(N10-008) notes Flashcards

1
Q

▪ Device that allows wireless devices to connect into a wired network
▪ Commonly used in home, small business, and even some large enterprise
networks
▪ Acts as a wireless hub

A

Wireless Access Point (WAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

▪ Smallest type of wired or
wireless network
▪ Covers the least amount
of area (few meters)
▪ Examples:
● Bluetooth cellphone to car
● USB hard drive to laptop
● Firewire video camera to
computer

A

Personal Area Network (PAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

▪ Connects components in a limited distance
▪ Each segment is limited to short distances, such as 100 meters with CAT 5
cabling
▪ Consists of Ethernet (IEEE 802.3) or WiFi networks (IEEE 802.11)
● Internal wired or wireless networks

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

▪ Connects building-centric LANs across a university, industrial park, or
business park
▪ Covers many square miles and buildings
▪ Examples:
● College campus
● Business Parks
● Military bases

A

Campus Area Network (CAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

▪ Connects scattered locations across a city
▪ Larger than a CAN, but smaller than a WAN
▪ Covers up to a 25-mile radius in larger cities
▪ Examples:
● City departments like the police department
● Community college with campuses spread across a county

A

Metropolitan Area Network (MAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

▪ Connects geographically disparate internal networks
▪ Consists of leased lines or Virtual Private Networks tunneled over the
Internet
▪ Covers distances around the country or around the world
▪ Examples:
● The Internet
● Connecting two private corporate networks from New York to
Seattle

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

▪ Uses a cable running through area that required network connectivity
▪ Each device “taps” into the cable using either a T connector or vampire
tap
▪ Old technology, not commonly used anymore
▪ Devices on cable form single collision domain

A

Bus Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

▪ Uses a cable running in a circular loop

A

Ring Topology

▪ Each device connects to the ring, but data travels in a singular direction
▪ FDDI (Fiber networks) used two counter-rotating rings for redundancy
▪ On token ring networks, devices wait for a turn to communicate on ring
by passing a token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

▪ Most popular physical LAN topology
▪ Devices connect to a single point
▪ Commonly used with Ethernet cabling, but wireless or fiber is also used
▪ If the central device fails, the entire network fails

A

Star Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

▪ Used for connecting multiple sites
▪ Similar to Star but with WAN links instead of LAN connections
▪ Not redundant, if central office (hub) fails, the whole network can fail

A

Hub-and-Spoke Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

▪ Most redundant topology
▪ Every node connects to every other node
▪ Optimal routing is always available
▪ Very expensive to maintain and operate
▪ Number of Connections
▪ x= n(n - 1) / 2

A

Full-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

▪ Hybrid of the full-mesh and the hub-and-spoke topologies
▪ Provides optimal routes between some sites, while avoiding the expense
of connecting every site
▪ Must consider network traffic patterns to design it effectively

A

Partial-Mesh Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(Mode Type)
▪ Most common type of wireless network
▪ Requires centralized management
▪ Uses a wireless access point as a centralized point like a star topology
▪ Supports wireless security controls

A

Infrastructure Modernization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(Mode Type)
▪ Decentralized wireless network
▪ No routers or access points are required
▪ Forwarding decisions for data on the network are made dynamically
▪ Allows creation/joining of networks “on-the-fly”
▪ Creates P2P connections

A

Ad Hoc Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(OSI model)
Don’t Some People Fear Birthdays?

A

7
6 DATA
5
4 SEGMENTS
3 PACKETS
2 FRAMES
1 BITS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(OSI LAYER)
▪ Transmission of bits across the network
▪ Characteristics:
● How bits are represented on the medium
● Wiring standards for connectors and jacks
● Synchronizing bits
● Bandwidth usage
● Multiplexing strategy
▪ Cables
● Ethernet
● Fiber optic
▪ Radio frequencies
● Wi-Fi
● Bluetooth
▪ Infrastructure devices
● Hubs
● Wireless Access Points
● Media Converters

A

Physical Layer (Layer 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How is communication synchronized?
● Uses start bits and stop bits to indicate when transmissions occur
from sender to receiver

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How is communication synchronized?
● Uses a reference clock to coordinate the transmissions by both
sender and receiver

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How is bandwidth utilized?
● Divides bandwidth into
separate channels
● Example:
o Cable TV

A

Broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How is bandwidth utilized?
● Uses all available frequency on a medium (cable) to transmit data
and uses a reference clock to coordinate the transmissions by
both sender and receiver
● Example:
o Ethernet

A

Baseband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How can we get more out of a limited network? (Layer 1)
● Each session takes turns, using time slots, to share the medium
between all users

A

Time-Division Multiplexing (TDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How can we get more out of a limited network? (Layer 1)
● More efficient version of TDM, it dynamically allocates time slots
on an as-needed basis instead of statically assigning

A

Statistical Time-Division Multiplexing (StatTDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can we get more out of a limited network? (Layer 1)
● Medium is divided into various channels based on frequencies
and each session is transmitted over a different channel
o Broadband

A

Frequency-Division Multiplexing (FDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

(OSI LAYER)
▪ Packages data into frames and transmitting those frames on the network,
performing error detection/correction, and uniquely identifying network
devices with an address (MAC), and flow control
● MAC
● Physical addressing
● Logical topology
● Method of Transmission
● Link Layer Control (LLC)
o Connection services
o Synchronizing transmissions

A

Data Link Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Physical addressing
● Uses 48-bit address assigned to a network interface card (NIC) by
manufacturer
● First 24-bits is the vendor code
● Second 24-bits is a unique value

A

Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

▪ Provides connection services
▪ Acknowledgement of receipt of a message
▪ Flow control
● Limits amount of data sender can send at one time to keep
receiver from becoming overwhelmed
▪ Error control
● Allows receiver to let sender know when an expected data frame
wasn’t received or was corrupted by using a checksum

A

Logical Link Control (LLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How is communication synchronized? (LAYER 2)
● Network devices use a common reference clock source and create
time slots for transmission

A

Isochronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How is communication synchronized? (LAYER 2)
● Network devices agree on clocking method to indicate beginning
and end of frames
● Uses control characters or separate timing channel

A

Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How is communication synchronized? (LAYER 2)
● Network devices reference their own
internal clocks and use start/stop bits

A

Asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

(OSI LAYER)
▪ Forwards traffic (routing) with logical address
● Example: IP Address (IPv4 or IPv6)
▪ Logical addressing
▪ Switching
▪ Route discovery and selection
▪ Connection services
▪ Bandwidth usage
▪ Multiplexing strategy
▪ Routers
▪ Multilayer switches
▪ IPv4 protocol
▪ IPv6 protocol
▪ Internet Control Message Protocol (ICMP)

A

Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How should data be forwarded or routed?
● Data is divided into packets and forwarded

A

Packet switching (known as routing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How should data be forwarded or routed?
● Dedicated communication link is established between two devices

A

Circuit switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

How should data be forwarded or routed?
● Data is divided into messages, similar to packet switching, except
these messages may be stored then forwarded

A

Message switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

▪ Routers maintain a routing table to understand how to forward a packet
based on destination IP address
▪ Manually configured as a static route or dynamically through a routing
protocol
● RIP
● OSPF
● EIGRP

A

Route Discovery and Selection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

▪ Used to send error messages and operational information about an IP
destination
▪ Not regularly used by end-user applications
▪ Used in troubleshooting (ping and traceroute)

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

(OSI LAYER)
▪ Dividing line between upper and lower layers of the OSI model
▪ Data is sent as segments
▪ TCP/UDP
▪ Windowing
▪ Buffering
▪ TCP
▪ UDP
▪ WAN Accelerators
▪ Load Balancers
▪ Firewalls

A

Transport Layer (Layer 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

▪ Connection-oriented protocol
▪ Reliable transport of segments
● If segment is dropped, protocol detects it and resends segment
▪ Acknowledgements received for successful communications
▪ Used for all network data that needs to be assured to get to its
destination

A

TCP (Transmission Control Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

▪ Connectionless protocol
▪ Unreliable transport of segments
● If dropped, sender is unaware
▪ No retransmission
▪ Good for audio/video streaming
▪ Lower overhead for increased performance

A

UDP (User Datagram Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

▪ Allows the clients to adjust the amount of data sent in each segment
▪ Continually adjusts to send more or less data per segment transmitted
● Adjusts lower as number of retransmissions occur
● Adjusts upwards as retransmissions are eliminated

A

Windowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

▪ Devices, such as routers, allocate memory to store segments if bandwidth
isn’t readily available
▪ When available, it transmits the contents

A

Buffering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

(OSI LAYER)
▪ Think of a session as a conversation that must be kept separate from
others to prevent intermingling of the data
▪ Setting up sessions
▪ Maintaining sessions
▪ Tearing down sessions
▪ H.323
● Used to setup, maintain, and tear down a voice/video connection
▪ NetBIOS
● Used by computers to share files over a network

A

Session Layer (Layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Setting up, maintaining or tearing down a session?
▪ Check user credentials
▪ Assign numbers to session to identify them
▪ Negotiate services needed for session
▪ Negotiate who begins sending data

A

Setting up a Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Setting up, maintaining or Tearing down a session?
▪ Transfer the data
▪ Reestablish a disconnected session
▪ Acknowledging receipt of data

A

Maintaining a Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Setting up, maintaining or tearing down a session?
▪ Due to mutual agreement
● After the transfer is done
▪ Due to other party disconnecting

A

Tearing Down a Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

(OSI LAYER)
▪ Responsible for formatting the data exchanged and securing that data
with proper encryption
▪ Functions
▪ Data formatting
▪ Encryption
▪ HTML, XML, PHP, JavaScript, …
▪ ASCII, EBCDIC, UNICODE, …
▪ GIF, JPG, TIF, SVG, PNG, …
▪ MPG, MOV, …
▪ TLS, SSL, …

A

Presentation Layer (Layer 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Function of Presentation Layer
▪ Formats data for proper compatibility between devices
● ASCII
● GIF
● JPG
▪ Ensures data is readable by receiving system
▪ Provides proper data structures
▪ Negotiates data transfer syntax for the Application Layer (Layer 7)

A

Data Formatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Function of Presentation Layer
▪ Used to scramble the data in transit to keep it secure from prying eyes
▪ Provides confidentiality of data
▪ Example:
● TLS to secure data between your PC and website

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

(OSI LAYER)
▪ Provides application-level services
● Not Microsoft Word or Notepad
▪ Layer where the users communicate with the computer
▪ Functions:
● Application services
● Service advertisement
▪ E-mail (POP3, IMAP, SMTP)
▪ Web Browsing (HTTP, HTTPS)
▪ Domain Name Service (DNS)
▪ File Transfer Protocol (FTP, FTPS)
▪ Remote Access (TELNET, SSH)
▪ Simple Network Management Protocol (SNMP)

A

Application Layer (Layer 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Function of Layer 7
▪ Application services unite communicating components from more than
one network application
▪ Examples:
● File transfers and file sharing
● E-mail
● Remote access
● Network management activities
● Client/server processes

A

Application Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Function of Layer 7
▪ Some applications send out announcements
▪ States the services they offer on the network
▪ Some centrally register with the Active Directory server instead
▪ Example:
● Printers
● File servers

A

Service Advertisement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The process of putting headers (and sometimes trailers) around some data
o If we move down the OSI layers from 7 to 1

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Action of removing the encapsulation that was applied
If we move upward from layers 1 to 7

A

Decapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

a single unit of information transmitted within a
computer network
▪ Layer 1 - bits
▪ Layer 2 - frames
▪ Layer 3 - packets
▪ Layer 4 - segments if TCP or datagrams if UDP

A

A protocol data unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

▪ The most well-known flag in TCP communications because it is used to
synchronize the connection during the three-way handshake

A

SYN (or synchronization) flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

▪ Used during the three-way handshake, but it is also used to acknowledge
the successful receipt of packets

A

ACK (or acknowledgement) flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

▪ Used to tear down the virtual connections created using the three-way
handshake and the SYN flag
always appears when the last packets are exchanged
between a client and server and the host is ready to shutdown the
connection

A

FIN (or finished) packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

▪ Used when a client or server receives a packet that it was not expecting
during the current connection

A

RST (or reset) flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

▪ Used to ensure that the data is given priority and is processed at the
sending or receiving ends

A

PSH (or PUSH) flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

▪ It is like the Push flag and identifies incoming data as “urgent”
used by a sender to indicate data with a
higher priority level where URG is sent to tell the recipient to process it
immediately and ignore anything else in queue

A

URG (or urgent) flag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

these ports are just like the ones used in UDP, they dictate where the
data is coming from and where it is going to

A

Source and Destination ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Used to indicate how many bytes the UDP packet is,
including its header and its data

A

Length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Not a mandatory field, but it can be used to provide some
validation that the UDP data being sent was received with
some level of integrity

A

Checksum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

▪ A physical address that is used to identify a network card on the local
area network
▪ Allows the source to find the destination by using this type of addressing

A

MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Used to indicate which protocol is encapsulated in the payload of the
frame

A

EtherType field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

▪ As data moves from layer 7 to layer 1, that data is encapsulated
● At layer 4, we add our

A

source and destination ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

▪ As data moves from layer 7 to layer 1, that data is encapsulated
● At layer 3, we add our

A

source and destination IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

▪ As data moves from layer 7 to layer 1, that data is encapsulated
● At layer 2, we add our

A

source and destination MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

▪ As data moves from layer 7 to layer 1, that data is encapsulated
▪ Once we get to layer 1,

A

we are simply transmitting our layer 2 frames as a
series of 1’s and 0’s over the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

OSI Model to TCP/IP Model
Application
Presentation Layers
Session

A

TCP/IP
Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

OSI Model to TCP/IP Model
Transport Layer

A

TCP/IP
Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

OSI Model to TCP/IP Model
Network Layer

A

TCP/IP
Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

OSI Model to TCP/IP Model
Data Link
Physical Layers

A

TCP/IP
Network Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Port
▪ Transfers computer files between a client and server on a computer
network
▪ Unsecure method
▪ Data transferred in the clear

A

File Transfer Protocol FTP (Port 20, 21)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

port
▪ Cryptographic network protocol for operating network services securely
over an unsecured network
▪ Best known for remote login to computer systems by users

A

Secure Shell SSH (Port 22)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

port
▪ Provides file access, file transfer, and file management over any
reliable data stream

A

SSH File Transfer Protocol SFTP (Port 22)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

port
▪ Provides bidirectional interactive text-oriented communication facility
using a virtual terminal connection
▪ Like SSH, but insecure

A

Telnet (Port 23)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

port
▪ Internet standard for sending electronic mail
▪ RFC 821 was defined originally in 1982
▪ RFC 5321 developed in 2008 (current version)

A

Simple Mail Transfer Protocol SMTP (Port 25)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

port
▪ Hierarchical decentralized naming system for computers, services, or
other resources connected to the Internet or a private network
▪ Converts domain names to IP addresses

A

Domain Name Service DNS (Port 53)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

port
▪ DHCP server dynamically assigns an IP address and other network
configuration parameters to a client
▪ Enables computers to request IP addresses and networking parameters
automatically?
▪ Reduces burden on network administrators

A

Dynamic Host Control DHCP (Port 67, 68)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

port
▪ Transmits files in both directions of a client-server application
▪ Used for booting an operating system from a local area network file
server
▪ Doesn’t provide user authentication or directory visibility
▪ Essentially a stripped-down version of FTP

A

Trivial File Transfer TFTP (Port 69)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

port
▪ Foundation of data communication for WWW
▪ Designed for distributed, collaborative, and hypermedia presentation
across many devices

A

Hyper Text Transfer HTTP (Port 80)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

port
▪ Used by local e-mail clients to retrieve e-mail from a remote server over
TCP/IP connection

A

Post Office Protocol v3 POP3 (Port 110)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

port
▪ Provides clock synchronization between computer systems over packetswitched, variable-latency data networks
▪ Created in 1985, one of the oldest Internet protocols in current use

A

Network Time Protocol NTP (Port 123)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

port
▪ Network Basic Input/Output System
▪ Provides services allowing applications on separate computers to
communicate over a local area network for file and printer sharing

A

NetBIOS (Port 139)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

port
▪ Provides e-mail clients to retrieve e-mail messages from a mail server
over a TCP/IP connection
▪ Allows the end user to view and manipulate the messages as if they’re
stored locally

A

Internet Mail Application IMAP (Port 143)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

port
▪ Provides collection and organization of information about managed
devices on IP networks
▪ Can modify that information to change device behavior, commonly used
in network devices

A

Simple Network Management SNMP (Port 161)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

port
▪ Open, vendor-neutral, industry standard for accessing and maintaining
distributed directory information services
▪ LDAP and Active Directory use this port

A

Lightweight Directory Access LDAP (Port 389)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

port
▪ Foundation of ecommerce on WWW
▪ Designed for adding security to the insecure HTTP protocol

A

HTTP Secure HTTPS (Port 443)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

port
▪ Foundation of ecommerce on WWW
▪ Designed for adding security to the insecure HTTP protocol

A

HTTP Secure HTTPS (Port 443)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

port
▪ Provides shared access to files, printers, and miscellaneous
communications between devices on a network

A

Server Message Block SMB (Port 445)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

port
▪ Used to send logging data back to a centralized server

A

System Logging Protocol Syslog (Port 514)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

port
▪ Secure and encrypted way to send emails

A

Simple Mail Transfer Protocol Transport Layer Security SMTP TLS (Port 587)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

port
▪ Open, vendor-neutral, industry standard for accessing and maintaining
distributed directory information services
Provides secure directory services

A

LDAP Secure LDAPS (Port 636)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

port
▪ Secure and encrypted way to receive emails

A

Internet Message Access Protocol over SSL IMAP over SSL (Port 993)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

port
▪ Secure and encrypted way to receive emails

A

Post Office Protocol Version 3 over SSL POP3 over SSL (Port 995)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

port
▪ Used for communication from a client to the database engine

A

Structured Query Language Server Protocol SQL (Port 1433)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

port
▪ Used for communication from a client to an Oracle database

A

SQLnet Protocol (Port 1521)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

port
▪ Used for communication from a client to the MySQL database engine

A

MySQL (Port 3306)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

port
▪ Proprietary protocol developed by Microsoft
▪ Provides a user with a graphical interface to connect to another
computer over a network connection
▪ User employs RDP client software for this purpose and the other
computer must run RDP server software

A

Remote Desktop Protocol RDP (Port 3389)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

port
▪ Provides signaling and controlling multimedia communication sessions in
applications
▪ Used for Internet telephony for voice and video calls, VOIP, and instant
messaging

A

Session Initiation Protocol SIP (Port 5060, 5061)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

IP Protocol Types
▪ A transport protocol that operates at layer 4 of the OSI model
▪ Used on top of the Internet Protocol for the reliable packet transmission
▪ Operates by conducting a three-way handshake between a client and a
server, and then establishing the connection
▪ TCP is considered a connection-oriented method of communication

A

Transmission Control Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

IP Protocol Types
▪ A lightweight data transport protocol that also works on top of IP
▪ Can detect if its packets are corrupted when they are received by a client
using a checksum, but there is no connection and no sequencing to the
UDP segments
▪ Great for some applications, like streaming audio and video, but it
definitely does NOT provide reliable delivery of the data

A

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

IP Protocol Types
▪ A network level protocol that is used to communicate information about
network connectivity issues back to the sender
▪ ICMP is used a lot by network technicians during troubleshooting, but it is
also used by attackers to conduct ping scans and network mapping

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

IP Protocol Types
▪ A tunneling protocol that was developed by Cisco to encapsulate a wide
variety of network layer protocols inside a virtual point-to-point or pointto-multipoint link over an Internet Protocol network
▪ Important to set a smaller maximum transmission unit or MTU size on
the tunnel
▪ It does not provide any encryption

A

Generic Routing Encapsulation protocol (GRE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IP Protocol Types
▪ Set of secure communication protocols at the network or packet
processing layer that is used to protect data flows between peers

A

Internet Protocol Security protocol (IPsec)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

A protocol within IPSec that provides integrity and
authentication

A

Authentication Header (AH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Provides encryption and integrity for the data packets sent
over IPsec
Backwards-compatible with most IP routers including
those that were not designed to work with IPsec initially

A

Encapsulating security payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Theoretical measure of how much data could be transferred from a
source to its destination

A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Actual measure of how much data transferred from a source to its
destination

A

Throughput

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

An automated way to electronically simulate a crossover cable connector
even if using a straight-through patch cable

A

Medium Dependent Interface Crossover (MDIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Standard, hot-pluggable gigabit Ethernet
transceiver (copper or fiber)

A

GBIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

▪ Compact, hot-pluggable optical module transceiver
▪ Support up to 4.25 Gbps
▪ Known as Mini-GBIC

A

Small Form-factor Pluggable (SFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

▪ Enhanced SFP
▪ Support up to 16 Gbps

A

SFP+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

▪ Compact, hot-pluggable optical module transceiver
▪ Supports up to 100 Gbps

A

Quad Small Form-factor Pluggable (QSFP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

The entrance facilities where you WAN connection will
enter your building

A

Demarcation point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

punch down blocks
● Used for phones and older LAN wiring
● Causes crosstalk due to proximity of cables
● Bad choice for higher-speed LAN wiring
Do not use for CAT 5 or above

A

66 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Punch Down Blocks
Used for higher-speed network wiring
Required for CAT 5 or above cabling

A

110 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Punch Down Blocks
A proprietary European alternative to a 110 block

A

Krone block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Punch Down Blocks
● Another proprietary punch down block that comes in various sizes
● If you are going to work on a BIX block, you will need a BIX specific punch down tool

A

BIX block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Hub type
Repeats signal with no amplification

A

Passive hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Hub type
Repeats signal with amplification

A

Active hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Hub type
Active hub with enhanced features like SNMP

A

Smart hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

▪ Congestion can occur when ports all operate at the same speed
▪ Allows for combination of multiple physical connections into a single
logical connection
▪ Bandwidth available is increased and the congestion is minimized or
prevented

A

Link Aggregation (802.3ad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Supplies electrical power over Ethernet
● Requires CAT 5 or higher copper cable
● Provides up to 15.4 watts of power to device
● PoE+ provides up to 25.5 W of power to device
▪ Two device types
● Power Sourcing Equipment (PSE)
● Powered Device (PD)

A

Power Over Ethernet (PoE 802.3af, PoE+ 802.3at)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

▪ For security purposes, switches can require users to authenticate
themselves before gaining access to the network
▪ Once authenticated, a key is generated and shared between the
supplicant (device wanting access) and the switch (authenticator)
▪ Authentication server checks the supplicant’s credentials and creates the
key
▪ Key is used to encrypt the traffic coming from and being sent to the client

A

User Authentication (802.1x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Allows for local administration of the switch using a
separate laptop and a rollover cable (DB-9 to RJ-45)

A

Console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

▪ Management involves keeping all network configuration devices on a
separate network

A

Out-of-band (OOB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

uses virtual IP and MAC addresses to
provide a “active router” and a “standby router”
is a Cisco-proprietary protocol
● If Active is offline, then standby answers

A

Hot Standby Router Protocol (HSRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

▪ Permits or denies traffic based on a device’s MAC address to improve
security

A

MAC Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

▪ Multilayer switches may permit or deny traffic based on IP addresses or
application ports

A

Traffic Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

▪ Forwards traffic based on priority markings

A

Quality of Service (QoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Permits redundant links between switches and prevents traffic loops
Availability is measured in 9’s
▪ Five 9’s is 99.999% uptime and allows only 5 minutes down per year
Shortest Path Bridging (SPB) is used for larger network environments instead
Without, MAC Address table corruption can occur

A

Spanning Tree Protocol (STP) (802.1D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

▪ If broadcast frame received by both switches, they can forward frames to
each other
▪ Multiple copies of frame are forwarded, replicated, and forwarded again
until the network is consumed with forwarding many copies of the same
initial frame

A

Broadcast Storms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

● Switch elected to act as a reference point for a spanning tree
● Switch with the lowest bridge ID (BID)
● BID is made up of a priority value and a MAC address

A

Root bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

● All other switches in an STP topology

A

Nonroot bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

● Every non-root bridge has a single root port
● Port closest to the root bridge in terms of cost
● If costs are equal, lowest port number is chosen

A

Root Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

● Every network segment has a designated port
● Port closest to the root bridge in terms of cost
● All ports on root bridge are designated ports

A

Designated Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

● Ports that block traffic to create loop-free topology
do not forward traffic during normal operation, but
do receive bridge protocol data units (BPDUs)

A

Non-Designated Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Port States
● BPDUs are received but they are not forwarded
● Used at beginning and on redundant links

A

Blocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Port States
● Populates MAC address table
● Does not forward frames

A

Listening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Port States
● Processes BPDUs
● Switch determines its role in the spanning tree

A

Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Port States
● Forwards frames for operations

A

Forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Link Costs

A

▪ Associated with the speed of a link
▪ Lower the link’s speed, the higher the cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

▪ Multiple VLANs transmitted over the same physical cable
▪ VLANs are each tagged with 4-byte identifier
● Tag Protocol Identifier (TPI)
● Tag Control Identifier (TCI)
▪ One VLAN is left untagged
● Called the Native VLAN

A

VLAN Trunking (802.1q)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

▪ Creates a secure virtual tunnel over an untrusted network like the
Internet

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

▪ A specific type of VPN concentrator used to terminate IPSec VPN tunnels
within a router or other device

A

VPN Headend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

▪ Conducts deep packet inspection at Layer 7
▪ Detects and prevents attacks
▪ Much more powerful than basic stateless or stateful firewalls
▪ Continually connects to cloud resources for latest information on threats

A

Next-Generation Firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

▪ A specialized device that makes requests to an external network on
behalf of a client

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

▪ Dedicated appliance that performs the caching functions of a proxy
server

A

Content Engine/Caching Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

▪ Distributes incoming requests across various servers in a server farm

A

Content Switch/Load Balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

▪ A hardware device that connects to your IP network to make a
connection to a call manager within your network

A

VoIP Phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

▪ Used to perform the call processing for hardware and software-based IP
phones

A

Unified Communications (or Call) Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

▪ Data travels from a single source device to a single destination device

A

Unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

▪ Data travels from a single source device to multiple (but specific)
destination devices

A

Multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

▪ Data travels from a single source device to all devices on a destination
network

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

▪ Discovers the current network that an interface is located on and then
select its own host ID based on its MAC address using the EUI64 process
● Extended Unique Identifier (EUI)

A

Stateless Address Autoconfiguration (SLAAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

▪ Used to learn Layer 2 addresses on network
▪ Router Solicitation
● Hosts send message to locate routers on link
▪ Router Advertisement
● Router advertise their presence periodically and in response to
solicitation
▪ Neighbor Solicitation
● Used by nodes to determine link layer addresses
▪ Neighbor Advertisement
● Used by nodes to respond to solicitation messages
▪ Redirect
● Routers informing host of better first-hop routers

A

Neighbor Discovery Protocol (NDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

● Learned by physical connection between routers

A

Directly Connected Routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

● Manually configured route by an administrator

A

Static Routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

● Learned by exchanging information between routers

A

Dynamic Routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

● Prevents a route learned on one interface from being advertised
back out of that same interface

A

Split horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

● Causes a route received on one interface to be advertised back
out of that same interface with a metric considered to be infinite

A

Poison reverse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

● Protocol that Operates within an autonomous system

A

Interior Gateway Protocols (IGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

● Protocol Operated between autonomous systems

A

Exterior Gateway Protocols (EGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

▪ Characteristic of a routing protocol
▪ How does it receive, advertise, and store routing information?
● Distance vector
● Link state
▪ Not every routing protocol fits neatly into one of these two categories
(hybrids exist)

A

Router Advertisement Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Router Advertisement Method
▪ Sends full copy of routing table
to its directly connected
neighbors at regular intervals
▪ Slow convergence time
● Time it takes for all
routers to update their
routing tables in
response to a topology
change
▪ Holding-down timers speeds up convergence
● Prevents updates for a specific period of time
▪ Uses hop count as a metric

A

Distance Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Router Advertisement Method
▪ Requires all routers to know about the paths that all other routers can
reach in the network
▪ Information is flooded throughout the link-state domain (OSPF or IS-IS) to
ensure routers have synchronized information
▪ Faster convergence time and uses cost or other factors as a metric
▪ Each router constructs its own relative shortest-path tree with itself as
the root for all known routes in the network

A

Link State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Routing Protocol
▪ Interior Gateway Protocol
▪ Distance-vector protocol using hop count
▪ Maximum hops of 15, 16 is infinite
▪ Oldest dynamic routing protocol, provides updates every 30 seconds
▪ Easy to configure and runs over UDP

A

Routing Information Protocol (RIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Routing Protocol
▪ Interior Gateway Protocol
▪ Link-state protocol using cost
▪ Cost is based on link speed between routers

A

Open Shortest Path First (OSPF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Routing Protocol
▪ Interior Gateway Protocol
▪ Link-state protocol using cost
▪ Cost is based on link speed between two routers
▪ Functions like OSPF protocol, but not as popular or widely utilized

A

Intermediate System to Intermediate System (IS-IS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Routing Protocol
▪ Interior Gateway Protocol
▪ Advanced distance-vector protocol using bandwidth and delay making it
a hybrid of distance-vector and link-state
▪ Proprietary Cisco protocol that is popular in Cisco-only networks

A

Enhanced Interior Gateway Routing Protocol (EIGRP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Routing Protocol
▪ External Gateway Protocol
▪ Path vector using the number of autonomous system hops instead of
router hops
▪ Widespread utilization, this protocol runs the backbone of the Internet
▪ Does not converge quickly, though, when the topology changes

A

Border Gateway Protocol (BGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Route Believability

A

▪ If a network is using more than one routing protocol, how does it choose
which routing protocol to make decisions from?
▪ Some routing protocols are considered more believable than others, so
routers use an index of believability called administrative distance (AD)
▪ If a route has a lower the administrative distance (AD), the route is more
believable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Address Translation
▪ Network Address Translation (NAT) is used to conserve the limited supply
of IPv4 addresses
▪ NAT translates private IP addresses to public IP addresses for routing over
public networks
▪ Port Address Translation (PAT) is a variation of address translation that
utilizes port numbers instead of IP addresses for translation

A

Address Translation (NAT & PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Types of Address Translation

A

▪ Dynamic NAT (DNAT)
● IP addresses automatically assigned from a pool
● One-to-one translations
▪ Static NAT (SNAT)
● IP addresses manually assigned
● One-to-one translations
▪ Port Address Translation (PAT)
● Multiple private IP addresses share one public IP
● Many-to-one translation
● Common in small networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Names of NAT IP Addresses
● Private IP address referencing an inside device

A

Inside local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Names of NAT IP Addresses
● Public IP address referencing an inside device

A

Inside global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Names of NAT IP Addresses
● Private IP address referencing an outside device

A

Outside local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Names of NAT IP Addresses
● Public IP address referencing an outside device

A

Outside global

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

What is multicast touring?

A

Multicast sender sends traffic to a Class D IP Address, known as a
multicast group
▪ Goal
● Send the traffic only to the devices that want it
▪ Two primary protocols
● Internet Group Management Protocol (IGMP)
● Protocol Independent Multicast (PIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

▪ Used by clients and routers to let routers known which interfaces have
multicast receivers
▪ Used by clients to join a multicast group

A

Internet Group Management Protocol (IGMP)
● IGMPv1
o Client requests to join the group and is asked every 60
seconds if it wants to remain in the group
● IGMPv2
o Client can send a leave message to exit multicast group
● IGMPv3
o Client can request multicast from only specific server
o Called source-specific multicast (SSM)
o Allows multiple video streams to single multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

▪ Routes multicast traffic between multicast-enabled routers
▪ Multicast routing protocol forms a multicast distribution tree

A

Protocol Independent Multicast (PIM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Uses periodic flood and prune behavior to form optimal
distribution tree
Causes a negative performance impact on the network
Rarely used in modern networks

A

PIM Dense Mode (PIM-DM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Initially uses a shared distribution tree, which may be
suboptimal, but…
Eventually creates an optimal distribution tree through
shortest
path tree (SPT) switchover

A

PIM Sparse Mode (PIM-SM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Uses source distribution tree (SDT) to
form an optimal path between source
router and last-hop router
Before the optimal path is formed, entire
network is initially flooded and consumes
unnecessary bandwidth

A

PIM Dense Mode: Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

If a router receives multicast traffic in the
initial flood and the traffic is not needed,
then the router sends a prune message
asking to be removed from the source
distribution tree

A

PIM Dense Mode: Pruning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

After sending prune messages, the
resulting source distribution tree has an
optimal path between source router and
last-hop router
Flood and prune repeat every 3 minutes
which can cause excessive performance
impacts on the network

A

PIM Dense Mode: After Pruning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

An optimal path between the source and
last-hop routers is not initially created
Instead, a multicast source sends traffic
directly to a rendezvous point (RP)
All last-hop routers send join messages to
the RP
Originally provides a suboptimal distribution tree,
but when first multicast packet is received by last-hop router, then optimal
distribution tree is created based on unicast routing table
Unneeded branches are pruned during
Shortest Path Tree (SPT) switchover

A

PIM Sparse Mode: Shared Distribution Tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Assigns devices with IP addresses and also provides them a subnet mask, default
gateway, and DNS server
Operates over ports 67 and 68 using UDP

A

Dynamic Host Configuration Protocol (DHCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

o Converts domain names to IP addresses using a hierarchical and decentralized
system of naming
o Operates over UDP and TCP using port 53

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

o Sharing of information between DNS servers about which domain names they
have and their associated IP addresses

A

Zone Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

o Synchronizes clocks between systems communicating over
o a packet-switched, variable-latency data network
o Sent over UDP using port 123

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

A list of valid IP addresses that are available for
assignment or lease to a client computer or endpoint
device on a given subnet

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

D-O-R-A process

A

Discover, Offer, Request and Acknowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

▪ Any host that forwards DHCP packets between clients and servers

A

DHCP Relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

o Used to help your network clients find a website using human-readable
hostnames instead of numeric IP addresses
o Converts names to numbers and numbers to names

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

● This is when a domain name is under a top-level provider
● The most common top-level provider:
o .com
o .mil
o .edu
o .org
o .net

A

Fully Qualified Domain Name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

▪ The highest level in the DNS hierarchy tree and the root name server
answers requests in the root zone
▪ These servers contain the global list of all the top-level domains, such as
.com, .net, .org, .mil, and others

A

Root Level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

▪ Organizational hierarchy
● .com
● .net
● .org

A

Top-level Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

● .uk for the United Kingdom
● .fr for France
● .it for Italy

A

Geographic hierarchy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

▪ These domains site directly below the top-level domain
● For example: diontraining.com and it
sits underneath the top-level domain of .com

A

Second-level Domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

▪ Used instead of a A record or AAAA record if you want to point a domain
to another domain name or subdomain

A

CNAME Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

▪ Mail Exchange Record
▪ Used to direct emails to a mail serve
▪ Used to indicate how email messages should be routed using the Simple
Mail Transfer Protocol, or SMTP, over port 25
▪ Can only be used to point to another domain, not an IP address

A

MX Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

▪ Start of Authority Record
▪ Used to store important information about a domain or zone

A

SOA Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

▪ The process of sending DNS records data from the primary nameserver to
a secondary name server
▪ Uses the TCP protocol to transfer the data to ensure data is successfully
sent by the primary server and received by the second server

A

DNS zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

▪ Pointer Records
▪ Used to correlate an IP address with a domain name
▪ The opposite of an A record
▪ Always stored under the .arpa (top-level domain)

A

PTR Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

▪ Used by domain administrators to add text into the domain name system
or DNS
▪ A place to store machine-readable data

A

TXT Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

▪ Used to specify a host and port for a specific service
▪ Can specify a port along with our IP address

A

SRV Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

▪ Used to indicate which DNS name server is the authoritative one for a
domain

A

NS Record
▪ Name Server Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

▪ Records created around the domain names we purchase from a central
authority and use on the public internet

A

External DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

▪ Also known as a DNS cache located on an individual host
▪ This temporary database remembers the answers it received from the
DNS server
● Recursive Lookup
o DNS server will hunt it down and report back to your
resolver
● Interactive lookup
o DNS resolve will continually query DNS servers until it finds
the one with the IP for the domain

A

DNS Resolver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

o Synchronizes clocks between systems communicating over a packet-switched,
variable-latency data network
o Sent over UDP using port 123
▪ Stratum
▪ Clients
▪ Servers
can handle a maximum of 15 stratum levels

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

WAN Connection Types
▪ Logical connection that connects two sites through a service provider’s
facility or telephone company’s central office
▪ More expensive than other WAN technologies because a customer
doesn’t share bandwidth with other customers

A

Dedicated Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

WAN Connection Types
▪ Connection is brought up only when needed, like making a phone call
▪ On-demand bandwidth can provide cost savings for customers who only
need periodic connectivity to a remote site

A

Circuit-Switched Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

WAN Connection Types
▪ Always on like a dedicated leased line, but multiple customers share the
bandwidth
▪ SLAs used to guarantee a certain quality
(5mbps at least 80% of the time)
▪ Virtual circuits are represented as dashed lines

A

Packet-Switched Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

WAN Wireless Media
Communicated using a frequency of 30 KHz and had a
bandwidth of about 2 kbps

A

1G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

WAN Wireless Media
Communicated over a GSM network using the 1800 Mhz
frequency band
Used multiplexing
First to have SMS and text messages and international
roaming

A

2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

WAN Wireless Media
Support 144 Kbps
o Use a wider frequency band with frequencies from 1.6 Ghz
to 2 Ghz

A

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

WAN Wireless Media
● Could reach data speeds of up to 2 Mbps
● The slowest of the 3G technologies

A

WCDMA
● Wideband Code Division Multiple Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

WAN Wireless Media
● Could reach speeds of up to 14.4 mbps
● Referred to as 3.5G

A

HSPA
● High Speed Packet Access standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

WAN Wireless Media
● Brought speed up to around 50 mbps
● Referred to as 3.75G

A

HSPA+
● High Speed Packet Access Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

WAN Wireless Media
o Introduction of multiple input multiple output, or MIMO
o Uses an even wider frequency band, covering frequencies
from 2 to 8 Ghz

A

4G
Often called 4G LTE, or 4G Long Term Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

WAN Wireless Media
Reach speeds up to 10 Gbps using high-band frequencies
split into 3 frequency bands
▪ Low-band Frequencies
● Operates between 600-850 MHz and
provide us with speeds of 30-250 Mbps
▪ Mid-band Frequencies
● Operate between 2.5 to 3.7 Ghz and
supports higher data rates of 100-900 Mbps
▪ High-band Frequencies
● Operate between 25-39 Ghz

A

5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

WAN Wireless Media
o A cellular technology that takes your voice during a call
and converts it to digital data
o A SIM card is used to identify yourself to the network

A

Global System for Mobile Communications (GSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

WAN Wireless Media
o A cellular technology that uses, code division, to split up
the channel
o For every call that is made, the data is encoded with a
unique key and then all the data streams can be
transmitted at once in a single channel

A

Code-Division Multiple Access (CDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

WAN Wireless Media
o Worldwide Interoperability for Microwave Access
o Requires an antenna be installed on the roof of your home
or office
o WiMAX is faster than GSM (2G), UMTS (3G), HSPA (3.5G)

A

WiMax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

▪ Point-to-point connection between two sites
● All bandwidth on line is available all the time
▪ Digital circuits are measured in 64-kbps channels called Digital Signal 0
(DS0)
● Channel Service Unit / Data Service Unit (CSU/DSU) is used to
terminate the digital signals at customer’s demarcation point
▪ Common digital circuits include T1, E1, T3, and E3 circuits

A

Dedicated Leased Line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

T1 Line speed

A

1.544 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

T1c Line speed

A

3.152 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

T2 Line speed

A

6.312 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

T3 Line speed

A

44.736 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

T4 Line speed

A

274.760 Mbps

233
Q

E1 Line speed

A

2.0 Mbps

234
Q

E3 Line speed

A

34.4 Mbps

235
Q

▪ Commonly used Layer 2 protocol on dedicated leased lines to
simultaneously transmit multiple Layer 3 protocols (IP, IPX)
▪ Each Layer 3 control protocol runs an instance of Link Control
Protocol (LCP)
● Multilink interface
o Allows multiple physical connections to be bonded
together into a logical interface
● Looped link detection
o Layer 2 loop can be detected and prevented
● Error detection
o Frames containing errors can be detected and discarded
● Authentication
o Device on another end can authenticate the link

A

Point-to-Point Protocol (PPP)

236
Q

PPP Authentication Methods
o Performs one-way authentication between client & server
o Credentials sent in clear-text

A

Password Authentication Protocol (PAP)

237
Q

PPP Authentication Methods
o Performs one-way authentication using a three-way
handshake
o Credentials are hashed before transmission

A

Challenge-Handshake Authentication Protocol (CHAP)

238
Q

PPP Authentication Methods
Microsoft-enhanced version of CHAP, includes two-way
authentication

A

Microsoft Challenge-Handshake Authentication Protocol
(MS-CHAP)

239
Q

▪ Commonly used with DSL modems
encapsulates PPP frames within Ethernet frames
▪ Allows for authentication over Ethernet

A

PPP over Ethernet (PPPoE)

240
Q

Digital Subscriber Line (DSL)
● Maximum distance to DSLAM: 18,000 feet
● Voice and Data on same line
● Downstream: Up to 8 Mbps
● Upstream: Up to 1.544 Mbps

A

Asymmetric DSL (ADSL)

241
Q

Digital Subscriber Line (DSL)
● Maximum distance to DSLAM: 12,000 feet
● No simultaneous voice and data on same line
● Downstream: 1.168 Mbps
● Upstream: 1.168 Mbps

A

Symmetric DSL (SDSL)

242
Q

Digital Subscriber Line (DSL)
● Maximum distance to DSLAM: 4,000 feet
● Downstream: Up to 52 Mbps
● Upstream: Up to 12 Mbps

A

Very High Bit-Rate DSL (VDSL)

243
Q

▪ Supports multiple 64-kbps B (Bearer) channels
▪ Older technology designed to carry voice, video, or data over B channels
▪ D channel (data or delta channel) existed for 64-kbps signaling data
▪ Circuits classified as a basic rate interface (BRI) or primary rate interface
(PRI):
● BRI: Offers a two 64-kbps B-channels with a 16kbps D-channel
● PRI: Offers a 1.472-Mbps data path over 23 B-channels and a 64-
kbps D-channel

A

Integrated Services Digital Network (ISDN)

244
Q

▪ Layer 1 technology using fiber as media
▪ Transports Layer 2 encapsulation (like ATM)
▪ High data rates (155 Mbps to 10 Gbps)
▪ Covers large distances (20 km to 250 km)
▪ Physical topology can be a bus or ring

A

Synchronous Optical Network (SONET)

245
Q

▪ Supports multiple protocols on the same network (used by service
providers)
▪ Support both Frame Relay and ATM on the same MPLS backbone
▪ Allows traffic to be dynamically routed based on load conditions and path
availability
▪ Label switching is more efficient than Layer 3 IP address routing
▪ Used by service providers for forwarding data in the backend, the
customer remains unaware of the details

A

Multiprotocol Label Switching (MPLS)

246
Q

▪ Allow Internet to be used as WAN
connection for secure site-to-site
communication
▪ VPN tunnel has authentication and
encryption so users on the unsecure
network cannot read or decrypt the
traffic without proper keys
▪ Can connect remote locations with
low cost, instead of dedicated or leased-line access

A

Dynamic Multipoint Virtual Private Network (DMVPN)

247
Q

▪ A virtual WAN architecture that allows enterprises to leverage any
combination of transport services to securely connect users to their
applications
▪ Uses a centralized control function to securely and intelligently redirect
the traffic across the WAN
▪ Enable cloud-first enterprises to deliver quality experiences to their users
▪ Allows your WAN environment to be more dynamic and efficient
▪ Reduces bottlenecks caused by your traditional, centralized WAN
architecture

A

Software-Defined Wide Area Network (SDWAN)

248
Q

▪ A protocol that can be used to enable one node to communicate with
many other nodes, essentially creating a point to multipoint link
▪ NOT limited to point to point connections
▪ Usually combined with the Dynamic Multipoint VPN, or DMVPN,
protocol, as well, for security

A

Multipoint generic routing encapsulation (mGRE)

249
Q

FYI
AP Placement (2.4 Ghz)
▪ Non-overlapping coverage cells
for 2.4 GHz band should have
10% to 15% coverage overlap in
coverage area

A

AP Placement (2.4 Ghz)
▪ Non-overlapping coverage cells
for 2.4 GHz band should have
10% to 15% coverage overlap in
coverage area

250
Q

Wireless Frequencies
▪ Modulates data over an entire range of frequencies using a series of
signals known as chips
▪ More susceptible to environmental interference
▪ Uses entire frequency spectrum to transmit

A

Direct-Sequence Spread Spectrum (DSSS)

251
Q

Wireless Frequencies
▪ Devices hop between predetermined frequencies
▪ Increases security as hops occur based on a common timer

A

Frequency-Hopping Spread Spectrum (FHSS)

252
Q

Wireless Frequencies
▪ Uses slow modulation rate with simultaneous transmission of data over
52 data streams
▪ Allows for higher data rates while resisting interference between data
streams

A

Orthogonal Frequency Division Multiplexing (OFDM)

253
Q

▪ Allows you to create a wider channel by merging neighboring channels
into one

A

Channel Bonding

254
Q

● 6 Ghz spectrum
● Can reach speeds of up to 9.6 Gbps using MU-MIMO technology
● Fully backward compatible with Wireless A, B, G, N, and AC
devices

A

802.11 ax

255
Q

▪ WLAN uses CSMA/CA to control access to medium, where wires Ethernet
uses CSMA/CD

A

Carrier Sense Multiple Access/Collision (Avoidance/ Detection)

256
Q

Wireless Security
▪ Both AP and client uses same encryption key
▪ Problems:
● Scalability is difficult if key is compromised
● All clients must know the same password

A

Pre-Shared Key

257
Q

Wireless Security
▪ Original 802.11 wireless security standard
● Claimed to be as secure as wired networks
▪ Static 40-bit pre-shared encryption key
● Upgraded to 64-bit and 128-bit key over time
▪ Uses 24-bit Initialization Vector (IV)
● Sent in clear text
▪ Brute Force Attack within minutes using AirCrack-ng and other tools

A

Wired Equivalent Privacy

258
Q

Wireless Security
▪ Created as part of IEEE 802.11i standard
● Requires stronger encryption and integrity checks
● Integrity checking through CCMP
o Counter Mode with Cipher Block Chaining Message
Authentication Code Protocol
▪ Uses Advanced Encryption Standard (AES)
● 128-bit key or above
▪ Supports two modes
● Personal mode with pre-shared keys
● Enterprise mode with centralized authentication

A

Wi-Fi Protected Access 2 (WPA2)

259
Q

Wireless Security
▪ Replaced WEP and its weaknesses
▪ Temporal Key Integrity Protocol (TKIP)
● 48-bit Initialization Vector (IV) instead of 24-bit IV
● Rivest Cipher 4 (RC4) used for encryption
▪ Uses Message Integrity Check (MIC)
● Confirms data was not modified in transit
▪ Enterprise Mode WPA
● Users can be required to authenticate before exchanging keys
● Keys between client and AP are temporary

A

Wi-Fi Protected Access (WPA)

260
Q

▪ Permits or denies access to the network based on characteristics of the
device instead of checking user credentials
▪ Conducts a posture assessment of client
● Checks the OS and antivirus version of client

A

Network Admission Control (NAC)

261
Q

▪ Web page that appears before the user is able to access the network
resources
▪ Webpage accepts the credentials of the user and presents them to the
authentication server

A

Captive Portals

262
Q

▪ GPS or RFID defines real-world boundaries
▪ Barriers can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access

A

Geofencing

263
Q

▪ Malicious users set up an AP to lure
legitimate users to connect to the AP
▪ Malicious users can then capture all
the packets (data) going through the
rogue access point

A

Rogue Access Point

264
Q

● Occurs when users perform reconnaissance looking for unsecured
wireless networks

A

War Driving

265
Q

● Occurs when users write symbols on a wall to notify others of AP
characteristics

A

War Chalking

266
Q

Virtualized Storage Solutions
● Disk storage is delivered as a service over TCP/IP

A

Network Attached Storage (NAS)

267
Q

Virtualized Storage Solutions
● Specialized LAN designed for data transfer/storage
● Transfers data at block level with special protocol

A

Storage Area Network (SAN)

268
Q

Virtualized Storage Solutions
Special purpose hardware providing 1-16 Gbps

A

Fibre Channel (FC)

269
Q

Virtualized Storage Solutions
o Removes need for specialized hardware
o Runs over your Ethernet networks

A

Fibre Channel over Ethernet (FCoE)

270
Q

Virtualized Storage Solutions
o Lower cost, built using Ethernet switches (<10 Gbps)
o Relies on configuration allowing jumbo frames over the
network

A

iSCSI (IP Small Computer System Interface)

271
Q

Virtualized Storage Solutions
▪ Switched fabric topology for high-performance computing
▪ Very high throughput (>600 Gbps) with very low latency (0.5 µsec)
▪ Direct or switched connection between servers and storage systems

A

Infiniband (Virtualized Storage)

272
Q

▪ Digitizes voice traffic so that it can be treated like other data on the
network
▪ Uses the SIP (Session Initiation Protocol) to setup, maintain, and tear
down calls. can save a company money and provide enhanced services over a
traditional PBX solution
▪ User’s desktop computer is run in browser

A

Voice over IP (VoIP)

273
Q

▪ Ability to outsource your telephone system
▪ Utilizes VoIP to send all data to provider, then provider connects it to
telephone system

A

Virtual Private Branch Exchange (PBX)

274
Q

Cloud Computing
● Systems and users only have access with other devices inside the
same private cloud or system

A

Private Cloud

275
Q

Cloud Computing
● Systems and users interact with devices on public networks, such
as the Internet and other clouds

A

Public Cloud

276
Q

Cloud Computing
● Combination of private and public

A

Hybrid Cloud

277
Q

Cloud Computing
● Collaborative effort where infrastructure is shared between
several organizations from a specific community with common
concerns

A

Community Cloud

278
Q

Models of Cloud Computing
▪ Allows outsourcing of the of a network to a service provider
▪ Hosted off-site at the service provider’s data center and the customer is
billed for usage
▪ Charged by hours, processing power, or bandwidth used like utility
services
▪ Amazon’s VPC or Route 53 offerings

A

Network as a Service (NaaS)

279
Q

Models of Cloud Computing
▪ Allows outsourcing of the infrastructure of the servers or desktops to a
service provider
▪ Hosted off-site at the service provider’s data center and the customer is
billed for usage
▪ Charged by hours, processing power, or bandwidth used like utility
services
▪ Examples
● Amazon Web Services (AWS)
● Microsoft’s Azure

A

Infrastructure as a Service (IaaS)

280
Q

Models of Cloud Computing
▪ User interacts with a web-based application
▪ Details of how it works are hidden from users
▪ Examples:
● Google Docs
● Office 365

A

Software as a Service (SaaS)

281
Q

Models of Cloud Computing
▪ Provides a development platform for companies that are developing
applications without the need for infrastructure
▪ Dion Training uses PaaS for our courses
▪ Examples:
▪ Pivotal
● OpenShift
● Apprenda

A

Platform as a Service (PaaS)

282
Q

Models of Cloud Computing
▪ Provides a desktop environment that is accessible through the Internet in
the form of a cloud desktop or virtual desktop environment
● Virtual Desktop Infrastructure (VDI)

A

Desktop as a Service (DaaS)

283
Q

Cloud Concepts
▪ Attempts to match the resources allocated with the actual amount of
resources needed at any given point in time
▪ Elasticity is focused on meeting the sudden increases and decreases
in the workload

A

Elasticity

284
Q

Cloud Concepts
▪ Handles the growing workload required to maintain good performance
and efficiency for a given software or application
● Elasticity
o Short-term addition or subtraction of resources
● Scalability
o Long-term planning and adoption

A

Scalability

285
Q

Cloud Concepts
▪ Increasing the power of the existing resources in the working
environment

A

Vertical Scaling (Scaling Up)

286
Q

Cloud Concepts
▪ Adding additional resources to help handle the extra load being
experienced
● Vertical- Scalability
● Horizontal- Elasticity
▪ Scaling out provides more redundancy and results in less downtime

A

Horizontal Scaling (Scaling Out)

287
Q

Cloud Concepts
▪ Allowing customers to share computing resources in a public or private
cloud
● Better storage/access
● Better use of resources
● Lower overall cost

A

Multitenancy

288
Q

FYI
▪ Multitenancy might cause your data to be hosted on the same physical
server as another organization’s data
● When an organization crashes a physical server, all of the
organizations hosted on that same server are affected
● An organization failing to secure its virtual environments hosted
on a shared server poses a security risk for the other organizations
hosting on that same server
▪ Set up virtual servers in the cloud with proper failover, redundancy, and
elasticity
● Complex passwords
● Strong authentication
● Strong encryption
● Strong policies

A

▪ Multitenancy might cause your data to be hosted on the same physical
server as another organization’s data
● When an organization crashes a physical server, all of the
organizations hosted on that same server are affected
● An organization failing to secure its virtual environments hosted
on a shared server poses a security risk for the other organizations
hosting on that same server
▪ Set up virtual servers in the cloud with proper failover, redundancy, and
elasticity
● Complex passwords
● Strong authentication
● Strong encryption
● Strong policies

289
Q

▪ Occurs when an attacker breaks out of one of the isolated VMs and
begins to directly interact with the underlying hypervisor
▪ Host virtual servers on the same physical server as other VMs in the same
network

A

Virtual Machine (VM) Escape

290
Q

Enables managing and provisioning of infrastructure through code instead of
through manual processes
▪ Virtual machines
▪ Virtual devices
▪ Scripted automation and orchestration

A

Infrastructure as Code (IAC)

291
Q

Process of arranging or coordinating the installation and
configuration of multiple systems
▪ Lower costs
▪ Speed up deployments
▪ Increase security

A

Orchestration

292
Q

o Any system that is different from the standard
configuration template used within your organization’s IaC
architecture
o Keeping things consistent and using carefully-developed
and tested scripts

A

Snowflake Systems

293
Q

▪ Any facility that businesses and other organizations use to organize,
process, store, and disseminate large amounts of data
o Types
▪ Three-tiered hierarchy
▪ Software-defined networking
▪ Spine and leaf architecture
▪ Traffic flows
▪ On-premise versus hosted

A

Datacenter

294
Q

▪ Enables the network to be intelligently and centrally controlled, or
programmed, using software applications

A

Software-Defined Networking (SDN)

295
Q

FYI
▪ Spine and Leaf Architecture
● An alternative type of network architecture that focuses on the
communication within the datacenter itself
● Spine and leaf architecture can give faster speeds and lower
latency
● This architecture can be used in combination with the standard
three-tiered hierarchy

A

▪ Spine and Leaf Architecture
● An alternative type of network architecture that focuses on the
communication within the datacenter itself
● Spine and leaf architecture can give faster speeds and lower
latency
● This architecture can be used in combination with the standard
three-tiered hierarchy

296
Q

FYI
● North-South
o Traffic that enters or leaves the data center from a system
physically residing outside the datacenter
o Northbound is data leaving the datacenter
o Southbound is data entering the datacenter
● East-West
o Refers to data flow within a datacenter

A

● North-South
o Traffic that enters or leaves the data center from a system
physically residing outside the datacenter
o Northbound is data leaving the datacenter
o Southbound is data entering the datacenter
● East-West
o Refers to data flow within a datacenter

297
Q

CIA Triad
▪ Keeping the data private and safe
● Encryption
● Authentication to access resources
▪ Encryption ensures that data can only be read (decoded) by the intended
recipient
● Symmetric encryption
● Asymmetric encryption

A

Confidentiality

298
Q

CIA Triad
▪ Ensures data has not been modified in transit
▪ Verifies the source that traffic originates from
▪ Integrity violations
● Defacing a corporate web page
● Altering an e-commerce transaction
● Modifying electronically stored financial records

A

Integrity

299
Q

CIA Triad
▪ Measures accessibility of the data
▪ Increased by designing redundant networks
▪ Compromised by
● Crashing a router or switch by sending improperly formatted data
● Flooding a network with so much traffic that legitimate requests
cannot be processed
o Denial of Service (DoS)
o Distributed Denial of Service

A

Availability

300
Q

Confidentiality
▪ Both sender and receiver use the same key
▪ DES (Data Encryption Standard)
● Developed in the mid-1970s
● 56-bit key
● Used by SNMPv3
● Considered weak today

A

Symmetric Encryption (Confidentiality)

301
Q

Confidentiality
● Uses three 56-bit keys (168-bit total)
● Encrypt, decrypt, encrypt

A

3DES (Triple DES)

302
Q

Confidentiality
● Preferred symmetric encryption standard
● Used by WPA2
● Available in 128-bit, 192-bit, and 256-bit keys
▪ Sender and receiver use the same key to encrypt and decrypt the
messages

A

AES (Advanced Encryption Standard)

303
Q

Confidentiality
▪ Uses different keys for sender and receiver
▪ RSA is the most popular implementation
▪ RSA algorithm is commonly used with a public key infrastructure (PKI)
▪ PKI is used to encrypt data between your web browser and a shopping
website
▪ Can be used to securely exchange emails
▪ Sender and receiver use different keys to encrypt and decrypt the
messages

A

Asymmetric Encryption (Confidentiality)

304
Q

FYI
Hashing (Integrity)
▪ Sender runs string of data through algorithm
● Result is a hash or hash digest
▪ Data and its hash are sent to receiver
▪ Receiver runs data received through the same algorithm and obtains a
hash
▪ Two hashes are compared
● If the same, the data was not modified

A

Hashing (Integrity)
▪ Sender runs string of data through algorithm
● Result is a hash or hash digest
▪ Data and its hash are sent to receiver
▪ Receiver runs data received through the same algorithm and obtains a
hash
▪ Two hashes are compared
● If the same, the data was not modified

305
Q

Hashing Algorithms (Integrity)
● 128-bit hash digest

A

Message digest 5 (MD5)

306
Q

Hashing Algorithms (Integrity)
● 160-bit hash digest

A

Secure Hash Algorithm 1 (SHA-1)

307
Q

Hashing Algorithms (Integrity)
● 256-bit hash digest

A

Secure Hash Algorithm 256 (SHA-256)

308
Q

Hashing Algorithms (Integrity)
● Common variant often used in e-mail systems

A

Challenge-Response Authentication Mechanism Message Digest 5
(CRAMMD5)

309
Q

▪ A person or event that has the potential for impacting a valuable
resource in a negative manner

A

Threat

310
Q

▪ A quality or characteristic within a given
resource or its environment that might
allow the threat to be realized

A

Vulnerability

311
Q

▪ Undesirable conditions or weaknesses that are in the general area
surrounding the building where a network is run

A

Environmental Vulnerabilities

312
Q

▪ Undesirable conditions or weaknesses in the building where the network
is located

A

Physical Vulnerabilities

313
Q

▪ Piece of software code that takes advantage of a security flaw or
vulnerability within a system or network
▪ Keep systems properly patched and antimalware software updated

A

Exploit

314
Q

The identification, evaluation, and prioritization of risks to minimize, monitor,
and control the vulnerability exploited by a threat

A

Risk Management

315
Q

▪ A process that identifies potential hazards and analyzes what could
happen if a hazard occurs
● Security
● Business

A

Risk Assessment

316
Q

▪ Used to identify, assess, and implement key security controls within an
application, system, or network

A

Security Risk Assessment

317
Q

▪ Focused on the identification of the different threats that may wish to
attack or cause harm to your systems or network

A

Threat Assessment

318
Q

▪ Focused on identifying, quantifying, and prioritizing the risks and
vulnerabilities in a system or network
● Nessus
● QualysGuard
● OpenVAS
o Threat controlled by the attacker of event
o Vulnerability within your control

A

Vulnerability Assessment

319
Q

▪ Evaluates the security of an IT infrastructure by safely trying to exploit
vulnerabilities within the systems or network

A

Penetration Test

320
Q

▪ Assesses cyber risk posture and exposure to threats caused by
misconfigurations and patching delays
● Define mission-critical components
● Identify strengths, weaknesses, and security issues
● Stay in control
● Strengthen position

A

Posture Assessment

321
Q

▪ Used to identify, understand, and evaluate potential hazards in the
workplace

A

Business Risk Assessment

322
Q

▪ The disciplined examination of the processes used by the organization
against a set of criteria
● Determines if you are doing things right, and if you are doing the
right things
● Vendor Assessment
● The assessment of a prospective vendor to determine if they can
effectively meet the obligations and the needs of the business

A

Process Assessment

323
Q

▪ Using the lowest level of permissions or privileges needed in order to
complete a job function or admin task

A

Least Privilege

324
Q

● An access control method where access is determined by the
owner of the resource
o Every object in a system has to have an owner
o Each owner must determine the access rights and
permissions for each object

A

Discretionary Access Control (DAC)

325
Q

● An access control policy where the computer system gets to
decide who gets access to what objects
o Unclassified
o Confidential
o Secret
o Top secret

A

Mandatory Access Control (MAC)

326
Q

▪ An access model that is controlled by the system but focuses on a set of
permissions versus an individual’s permissions
▪ Creating groups makes it easy to control permissions based around actual
job functions

A

Role-Based Access Control (RBAC)

327
Q

▪ A security framework that requires users to be authenticated and
authorized before being granted access to applications and data
1. Reexamine all default access controls
2. Employ a variety of prevention techniques and defense in depth
3. Enable real-time monitoring and
controls to identify and stop
malicious activity quickly

A

Zero-Trust

328
Q

Cybersecurity approach in which a series of
defensive mechanisms are layered in order to protect valuable data and
information
▪ Physical
▪ Logic
▪ Administrative

A

Defense in Depth

329
Q

▪ A perimeter network that protects an organization’s internal local area
network from untrusted traffic

A

DMZ

330
Q

▪ Subnet in the network architecture that uses a single firewall with three
interfaces to connect three dissimilar networks
● Triple-homed firewall

A

Screen Subnet

331
Q

▪ Prevent frauds and abuse by distributing various tasks and approval
authorities across a number of different users

A

Separation of Duties

332
Q

▪ Two people have to be present at the same time to do something

A

Dual Control

333
Q

▪ Two people each have half of the knowledge of how to do something

A

Split Knowledge

334
Q

▪ Attracts and traps potential attackers to counteract any attempts at
unauthorized access to a network
▪ Think vertical through the layers as well as horizontal or lateral across the
network using screen subnets

A

Honeypot/ Honeynet

335
Q

Authenticates or proves an identity using more than one method
▪ Something you know
▪ Something you have
▪ Something you are
▪ Something you do
▪ Somewhere you are

A

Multifactor Authentication

336
Q

▪ Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary
● Do not use anything that looks like a regular word

A

Dictionary Attack

337
Q

▪ Tries every possible combination until they figure out the password
● Use a longer and more complicated password
o Uppercase
o Lowercase
o Numbers
o Special characters
● For good security, use a minimum of 12 characters

A

Brute Force Attack

338
Q

▪ Combination of dictionary and brute force attacks

A

Hybrid Attack

339
Q

FYI
Local Authentication
▪ Process of determining whether someone or something is who or what it
● Claims itself to be
● Simplified version of X.500

A

Local Authentication
▪ Process of determining whether someone or something is who or what it
● Claims itself to be
● Simplified version of X.500

340
Q

FYI
Lightweight Directory Access Protocol (LDAP)
▪ Validates a username and password combination against an LDAP server
as a form of authentication
● Port 389 LDAP
● Port 636 LDAP Secure

A

Lightweight Directory Access Protocol (LDAP)
▪ Validates a username and password combination against an LDAP server
as a form of authentication
● Port 389 LDAP
● Port 636 LDAP Secure

341
Q

▪ Organizes and manages everything on the network, including clients,
servers, devices, and users

A

Active Directory (AD)

342
Q

▪ Focused on authentication and authorization within a Windows domain
environment
▪ Provides secure authentication over an insecure network

A

Kerberos

343
Q

Network Access Protocols
▪ Provides centralized administration of dial-up, VPN, and wireless network
authentication
● Authentication
● Authorization
● Accounting
o Commonly uses:
▪ Port 1812 Authentication messages
▪ Port 1813 Accounting messages
o Proprietary versions may also use:
▪ Port 1645 Authentication messages
▪ Port 1646 Accounting messages

A

Remote Authentication Dial-In User Service (RADIUS)

344
Q

Network Access Protocols
▪ Used to perform the role of an authenticator in an 802.1x network
● Ensure Port 49 is open
● Excellent if using Cisco devices

A

Terminal Access Controller Access Control System Plus (TACACS+)
● RADIUS (UDP)
● TACACS+ (TCP)

345
Q

Network Access Protocols
▪ A standardized framework that’s used for port-based authentication on
both wired and wireless networks
● Supplicant
● Authenticator
● Authentication server

A

802.1x

346
Q

Network Access Protocols(EAP)
Utilizes simple passwords and the challenge handshake
authentication process to provide remote access
authentication

A

EAP-MD5

347
Q

Network Access Protocols(EAP)
Uses public key infrastructure with a digital certificate
being installed on both the client and the server

A

EAP-TLS

348
Q

Network Access Protocols(EAP)
Requires a digital certificate on the server and a password
on the client for its authentication

A

EAP-TTLS

349
Q

Network Access Protocols(EAP)
Uses a protected access credential to establish mutual
authentication between devices

A

EAP Flexible Authentication via Secure Tunneling (EAP-FAST)

350
Q

Network Access Protocols(EAP)
Uses server certificates and Microsoft’s Active Directory
databases to authenticate a client’s password

A

Protected EAP (PEAP)

351
Q

Network Access Protocols(EAP)
A proprietary protocol that only works on Cisco-based
device

A

Lightweight EAP (LEAP)

352
Q

Ensures a device is scanned to determine its current state of security prior to
being allowed network access

A

Network Access Control (NAC)

353
Q

Network Access Control (NAC)
▪ A piece of software installed on a device requesting access to the
network

A

Persistent Agent

354
Q

Network Access Control (NAC)
▪ Requires the users to connect to the network and go to a web-based
captive portal to download an agent onto their devices

A

Non-Persistent Agent

355
Q

Network Access Control (NAC)
Defines access periods for given hosts on using a time
based schedule

A

Time-based

356
Q

Network Access Control (NAC)
Evaluates the location of the endpoint requesting access
using IP or GPS geolocation

A

Location-based

357
Q

Network Access Control (NAC)
Reevaluates a device’s authentication when it’s being used
to do something

A

Role-Based (Adaptive NAC)

358
Q

Network Access Control (NAC)
Uses a complex admission policy that might enforce a
series of rules with the use of logical statements

A

Rule-based

359
Q

Network Attacks
▪ Occurs when an attacker initiates multiple TCP sessions, but never
completes them

A

TCP SYN Flood

360
Q

Network Attacks
▪ Occurs when an attacker sends a ping to a subnet broadcast address with
the source IP spoofed to be that of the victim server

A

Smurf Attack (ICMP Flood)

361
Q

Network Attacks
▪ Occurs when an attacker uses multiple computers to ask for access to the
same server at the same time

A

Distributed Denial of Service (DDoS) Attack

362
Q

Network Attacks
Occurs when one machine continually floods a victim with requests for services

A

Denial of Service (DoS) Attack

363
Q

General Network Attacks
▪ Occurs when an attacker puts themselves between the victim and the
intended destination

A

On-Path/ Man-in-the-Middle (MITM) Attack

364
Q

General Network Attacks
▪ Occurs when an attacker guesses the session ID that is in use between a
client and a server and takes over the authenticated session

A

Session Hijacking

365
Q

General Network Attacks
▪ Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site

A

DNS Poisoning

366
Q

General Network Attacks
▪ Uses encrypted digital signatures when passing DNS information between
servers to help protect it from poisoning
▪ Ensure server has the latest security patches and updates

A

DNSSEC

367
Q

General Network Attacks
▪ A DHCP server on a network which is not under the administrative
control of the network administrators

A

Rogue DHCP Server

368
Q

Spoofing Attacks
▪ Occurs when an attacker masquerades as another person by falsifying
their identity

A

Spoofing

369
Q

Spoofing Attacks
▪ Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client

A

IP Spoofing

370
Q

Spoofing Attacks
▪ Changing the MAC address to pretend the use of a different network
interface card or device

A

MAC Spoofing

371
Q

Spoofing Attacks
▪ Relies on a list of all known and authorized MAC addresses

A

MAC Filtering

372
Q

Spoofing Attacks
▪ Sending falsified ARP messages over a local area network
▪ ARP spoofing attack can be used as a precursor to other attacks
▪ Set up good VLAN segmentation within your network

A

ARP Spoofing

373
Q

Spoofing Attacks
▪ Ability to send traffic from one VLAN into another, bypassing the VLAN
segmentation you have configured within your Layer 2 networks

A

VLAN Hopping

374
Q

Spoofing Attacks
▪ Connecting to an interface on the switch using access mode with the
same VLAN as the native untagged VLAN on the trunk

A

Double Tagging

375
Q

Spoofing Attacks
▪ Attempting to conduct a Dynamic Trunking Protocol (DTP) negotiation
▪ Disable dynamic switchport mode on your switchports

A

Switch Spoofing

376
Q

▪ Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent

A

Malware

377
Q

▪ Made up of malicious code that is run on a machine without the user’s
knowledge and infects it whenever that code is run

A

Virus

378
Q

▪ A piece of malicious software that can replicate itself without user
interaction

A

Worm

379
Q

▪ A piece of malicious software disguised as a piece of harmless or
desirable software

A

Trojan Horse

380
Q

▪ Provides the attacker with remote control of a victim machine

A

Remote Access Trojan (RAT)

381
Q

▪ Restricts access to a victim’s computer system or files until a ransom or
payment is received

A

Ransomware

382
Q

▪ Gathers information about you without your consent

A

Spyware

383
Q

▪ Captures any key strokes made on the victim machine

A

Key Logger

384
Q

▪ Designed to gain administrative control over a computer system or
network device without being detected

A

Rootkit

385
Q

▪ A wireless access point that has been installed on a secure network
without authorization from a local network administrator

A

Rogue Access Point

386
Q

▪ Use of IT systems, devices, software, applications, or services without the
explicit approval of the IT department

A

Shadow IT

387
Q

▪ Wireless access point that uses the same name as your own network

A

Evil Twin

388
Q

▪ Attempts to interrupt communication between an end user and the
wireless access point

A

Deauthentication

389
Q

▪ Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary
▪ Do not use anything that looks like a regular word

A

Dictionary Attack

390
Q

▪ Tries every possible combination until they figure out the password
▪ Use a longer and more complicated password

A

Brute Force Attack

391
Q

▪ Combination of dictionary and brute force attacks

A

Hybrid Attack

392
Q

▪ Captures wireless data packets as they go across the airwaves

A

Wireless Interception

393
Q

▪ Any attempt to manipulate users to reveal confidential information or
perform actions detrimental to a system’s security
▪ The weakest link is our end users and employees

A

Social Engineering

394
Q

▪ Sending an email in an attempt to get a user to click a link
▪ Sending out emails to capture the most people and doesn’t really target
any particular person or group

A

Phishing

395
Q

▪ More targeted form of phishing

A

Spearphishing

396
Q

▪ Focused on key executives within an organization or other key leaders,
executives, and managers in the company

A

Whaling

397
Q

▪ Entering a secure portion of the organization’s building by following an
authorized person into the area without their knowledge or consent

A

Tailgating

398
Q

▪ Similar to tailgating, but occurs with the employee’s knowledge or
consent

A

Piggybacking

399
Q

▪ Coming up behind an employee and trying to use direct observation
to obtain information

A

Shoulder Surfing

400
Q

▪ Scavenging for personal or confidential information in garbage or
recycling containers

A

Dumpster Diving

401
Q

An employee or other trusted insider who uses their authorized network access
in unauthorized ways to harm the company

A

Insider Threat

402
Q

A specific type of malware that is tied to either a logical event or a specific time

A

Logic Bomb

403
Q

Uses a set of rules defining the traffic types permitted or denied through device
▪ Software or hardware
▪ Virtual or physical
▪ Host-based or network-based
▪ Can perform Network Address Translation (NAT) and/or Port Address
Translation (PAT)

A

Firewall

404
Q

▪ Inspects traffic as part of a session and recognizes where the traffic
originated

A

Stateful Firewall

405
Q

▪ Third-generation firewall that conducts deep packet inspection and
packet filtering

A

NextGen Firewall (NGFW)

406
Q

▪ Set of rules applied to router interfaces that permit or deny certain traffic

A

Access Control List (ACL)

407
Q

Connects to devices that should have restricted access
from the outside zone (like web servers)

A

Demilitarized Zone (DMZ)

408
Q

▪ Combines firewall, router, intrusion detection/prevention system, anti-malware, and other features into a single device

A

Unified Threat Management (UTM) Device

409
Q

▪ Sends text-based commands to remote devices and is a very old
networking protocol. should never be used to connect to secure devices

A

Telnet Port 23

410
Q

▪ Encrypts everything that is being sent and received between the client
and the server

A

Secure Shell (SSH) Port 22

411
Q

▪ Provides graphical interface to connect to another computer over a
network connection

A

Remote Desktop Protocol (RDP) Port 3389

412
Q

▪ Provides a secure connection using the SSL/TLS protocols to the server
via RDP
● Create an encryption connection
● Control access to network resources based on permissions and
group roles
● Maintain and enforce authorization policies

A

Remote Desktop Gateway (RDG)

413
Q

▪ Establishes a secure connection between a client and a server over an
untrusted public network like the Internet

A

Virtual Private Network (VPN)

414
Q

▪ Designed for thin client architectures and things like Virtual Desktop
Infrastructure (VDI)

A

Virtual Network Computing (VNC) Port 5900

415
Q

▪ Hosts a desktop environment on a centralized server
▪ Desktop as a Service (DaaS)

A

Virtual Desktop Infrastructure (VDI)

416
Q

▪ Managing devices using Telnet or SSH protocols over the network

A

In-Band Management

417
Q

▪ Connecting to and configuring different network devices using an
alternate path or management network
▪ Prevents a regular user’s machine from connecting to the management
interfaces of your devices

A

Out-of-Band Management
▪ Out-of-band networks add additional costs to the organization

418
Q

▪ Confirms and validates a user’s identity
▪ Gives the user proper permissions to access a resource

A

Authentication

419
Q

▪ Sends usernames and passwords in plain text for authentication

A

Password Authentication Protocol (PAP)

420
Q

▪ Sends the client a string of random text called a challenge which is then
encrypted using a password and sent back to the server

A

Challenge Handshake Authentication Protocol (CHAP)

421
Q

▪ Microsoft proprietary version that provides stronger encryption keys and
mutual authentication

A

MS-CHAP

422
Q

▪ Allows for more secure authentication methods to be used instead of just
a username and a password

A

Extensible Authentication Protocol (EAP)
▪ Use EAP/TLS in conjunction with a RADIUS or TACACS+ server

423
Q

Extends a private network across a public network and enables sending and
receiving data across shared or public networks
▪ Site to site
▪ Client to site
▪ Clientless

A

Virtual Private Networks (VPNs)

424
Q

▪ Routes and encrypts all network requests through the VPN connection
back to the headquarters

A

Full Tunnel VPN

425
Q

▪ Routes and encrypts only the traffic bound for the headquarters over the
VPN, and sends the rest of the traffic to the regular Internet

A

Split Tunnel VPN
● For best security, use a full tunnel
● For best performance, use a split tunnel

426
Q

▪ Creates a secure, remote-access VPN tunnel using a web browser without
requiring a software or hardware client

A

Clientless VPN

427
Q

▪ Provides cryptography and reliability using the upper layers of the OSI
model, specifically Layers 5, 6, and 7

A

Secure Socket Layer (SSL)

428
Q

▪ Provides secure web browsing over HTTPS

A

Transport Layer Security (TLS)
▪ SSL and TLS use TCP to establish their secure connections between a
client and a server

429
Q

▪ UDP-based version of the TLS protocol which operates a bit faster due to
having less overhead

A

Datagram Transport Layer Security (DTLS)

430
Q

▪ Lacks security features like encryption by default and needs to be
combined with an extra encryption layer for protection

A

Layer 2 Tunneling Protocol (L2TP)

431
Q

▪ Provides a tunneling protocol for the P2P protocol but also lacks native
security and encryption features

A

Layer 2 Forwarding (L2F)

432
Q

▪ Supports dial-up networks but also lacks native security features except
when used with Microsoft Windows

A

Point-to-Point Tunneling Protocol (PPTP)

433
Q

▪ Provides authentication and encryption of packets to create a secure
encrypted communication path between two computers

A

IP Security (IPSec)

434
Q

● Using data encryption

A

Confidentiality

435
Q

● Ensuring data is not modified in transit

A

Integrity

436
Q

● Verifying parties are who they claim to be

A

Authentication

437
Q

● Checking sequence numbers on all packets prior to transmission
o Key exchange request
o IKE Phase 1
o IKE Phase 2
o Data transfer
o Tunnel termination

A

Anti-Replay

438
Q

▪ Conducts three two-way exchanges between the peers, from the initiator
to the receiver

A

Main Mode

439
Q

Agrees upon which algorithms and hashes will be used to
secure the IKE communications throughout the process

A

Main Mode First Exchange

440
Q

Uses a Diffie-Hellman exchange to generate shared secret
keying material so that the two parties can prove their
identities

A

Main Mode Second Exchange

441
Q

Verifies the identity of the other side by looking at an
encrypted form of the other peer’s IP address

A

Main Mode Third Exchange

442
Q

▪ Uses fewer exchanges, resulting in fewer packets and faster initial
connection than main mode
● Diffie-Hellman public key
● Signed random number
● Identity packet
● Negotiate the IPSec SA parameters protected by an existing IKE SA
● Establish IPSec SA
● Periodically renegotiate IPSec SAs to maintain security
● Perform additional Diffie-Hellman exchanges, if needed

A

Aggressive Mode

443
Q

▪ Only occurs after IKE already established the secure tunnel in Phase 1
using either main or aggressive mode

A

Quick Mode

444
Q

▪ Allows two systems that don’t know each other to be able to exchange
keys and trust each other
● PC1 sends traffic to PC2 and then RTR1 initiates creation of IPSec
tunnel
● RTR1 and RTR2 negotiate Security Association (SA) to form IKE
Phase 1 tunnel (ISAKMP tunnel)
● IKE Phase 2 tunnel (IPSec tunnel) is negotiated and set up
● Tunnel is established and information is securely sent between
PC1 and PC2
● IPSec tunnel is torn down and the IPSec SA is deleted

A

Diffie-Hellman Key Exchange

445
Q

▪ Uses packet’s original IP header and used for client-to-site VPNs
▪ By default, maximum transmission unit (MTU) size in most networks is
1500 bytes

A

Transport Mode

446
Q

▪ Encapsulates the entire packet and puts another header on top of it
▪ For site-to-site VPNs, you may need to allow jumbo frames

A

Tunneling Mode
● Transport
o Client to site
● Tunneling
o Site to site

447
Q

▪ Provides connectionless data integrity and data origin authentication for
IP datagrams and provides protection against replay attacks

A

Authentication Header (AH)

448
Q

▪ Provides authentication, integrity, replay protection, and data
confidentiality
▪ In transport mode, use AH to provide integrity for the TCP header and
ESP to encrypt it
▪ In tunneling mode, use AH and ESP to provide integrity and encryption of
the end payload

A

Encapsulating Security Payload (ESP)

449
Q

▪ Any device that can communicate with an SNMP manager known as the
management information base (MIB)

A

Managed Device

450
Q

▪ Sent trap messages get a unique objective identifier to distinguish each
message as a unique message being received

A

Granular

451
Q

▪ The structure of the management data of a device subsystem using a
hierarchical namespace containing object identifiers

A

Management Information Base (MIB)

452
Q

▪ SNMP traps may be configured to contain all the information about a
given alert or event as a payload

A

Verbose

453
Q

▪ Use a community string to give them access to the device as their security
mechanism
▪ Default community strings of public (read-only) or private (read-write)
devices are considered a security risk

A

SNMPv1 and SNMPv2

454
Q

▪ Provides three security enhancements which added integrity,
authentication, and confidentiality to the SNMP protocol
● Integrity
o message hashing
● Authentication
o source validation
● PoE+ 802.3at Confidentiality
o DES 56-bit encryption

A

SNMPv3

455
Q

▪ Sends system log or event messages to a central server, called a syslog
server
● Security Information Management (SIM)
● Security Event Management (SEM)
● Security Information and Event Management (SIEM)

A

System Logging Protocol (Syslog)

456
Q

▪ Contains information about the traffic flows on the network

A

Traffic Log
▪ Traffic logs allow for investigation of any abnormalities

457
Q

▪ Contains a sequence of events for a particular activity

A

Audit Log/ Audit Trail

458
Q

▪ Contains information about software running on a client or server
● Informational
● Warning
● Error

A

Application Log

459
Q

▪ Contains information about the security of a client or server

A

Security Log

460
Q

▪ Contains information about the operating system itself

A

System Log

461
Q

Provides real-time or near-real-time analysis of security alerts generated by
network hardware and applications
Gathers logs and data from all sorts of different systems

A

Security Information and Event Management (SIEM)

462
Q

Provides important forensic tools and helps address
compliance reporting requirements

A

Log Collection

463
Q

Maps log messages into a common data model, enabling the
organization to connect and analyze related events

A

Normalization

464
Q

Links the logs and events from different systems or
applications into a single data feed

A

Correlation

465
Q

Reduces the volume of event data by consolidating duplicate
event records and merging them into a single record

A

Aggregation

466
Q

Presents the correlated, aggregated event data in real-time
monitoring dashboards for analysts or long-term summaries
for management
▪ Software
▪ Hardware
▪ Managed service
▪ Log all relevant events and filter out anything that is considered to be
irrelevant data
▪ Establish and document the scope of the events
▪ Develop use cases to define a threat
▪ Plan incident responses for given scenarios or events
▪ Establish a ticketing process to track all the flagged events
▪ Schedule regular threat hunting with cybersecurity analysts
▪ Provide auditors and analysts an evidence trail
▪ Syslog protocol using UDP Port 514 or TCP Port 1468

A

Reporting

467
Q

▪ Prevents unauthorized access to a switchport by identifying and limiting
the MAC addresses of the hosts that are allowed

A

Port Security

468
Q

▪ Allows an administrator to define the static MAC addresses to use on a
given switchport

A

Static Configuration

469
Q

▪ Defines a maximum number of MAC addresses for a port and blocks new
devices that are not on the learned list

A

Dynamic Learning

470
Q

▪ A technique where a VLAN contains switchports that are restricted to
using a single uplink
● Primary
● Secondary isolated
● Secondary community

A

Private VLAN (Port Isolation)

471
Q

▪ Forwards frames downstream to all of the secondary VLANs

A

Primary VLAN

472
Q

▪ Includes switchports that can reach the primary VLAN but not other
secondary VLANs

A

Isolated VLAN

473
Q

▪ Includes switchports that can communicate with each other and the
primary VLAN but not other secondary VLANs

A

Community VLAN

474
Q

FYI
● Promiscuous Port (P-Port)
o Can communicate with anything connected to the primary
or secondary VLANs
▪ Host Ports
▪ Isolated Ports (I-Port)
▪ Community Ports (C-Port) df
● Isolated Port (I-Port)
o Can communicate upwards to a P-Port and cannot talk
with other I-Ports
● Community Port (C-Port)
o Can communicate with P-Ports and other C-Ports on the
same community VLAN
▪ Default VLAN is known as VLAN 1

A

● Promiscuous Port (P-Port)
o Can communicate with anything connected to the primary
or secondary VLANs
▪ Host Ports
▪ Isolated Ports (I-Port)
▪ Community Ports (C-Port) df
● Isolated Port (I-Port)
o Can communicate upwards to a P-Port and cannot talk
with other I-Ports
● Community Port (C-Port)
o Can communicate with P-Ports and other C-Ports on the
same community VLAN
▪ Default VLAN is known as VLAN 1

475
Q

▪ VLAN where untagged traffic is put once it is received on a trunk port

A

Native VLAN

476
Q

▪ Validates the Address Resolution Protocol (ARP) packets in your network
▪ Ensures only valid ARP requests and responses are relayed across the
network device
▪ Invalid ARP packets are dropped and not forwarded

A

Dynamic ARP Inspection (DAI)

477
Q

▪ Provides security by inspecting DHCP traffic, filtering untrusted DHCP
messages, and building and maintaining a DHCP snooping binding table

A

DHCP Snooping

478
Q

▪ Any interface that is configured to receive messages from outside the
network or firewall

A

Untrusted Interface

479
Q

▪ Any interface that is configured to receive messages only from within the
network
▪ Configure switches and VLANs to allow DHCP snooping

A

Trusted Interface

480
Q

▪ Mitigates attack vectors based on forged ICMPv6 router advertisement
messages
▪ Operates at Layer 2 of the OSI model for IPv6 networks to specify which
interfaces are not allows to have router advertisements on

A

IPv6 Router Advertisement Guard (RA-Guard)

481
Q

▪ Configures a QoS filter that manages the traffic flow of control plane
packets to protect the control plane of Cisco IOS routers and switches

A

Control Plane Policing (CPP)

482
Q

FYI
SNMP
▪ Allows us to easily gather information from our various network devices
back to a centralized management server
▪ Community strings grant access to portions of the device management
planes
● Ensure you are NOT using SNMP v1 or SNMP v2
o SNMP v3 uses encoded parameters to provide its
authentication as a part of the SNMP architecture
● Combine with whitelisting of the Management Information Base
(MIB)
● Use authPriv on your devices
● Ensure all SNMP administrative credentials have strong passwords
● Follow the principles of least privilege
o Role separation between polling/receiving traps (for
reading)
● Configuring users or groups (for writing)
● Apply and extend access control lists to block unauthorized access
● Keep system images and software up-to-date
● Segregate SNMP traffic onto a separate management network

A

SNMP
▪ Allows us to easily gather information from our various network devices
back to a centralized management server
▪ Community strings grant access to portions of the device management
planes
● Ensure you are NOT using SNMP v1 or SNMP v2
o SNMP v3 uses encoded parameters to provide its
authentication as a part of the SNMP architecture
● Combine with whitelisting of the Management Information Base
(MIB)
● Use authPriv on your devices
● Ensure all SNMP administrative credentials have strong passwords
● Follow the principles of least privilege
o Role separation between polling/receiving traps (for
reading)
● Configuring users or groups (for writing)
● Apply and extend access control lists to block unauthorized access
● Keep system images and software up-to-date
● Segregate SNMP traffic onto a separate management network

483
Q

FYI
● Access Control List (ACL)
o A list of permissions associated with a given system or network resource
▪ Block SSH for a single computer based on its IP address
▪ Block any IP using port 110
▪ Block any IP and any port from outside the LAN
▪ Block incoming requests from private loopback and multicast IP ranges
▪ Block incoming requests from protocols that should only be used locally
▪ Block all IPv6 traffic or allow it to only authorized hosts and ports

A

● Access Control List (ACL)
o A list of permissions associated with a given system or network resource
▪ Block SSH for a single computer based on its IP address
▪ Block any IP using port 110
▪ Block any IP and any port from outside the LAN
▪ Block incoming requests from private loopback and multicast IP ranges
▪ Block incoming requests from protocols that should only be used locally
▪ Block all IPv6 traffic or allow it to only authorized hosts and ports

484
Q

▪ Blocks matching traffic

A

Explicit Deny

485
Q

▪ Blocks traffic to anything not explicitly specified

A

Implicit Deny

486
Q

▪ Defines the privileges and responsibilities of administrative users who
control firewalls and their ACLs

A

Role-Based Access

487
Q

FYI
MAC Filtering
▪ Defines a list of devices and only allows those on your Wi-Fi network
● Explicit allow
● Implicit allow
● Always use explicit allow
● Don’t rely on it as your only wireless network protection

A

MAC Filtering
▪ Defines a list of devices and only allows those on your Wi-Fi network
● Explicit allow
● Implicit allow
● Always use explicit allow
● Don’t rely on it as your only wireless network protection

488
Q

▪ Secures wireless networks, including those protected with WEP, WPA,
WPA2, and WPA3
▪ Ensure you choose a long and strong password

A

Pre-Shared Key (PSK)

489
Q

FYI
● IoT Considerations
o Understand your endpoints
o Track and manage your devices
o Patch vulnerabilities
o Conduct test and evaluation
o Change defaults credentials
o Use encryption protocols
o Segment IoT devices

A

● IoT Considerations
o Understand your endpoints
o Track and manage your devices
o Patch vulnerabilities
o Conduct test and evaluation
o Change defaults credentials
o Use encryption protocols
o Segment IoT devices

490
Q

Measures the average time it takes to repair a network
device when it breaks

A

Mean Time to Repair (MTTR)

491
Q

Measures the average time between failures of a device

A

Mean Time Between Failures (MTBF)

492
Q

▪ Multiple NICs are active at the same time
▪ NICs have their own MAC address
▪ Makes troubleshooting more complex

A

Active-Active

493
Q

▪ One NIC is active at a time
▪ Client appears to have a single MAC address

A

Active-Passive

494
Q

▪ Using a group of network interface cards for load balancing and failover
on a server or other device

A

Network Interface Card Teaming

495
Q

▪ Proprietary first-hop redundancy by Cisco
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway

A

Hot Standby Router Protocol (HSRP)

496
Q

▪ IETP open-standard variant of HSRP
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway

A

Virtual Router Redundancy Protocol (VRRP)

497
Q

▪ Proprietary first-hop redundancy by Cisco
▪ Focuses on load balancing over redundancy
▪ Allows for active router and standby router
▪ Creates virtual router as the default gateway

A

Gateway Load Balancing Protocol (GLBP)

498
Q

▪ Achieves redundancy by having multiple links
between devices
▪ Load balancing occurs over multiple links
▪ Multiple links appear as single logical link

A

Link Aggregation Control Protocol (LACP)

499
Q

▪ Creates more than one physical path between the server and its storage
devices for better fault tolerance and performance

A

Multipathing

500
Q

▪ An available building that does not have any hardware or software in
place or configured
▪ While recovery is possible, it is going to be slow and time-consuming

A

Cold Sites

501
Q

▪ An available building that already contains a lot of the equipment
▪ Restoral time is between 24 hours and seven days

A

Warm Sites

502
Q

▪ An available building that already has the equipment and data in place
and configured
▪ Minimal downtime and with nearly identical service levels maintained

A

Hot Sites

503
Q

▪ Allows for the creation of a recovery version of an organization’s
enterprise network in the cloud

A

Cloud Site

504
Q

Time and service level within which a business process
must be restored after a disaster to avoid unacceptable
consequences

A

Recovery Time Objective (RTO)
o How much time did it
take to recover after the notification of a business process
disruption?
o Use either a hot site or a cloud site for low RTO situations

505
Q

Interval of time during a disruption before data lost
exceeds the BCP’s maximum allowable threshold or
tolerance

A

Recovery Point Objective (RPO)

506
Q

● Complete backup is the safest and most comprehensive; Time
consuming and costly

A

Full

507
Q

● Backup only data changed since last backup

A

Incremental

508
Q

● Only backups data since the last full backup

A

Differential

509
Q

● Read-only copy of data frozen in time (VMs)

A

Snapshots

510
Q

▪ Using a sprinkler system and pipes that always contain water

A

Wet Pipe System

511
Q

▪ A detector actuation like a smoke detector and a sprinkler must be
tripped prior to water being released

A

Pre-Action System

512
Q

FYI
Categories of QoS
▪ Delay
● Time a packet travels from source to destination
● Measured in milliseconds (ms)
▪ Jitter
● Uneven arrival of packets
● Especially harmful in VoIP
▪ Drops
● Occurs during link congestion
● Router’s interface queue overflows and causes packet loss

A

Categories of QoS
▪ Delay
● Time a packet travels from source to destination
● Measured in milliseconds (ms)
▪ Jitter
● Uneven arrival of packets
● Especially harmful in VoIP
▪ Drops
● Occurs during link congestion
● Router’s interface queue overflows and causes packet loss

513
Q

● Does not truly provide
QoS to that traffic
● No reordering of packets
● Uses FIFO (first in, first
out) queuing

A

Best Effort

514
Q

● Makes strict bandwidth
reservations
● Reserves bandwidth by signaling devices

A

Integrated Services (IntServ or
Hard QoS)

515
Q

● Differentiates between multiple traffic flows
● Packets are “marked”
● Routers and switches make decisions based on those markings

A

Differentiated Services (DiffServ or Soft QoS)

516
Q

FYI
Link Efficiency: Compression
▪ Packet payload is compressed to conserve bandwidth
▪ VoIP payload can be reduced by 50%
● Payload size from 40 bytes to 20 bytes
▪ VoIP header can be reduced by 90-95%
● Uses RTP header compression (cRTP)
● Header size goes from 40 bytes to 2 to 4 bytes
▪ Utilized on slower-speed links to make most of limited bandwidth

A

Link Efficiency: Compression
▪ Packet payload is compressed to conserve bandwidth
▪ VoIP payload can be reduced by 50%
● Payload size from 40 bytes to 20 bytes
▪ VoIP header can be reduced by 90-95%
● Uses RTP header compression (cRTP)
● Header size goes from 40 bytes to 2 to 4 bytes
▪ Utilized on slower-speed links to make most of limited bandwidth

517
Q

▪ Contains instructions to help network and system administrators detect,
respond to, and recover from network security incidents
● Preparation
● Identification
● Containment
● Eradication
● Recovery
● Lessons learned

A

Incident Response Plan

518
Q

▪ Documents how an organization can quickly resume work after an
unplanned incident

A

Disaster Recovery Plan

519
Q

o Outlines how a business will continue operating during an
unplanned disruption in service
o A disaster recovery plan will be referenced from a business
continuity plan

A

Business Continuity Plan

520
Q

o Describes the approach to maintaining an asset from
creation to disposal

A

System Life Cycle Plan

521
Q

▪ A set of rules that restricts the ways in which a network resource may be
used and sets guidelines on how it should be used

A

Acceptable Use Policy (AUP)

522
Q

▪ Allows employees to access enterprise networks and systems using their
personal mobile devices
▪ Create a segmented network where the BYOD devices can connect to

A

Bring Your Own Device (BYOD) Policy

523
Q

▪ Non-binding agreement between two or more organizations to detail
what common actions they intend to take
▪ Often referred to as a letter of intent
▪ Usually used internally between two business units

A

Memorandum of Understanding (MOU)

524
Q

▪ Documents the quality, availability, and responsibilities agreed upon by a
service provider and a client

A

Service-Level Agreement (SLA)

525
Q

Time that it takes for data to reach its destination across a
network

A

Latency

526
Q

Maximum rate of data transfer across a given network

A

Bandwidth

527
Q

Actual measure of how much data is successfully
transferred from the source to a destination

A

Throughput

528
Q

When a time delay in the sending of data packets over a
network connection occurs

A

Jitter

529
Q

▪ An Ethernet frame that is less than 64 bytes in size

A

Runt

530
Q

▪ Any Ethernet frame that exceeds the 802.3 frame size of 1518 bytes

A

Giant

531
Q

FYI
● Network Troubleshooting Methodology
1. Identify the problem
2. Establish a theory to determine the cause
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify the whole system functionality and if applicable, implement preventive
measures
7. Document findings, actions, outcomes, and lesson learned
▪ Gather more details
▪ Identify symptoms
▪ Check for changes
▪ Duplicate problem

A

● Network Troubleshooting Methodology
1. Identify the problem
2. Establish a theory to determine the cause
3. Test the theory to determine the cause
4. Establish a plan of action to resolve the problem and identify potential effects
5. Implement the solution or escalate as necessary
6. Verify the whole system functionality and if applicable, implement preventive
measures
7. Document findings, actions, outcomes, and lesson learned
▪ Gather more details
▪ Identify symptoms
▪ Check for changes
▪ Duplicate problem

532
Q

FYI
How to implement the network troubleshooting methodology
o Approach multiple problems individually
▪ Top-to-bottom
▪ Bottom-to-top
▪ Divide and conquer
o If confirmed, determine next steps
o If unconfirmed, reestablish new theory or escalate

A

How to implement the network troubleshooting methodology
o Approach multiple problems individually
▪ Top-to-bottom
▪ Bottom-to-top
▪ Divide and conquer
o If confirmed, determine next steps
o If unconfirmed, reestablish new theory or escalate

533
Q

● Network Troubleshooting Methodology
step 1

A
  1. Identify the problem
534
Q

● Network Troubleshooting Methodology
step 2

A
  1. Establish a theory to determine the cause
535
Q

● Network Troubleshooting Methodology
step 3

A
  1. Test the theory to determine the cause
536
Q

● Network Troubleshooting Methodology
step 4

A
  1. Establish a plan of action to resolve the problem and identify potential effects
537
Q

● Network Troubleshooting Methodology
step 5

A
  1. Implement the solution or escalate as necessary
538
Q

● Network Troubleshooting Methodology
step 6

A
  1. Verify the whole system functionality and if applicable, implement preventive
    measures
539
Q

● Network Troubleshooting Methodology
step 7

A
  1. Document findings, actions, outcomes, and lesson learned
    ▪ Gather more details
    ▪ Identify symptoms
    ▪ Check for changes
    ▪ Duplicate problem
540
Q

Occurs when one or more of the conductors in the pair are
not connected to a pin at one or the other end

A

Open Pair

541
Q

Occurs when the conductors of a wire pair are connected
to each other at any location in the cable

A

Short Pair

542
Q

▪ Used with an existing cable to determine its Category or data throughput

A

Cable Certifier

543
Q

▪ Checks the voltage or the amperage or the resistance of a copper cable
▪ Used to verify if a cable is broken or not
▪ Used to check coaxial cables to ensure there is no cuts or breaks in the
middle of a patch cable, or test power sources or power cords

A

Multimeter

544
Q

▪ Locate breaks in a copper cable and provide an estimate of the severity
and the distance to the break

A

Time-domain Reflectometer (TDR)
● Optical Time-domain Reflectometer (OTDR)
o Used for fiber optic cables

545
Q

▪ A machine that is used to permanently join two fibers together

A

Fusion Splicer

546
Q

▪ Using light pressure while rubbing the end face of a fiber cable or
connector with a dry-cleaning cloth in one direction

A

Dry Cleaning

547
Q

▪ A transmitter and a receiver combined into a single device that converts a
network connection from one type to another
▪ They are designed to support a certain type of connection and a certain
cable type

A

Transceiver

548
Q

▪ Moistening a piece of lint-free cloth with a fiber optic cleaning solution
and wiping the end face of the cable or connector

A

Wet Cleaning

549
Q

▪ Estimated measure of the power level that a radio frequency client
device is receiving from a wireless access point or wireless router

A

Received Signal Strength Indication (RSSI)

550
Q

▪ Maximum power radiated from an ideal isotropic antenna, given its
antenna gain, and the transmitter power of the radio frequency system

A

Effective Equivalent Isotropic Radiated Power (EIRP)

551
Q

▪ Produces radio frequency waves extending outward in two directions

A

Dipole Antenna

552
Q

▪ A unidirectional antenna that sends the radio frequency waves in only
one direction

A

Yagi Antenna

553
Q

▪ Allows the radio waves to be transmitted in only one direction over a
longer distance than a Yagi antenna

A

Parabolic Grid Antenna
▪ Choose a parabolic or Yagi antenna for site-to-site connections
▪ For indoor use, you are more likely to use omnidirectional and
unidirectional antennas

554
Q

FYI
▪ How does a site survey work?
1. Wireless client sends a probe request to discover any 802.11
wireless networks in proximity to itself
2. Receiving access point checks to see if it can support the data rate
the client requested
3. Wireless client sends a low-level 802.11 authentication frame to
the access point to begin authentication
4. Access point receives authentication frame and responds with an
acknowledgement to continue the handshake
5. Wireless client chooses the access point it wants to associate with
and sends an association request
6. Access point processes the association request if the information
sent matches its capabilities
7. Client is fully connected and associated and can now conduct any
data transfer it needs and use the wireless network
▪ Basics steps
● Scan airwaves
● Find access points
● Request association
● Authenticate
● Contact DHCP server
▪ Clients should be located in high signal strength areas to speed up the
association process

A

▪ How does a site survey work?
1. Wireless client sends a probe request to discover any 802.11
wireless networks in proximity to itself
2. Receiving access point checks to see if it can support the data rate
the client requested
3. Wireless client sends a low-level 802.11 authentication frame to
the access point to begin authentication
4. Access point receives authentication frame and responds with an
acknowledgement to continue the handshake
5. Wireless client chooses the access point it wants to associate with
and sends an association request
6. Access point processes the association request if the information
sent matches its capabilities
7. Client is fully connected and associated and can now conduct any
data transfer it needs and use the wireless network
▪ Basics steps
● Scan airwaves
● Find access points
● Request association
● Authenticate
● Contact DHCP server
▪ Clients should be located in high signal strength areas to speed up the
association process

555
Q

▪ Ensures you have the proper coverage and helps prevent overlap
between wireless access point coverage zones and channels

A

Wireless Analyzer

556
Q

▪ Used to capture and analyze signals and data traffic over a
communication channel

A

Protocol Analyzer

557
Q

▪ Determines which ports are open on a network

A

Port Scanner

558
Q

▪ Gathers an active measurement of the maximum achievable bandwidth
on an IP-based network

A

iPerf

559
Q

FYI
Terminal Emulator
▪ Allows a host computer to access another computer through a commandline interface or a graphical one using either Telnet or SSH
▪ Always use SSH instead of Telnet
● Other terminal emulators:
o Cmder
o ZOC
o Mintty
● If you are working on a Linux client:
o GNOME
o Konsole
o xterm
● If you are working on an OS X client:
o iTerm2
o MacTerm
o Kitty

A

Terminal Emulator
▪ Allows a host computer to access another computer through a commandline interface or a graphical one using either Telnet or SSH
▪ Always use SSH instead of Telnet
● Other terminal emulators:
o Cmder
o ZOC
o Mintty
● If you are working on a Linux client:
o GNOME
o Konsole
o xterm
● If you are working on an OS X client:
o iTerm2
o MacTerm
o Kitty

560
Q

▪ Used to check IP connectivity between two devices, most often for
network troubleshooting
▪ Similar to Windows version, except it runs forever by default (like –t in
Windows)

A

Ping

561
Q

▪ Displays the path between your device (the source) and the destination
IP address, showing each route hop along the path

A

Traceroute/ Tracert

562
Q

▪ Displays all of the current TCP/IP network configuration values and
refreshes DHCP and DNS settings for a Windows client/server

A

IP Configuration (ipconfig)

563
Q

▪ Command line tool used in Unix, Linux, and OS X systems to display IP
address information

A

Interface Configuration (ifconfig)
▪ ifconfig is considered officially deprecated

564
Q

▪ Assigns an address to a network interface or configures network interface
parameters on a Unix, Linux, or OS X operating system

A

ip

565
Q

▪ Used to query the DNS to provide the mapping between domain names
and IP addresses or other DNS records

A

Name Server Lookup (nslookup)
▪ In Windows, use set q=mx to search for mail exchange records
▪ In Linux, use set type=mx to search for mail exchange records

566
Q

▪ Used to conduct queries against DNS nameservers and is only available
for Linux, Unix, and OS X systems by default

A

dig

567
Q

▪ Used to display the hostname portion of the full computer name for a
given system

A

hostname

568
Q

▪ Used to display and modify entries in the Address Resolution Protocol (or
ARP) cache on a system

A

Address Resolution Protocol (arp)
▪ An ARP entry in the cache will get deleted after 21,600 seconds (6 hours)
● arp -d

569
Q

▪ Used to view and manipulate the IP routing table in a Windows, Linux,
Unix, or OS X system

A

route

570
Q

▪ Route that takes effect when no other route is available for an IP
destination address

A

Default Route

571
Q

▪ Used to view the current connections and statistics for devices
communicating using the NetBIOS over TCP/IP protocol

A

nbtstat

572
Q

▪ Displays information for IP-based connections on a client including its
current sessions, its source and destination IPs, and port numbers

A

Network Statistics (netstat)

573
Q

▪ Provides a bidirectional interactive text-oriented communication facility
using a virtual terminal connection

A

telnet

574
Q

▪ Allows for the display of TCP/IP and other packets being transmitted or
received over a network to the client’s screen

A

tcpdump

575
Q

▪ Discovers hosts and services on a computer network by sending packets
and analyzing the responses

A

Network Mapper (nmap)

576
Q

▪ Displays statistics for the network interfaces on the device

A

show interface

577
Q

▪ Displays the current system configuration on the screen

A

show config

578
Q

▪ Displays the current state of the routing table on the device

A

show route