Lesson 12: Ensuring Network Availability Flashcards

1
Q

Define SSH (Secure Shell)

A

Application protocol supporting secure tunneling and remote terminal emulation and file copy (SFTP). SSH runs over TCP port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a SSH host key?

A

A public/private key pair used to identify an SSH server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What purpose does an SSH host key serve?

A

To identify the SSH server and set up a secure channel for the client to submit authentication credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the various methods to authenticate with an SSH server?

A
  1. Username/password
  2. Public key authentication
  3. Kerberos
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What commands starts the SSH server on a device?

A

sshd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command creates a host key?

A

ssh-keygen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command is used to store private keys?

A

ssh-agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command is used to connect a ssh client to a host?

A

ssh hostname or IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command is used to transfer a file using ssh?

A

scp Username@Host:RemoteFile /Local/Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Telnet?

A

Application protocol supporting unsecure terminal emulation for remote host management. Telnet runs over TCP port 23.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is Telnet unsecure?

A

Telnet connections are not encrypted and are vulnerable to packet sniffing and replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port does RDP use?

A

TCP port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Network Time Protocol (NTP)

A

Application protocol allowing machines to synchronize to the same time clock that runs over UDP port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do client hosts receive time?

A

Using Simple NTP (SNTP) over UDP port 123; can’t act as a time source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What windows command is used to configure NTP?

A

w32tm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the file to configure for NTP in linux?

A

/etc/ntp.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define a bottleneck

A

Troubleshooting issue where performance for a whole network or system is constrained by the performance of a single link, device, or subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Simple Network Management Protocol (SNMP)

A

Application protocol used for monitoring and managing network devices. SNMP works over UDP ports 161 and 162 by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is needed for SNMP?

A

SNMP Agents and a SNMP monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the purpose of an SNMP agent?

A

Installed on a device for monitoring/management, maintains a Management Information Database (MIB) that holds device statistics referred to by a numeric object identifier (OID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Object Identifiers (OID)

A

A unique numeric value assigned to each statistic stored in a management information database (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How is an SNMP agent configured?

A

With the community name of the computers allowed to manage the agent and the IP address or hostname of the server running the management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the function of a community name?

A

Acts as a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define an SNMP monitor

A

A management software that allows to oversee network activity by polling agents for data for their management information databases (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the two ways an SNMP monitor can poll data from a SNMP agent?
1. Get 2. Trap
26
What is the get function in a SNMP monitor?
The software queries the agent for a single object identifier (OID) at regular intervals
27
What is the trap function in a SNMP monitor?
The agent informs the monitor of a notable event once a set threshold is reached
28
What port does the SNMP monitor use for the get functnction?
UDP port 161
29
What port does the trap function use for a SNMP monitor?
UDP port 162
30
What do system logs typically contain?
Records startup events, changes to the OS, kernel processes, and driver
31
What do application logs typically contain?
Data from specific services such as DNS, HTTP
32
What do audit logs typically contain?
authentication attempts, privilege authorization/escalation
33
Define a log collector
Aggregates event messages from devices that are configured to send logs to it
34
Define Syslog
Application protocol and event logging format enabling different appliances and software applications to transmit logs or event records to a central server
35
What port does Syslog use?
UDP port 514
36
What is the range of syslog severity levels?
1-7
37
What is a logging level configuration?
determines the level at which events are recorded or forwarded on each host
38
What is a heartbeat test?
A mechanism that probes a device to ensure it is available
39
Define Quality of Service (QoS)
The use of mechanisms or technologies that control network traffic and ensure the performance of critical applications with limited network capacity
40
What functions does Quality of Service (QoS) offer?
Prioritize traffic, which includes offering dedicated bandwidth, controlled jitter, and lower latency.
41
How can latency be tested?
1. Ping 2. Pathping 3. mtr
42
Define Jitter
Defined as being a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery. Jitter is also measured in milliseconds
43
What is the max latency for VoIP to function properly?
150 ms, 300ms round trip time (RTT)
44
What are the network components Quality of Service (QoS)?
1. Control plane 2. Data plane 3. Management plane
45
Define control plane in Quality of Service (QoS)
Determines how traffic should be prioritized and where is should be switched/routed
46
Define data plane in Quality of Service (QoS)
Performs switching/routing of traffic
47
Define management plane in Quality of Service (QoS)
Monitors traffic conditions
48
What appliance/software is used to apply QoS functions?
A traffic shaper
49
What tools can be used to measure network throughput?
1. iperf 2. Ttcp 2. bwping
50
How can throughput be mesaured manually?
1. Transfer a file between two hosts, record the file size and the time it takes 2. Take the file size and convert to bits, then divide that number by the amount of seconds it took for the file transfer to complete
51
Define a top talker
Interfaces that generate the most outgoing traffic in terms of bandwidth
52
Define a top listener
Interfaces that receive the most incoming traffic
53
What are two bandwidth speed testing tools?
1. Broadband speed checker/test 2. Website performance checker
54
Define a broadband speed checker
Test how fast the local broadband link to the internet is; tests downlink and uplink speeds using latency ping
55
Define a website performance checker
Queries a website to work out how quickly pages load
56
What is NetFlow
A packet analyzer that measures network stats
57
What are the three components of NetFlow?
1. Exporter 2. Collector 3. Analyzer
58
What is the NetFlow exporter function?
Configured on network appliances (switch/router/firewall), and creates a "traffic flow" from each device defined by IP source and destination and protocol type
59
What is the NetFlow collector function?
Aggregates flows from multiple exporters
60
What is the NetFlow analyzer function?
Reports and intercepts information by querying the collector, can also be used to generate alerts/notification
61
What is link state?
Measures whether an interface is up or down
62
What is the reset metric?
The number of times an interface has restarted over the counter period
63
What is the utilization metric?
Data transferred over a period of time, measured in bits per second or as a percentage of available bandwidth
64
What is error rate?
The number of packets per second that cause errors
65
What causes an interface to discard/drop packets/frames?
checksum errors, mismatched MTUs, packets that are too small (runts) or too large (giants), high load, or configuration errors
66
What are the typical causes of a Cyclic Redundancy Check (CRC) error?
Interferance/attenuation, poor cable quality, termination, mismatch cable types
67
What is an encapsulation error?
When frame format is not expected on a link.
68
What causes encapsulation error?
1. Incorrect ethernet/WAN frame type 2. Ethernet trunk interfaces don't use the same format
69
How many different traffic classes can be defined by 802.1Q Quality of Service?
8 different traffic classes
70
What does a syslog alert with code 2 represent?
Critical level
71
What does a syslog alert with code 5 represent?
A notice indicating that current state could lead to error
72
What does a syslog alert with code 1 represent?
A fault requiring immediate remediation; Critical Error
73
What does a syslog alert with code 3 represent?
Indicates a non-urgent fault
74
What is sufficient bandwidth for VoIP?
100Kbps
74
Define latency
the time it takes for a transmission to reach the recipient, measured in milliseconds (ms)
74
Define Bandwidth
Referred to as the amount of data that can transmitted (measured in Mbps or Gbps)