Mid-Term II Flashcards

Study guide for mid-term II (247 cards)

1
Q

Difference between IPv4 and IPv6

A
  • IPv4: 32-bit address; written in decimal form; allows for 3.4 billion addresses; 8 bits per octet; 192.168.1.1
  • IPv6: 128-bit address; written in hexadecimal; allows 340 undecillion addresses; supports auto-configuration and built-in security; 16 bits per section; 0000:0000:0000:0000:0000:0000:0000:0001
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Private IP ranges for IPv4

A
  • Class A: 10.0.0.0 – 10.255.255.255
  • Class B: 172.16.0.0 – 172.31.255.255
  • Class C: 192.168.0.0 – 192.168.255.255
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who assigns public IP addresses

A

Internet Assigned Numbers Authority (IANA) distributes IP’s to Regional Internet Registries (RIR) that then distribute IP’s within their assigned region.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the CIDR classes

A
  • Class A: 1.0.0.0 - 126.255.255.255; Default mask - 255.0.0.0 (/8)
  • Loopback: 127.0.0.1 - 127.255.255.255
  • Class B: 128.0.0.0 - 191.255.0.0; Default mask - 255.255.0.0 (/16)
  • Class C: 192.0.0.0 - 223.255.255.255; Default mask - 255.255.255.0 (/24)
  • Class D: 224.0.0.0 - 239.255.255.255; Multicast Class
  • Class E: 240.0.0.0-255.255.255.255; Reserved
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Usable hosts on /30 subnet

A

Total: 4
Usable: 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Usable hosts on /29 subnet

A

Total: 8
Usable: 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Usable hosts on /28 subnet

A

Total: 16
Usable: 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Usable hosts on /27 subnet

A

Total: 32
Useable: 30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Usable hosts on /26 subnet

A

Total: 64
Useable: 62

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Usable hosts on /16 subnet

A

Total: 65,536
Usable: 65,534

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three main categories of ports

A

Well-Known (0-1023) - Assigned by IANA
Registered Ports (1024-49151) - Used by software vendors for proprietary applications
Dynamic/Ephemeral (49152-65535) - Temporarily used for client-side comms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port does FTP (Data) use

A

Port 20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port does FTP (Control) use

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port does SSH use

A

Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What port does Telnet use

A

Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port does SMTP use

A

Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What port does DNS use

A

Port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What port does DHCP use

A

Port 67-68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What port does TFTP use

A

Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What port does HTTP

A

Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What port does POP3 use

A

Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What port does NTP use

A

Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port does RPC use

A

Port 135

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What port does NetBIOS use

A

Port 137-139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What port does IMAP use
Port 143
26
What port does SNMP use
Port 161-162
27
What port does LDAP use
Port 389
28
What port does HTTPS use
Port 443
29
What port does SMB/CIFS
Port 445
30
What port does Syslog use
Port 514
31
What port does IMAPS use
Port 993
32
What port does POP3S use
Port 995
33
What port does MS SQL use
Port 1433
34
What port does Oracle DB use
Port 1521
35
What port does L2TP use
Port 1701
36
What port does RADIUS use
Port 1812-1813
37
What port does MySQL use
Port 3306
38
What port does RDP use
Port 3389
39
What port does SIP use
Port 5060/5061
40
What port does BitTorrent use
51413
41
Which category of Ethernet cable supports speeds up to 10 Gbps?
CAT6a
42
True or False: Coaxial cables are commonly used for broadband Internet connections.
True
43
What is the maximum length for a standard Ethernet cable run?
100 meters
44
Which type of network cable is best for outdoor use?
Fiber optic cable
45
What type of connector is commonly used with Ethernet cables?
RJ45
46
What is the main advantage of fiber optic cables over copper cables?
Higher bandwidth and longer distance capabilities.
47
Fill in the blank: __________ cables use light to transmit data.
Fiber optic
48
What does the 'U/FTP' in cable specifications stand for?
Unshielded Foiled Twisted Pair
49
What is the typical color coding for Ethernet cables?
Orange and white stripes, blue and white stripes, green and white stripes, brown and white stripes.
50
True or False: Shielded cables are used to reduce electromagnetic interference.
True
51
What is the difference between single-mode and multi-mode fiber cables?
Single-mode fibers allow one light mode to propagate, while multi-mode fibers allow multiple light modes.
52
Fill in the blank: The standard for Ethernet networking is defined by __________.
IEEE 802.3
53
What is the maximum data transfer rate of CAT5e cables?
1 Gbps
54
Multiple Choice: Which type of cable is typically used for connecting a modem to a router? A) Coaxial B) Fiber C) Ethernet D) Telephone
C) Ethernet
55
True or False: Twisted pair cables are used in telephone networks.
True
56
What type of network cable is most resistant to physical damage?
Fiber optic cable
57
Fill in the blank: __________ cables are used for long-distance telecommunications.
Fiber optic
58
What does the term 'crosstalk' refer to in network cables?
Interference caused by signals in adjacent wires.
59
Multiple Choice: Which cable type is best for high-speed networks? A) CAT5 B) CAT6 C) CAT3 D) Coaxial
B) CAT6
60
What is the primary disadvantage of using copper cables?
Limited distance and susceptibility to interference.
61
True or False: Network cables can be used to power devices using Power over Ethernet (PoE).
True
62
Fill in the blank: The __________ cable is commonly used for connecting televisions to satellite dishes.
Coaxial
63
What is the main function of a patch cable?
To connect devices to a network switch or router.
64
True or False: The higher the category number of an Ethernet cable, the better its performance.
True
65
Fill in the blank: __________ cables are more flexible and easier to install than solid cables.
Stranded
66
What does the term 'attenuation' mean in the context of network cables?
Loss of signal strength over distance.
67
Multiple Choice: Which type of fiber optic cable is typically used for short distances? A) Single-mode B) Multi-mode C) Coaxial D) Twisted pair
B) Multi-mode
68
What is the primary use of a crossover cable?
To connect two like devices directly, such as two computers.
69
True or False: The maximum data rate of CAT6 cables is 10 Gbps.
True
70
Fill in the blank: The __________ connector is used with fiber optic cables.
Lucent Connector (LC)
71
What is the primary benefit of using shielded twisted pair (STP) cables?
Reduced electromagnetic interference.
72
What is the standard color for the wiring in a CAT5 cable?
Blue, orange, green, brown.
73
Fill in the blank: __________ cables are often used in data centers for high-speed connections.
Fiber optic
74
What is the main disadvantage of fiber optic cables?
Higher installation costs compared to copper cables.
75
Multiple Choice: Which of the following is NOT a characteristic of coaxial cables? A) High bandwidth B) Susceptible to interference C) Used for cable TV D) Used for long-distance networking
B) Susceptible to interference
76
What is the purpose of a network cable tester?
To check the integrity and performance of network cables.
77
True or False: Fiber optic cables are immune to electromagnetic interference.
True
78
This mode accommodates transmitting and receiving on the network, but not at the same time
Half-duplex mode
79
This mode simultaneously transmits and receives
Full-duplex mode
80
This type of cable is typically used with Fast Ethernet operating at 100Mbps with a transmission range of 100 meters
Category 5
81
This type of cable used on networks that run at 10/100Mbps and even up to 1000Mbps
Category 5e
82
This type of cable has a minimum of 250MHz of bandwidth and specifies cable lengths up to 100 meters with 10/100/1000Mbps transfer, along with 10Gbps over shorter distances
Category 6
83
This type of cable a minimum of 500MHz of bandwidth with transmission distance up to 100 meters with 10Gbps networking speeds
Category 6a
84
What type of coaxial cable is often used for cable TV and cable modems
RG-6
85
This type of fiber optic cable has many beams of light travel through the cable bouncing off the cable walls. This strategy actually weakens the signal reducing the length and speed at which the data signal can travel
Multi mode fiber
86
This type of fiber optic cable uses a single direct beam of light thus allowing for greater distances and increase transfers speeds
Single-mode fiber
87
This is the mysterious space that resides between the false, or drop, ceiling and the true ceiling
Plenum
88
This type of cable must be fire resistant and they must not produce toxic fumes if exposed to intense heat
Plenum cables
88
89
This type of fiber connector uses a half twist bayonet type of lock
Straight Tip (ST) connector
90
This type of fiber connector uses a push pull connector similar to common audio and video plugs and sockets
Subscriber Connector (SC) connector
91
This type of fiber connector has a flange on top similar to an RJ-45 connector that aids secure connection
Lucent Connector (LC) connector
92
This type of fiber connector is a popular connector for two fibers in a very small form factor
MT-RJ
93
This type of cable is proprietary cable used to connect a PC to a Cisco router
Rollover cable
94
This type of cable is used to test and isolate network problems
Loopback cable
95
This type of cabling connects the telecommunication room to the end-user
Horizontal cabling
96
This type of cabling connects telecommunication rooms, server rooms, and remote locations and offices
Vertical cables
97
This provides a connection point between network equipment such as hubs and switches and the ports to which PCs are connected which normally are distributed throughout a building
Patch panels
98
This type of closet for a network typically holds the majority of the network gear including routers switches wiring servers and more. This is also typically the wiring closet where outside lines run into the network
Main Distribution Frame (MDF)
99
This is the connection point between the operators part of the network and the customers portion of the network
Demarc
100
This standard defines a range of networking systems based on the original ethernet standard
802.3
101
This, which is defined in the IEEE 802.3 standard, is the most common media access method because it is associated with 802.3 Ethernet networking, which is by far the most popular networking system
Carrier Sense Multiple Access/Collision Detection CSMA/CD
102
This is known as a contention media access method because systems contend for access to the media
CSMA/CD
103
On a network that uses this, every node has equal access to the network media
CSMA/CD
104
On this type of network, each computer signals its intent to transmit data signals before any data is actually sent
Carrier Sense Multiple Access/Collision Avoidance CSMA/CA
105
CSMA/CA uses this method to signal its intention to transmit data
Broadcasts
106
This enables you to use multiple channels at the same time to increase performance
Bonding
107
10BaseT ethernet type has
Speed: 10 Mbps Medium: Twisted Pair (Cat3 or better) Max Length: 100 meters
108
100BaseTX ethernet type has
Speed: 100 Mbps Cable Type: Twisted pair (Cat5 or higher) Max Length: 100 meters
109
1000BaseT ethernet type has
Speed: 1 Gbps Cable Type: Twisted pair (Cat5e or higher) Max Length: 100 meters
110
10GBaseT ethernet type has
Speed: 10 Gbps Cable Type: Twisted pair (Cat6a or higher) Max Length: 100 meters
111
100Base-FX ethernet type has
Speed: 100 Mbps Cable Type: Fiber optic Max Length: 2 kilometers (multi-mode fiber)
112
1000BaseLX
Speed: 1 Gbps Cable Type: Fiber optic Max Length: 5 kilometers (single-mode fiber)
113
10GBaseSR
Speed: 10 Gbps Cable Type: Fiber optic Max Length: 300 meters (multi-mode fiber)
114
Common Ethernet Suffixes
T: Twisted Pair (e.g., 100Base-TX) TX: Twisted Pair with extended capabilities (e.g., 100Base-TX) FX: Fiber Optic (e.g., 100Base-FX) LX: Long Wavelength Fiber Optic (e.g., 1000Base-LX) SX: Short Wavelength Fiber Optic (e.g., 1000Base-SX) SR: Short Range Fiber Optic (e.g., 10GBase-SR) LR: Long Range Fiber Optic (e.g., 10GBase-LR)
115
10 Gigabit Ethernet is defined in what IEEE standard
802.3ae
116
What is 802.11a?
Frequency: 5 GHz Speed: Up to 54 Mbps This is the maximum possible speed under perfect conditions (no interference, ideal distance, etc.) Range: Shorter than 2.4 GHz (higher freq = less penetration) Often used in business or industrial environments
117
What is 802.11b
Frequency: 2.4 GHz Speed: Up to 11 Mbps Range: Good range, but very susceptible to interference from devices like microwaves and Bluetooth Obsolete but foundational
118
What is 802.11g
Frequency: 2.4 GHz Speed: Up to 54 Mbps Backward compatible with 802.11b Suffers from the same interference as 802.11b
119
What is 802.11n
Frequency: 2.4 GHz and 5 GHz (dual-band) Speed: Supports speeds up to 600 Mbps (theoretical), but commonly seen at up to 540 Mbps or slightly lower in practice. (typically 150–300 Mbps per channel) Uses MIMO (Multiple Input Multiple Output) Backward compatible with a/b/g
120
What is 802.11ac
Frequency: 5 GHz Speed: Up to 6.9 Gbps Uses MU-MIMO and wider channels (80/160 MHz) Backward compatible with 802.11n
121
What is 802.11ax
requency: 2.4 GHz & 5 GHz, newer variants support 6 GHz Speed: Up to 9.6 Gbps total throughput More efficient for high-density environments (stadiums, offices) Introduces OFDMA and Target Wake Time (TWT)
122
What is WEP
Wired Equivalent Privacy Uses RC4 stream cipher Very insecure due to weak key generation Deprecated; should not be used
123
What is WPA
Wi-Fi Protected Access Uses TKIP (Temporal Key Integrity Protocol) Introduced to replace WEP Better than WEP, but still has vulnerabilities
124
What is WPA2
Replaces TKIP with AES encryption (CCMP mode) Much more secure than WPA Recommended minimum for secure networks
125
What is WPA3
Latest Wi-Fi security standard Uses SAE (Simultaneous Authentication of Equals) for stronger handshakes Better protection against dictionary attacks Individualized data encryption
126
What is omni directional antenna
Sends/receives signals in all directions equally Ideal for general coverage in open spaces Common in home routers
127
What is a Yagi antenna
Highly directional antenna Long-range, focused beam Great for point-to-point communication (e.g., between buildings)
128
What is a panel antenna
Flat and directional Mounts on walls to focus signal Offer a directional radiation pattern, which means they focus the signal in one direction, ideal for point-to-point connections (like between buildings) Easier to install and align than larger directional options like parabolic antennas Less likely to interfere with nearby 4G/5G signals since the radiation pattern is focused
129
What is a parabolic antenna
Uses a dish to focus signals Very long-range, extremely directional Often used for satellite or long-distance point-to-point Wi-Fi
130
What is SSID broadcast
The SSID is the network name broadcast by the AP Disabling SSID broadcast hides the network from casual scanning, but doesn’t provide real security
131
What is RADIUS
Remote Authentication Dial-In User Service Centralized AAA (Authentication, Authorization, Accounting) service Used in WPA2-Enterprise and WPA3-Enterprise Integrates with Active Directory or LDAP for user authentication
132
What is static routing
Routing paths are manually configured by a network administrator. Used in small networks or for predictable routing needs. Advantages: Simple, secure, no overhead. Disadvantages: Doesn’t adapt to changes or failures.
133
What is dynamic routing
Routers automatically share routing information using protocols. Adapts to network changes (e.g., down links or new routes). Involves routing algorithms and metrics (like hop count, bandwidth, delay).
134
What is RIP
Routing Information Protocol Distance-vector routing protocol Uses hop count as metric (max 15 hops) Simple but slow to converge and not scalable RIPv1: Classful (no subnet info) RIPv2: Classless, supports VLSM
135
What is OSPF
Open Shortest Path First Link-state routing protocol Uses cost (based on bandwidth) as metric Fast convergence, highly scalable Supports VLSM and CIDR Common in enterprise environments
136
What is BGP
Border Gateway Protocol Path-vector protocol used on the Internet Used for routing between autonomous systems (ASes) Complex and policy-based routing decisions Essential for ISPs and large-scale networks
137
What is EIGRP
Enhanced Interior Gateway Routing Protocol (Cisco proprietary) Hybrid protocol (both distance-vector and link-state features) Uses DUAL algorithm Metric based on bandwidth, delay, reliability, and load Faster convergence and more efficient than RIP
138
What is VLAN
Virtual Local Area Network Logically segments a network into separate broadcast domains, even if devices are on the same switch Improves security, performance, and management
139
What is 802.1q
IEEE standard for VLAN trunking Adds a VLAN tag to Ethernet frames to carry VLAN info across switches Enables multiple VLANs to be transported over a single trunk link
140
What is a trunk port
A switch port configured to carry multiple VLANs Used between switches or to VLAN-aware devices (like routers/firewalls)
141
What is an access port
A switch port assigned to a single VLAN Used to connect end-user devices like PCs
142
What is an Access Control Lists (ACL)
A set of rules used to permit or deny traffic based on IP, protocol, or port Can be applied inbound or outbound on a router interface Used for filtering, firewalling, and traffic control
143
What are the two main types of ACLs
Standard ACL: Filters by source IP address only Extended ACL: Filters by source/destination IP, protocol, and port numbers
144
What is Spanning Tree Protocol (STP)
What is STP and why is it important? A: Spanning Tree Protocol (802.1D) prevents switching loops in Layer 2 networks Automatically blocks redundant paths while keeping backup links available Elects a Root Bridge and calculates the shortest path tree
145
What are some improvements to Spanning Tree Protocol (STP)
RSTP (802.1w): Rapid Spanning Tree – faster convergence MSTP (802.1s): Multiple Spanning Tree Protocol – supports multiple STP instances for VLANs
146
Open Systems Interconnection (OSI) Model
The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and standardize how different networking protocols interact in a layered architecture. Consists of 7 layers.
147
Open Systems Interconnection (OSI) Layer 7
Application Layer Interfaces directly with user applications (e.g., browsers, email) Protocols: HTTP, FTP, SMTP, POP3, IMAP, DNS
148
Open Systems Interconnection (OSI) Layer 6
Presentation Layer Responsible for data format translation, encryption, and compression Converts data into a format readable by the application layer
149
Open Systems Interconnection (OSI) Layer 5
Session Layer Manages sessions and connections between computers Responsible for establishing, maintaining, and terminating sessions
150
Open Systems Interconnection (OSI) Layer 4
Transport Layer Responsible for reliable data transport Protocols: TCP (reliable), UDP (unreliable) Handles segmentation, flow control, and error recovery
151
Open Systems Interconnection (OSI) Layer 3
Network Layer Handles logical addressing and routing Protocols: IP, ICMP, ARP, RIP, OSPF, BGP Breaks data into packets
152
Open Systems Interconnection (OSI) Layer 2
Data Link Layer Responsible for MAC addressing, framing, and error detection Sub-layers: LLC (Logical Link Control) and MAC (Media Access Control) Protocols: Ethernet, PPP, HDLC
153
Open Systems Interconnection (OSI) Layer 1
Physical Layer Defines the hardware and transmission of raw bits over a medium Includes cables, NICs, hubs, modems, and signaling standards
154
Transmission Control Protocol/Internet Protocol (TCP/IP)
A 4-layer model used by modern networks and the Internet More practical than OSI; directly maps to protocols in use
155
TCP/IP and OSI
Application (OSI Layers 5-7) Transport (OSI Layer 4) Internet (OSI Layer 3) Network Interface (OSI Layers 1-2)
156
What does DOCSIS stand for?
Data Over Cable Service Interface Specification
157
What is DOCSIS used for?
A telecommunications standard used to deliver high-speed Internet over cable TV systems Employed by cable internet providers Developed by CableLabs Supports data, voice, and video over existing coaxial cable infrastructure
158
What does POTS stand for and what is it?
Plain Old Telephone System The basic analog voice service provided over copper telephone wires Used in traditional landline systems Works over the PSTN
159
What does DSL stand for?
Digital Subscriber Line
160
The installer failed to install the POTS filters on the phones.
DSL and voice share the same phone line. POTS filters are required on each phone jack to prevent DSL signal interference with voice calls. Without filters, phones may have no dial tone or experience static.
161
What does PTSN stand for
Public Switched Telephone Network
162
What is PSTN used for
The global network of traditional telephone lines (POTS) Used to make voice calls across public and private networks Supports analog voice transmission over copper wires
163
What is V.90?
A ITU-T standard for dial-up modems It defines a maximum download of 56 Kbps over analog phone lines Upload speeds were typically 33.6Kbps
164
What channels are available for 2.4 GHz
1, 6, 11
165
What is LDAP
LDAP = Lightweight Directory Access Protocol Used to query and modify directory services (like Active Directory) Often works with RADIUS as the backend directory storing user credentials Not directly used by WPA2-Enterprise, but supports it indirectly
166
What is TFTP
Trivial File Transfer Protocol A simple, lightweight file transfer protocol Used for tasks like: Transferring router/switch configs Uploading firmware to network devices Not secure, and not used for wireless authentication
167
What is IPSec
Internet Protocol Security A suite of protocols for securing IP traffic Commonly used in VPNs to encrypt data between endpoints Works at the network layer, providing confidentiality, integrity, and authentication Not used for Wi-Fi encryption like WPA2
168
What is PKI
Public Key Infrastructure Manages X.509 digital certificates Enables secure authentication, encryption, and digital signatures Used for VPNs, Wi-Fi (WPA2-Enterprise), web security (HTTPS) Core of certificate-based authentication
169
What is Kerberos
Network authentication protocol using tickets, not certificates Used in Windows domain environments (Active Directory) Provides mutual authentication and single sign-on (SSO) Does not use X.509 certificates
170
What is TACACS+
Terminal Access Controller Access-Control System Plus Used to authenticate access to network devices (e.g., routers, switches) Separates authentication, authorization, and accounting Does not use or manage X.509 certificates
171
What are X.509 Certificates
X.509 certificates are digital certificates that follow the X.509 standard for public key infrastructure (PKI). They're used to prove someone's identity online and enable secure communication.
172
What do X.509 Certificates include?
Subject Name (who the certificate belongs to — a user, website, or device) Issuer (who issued the certificate — e.g., a Certificate Authority) Public Key (used to encrypt or verify data) Valid From / To (expiration and start dates) Serial Number (unique ID for the cert) Digital Signature (proves the certificate hasn’t been tampered with)
173
What are X.509 Certificates used for?
Secure Websites (HTTPS) The padlock icon in your browser? That’s made possible by an X.509 certificate. User or Device Authentication Used in WPA2-Enterprise, VPNs, and smart card logins. Secure Emails Enables email encryption and digital signatures (e.g., S/MIME). Code Signing Verifies the integrity and origin of software.
174
What is TKIP and where is it used?
Temporal Key Integrity Protocol Used in WPA (Wi-Fi Protected Access) Designed as a quick fix for weaknesses in WEP Provides per-packet key changes for improved security Compatible with older (legacy) devices Used in WPA Mixed Mode alongside AES
175
What is AES and where is it used in WIRELESS networks?
Advanced Encryption Standard Used in WPA2 for strong wireless encryption Provides robust, modern encryption Not backward-compatible with legacy WPA-only devices Used in WPA Mixed Mode alongside TKIP to support newer devices
176
What is TEMPEST, and what is it used for?
TEMPEST is a U.S. government standard for shielding electronic equipment from leaking sensitive information via radio frequency (RF) emissions. Prevents electronic snooping or eavesdropping on secure communications Used in military, government, and high-security environments Involves shielding, grounding, and device design to limit signal leakage
177
What is DWDM, and what does it do?
Dense Wavelength Division Multiplexing A technology used in fiber-optic networks Combines multiple data signals on a single fiber by using different light wavelengths Greatly increases bandwidth and efficiency in long-distance data transmission Common in telecom backbones and large-scale ISPs
178
What is a public cloud?
Services are delivered over the internet Managed by a third-party provider (e.g., AWS, Microsoft Azure, Google Cloud) Shared resources among multiple customers Scalable, cost-effective, and quick to deploy Example use: Hosting websites, cloud storage, SaaS
179
What is a Private Cloud
Cloud infrastructure is used exclusively by one organization Can be hosted on-premises or by a third party Offers greater control, security, and customization Ideal for industries with strict regulatory requirements (e.g., healthcare, finance)
180
What is a hybrid cloud?
Combines private cloud + public cloud Enables data and application portability between environments Great for scalability during peak usage or disaster recovery Example: Internal systems + temporary cloud servers for added capacity
181
What is a community cloud?
Shared by multiple organizations with common goals or compliance needs Managed internally or by a third party Balances cost savings and customization Example: Government agencies or universities sharing infrastructure
182
What is SaaS
Software as a Service Delivers fully functional applications over the internet Users access the software via a web browser; no local installation required The provider manages everything: application, data, OS, infrastructure Examples: Google Workspace, Microsoft 365, Salesforce, Dropbox
183
What is PaaS
Platform as a Service Provides a development and deployment environment in the cloud Developers use it to build, test, and deploy applications Users manage: Apps and data Provider manages: OS, runtime, servers, storage, infrastructure Examples: Google App Engine, Heroku, Microsoft Azure App Services
184
What is IaaS
Infrastructure as a Service Provides virtualized computing resources over the internet Users manage: Operating systems, applications, storage Provider manages: Servers, networking, virtualization, hardware Offers flexibility and scalability Examples: Amazon EC2, Microsoft Azure VM, Google Compute Engine
185
What is GSM
Global System for Mobile Communications A 2G digital cellular network standard Used worldwide (especially in Europe and Asia) Supports voice, SMS, and basic data Uses TDMA and SIM cards Foundation for later technologies like EDGE and LTE
186
What is EDGE (not the browser)
Enhanced Data rates for GSM Evolution Also called 2.75G An enhancement of GSM networks to support faster data transfer Max speed: ~384 Kbps Often shown as "E" on phones when connected to a slower data network
187
What is LTE?
Long Term Evolution A 4G wireless standard for high-speed data and voice Offers speeds up to 100+ Mbps Based on IP packet-switched technology Common in smartphones and modern cellular networks Transition toward VoLTE (Voice over LTE) and 5G
188
What is CDMA
Code Division Multiple Access Competing standard to GSM (mainly used in the U.S. by Verizon/Sprint) Does not use SIM cards (traditionally — newer CDMA phones now may) Devices are tied to the network provider Uses code-based multiplexing to separate users Being phased out in favor of LTE/5G
189
What are the benefits of caching on a Web proxy?
Response Time Virus Detection
190
What is a Web Proxy
is an intermediary server that sits between a user's device and the internet. It processes requests from the user and forwards them to the destination server, then returns the response to the user.
191
What is SLAAC and what does it stand for?
Stateless Address Autoconfiguration To allow a host to automatically configure its own IPv6 address without the need for a DHCP server
192
What does WINS stand for and what does it do?
Windows Internet Name Service Resolves NetBIOS names to IP addresses
193
What protocol does WINS use to register and resolve NetBIOS names?
NetBIOS Name Service (NBNS)
194
When does a host register its NetBIOS name with the WINS server?
When does a host register its NetBIOS name with the WINS server?
195
What port does WINS/NetBIOS name service typically use?
UDP port 137
196
What does POP3 stand for?
Post Office Protocol v3W
197
What does IMAP4 stand for?
Internet Message Access Protocol v4
198
POP3 vs IMAP4
Pop3 - Downloads emails to a local device and deletes them from the server. IMAP4 - Synchronizes emails with the server, allowing access from multiple devices.
199
What protocol does IPv6 use to discover neighbors and replace ARP?
NDP (Neighbor Discovery Protocol)
200
Remote workers, telecommuters, and traveling employees.
Purpose: Allows individual users to connect to a central network securely. Requires: VPN client software on the user's device. Use Case: Remote work, secure access to internal company resources from home or on the go.
201
Site-to-Site VPN
Purpose: Connects two or more entire networks (sites) together. Requires: Routers/firewalls with VPN capabilities—no client software on user devices. Use Case: Linking branch offices to a main office securely over the internet.
202
DMVPN (Dynamic Multipoint VPN)
Purpose: A Cisco-developed enhancement of Site-to-Site VPNs allowing dynamic, direct tunnels between sites. Requires: Cisco routers, uses mGRE and NHRP for scalability. Use Case: Large-scale, meshed networks where branch offices can connect to each other dynamically.
203
MPLS VPN (Multiprotocol Label Switching VPN)
Purpose: A service provider-managed VPN that uses label switching rather than traditional routing. Requires: ISP infrastructure support—typically used by businesses, not home users. Use Case: High-performance, scalable connections between enterprise sites—often faster and more reliable than internet-based VPNs.
204
Extranet VPN
Purpose: Connects a company’s network to that of a partner, vendor, or customer over a secure VPN. Requires: Similar to Site-to-Site, usually built between two organizations. Use Case: Secure communication between business partners.
205
What does the dig command do in Linux/macOS? What does it stand for?
Performs DNS lookups and displays detailed results such as: IP address, DNS record type, TTL, query time, and name server info. Domain Information Groper
206
What is ICMP and what does it stand for?
ICMP operates at layer 3 of the OSI model. It sends error messages and operational information about network conditions. Internet Control Message Protocol
207
What does a firewall do?
A firewall is a security device or software that controls incoming and outgoing network traffic based on a set of configured rules. It is commonly placed at the network edge (perimeter) to protect internal networks from unauthorized access and filter traffic based on IP addresses, ports, and protocols.
208
Which DNS record type maps a hostname to an IPv6 address?
A DNS AAAA record (pronounced "quad-A") maps a hostname to an IPv6 address. It is the IPv6 equivalent of an A record, which maps to an IPv4 address.
209
What is geofencing in the context of mobile device management (MDM)?
It involves setting up virtual geographic boundaries using GPS, Wi-Fi, RFID, or cellular data. When a managed device enters or leaves one of these boundaries, automated actions can be triggered. Examples include: Restricting app access Enforcing specific security policies Sending alerts to administrators
210
What technique enables IPv6 packets to travel over an IPv4-only network?
Tunneling (e.g., 6to4, Teredo, ISATAP)
211
Which IPv6 tunneling method uses a public IPv4 address to automatically generate an IPv6 address?
6to4 It requires a public IPv4 address and is not NAT-friendly.
212
Which IPv6 tunneling technique is specifically designed to work through NAT?
Teredo
213
Which tunneling method is typically used within enterprise networks over internal IPv4 infrastructure?
ISATAP (Intra-Site Automatic Tunnel Addressing Protocol)
214
Which general-purpose tunnel can encapsulate any Layer 3 protocol, including IPv6 over IPv4?
GRE (Generic Routing Encapsulation)
215
What are the US and EU fiber optic transmission standards?
US: SONET (Synchronous Optical Network) EU: SDH (Synchronous DIgital Hierarchy)
216
What is MX
MX (Mail Exchange) records in DNS specify which mail servers are responsible for receiving email on behalf of a domain. They include: Priority values (lower = higher priority) Hostnames of the mail servers (not IP addresses directly)
217
What is the approximate data rate of a T1 line?
~1.544 Mbps
218
How many channels are in a T1 line?
24 channels, each 64Kbps
219
What is the purpose of Administrative Distance (AD) in routing
To determine the trustworthiness or preference of a routing source. Lower distance = More trusted
220
What does a CNAME record represent in DNS
CNAME (Canonical Name) record in DNS is used to map an alias name to the real (canonical) domain name.
221
What does IEEE 802.1X standard define and what is it used for?
Port-Based Network Access Control (PNAC) It is used to authenticate devices before they are granted access to the network. Commonly used in: Wired networks (e.g., switch ports) Wireless networks (e.g., enterprise Wi-Fi)
222
What is the first thing to check when troubleshooting DNS on a client machine?
When troubleshooting DNS issues on a client machine, the first thing to check is whether the correct DNS server addresses are configured.
223
PPTP VPN
It was used for legacy remote access, mainly for individual users Not secure by modern standards
224
L2TP VPN
Layer 2 Tunneling Protocol
225
L2TP with IPsec
It adds encryption and security to an otherwise non-secure tunneling protocol.
226
What command is commonly used on Cisco routers to enter global configuration mode?
configure terminal
227
What command is used to enter privileged EXEC mode from user EXEC mode?
enable
228
What command displays the currently running configuration?
show running-config
229
What command sets a static route on a router?
ip route [destination] [subnet mask] [next hop IP/interface]
230
What command is used to configure a specific interface?
interface [type/number]
231
What command sets a password for privileged EXEC mode?
enable secret [password]
232
What command enables an interface?
no shutdown
233
What command disables an interface?
shutdown
234
What command shows the routing table?
show ip route
235
What command shows interface status and statistics?
show interfaces or show ip interface briefWhat command is used to test IP connectivity?
236
What command is used to test IP connectivity?
ping [destination IP]
237
What command is used to trace the path to a destination?
traceroute [destination IP]
238
What is the bandwidth of a T3 line?
44.736 Mbps Combines 28 T1 lines, totaling 672 voice/data channels.
239
What are the two main types of dynamic routing protocols?
Distance Vector and Link-State
240
What type of routing protocol is OSPF?
Link-State
241
What algorithm does OSPF use to determine the best path?
Dijkstra’s Shortest Path First (SPF) algorithm
242
What protocol uses hop count as its primary metric?
RIP (Routing Information Protocol) Max hop limit: 15; 16 = unreachable
243
Which protocol is a hybrid routing protocol developed by Cisco?
Combines features of both distance vector and link-state
244
What protocol is used for routing between autonomous systems on the Internet?
BGP (Border Gateway Protocol)
245
What are common metrics used by routing protocols?
Hop count (RIP) Cost (OSPF) Bandwidth, delay (EIGRP) AS Path, Policy (BGP)
246