dolan part 2 test 3 Flashcards

1
Q

routers

A
  • packets
  • network layer
  • responsible for forwarding packets between computer networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

broadcast domains

A
  • router = separate broadcast domains
  • Every port on a router should be considered** its own broadcast domain** at face value.
  • switchports on a switch can be assigned membership to smaller broadcast domains based on VLAN assignment.
  • a router can route between broadcast domains. layer 2 switch can’t
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP routing

A

routers make determinations on where to route packets based off the Routing Table inside router.

  • router receive packet ->look destination IP address in header of packet -> compare to routing table -> make forwarding decision

If router is unable to locate destination = routing table discard the received packet.

  • If router matches destination IP address with a matching network contained in the routing table, it will forward the packet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

common routes in routing tables

A
  • Directly Connected Routes – computer networks- are physically connected to the router.
  • Static Routes –** configured directly **that tell a router how to route to a destination computer network.
  • Dynamic Routes – learned + populated in the routing table without direct administrator input in the form of a static route.
  • utilizes a Routing Protocol to find and update routing tables on a router.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

default gateway

A

for any com between nodes =
- valid host IP address, subnet mask, and a valid Default-Gateway

  • the first layer 3 interface that a host will reach; in other words, this is the* first port on the router that the host can reach on its computer network***
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

autonomous systems

A
  • computer networks = administration/routing strategy
  • assigned a number by IANA which is used for a routing protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

routed protocols

A
  • assist application in getting data transferred at the network layer
  • provides address for a packet to be sent on a computer network.

IPv4 or IPv6 that get affixed to the header of a packet as a destination and source address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Autonomous System Router Designation

A
  • The role a router is fulfilling within an autonomous system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Autonomous System Routers (ASR)

A

Routers that fall within an autonomous system

  • running routing protocols that handle routing internal to the autonomous system it belongs to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Autonomous System Border Routers (ASBR)

A

Routers that fall on the border between one autonomous system and another system

-responsible for running routing protocols that handle routing going between the autonomous system that it belongs to and other autonomous systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

routing protocols

A
  • assist router w communicating w neighboring routers to update/share their routing tables dynamically
  • which path it needs to use from its routing table when forwarding a packet to a destination node
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

routing protocols categories

A

Interior Routing Protocols
- routing inside of autonomous system or computer network.

Exterior Routing Protocols
– routing between an autonomous system or computer network and another autonomous system or computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

administrative distance

A
  • select best path when there are two or more different routes to the same destination from two different routing protocols

reliability of routing protocol= prioritized most to least reliable (believable)

  • has only local significance, and is not advertised in routing updates.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

metric

A
  • measure used to decide which route is better (lower number is better)

EX. RIP =hop counts —- OSPF= cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

classful routing protocol

A
  • will not support advertising networks using VLSM.
  • will only advertise networks based off IPv4 address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

classless routing protocol

A

will support advertising networks using VLSM

17
Q

distance vector routing protocols

A

best available path to a network based on distance (hops)
RIP aka RIPv1(routing information protocol) old + max hop count is 15

  • advertisements contain info router’s routing table

RIPv2
- better functionality by providing the capability for classless routing
- use multicasts for routing advertisements instead of broadcasts that are used in RIPv1

  • multicasts sent RIPv2 routers every 30 seconds
18
Q

link state routing protocols

A

routers will build topology of network + use to build routing table

Open Shortest Path First (OSPF). OSPF -used on mid to large sized computer networks. classless and interior routing protocol

calculate shortest route to a destination computer network through its routing algorithm

factors bandwidth, load, and delay to assign a Cost to an interface

Cost is the metric used by OSPF

19
Q

Hybrid routing protocols

A

combine both distance vector and link state routing protocols

EIGRP aka Advanced Distance Vector

originally was Cisco now= vendor neutral routing protocol
- classless + interior routing protocol
- will support VLSM
- not limited to class of address when building a shared routing table amongst participating routers

considers bandwidth, load, total delay, reliability, frame sizes, and hop count

20
Q

path vector routing protocols

A

maintain path information and attempt to avoid routing loops both inside and between autonomous systems

BGP used by ISP and large organizations for routing between autonomous systems. both an interior and exterior routing protocol

depending on BGP’s application to a computer network

Interior Border Gateway Protocol (iBGP) – internal routing protocol on an ASR inside of an computer network or autonomous system.

Exterior Border Gateway Protocol (eBGP) – external routing protocol on an ASBR for routing between one autonomous system to another autonomous system.

21
Q

Inter-Vlan routing

A

a router facilitating communication between one VLAN to another VLAN

more localized to an individual computer network versus WAN routing that happens between autonomous systems

mulitple VLANS = individual subnet created for each VLAN

22
Q

Defense Information Systems Agency (DISA)

A

requires printers to be assigned to a VLAN that is different from VLANs that are used for normal user traffic

23
Q

Sub-interfaces

A
  • allow single physical port on router to have multiple logical address assigned to it to act as default-gateways for multiple VLANs (i.e. subnets) on a computer network.
  • accomplished by subdividing the router’s physical port into multiple logical interfaces.
24
Q

Switch Virtual Interfaces (SVIs)

A
  • layer 3 interfaces created on switch+functionality to switch it is configured
  • allows logical address to be assigned to switch= receive packets with destination.

aka Routed VLAN Interfaces (RVIs).

remote management of switch using Telnet or SSH.

25
Q

Security Technical Implementation Guides (STIGs)

A
  • cybersecurity practices which enhance the security of a computer network (harden security networks through categorized levels

CAT I – vulnerability that will directly + immediately result in a loss of confidentiality, availability, or integrity -greatest risk to a United States Air Force computer network.
ex: a piece of network equipment without passwords configured on it.

CAT II – vulnerability that can results in loss of confidentiality, availability, or integrity
-ex: a piece of network equipment that lacks DoD approved banners that identify the device as belonging to the DoD.

CAT III – vulnerability that degrades measures to protect against loss of confidentiality, availability, or integrity

  • example: any type of practice that by itself does not compromise a system but can reasonably lead to a CAT II vulnerability.
26
Q

port security

A

a port-based method of limiting access to a single switchport on a switch

limits a potential threat from gaining access to a computer network by simply swapping out a node with their own equipment on an active link

MAC based method

This means that any node that is later plugged into that same port will trigger port-security and cause the switchport to enter an Error-Disabled state and shutdown

port-security should only be applied on access switchports because of it’s most common implementation being MAC based

27
Q

IEEE 802.1x

A
  • port-based authentication method for limiting access across an entire wired or wireless computer network

removes the need to individually configure switchports for port-security for every node on a micro level and moves it towards a more macro based application

provides a means for nodes that are plugged into a switch to authenticate with a server and be permitted access based on that authentication

3 primary components

Supplicant – node requires access approval

Authenticator – device requesting approval to join the computer network. (typically a switch)
Authentication Server – approving authority authenticator grant or deny access to the computer network to a requesting node.

28
Q

Access Control Lists

A

packet filters configured on piece of network equipment. They will examine traffic based the criteria that is provided to them

two types :

-Standard ACLs - are limited in what criteria can be provided to them.

  • examine packets and filter based off the sources logical address

An implicit deny any statement means deny everything that does not meet the specified criteria of the ACL.

permit any ^ reverse this

  • Extended ACLs -
    allow for more criteria to be specified when filtering packet traffic

can examine packets based off both the source and destination logical address

can be configured to examine the protocols used in the packet traffic and make filtering decisions to either permit or deny based off that