N10-007 Flashcards

(589 cards)

1
Q

A NIC sends data in discrete chunks called what?

A

Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which MAC addr begins a frame?

A

Receiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is included in Frames?

A
1-Receiving MAC addr
2-Sending MAC addr
3-Type of encapsulated data
4-Data
5-FCS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which layer of the TCP/IP model controls segmentation and reassembly of data?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which layer of the OSI 7 layer model keeps track of a system’s connections to send the right response to the right computer?

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What layer are cables and hubs?

A

Layer 1… Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What layer are switches and NICS?

A

Layer 2… Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the only OSI layer that has sublayers?

A

Data Link… LLC and MAC sublayers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the PDU (Protocol Data Unit) for Layer 3… Network Layer?

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Routers use what to forward data?

A

IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What layer breaks up and reassembles chunks of data called segments or datagrams?

A

Layer 4… Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The connectionless protocol is also what type protocol?

A

UDP… User Datagram Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the term used to describe the interconnectivity of network components?

A

Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name a type of fiber optic connection that is duplex

A

LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What network topology is most commonly seen only in wireless networks?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a network technology called that combines a physical topology with a logical topology?

A

Hybrid technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name two hybrid topologies

A

Star Ring and Star Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the most successful star-ring topology called?

A

IBM Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What topology connect every computer to every other computer on the network via two or more routes?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name two types of mesh topologies

A

1-Fully meshed: every computer connected to every other computer.
2-Partially meshed: at least two machines have redundant connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Name the network topologies

A
Bus
Ring
Star\
Hybrid
Mesh
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type cable is more robust… RG59 or RG6?

A

RG6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give short description of ST fiber optic connector

A

Snap and twist;

Bayonet style

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Give short description of SC fiber optic connector

A

Stick and click;

Push in connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Give short description of LC connector
Little connector; | Always duplex
26
Give short description of MTJ-R fiber optic connector
Always duplix
27
Single mode fiber uses what to generate signals?
Lasers
28
Multimode fiber uses what to generate signals?
LEDs
29
What type cable is fire rated?
Plenum
30
What is appended to the front of Ethernet frames?
Preamble
31
10BaseT uses what type of bus
Star-bus
32
What is the max distance that can separate a 10BaseT node from its hub?
100 meters
33
What device directs traffic based on MAC addresses?
Switch
34
Frames are at what layer and are based on what type of address?
Layer 2 - Data Link | Use Mac addresses
35
Packets are associated with data assembled at what layer and use what protocol?
Layer 3 - Network; | IP Protocol
36
The transmission of a frame starts with what?
Preamble: gives receiving NIC a notice a frame is coming and where frame starts
37
MAC addresses have how many bits and how many bytes?
48 bits and 6 Bytes
38
10BaseT refers to what?
10 Mbps data rate; Broadband signal; Twisted pair cable
39
What is broadband
Carries multiple signals or channels... as in cable
40
10BaseT RJ45 connector uses pins 1 and 2 to do what?
Send data
41
10BaseT RJ45 connector uses pins 3 and 6 to do what?
Receive data
42
Half duplex
NICs communicating in only one direction at a time
43
Full duplex
NICs communicating in both directions at the same time
44
Regarding TIA/EIA 568A and 568B standards, which wires are swapped?
Green and orange... "GO"; | blue and brown wires remain the same
45
What is the wire pinout for standard 568A?
wg/g wo/bl wbl/o wbr/br
46
What is the wire pinout for standard 568B?
wo/o wgr/bl wbl/gr wbr/br
47
What is a bridge?
Used to connect networks; | Traffic is filtered and forwarded between network segments based on MAC addresses of computers on the segments
48
Main difference between a hub and a switch
Hub: forwards all frames; Switch: creates a source allocation table containing MAC addresses for each connected computer, then forwards frames based on segment the computer resides
49
How are bridging or switching loops resolved in a network?
STP... Spanning Tree Protocol
50
How many pairs of wires do 10BaseT and 100BaseT use?
2 wire pairs
51
What does IEEE 802.ab describe?
1000BaseT... also known as Gigabit Ethernet
52
What is the physical difference between 1000BaseSX and 100BaseFX/
1000BaseSX does not allow use of ST connector
53
What is the max distance for 1000BaseLX without repeaters?
5000 meters
54
How many wire pairs does 1000BaseT use?
All 4 pairs of wires
55
What is the standard connector for the 10GbE fiber standard?
There is no standard
56
What is the max cable length of 10GBaseT on CAT 6?
55 meters
57
100BaseT
Speed = 100 Mbps Signal = Baseband... single signal over network at once Cable type = Twisted pair Distance = 100 meters Node limit = 1024 Topology Star-bus... physical star, logical bus
58
100BaseFX
Speed = 100 Mbs Signal= Baseband Cable type = multimode fiber with SC or ST connectors Distance = 2 Kilometers Node limit = 1024 Topology = Star-bus... phys star and logical bus
59
1000BaseT
``` Commonly called Gigabit Ethernet Used in vast majority of network rollouts 802.3ab standard Uses 4 pair of UTP or STP Distance = 100 meters ```
60
1000BaseLX
Long distance carier for Gigabit Ehternet Uses lasers on singlemode fiber Distance = up to 5 Kilometers Connectors resembe 1000BaseSX connectors
61
1000BaseSX
Uses multimode fiber optic cable; Distance 220 - 500 meters Uses LC connectors
62
Wavelength signal
Distance the signal travels before it completes its particular shape, then starts to repeat. Diff color laser signals feature diff wave lengths
63
10GBaseT
10 Gigabit Ethernet running on twisted pair cable
64
Broadband
Multiple signals flow over network simultaneously
65
UPC and APC
Ultra and Angled Polished Connectors
66
Which cable should never be used in a structured cabling installation?
Coax
67
What enables you to use multiple NICs in a computer to achieve a much faster network speed?
Bonding or Link aggregation... process of using multiple NICS as a single connection
68
What facilitates organizing and protecting horizontal cabling in the telecommunications room?
Patch panel
69
Rack mounted equipment has a height measured in what units?
U... known as Units
70
Which punch down blocks have less cross talk... 66 or 110 block?
110
71
What is the name of the device that marks the point of demarcation dividing the line of responsibility for the function of the network?
Network Interface Unit... aka Network Interface Device or Box (NID / NIB)
72
What is the equipment called that acts as a primary distribution tool for a building belonging to a customer
Customer Pemises Equipment (CPE)
73
The room that stores demarc, tele cross connects and LAN cross connects equipment?
MDF... Main Distribution Frame
74
Room that store tele equipment in mult rooms which connect internally to MDF
IDF... Intermediate Distribution Frame
75
What cable tester can determine where a break is located in individual wire strands?
OTDR | Optical Time Domain Reflectometer
76
What is the process called where switches allow devices to use multiple NICs?
Bonding / Link aggregation
77
What controls how multiple network devices send and receive data as a single connection
LACP... Link Aggregation Control Protocol
78
What does IANA stand for?
Internet Assigned Numbers Authority
79
What is the max number of hosts in a /19 subnet?
8,190
80
Which of the following is a valid loopback address? 128.0.0.1; 127.0.0.0; 128.0.0.255; 127.24.0.1
177.24.0.1; | any addr in the 127.0.0.0/8 sunet will work as a loopback
81
Connection oriented TCP/IP Transport layer protocol is called?
Transmission Control Protocol... TCP
82
Connectionless oriented TCP/IP Transport layer protocol is called?
User Datagram Protocol... UDP
83
TCP chops data into what?
Segments
84
WAN
Wide Area Network... A group of two or more connected networks
85
Router interface that connects a single LAN to the router is known as what?
Default Gateway; | Usually the LAN side NIC on the router and assigned the lowest host address in the network.... host ID of 1.
86
00000000 binary = what in decimal?
0
87
11111111 in binary = what in decimal?
255
88
The term classfull references what?
IP address blocks… A, B, C, D, E
89
The first binary octet of a Class A address always begins with what?
0xxxxxxx (ex 00001010 = 10.52.36.11 )
90
The first binary octet of a Class B address always begins with what? 10xxxxxx (ex 10101100 = 172.16.52.63)
10xxxxxx (ex 10101100 = 172.16.52.63)
91
The first binary octet of a Class C address always begins with what?
110xxxxx (ex 11000000 = 192.168.123.132)
92
Reserved IP addresses are considered what?
Experimental
93
What is the formula for determining the number of hosts you can have on a network?
2^x - 2, where x is the number of zeroes remaining in a subnet mask after the ones that are reserved for the network
94
A CIDR address (Classless address) means the subnet does not conform to what?
Big three classfull address blocks A, B and C... /8, /16, /24
95
How do you set a static IP address in Linux?
ifconfig; | ip add
96
BOOTP
Preceded DHCP in providing dynamic IP addressing
97
DHCP uses which UDP ports?
Servers use UDP port 67; | Clients use port 68
98
What is assigned to a client host that does not receive a response to a DHCP Discover message?
APIPA… Automatic Private IP Address
99
Can systems that use use static IP addresses have DHCP problems?
No
100
What are private address for class block A, B and C? 10. 0.0.0 through 10.255.255.255 172. 16.0.0 through 172.31.255.255 192. 168.0.0 through 192.168.255.255
A: 10.0.0.0 through- 10.255.255.255 B: 172.16.0.0 through 172.31.255.255 C: 192.168.0.0 through 192.168.255.255
101
What are public address ranges for class blocks A, B and C?
A: 0-126 B: 128-191 C: 192-223
102
What does IANA stand for?
Internet Assigned Numbers Authority
103
What technology allows you to share a single public IP address with many computers?
Port Access Translation... PAT
104
What network would a packet be sent with address 64.165.5.34 with subnet mask 255.255.255.0?
64.165.5.0/24 network
105
Distance vector routing protocols such as RIP rely on what metric to determine the best route? Hop count
Hops
106
What are two advantages to using OSPF over RIP?
Chooses routes based on link speed; | Sends only routing table changes, reducing net traffic
107
What is area 0 called in OSPF?
Backbone
108
What is the name of the cable used to connect to the console port on Cisco routers?
Yost cable
109
When first setting up a new router, should you plug it into an existing network?
No
110
The traceroute (Linux, Mac) utility is useful for what?
Discovering information about routers between you and destination address; It records the route between any two hosts on a network
111
What is Windows version of traceroute?
Tracert
112
Routers work at what layer of the OSI network model?
Layer 3... Network
113
What is a multilayered switch (MLS) called that works at more than one layer?
Layer 3 switch… because it handles IP traffic
114
What command allows you to view your computer’s routing table?
Netstat -r
115
A default gateway address references what device?
Router
116
Networking technology that is different from Ethernet, for cable modems
DOCSIS… Data Over Cable Service Interface Interface Specifications
117
Networking technologies, different from Ethernet, that carry IP packets in their layer 2 encapsulations
DOCSIS; Frame Relay; ATM… Asynchronous Transfer Mode
118
Network Address Translation… NAT
Replaces source IP addr of a computer with source IP addr from outside router interface on outgoing packets… performed by NAT capable routers
119
Port Address Translation… PAT
Uses port nbrs to map traffic from specific machines in the network
120
identify three main routing protocol groups
Distance Vector: protocols that compares total cost of route to a specific network ID to total cost of all other routes; Link State: Dynamic routing protocol that announces only changes to routing table Hybrid: EIGRP... Comptia lists as distance vector
121
Name two Link state protocols
OSPF; | IS-IS... Intermediate System to Intermediate System. Supports IPv6
122
Maximum Transmission Unit...MTU
Determines the largest frame a particular technology can handle
123
Fragmentation
Occurs when IP packet is too big for a particular technology and is broken into pieces that fit into the network protocol, which slows movement.
124
Router convergence
All routers have updated routing tables... steady state
125
Distance vector routing protocols work fine for networks with many or few routers?
Few... less than 10
126
Name distance routing protocols
RIP: Routing Information Protocol... max hop count = 15 BGP: Border Gateway Protocol, used for communication between each Autonomous Sys (AS)
127
Autonomous System Number... ASN
Globally unique 32 bit number used by each autonomous System to communicate
128
Autonomous systems communicate with each other via interior or exterior protocols?
Exterior... EGP
129
Networks within autonomous systems communicate with interior or exterior gateway protocols?
Interior... IGP
130
Comptia lists BGP as what type of routing protocol?
Hybrid… if BGP is the only answer, take it
131
What is the routing protocol of choice by large enterprise networks?
OSPF
132
What type protocol is RIP and is it IGP or BGP?
Distance Vector... IGP
133
What type protocol is BGP and is it IGP or BGP?
Path Vector... BGP
134
What type protocol is OSPF and is it IGP or BGP?
Link State... IGP
135
What type protocol is IS-IS and is it IGP or BGP?
Link State... IGP
136
What type protocol is EIGRP and is it IGP or BGP?
Hybrid... IGP
137
UDP established what type of connection session
Connectionless
138
Name some protocols that use connectionless oriented sessions
``` DHCP DNS NTP Network Time Protocol SNTP Simple Network Time Protocol TFTP ICMP ```
139
Ping is what type of an application?
ICMP
140
What port does NTP and SNTP use?
123
141
What is TFTP?
Trivial File Transfer Protocol... uses UDP to xfer files from one computer to another, typically on same LAN, without data protection
142
TFTP uses what port?
69
143
What type issue is it when you ping the default gateway and receive the response "destination host unreachable"?
ICMP issue
144
What is IGMP
Internet Group Management Protocol... enables routers to communicate with hosts to determine a group membership
145
Well known port numbers
Ports 0-1023, reserved for specific TCP/IP applications
146
Ephemeral port numbers
Arbitrary number generated by sending computer for receiving computer to use as destination address when sending a return packet
147
Ephemeral port number classical range
1024-5000
148
Recommended ephemeral port number range
49152-65535… curr range used by Windows
149
Registered port numbers
1024-49151
150
Terms for session information containing IP addr and port nbr
Socket, | Endpoint
151
Terms for connection data stored on two computers about the same connection
Socket pairs; | Endpoints
152
Terms for the whole connection
Connection or session
153
Netstat
Shows endpoints to which a computer is connected; | Shows TCP/IP connections at a glance
154
XML
Extensible Markup Language... used for RSS feeds to MS Ofc documents
155
HTTP
Protocol used by the web using TCP 80 by default
156
USENET
Old internet svc where clients use NNTP to access USENET over TCP port 119
157
What is required for an internet application to be secure?
Authentication: usernames and pw Encryption: scrambling and encoding packets Nonrepudiation: Source not able to deny having sent message
158
SSL
Secure Socket Layer... transmit private documents securely over the internet
159
TLS
Transport Layer Security... latest ver of SSL which uses encryption to establish secure private connection
160
HTTPS
Hypertext Transfer Protocol Secure... provides secure access to web
161
Telnet
Allows logon to remote systems from own host; | Uses port 23
162
SSH
Secure Shell... Terminal emulation program that replaced telnet and incl encryption
163
PUTTY
Popular Telnet/SSH client
164
What does Telnet and SSh enable you to do?
Securely access remote systems
165
SSH uses which TCP port?
22
166
What email protocol is used to send email?
SMTP... port 25
167
What email protocols receive email?
POP: port 110 IMAP: port 143... can syn mult devices and supp folders
168
Name some web based services
Web based mail; | Network shareable documents, spreadsheets, databases,... other cloud based applications
169
FTP
File Transport Protocol... ports 20 and 21; | Used to transfer files
170
TFTP
Trivial File Transfer Protocol... UDP port 69;
171
NetBIOS used what type name space?
Flat
172
DNS servers use what type name space?
Heirarchical
173
How is the DNS root directory represented?
A dot "."
174
What file should be checked when trying to resolve a FQDN to an IP address?
Hosts file
175
What is used by mail serves to determine where to send mail?
MX record
176
What command resets the DNS cache?
ipconfig /flushdns
177
What tool is used for querying DNS server functions?
nslookup
178
Where does a DNS server store IP addresses and FQDNs for computers within a domain
Forward lookup zone
179
Name resolution
A method enabling one computer on a network to locate another, to establish a session either via broadcast or name server
180
Domain Name System... DNS
Name resolution protocol
181
NetBIOS
Protocol that operates at Session layer of OSI model. Creates and manages connections based on the names of the computers involved.
182
NetBIOS over TCP (NetBT) requires what ports?
TCP ports 137 and 139; | UDP ports 137 and 138
183
Server Message Block... SMB
Protocol used by MS clients and servers to share file and print resources; Runs on TCP port 445
184
Hosts file
Static text file on a computer used to resolve DNS host names to IP addresses. Auto mapped to a host's DNS resolver cache in modern systems
185
DNS uses what port?
53
186
Internet name of DNS root servers is know as what?
Dot "."
187
What were the original top level domain names?
``` .com .org .edu .gov .mil .int ```
188
What is the job of DNS root servers?
Delegate name resolution to other DNS servers
189
DNS servers just below DNS root servers in hierarchy
Top level domain servers
190
What are top level domain server responsibilities?
Set of DNS servers that handle top-level domain names such as .com, .org, .net, ...
191
Top level domain servers delegate to who?
Second level DNS servers that resolve names within each top level domains
192
Internet Corporation for Assigned Names and Numbers... ICANN
Authority to create Top Level Domains... TLD; | .ex, .biz, .info, .pro
193
DNS hierarchical name space
Tree structure of all possible names that could be used within a single system
194
Hosts file are hierarchical or flat?
Flat
195
Fully Qualified Domain Name... FQDN
A complete DNS name, incl the host name and all of its domains... in order; ex. mailserver.georgiasouthern.edu
196
Is it a requirement that web server names begin with www?
No
197
What is the most popular DNS server used in Unix/Linux?
BIND
198
Authoritative DNS servers
Store IP addresses and FQDNs of systems for a particular domain or domains
199
Cache only DNS servers
Used to talk to other DNS servers to resolve IP addresses for DNS clients; Never an authoritative server for a domain
200
Forward lookup zone
Storage area in a DNS server that stores IP addresses and names of systems for a particular domain or domains
201
DNS record types
SOA; Start of Authority... primary server in charge of forward lookup NS; Name Server... primary name server CNAME; Conical name... acts like an alias AAAA; Reserved for IPv6 addressing MX; Used to determine where to send mail SRV; Generic record that supports any type server TXT: Freeform used for anything
202
Forward vs reverse lookup zones
Forward... determines IP addr by knowing FQDN | Reverse... determines FQDN by knowing IP addr
203
Windows Active Directory
An organization of related computers that share one or more Windows domains; Windows DC are DNS servers
204
What is happening when you can successfully ping an IP addr, but not the name associated with the addr
There may be an issue with DNS
205
Netstat
Displays current connections to your system
206
Tracert
Command displays entire route a ping packet travels between you and destination
207
nslookup
Command used to querry DNS to obtain domain name or IP addr mapping or for any other specific DNS record
208
What command displays DNS cache on Windows sys?
ipconfig /displaydns
209
Encryption that uses the same key as decryption?
Symmetric key
210
RC4 is what type of cypher?
Stream
211
In a PKI (Public Key Infrastructure) encryption method, which key encrypts the data?
Public
212
Process of verifying that sender is who the receiver thinks they should be
Nonrepudiation
213
A hash function is by definition, what?
One way function
214
Common hash function
SHA-3
215
In order to have PKI, you must have what?
Root authority
216
Which type access control requires a label to define sensitivity?
Mandatory access control
217
What AAA standard is running if you see traffic on ports 1812 and 1813
RADIUS
218
Which authentication standard is highly time sensitive?
Kerberos
219
Nonrepudiation
Not being able to deny taking a specific action
220
Cipher
A way to encrypt data
221
Algorithm
Mathematical formula that underlies the cipher
222
Areas of TC{/IP security
``` Encryption Integrity Nonrepudiation Authentication Authorization ```
223
Symmetric key algorithm
Same key used for encryption and decryption
224
Asymmetric key algorithm
Different keys used for encryption and decryption
225
RC4 streaming cipher
Used in wireless, web pages, and remote access; becoming a legacy cipher
226
AES
Advanced Encryption Standard; | Symmetric encryption algorithm now used by many applications
227
Public keys cryptography is mainly symmetric or asymmetric?
Asymmetric
228
What encryption is used at layer 3?
Network layer uses IPsec... Internet Protocol Security
229
What encryption occurs at layers 5, 6 and 7?
5-Session / 6-Presentation / 7-Application; | SSL and TLS
230
SSL
Secure Socket Layer; | Authentication and data encryption between servers, machines and applications
231
TLS
Transport Layer Security; | Authentication and data encryption between servers, machines and applications
232
What is the most popular hash algorithm in use?
SHA-2; | Used by SSL certificates
233
What is the newest family of hash algorithms?
SHA-3
234
What is a common server authentication tool?
CRAM-MD5; | Challenge Response Authentication Mechanism
235
What is a digital signature?
Hash of a public key encrypted by a private key
236
Certificates
Standardized file including a public key with a trusted third party digital signature which is a company guaranteeing the certificate is being passed out by who they say they are
237
Multifactor authentication methods
``` Passwords: something you know Cards: something you have Biometrics: something you are Location: somewhere you are Something you do ```
238
Network Access Control
Control over information, people, access, machines, and everything in between
239
ACL
Access Control List; | List of permissions an authenticated user has, specifying what they may perform on shared resources
240
What are types of ACL permissions?
Mandatory Access Control - resource has defined security level required to access; Discretionary Access Control - resource owner defines security level require to access Role Based Access Control - user access to resource based on roles/groups user belongs
241
TCP/IP user security authentication standards
PPP - Point to Point Protocol | AAA - Authentication, Authorization, Accounting
242
PPP authentication
Username / passsword; CHAP - Challenge Handshake Authentication Protocol; MS-CHAP is most secure
243
AAA Radius standard
Remote Access Dial in User Service; Uses NAS to control modems; Uses PAP, CHAP, MS-CHAP
244
What ports are used by AAA RADIUS standard?
TCP ports 1812 and 1813; | UDP ports 1645 and 1646
245
AAA kerberos
Authentication protocol for TCP/IP; | UDP or TCP ports 88 by default
246
SSH FTP
Secure Shell FTP - uses TCP port 23
247
SNMP
Simple Network Management Protocol; Standards for communication and managing network devices; SNMPv3 uses UDP ports 161 and 162
248
MIB
Management Information Base; | Server containing network information used by SNMP
249
LDAP
Protocol used to query and change database used by network; | Uses TCP port 389;
250
NTP
Network Time Protocol; | Provides current time... uses UDP port 123
251
Which VPN technology enables direct connections between satellite locations?
DMVPM - Dynamioc Multipoint VPN
252
Which protocol is popular with today's VPN
IPsec
253
A static VLAN assigns VLANs to what?
Physical ports
254
What trunking protocol is used with today's VLANs?
802.1Q
255
A content switch qalways works at least at what layer of the OSI model/
Usually layer 4 thru 7, but must work at least at layer 7... Application
256
What solution might improve the quality of VOIP calls when network is busy and calls sound clipped
Traffic shaping
257
What are two benefits of caching on a Web Proxy/
Response time; | Virus detection
258
802.1X is a great example of what?
Port authentication
259
What is the most common method used to configure a VLAN capable switch?
Log into the switch using SSH and using a command line interface
260
What is IDS
Intrusion Detection System; | Inspects copy of all network traffic and can respond to detected intrusions with actions
261
VPN
Encrypted tunnel between a computer / remote network to a private network through the internet
262
Do computers on a VPN have the same network ID?
Yes
263
PPTP VPN
Point to Point tunneling Protocol VPN
264
Does a VPN connection for a network run slower than an actual local connection on the same network?
Yes
265
RRAS
Routing and Remote Access Server: allows remote access to the network
266
Host to site connection
VPN connection where a single computer logs into a remote network and becomes a member of that network
267
Host to VPN
Single connection between two machines using VPN software or hardware
268
VPN concentraator
A device that handles multiple VPN tunnels remotely
269
L2TP
Layer 2 Tunneling Protocol: VPN protocol ran on almost any connection. Uses IPsec for security
270
SSL VPN
SSL Portal - connection via web browser using TLS | SSL tunnel - client web browser runs active control with greater access to network
271
DTLS VPNs
Datagram TLS optimizes connections for delay sensitive applications using UDP datagrams rather than TCP segments
272
DMVPN
Enables direct VPN connections between multiple locations directly
273
How do you configure the default gateway on a switch/
Enter the IP address of the router... will be add of cable modem in a lot of cases
274
Out of band management... switch management
Method to connect and administer a managed device via dedicated port that is separate from rest of network
275
Console router
Router with out of band management capabilities
276
Trunking
Process of transferring VLAN traffic between two or more switches
277
VLAN segmentation
x
278
VLAN interface properties
x
279
Tagging VLAN switch ports
x
280
Untagging VLAN switch ports
x
281
VTP
VLAN Trunking Protocol... protocol to automate updating mult VLAN switches
282
A layer 2 switch forwards traffic based on what?
MAC address
283
A layer 3 switch forwards traffic based on what?
IP address
284
Layer 3 switch
Router that accomplishes with hardware what a traditional router does with software; Multilayer switch
285
Four functions multilayer switches support
1 Load balancing 2 QoS 3 Port bonding 4 Network protection
286
Load balancing
Making many servers look like a single server
287
Qos
Quality of Service... Policies that control how much bandwidth a protocol, PC, user, VLAN or IP address may use
288
Port bonding
Logical joining of mult redundant ports and links between two network devices; Also called port aggregation and NIC teaming
289
Network protiection
IDS - Intrusion Detection System: alerts when attack detected NIDS - Network Intrusion Detection System usually on both sides of gateway router HIDS - Host Intrusion Protection System: protection runs on individual systems and monitors file and registry changes
290
Content switch
Content filter network appliance; Hides behind single IP addr Works at layer 7
291
Traffic shaping
Bandwidth management where packet flow depends on type of packet or other rules
292
Signature management
Monitors and protects network traffic from malicious code via continuously updating definition files
293
Describe signature based IDS
Scans using signature files for networks
294
Behavior based IDS
Scans for suspicious behavior on host systems
295
IPS
Intrusion Prevention System... stops attacks
296
HIPS
Host Intrusion Prevention System... located on a host
297
NIPS
Network Intrusion Prevention System... Located on a network
298
Is DHCP required to receive an IPv6 address automatically?
No
299
What kind of DNS records do IPv6 addresses use?
AAAA
300
What does a client need to access IPv6 content on the internet?
Global unicast address address
301
Is NAT needed with IPv6?
No
302
What is the /16 prefix for all 6to4 address?
2002
303
Which operating systems have Teredo built in/
W7 and W10
304
What service do tunnel brokers provide?
A way for users to jump the gap between their computers and IPv6 routers
305
IPv6 network prefix
First 64 bits used for routing
306
IPv6 interface ID
Second 64 bits used for the user address
307
IPv6 interface ID
Second 64 bits used for the user address
308
What are the 2 parts of the IPv6 network prefix?
Global routing; | Subnet ID
309
Shortcuts for writing IPv6 addresses which consist of 8 groups of 4 hexadecimal characters
Leading zeroes can be dropped from a group; A pair of colons (::) can be used for a string of zeroes in two consecutive groups; Only a single pair of colons is allowed per address
310
What is the IPv6 loopback address?
::1
311
How many bits are in each group (hextet) of an IPv6 address?
16
312
How many groups are in an IPv6 address?
8
313
What is the max prefix length (/x subnet mask) for an IPv6 address?
/64
314
What is a link local address?
At bootup, the first 64 bits are assigned fe80:0000:0000:0000... similar to IPv4 APIPA; Second 64 bits (interface ID) random generated number or Extended Unique Identifier (EUI-64) generated from the MAC addr
315
Unicast address
Single network device - address unique to that system
316
Multicast address
Reserved addresses which go only to certain systems
317
Global unicast address
A second IPv6 address that every system needs in order to get on the internet
318
Aggregation
Router heirarchy where sub-routers use subnet of higher router's existing routes
319
Neighbor discovery
IPv6 protocol that enables hosts to auto configure own IPv6 address and info... gateway, DNS, etc
320
4to6
Encapsulates IPv4 traffic into and IPv6 router
321
Toredo
NAT traversal IPv6 tunneling protocol
322
What is the signal rate for DS0?
64Kbps
323
What is the most popular remote server program called?
RRAS - Routing and Remote Access Server
324
What is throughput of ADLS?
Up to 15Mbps
325
What device is used to connect to a T1 line?
CSU / DSU
326
BRI ISDN uses what channel?
Two B channels and one D channel
327
The V.90 standard defines a modem speed of what?
56Kbps
328
After DSL is installed, the internet connection is fast, why might phones no longer work?
POTS filter not installed on phone jacks
329
What protocol do cable modems use?
DOCSIS... Data Over Cable Service Interface Specification
330
What is a SONET used for?
Long distance high speed fiber optic transmission; | Synchronous Optical Network
331
What does SIP stand for?
Session Initiation Protocol
332
Modulation techniques means what?
Converting a digital signal to analog
333
T1 description
24 channels @ 1.544 Mbps
334
T3 description
672 channels @ 44.736Mbps
335
E1 and SONET use what as the control channel?
A derivative of HDLC protocol
336
E1 description
32 channels @ 2.048 Mbps
337
E3 description
512 channels @ 34.368 Mbps
338
DWDM
Enables individual single mode fiber to carry mult signals by using different wavelengths
339
Packet switches
Machines that forward and store packets
340
WAN connections traditionally use two diff forms of packet switching
ATM; | Frame relay
341
What protocol replaces ATM and frame relay?
MPLS... Multiprotocol Label Switching
342
Current networks use what type of switching?
Packet switching
343
Older networks use what type of switching/
Circuit switching
344
PSTN / POTS
Public Switched Telephone Network; | Plain Old Telephone System
345
LEC
Local Exchange Carrier - provides local phone svc
346
Interchange Exchange Carriers - IXC
Provides long distance service
347
ISDN
Integrated Services Digital Network; | Process of sending telephone transmission across digital lines
348
ISDN B channel
DS0 channell - 64Kbs
349
SDSL
Synchronous DSL... same up and down speeds
350
ADSL
Asynchronous DSL... diff up and down speeds
351
Utilities that facilitate troubleshooting whether a device has a solid IP connection?
Ping, ipconfig, netstat, nslookup, ...
352
What is needed to connect a computer to the internet?
Legitimate IP addr; Subnet mask; Default gateway addr; DNS address
353
Which wireless networking technology used the 5.0GHz frequency range?
802.11a
354
Which technology enables use of WAP without directly connecting the WAP to an AC power outlet?
PoE
355
What is known as a Basic Service Set in infrastructure mode?
Single WAP
356
Basic Service Set
Collection of stations which may communicate with each other within an 80.211 network
357
What feature enables 802.11n networks to minimize dead spots?
Multiple WAP antennas... known as Transit beamforming
358
Which consumer electronics may cause interferance with 802.11n wireless networks?
Wireless telephones which operate in the same 2.4GHz frequency range
359
To achieve max WiFi coverage in a room, where should you place the WAP?
Center
360
What hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode?
WAP on a wireless bridge
361
What do you call a wireless network in infrastructure mode with more than one access point?
Extended Basic Service Set... EBSS
362
What type of server supports EAP encrypted passwords in accordance with 802.1x standard?
RADIUS
363
What is the most secure method of wireless encryption?
WPA2... because it uses CCMP-AES 128 bit cypher; | WiFi Protected Access
364
What is WPA?
Data encryption scheme
365
RADIUS server
Provides authentication via user name and password; | Remote Authentication Dial In User Service
366
TKIP
Used by WPA encryption scheme to encrypt data; | Temporary Key Integrity Protocol
367
Wireless encryption strength hierarchy
Strongest to weakest: WPA2 - with CCMP-AES WPA with TKIP WEP
368
What are the modes wireless networks operate within?
Ad hoc mode; | Infrastructure mode
369
Ad hoc mode
Two or more devices communicate directly without intermediary hardware... also called peer to peer; Uses mesh topology
370
Infrastructure mode
One or more WAPs for devices to connect to centrally
371
IBSS
Independent Basic Service Set; | Two or more wireless nodes communicating in ad hoc mode
372
Basic Service Set
Single WAP servicing a given area
373
ESS
Extended Service Set... | Adding additional access points to extend a service area
374
Current CSMA-CA devices use what method for collision avoidance?
DCF... Distributed Coordination Function; | RTS/RTS... Ready To Send / Clear To Send
375
Goodput of the wireless network
Actual number of useful bits per second received by application
376
802.11b
Wireless standard: 2.4GHz; 11 Mbps ~300' range
377
802.11a
5.0 GHz; 54 Mbps ~150 ' range
378
802.11g
2.4GHz; 54 Mbps ~300' range
379
802.11n
2.4GHz; 100+ Mbps ~300' range
380
802.11ac
5GHz; Up to 1Gbps ~300' range
381
MIMO
Multiple In Multiple Out; | Multiple antennas provide multiple connections called streams
382
Transmit Beamforming
Multiple antennas help WAP eliminate dead spots
383
What is occurring if an 802.11g device shows a connection tye 802.11g-ht?
A device is connecting to and 802.11n WAP running in mixed mode
384
WPS
WiFi Protected Setup... push button or PIN method
385
Name three network hardening techniques
Authentication; Encryption; MAC address filtering
386
WAPs use what to enable or deny access to the network
ACL... via MAC address listing, called a whitelist
387
What data does a RADIUS server store?
Stores usernames and passwords
388
EAP authentication
Extensible Authentication Protocol mainly used in wireless
389
802.1x
Port authentication network access control mechanism mainly for wireless
390
EAP protocol variations
``` EAP-PSK... preshared key EAP-TLS... transport layer sec EAP-TTLS... tunneled TLS EAP-MS-CHAPv2... most common EAP-DM5... weak LEAP... lightweight EAP-FAST... ```
391
WPA2 Enterprise
Version of WPA2 that uses RADIUS server for authentication
392
Heat map
Represents network signal intensity
393
Omnidirectional
Signal radiates out in all directions
394
Unidirectional
Signal focused in a specific area
395
Patch antenna
Small footprint... generates small half sphere beam
396
Name main symptoms for wireless networks having issues
Cannot get on network; Connection slow Connection doing weird things
397
Weird connection scenario for wireless network
Open network Wrong SSID Rogue access point Untested updates
398
Comptia scenario questions re: wireless limits
Throughput speeds: 11, 54, 100" Mbps Frequencies Distance Channel usage
399
What channels should be used when operating on 2.4 GHz?
1, 6, 11
400
Wireless scanning tools
Used to check wireless channel utilization; | Reports on nearby devices connected to WAP
401
Wireless - no connection issues
Channel problem; Security type mismatch Signal / power levels
402
Wireless - slowness issues
Overworked WAPs; Physical problem with signal between WAP and client; Too much RFI on network
403
Spectrum Analyzer
Scans for RF interference
404
Upgrading which component on host machine would most likely enable you to run more virtual machines simultaneously?
RAM
405
What enables two VMs hosted on the same physical machine to communicate without leaving the machine itself?
Virtual switch
406
What features let you save a VMs state so you can quickly restore to that point?
Snapshot
407
What do you need to install a legal copy of Windows 10 into a VM using VMware Workstation?
Valid W10 installation media
408
What is an advantage of a virtual machine over a physical machine?
Hardware consolidation
409
Public cloud
Allows quickly creating servers to run in cloud without owning the servers
410
Platform as a Service... Paas
Allows use of cloud based servers which are also administered and security is kept up to date
411
How does one get two groups of virtual machines on the same subnet without moving or re-cabling harware?
Virtual router
412
What would allow use of iSCSI to read and write data over the network
SAN... Storage Area Network
413
Adding short term capacity via creating additional servers in the cloud is what form of cloud computing?
Hybrid cloud
414
What is a host within a virtual environment?
A computer running multiple virtual operating systems simultaneously
415
Hypervisor
Layer of programming that creates, supports and manages a virtual machine
416
Emulator
Software or hardware that converts the commands to and from the host machine into an entirely diff platform
417
Bare metal hypervisor
Runs directly on hardware... no software between hypervisor and hardware
418
SAN
Storage Area Network... pooled hard disks on a server presented as logical disks over network
419
What are three main choices for supporting a SAN within an infrastructure?
Fiber channel... high perform storage with cables, protocols and switches; iSCSI... built on TCP/IP; communicates across network, uses jumbo frames InfiniBand... Unique NIC and cabling
420
Jumbo frames
Usually 9000 Bytes long, however > 1500 Bytes qualifies
421
NAS
Network Attached Storage... Dedicated file server with own file sys, hardware and software; Slower than NAS
422
How are VMs given indiv IP addresses?
Bridge the NIC... real Nic passes traffic to virt NIC
423
Virtual switch
VMs use to communicate with each other w/o going outside host sys
424
Distributed switching
Centralized install, configure and handling of all switches in virtual network
425
Virtual routers allow what
Dynamic reconfig of networks
426
IaaS
Provided servers, switches, routers... ex AWS; Cust don't purch equip; Cust resp for config, OS and software maint,
427
PaaS
Provides complete deployment sys where programmers dev, admin and maint web appl; Can add tools to setup database, monitor traffic and performance; Sits on top of IaaS
428
SaaS
Software as a Service... Centralized application access over the network
429
Public cloud
Software, platforms and infrastructure delivered through networks for general public use
430
Private cloud
Ownership of internal resources, inc infrastructure, platform and software
431
Hybrid cloud
Connecting some combination of public, private and community cluds
432
Which cellular WAN tech introduced concept of SIM card
GSM... Global System for Mobile
433
GSM, EDGE and LTE use what?
SIM cards; | TDMA... Time Div Mult Access
434
A thermostat you control remotely via a smartphone app falls in what category?
IoT... Internet of Things
435
What reduces the vulnerability of a smartphone when automatically connecting to an open SSID?
Requiring HTTPS
436
What is required for a classic hotspot
802.11; | Cellular WAN
437
In order to pair another Bluetooth device, set it to what mode?
Discoverable
438
A Bluetooth PIN code is at least how many digits?
4
439
NFC tags are always what?
Passive
440
All tap to pay services use what networking technology/
NFC
441
A tv remote uses mainly what type network technology?
Infrared
442
ANT+ uses minimal or large amounts of power?
Minimal
443
What deployment model does a company own all devices, retains control of apps, ...?
COBO... Corporate Owned Business Only
444
Internet of Things
Embedded devices that connect to the internet and enable remote monitoring and controlling
445
GSM
Global System for Mobile Communications
446
GSM relies on what for users to share access?
TDMA... Time Division Multiple Access; | Mult users share the same channel at same time
447
What did GSM technology introduce to phones/
SIM cards: Identifies the phone; enables cellular network access; stores information
448
Edge
GSM standard offering speeds up to 384Kbps; | Enhanced Data rates for GSM Evolution
449
CDMA
No SIM card; Superior to GSM Incompatible with GSM TDMA Uses spread spectrum to allow mult users
450
HSPA+
3G standard Theoretical speeds up to 168Mbps High Speed Packet Access
451
LTE
4G Downloads 300Mbps Up 75Mbps Long Term Evolution
452
PAN
Personal Area Network; Network among devices using Point to point connections; Bluetooth, NFC, infrared
453
Bluejacking
Send unsolicited messages to Bluetooth devices
454
Bluesnarfing
Stealing info from Bluetooth devices
455
ANT+
Low speed & power network technolgy uses passive ANT devices and ANT readers; Adaptive Network Technologies
456
Z-Wave and Zigbee
Home automation standards; Use hubs and mesh network topology; Z-Wave is proprietary with open API Zigbee is open source
457
Hardening IoT devices
Update software / firmware; Physical security; Apply internal security options
458
When designing a basic network, which two main factors are considered?
List of requirements; | Equipment limitations
459
`Is network authentication a unique server function?
Yes
460
What standard is used by most NAS devices, enabling them to connect easily to almost any network device?
CIFS... Common Internet File System
461
Adding a generator to a server room is an example of what?
Power redundancy
462
H.323 uses which TCP port?
1720
463
RTP protocol runs on top of what protocol?
SIP
464
What is an example of a UC gateway device?
Router
465
What is a tool for ensuring bandwidth for video teleconfrencing (VTC)?
QoS
466
Centerpiece for any Internet Connection Sharing (ICS) is what?
ICS server
467
What differentiates a PLC from a DCS controller?
PCL controls with sequential ordered steps
468
PLC
Programmable Logic Controller; | Computer that controls a machine according to a set of ordered steps
469
DCS
Distributed Control System; controllers added directly to a machine; Central operator controls distributed controls
470
Unified Communications (UC)
Many network services rolled into one; | Voice, video, messaging
471
Unified Voice Services
Self contained internet services that rely on software on computers to provide voice telecommunications via the internet with interconnections handled in the cloud... ex. Skype
472
VOIP uses what protocol and ports?
RTP 5004 and 5005; | SIP 5060 and 5061
473
What type of device is a VOIP telehone?
UC device
474
UC gateway
Edge device interfacing with remote UC gateways and PSTN sys
475
H.323
Most common used CODEC; | Runs on TCP port 1720
476
MGCP
Media Gateway Control Protocol; VOIP and Video presentation connection and session controller; Uses TCP ports 2427 and 2727
477
DCS
Distributed Control System... controller added to machine to distribute computing load
478
PLC
Programable Logic Controller
479
SCADA
Supervisory Control and Data Acquisition; Used for large scale distributed process... pwr grid; Devices may or may not have ongoing commun w/central control
480
RTU
Remote Terminal Unit; Provides controller function for SCADA with autonomy; Uses long dis communi... telephony, fiber, cellular WANs
481
Why are networks segmented?
Security; Performance; Load balancing; Compliance
482
Where is an acceptable use policy found?
Security policy
483
When is a memorandum of understanding used?
When a legal contract is not appropriate
484
What is succession planning?
Identifying personnel who can take over certain positions in response to an incident
485
Risk management
Process on how organizations deal with network attacks
486
Security policy
Defines how organization will protect IT infrastructure
487
Acceptable use policy
Defines what is and is not acceptable to do on organization's computers
488
Network access policy
Defines who may access network and how / what they may access
489
Name sub policies contained within network access policies
Privileged user agreement; Password policy; Data loss prevention policy; Remote access policy
490
Patch management
Regularly updating OS and apps to avoid security threats
491
Virtual IP address
Single address shared by mult systems; | ex. server failover for server cluster accepting traffic via single IP addr
492
Fault tolerance
Ability of a system to continue operating in the event of a component failure
493
Clustering
Multiple pieces of equipment, such as servers, that are connected and appear as one logical device
494
Name 5 business documents used when dealing with third party vendors
- SLA; - Memorandum of understanding; - Multi source agreement:details interoperability of their components; - Statement of work: Legal doc between vendor and cust defining svcs, products, timeframes; - Nondisclosure agreement: legal doc prohibiting disclosure of company secrets
495
Vulnerability scanning
Inspects huge nbr of vulnerabilites and provides report
496
Contingency plans
Documents how to limit damage and recover quickly
497
Incident response
Reaction to negative situations within organization in an effort to stop, contain, and remediate without outside resources
498
Disaster recovery
Details recovering infrasturcture from disaster that destroys or disables substantial amounts of infrastructure
499
Business Continuity Plan
BCP...Process that keeps businesses going at remote site in the event a disaster prevents primary infrastructure from operating
500
Full backup
Every file selected is backed up; | Archive bit turned off for files backed up
501
Incremental backup
Only backs up files that have changed since last full or incr backup; Archive bit is turned off for files backed up
502
Differential backup
Backs up all files that have changed since last full backup; | Archive bit is not turned off for files backed up
503
Cold site
Location with bldg, facilities, desks, toilets, parking, but no computer
504
Warm site
Same as cold site, but has computers
505
Hot site
Same as warm site, but has backups
506
Computer forensics
Science of gathering, preserving, presenting evidence stored on a computer or digital media that is presentable in a court of law
507
Chain of custody
Paper trail documenting who accessed and controlled a piece of evidence from the time it was brought into custody until the incident is resolved
508
MSDS
Details how to deal with computer components including replacement parts, recycling and more
509
A hacker who sends email and replaces return address with a fake one is doing what?
Spoofing an email address
510
What tool is used to prevent ARP cache poisoning?
DAI - Dynamic Arp Inspection
511
A computer compromised with malware to support a botnet is called what/
Zombie
512
What is it called when the goal of this aspect of a DoS attack is to make the attacked system process each request for as long as possible
Amplification
513
When a user's machine is screen locked along with instructions to call a number to unlock the system is referred to as what?
Ransomware
514
An attack where someone tries to hack a password using every possible permutation is called what?
Brute force
515
Which Windows utility displays open ports on a host?
netstat
516
Which protocols are notorius for cleartext passwords
Telnet, Pop3
517
NSA TEMPEST security standards are used to combat which risk?
RF emanation... wandering radio waves
518
Being told to access a website and clicking a "Run the program" button to check for malware is what form of anti-malware delivery?
Cloud
519
What is switch port protection?
A key network hardening technique
520
DNS poisoning
DNS server is targeted to query an evil DNS server instead of correct one, and fed spoofed information.
521
ARP cache poisoning
Attacks target ARP caches on host switches, which contain known IP address / MAC address associations
522
Botnet
A group of computers under the control of one operator
523
DDos
Distributed denial of service... hundreds, thousands or millions of computers under the control of a single operator, in an effort to bring down a server
524
Reflection
Form of DDoS where requests to a server (ex. DNS, NTP) contain a source IP address of a target server, resulting in amplified responses to the target server.
525
Session hijacking
Interception of computer sessions in an effort to get authentication information
526
Man in the middle
Attacker taps into communications between two systems, reading and possibly changing data before sending it on
527
Name native administrative account names for Windows, Linux and MacOS
Wdws: administrator Mac: root Linux: root
528
Malware
``` Program or code designed to do something on system or network not desired; Virus; Worm; macros; trojan horse; rootkits; adware; spyware ```
529
Crypto malware
Encryption used to lock a user out of a system
530
Virus
Program or code that attaches to a host file and replicates and activates on host system drive or flash drive. Not replicated via network
531
Worm
Similar to a virus, but replicates thru the network; | Exploits vulnerabilities in program code, OS, protocols
532
Macro virus
A virus where application commands execute when the application is opened
533
Logic bomb
Code written to execute when certain conditions are met
534
Trojan horse
Malware that looks as if it is doing one thing, but does something evil
535
Rootkit
Virus or Trojan which takes advantage of low level OS functions which hides itself and gains privileged access to the computer
536
Adware
Programs which monitor websites visited, then generate targeted advertisements
537
Spyware
Programs which send info over the internet about your system or actions... browsing history, keystrokes, email contacts, ...
538
Zero day attack
New attack that exploits a vulnerability yet to be identified
539
Smart card
Cards with microprocessor circuitry to enable authentication and other transactions
540
Cypher lock
Door unlocking system which combines a door handle, latch, and a sequence of mechanical buttons
541
Multifactor authentication
Access granted based on more than one access technique
542
Edge device
Hardware optimized to perform a task; | Works in coordination with other edge devices and controllers
543
NAC
Network Access Control... Standardizes approach to verify a node meets certain criteria before allowed to connect to network
544
Posture assessment
Query of network devices to confirm they meet minimum security standards before permitted to connect to production network
545
Non persistent agent
Software agent used in posture assessment that does not stay resident in client station memory and executed prior to login; Used to allow / deny or redirect attempted connections
546
Flood guards
Used by switches to detect and block excessive traffic ; | Enhances switch port protection
547
Statefull inspection
New modern technique added to firewalls; | Compares packet state to other packets
548
Unified Threat Management
UTM; Firewall packaged with collection of other processes and utilities to detect and prevent threats; Includes intrusion detection and prevention, VPN portals and load balancers
549
DMZ
Demilitarization Zone... Lightly protected or unprotected subnet positioned between an outer firewall and organization's internal network. Mainly used to host public address servers
550
What PDU does SNMP manager use to query agents?
Get
551
In an SNMP managed network, which type software does a managed device run?
agent
552
How does an SNMP manged system categorize data that can be querried?
MIBs
553
An SNMP manger listens on which port when used with TLS?
10162
554
Which tool is used to capture and analyze traffic between two networked computers?
Packet flow monitor
555
Where does a packet sniffer put information it collects?
Capture file
556
If analysis of a network shows a lot of traffic on one machine on port 161, what kind of machine is it?
A managed device
557
What should be created for reference, when a network is running correctly?
Baseline
558
What network management tool can provide graphs of various types of data including traffic and current file server capacities?
Cacti
559
What tool enables the comparison of current performance with correctly functioning network performance/
Performance monitor
560
SNMP Protocol Data Unit... PDU
``` Specialized type of command and control packet found in SNMP management systems... Get; Response; Set; Trap ```
561
Name 4 main monitoring tools used to monitor, troubleshoot and optimize networks
Packet sniffer; Protocol analyzers; Interface monitors; Performance monitor
562
Packet sniffer
Software tool that queries a network interface and captures packets in a capture file
563
Protocol analyzer
Program that processes and analyzers capture files from a packet sniffer... aka packet analyzer
564
SIEM
Security Information Event Management...real time monitoring of security events and information analysis
565
What does nslookup do?
Queries DNS for IP address of the supplied host name
566
What is wireshark
Protocol analyzer; Packet sniffer; packet analyzer
567
What will the command "route print" return on a Windows system?
The current local system's route table
568
When trying to establish symptoms over the phone, what kind of questions should be asked of a novice ore confused user?
Open ended questions... let user explain the problem in their own words
569
While asking a user problem isolating questions, what else should a tech be doing?
Asking themselves if there is anything on their side of the network that could be causing the problem
570
Which command shows you the detailed IP information, including DNS server address and MAC addresses?
ipconfig /all
571
What is the last step in the troubleshooting process?
Documenting the solution
572
If a user indicates they can't reach a website and you cannot either, however you can successfully ping the site using it's IP address, what is most likely the problem?
DSN server is having issues; | A successful ping indicates the site is up, and your LAN and gateway rea functioning properly
573
Name three devices used by techs to deal with broken cables
Cable testers... to determine if there are continuity problems; TDR... Time Domain Reflectometers... determines if there are cable breaks in copper wire; OTDR... Optical Time Domain Reflectometer... determines cable breaks in fiber optic cable
574
Cable certifier
Tests cable for rated amount of capacity; Used for testing if slowness is an issue; Requires loopback adapter
575
Light meter
Measures light loss in fiber optic cables
576
Tracert / traceroute
Traces all of the routers between two points; | If a traceroute stops at a specific router, the problem lies with the next router or the connection between them
577
ARP
Address Resolution Protocol... resolves IP address to MAC addresses
578
What is nslookup equivalent utility for Mac and Linux
Dig
579
route command
Allows the display and edit of local system's routing table... "route print"
580
Netstat
Displays information on current sessions and running processes on a system
581
iptables
Linux utility that enables command line control over IPv4 tables and rules that determine what happens with packets when it encounters a firewall
582
Port scanner
Program that probes ports on another system to determine their state... open or closed
583
Looking glass sites
Remote servers accessible with a browser that contain common collections of diagnostic tools like ping, traceroute and BGP query tools
584
Identify steps of basic troubleshooting process
``` Identify problem... gather information Establish theory probable cause Test theory of probable cause Establish plan of action to resolve problem Implement solution Verify sys functionality Document findings ```
585
Eliminating what, is one of the first tools in a tech's arsenal of diagnostic techniques?
Variables
586
Can Windows 10 have a simultaneous wired / wireless connection issue/
No, as long as computers are updated
587
What happens if a speed mismatch between NICs occurs/
No link established
588
What happens if only a duplex mismatch occurs between a NIC and a switch?
Connection will be erratic
589
How can you prevent downtime due to a failure on your default gateway?
Implement VRRP... Virtual Router Redundancy Protocol