EXAM Flashcards

(47 cards)

1
Q

What is a Network-attached Storage (NAS) device?

A

Dedicated file storage systems providing data access to authorized clients

NAS devices are designed for easy file access over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary function of Storage Area Networks (SANs)?

A

SANs are used for high-speed data storage and retrieval.

High-speed networks for consolidated block-level data storage, enhancing accessibility

SANs improve data accessibility by allowing multiple servers to access the same storage resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Proxy Servers

A

■ Act as intermediaries between user devices and the internet, enhancing
security and privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Network Function Virtualization (NFV)

A

■ A concept that transforms traditional, hardware-dependent network
services into software-based virtual functions, enhancing agility and
flexibility in telecommunications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virtual Private Cloud

VPC

A

■ Enables creation of virtual networks in the cloud
and connected to on-premise data centers or other
AWS services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Stateless Address Auto Configuration (SLAAC)

A

■ An integral component of the IPv6 network protocol, simplifying the
network configuration process by allowing devices to autonomously
assign their IP addresses
■ Created to reduce administrative overhead and foster self-sufficiency in
network management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DAC - Direct Attach Copper (DAC) Cables

A

● Fixed assembly copper cabling for short distances

100 Gbps at 15 meters (active cables); 100 Gbps at 7 meters
(passive cables)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BNC Connector (Bayonet Neill-Concelman)

A

● Coaxial connector with a secure bayonet locking mechanism
● Used with RG-6 or RG-59 coaxial cables
● “Push and twist” style connector
● Common in professional video connections and radio frequency
applications
● Introduced in the 1940s, often erroneously called British Naval
Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

F Type Connector

A

● Screw-on connector used with RG-6 and RG-59 coaxial cables
● Standard for cable TV, satellite, and cable internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RJ - 11

A

Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

RJ - 45

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the shape and design of the SC Connector?

A

Square shape with push-pull design

used with Single-mode fibers

and for Telecommunications and data networking

FTTH deployments for reliability and ease of use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the size and mechanism of the LC Connector?

A

Compact size with push-pull mechanism

High-density applications like data centers

As paired cables for transmit and receive sides

High-precision alignment, ensuring efficient data transmission and minimized potential data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What shape and mechanism does the ST Connector have?

(straight tip)

A

Round shape with twist-lock mechanism

When operating in any kind of environment where movement or vibrations might occur

Multi-mode fiber optics

Outdoor applications due to its durability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the design of the MTRJ Connector?

A

Small, rectangular design housing transmit and receive fibers

Space-constrained applications like office LANs

High-density capabilities with an RJ-style latch mechanism

Cost-effective solution for densely populated network environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of the MPO Connector?

A

Designed for multiple fibers in a single connector

High-density applications such as data centers and high-speed networks

Enables quick and efficient connections, crucial for rapid scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Request for Comments (RFCs)

A

A formal publication from the Internet Engineering Task Force
(IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RFC 1918

A

○ Defines ranges for the private IP addresses
○ Private IP Ranges
■ Class A – 10.x.x.x (e.g., 10.0.0.0 - 10.255.255.255)
■ Class B – 172.16.x.x to 172.31.x.x (e.g., 172.16.0.0 -
172.31.255.255)
■ Class C – 192.168.x.x (e.g., 192.168.0.0 -
192.168.255.255)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CIDR (Classless Inter-Domain Routing) Notation

A

■ Provides a shorthand for expressing subnet masks

EX: /27

20
Q

Variable Length Subnet Mask (VLSM)

A

■ Allows subnets of various sizes to be used within a larger network
■ Enhances flexibility in subnetting by accommodating different network
requirements

21
Q

BGP (Border Gateway Protocol)

Routing Protocol

A

● An external gateway protocol
● Uses PATH VECTOR and autonomous system hops for routing
decisions
● Backbone protocol of the internet
● Slow convergence time

22
Q

OSPF (Open Shortest Path First)

A

● Another interior gateway protocol
● Uses LINK STATE and cost for routing decisions
○ Cost is based on link speed
● Faster convergence than RIP

23
Q

EIGRP (Enhanced Interior Gateway Routing Protocol)

A

● ADVANCED DISTANCE VECTOR protocol
● Hybrid of distance vector and link state
● Uses bandwidth, delay, and cost for routing decisions
● A Cisco-developed upgrade to OSPF that is popular in Cisco-only
networks
- Port 88

24
Q

Network Address Translation (NAT)

A

■ Conserves limited IPv4 addresses by translating private IPs into public IPs

25
Port Address Translation (PAT)
■ Allows multiple devices to share a single public IP address by using different port numbers to differentiate traffic ■ Many-to-one translation
26
First Hop Redundancy Protocol (FHRP)
■ Group of protocols ensuring network reliability by providing automatic failover to a backup router if the primary router fails
27
IP Address Management (IPAM)
A methodology and suite of tools used to plan, track, and manage the IP address space inside a network infrastructure
28
Service Level Agreement (SLA)
● Documented commitment between a service provider and a client ● Defines quality, availability, and responsibilities ● Primarily concerned with supporting and responding to problems within a given time frame ● Outlines responsibilities, guarantees, and warranties for a service and its components ● Can provide predictability in service delivery ● Penalties for not meeting SLA terms depend on the agreement and contract
29
End of Life EOL
Date when a manufacturer will no longer sell a given product
30
End of Support EOS
Last date that a manufacturer will support a given product
31
Recovery Time Objective (RTO)
● Time taken to resume normal business operations ● Goal is to resume operations within a defined time frame (e.g., 60 seconds)
32
Recovery Point Objective (RPO)
● maximum acceptable data loss measured in time. Point which data must be recovered after a diaster - how much data can be lost since the last backup ● Example ○ RPO of 6 hours means data backups should occur at least every 6 hours
33
Mean time to repair
● Average time to repair a network device after failure
34
Mean Time Between Failures (MTBF)
● Average time between failures on a device
35
Network Time Protocol (NTP)
■ Used for synchronization of clocks between different computer systems ■ Sends data using UDP packets on port 123
36
Precision Time Protocol (PTP)
■ Used to synchronize clocks throughout the computer network ■ Ideal for networks requiring precise timekeeping
37
Network Time Security Protocol (NTS)
■ An extension of NTP developed to provide cryptographic security for time synchronization ■ Uses TLS and AEAD to ensure secure time synchronization ■ Authenticates the time source and the integrity of received time to prevent malicious tampering
38
GUI
Graphical User INterface for remote control with RDP 3389
39
RADIUS
Centralized administration for authentication Utilizes individual user credentials managed by an authentication server
40
TACACS+ (Terminal Access Controller Access-Control System Plus)
Cisco proprietary authentication/authorization TCP (slower than RADIUS) Can be used to independently conduct authentication, authorization, and accounting processes
41
SAML (Security Assertion Markup Language)
■ XML-based authentication data exchange ● SSO or federated identity management ● Service provider ● User agent (e.g., web browser) ● Identity provider ■ Example ● Using Google as an identity provider to access a website
42
Evil Twin
■ Attacker sets up own access point with his own internet connection, masquerading as legitimate network
43
VLAN hopping
Exploits misconfigurations to gain unauthorized access to different VLAN
44
Troubleshooting Methodology
■ Step 1 – Identify Problem ■ Step 2 – Establish Theory of Probable Cause ■ Step 3 – Test Theory ■ Step 4 – Establish Plan of Action ■ Step 5 – Implement Solution ■ Step 6 – Verify Full System Functionality ■ Step 7 - Troubleshooting Documentation
45
802.1Q Tagging
802.1Q Tagging ■ Refers to IEEE standard that facilitates the management of multiple VLANs on a single network ■ Essential for VLAN configurations
46
Nslookup
Queries dns servers directly to help verify IP info
47
Infrastructure as a service
Lift and shift migration Provides virtualized computing resources over the internet Company take on premises servers to the cloud