allows you to view and modify the layer 2 to layer 3 address bindings?
That’s the ARP cache (Address Resolution Protocol cache).
ARP cache:
Stores Layer 3 (IP address) to Layer 2 (MAC address) mappings.
You can view and modify it with commands like arp -a (view) or arp -d (delete) on most systems.
Which of the following types of hosting would an organization use if they wanted to maintain their own datacenter in their worldwide headquarters? On-premise Branch office Collocation
On-premise
This means the organization owns and operates its own datacenter at its headquarters.
Branch office: A remote site, not the headquarters.
Collocation: Renting space in a third-party datacenter.
Traffic directions
Northbound: Traffic leaving the datacenter (out to WAN/Internet).
Southbound: Traffic entering the datacenter from external sources.
East-West: Traffic inside the datacenter between internal systems (server-to-server).
It provides a single point of access for clients to a service offered by multiple servers.
Virtual IP (VIP)
In the context of dynamic routing, what is the primary function of the Border Gateway Protocol (BGP)?
To exchange routing information between autonomous systems on the Internet.
(MTTR)
The mean time to repair measures the average time it takes to repair a network device when it breaks.
(MTBF)
The mean time between failures measures the average time between when failures occur on a device.
(RTO)
The recovery time objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
(RPO)
The recovery point objective (RPO) is the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or tolerance.
Runts
Frames smaller than 64 bytes, usually due to collisions or transmission errors, indicating issues with the transmission medium or NIC.
CRC Errors
Occur when the cyclic redundancy check fails, signaling data corruption during transmission.
Giants
Frames larger than 1518 bytes, often caused by network congestion or misconfiguration.
Drops
Frames discarded by a switch due to lack of buffer space, typically caused by congestion or port misconfiguration.
Evil Twin
A rogue wireless access point that mimics a legitimate one to trick users into connecting, enabling data interception.
IP Spoofing
An attack where a packet is sent with a forged source IP address to disguise the sender or impersonate another device at Layer 3.
MAC Spoofing
Faking a device’s MAC address, such as the gateway’s, which can disrupt communication for all devices on the subnet.
ARP Spoofing
Sending fake ARP messages to associate the attacker’s MAC address with a valid IP, enabling on-path attacks like interception or redirection.
Layer at which Data is transmitted.
Layers 5–7 (Application, Presentation, Session)
Layer at which Data is encapsulated into segments.
Layer 4 (Transport)
Layer at which Segments are encapsulated into packets.
Layer 3 (Network)
Layer at which Packets are encapsulated into frames.
Layer 2 (Data Link)
Layer at which Frames are converted into bits for transmission.
Layer 1 (Physical)
Part of the 802.1d standard; prevents Layer 2 switching loops.
Spanning Tree Protocol (STP)
Standard for defining VLANs on Ethernet networks.
802.1q