da Flashcards

(50 cards)

1
Q

Microsoft CHAP (MS-CHAP)

A

Microsoft-enhanced version of CHAP
*Two-way authentication.
*Hashed credential
*Most secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAP Sent in the clear

CHAP Hashed credentials

MS-CHAP Hashed credential and most secure

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DHCP Relay

A

Forwards DHCP packets between clients and servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of Hypervisor

A

VMWare ESXi
Microsoft Hyper-V
VirtualBox
VMWare Workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Attached Storage (NAS)

A

Disk storage delivered as a service over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Storage Area Network (SAN)

A

Specialized LAN that transfers data at block-level with a special protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

InfiniBand

A

Virtualaized storage technology that uses a switched fabric topology and features very high throughput and very low latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software-Defined Networking (SDN)

A

Provides an easy to use front end to configure physical and virtual devices throughout the ntework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Virtual Private Branch Exchange (PBX) and VoIP

A

Outsources a telephone system by utilizing VoIP to send all data to the provider and then connecting it to the telephone system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bandwidth Speed Test

A

Verifies the real-world throughput from a client device all the way out to the Internet and back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

iPerf

A

Tool that measuers maximum achievable bandwidth on an IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NetFlow Analyzer

A

*Monitoring
*Troubleshooting
*In-depth inspection, interpretation and synthesis of traffic flow data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terminal Emulator

A

Allows a host computer to access another computer through a command-line interface or a graphical one using either Telnet or SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP Scanner

A

Used to search for and detect IP addresses and other information related to devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network Platform

A

Refers to any router, switch, or firewall regardless of the brand or manufacturer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dynamic NAT (DNAT)

A

Automatically assigns an IP address from a pool and gives a one-to-one translation to access external

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Address Translation (NAT)

A

Used to conserve the limited supply of IPv4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Static NAT (SNAT)

A

Manually assigns an IP address and gives a one-to-one translation (access external)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Port Address Translation (PAT)

A

Sharing of one public IP by multiple private IP addresses which gives a many-to-one translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Multicast Routing

A

Multicast sender sends traffic to a Class D IP address, known as a multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Access Control List (ACL)

A

Set of rules applied to router interfaces or FW that permit or deny certain traffic (IP/port/MAC)

22
Q

In-Band Management

A

Managing devices through the use of Telnet or SSH protocols over the network

23
Q

Out-of-Band Management

A

Connecting to and configuring different network devices using an alternate path or management network

24
Q

Secure Socket Layer (SSL)

A

Provides cryptography and reliability using the upper layers of the OSI model, specifically L 5, 6, & 7

25
Transport Layer Security (TLS)
Provides secure web browsing over HTTPS
26
Datagram Transport Layer Security (DTLS)
UDP-based version of the TLS protocol, which operates a bit faster due to having less overhead
27
Access Control List (ACL)
A list of permissions associated with a given system or network resource
28
Explicit Deny
Blocks matching traffic
29
Implicit Deny
Blocks traffic to anything not explicitly specified
30
Wireless Client Isolation
Prevents wireless clients from communicating with one another
31
Guest Network Isolation
Keeps guests away from your internal network communications
32
Pre-Shared Key (PSK)
Secures Wireless networks, including those protected with: WEP WPA WPA2 WPA3
33
Layer 3 Redundancy
Used if the default gateway goes down and clients couldn't leave the subnet
34
Multipathing
Creates more than one physical path between the server and its storage devices for better fault tolerance and performance
35
Delay
The time a packet travels from source to destination
36
Jitter
Uneven arrival of packets which is especially harmful in VoIP traffic
37
Drops (packet)
Occurs during link congestion when a router's interface queue overflows and causes packet loss
38
Network Performance Monitoring
Monitors the performance from the end user's workstation to the final destination they are trying to reach
39
Latency
Time that it takes for data to reach its destination across a network
40
Jitter
When a time delay in the sending of data packets over a network connection occurs
41
Full Packet Capture
Captures the entire packet, including the header and the payload for all traffic entering and leaving a network
42
NetFlow
Defines a particular traffic flow based on the different packets that share the same characteristics
43
Zeek
*Passively monitors a network like a sniffer *Only logs full packet capture data of potential interest
44
Broadcast Storm
Occurs when a network system is overwhelmed by continuous multicast or broadcast traffic
45
Broadcast Address
Layer2 FF:FF:FF:FF:FF:FF Layer3 255.255.255.255
46
Broadcast Domain
A logical division of a computer network where all nodes can reach each other by broadcast at the data link layer
47
Logical Domain Manager
*Listens to multicast messages *Keeps track of the MAC address being used
48
Multicast Flooding
*Switch is not multicast aware and treats multicast as broadcast *Enable IGMP on multicast aware switches
49
Host-Based Firewall
Runs on an individual computer or device connected to the network to protect that one device
50
Network-Based Firewall
Deployed in line with the network traffic flow to monitor and filter incoming and outgoing traffic based on established rule sets