Networking Flashcards

1
Q

Patch panel

A

What to look out for
- Device that allows cable network jacks from a wall into a central area
- Computers are connected to wall jacks in this system, and connected to patch panel by cables, running in the walls
- Pre-wired, RJ 45 port on the switch using a switch through or patch cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WAP

A

Wireless access point

What to look out for
- Device that allows wireless devices to connect to a wired network
- Connect directly to a wired LAN or local area network then the WAP provides wireless connections using Wi-Fi for other devices to use that wired connection
- supports multiple wireless devices through their wired connection
- should always be configured with channels 1, 6, and 11 to maximize distance between channels and prevent overlaps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hub

A

Would you look out for?
- Whatever is received on one port is repeated out every other port
- Has several different ports between 4 and 48 po

Benefits

Cons
- Leads to collisions
- increases in the number of re-broadcasts which slows down the entire network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Static IP

A

What to look out for
- Manually input, IP address, subnet Mask, gateway, and DNS( domain name server or domain names system)
- used to ensure servers are easy to find
- used when DHCP is disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dynamic IP

A

Would you look out for?
- Automatically assigned using DHCP

Benefits

Cons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

APIPA address

Windows-based

Autom…

A

Automatic, private, IP, addressing (also called Link local address)

What to look out for
- windows-based operating systems feature
- 169.254.0.0 to 169.254.255.255
D iscover
O ffer
R equest
A cknowledge
- Enables computer to automatically assign itself an IP address when DHCP is not available to perform the function
- it can communicate with other hosts on the same network using APIPA
- APIPA to APIPA only
- can’t reach host that have valid IP obtained by DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VLAN

A

Virtual local area network

What to look out for
- can divide single switch into multiple networks
- only supported on managed switches
- Can communicate between different VLAN
- allows sub networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VPN

A

Virtual private network

What to look out for
- Extends private network across public network
Enables users to send/receive data share or public networks as if connected to private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DSL modem

A

Digital subscriber line

What to look out for
- used to connect computer or router to phone line which supplies Internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dynamic NAT

A

What to look out for
- Many-to-one mapping of private IP addresses or subnet masks inside a LAN or local area network inside to a public IP or subnet the local area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11AC ( Wi-Fi 5)

A

What to look out for
- 5 GHz frequency
- 6.9 Gbps
- Multiple user multiple input multiple output (MUMIMO
- channel bonding? (160MHZ)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11AX (Wi-Fi 6)

A

What to look out for
- 2.4 GHz and 5 GHz frequency
- 9.6 Gbps
- orthogonal frequency division multiple access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11a

A

What to look out for
- 5 GHz frequency
- 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11b

A

What to look out for
- 2.4 GHz frequency
- 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11g

A

What to look out for
- 2.4 GHz frequency
- 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11n

A

What to look out for
- 2.4 GHz and 5 GHz frequency
- 150 Mbps (2.4GHz)
- 600 Mbps (5GHz)
- multiple input multiple output (MIMO)
- channel bonding? (Combining 220 MHz channels to a single 40 MHz channel)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

MX record

A

What to look out for
- Used for outgoing SMTP and incoming POP 3/IMAP traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CNAME

A

Canonical name (or alias name)

What to look out for
- associates, one domain name as an alias of another (EX: beta.diontraining.com -> www.diontraining.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A record

A

What to look out for?
- associates domain name with IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AAAA Record

A

What to look out for
- Associates domain name with IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Files sharing server

A

What to look out for
- A server that is used to host and control access to shared files/folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What channels prevent interference and ensure non-overlapping of channels

Big Grapes Need Axes

A
  • Channel 1, 6, and 11
  • this includes 802.11B, 802.11G, 802.11N, 802.11AX
  • utilizes 2.4 GHz (can only select 1 and 11 in the US)
  • increases reliability and throughput
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Network tap

A

What to look out for
- create a physical connection to network
- send copy of every packet received to a monitoring device for capture and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Wi-Fi analyzer

A

What to look out for
- determines signal strength, frequency, radio, frequency interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Tone generator
What to look out for - Connected to a wall jack - send repeating signal over cable
26
Toner probe
What to look out for - detects cables connected to wall jack by detecting signal sent by tone generators - Must be near or touching cable to identify positively
27
Cable tester
What to look out for - Provide detailed info on physical/electrical properties of - Test, test and report cable - cross talk, attenuation, noise, resistance, etc
28
5 GHz wireless frequency
what to look out for - 5 GHz has more channels - Supports higher data rates than 2.4 GHz - Less congestion and interference than 2.4 GHz
29
2.4 GHz frequency
What to look out for - Longer wavelength than. 5 GHz - Better at penetrating services than 5 GHz - longer range with same output levels - each channel on the 2.4 GHz spectrum is 20 MHz wide
30
Intrusion prevention system
Intrusion prevention system (IPS) What to look out - network security that detects and prevents identified threats - Intrusion prevention systems continuously monitor your network, looking for possible malicious incidents, and capturing information about them - IPS can block malicious network traffic, unlike an IDS, which can only log them.
31
Proxy server
What to look out for - a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
32
Syslog
System logging protocol What to look - port 514 - a way network devices can use a standard message format to communicate with a logging server. - It was designed specifically to make it easy to monitor network devices. - Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
33
SSH
Secure shell What to look out for - is the protocol used for remote administration and file copying - TCP port 22 - SSH is considered secure since it uses authenticated and encrypted sessions for communication.
34
FTP
File transfer protocol What to look out for - used to transfer files across the internet - ports 20 and 21
35
HTTP
Hypertext transfer protocol What to look out for - used to provide web content to browsers - port 80
36
Network Basic Input/Output System (NetBIOS) Ports
Ports 137, 139
37
Simple Network Management Protocol (SNMP) ports
- TCP/IP - Ports 161, 162 - Used to collect data about network devices and monitor their status
38
Lightweight Directory Access Protocol (LDAP)
Port 389
39
Server Message Block (SMB)
o Port 445 o Used for Windows file and printer sharing services
40
Remote Desktop Protocol (RDP)
o Port 3389 o Provides graphical remote control of another client or server o RDP provides a full graphical user interface
41
Virtual Network Computing (VNC)
Port 5900
42
PAN
Personal area network What to look out for - Close range network - based on Bluetooth or near field communication (NFC) for communications between personal devices, such as smartphones, laptops, printers, and other peripheral devices.
43
CAN
Campus Area Network (CAN) ▪ Connects LANs that are building-centric across a university, industrial park, or business park ● Up to a few miles
44
LAN
Local area network What to look out for - is a network where all the nodes or hosts participating in the network are directly connected with cables or short-range wireless media. - Connects components within a limited distance ● Up to a few hundred feet
45
WAN
Wide area network What to look out for - Spans multiple geographic locations - Often established with leased telecommunications (Telecom) circuits - Worldwide coverage
46
SAN
Storage area network What to look out for - Dedicated independent high-speed network - Interconnect and delivers shared pools of storage devices to multiple servers - Often uses fiber channel over ethernet (FCOE), fiber, channel, or Internet small computer systems interface (ISCSI) to achieve the speeds necessary to support SAN operations.
47
WLAN
Wireless local area network What to look out for - Connect computers within a small and specific geographical area using 802.11 protocols for their wireless connecting - A wireless distribution method for two or more devices that creates a local area network using wireless frequencies
48
MAN
Metropolitan area network What to look out for - Computer network that interconnects users within computer resources in a region, the size of a metropolitan area or city
49
Legacy system
What to look out for - A legacy system is no longer directly supported by its vendor - Legacy systems usually work well for what they do (which is why they don't get prioritized for replacement), but they represent very severe risks in terms of security vulnerabilities. - Networks often need to retain hosts running DOS or legacy versions of Windows (8.1 and earlier) or old-style mainframe computers to run services that are too complex or expensive to migrate to a more modern platform. - The most convenient and least expensive way to connect older devices would be to buy an adapter
50
UTM
Unified threat management What to look out for - are network appliances that provide all the security functions of a firewall, malware scanner, intrusion detection, vulnerability scanner, data loss prevention, content filtering, and other security devices into a single device or appliance. Advantages - Reduced # of devices - Lower costs - Easier to install Disadvantages - Single point of failure - Lacks detail provided by a specialized tool - Performance is not as effieient as single function devices
51
Patch systems
What to look out for - used to conduct patch management across your organization's network.
52
Embedded system
What to look out for - is a computer system that is designed to perform a specific, dedicated function, such as a microcontroller in a medical drip or components in a control system managing a water treatment plant.
53
POE
Power over ethernet What to look out for - Power over Ethernet (POE) provide power over ordinary data cabling to devices such as VoIP handsets and wireless access points - PoE can support up to 15.4W - 802.3af (PoE) - 15.4W of power at distance of up to 100m. - PoE can support low-powered devices such as VoIP handsets.
54
PoE+
Power over ethernet + What’s to look out for? - Can support up to 25W - 802.3at (PoE+) standard can support up to 25W of power at a distance of up to 100 meters - PoE+ can support higher-powered devices such as PTZ cameras, door controllers, and thin client computers
55
Switches
▪ Smart hubs that remember the ports that are connected to them ● Switches can have multiple people talking at one time o Unmanaged Switch ▪ Performs its functions without requiring a configuration o Managed Switch ▪ Performs its functions with configuration
56
Firewall
Scans and blocks traffic that enters or leaves a network ● Unified threat management (UTM) contains firewall features - Packet-filtering ● Stateful ● Proxy ● Dynamic packet-filtering ● Kernel proxy
57
Optical Network Terminal (ONT)
Terminates fiber connection
58
Small Office, Home Office (SoHo) LAN
Uses a centralized server or simply provides clients access to local devices like printers, file storage, or the Internet
59
Twisted Pair Cables
o STP (Shielded) and UTP (Unshielded) operate about the same o Keep cable runs under 70 meters from the IDF to the office
60
Single Mode Fiber (SMF)
▪ Used for longer distances and has smaller core size which allows for only a single mode of travel for the light signal - More expensive ● SMF’s core size is 8.3-10µ in diameter
61
Multimode Fiber (MMF)
Used for shorter distances and has larger core size which allows for multiple modes of travel for the light signal - Lager core size - Covers shorter distances - less expensive ● MMF’s core size is 50-100µ in diameter ● Up to 2 kilometers or less
62
Fiber Optic Cable
Uses light from an LED or laser to transmit information through a thin glass fiber ● Greater usable range ● Greater data capacity - Switches, routers, and end-user devices can become a limitation
63
Coaxial Cabling
Coaxial Cable (Coax) ▪ One of the oldest categories of copper media that is still used in networking today
64
Cable Stripper
Used to strip off the end of the cable and prepare it for attachment to a connector
65
Cable Crimper
Used to attach the connector to the end of the cable
66
Punch-Down Block
Terminates the wires and strips off excess installation and extra wires that are no longer needed
67
Wi-Fi (802.11)
Creates point to point connections from one building to another over a relatively short distance
68
Cellular
Uses a larger antenna and a larger hotspot powered by a power outlet within an office or home
69
Microwave
▪ Creates point to point connection between two or more buildings that have longer distances ▪ A traditional microwave link can cover about 40 miles of distance - UHF, SHF, and EHF
70
Satellite
A long range and fixed wireless solution that can go for miles ● Slow ● Expensive ● High latency
71
Radio Frequency dentification (RFID)
A form of radio frequency transmission modified for use in authentication systems
72
Cellular Connections
1G: 30 KHz - 2 Kbps 2G: 1800 MHz - 14.4 Kbps to 2 Mbps 3G: 1.6 to 2 GHz - 144Kbps to 2 Mbps 4G: 2 to 8 GHz - 100 Mbps o 1 Gbps 5G - Low band: 600-850 MHZ (30-250 Mbps) - Mid band: 2.5-3.7 GHz (100-900 Mbps) - High band: 25-39 GHz (Extremely high speed (In Gbps)
73
TCP
- Transmission Control Protocol - Reliable (Threeway handshake) - Connection oriented - Segment retransmission and flow control (Windowing) - With segmentation of sequencing - Acknowledgement
74
Network Interface Card (NIC)
Provides an ethernet connection to the network
75
Internet of Things
▪ A global network of appliances and personal devices that have been equipped with sensors, software, and network connectivity to report state and configuration ● Segregation of IoT devices is critically important for the business network’s securit
76
Bandwidth
The theoretical measure of how much data could be transferred from a source to its destination
77
Throughput
The actual measure of how much data is successfully transferred from a source to its destination
78
568b
The standard that's preferred when wiring jacks inside of buildings
79
MDIX
A medium dependent interface crossover (MDIX) is an automated way to electronically simulate using a crossover cable
80
Wire Mapping Tool
Works like a cable tester, but specifically for twisted pair ethernet cables
81
Pre-Shared Key
▪ Both the access point and the client use the same encryption key ▪ It’s not a good idea to use pre-shared keys in large environments
82
Wired Equivalent Privacy (WEP)
Original 802.11 wireless security standard which is an insecure security protocol ▪ WEP uses 24-bit Initialization **Vector (IV)** sent in clear text
83
Wi-Fi Protected Access (WPA)
▪ Replaced WEP and follows the **Temporal Key Integrity Protocol (TKIP)** ▪ WPA uses 48-bit Initialization Vector (IV) instead of 24-bit ● **Rivest Cipher 4 (RC4)** ● Message Integrity Check (MIC) ● Enterprise Mode
84
Wi-Fi Protected Access 2 (WPA2)
- requires stronger encryption and integrity checking through **CCMP** ● **Advanced Encryption Standard (AES)** ● Personal Mode ● Enterprise Mode
85
Cable Modems
Uses a cable TV network that is made up of a hybrid fiber-coaxial (HFC) distribution network
86
Data-Over-Cable Service Interface Specifications (DOCSIS)
▪ Specific frequency ranges used for upstream and downstream transmissions ● Upstream o 5 MHz to 42 MHz ● Downstream o 50 MHz to 860 MHz
87
Fiber To The Curb (FTTC)
Runs a fiber optic cable from an internet provider access point to a curb
88
Fiber To The Premises (FTTP)
Fiber optic that connects directly to a building and connects to an optical network terminal (ONT)
89
Optical Network Terminal (ONT)
Physical devices that convert optical signals to electrical signals
90
Link/Network Interface Layer
In the link/network interface layer, the data can only travel through the local area network
91
Internet Layer
Used to address packets and route them across the network
92
Transport Layer
Shows how to send the packets ● TCP o Transmission Control Protocol ● UDP o User Datagram Protocol
93
Application Layer
Contains all the protocols that perform higher-level functions
94
7 layers of the OSI Model
All: Application (Layer 7) People: Presentation (Layer 6) Seem: Session (Layer 5) To: Transport (Layer 4) Need: Network (Layer 3) Data: Data Link (Layer 2) Processing: Physical (Layer 1)
95
Loopback Address (127.0.0.1)
Creates a loopback to the host and is often used in troubleshooting and testing network protocols on a system
96
Domain Name System (DNS)
▪ Converts the domain names used by a website to the IP address of its server ▪ DNS is the internet version of a phone book
97
Bootstrap Protocol (BOOTP)
Dynamically assigns IP addresses and allows a workstation to load a copy of boot image to the network
98
Dynamic Host Control Protocol (DHCP)
- Provides an IP address to every machine on the network and eliminates configuration errors 192.168.1.100 through 192.168.1.200 - Ports 67, 68 - Each IP is leased for a period of time and returns to the pool when the lease expires
99
MX (Mail Exchange)
Directs emails to a mail server
100
TXT
Adds texts into th DNS
101
NS (Name Server)
Indicates which DNS nameserver has the authority
102
Full Tunnel VPN
Routes and encrypts all network requests through the VPN connection back to the headquarters
103
Split Tunnel VPN
Routes and encrypts only the traffic bound for the headquarters over the VPN, and sends the rest of the traffic to the regular Internet
104
Secure Socket Layer (SSL)
Provides cryptography and reliability using the upper layers of the OSI model (Layers 5, 6, and 7)
105
Transport Layer Security (TLS)
▪ Provides secure web browsing over HTTPS
106
Globally Routed
Like IPv4’s unicast class A, B, and C addresses and begins with 2000-3999
107
Link-Local/Local Use
Used like a private IP in IPv4 that can only be used on the local area network and begins with FE80
108
Stateless Address Autoconfiguration (SLAAC)
Eliminates the need to obtain addresses or other configuration information from a central server
109
Multicast Address
Used to identify a set of interfaces and begins with FF
110
Anycast Address
Used to identify a set of interfaces so that a packet can be sent to any member of a set
111
Extended Unique Identifier (EUI)
Allows a host to assign itself a unique 64-bit IPv6 interface identifier called EUI-64
112
Port
▪ Logical communication endpoint that exists on a computer or server - Ports can be any number between 0 and 65,535
113
Well-Known Ports
Ports 0 to 1023 are considered well-known and are assigned by the Internet Assigned Numbers Authority (IANA)
114
Registered Ports
Ports 1024 to 49151
115
Trivial File Transfer Protocol (TFTP)
● Ports 69 ● a connectionless protocol that uses UDP as its transport
116
Remote Authentication Dial-In User Service (RADIUS)
Provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP - Relies on UDP - Combines authentication and authorization - Does not support all network protocols - has cross-platform capability RADIUS operates at the application layer
117
Terminal Access Controller Access-Control System Plus (TACACS+)
Proprietary version of RADIUS that can perform the role of an authenticator in 802.1x networks - Relies on TCP - Separates authentication, authorization, and accountinh processes - Supports all network protocols - Exclusive to Cisco devices
118
Authorization
▪ Occurs when a user is given access to a certain piece of data or certain areas of a building
119
Kerberos
Authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets
120
Accounting
Ensures the tracking of data, computer usage, and network resources is maintained
121
Telnet
Port 23
122
Terminal Emulator (TTY)
▪ Any kind of software that replicates the TTY I/O functionality to remotely connect to a device ▪ TTY is the terminal or end point of the communication between the computer and the end-user
123
Managed Devices
Computers and other network-attached devices monitored using agents by a network management system
124
Load Balancer/ Content Switch
▪ Distributes incoming requests across several servers inside a server farm or a cloud infrastructure ▪ A load balancer is one of the key things to help defend against a DoS attack or a DDoS attack
125
Industrial Control System (ICS)
▪ Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices ▪ Multiple ICSs can create a distributed control system (DCS)
126
Supervisory Control and Data Acquisition (SCADA)
▪ Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer
127
CAT5
- 100 Mbps - - 100Base-TX(Twisted pair) - 100m
128
CAT5e (Gigabit Ethernet)
- 1000base-T - 1000 Mbps (1Gb) - 100m
129
CAT6
- 1000 Base-T - 1000 Mbps - 100m or - 10G Base-T - 10 Gbps - 55m
130
CAT6a
- 10G Base-T - 10 Gbps - 100m
131
CAT7
- 10G Base-T - 10 Gbps - 100m
132
CAT8
- 40G Base-T - 40 Gbps - 30m