Network+ Fundamentals Flashcards

1
Q

GSM

A

Global System for Mobile Communications was a standard that used multiplexing for 2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CDMA

A

Code Division Multiple Access used a code instead of multiplexing for 2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Latency

A

PING. A delay between the request and the response (waiting time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jitter

A

measures the variability of the delay, it’s the time between frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SNMP

A

Simple Network Management Protocol is used to remotely monitor and manage network devices connected over an IP. SNMP v3 is currently the standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MIB

A

Management Information Base or a database of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OIDs

A

Object Identifiers are addresses used to uniquely identify managed devices and their statuses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MTTR / MTBF

A

They are both KPI key performance indicators usd to assess the reliability and maintenance effciency of systems and componets.

Mean time to restore or repair and the Mean time between failures

bonus (SLA) Service level agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM

A

Security Information and Event Management collects log and event data for organizations or auditing and security purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NMAP

A

A network mapper that finds and learns more about network devices, notably through port scanning. Example. It can identify what OS a device may be using without logging in or authenticating. It also provides additional scripts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Vulnerability Scanner

A

unlike penetration testing, this is minimally invasive. Good at finding unknown devices on a network. Test from outside and inside. Identify the lack of security controls like firewall or anti-virus.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Protocol analyzers

A

solve complex application issues frame by frame. It can capture data from your ethernet connection or a wireless network. View unknown traffic patterns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

FTPS

A

(Port 21, 990) File Transfer Protocol over SSL (FTP-SSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SFTP

A

FTP using SSH which provides file system functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SSH

A

(Port 22) Secure Shell which is more focused on secure remote access and command execution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSL

A

(Port 443) Secure Socket Layer makes sure that all data is encrypted from servers to web browsers. Similar to TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TFTP

A

Trivial File Transfer Protocol which is used for configuring VoIP phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

WPA

A

Wifi Protected Access it replaced WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TKIP

A

Temporal Key Integrity Protocol is an encryption algorithm to secure a wireless network. 64 bit integrity check and prevents replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RC4

A

stream cipher used with WPA

A stream cipher is a method of encryption where plaintext digits are combined with a pseudorandom cipher digit stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

WPA2

A

uses AES (Advanced Encryption Standard which replaced RC4 and uses CCMP which replaced TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

CCMP

A

It’s an encryption protocol used in wireless networking for security. It encrypts and authenticates.

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol uses AES for data confidentiality. Uses a 128-bit key and a 128-bit block size. Offers also authentication and access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EAP

A

Extensible Authentication Protocol which is an authentication framework. Many different ways to authenticate based on RFC standards. WPA and WPA2 use five EAP types as authentication mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

EAP-TLS

A

Extensible Authentication Protocol Transport Layer Security. TLS was originally used for web servers but is now being used for wireless authentication. It’s purpose is to authenticate network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

EAP-TTLS

A

EAP Tunneled TLS which supports other authentication protocols in a TLS tunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

PEAP

A

Protected EAP encapsulates EAP in a TLS tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

MAC Filtering

A

can be perform on a wired and wireless network. It’s a security measure used to control access to the network. Every NIC has a identifier (MAC address). Mac filtering involves setting up a list of allowed MAC addresses on a network device, such as a router or access point, to permit or deny network access to devices based on their MAC addy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Geofencing

A

is a location-based service in which an app or other software uses GPS, RFID, Wi-Fi, or cellular data to trigger a pre-programmed action when a mobile device or RFID tag enters or exits a virtual boundary set up around a geographical location, known as a geofence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Denial of service

A

criminals make a service from available to unavailable. This is why it’s import to PATCH. Sometimes not intended.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network DoS

A

a layer 2 loop without STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Bandwidth DoS

A

downloading multi-gigabyte Linux distributions over a DSL line would be a good example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DDoS

A

Distributed Denial of Service
- Launch an army of computers to bring down a service. Attacks on multiple fronts. Asymmetric threat. The attacker may have fewer resources than the victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

DDoS amplification

A

Turn your small attack into a big attack which is becoming increasingly common. Uses protocol with little (if any) authentication or checks like NTP, DNS, or ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ICMP

A

(Layer 3) Internet Control Message Protocol is used for sending error messages and operational information regarding the status of IP operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Logic Bomb

A

waits for a predefined event often left by someone with a grudge.

  • Time bomb: waiting for a date and time
  • User bomb: something a user does like waiting for a backup process to occur
  • Difficult to identify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Wardriving

A

Combine WiFi monitoring and a GPS which gives you a huge amount of intel in a short period of time. A lot of intel in a short amount of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Phishing

A

tricking individuals by revealing sensitive information by disguising malware as a real site or email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Spear Phishing

A

phishing with insider information which can result in making the phishing a lot more believable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Ransomware

A

Someone wants your money. They’ll take your computer in the meantime. Often may be fake ransomware. Meaning they don’t have your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Crypto-malware

A

your data is unavailable until you provide cash. The malware encrypts your data files and you must pay the bad guys to obtain the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

DNS Poisoning

A

(DNS spoofing or DNS cache poisoning) Modify the DNS server. You can do this by modifying the client host file.

DNS spoofing invokes the attacker intercepting and altering DNS queries to provide false responses. Goal is to redirect users to fraudulent websites that mimic legitimate ones to either phish or distribute malware.

DNS Cache Poisoning is a type of spoofing that targets the DNS servers themselves rather than individual users. Inserts a false address record into the DNS server’s cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

VLAN hopping

A

the act of hopping from one VLAN to another. You do this by using methods such as switch spoofing or double tagging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Switch spoofing

A

It’s a network attack where an attacker configures a device to mimic a switch’s behavior in order to manipulate or bypass network security.

some switches support automatic configuration which has no authentication required. In other words, you can pretend to be a switch. Send trunk negotiation. Admins should disable trunk negotiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Double tagging

A

craft a packet that includes two VLAN tags. The first native VLAN tag is removed by the first switch (per usual) and the second “fake” tag is now visible to the second switch. This is a one-way trip, but can be used as DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

FIM

A

File Integrity Monitoring is a security process and technology that involves continuously monitoring and validating the integrity of files and file systems to make sure they haven’t been violated by things like malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

SFC

A

System File Checker (Windows)

for Linux it’s tripwire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Flood guard

A

configure a maximum number of source MAC addresses on an interface. The switch monitors the number of unique MAC addresses. Once you exceed the maximum port security activates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

DHCP snooping

A

IP tracking on a layer 2 device (switch)
- the switch is a DHCP firewall
- switch watches for DHCP conversations
- Filters invalid I{ and DHCP information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

DMZ

A

demilitarized zone which is an additional layer of security between the internet and you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Cable crimpers

A

“pinch” the connector onto a wire and connect the modular connector to the Ethernet cable. Metal prongs are pushed through the insulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Crimping best-practices

A

get a good crimper
good pair of electrician’s scissors\cable snips
get a good wire stripper.
Make sure you are using the correct modular connectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Cable testers

A

helps you identify if the crimps are working. Doing a continuity test to see if everything is working properly. NOT used for frequency testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

TDR and OTDR

A

Time Domain Reflectometer / Optical Time Domain Reflectometer which both estimate cable lengths and identify splice locations and cable impedance. Use it commonly when first installing cable infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Tone generator

A

puts an analog sound on the wire. Inductive probe which means it doesn’t need to touch the copper and you can hear the tone through a small speaker

Helps with cable identification and tracing cable routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Loopback plugs

A

if you’re trying to perform troubling shooting on a network connection. It can perform some tests sending some signals to know what kind of signals it’s receiving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Spectrum analyzer

A

examine all the different frequencies and be able to tell where the frequencies are. If you connecting a WAP for the first time and want to know if there is any interference that is being caused in the area

WAP is a wireless application protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Multimeters

A

tools that allow you to test AC and DC voltage. Also continuity tests to see if you’re getting connections from one end of a cable to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

traceroute

A

helps you determine the route a packet takes to a destination. Uses ICMP TTL

Internet Control Message Protocol used for error reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

nslookup

A

lookup information from DNS servers, for Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

dig

A

Domain Information Groper lookup information from DNS servers more advanced than nslookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

ipconfig/ifconfig

A

Helps determine an IP address. commands for Windows and Linux respectively. MOST of my troubleshooting starts with my IP address. Determines TCP/IP and network adapter information with some additional IP details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

netstat

A

is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics.

Routing table is a data table stored in a network router or a host that lists the routes to particular network destinations.
IP address
Subnet mawk
Next Hop
Interface/Port
Metric (distance to reach destination)
Route source. (How a route was learned)

Network statistics
netstat -a
- show all active connections
netstat -b
- show binaries (Windows)
netstat -n
- do not resolve names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

iptables

A

in Linux helps you configure firewalls. Provides stateful firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

tcpdump

A

capture packets from the command line and apply filters, view in real-time. You can also save the date and use it in another application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

pathping

A

combine ping and traceroute. The first phase runs a traceroute. The second phase measures round trip time and packet loss at each hop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

route

A

shows where traffic is routed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Address Resolution Protocol

A

ARP determines a MAC address based on an IP address
arp -a
- view local ARP table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

POP3

A

(Port 110) Post Office Protocol -3 is used for receiving email from a mail server from a local email client. Enables users to access their emails offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What makes up an IP address

A

network ID, subnet mask, host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

10.0.0.0/8

A

according to RFC 1918, this address space is defined for large internet networks. These are private and non-Internet routable addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

orchestration software

A

deals with the automated deployment, scalability, configuration management, service discovery, load balancing, and health monitoring and recovery. Large part deals with the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

maximum theoretical speed of Dial-up with the V.92 specification

V.92 is a standard for modems that was introduced in 2000.

A

56kb/second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

wireless client density

A

important for designing WLAN infrastructure. It refers to the number of wireless devices connected to a particular wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

CSU/DSU

A

Channel Service Unit/Data Service Unit helps with connecting LANs to WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

domain’s zone file

A

it maps domain names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

MTRJ

A

Mechanical Transfer Registered Jack is a type of fiber optic connector which offers a compact design and a method for duplex connectivity. It resembles an RJ-45 connector and allows greater port density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

LDAPS

A

(TCP Port 636) Lightweight Directory Access Protocol uses SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

LDAP

A

(TCP Port 389) Lightweight Directory Access Protocol that can search a directory service for objects. Microsoft Active Directory (AD) is an example of a directory service that uses LDAP to locate objects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

static IP address

A

this is a fixed, unchanging IP address assigned to a computing device. It’s simple, reliable, and sometimes a requirement for certain applications. Especially for hosting servers, that way people can go on the website. GREAT for routers, printers, and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

1000BaseLX standard

A

Part of the IEEE 802.3z set of Gigabit Ethernet standards. It specifies a Gigabit Ethernet implementation using long-wavelength (LX) laser transmission over fiber optic cables. 1Gbps and can operate both single and multi-mode. It utilizes a 1300 nm laser over 9-micron single-mode fiber and can reach distances up to 10 kilometers.

LX (Long-wavelength) uses single-mode fiber and up to 550m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

NTP

A

(UDP Port 123) is used both for request and reply of NTP packets; a symmetrical port

Network Time Protocol

82
Q

RG-59 vs RG-6

A

RG-59 and RG-6 are both coaxial cables

RG-6 - has a larger conductor which supports higher frequency and bandwidth. Lower signal loss and are usually thicker than its counterpart.

83
Q

NAS

A

Network attached storage is a dedicated file storage device that provides multiple users and client devices with access to data over a network

84
Q

SMBs

A

Server Message Blocks is a protocol used by NAS to enable users on a network to access files, printers, and other shared resources. It’s good because it offers data protection and redundancy, scalability, and it’s cost effective. Responsible for performing commands against a file structure

NAS is network attach storage

85
Q

40GBaseT standard

A

40Gbps and a max distance of 30 meters. It was made through the IEEE 802.3bq task force

86
Q

DHCPv6

A

It can use of Stateless Address Autoconfiguration (SLAAC) for IP address assignment with DHCPv6 for the distribution of additional network configuration parameters. A router sends RA messages with specific flags to set to indicate how devices should obtain their IP addresses.

Stateful DHCPv6 assigns IPv6 addresses to devices and maintains a record (state) of each assignment, similar to DHCP in IPv4

Stateless does not assign IP addresses because it can generate their own from SLAAC

RA is Router Advertisement

87
Q

RA

A

Router Advertisement is a protocol used in IPv6 and part of the NDP. They are sent out by routers to advertise their presence

commands
M flag (managed address configuration) when the flag is set to 1 it shows that addresses are available

O flag (other configuration) When set to 1, this flag tells the hosts that other configuration information, excluding IPv6 addresses, is available via DHCPv6. This typically means that a device should use Stateless Address Autoconfiguration (SLAAC) for its address configuration and DHCPv6 for other settings, like DNS server addresses.

88
Q

H.323 protocol

A

Was among the first protocols established for VoIP and multimedia communications over IP.

89
Q

100BaseSX standard

A

Like 100BaseFX, 100BaseSX also uses fiber optic cables but is optimized for shorter distances.100 Mbps and supports up to 100m in length. 100BaseSX can be seen as a solution for organizations looking for a cost-effective, high-speed fiber optic LAN technology for relatively short distances.

90
Q

SIP

A

(Port 5060 UDP and TCP not encrypted and Port 5061 is TCP and encrypted)
Session Initiation Protocol is a signaling protocol used for initiating, maintaining, managing, and terminating real-time sessions that involve video, voice, messaging, and other communications applications and services between two or more participants over an internet protocol (IP) network.

91
Q

E3 connection

A

An E3 connection, part of the PDH (Plesiochronous Digital Hierarchy) system used primarily in Europe, provides a total bandwidth of 34.368 Mbps (megabits per second).

92
Q

1000BaseSX

A

1000BaseSX, a standard for Gigabit Ethernet over fiber-optic cabling, is designed for short-range communication over multimode fiber. When using 50-micron multimode fiber-optic cabling, which offers better performance than the older 62.5-micron multimode fiber, 1000BaseSX can achieve distances up to 550 meters.

93
Q

CNAME

A

It’s a type of resource record in the DNS. Canonical Name record helps with Alias Management: CNAME records are ideal for when you need to alias one domain name to another. It allows an FQDN to resolve to an A record

Allows for different names under one name for a website lookup.

94
Q

FQDN

A

Fully Qualified Domain Name is composed of a host name and a domain name. It includes all domain levels, from the top-level domain (TLD) to the specific subdomain or hostname, and it’s used to uniquely identify a specific server or service on the internet or a private network.

95
Q

A Record

A

It’s a DNS record, Address record which is used to map a domain named to an IPv4 address

Links a domain like ‘example.com’ to an address like ‘192.0.2.1’

96
Q

What is the function of a fiber-optic transceiver in the network equipment?

A

It converts between the internal electrical signaling and light.

97
Q

Forward zone

A

are used in DNS to map domain names to IP addresses. This is the most common use of DNS, allowing users to access websites and other resources on the internet by using human-readable names instead of numerical IP addresses.

It’s a file or data base entry that contains mappings from domain mail to IP addresses

A forward zone HAS an A record inside. A forward zone contains records of FQDNs. CNAMEs are also in a forward zone.

98
Q

Reverse zone

A

are used to map IP addresses back to domain names. This process is known as reverse DNS lookup or reverse resolution and is the opposite of the forward lookup process.

99
Q

host files

A

originally used for translation of hosts to IP addresses. When going on a website, a computer will first check its host files to see if there is a proper ip address for the domain listed if not then it will then look to an outside DNS

100
Q

CNA

A

Converged Network Adapter allows servers to communicate over Ethernet networks while providing support for Fiber Channel storage protocols, essentially bridging the gap between traditional Fiber Channel (FC) storage networks and Ethernet-based local area networks (LANs). It acts as an Ethernet card and encapsulates FC commands into Ethernet frames.

101
Q

Secondary DNS Server

A

its use is to act as a backup for the primary DNS Server.

102
Q

FQDN dot

A

at the end of a domain if you put a period (.) at the very end it signals that you want this exact domain and to not look elsewhere

103
Q

pull method

A

is a model where individual client machines or servers fetch (or updates, configurations, and instructions from a central repository or management server at regular intervals or based on certain conditions. Primarily ushes a push method

104
Q

Ansible

A

It was created as a replacement for Chef and Puppet and allows for a hybrid approach to orchestration.

105
Q

DSLAM

A

its primary function is to connect multiple customer DSL connections to a high-speed backbone network. The DSL Access Multiplexer (DSLAM) is a piece of equipment located at the central office, or telephone provider’s main location. It is an integral part of the DSL network and faciliates communication between the central office and the modem at the customer’s location.

106
Q

DHCP order for a handshake

A

DORA Discover, Offer, Request, Acknowledge

107
Q

Punchdown blocks

A

are a type of electrical connection used in telecommunication and network wiring. They are almost always used with analog or digital time division multiplexing (TDM) phone installations.

108
Q

SOA

A

Start of authority indicates the start of a zone of authority and provides essential details about the zone. The Start of Authority (SOA) record in a DNS zone is primarily responsible for keeping records up-to-date on the secondary servers. It includes a serial number and a refresh parameter, which tells the secondary DNS servers how often to request a refresh of the SOA records.

109
Q

APNIC

A

Asia Pacific Network Information Center manages public IPv4 addresses

110
Q

colocation

A

Colocation (or “colo”) is a data center facility service where businesses can rent space for servers and other computing hardware

111
Q

SDSL

A

Symmetrical Digital Subscriber Line uses DSL technology over existing copper lines. SDLS and T1 leased lines deliver the same speed.

112
Q

DOCSIS

A

Data Over Cable Service Interface Specification is a telecommunications standard that allows for the addition of high-speed data transfer to an existing cable TV (CATV) system.

113
Q

SQLnet

A

also known as Oracle Net enables communication between Oracle databases for exchanging information for queries.

114
Q

ISDN

A

It’s a telecommunication technology that enables the digital transmission of voice, video, data, etc.. over the PSTN public switch telephone network

Integrated Services Digital Network is typically implemented in two modes, Basic Rate Interface (BRI) and Primary Rate Interface (PRI)

115
Q

F-connector

A

primarily used for cable TV and cable modem connections.

116
Q

Spine-Leaf network

A

framework for database networks for high speed and low latency.

Spine Switch: layer consists of high-capacity switches arranged in a mesh or Clos topology. These spine switches form the core of the network and serve as the backbone for connecting all the leaf switches.

Leaf Switch: consists of access switches that connect directly to servers, storage devices, and other network endpoints. Each leaf switch is typically connected to every spine switch, forming a full mesh topology between the leaf and spine layers.

117
Q

Unicast

A

is a one-to-one conversations between two devices in a network, where the destination MAC address at the Data Link layer is a specific MAC address on the network.

118
Q

PAT

A

Port Address Translation is to allow multiple devices within a private network to share a single public IP address for outgoing internet connections. PAT is a type of Network Address Translation (NAT) technique commonly used in IPv4 networks.

119
Q

vNIC

A

Virtual network interface card is a software that behaves or pretends to be a physical hardware. It enables direct communication between the VM and the virtual switch.

120
Q

iSCSI

A

(Internet Small Computer System Interface) can range from 1Gbps to 40Gbps. It is a protocol used for transporting SCSI commands over TCP/IP networks.

121
Q

WWN

A

Fiber Channel Worldwide Names are likened to MAC address.

World Wide Name is a unique identifier used in storage networking.

122
Q

10GBaseT

A

IEEE 802.3an, Ethernet speed for 10Gbps, uses TIA/EIA Category 6 or higher cable. Has a maximum distance of 55m is Cat 6

Cat6a is 100 meters

123
Q

DHCP Reservation

A

The client’s MAC address is tied to a specific IP address. When a DHCP reservation is made for a client on a DHCP server, the client’s MAC address is linked to a specific IP address, ensuring that the client always obtains the same IP address when the DHCP Discovery packet is received by the server.

124
Q

SMTP

A

Simple Mail Transfer Protocol is invoked in sending and relaying emails, downloading them from the server to client. It operates in the process of delivering the email and not in client access on the email server.

Relay means where an email server forwards an email from one domain to another on behalf of a sender.
POP3 receives emails

125
Q

10BaseT

A

defined by the IEEE as 802.3i and uses cat 3,4 or 5

10Mbps

126
Q

1000BaseT

A

has a maximum distance of 100 meters.

127
Q
A
128
Q

InfiniBand

A

high speed networking technology used in data centers. InfiniBand is primarily used for high-performance computing (HPC) and cluster connections. Very few companies produce the high-end switching equipment needed for InfiniBand.

129
Q

Fibre Channel

A

high speed networking technology used in data centers. Fibre Channel is traditionally used for connecting servers to shared storage devices and for storage area networks (SANs)

130
Q

Cat 7 and Cat7a

A

both can go up to speeds at 10Gbps. However, Cat 7a is tested at a higher frequency of 1000MHz

131
Q

three-tiered networking model

A

Access Layer, Distribution Layer, and the Core Layer.

132
Q

Router Solicitation

A

RS requests operate on IPv6 networks. Its procedure is to solicit a Router Advertisement (RA) from the network routers.

It’s part of the Neighbor Discovery Protocol (NDP)

133
Q

Class D

A

Class D network IDs are specialized IP addresses for multicasting, as defined by the IETF and RFC5735. They are not used for individual network.

Multicasting is when data is sent to multiple destinations in a single transmission.

134
Q

BIX punch block panel

A

Building Industry cross connect predominantly found in Nortel phone switch installations. The wires from the Nortel switch are punched on the back of the BIX punch block panel, and the front is used for cross-connecting a 110 or 66 block that leads to the phone extension.

135
Q

What is the main difference between the Three-tiered networking model and the Collapsed-core model?

A

Three-tiered model is more complex but allows for greater scalability and is better suited for large, distributed networks.

Collapsed-core model is simplifying the network structure which can be advantageous for smaller networks.
Collapsed core has an Access Layer and a collapsed core/distribution layer

136
Q

Anycast address

A

are used for a one-to-nearest connectivity. The address is a standard global unicast address, but it is populated in multiple routing tables. This means that a network packet sent to an anycast address will be delivered to the closest interface (usually determined by the routing protocol metrics).

137
Q

FTP active and passive mode

A

The active and passive modes in FTP mainly differ in who initiates the transfer. In active mode, the server initiates the transfer by sending information from TCP port 20 on the server to the client.

In passive mode, to address firewall and NAT network issues, the client initiates the transfer from a port above TCP 1023 and sends it to a waiting port on the server above TCP 1023. The client initiating the transmission to the server is what firewalled and NAT networks expect as a dataflow.

138
Q

classless IP subnetting

A

The text states that the classless IP address category allows for subnetting and supernetting and does not adhere to the classful assignment of the IETF due to the scarcity of IPv4 addresses.

139
Q

BNC

A

Bayonet-Neilll-Concelman OR British Naval Connector is a type of RF (radio frequency) connector used for coaxial cable for networks and security camera systems.
- Uses 10Base2 LAN

140
Q

TFTP

A

provides no security and is simplistic in operation. It is often used to both boot computers over the network via the Preboot Execution Environment (PXE) and transfer software images for network devices during updates. Network devices also use TFTP to back up and restore configurations.

141
Q

Northbound Interface and SDN

A

NBI in a software-defined network connects the application layer to the control layer, specifically allowing applications and APIs access to monitor and manage the network devices that are under (or south of) the controller. It facilitates the interaction between applications/APIs and the control layer

142
Q

Virtual firewall kernel module

A

is a software module that integrates directly into the kernel of an operating system. It operates at a low level. intercepting and filtering network traffic as it enters or leaves the host system or traverses between VMs on the same host. NOTE this module applies policies to all hosts in the cluster. When a kernel module is used, the traffic never leaves the host, unlike in the case of a virtual firewall appliance.

143
Q

Virtual firewall appliance

A

this is a complete firewall solution packaged as a virtual machine. This includes both the firewall software and the underlying operating system all encapsulated within a VM container.

144
Q

What is the main function of a Channel Service Unit/Data Service Unit (CSU/DSU) in a T1 service?

A

The Channel Service Unit/Data Service Unit (CSU/DSU) is primarily used to convert the channels back into a stream of data. It takes the data from each of the 24 channels or ’buckets’ and combines it into a consistent, usable data stream.

145
Q

QoS

A

quality of service is a networking concept and set of technologies used to manage network traffic. Some key functions include traffic prioritization, bandwidth management, congestion management, and traffic shaping.

146
Q

Power over Ethernet

A

this is a technology that allows electrical power to be passed along with data over standard twisted-pair Ethernet cabling (such as Cat5e, Cat6, etc.) in a network. This enables a single cable to provide both data connection and electrical power to devices, simplifying the cabling and eliminating the need for separate power sources for each device.

147
Q

demarcation point

A

the physical point at which the public network of a telecommunications service provider ends and the private network of a subscriber begins

148
Q

NIC

A

Network Interphase Card is a hardware component that connects a computer or other devices to a network. It serves as the interface between the device and the network. There are wire and wireless NICS. It’s purpose to provide network connectivity to a device, converting digital data into signals.

Every NIC has an assigned MAC address

149
Q

Access Layer

A

Role: The access layer is where devices (such as computers, printers, and other end-user devices) connect to the network. It provides a point of access to the network for these devices and can include features like port security, VLAN segmentation, and power over Ethernet (PoE) for devices that require it.
Functionality: This layer is responsible for controlling which devices are allowed to communicate on the network, managing how devices connect to the network, and implementing policies for network access. Switches at the access layer often provide connectivity to end devices in an office or building.

150
Q

Distribution Layer

A

2nd part of the three-tiered networking model.

Role: The distribution layer serves as the intermediary between the access layer and the core layer. It aggregates the data received from multiple access switches before it is transmitted to the core layer for routing to its final destination. It’s also where routing, filtering, and WAN access occur.

Functionality: Key functions include routing, filtering, and implementing policies. The distribution layer can enforce quality of service (QoS) policies, execute access control lists (ACLs), and handle VLAN routing. It acts as a control boundary between the access layer and the core, providing connectivity to services for access layer devices and managing traffic flows.

151
Q

Core Layer

A

part 3 of the three-tiered networking model.

Role: The core layer is the backbone of the network, providing high-speed, reliable transportation of data across various parts of the network. In large networks, the core layer connects multiple buildings or sites.
Functionality: The primary functions of the core layer include ensuring efficient and fast data transport across the network and interconnecting the various parts of the network infrastructure. The core is designed for high reliability, availability, and redundancy to minimize downtime and provide fast data transmission.

152
Q

GIADDR

A

Gateway Interface Address is part of the DHCP message structure. This field is used by DHCP Relay Agents when forwarding requests from DHCP clients to DHCP servers that are not on the same local network (subnet) as the clients.

153
Q

IMAP

A

(Port 143, or Port 993 if used forever SSL/TLS Internet Message Access Protocol allows for multiple email clients to access the same email box simultaneously.

154
Q

VPN disadvantages

A

this method does not guarantee a certain level of quality of service end to end. Therefore, applications that are sensitive to latency might run poorly over a VPN.

155
Q

WiMAX

A

Worldwide Interoperability for Microwave Access is a wireless communication standard designed to provide high-speed broadband access over long distances. It is specified in the IEEE standard 802.16 to operate on 2 GHz to 11 GHz and another range from 10 GHz to 66 GHz.

156
Q

SDN

A

It’s an approach to networking that allows network admins to manage network services by separating the network’s control logic or the control plane from the underlying routers and switches that forward network traffic.

Software-Defined Networking is a concept to networking that uses software-based controllers or application programming interfaces (APIS) to direct traffic on the network and communicate with the underlying hardware infrastructure. Doesn’t use routers and switches, SDN decouples the network control plane from the data plane, allowing for more flexible network management and configuration.

157
Q

SBI

A

Southbound Interface is used for communication between the SDN Controller and the network devices (such as switches and routers). Here the SDN Controller can program the data plane to modify how traffic flows through the network.

Data plane is the part of the network that actually forwards the traffic

158
Q

NBI

A

Northbound Interface in SDN is used for communication between the SDN Controller and the application and business logic layers that sit above the controller. NBI enables the development of network-aware applications, allowing for more dynamic and automated network configurations and services.

159
Q

NTP Stratums

A

Network Time Protocol

Stratum 1: servers are directly connected to an authoritative time source and serve as primary time servers.
Stratum 2: servers receive their time from stratum 1 servers, acting as intermediaries that help scale the distribution of accurate time.
Stratum 16: is used to indicate that a server is unsynchronized and should not be used for time synchronization within the network.

160
Q

What are the three basic forms of communication a network application can use at the Session Layer?

A

In Half-duplex comm, both devices can send and receive information but not simultaneously.

Simplex is a one-way or unidirectional flow of information. A Keyboard connected to a computer.

Full-duplex communication allows both divides to send and receive information simultaneously. There’s no need to switch modes, and connection flows freely in both directions.

161
Q

NIST

A

National Institution of Standards and Technology promotes U.S. innovation and industrial competitiveness. Leading standards in technology

162
Q

What does the ’Measured Service’ characteristic of cloud computing as defined by NIST entail?

A

It involves the monitoring, reporting, and control of resource usage, often serving as a basis for charges.

162
Q

HBA

A

A Host Bus Adapter is a hardware device, typically in the form of an expansion card, that allows a computer (the host) to connect to various networking and storage systems.

163
Q

link-local addresses

A

these are addresses that are used for local access on a network are unrouteable

164
Q

H.323 Protocol

A

The H.323 protocol functionalities as outlined in the text include terminal control (provides endpoint signaling such as the VoIP phone), gateway services (provide transcoding functionality as well as communications with circuit-switched and packet-switched networks), gatekeeper services (provide admission control, bandwidth control, and management of endpoints known as zone management) and multipoint control unit (provides conference call capabilities and call control of data, voice, and video for future in-call conferencing).

165
Q

APC and UPC

A

Angled Physical Contact and Ultra Physical Contact are both types of fiber optic connector polishes, commonly used to finish the faces of fiber optic connectors.

UPC cable ends are polished in a domed shape to focus light directly into the center of the fiber core.

APC connectors have an 8-degree angled polish which prevents light that reflects from the far end face from traveling back up the fiber.

166
Q

Dynamic NAT vs Static NAT

A

Dynamic Network Address Translation and Static are both methods used to translate private IP addresses into public IP addresses and vice versa.

Static: One-to-One Mapping, Consistent, and resource intensive

Dynamic NAT uses a pool of public address for translations. Private IP addresses are translated to an available public IP address from the pool when they need to access the internet.

167
Q

POP3

A

(Port 110) Post Office Protocol allows email clients to log in and retrieve email and listens for request with TCP

If used over an SSL/TLS connection it’s port 995

168
Q

PTR

A

Pointer Record is a type of DNS record that provides the reverse mapping of an IP addresses to a domain name. They associate an IP address with a canonical hostname (CNAME). This process is known as reverse DNS lookup.

169
Q

ARIN

A

American Registry for Internet Numbers is a nonprofit organization responsible for managing the allocation and registration of Internet number resources within North America and parts of the Caribbean and Atlantic Ocean regions.

170
Q

Authentication Header

A

offers connectionless integrity and data origin authentication for IP packets. AH authenticates the entire packet, not just the ESP data and ESP tail.

Features include Anti-Replay Protection, IP Header Protection, Compatibility with NAT, and Operational Modes.

171
Q

EVC

A

Ethernet Virtual Connections services multiplexing, granular bandwidth allocation, traffic segmentation and isolation, QoS, interoperability and Standarization. USES LAYER 2

172
Q

crossover cables

A

type of Ethernet cable used to connect two similar devices directly to each other without the need for a hub, switch, or router in between. switches to switches, routers to routers, computer to computers, and etc.

173
Q

Puppet

A

A configuration management tool that allows system admins and IT pros to automate the provisioning, configuration, and management of a computer system and software infrastructure.

uses XML-RPC protocol over HTTPS to periodically poll the master server.

174
Q

DHCP options

A

are parameters that a DHCP server can provide to DHCP clients in addition to the basic information of IP addresses assignment. The router option in DHCP options is considered the most important because it configures a default gateway IP address on the client computer.

175
Q

VDSL

A

Very-high-bit-rate Digital Subscriber Line, is a telecommunications technology that provides high speed internet access over copper telephone lines. It can supply asymmetrical speeds of 300Mbps download and 100Mbps upload.

176
Q

Rapid Elasticity

A

defined by the National Institute of Standards and Technology (NIST) computer capabilities can be provisioned and released based on the customer’s requirements

177
Q

Toredo tunneling

A

is used when an IPv6 host is behind a network address translation, The IPv6 packets are sent as UDP/3544 IPv4 packets to a Toredo server that is connected to the IPv6 network. A Toredo relay is a router that interacts with a Toredo server to facilitate IPv4 clients to IPv6 hosts.

178
Q

ICMP in IPv6

A

In IPv6, ICMP plays a larger role than in IPv4. It is responsible for the Neighbor Discovery Protocol (NDP), equivalent to the Address Resolution Protocol (ARP) in IPv4.

179
Q

QSFP+

A

The quad small form-factor pluggable+ (QSFP+) transceiver allows for 4×10 Gbps and 4×25 Gbps operation. To fully utilize its quad transceiver, the operation rate would be 40 Gbps and 100 Gbps respectively.

180
Q

SBI

A

The Southbound Interface (SBI) in an SDN setup is primarily responsible for communication between the network controller and network hardware devices. It is used to program those devices and ensure they adhere to policies across the network.

181
Q

NFV

A

Network Functions Virtualization is a network architecture concept that virtualizes entire classes of network node functions into building blocks that can be linked together to create communication services.

While physical device failures are no longer a concern, the reliability and performance of the host that runs the virtual network functions becomes a critical concern.

182
Q

VIP

A

Virtual IP is an IP addrewss that does not correspond to a NIC on a single machine. It abstracts many devices and puts them under 1 IP address.

Which two protocols are used for creating highly available default gateways using a Virtual IP (VIP) and virtual MAC address?
Virtual Router Redundancy Protocol (VRRP) and Hot Standby Router Protocol (HSRP)

183
Q

IANA

A

Internet Assigned Numbers Authority (IANA) assigns public IP addresses to private companies, government entities, and RIRs. Regional Internet Registries

184
Q

GRE

A

Generic Router Encapsulation is a tunneling protocol developed by Cisco that encapsulates a wide variety of network layer protocols inside virtual point-to-point links over an Inernet Protocol (IP) network. It allows a routing protocol such as Open Shortest Path First (OSPF) to work between the two offices.

185
Q

EUI-64

A

Extended Unique Indetifier-64 is a method used to create a unique 64-bit interface identifier from the 48-bit MAC address of a network interface.

It pads and inserts the host’s MAC address into the interface ID

186
Q

FTP active and passive move

A

In FTP’s active mode, when a server needs to transfer a file or information to the client, the information comes from TCP port 20 on the server and is sent to a destination port above TCP 1023 directed to the client. This is communicated through the control channel.

Active mode requires the server to connect back to the client for the data connection, which can be problematic across firewalls and NAT.

Passive mode is designed to alleviate the difficulties encounter with firewalls and NAT, with the client initiating both command and data connections.

187
Q

MX records

A

MX records assist a mail server in identifying the mail server for your domain. You must publish an MX record for your mail server if you want to receive mail from other mail servers.

188
Q

SFP and SFP+

A

SFP+ transceivers are similar to SFP transceivers, but they can support speeds of 10 Gbps or higher, up to 400 Gbps

189
Q

What is the purpose of a 110 block in the context of analog wiring of telephone equipment?

A

The 110 block is used in analog wiring of telephone equipment where it facilitates a cross-connect, leading the connection from one side back to the private branch exchange (PBX) and from the other side to the phone equipment. This is a common setup in on-premises or in-house wiring.

190
Q

SMB

A

Server Message Block allows for providing shared access to files, printers, and serial ports among nodes on a network. It can run on wireless networks as well as wired ones.

191
Q

Cat 8

A

It is an STP cable that can transmit at 25 Gbps or 40 Gbps and has a maximum distance of 30 meters.

192
Q

What is the range of IP addresses set aside for multicast addressing?

A

224.0.0.0 to 239.255.255.255

193
Q

Anycast IP address

A

Anycast IP address enables multiservice routing. When a request comes in, it would be directed to the nearest server, enabling sharing and efficient use of resources.

194
Q

What is the role of the priority in MX records within a domain’s zone file?

A

In the context of MX records, the priority value isn’t about the importance or sequence of messages. It helps the sending server choose the host to send mail to within a domain, with the lowest priority chosen first.

195
Q

What is the typical upload speed of the Asymmetrical Digital Subscriber Line (ADSL)?

A

0.5 Mbps

196
Q

What is the maximum number of separate channels that can be multiplexed together using Coarse Wavelength Division Multiplexing (CWDM)?

A

18 channels

197
Q

What are the two purposes served by fiber distribution panels in a network?

A

fiber distribution panels help terminate the individual fragile strands to a common fiber-optic connector and also distribute the individual strands.

198
Q

SFTP

A

SFTP is used with the SSH protocol, and the command used on many of the systems is scp, which stands for Secure Copy Protocol.

199
Q

Infrastructure layer

A

The Infrastructure Layer for a SDN model is where the network hardware such as routers, switches, VPNs or other devices are located, and is directly responsible for data management.

200
Q

SLACC

A

In Stateless Address Autoconfiguration, it sends a Router Solicitation (RS) to the multicast address of all routers from the link-local address.

201
Q

Resource Pooling

A

According to the NIST, Resource Pooling in cloud computing refers to the practice of time-sharing a pool of computing resources over several virtual instances. Depending on the type of cloud (public or private), the resource pools can be allotted to different customers or within a single organization.