terms of a backup the term would refer to the time needed to restore a system from a full, full+incremental, or full+differential backup. The term can also be applied to full system failure or hardware component failure such as hard drive, RAM or power supply

132
Q

SLA

A

Service Level Agreement requirements determine what the vendor who provides technology services is obligated to provide to the customer. Items that are outlined in the SLA can include response time, repair time, network reliability expectations, escalation protocols, dispute resolution and more. Often the terms MTBF and MTTR may be included in an SLA

133
Q

RADIUS

A

RADIUS server provides authentication, authorisation and accounting, may also be referred to as AAA server

134
Q

TACACS

A

Terminal Access Controller Access Control System is the CISCO implementation of RADIUS.

135
Q

XTACACS

A

The second generation of TACACS and separates the authentication, authorisation and auditing processes

136
Q

TACACS+

A

The third generation of TACACS, provides all features of XTACACS along with extended two-factor user authentication.

137
Q

ipconfig /flushdns

A

Flushes the contents of the client computer’s DNS cache

138
Q

ipconfig /all

A

Displays all the TCP/IP settings for the computers

139
Q

ipconfig /registerdns

A

registers the computer’s DNS hostname with the DNS server

140
Q

ipconfig /displaydns

A

displays the contents of the computer’s DNS cache

141
Q

ipconfig /renew

A

command will renew the client’s DHCP lease

142
Q

ipconfig /release

A

will release the client’s DHCP lease

143
Q

ipconfig /showclassid

A

will display the DHCP class ID assigned to the client computer

144
Q

ipconfig /setclassid

A

will configure the DHCP class ID for the client computer

145
Q

Physical Network Diagram

A

Contains cable lengths and types, server names, IP addresses, server routes, server roles, network equipment locations and number of network users

146
Q

Logical Network Diagram

A

Contains server roles, Domain architecture, protocols used and trust relationships. NOT IP addresses and server names

147
Q

Wiring Schematic

A

Emphasises the flow of the network. It includes equipment symbols and lines that indicate the flow

148
Q

BNC Connector

A

Coaxial Cable, can also use F connector

149
Q

SC Connector

A

Fibre-optic cable, can also use an ST or LC connector

150
Q

RJ-45 Connector

A

Twisted Pair Cable, RJ-45 in networks, RJ-11 in telephone deployments

151
Q

IPv6 APIPA

A

fe80::/10

152
Q

Private IPv6

A

fc00::/7

153
Q

Loopback IPv6

A

::1/128

154
Q

Multi-mode Fibre

A

Up to 10Gbps and 500m

155
Q

Single-mode Fibre

A

Up to 10Gbps and 40km

156
Q

Thicknet

A

Uses RG-6 coaxial cabling, up to 10Mbps and 500m

157
Q

Thinnet

A

uses RG-59 coaxial cabling, up to 10Mbps and 185m

158
Q

WEP

A

Wired Equivalent Privacy - Uses a 40-bit or 104-bit key

159
Q

WPA/WPA2 Personal

A

Wifi Protected Access - Uses a 256-bit pre-shared key

160
Q

WPA/WPA2 Enterprise

A

Wifi Protected Access - Requires a RADIUS server, For large networks

161
Q

TDMA

A

TDMA - Time Division Multiple Access is obsolete. A 2G technology decommissioned in 2007-2009

162
Q

CDMA

A

Code-division Multiple Access - refers to a multiplexing technique, applies to 2G and 3G, still used today

163
Q

EDGE

A

Enhanced Data Rates for GSM Evolution is three times faster than GSM (but based on GSM technologies), Still in use

164
Q

GSM

A

Global System for Mobile communications is the world’s most widely used cellphone technology. Still widely used today

165
Q

LTE

A

Long Term Evolution is an IP-based 4G cellular technology rolled out in 2012

166
Q

UTM

A

Unified Threat Management appliance provides multiple security functions in a central location. Some services/functions include load balancing, email security, URL filtration and wireless security

167
Q

VoIP PBX

A

A Voice over IP Private Branch Exchange allows a company to use a single public-facing telephone number while having individual (extensions) for employees in a VoIP phone system

168
Q

NTP

A

Network Time Protocol is used to synchronise the clocks of computers on the network

169
Q

iptables

A

The iptables Linux command allows you to control a firewall and filter packets

170
Q

tcpdump

A

The tcpdump command allows you to analyse wired or wireless network traffic on a Linux system

171
Q

nslookup

A

The nslookup command (Linux) is used to query the DNS server. nslookup with a domain name will return the A record. nslookup with an IP address will return the ptr record

172
Q

ifconfig

A

ifconfig (Linux) is the counterpart to the Windows ipconfig command and provides information about the network interface card

173
Q

MPLS VPN

A

Multiprotocol Label Switching Layer 3 Virtual Private Network. This will allow all offices to connect to the same single-routed network and connect directly to the cloud

174
Q

Fast Ethernet 100Base-Tx network

A

100 Mbps data-transmission rate, Maximum segment length of 100m, Two pairs of wires with a Cat5 UTP cabling

175
Q

ESD

A

Electrostatic Discharge

176
Q

FTP (port)

A

21

177
Q

POP3 (port)

A

110

178
Q

IMAP (port)

A

143

179
Q

HTTPS (port)

A

443

180
Q

RDP (port)

A

3389

181
Q

SMTP (port)

A

25

182
Q

LDAP (port)

A

389

183
Q

APIPA IPv6

A

fe80::/10

184
Q

Private IPv6

A

fc00::/7

185
Q

Loopback IPv6

A

::1/128

186
Q

VPN concentrator

A

Terminates VPN tunnels

187
Q
A

LC - Lucent Connector, Fibre-optic, Small

188
Q

A (DNS)

A

Maps a host name to an IPv4 address

189
Q

AAAA (DNS)

A

Maps a host name to an IPv6 address

190
Q

CNAME (DNS)

A

Maps an additional host name to an existing host record

191
Q

MX (DNS)

A

Maps a mail server name to a domain

192
Q

PTR (DNS)

A

Maps an IP address to a host name

193
Q

CIDR values for class A

A

/8 - /15

194
Q

CIDR values for Class C

A

/24 - /30

195
Q

CIDR values for Class B

A

/16 - /23

196
Q

You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with SONET network. Which of the following should you implement?

A

10GBase-SW - for use with Synchronous Optical Networking (SONET) networks.

197
Q

Network Cable (OSI Layer)

A

Physical -

198
Q

FDDI (OSI Layer)

A

Data Link (Fibre Distributed Data Interface)

199
Q

IPsec (OSI Layer)

A

Network

200
Q

TCP (OSI Layer)

A

Transport

201
Q

RPC (OSI Layer)

A

Session (Remote Procedure Call)

202
Q

MIME (OSI Layer)

A

Presentation (Multipurpose Internet Mail Extensions, allows users to send a variety of file types in an email inc images, videos, audio and apps)

203
Q

DHCP (OSI Layer)

A

Application (Dynamic Host Configuration Protocol, Operates layer 7 but sends data relating to layers 2 and 3)

204
Q

ping -i

A

enables you to specify the size of the messages sent to the target. eg
- ping 10.0.0.1 -I 2048 -n 11 sends 2048 bytes

205
Q

ping -n

A

enables you to specify the number of messages the ping tool should transmit eg
- ping 10.0.0.1 -l 2048 -n 11 will send 11 messages

206
Q

ping -t

A

causes the ping tool to transmit messages until manually halted

207
Q
A