Short Definitions Flashcards
Become Familiar with common terms
Private Cloud
A cloud infrastructure operated solely for a single organisation that can be managed internally or by a third party and host internally or externally
Public Cloud
When the cloud is rendered over a network that is open for public use
Community Cloud
Shares infrastructure between several organisations from a specific community that can be managed internally or by a third party and hosted internally or externally
Hybrid Cloud
Two or more clouds (private, public or community) that retain unique names but are bound together, offering the benefits of multiple deployment models
SNMP
Simple Network Management Protocol is a protocol that governs network management. The protocol reports on whether a device is functioning properly
DoS - reflective/amplified
Uses potentially legitimate thridparty component to send the attack traffic to a victim, hiding the attackers identity. The attackers send packets to the reflector servers with a source IP address set to their victim’s IP, indirectly overwhelming the victim with the response packets. DNS and NTP servers are particularly susceptible to this attack
DoS - Smurfing
a DDoS attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim’s spoofed source IP are broadcast to a computer network using an IP broadcast address. The target of the attack is flooded with packets, causing performance to decline
DoS - Friendly/Unintentional
a DoS attack that is carried out by devices that have legitimate access to the attacked server. This can occur as part of a DDoS where the legitimate device is a botnet. It could also occur when a user inadvertently causes a DoS attack due to initialising multiple requests that hang up the server
DoS - Physical Attack
an attack where an attacker attacks a device in such a way as to permanently put it out of commission. Also referred to as permanent DoS, this attack may involve affecting the firmware or infecting the device with malware
Cable tester
Verifies that a cable is good
Crimper
Attaches media connectors to the ends of the cable
Loopback Plug
Echoes signals over a port to ensure it is working properly
Multimeter
Includes a voltmeter, an ohmmeter, and an ammeter to measure voltage, current and resistance
Punchdown Tool
Attaches cable to a patch panel
Toner Probe
Includes a tone generator and a tone locater to locate the ends of a cable
Shorts
Shorts occur when two copper connectors touch each other, resulting in current flowing through that short because the short has lower resistance. Use a cable tester to determine if a short has occurred
Opens
Opens occur when there is a break or improper termination in the cabling that prevent current from flowing through a circuit. Use a cable tester to determine if an open has occurred
Bad Connector
A bad connector will cause a connection to be unsuccessful. You can either replace the entire cable or replace the connector depending on the length of run.
Bad Wiring
Bad wiring, like a bad connector, will cause a connection to be unsuccessful. If the wiring is the problem, it is best to replace the cable
Split Pairs
A split pair is a wiring error where two wires of a twisted pair are instead connected using two wires from different pairs. It most commonly occurs when a punch-down block is wired incorrectly or when RJ-45 connectors are crimped onto the wrong wires. In both these situations, you will need to rewrite the block or connector.
Tx/Rx reversed
A straight-through cable has the same transmit (Tx) or receive (Rx) leads at each end, while they are reversed at one end in a crossover cable. A straight-through cable connects dissimilar devices, while a crossover cable connects like devices.
MDIX (Medium dependent interface crossover)
Allows a switch port to properly configure its leads as Tx or Rx. If a network device does not support MDIX you MUST use the appropriate cable
Bad SFP/GBIC module (Cable or Transceiver)
Switches can include Gigabit interface converter (GBIC) and small form-factor pluggable (SFP) modules. If one of these modules goes bad, you can either replace it if possible. Otherwise the switch will have to be replaced. To determine if the module has failed you need to use an LC loopback tester
What can effect copper cabling transmissions?
EMI/RFI, crosstalk, cable misplacement, signal attenuation and distance limitations
Physical Network Diagram
Includes cable lengths and types, server names, IP addresses, server roles, network equipment locations and number of network users. Also referred to as network maps.
Network Baseline
Includes performance statistics for your network. Without a baseline you cannot determine if performance improvements have occurred
Logical Network Diagram
Includes server roles, domain architecture, protocols used and trust relationships
Wiring Schematic
The wiring schematic emphasises the flow of the network. It includes equipment symbols and lines that indicate the flow
Procedures
Set forth steps that must be taken to enforce the network owner’s policies
Policies
Set forth the network rules, including the who, what and when of the rules. Policies tell what the rules are, who is covered by the rule and when the rule applies
Regulations
Governmental guidelines that a re written by federal or state agencies based on the laws passed by a federal or state government
Service Legal Agreement (SLA)
Defines the minimum level of service that will be provided. An SLA is often implemented between an Internet Service Provider (ISP) and the company obtaining services from the ISP
Memorandum of Understanding (MOU)
Defines the roles and parameters of an agreement between two parties. It is often not a legally binding document. Some companies will use MOUs to define services within the organisation such as the services that will be provided by the IT department
Master Service Agreement (MSA)
Specifies payment terms, product warranties, intellectual property ownership, dispute resolution and other aspects between two parties. It will be used to govern all future statements of work (SOWs) between the two parties
Disaster Recovery Plan (DRP)
A document that sets forth the policies, tools and procedures designed to enable the recovery or continuation of vital infrastructure and systems that are needed to support critical business functions. DRPs are often seen as subsets of business continuity plans
Business Continuity Plan (BCP)
A plan that is designed to ensure that the business can produce their products or continue their work at acceptable levels following a disruptive incident. Unlike a DRP a BCP targets incidents such as the loss of a key member of an organisation or how the organisation responds in the event of a device failing or something that would cause a similar network disruption
VDSL
Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate at 51 to 55 megabits per second over cable lengths of up to 1000ft or 300 metres
ADSL
Asymmetric DSL (ADSL) up to 6.1Mbps downstream, up to 640Kbps upstream
HDSL / SDSL
High bit rate DSL (HDSL) and Symmetric DSL (SDSL) both provide data transmission rates up to 1.544Mbps in North America and 2.048Mbps in Europe
DSL
DSL lines use UTP/STP cabling. The maximum length for ADSL is 18,000ft. The maximum length for HDSL is 12,000ft. The maximum length for VDSL is 4,000ft. DSL is a packet-switched network
UTP Category 1 Cable
Up to 4 Mbps
UTP Category 2 Cable
Up to 4 Mbps
UTP Category 3 Cable
Up to 10 Mbps
UTP Category 4 Cable
Up to 16 Mbps
UTP Category 5 Cable
Up to 100Mbps up to 100m
UTP Category 5e Cable
Up to 1000 Mbps
UTP Category 6 Cable
Up to 1000 Mbps or 1Gbps up to 100m
UTP Category 6a Cable
Up to 10Gbps up to 100m
UTP Category 7 Cable
Up to 10Gbps up to 100m
UTP Category 8 Cable
Up to 40 Gbps and 30m, 100m when supporting 10Gbps
Types of Media Converters
- Single-mode fibre to Ethernet
- Multi-mode fibre to Ethernet
- Fibre to coaxial
- Single-mode fibre to Multi-mode fibre
DHCP Term - Lease
A single IP address that is being used by a DHCP client
DHCP Term - Option
A parameter that can be used to assign router, DNS server and other information to DHCP clients
DHCP Term - Scope
A range of possible IP addresses that a DHCP server can assign
DHCP Term - Reservation
An allocation of a single IP address to a MAC address
Loopback Interface
Allows you to test to ensure that the local network interface is working properly. The IPv4 address for the locate loopback is 127.0.0.1, and the IPv6 address for the loopback is ::1.
Routing Loop
A network problem that happens when a data packet continually loops through the same routers over and over. This is a problem associated with Distance Vector Protocols, such as RIP and RIPv2. Methods for dealing with loops include maximum hop count, split horizon, route poisoning and hold down times
Routing Table
A data table that lists the routes to particular network destinations. They can be stored on a router or a computer.
Default Route
The route that takes effect when no other route can be determined for a given destination. All pacKets for destinations not established in the routing table are sent via the default route. In most cases the default route is the router closest to the computer.
Interior Gateway Routing protocols versus Exterior Gateway Protocols
Protocols that route between autonomous systems or routing domains are referred to as Exterior Gateway Routing Protocols. Interior Gateway Protocols discover paths between networks within the same organisational boundary.
Autonomous Numbers Authority (AS)
Numbers assigned to network operators by the Internet Assigned Numbers Authority (IANA) and the Regional Internet Registries (RIRs)
Route Distribution
When you take a route from one routing protocol and distribute it to another protocol. By default routers only advertise and share routes with other routers running the same protocol.
Hot Standby Router Protocol (HSRP)
A Cisco proprietary first-hop redundancy protocol (FHRP) designed to allow for transparent fail-over of the first-hop IP router
Route Aggregation
Minimises the number of routing tables required in an IP network organising network layer IP addresses in a hierarchical way so that addresses are topologically significant.
Shortest Path Bridging (SPB)
A routing protocol that identifies loop-free shortest paths to help with traffic engineering.
Role Separation
Involves dividing server duties amongst two or more servers to reduce an attack profile.
Penetration Testing
Using hacking methodologies and tools to test the security of a clients network on behalf of the client
File Integrity Monitoring
Helps to identify unauthorised changes to files
Honeypot
A file or object on a network designed to lure in a hacker, often to divert attention from other resources
PAT
Port Address Translation provides port address translation. When using PAT you are able to share a single public IP address among multiple computers on the same network
NAT
Network Address Translation provides network address translation. This is based on the individual private IP addresses of the NAT clients
APIPA
Automatic Private IP Addressing is a private addressing scheme. In APIPA clients that are configured to obtain a dynamic IP address and cannot locate a DHCP server will assign themselves an IP address in the APIPA range (169.254.x.x)
DHCP
Dynamic Host Configuration Protocol is a dynamic IP addressing scheme whereby DHCP servers assign IP addresses based on the DHCP client requests
RFC 1918
RFC 1918 was used to create the standards for assigning IP address within a private network to various pieces of networking equipment. It facilitated the expansion of usable IP addresses under IPv4 to prevent the exhaustion of public addresses available
T1
1.544Mbps, 650ft, UTP/STP/Coaxial
T3
44.736Mbps, 450 ft, Coaxial
E1
2.048Mbps, 650ft, UTP/STP/Coaxial
E3
34.368Mbps, 450 ft, Coaxial
802.11a
5GHz, up to 54Mbps
802.11b
2.4GHz, up to 11Mbps
802.11g
2.4GHz, up to 54Mbps
802.11n
2.4/5GHz, up to 600Mbps