CCNA 42 to 60 Flashcards

1
Q

NTP

A

Network Time Protocol, used to set the same time across your network, if the time isn’t the same on your devices you will have issues with your devices, i.e log files stating the wrong time. Certificates are also time stamped, they will time out/ expire if the time has drifted too far

Time is provided by NTP server (this server can be inside your network or a Stratum Zero)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ACL

A

Access Control List-

ACL Extended=

ACL Net Interface=

ACL Global NAT=

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dynamic NAT

A

Dynamic NAT can be defined as mapping of a private IP address to a public IP address from a group of public IP addresses called as NAT pool. Dynamic NAT establishes a one-to-one mapping between a private IP address to a public IP address.

*once to communication is completed the IP is recycled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static NAT/PAT

A

Manually tell the router which private address will work with which public address and port number.

The table will have the private address and the public address and port recorded in a NAT table. When return traffic comes in the source and port is looked up in the table

one to one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Socket

A

Combination of IP address and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

NAT Overload or Port Address Translation (PAT)

A

Uses the public IP assigned to the routers interface (or another IP address assigned for NAT overload) combined with a port number to create a unique address to communicate off the private network.

TCP Ports to know
FTP 21
SSH 22
Telnet 23
HTTP 80
SMTP 25
POP3 110
IMAP 143
HTTPS 443

UDP
DNS 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NAT

A

Network Address Translator, allows private IPs access to a public domain.

Inside=You own the address

Outside= someone else owns the address

Local= private address

Global= public address

Inside Local= inside the network and private

Outside Global= outside the network and public

Inside Global= Ip you own that is used off of your network (NAT)

Outside local= ip the belongs to another network that is private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stratum Clock

A

Atomic based clock that provides the time (Stratum 0)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UTC

A

Coordinated Universal Time, where time starts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

stratum number

A

If you are getting your time from a stratum 3 clock, you become a stratum 4 clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DHCP

A

Dynamic Host Configuration Protocol, give IP addresses dynamically

Client: ability for a device to request an address. (auto gens a 169.254.x.x address if it doesn’t here back from the DHCP server)

Server: where the IPs are managed from

Relay: will forward DHCP requests to the Server if the client is unable to reach it and then relays back the response. (replays as a unicast)

Set up relay of your trunked device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASCII

A

is a 7-bit character set containing 128 characters. It contains the numbers from 0-9, the upper and lower case English letters from A to Z, and some special characters.

abbreviated from American Standard Code for Information Interchange, is a character encoding standard for electronic communication. ASCII codes represent text in computers, telecommunications equipment, and other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SNMP

A

Monitoring protocol ; Simple Network Management Protocol; Polls data (activity) from devices on a certain interval. A common poll interval in 60 seconds.(clear text)

v1:
v2c: can monitor, however has very limited authentication (r/o, r/w) can be used to change settings on your device if it is not locked down. (clear text)
v3: increased security; access levels- view, groups, user. Views can be assigned to groups and then users to the group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OID/MIB

A

Object identifiers, all of the things you can identify using SNMP (temps, run time, up down).

Management Information Base; data base of OIDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Syslog

A

syslog format (date, time, message)

0 Emergency—emerg = System is unusable
Ex: Drive failure

1 Alert—aler t= Should be corrected immediately
Ex: Loss of the primary ISP connection.

2 Critical—crit =Critical conditions
Ex: A failure in the system’s primary application.

3 Error—err = Error conditions
Ex: An interface has gone down

4 Warning—warning = May indicate that an error will occur if action is not taken.
Ex: A non-root file system has only 2GB remaining.

5 Notice—notice = Events that are unusual, but not error conditions.
Ex: Someone just logged in

6 Informational—info = Normal operational messages that require no action.
Ex:An application has started, paused or ended successfully.

7 Debug—debug = Information useful to developers for debugging the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

QoS

A

Traffic discrimination (which traffic is most important):

Classify Traffic: What interface, or ACL the traffic is on can be used to give priority.

Marking: (layer 2 )CoS class of service marking which will give a priority level to frame.

(Layer 3) ToS- type of service marking which will give a priority level to frame. EX: DSCP

Queuing: default is “first in, first out” queue can be changed to priority which will move desired traffic to the front of the line.

Shoot: (WRED) waited random early detention, picks off excess traffic.

Policing: putting anti QoS on traffic can be used to slow traffic / limit traffic (traffic you don’t want)

Shaping: traffic you want, limit traffic after a certain bandwidth

If there is no congestion, there is no need for QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NBAR

A

Network based application recognition

NBAR intelligently classifies and allows you to enforce QoS policy on today’s mission-critical applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Low latency Queuing

A

PQ-CBWFQ—cisco proprietary that stops traffic starvation. in QoS priority, it allows you to put a data cap on the traffic.

PQ( priority queuing)
CB (Class based)
WF(waiting fair)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FTP-TFTP

A

Used to copy files:

FTP- TCP communication (secure/ authentication), port 20/ 21, faster–

TFTP- UDP (unsecure/ no authentication), port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CIA

A

Confidentiality of Data

Integrity of Data

Availability of Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What can cause vulnerability in a network?

A

Bugs, flaws in hardware or software

Bad or lacking configuration

legacy systems

Broken Processes

Unpatched systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ARP Spoofing

A

Lying to the network about the gateway lay 2 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

CDP Flooding

A

Floods fake CDP messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is and exploit ?

A

Way or method that can be used to take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mitigation
action of redoing to severity, or seriousness of a threat ``` Steps/ places to look: Increase awareness--Applications, Network infrastructure-- Training users--- Testing--- test after training, send out fake phishing emails and ask users to report ```
26
DAI
Dynamic ARP inspection, insures the validity of an ARP request
27
Security Policy
Access Control- physical access and logical access control Change management policy- policy that give guidance on how, when changes can be made so that they do not cause harm or vulnerability Mobile Policy Baseline Policy AUP- acceptable use policy (signed annually) Password Policies Data Retention (emails and documents, how long to keep data and when to get rid of it) Incident Reporting Policy- how to report an incident Vulnerability and Risk Assessment Policies---
28
Social Engineering
Phishing-- Spear Phishing-- Pretexting-- Tailgating--
29
Physical Security
Man trap, guard, who has access to switches ? access hards, temperature sensors, UPS, laptop/ computer locks
30
Password Policy
Educate users of what the policy is Enforce the policy --- Characteristics in policy: Length- 7 plus Complexity- upper, lowercase, special characters Max Age- change every 45 days History- user can't reuse last ten passwords Minimum age: user can't change password more than once in a day ***This can be enforced in AD for example***
31
2FA/MFA
When you use at least two methods to authenticate users identity. Cat A ---One thing a user knows, (pin or password) Cat B ---Something that the user has, (card, key fob or app of phone, security token) Cat C --- Something that the user "is" (finger print, face rec, voice rec, eye rec
32
What is the difference between the aux port and the console port?
Both aux and console ports can let you into the router or switch, the console port however is active while booting up. The console port function is useful for password reset and other reboot function. In order to get beyond the user mode on the aux port, you need an enable secret set. You will need to do this from the console port.
33
AAA
Authentication, authorization and accounting--- Authentication (Verifying who is accessing) --Can have a server with passwords and access levels (active directory) connected to switches and routers for access. Authorization (What can a person do-- access level) Accounting (who does/ did what--logs)
34
TACACS +
Cisco standard--- works better with Cisco devices Encrypted communication, used TCP protocol used when the AAA clients communicate with the server (active directory) Terminal Access Controller Access Control System
35
RADIUS
Industry standard, used UDP and does not encrypt the full session. does encrypt passwords Remote Authentication Dial-in User Service protocol used when the AAA clients communicate with the server (active directory)
36
Implicit Deny
When traffic is not matched on an ACL it is automatically denied
37
StandardACL
only matches source IPs and or source IP range
38
Expended ACL
can match source and destination IPs as well as port numbers
39
Port Security
Cannot be a dynamic port, max Mac for port is ONE out of the box. When you hit the max, the port is error shut down.
40
CAM Table overflow attack
An attack, also known as Mac flooding that floods the CAM table with fake MAC addresses and consumes the switches memory
41
Dynamic Port
a port that auto negotiates connections
42
swithchport host command
Use the switchport host interface configuration command on the switch stack or on a standalone switch to optimize a Layer 2 port for a host connection. This command does 3 things! Configures the switchport for access mode. Enables portfast. Disables Etherchannel.
43
DHCP Snooping
tells switch not to listen to any DHCP messages unless it comes out of a names port (Enable at the access layer)
44
DORA
Discover, offer, request and authorize (DHCP steps)
45
Source Guard
Helps protect the network against connected host from lying about their source IP or MAC addresses
46
What is the insertion of option 82?
When DHCP Snooping is enabled, DHCP Option 82 is inserted into DHCP packets as they pass through a switch. Option 82 contains information about the specific port a client machine is connected to.
47
Dynamic ARP inspection (DAI)
DAI checks all ARP packets on untrusted interfaces, it will compare the information in the ARP packet with the DHCP snooping database and/or an ARP access-list. If the information in the ARP packet doesn’t match, it will be dropped..
48
VPN Tunnel
``` Logical path between two networks, encrypted Security Association (VPN connection), ``` site to site tunnel- between HQ and remote site Remote access--- VPN from individual computer to HQ
49
Cryptography
the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents Confidentiality with encryption
50
AES
Advanced Encryption Standard Encryption algorithm, more bits used, more secure. Along with algorithm devices on each end have unknown keys to stop the algorithm from being broken
51
Hashing
Data integrity; a one-way function where data is mapped to a fixed-length value, when the hash gets to the other side the length is verified MD5 and SHA are different hash algorithm
52
IPsec
IPsec is a collection of encryption standards used for VPN tunnels (other examples include PPTP, L2TP V1/V2 which can be used for Remote Access connections.) IPsec can be used for both site to site and Remote Access connections. AES is the latest standard
53
ISA KMP SA
is a protocol defined by RFC 2408 for establishing Security association (SA) and cryptographic keys in an Internet environment. Router to Router communication.
54
IPsec SA
second SA tunnel used to encrypted the user information
55
Crypto Map
a collection of the settings and attributes you want to use for the VPN tunnel
56
ESP
Encapsulating Security Payload, layer 4 protocol number 50---Encapsulates traffic
57
SSL/ TLS/ DTLS
secure Socket layer, Transport layer security= TCP security protocols used for site to client VPN. TCP has more over head so sometimes , Datagram Transport layer security (DTLS) is preferred) DTLC uses UDP and has less over head. Used for Remote Access "HQ to Client"
58
Split Tunneling
Ability to divide traffic encryption based on destination from client machine. Ex. only traffic to and from HQ is encrypted. If the user is going to YouTube , the traffic would not be encrypted.
59
What are WiFi security option?
``` Disabled, None, Open WEP --security is easily cracked WPA-- has been cracked as well WPA2-- currently secure WPA3-- newest, backwards compatibility if device does not support WPA3 ```
60
Personal V Enterprise WiFi
Personal-- password-- pre shared key Enterprise-- AAA server used to authenticate, this also provide an encryption key
61
PSK
Pre shared Key
62
Network Automation
the process of automation the configuration, managing, testing, deployment and operation of physical and virtual devices within a network (Pyton)
63
BGP
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet.
64
Zero touch provisioning
Allows your router and switch to boot up and get basic configuration
65
Cisco DNA Center
Used for network automation; digital network architecture Features: - Network Mapping (provision and deploying fabric) - Network Discovery - dynamically configure devices - Network automation - Design from ground up and then order - Policy -- access - Assurance-- system logs
66
API
Application Program Interface--- allows you to interact with devices instead of having to work in the CLI Can monitor and configure device with API API also uses a token for security Computercomputer ProgramProgram
67
SNMP
Used by monitoring programs like SolarWinds--- Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
68
Mibs
----Management information base-- used to monitor device statistics and make changes on devices
69
REST API
A REST/RESTful API Representational State Transfer--- Let us know how we can change and modify simple information. Contraints--- 1. Client- server relationship (Router, controller, website... is server, you are the client) 2. State-less (when a request is made is has to contain everything needed for the request-- Full context) 3. Cacheable (won't change very often) has to be able to determine if something should be cached or not -- ^learn for exam^ 4. Uniform Interface (Keep it simple and consistent) 5. Layered 6. Code on demand
70
What are REST API Verbs/ Actions?
CRUD (Create, Read, Update and delete) Think of as the protocol in the REST API--- ex HTTP=80 GET= Request, reply interaction- retrieve a resource (READ) Post= create a resource object (CREATE) Patch= create or update a resource object (UPDATE) Put= create or replace a resource (UPDATE) Delete= Delete a resource (DELETE)
71
API Errors
**200s = successful **400s= Client error (error with something you entered, you have to fix) **500s server error
72
Python Dictionary
A collection which is ordered, changeable and indexed. No duplicate members. ``` key= word value= definition ```
73
Simple Variable (Python)
used to store information to be referenced and manipulated in a computer program
74
Python List
a collection which is ordered and changeable
75
Json, YAML, XML
Data serialization languages--- the process of converting structures dada to a format that allows sharing or storage of data in a form that allows recovery of its original structure XML= mainly used for websites (extensible markup language) JSON= used for APIs, human and machine readable (javascript object language) YAML = not markup language, used with sensible, python and perl--human readable
76
JSON Object
JSON dictionary, between two "}" Ex {"hostname": "router1"} Objects within objects = nesting
77
JSON Array
a list between two "]" Ex.["school", "work", "travel"]
78
Controller Based Networking | SND) (ACI
ACI (Cisco proprietary SDN) Software defined networking--- SDN takes over all control plane functions on routers and switches, turning them into zombies--- centralized control plane
79
Southbound Interface
SBI, used by SDN to control devices --- called a southbound interface, because it usually sits at the top of the rack above the devices it is controlling. ---interfaces refers to what you are using to interact with the networking devices ----Openflow-- open source inductry standard ----OpFlex-- used with cisco ACI (data center automation) ----CLI/SNMP-- SSH access for older devices (DNA Center) ----NETCONF--also used by DNA center--- standardized by IETF
80
Northbound Interface
NBI is where users access devices. Example (DNA Center, or REST API)
81
IBN
Intent Based Networking-- allows you to make changes on devices without having to worry about the rules. DNA center is an example of IBM-- DNA center will put in the commands for you --- automates configuration for us
82
Underlay
creating a physical network that provides connectivity for the overlay, create as much redundant lay 3 connections as you can.
83
Overlay
The fabric/ the virtual networks TUNNELED over your underlay devices--- logical/ virtual Creates a point to point connections is VXLAN
84
VXLAN
(layer 2 over layer 3) VXLAN is a tunneling protocol that encapsulates Layer 2 Ethernet frames in Layer 3 UDP packets, enabling you to create virtualized Layer 2 subnets, or segments, that span physical Layer 3 networks. Each Layer 2 subnet is uniquely identified by a VXLAN network identifier (VNI) that segments traffic
85
Fabric
everything is your software defined network, overlay and underlay
86
APIC
Application policy infrastructure controller--- the main architectural component of the Cisco ACI solution (SDN). It is the unified point of automation and management for the Cisco ACI (SDN) fabric, policy enforcement, and health monitoring.
87
LISP
Location Identity Separation protocol -- identifies each host with an EID (Endpoint device ID) and matches it to a RLOC (routing locator) and maps it. Similar to DNS, replaces some routing protocols
88
Fabric Edge Nodes
switches on the edge of the underlay, keeps track of who is connected to it and sends it back to the fabric controller --- Allows for smaller networking tables an device mobility
89
Easy QoS
how you can prioritize traffic on DNA center
90
East Bound
Events and notifications
91
West Bound
Integration APIs, ITSM, Assurance Ex. can find issues in the network , open a ticket and resolve the ticket.
92
Puppet
network automation tool that uses an agent. Can be used on limited devices that allow agent install. (can be installed on netux devices) Ruby based Take model--> You need to set up a puppet master (server) and install the agent on your clients (switch or router) Structure 1. ->Modules (organizes manifest) 2. --> manifests 3. ------> Classes (organizes manifest files) 4. -----------> Resources (list what's going to happen on the device) (has an agent less version that supports cisco devices)
93
Chief
network automation tool that uses an agent. Ruby based--> Needs an agent to run. Pull method--> Recipe= a collection of resources that determine the configuration policy of a node. Central Server= server the run Chief Resource= one particular action or configuration or a Node=Server you want to control Cookbook= where recipes are stored The node upload his cookbooks to the Central Chief server that has a collection of cookbooks with a tool called knife Currently has no cisco integration.
94
Ansibal
agent-less used to automate network devices--python based, uses YAML-- Linux and MAC Open-Source and free Push model--> Playbook--> Tasks Can be used to generate templates
95
Git
versioning tracking software (ex Github) used for versioning revision/ control
96
DiffServ
DiffServ is a set of end-to-end quality of service (QoS) capabilities. End-to-end QoS is the ability of the network to deliver service required by specific network traffic from one end of the network to another.
97
CSMA/CD
Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). Standard Ethernet networks use CSMA/CD to physically monitor the traffic on the line at participating stations.
98
NETCONF
is a protocol defined by the IETF to “install, manipulate, and delete the configuration of network devices”. NETCONF operations are realized on top of a Remote Procedure Call (RPC) layer using an XML encoding and provides a basic set of operations to edit and query configuration on a network device.
99
How do you parse a JSON string in Python?
json.loads(input)
100
What is the IP address of an OSPF Hello Packet ?
224.0.0.5 (multicast)
101
What is 802.1q
VLAN protocol /adds vlan to header