Dion Network+ Flashcards

(431 cards)

1
Q

Wi-Fi Standard is IEEE

A

802.11 (remember i and i being .11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethernet Standard is IEEE

A

802.3 (ethernet is three)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data in OSI model

A

Do * 3
Some
People
Fear
Birthdays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Do * 3
Some
People
Fear
Birthdays

A

Data
Segments
Packets
Frames
Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MAC Address in Data Link Layer controls

A

The address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LLC (Logic Link Controller) in Data Link controls

A

data flow and some error control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ICMP (Internet Control Protocol) is at which layer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Router is at which layer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multi layer switch is at which layer

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Switch is at which layer unless told

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

H.323/RTP/NetBIOS at which layer

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data formatting and encryption at which layer

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UDP data is called

A

Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP data is called

A

Segments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Default frame in MTU

A

1500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Jumbo Frame in MTU

A

9000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

We add source and destination ports at layer

A

4 (Transport)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

We add our source and destination IP addresses at layer

A

3 (Network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

We add our source and destination MAC addresses at layer

A

2 (Data Link)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Windowing is done by which protocol

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Ping is a command in which protocol

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

ICMP is used for

A

network diagnostic and error reporting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Port 80

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Port 443

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
HTTPS uses which tunnels
SSL or TLS
26
SMTP (Simple Mail Transfer Protocol) uses port
25
27
SMTPS on which port
Secure version 587
28
SMTP on sends
emails
29
FTP is on ports
20 - actual data transfer 21 - sending control command
30
SFTP is secure FTP and is on port
22
31
SFTP is an FTP protocol through an
SSH connection
32
(TrivialFTP) TFTP is a simpler version of FTP on port
69
33
SMB is to read and write to servers on port
445
34
SMB is used in a LAN not across the
internet
35
Secure Shell (SSH) used for secure remote login over an unsecure network and is on port
22
36
SSH is for encrypted tunnel for text based
commands
37
SIP (Session Initiation Protocol) is on port
5060 / 5061
38
Remote Desktop Protocol (RDP) is on port
3389
39
Telnet is on port
23
40
DHCP is on port and (TCP or UDP)
67\68 and UDP
41
SQL for microsoft is port
1433
42
LDAP over SSL (LDAPS) is on port
636
43
DNS is on port
53 and TCP
44
Syslog is on port
514
45
SNMP (Simple Network Management Protocol) is for
controlling network devices
46
SNMP managers use port
161
47
Lightweight Directory Access Protocol (LDAP) is on port
389
48
SNMP agents use port
162
49
NTP (Network Time Protocol) is on port
123
50
CAT 5 speed
100 (for all)
51
CAT 5e (enhanced) speed
1000Mbps/1 Gbps (*10)
52
CAT 6 speed
1Gbps 10Gbps if 55 meters or less
53
CAT 6a speed
10Gbps for 100meters
54
CAT 8 speed
40Gbps for 30 meters
55
RG-6 cable is used for
cable modem
56
Coaxial cables speeds
1Gbps for 300 meters
57
DAC cables speeds
active 100 Gbps at 15 meters passive 100 Gbps at 7 meters
58
Twinaxial cables (better) are used for
SFP+ and QSFP between routers or switches
59
Twinaxial cables speeds
10G for 100m 100G for 7m
60
Plenum cables (fire resistant) used in what space
roof
61
Cable Speeds start with CAT 5 and go up by a factor of 10
CAT 5 (100Mbps), CAT 5e (1Gbps), CAT 6 (same but 10Gbps at 55m) CAT 6a (10Gbps at 100m), CAT 8
62
Cabling standard 568B colouring (straight Through)
eg switch to computer
63
a cable for a switch to a swtich is
a crossover cabel
64
MDIX simulates the crossover for a cable for exam
don't assume
65
CAT cabling Mnemonics for 568B
We Only Order Great Burgers While Guests Bring Beer
66
We Only Order Great Burgers While Guests Bring Beer (568B)
White-Orange, Orange, White-Green, Blue, White-Blue, Green, White-Brown, Brown
67
Single-mode Fiber (SMF) optical cable colour
Yellow
68
Multi-mode Fiber (MMF) optical cable colour
Aqua blue or orange
69
Subscriber Connector (SC) optical nick name
Stick and click (square shape)
70
Lucent Connector (LC) optical smaller nick name
Love connector
71
Mechanical Transfer-Registered Jack (MTRJ) how many fibers
Two
72
Straight Tip Connector (ST) nick name great outdoors
stick and twist like BNC
73
Media converters and transeivers are which layer devices
Physical
74
Multi-Fiber Push on (MPO) have multiple what
Fibers
75
2.4GHz channels to be used
1 6 11
76
5 GHz has how many channels
24
77
5 GHz uses is based on the WiFi standard
802.11
78
802.11h wireless standardhas the features
Dynamic Frequency Selection (DFS) - looks for radar signals Transmit Power Control (TPC) - minimum power consumption
79
802.11a specs
5GHz speed 54Mbps range 35m
80
802.11b specs
2.4GHz speed 11 Mbps range 140m
81
802.11g specs
2.4 GHz speed 54 Mbps range 140m
82
802.11n specs
5GHz speed 600 Mbps range 35m
83
802.11ac specs
2.4 and 5GHz speeds 1.3 Gbps
84
802.11ax specs
2.4, 5, and 6 GHz speed 9.6Gbps
85
802.11 2.4Ghz wireless which letters
b, g, n, ax
86
802.11 5GHz which letters
a, n, ac, ax
87
802.11 6GHZ which letters
ax
88
802.1X security for WiFi
different user logins
89
WPA uses which vector
TKIP very wea
90
WEP is associated with which term
InitializationVector (IV)
91
WPA is associated with the terms
TKIP and RC4
92
WPA2 is associated with the terms
CCMP and AES
93
WPA3 is associated with the term
SAE
94
Class A 255.0.0.0 first octet
1-127
95
Broadcast Storm
Multiple copies of frames being forwarded back and forth which then consumes the network
96
Network Access Control (NAC) is a
method for increasing the security of a given network by inspecting devices trying to connect to a network.
97
802.1x Authentication provides an
authentication framework for metworks and ensures only authenticated users can access network services
98
RADIUS server performs what function
Authentication
99
MTU default size for ethernet is
1500
100
Class B subnet mask 255.255.0.0 first octet public
128-191
101
Class C subnet mask 255.255.255.0 first octet public
192-223
102
Class D multicast first octet public
224-239
103
Class E first octet public
240-255
104
Private IP Class A Starting Value 10 what is range
10.0.0.0 -10.255.255.255
105
Private IP Class B Starting value 172.16 - 172.31 what is the range
172.16.0.0 - 172.31.255.255
106
Private IP Class C Starting value 192.168 what is the range
192.168.0.0 - 192.168.255.255
107
Loopback IP is Address
127.0.0.1
108
APIPA - automatic Private IP address range is (when DHCP cannot give IP address)
169.254.0.0 - 169.254.255.255
109
DORA stands for
Discover Offer Request Acknowledge
110
DHCP assigns what
IP Address Subnet mask Default gateway DNS/WINS server
111
RADIUS uses which protocol
UDP
112
RADIUS uses ports
1812 and 1813
113
IPSec provides security for what type of network
VPN
114
Kerberos uses a system of tickets to allow nodes to communicate over a non-secure network and securely prove their identity. NA
NA
115
APIPA address starts with
169
116
MTTR stands for
Mean Time to Repair
117
RTO stands for
Recovery time objective
118
RPO stands for
Recovery Point objective
119
MTBF stands for
Mean Time between failures
120
Crossover cables are used to connect two of the
same device together
121
CDA in three-tier hierarchical model stands for
Core Distribution Access
122
7 step syslog severity letters
E ACE WN ID
123
E ACE WN ID stands for
Emergency Alert Critical Error Warning Notice Information Debugging
124
VTP transparent mode Virtual Switch is what?
VTP Transport mode does not synchronize VLAN configuration information with other switches. VTP advertisements when received are not applied to the VLAN database. This mode is used when you want to make the switch independent from current vlan structure. This mode has lowest impact when adding new switch to your switching topology.
125
SFP+ (Small Form-Factor Pluggable Plus) speeds
10Gbs
126
What is the purpose of a pointer (PTF) DNS record?
Maps an IP address to a hostname
127
Public IP Class A range
1-127
128
Public IP Class B range
128-191
129
Public IP Class C range
192-223
130
FTP and SMTP operate at which level of OSI
Application
131
IP is at which OSI level
Network
132
NFV, NSG and NSL stand for
Network functions virtualization, Network Security Group, Network Security Lists
133
A dual stack set up is running
IP4 and IP6 at the same time.
134
NSL (Network Security List) are associated with which part of the network
Infrastructure components eg load balancers
135
TLS is the protocol being used when SSL is omplemented and they stand for
Transport Layer Security and Secure sockets layer
136
NSG (Network Security Groups) control inbound and outbound traffic and act as virtual what?
Firewalls
137
the order of DHCP options from class, scope, server, reserve client
reserve client, class, scope, server
138
Forward DNS zone maps
domain names to IP addresses
139
Reverse DNS Zone have what types of records
pointer
140
FQDN stands for
Fully Qualified Domain Name
141
Structure of FQDN
Hostname, Domain Name, Top-Level Domain (TLD)
142
Purpose of a VPN concentrator
to terminate the VPN tunnels
143
RADIUS provides
centralized remote user authentication and accounting and also supports 802.1x port-based authentication
144
PAT (Port address translation)
able to share a single IP address amoung multiple computers
145
For IaC the following terms Playbooks/templates/reusable tasks, configuration drift/compliance, upgrades, and dynamic inventories are matched with
Automation
146
For Iac the following terms version control, central repository, conflict identification, and branching are matched with
Source control
147
Reverse Zone DNS lookup
IP addresses back to hostnames
148
Forward Zone DNS lookup
domain names into IP addresses
149
IPAM (IP address management) allows
integration of DNS and DHCP so that each is aware of changes in the other.
150
Port for POP3
110
151
DNS records to enter DKIM or SPF are what file type
TXT
152
801.q standard is used for
VLAN
153
802.1d standard is used for
STP (Spanning tree protocol) uses BPDU
154
802.1af standard is used for
POE
155
802.1x standard is used for
network authentication protocol
156
ISAMKP is a
Key management protocol
157
SAML is used in
SSO
158
RDP is on port and is on TCP or UDP
3389 TCP
159
OSI Level for Bridge
2
160
OSI Level for Switch
2 or 3
161
OSI Level for firewall
3 to 7
162
OSI Level for Hub
1
163
Is OSPF a classless protocol
Yes
164
Cabling Base-T are what type of cable
copper
165
Cabling Base-S is it single or double
Remember S is not single
166
802.3ad is for which protocol
LACP (Link Aggregation Control Protocol)
167
MIMO is what?
MIMO uses multiple antennas for transmission and reception,
168
Is a high signal to noise ratio good on a wireless network?
Yes
169
Which cables to swap for CAT wiring from B to A
orange to green
170
Split Horizon is in which protocols
RIP (Routing Information Protocol) and EIGRP (Enhanced Interior Gateway Routing Protocol).
171
RCF 919 is a method for
Broadcasting internet datagrams
172
AUP stands for
Acceptable use policy
173
HSPA+ (Evolved High-Speed Packet Access) and EV-DO (Evolution-Data Optimized) are mobile broadband technologies designed to provide high-speed internet access for cellular networks. Both emerged during the era of
3G
174
Routing Protocols
RIP (Routing Information Protocol) is primarily used within a single autonomous system and is less suitable for inter-domain routing. EIGRP (Enhanced Interior Gateway Routing Protocol) is an interior gateway protocol designed for use within a single autonomous system. OSPF (Open Shortest Path First) is an interior gateway protocol used within a single autonomous system, not for inter-domain routing. BGP (Border Gateway Protocol) is designed for inter-domain routing between different autonomous systems, making it suitable for large-scale enterprise networks with diverse routing domains.
175
Captive portals usually rely on 802.1x, and 802.1x uses
RADIUS for authentication.
176
VRRP stands for
Virtual Router Redundancy Protocol (VRRP) allows for automaƟc assignment of available routers to participating hosts, ensuring conƟnuous network availability even if one router fail. First Hop Redundancy Protocol (FHRP) is a general term for protocols like VRRP that provide the ability to automaƟcally failover to a backup router in case of the primary router failure, minimizing downtime and maintaining network resilience.
177
LLDP is
LLDP: A vendor-neutral protocol used to discover and share information between network devices, such as identity, capabilities, and neighbors.  Usage: Helps in identifying network topology, troubleshooting connectivity issues, and ensuring proper network configuration.
178
CDP is
CDP: A Cisco-proprietary protocol similar to LLDP, specifically used in Cisco networks to share information about directly connected Cisco devices.
179
QoS operates at which OSI levels
2 and 3
180
Multicasting is
one to many (subscriber)
181
Unicast is
one to one
182
Broadcast is
One to all
183
Anycast is
sent to nearest receiver on same IP
184
Optical cable Multi mode distance (long/short)
short
185
Optical Cable Single mode distance (long/short)
Long
186
Voltage for data centers
208V
187
IPv6 address of ::1
loopback
188
nmap -o (with IP) does?
operating system detail of the target server.
189
Anycast can only be used on IPv?
6
190
show interface command does?
This command provides comprehensive details about the operational state of the interface, including its bandwidth, duplex mode, MAC address, IP address, input/output errors, and drops.
191
TACACS+ was developed as a proprietary protocol by Cisco. Kerberos is a network authentication protocol designed
to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT.
192
nmap -sT does
initiates a TCP connect scan.
193
Hot Standby Router Protocol (HSRP)
Allows for active router and standby router
194
WAN circuit switched ratio (eg one to one)
one to many
195
WAN packet switched ratio is eg one to one
many to many
196
WAN frame relay
many to one
197
NAT64 allows
IPv6-only devices to access IPv4 resources
198
FCoE (Fibre Channel over Ethernet) network throughput, provided all network devices recognize their specific frame size. What is the frame size?
Jumbo frame
199
captive portals are implemented by using
an HTTP redirect, an ICMP redirect, or a DNS redirect
200
What metric does OSPF use for route selection?
cost
201
LACP
Link Aggregation Control Protocol
202
nmap -p
scans the post and the computer listed eg 20, 80, 445 10.245.20.1
203
OSPF (Open Shortest Path First) calculates the shortest path using
the Dijkstra algorithm,
204
EIGRP uses the Diffusing Update Algorithm (DUAL)
to achieve rapid convergence and ensure that routing is loop-free and reliable.
205
LLDP
protocol used for dynamically discovering and advertising capabilities of network devices on a local area network.
206
HIDS is a
host-based intrusion detection system
207
Broadcast only works on IPv?
4
208
MIB in SNMP is
The management information base (MIB) is a translation file that is used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers (OID).
209
IaC branching is
in version control systems allows developers to work on different features or fixes in isolation
210
what does the application layer within software-defined networking do?
focuses on the communication resource requests or information about the network
211
what does the Management layer within software-defined networking do?
is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations.
212
what does the control layer within software-defined networking do?
uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to.
213
what does the infrastructure layer within software-defined networking do?
contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements.
214
Native VLANS use tagged or untagged traffic?
untagged
215
The Rapid Spanning Tree Protocol (RSTP) achieves faster convergence compared to the original Spanning Tree Protocol (STP) through the use of
point-to-point links.
216
nmap -sU
UDP
217
nmap -sT
TCP
218
nmap -sV
version
219
RADIUS, TACACS+, and PAP are all protocols that contain known vulnerabilities that would require
additional encryption to secure them during the authentication process.
220
Which of RDP and VNC (Virtual Network Computing) have security
RDP
221
IMAP is on port
143
222
IMAP over SSL is on port
993
223
Transport layer security (TLS) can be used to encapsulate
frames or IP packets.
224
Authentication header (AH) protocol performs
a cryptographic hash on the whole packet, including the IP header, plus a shared secret key, and adds this secret in its header as an Integrity check value (ICV).
225
Encapsulating security payload (ESP) provides
(it attaches fields) confidentiality and/or authentication and integrity. It can be used to encrypt the packet rather than simply calculating a hash.
226
Internet protocol security (IPSec) can be used to secure
IPv4 and/or IPv6 communications on local networks and as a remote access protocol.
227
Generic Routing Encapsulation (GRE) Tunneling protocol allows the transmission
of encapsulated frames or packets from different types of network protocol over an IPv4 network.
228
(CSMA/CA) stands for
Carrier Sense Multiple Access with Collision Avoidance
229
(CSMA/CD) stands for
CSMA with Collision Detection
230
Multimode fiber is inexpensive to deploy compared to single-mode fiber. As such, it does not support long distances as single-mode. Uses what light source
LED
231
the small form-factor pluggable (SFP) uses what connector
LC small connector
232
(QSFP) cable stand for
Quad small form-factor pluggable
233
Cable distances: SR, SX, FX, LX
300m, 300m, 2km, 5km
234
Cable distance Twinaxial (10Gb), 10GBASE-LR, 10BASE-T (twisted pair)
5-10m, 10km, 100m
235
The Fibre Channel connects storage area networks using 3 main types of components:
the initiator the target the Fibre Channel switch. The initiator is the client device of the SAN. The target is the network port for a storage device. The Fibre Channel switch, sometimes referred to as a director, provides the connections between the initiator and the target.
236
(APC) are a connector stands for
Angled physical contact
237
The ultra physical contact (UPC) fiber connector defines
that the cable and connector are polished to the highest standard (a higher standard than with PC).
238
Private IP Classes A, B, C, APIPA
10, 172, 192, 169
239
The routing information protocol (RIP) is a distance vector routing protocol
the next hop router to reach a given network or subnet (vector)
240
Hybrid Routing Protocol is an advanced distance vector comprised of two elements:
bandwidth and delay.
241
OSPF is suitable for organizations with multiple
redundant paths between networks.
242
Enhanced Interior Gateway Routing Protocol (EIGRP) relies on neighboring routers to report
paths to remote networks and uses a metric composed of administrator-weighted elements.
243
A virtual IP (VIP) is a shared
address that is used by clients to access the service provided by the cluster.
244
Routing Information Protocol (RIP) will consider how many routes
1
245
In FHRP configurations each router must have a unique
MAC and IP address, but they share a common virtual IP address.
246
Interior Gateway Protocol (IGP) is the protocol that identifies routes within an
autonomous system (AS)
247
OSPF is suitable for organizations with multiple
redundant paths between networks.
248
RIP only considers the next hop router
to reach a given network or subnet (vector).
249
Enhanced Interior Gateway Routing Protocol (EIGRP)
relies on neighboring routers to report paths to remote networks and uses a metric composed of administrator-weighted elements.
250
The Border Gateway Protocol (BGP) is a patch vector routing protocol used between routing
domains in a mesh internetwork.
251
subinterface is bound to a
physical interface on a router and allocated a VLAN ID
252
SVI is a virtual interface on a Layer 3 switch that is bound to a
VLAN
253
Top-of-rack switching refers to the practice of using switches specifically made to provide high-bandwidth links between
distribution switches and server nodes.
254
Link Aggregation Control Protocol (LACP), which can be used to auto-negotiate the
bonded link between the switch ports and the end system, detects configuration errors and recovers from the failure of one of the physical links.
255
A trunk interconnects between
switches on large networks. A sysadmin will configure each switch as a trunk port for this purpose.
256
Link aggregation means combining two or more separate cabled links into a single logical channel. When done from the host end, this is called
NIC teaming.
257
What happens when an 802.1Q tagged frame is received on an untagged port?
The tag is stripped, and the frame is forwarded to the host
258
(WPA2)-Personal uses a
PSK
259
Cellular speeds 2G, 3G, 4G, 5G
14Kbps 3.1Mbps 150Mbps 50-300Mbps
260
A Yagi (a bar with fins) antenna direction
unidirectional and outdoors
261
A torus (donut) antenna
unidirectional and indoors
262
The SNMP agent maintains a database called a
Management Information Base (MIB)
263
An agent's MIB on a device refers to each parameter stored in it by a numeric
object Identifier (OID). A tree structure stores the OIDs.
264
A port security configuration validates the
MAC address of end systems that connect to a switch port.
265
A 200 status code indicates that an HTTP request has
succeeded
266
A 404 status code indicates that the requested resource could not be
found
267
A 500 status code indicates an internal
server error
268
A 302 status code indicates a temporary
redirection
269
Common Vulnerabilities and Exposures (CVE) is a
dictionary of vulnerabilities in published operating systems
270
A cluster is a group of servers, each of which is referred to as a node, that provides
redundancy and fault tolerance for critical applications.
271
A Service (SRV) record is a DNS record used to identify a record that is providing a
network service or protocol.
272
External DNS servers refers to an external DNS zone that
internet clients must be able to access.
273
Most external DNS servers are managed by third-party organizations and are referred to as
external DNS servers.
274
Full tunnel allows internet access that is mediated by the corporate network that will alter the client's
IP address and DNS servers and may use a proxy.
275
Split tunnel allows the client to access the internet directly using its native
IP configuration and DNS servers.
276
Virtual Network Computing (VNC) allows a site to operate a remote
desktop gateway that facilitates access to virtual desktops or individual apps running on the network servers.
277
Tunnel mode is used for communication between VPN gateways across an
unsecure network.
278
In a full tunnel VPN configuration, all of the client's internet traffic is routed through the
corporate network. This setup alters the client's IP address and DNS servers and may use a proxy, offering better security by ensuring all data is encrypted and monitored.
279
Split tunnel configuration allows the client to access the internet directly
using ISP-managed configurations, not full tunnel.
280
ARP poisoning perpetuates a MitM attack by
broadcasting unsolicited gratuitous ARP reply packets with a spoofed source address.
281
arp -a
reviewing the returned Media Access Control (MAC) address.
282
arp -s
-s allows administrators to add an entry to the ARP cache. The administrator would add the MAC behind the IP.
283
arp commands
-a reviewing the returned Media Access Control (MAC) address. -s allows administrators to add an entry to the ARP cache. The administrator would add the MAC behind the IP. -d will delete the entry for the IP address
284
War driving uses a Wi-Fi sniffer to
detect wireless networks and then connect or try to break into them.
285
a single firewall is that the single firewall configuration typically employs a
triple homed setup.
286
What happens when a Topology Change Notification (TCN) is received in a network using STP?
Ports may change their status from forwarding to blocked or vice versa.
287
The iptables command line utility is used to
edit the rules enforced by the Linux kernel firewall. It can change INPUT, OUTPUT and FORWARD chains that are firewall rulesets.
288
The route command is a command utility to
configure and manage the routing table on a Windows or Linux host.
289
show running-config interface
(displays concise summary information)
290
show interface
(displays extended information)
291
show interface ethernet counters
command displays interface statistics.
292
show ip cache flow command displays
the NetFlow accounting statistics.
293
Iperf is a network performance utility that can
generate TCP and UDP traffic to test bandwidth, latency, and packet loss.
294
how mls netflow ip command displays
NetFlow IP entries.
295
domain information groper (dig) utility is used to query
Domain Name System (DNS) server and return information about a particular domain name.
296
The netstat command allows for checking the state of
ports on a local host
297
arp commands
-a reviewing the returned Media Access Control (MAC) address. -s allows administrators to add an entry to the ARP cache. The administrator would add the MAC behind the IP. -d will delete the entry for the IP address
298
iptables command line utility is used to
change INPUT, OUTPUT and FORWARD chains that are firewall rulesets.
299
The data link layer describes
an agreement between the different systems on the same network segment on how to communicate.
300
The network layer
handles logical addressing and routing
301
the transport layer, enables
end-to-end communication between running applications on different hosts. eg TCP and UPD
302
Session Layer
is responsible for establishing, maintaining, and synchronising communication between applications running on different hosts
303
The presentation layer
data encoding, compression, and encryption.
304
IPSec in Tunnel mode encrypts
both the header and payload
305
IPSec in Transport mode encrpts
the payload of each packet but leaves the header
306
SDN Data plane is
responsible for packets forwarding
307
SDN Control plane
manages network traffic and policies
308
ST Connector fiber single or multimode
single mode
309
SC Connector fiber single or multimode
single and multimode
310
LC Connector (small form) fiber single or multimode
single and multimode
311
Dual LC connector fiber single or multimode
single and multimode
312
Multi-fiber (MPO) is high density single or multimode
single and multimode
313
A stateful firewall inspects everything
inside data packets, the characteristics of the data, and its channels of communication.
314
DoT is
DNS over TLS (DoT) encrypts DNS queries and responses, providing protection against eavesdropping by external attackers.
315
DoH is
DNS over HTTPS (DoH), DoT operates on the traditional DNS port (port 53), which makes it suitable for organizations looking to secure their DNS traffic without altering standard DNS traffic flow.
316
IP helper address
enable a single DHCP server to provide DHCP IP addresses to every PC on the network
317
The switch with the lowest bridge priority becomes
the root switch
318
What ar ethe 7 steps of the problem solving model
1. Identify the problem 2. Establish a theory of probable cause 3. Test the theory to determine the cause 4. Establish a plan of action to resolve the problem and identify potential effects 5. Implement the solution or escalate as necessary. 6. Verify full system functionality amd implement preventive measures if applicable 7. Document finding, action, outcomes and lessons learned throughout the process.
319
DLP stands for
Data Loss Prevention
320
In EIGRP the back up route when the primary route fails is called the
Feasible sucessor
321
PKI Stands for
Public Key Infrastructure
322
DHCP can not have a static
IP address
323
Extensible Authentication Protocol (EAP) is an
authentication framework that allows for the use of different authentication methods for secure network access technologies.
324
PAP and CHAP based on password or certificates
password
325
netstat command show
all active network connections
326
arp show
IP to MAC address translations
327
Acronym ACL
Access Control List: A set of rules used to control network traƯic and access to resource
328
Acronym AH
Authentication Header: A protocol used to provide connectionless integrity and data origin authentication
329
Acronym ARP
Address Resolution Protocol: A protocol used to map IP addresses to MAC addresses.
330
Acronym CAM
Content-addressable Memory: A type of memory used in networking devices for fast data lookup
331
Acronym CDP
Cisco Discovery Protocol: A proprietary protocol used by Cisco devices to share information with directly connected devices
332
Acronym CIA
Confidentiality, Integrity, and Availability
333
Acronym CLI
Command line interface
334
Acronym DAC
Direct Attached Copper
335
Acronym DAS
Direct attached storage
336
Acronym DR
Disaster Recovery
337
Acronym EAPoL
Extensible Authentication Protocol over LAN: A network port authentication protocol used in wired and wireless networks.
338
Acronym ESP
ESP - Encapsulating Security Payload: A protocol used in IPSec to provide confidentiality, integrity, and authenticity of data packets.
339
Acronym GDPR
General Data Protection Regulation: A regulation in the EU governing data protection and privacy.
340
Acronym GRE
GRE - Generic Routing Encapsulation: A tunneling protocol used to encapsulate a wide variety of network layer protocols.
341
Acronym IAM
IAM - Identity and Access Management: A framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources.
342
Acronym ICS
Industrial Control System: Systems used to control industrial processes, including SCADA, DCS, and PLCs.
343
Acronym IIoT
IIoT - Industrial Internet of Things: The use of IoT technology in industrial sectors and applications.
344
Acronym IKE
Internet Key Exchange: A protocol used to set up a secure, authenticated communication channel in IPSec.
345
Acronym IPAM
IPAM - Internet Protocol Address Management: Tools and processes for planning, tracking, and managing IP address space.
346
Acronym IPSec
Internet Protocol Security: A suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet.
347
Acronym IS-IS
IS-IS - Intermediate System to Intermediate System: A routing protocol used to move information eficiently within a computer network, a variant of the link-state routing protocol.
348
Acronym LACP
Link Aggregation Control Protocol
349
Acronym LDAP
Lightweight Directory Access Protocol
350
Acronym LLDP
Link Layer Discovery Protocol: A protocol used by network devices to advertise their identity and capabilities to neighbors on the same local network.
351
Acronym MDIX
Medium Dependent Interface Crossover: A network interface that automatically crosses over the transmit and receive pairs of a cable
352
Acronym NAC
Network Access Control: A security solution that controls access to a network based on policies, including authentication and compliance checks.
353
Acronym OT
OT - Operational Technology: Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events.
354
Acronym PSK
PSK - Pre-shared Key: A shared secret used for securing wireless networks, typically used in WPA or WPA2.
355
Acronym RJ
RJ - Registered Jack: A standardized physical network interface for connecting telecommunications or networking equipment.
356
Acronym SAML
SAML - Security Assertion Markup Language: An XML-based standard for exchanging authentication and authorization data between parties, particularly between an identity provider and a service provider.
357
Acronym SASE
SASE - Secure Access Service Edge: A network architecture model that combines network security functions with WAN capabilities to support the secure access needs of organizations.
358
Acronym SCADA
SCADA - Supervisory Control and Data Acquisition: A system used for remote monitoring and control of industrial processes.
359
Acronym SDN
SDN - Software-defined Network: An approach to networking that uses software-based controllers to manage network resources and services.
360
Acronym SIP
SIP - Session Initiation Protocol: A protocol used to initiate, maintain, and terminate real-time sessions in IP networks, such as voice and video calls.
361
Acronym SIEM
SIEM - Security Information and Event Management: A solution that provides real-time analysis of security alerts generated by network hardware and applications.
362
Acronym SMB
SMB - Server Message Block: A network protocol used for providing shared access to files, printers, and serial ports between nodes on a network.
363
Acronym SOA
SOA - Start of Authority: A DNS record that provides information about the DNS zone and the authoritative server for that zone.
364
Acronym SSE
SSE - Security Service Edge: A framework that combines multiple security services, such as SWG, CASB, and ZTNA, to protect users and data in the cloud.
365
Acronym SVI
- Switch Virtual Interface: A virtual interface used to manage a switch and allow communication between VLANs.
366
Acronym UTM
UTM - Unified Threat Management: A security solution that integrates multiple security features, such as firewall, antivirus, and intrusion detection, into a single device.
367
Acronym VLSM
VLSM - Variable Length Subnet Mask: A technique that allows for more eƯicient allocation of IP addresses by using diƯerent subnet masks within the same network
368
Acronym ZTA
ZTA - Zero Trust Architecture: A security model that assumes no implicit trust, requiring verification of every access attempt regardless of its origin.
369
Routes use what type of cable for a direct connection
DCE
370
ISAKMP is used with what to creat a secure session
IPSec
371
Ports used on RSTP
Root Designated Alternaive Back up Disabled
372
CWDM is
is commonly used in metropolitan area networks (MANs) and in situations where operators want to maximize the capacity of their existing fiber infrastructure without the necessity of installing additional fibers.
373
CWDM v DWDM in cost
more cost-effective
374
DWDM is used in
used in long-haul telecommunications
375
MAC Table is MAC linked to port and is on a
Switch
376
ARP Table is a IP to MAC address and is on a
Router
377
ICV stands for
Integrity Value Check
378
Authentication Header (AH) and Encapsulating security payload (ESP) are part of
IPSec
379
Point-to-point protocol (PPP) is an encapsulation protocol that works at which OSI Level
Layer 2
380
NS record (DNS) tells the computer
where to go for th name.
381
Administrative distance order OSPF, EIGRP, RIP, BGP
BGP, EIGRP, OSPF, RIP
382
Outgoing email uses
SNMP and encryption of TLS/STARTTLS
383
Incoming email uses
POP or IMAP and encryption of SSL/TLS
384
SSH uses TCP or UDP
TCP
385
FTP uses TCP or UDP
TCP
386
POP runs security on
SSL/TLS
387
SMTP runs security
TLS/STARTTLS
388
Transciever and media converter are in which OSI layer
Physical
389
MAC, Bridge,and EUI are in which OSI layer
Data Link
390
UDP Protocols
67/68 DHCP, 69 TFTP, 123 NTP, 161/162 SNMP, 514 SYSLOG
391
OSPF is a distance or link state routing protocol
Link state
392
IS-IS (like OSPF) is a distance or link state routing protocol
Link state
393
EIGRP using bandwidth and delay is a distance or link state routing protocol
Neither it is s hybrid of both
394
Duplex mismatch can cause what type of error?
CRC
395
MU-MIMO is used in which wireless technology
ac and ax
396
IPv6 - Link local unicast
fe80::/10 fe80
397
IPv6 - Multicast
ff00::/8 ff
398
IPv6 - Unspecified
::/128 0::0
399
IPv6 - Loopback
::1/128 ::1
400
3G has what technology
WCDMA, HSPA, HSPA+
401
4G has what technology
LTE, LTE-A
402
5G has what technology
GSM amd CDMA
403
What does the Encapsulating Security Payload (ESP) protocol encrypt (IP header, payload, optional authentication, whole packet)
payload nad optional authentication
404
LC connector size wise is
compact
405
PAP (Password Authentication Protocol) is
unencrypted over plain text
406
EAP-TLS (Extensible Authentication Protocol - TLS) uses what encryption and what for authentication
PKI & TLS encryption and certificates but hard to impliment
407
CHAP (Challenge Handshake AUthentication Protocol) uses a
three way handshake weaker than EAP-TLS, hash based encryption
408
MS-CHAP uses weak encryption so is susceptible to
dictionary attack
409
NSG (Network Security Group) works like a
firewall
410
NSG (Network Security Group) controles
traffic flow between subnets, VMs, or external sources.
411
IAM (Identity and Access Management) purpose is to
manage user identities, roles, and permissions for cloud resources.
412
IAM (Identity and Access Management) has the functionality of
Authentication: Who can access cloud resources (users, groups, service accounts). Authorization: What actions they can perform (read, write, delete, manage). Enforces role-based access control (RBAC). Supports MFA (Multi-Factor Authentication) for security.
413
Order of Resolving a DNS query TLD, Authorative, root, local
local, root, tdl, authorative
414
SVR record is for
Host name and port number
415
IPSec Tunnell Mode encrypts the
entire IP packet
416
IPSec Transport mode encrypts
only the payload
417
A solid amber LED on a switch port signifies that the port is blocked
is blocked by the spanning tree algorithm, which is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network.
418
A flickering green LED, not a solid amber one,
indicates that the link is operating normally with traffic.
419
A blinking amber LED, not a solid amber one, indicates
a fault such as a duplex mismatch.
420
A solid green LED, not a solid amber one, indicates
that the link is connected but there is no traffic passing through.
421
VLAN Port Type - Access Port function
Connects end devices only one VLAN and untagged
422
VLAN Port Type Trunk port function
Connects switches or other VLAN-aware devices and carries traffic for multiple VLANs, tagged
423
VLAN Port Type Hybrid or dynamic
Can operate as either an access or trunk port, depending on the connected device.
424
If Windows detects a duplicate IP (Internet Protocol) address it will
display a warning and disable IP traffic.
425
Header fields in an ethernet frame
Preamble, SDF, Destination MAC, source MAc and ether type Error checking at the end FSC or CRC
426
Tunneling is when an IPv6 packet is inserted into a
IPv4 packet
427
ULA are IPv6 address that are
are private IP addresses
428
NAT router stores port number on a
translation table
429
RADIUS stands for
Remote Authentication Dial-In User Service
430
TACACS+ stands for
Terminal Access Controller Access-Control System Plus
431
IGP (Interior Gateway Protocol) is for what type of system
Autonomous systems