Network + Flashcards

(61 cards)

1
Q

Application Layer

A

dns, dhcp, ftp, https, ldap, ntp, pop3, ssh, sip, smtp, telnet, tftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Presentation Layer

A

jpeg, midi, mpeg, tls, ssl

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Session Layer

A

H323, netbios, zip, l2tp, l2f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer

A

tcp, udp, firewalls, loadbalancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Layer

A

icmp, igmp, IPsec, IPv4, IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Link Layer

A

ARP, ATM, FDDI, Frame Relay, PPP, Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Physical

A

Ethernet, dsl, isdn, wifi, 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Circuit Switching

A

T1/E1/E3,T3, ISDN, POTS, PTSN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T1 Info

A

T1- 24 DSP 1.544 Mbps
More than one frame is sent at once with super frame and extended super frame
E1- 30 channels compared to 24 in T1 2.048 Mbps
T3- 672 DSP 44.7 Mbps
E3- 34.4 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Point to Point

A
Point to Point Protocol- Layer 2 used
with dedicated leased lines such as T1,
E1, T3 and E3; uses control protocols
and offers multi link interface (multiple
physical connections bonded together)
error detection, authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PAP, CHAP, MSChap

A

Used in PPP Point to Point Protocol- Layer 2; used
with dedicated leased lines such as T1,
E1, T3 and E3; uses control protocols
and offers multi link interface (multiple
physical connections bonded together)
error detection, authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Packet Switching

A

SONET, ATM, DSL, FRAME RELAY, MPLS, CABLE MODEM, SATELLITE, WIRELESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MPLS

A

MPLS is used in provider networks, where forwarding decisions are made based on an MPLS label 32bit header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ATM

A

53 byte cells

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Sonet Data rates

A

OC1 51.84

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 445

A

SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port 1720

A

H323

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 139

A

Netbios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

IEEE Standards

A

IEEE 802.3ad link aggregation enables you to group Ethernet interfaces at the physical layer to form a single link layer interface, also known as a link aggregation group (LAG) or bundle.

IEEE 802.1Q is the networking standard that supports virtual LANs (VLANs) on an Ethernet network.

  1. 1D is the IEEE MAC Bridges standard, which includes Bridging, Spanning Tree and others.
  2. 3af is the standard that defines Power over Ethernet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FF00::/8

A

multicast range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

2000::/3

A

global range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FC00::/7

A

unique local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

FE80::/10

A

APIPA addressing; link local

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

568 B

A

OW O; GW B; BW G; BW B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Syslog Severity
Even Awesome Cisco Engineers Will Need Ice Cream Daily Emergency- most severe Alert- immediate attention Critical- less severe but needs addressing to prevent interruption of service Errors-conditions that do not make system unusable Warnings- notification operations failed to complete Notifications- state changes Information- info about normal operation of system Debug- troubleshooting
26
IP Sec Phase 1
Phase 1 - A bidirectional ISAKMP SA is established between peers to provide a secure management channel (IKE in main or agressive mode) Phase 2 - Two unidirectional IPsec SAS are established for data transfer using separate keys (IKE quick mode)
27
2 IPSec modes
2 IP sec modes- transport and tunnel; transport used for client to site or local; IP header not authenticated tunnel site to site- entire packet is encrypted Authentication Headers (AH) provides connectionless data authentication for IP datagrams and provides protection against replay attacks Encapsulating Security Payloads (ESP) provides confidentiality, connectionless data integrity, data-origin authentication, an anti-replay service (a form of partial sequence integrity), and limited traffic-flow confidentiality. It encrypts. Internet Security Association and Key Management Protocol (ISAKMP) provides a framework for authentication and key exchange,
28
Main Mode vs Quick Mode
Make sure you know that Main mode uses a three-stage negation process stage one is the negotiation of the security suites to be used, stage two is referred to as the Diffie-Hellman key exchange stage three is the authentication stage between the clients using the chosen authentication method. An important fact to remember is that the strength of the Main mode connection will then dictate the strength of the quick mode negotiations within it once the connection is established. Aggressive- achieves results of main using only 3 packets The Quick mode phase of the connection is used to conduct the actual transfer of data, creating a separate security association (SA) from within the Main mode connection.
29
AH vs ESP header
AH - authentication only; ESP- data confidentiality and authentication
30
Layer 3 redundancy
HSRP- cisco; active and standby GLBP- gateway load balancing protocol- cisco VRRP= Virtual Router Redundancy Protocol-open standard of HSRP LACP- multiple links between devices; appear as a logical link Content engine- caching functions Content Switches- load balancers
31
Admin distance
``` Stat- 1 EIGRP-90 OSPF-110 RIP-120 EXTERNAL EIGRP- 170 ```
32
Three 5.0 Ghz standards in wireless
802.11 a and 802.11n and 802.11 ac
33
Four 2.4 Ghz standards in wireless
802.11, 802.11b, 802.11g, 802.11n
34
Only DSSS transmission standards in wireless
802.11 B and 802.11 G
35
70 m indoors wireless
802.11 ac and 802.11n
36
Bandwidth of 54 mbps
802.11 a, 802.11g
37
Bandwidth of 11 mbps wireless
802.11b
38
Bandwidth of >300 mbps
802.11n
39
Bandwidth of >3 Gps with MU-MIMO
802.11ac
40
10 base T media and bandwidth
Cat 3, 10 Mbps
41
100 base TX media and bandwidth
Cat 5 or higher, 100 mbps
42
1000 base TX media and bandwidth
Cat 6 or higher 1 gbps
43
1000 base SX media and bandwidth and distance
MMF, 220M, 1 gbps
44
1000 base LX media and bandwidth and distance
MMF- 550; SMF- 5km, 1 gbps
45
1000 base ZX media and bandwidth and distance
SMF, 70 km
46
Certificate based mutual authentication of client and the network; relies on client side and server side certificates to provide authentication; certificates must be managed on both client and server (drawback). purely on PKI certificates. This means that each supplicant must have its own certificate installed.
eap - tls
47
extension of esp-tls that provides for certificate based mutual authentication through an encrypted tunnel. only requires server side certificates; The peer can use other authentication methods such as Challenge-Handshake Authentication Protocol (CHAP), Password Authentication Protocol (PAP), and Microsoft CHAP (MS-CHAP) v2. This type can encapsulate non EAP authentications E.g. PPP & CHAP. It also doesn't require every supplicant to have its own certificate installed.
eap-ttls
48
Flexible Authentication via Secure Tunneling Designed by Cisco to replace LEAP Three parts In band provisioning via Diffie-Hellman. The client is provided with a shared secret. Tunnel establishment. A tunnel is established between the server and the client. EAP-FAST authenticates by means of a PAC (Protected Access Credential) which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically.
eap-fast
49
Protected Extensible Authentication Protocol Originally, EAP assumed that communications would be secure; therefore, it did not provide a mechanism to secure the data being transmitted. This protocol corrects this by providing a secure TLS tunnel A server-side certificate is used to create a PKI tunnel
PEAP
50
the maximum amount of time a client is forced to renew dhcp address from existing dhcp server
7/8 or 87.5
51
period of time a client can claim an IP address provided by dhcp
lease period
52
address that replaces the broadcast ipv4 and allows for machines to contact all machines with a specific service to offer such as a router or dns server
anycast address
53
protocol that handles the built-in security that ipv6 incorporates to encrypt packet data
ipsec
54
address assigned manually to ensure that an address stays on a private network and is not routed
unique local
55
similar to APIPA; address that is unicast that computer gives itself
link local
56
single address on a single interface forming a direct line of communication
unicast address
57
routable address used to setup a host to host link on public internet
global unicast
58
address used to receive data intended for many destinations simultaneously
multicast address
59
periodic message sent to a network providing info about the network address and other network paramaters
router advertisement
60
learning data link layer addresses for ipv6 machines located in the same physical or broadcast domain
neighbor discovery
61
host generated message to force an IPv6 gateway device to advertise its network capabilities
router solicitation