The Final Stretch Flashcards

1
Q

RIP

A

Routing Information Protocol. Distance-vector. Uses hop count and limits hops to prevent looping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol. Distance-vector. Routers on EIGRP send hello packets intermittently to verify functionality and work together to determine the best path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSPF

A

Open Shortest Path First. Link-state. Routers communicate with each other about other routers to determine the shortest path.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BGP

A

Border Gateway Protocol. Hybrid. Enables the internet to exchange routing information between Autonomous Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Distributed Switching

A

A virtual switch that acts as a single switch for all hosts in a virtual environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VLSM

A

Variable Length Subnet Mask. Works closely with CIDR to break up subnets for more flexibly in IPv4 networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IPAM

A

IP Address Management. The administration of DHCP and DNS. It is a means of planning, tracking, and managing the IP address space used in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

APC

A

Angled Physical Contact fiber connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UPC

A

Ultra Physical Contact fiber connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MTRJ

A

Small Form Factor Duplex Connector. Holds two fibers at the same time in a small body.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Media Converter

A

Converts media (I.e, Fiber optics to Ethernet connections)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RADIUS

A

Remote Authentication Dial-in User Service. Provides AAA to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

NAS vs SAN

A

NAS is a single device storing data for multiple hosts. SAN is a network of devices providing various storage services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fibre Channel

A

A high-speed data transfer protocol for SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

iSCSI

A

IP-based standard for transferring data that supports host access by carrying SCSI commands over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Infiniband

A

Computer networking communications standard with very high throughput and low latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISDN

A

Integrated Services Digital Network. A set of communication standards that used digital transmissions to make phone calls, video calls, transmit data, and other network services of PSTN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T1/T3

A

T1 has 24 channels. 1.544 Mbps; T3 has 28 T1 lines (672 channels) and 44.7 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

E1/E3

A

E1 has 32 channels. 2.048 Mbps; E3 has 34.4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OC3 – OC192

A

OC192 – 51.84 mbps x OC# (OC192 = 9.953 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

PRI

A

Primary Rate Interface. A telecommunications standard used on an ISDN network for carrying multiple DSO voice and data transmissions between the network and the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

MPLS

A

Multiprotocol Label Switching. Data flow technology that increases the speed and controls the flow of by using labels instead of a routing table lookup at every stop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ATM

A

Asynchronous Transfer Mode. Telecommunications standard for digital transmissions of multiple data types including voice, data, and video signals over one network without the use of several overlay networks.

24
Q

Frame Relay

A

A standardized WAN technology that specifies the physical and data link layers of digital telecommunication channels using a packet-switching methodology.

25
Q

PPP

A

Point-to-Point Protocol. A layer 2 protocol used to establish a direct connection between two nodes on a network. Used as a simple link between two peers. Full-duplex and packets are delivered in order.

26
Q

DMVPN

A

Dynamic Multipoint VPN. A solution which enables data to transfer from one site to another, without having the verification process of traffic.

27
Q

SIP trunk

A

The virtual version of an analog phone line. Allows you to connect multiple channels to your PBX to make local, long distance, or even international calls.

28
Q

CSU/DSU

A

Channel-service unit/Data-service unit a hardware device like a model for T1/T3 connections.

29
Q

Smart Jack

A

A smart and intelligent device place between the telephone company’s demarc and the customer. It is a NID, but smarter and checks connectivity.

30
Q

Port aggregation

A

Used for automated, logical aggregation of switch ports in Cisco.

31
Q

Clustering

A

The interconnection of servers in a way that makes them appear to the OS as a single device.

32
Q

Port scanning

A

Method for determining which ports are open. Like knocking on doors to see if anyone is home.

33
Q

SEIM

A

Security Information and Event Management. Collects logs and event data produced from applications, devices, networks, infrastructure, and systems to draw analysis and provide a holistic view of an organizations IT. Basically, the eyes of your entire network.

34
Q

MIB

A

Management Information Base. A database used for managing the entities in a communication network. Most often associated with SNMP.

35
Q

VNC

A

Virtual Network Computing. A cross-platform screen sharing system that was created to remotely control another computer.

36
Q

AUP

A

Acceptable Use Policy.

37
Q

TACACS+

A

Provides more control over the authorization of commands, while RADIUS does not support that feature. TACACS+ encrypts ALL AAA Packets, while RADIUS only encrypts passwords.

38
Q

Kerberos

A

Has 3 parts. The client, the server, and a trusted third party (KDC). The client sends a request to the KDC, which creates a ticket and encrypts the client’s password in a key and sends the key back to the client to present to the servers.

39
Q

NAC

A

Network Access Control. An approach to computer security that attempts to unify endpoint security technology, user or system authentication, and network security enforcement by finding and identifying different devices on the network. Administrators can open, close, or quarantine access to the network.

40
Q

TKIP-RC4

A

Temportal Key Integrity Protocol; Rivest Cipher 4. Used in WPA. Like WEP, uses RC4 stream encryption algorithm as its basis. Much weaker than WPA2-AES.

41
Q

CCMP-AES

A

Counter Mode Cipher Block Chaining Message Authentication Code Protocol; Advanced Encryption Standard. CCMP employs 128-bit keys and 48-bit initialization vector that minimizes vulnerability to replay attacks. CCMP requires more processing power than TKIP. AES is a military technology used in networks for WPA2 encryption.

42
Q

Logic Bomb

A

A set of instruction secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually to cause harm to the device.

43
Q

DNS Poisoning

A

When a hacker substitutes the address for a vaild website with an impostor. The impostor site may look identical to the valid one, but will steal information and personal information from victims.

44
Q

ARP Poisoning

A

A type of cyber attack carried out over a LAN that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.

45
Q

Deauthentication

A

A type of DoS attack that targets communications between a user and a WAP.

46
Q

VLAN hopping

A

VLAN hopping - A computer security exploit; a method of attacking networked resources on a VLAN. This may allow the attacker access to traffic on other VLANs that would normally not be accessible.

47
Q

Spoofing

A

When an attacker impersonates an authorized device or user to steal data, spread malware, or bypass access control systems.

48
Q

Flood guard

A

Flood guards are tools that can prevent DoS. Usually built into routers and IDS systems.

49
Q

BPDU guard

A

Prevents loops by moving a nontrunking port into an errdisable state when a BPDU is received on that port (Helps prevent man-in-the-middle)

50
Q

Root guard

A

An STP feature that is enabled on a port-by-port basis. It prevents a configured port from becoming a root port. Prevents a downstream switch from becoming a root in a network.

51
Q

DHCP snooping

A

A security feature that acts like a firewall between untrusted hosts and trusted DHCP servers. Validates DHCP messages coming from untrusted hosts and filters out invalid messages.

52
Q

Attenuation

A

The reduction of the force, effect, or value of something. The reduction of signal over long distances.

53
Q

PAP

A

Password Authentication Protocol. Used by PPP to authenticate users. Almost all network OS remote servers support PAP. Considered a weak authentication scheme.

54
Q

CHAP

A

Challenge Handshake Authentication Protocol. Authenticates a user or network host to an authentication entity. Requires both the client and server know the plaintext of the secret.

55
Q

MS-CHAP

A

Microsoft CHAP. CHAP designed for Windows.