Term
What is the OSI Layer Model? and how many layers are in it? |
|
Definition
Open Systems Interconnection model
7- Application 6- Presentation 5- Session 4- Transport 3- Network 2- Data Link 1- Physical |
|
|
Term
What are the four TCP/IP Layers? |
|
Definition
4- Application 3- Transport 2- Internet 1- Network Interface |
|
|
Term
What is the Max size of a Frame? |
|
Definition
|
|
Term
|
Definition
Devices on a network that send and receive data in discreet chunks called Frames, have destination and source mac addresses |
|
|
Term
Where are Frames Created? |
|
Definition
Frames are created and destroyed inside the NIC (Network Interface Card) |
|
|
Term
|
Definition
a Media Access Control address is a unique 48-bit identifier. |
|
|
Term
|
Definition
Original Equipment Manufacturer |
|
|
Term
|
Definition
Cyclic Redundancy Check
error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data. |
|
|
Term
What is a Unicast Transmission |
|
Definition
Addressed to a single device on a network |
|
|
Term
What is a broadcast transmission |
|
Definition
Sent to every device on a broadcast domain |
|
|
Term
What does a broadcast address look like? |
|
Definition
|
|
Term
|
Definition
Help direct packet traffic between the source and destination |
|
|
Term
|
Definition
TCP is connection Oriented, UDP is connectionless |
|
|
Term
Where does a computer get the MAC Address? |
|
Definition
A unique MAC address is built into every Network Interface Card (NIC) |
|
|
Term
What is a chunk of data that has been sent out of a NIC called? |
|
Definition
|
|
Term
What is a Star Bus Topology |
|
Definition
Connected in like a star, all around, considered a hybrid technology. |
|
|
Term
What is a fully meshed topology? |
|
Definition
When each host is interconnected. |
|
|
Term
What is Logical Topology? |
|
Definition
The electronic circuit flow of frames. |
|
|
Term
|
Definition
Radio Grade, it specifies the thickness of conductors, insulation, and shielding. |
|
|
Term
|
Definition
Has two conductors, one center point, and a tubular conducting layer. |
|
|
Term
|
Definition
specific type of coaxial cable, often used for low-power video and RF signal connections
Has a 75ohm rating and uses a threaded f-type connector |
|
|
Term
What is the EIA/TIA 568A/568B? |
|
Definition
Wiring Standards for how wires are connected to a connector. 568B is the predominant standard. |
|
|
Term
What is the 568B Wiring Standard |
|
Definition
|
|
Term
What is the 568A Wiring Standard |
|
Definition
|
|
Term
|
Definition
Unshielded Twisted Pair. Subject to signal interference from environmental factors. |
|
|
Term
Modern Twisted Pair has _ or more pairs of cable |
|
Definition
|
|
Term
What is the Speed of Cat 3? |
|
Definition
|
|
Term
What is the speed of Cat 5 and 5e? |
|
Definition
100-1000mbps @ 100 meters |
|
|
Term
What is the speed and length of Cat 7? |
|
Definition
10 Gbps, @ 100 meters, shielded. |
|
|
Term
What do UTP cat ratings define? |
|
Definition
Speed and cable length specifications |
|
|
Term
What are Cat 6a and Cat 7 both rated for? |
|
Definition
10 Gbps and up to 100 meter length. |
|
|
Term
Multimode cables carry ___ signals |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
What kind of connector is this on the left side?
[image] |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
What kind of connector is this?
[image] |
|
Definition
|
|
Term
Single-mode cables carry ____ signals |
|
Definition
|
|
Term
What is Plenum-rated cable? and what is non-plenum or PVC considered? |
|
Definition
Most fire resistant. non is not considered fire or smoke resistant. |
|
|
Term
What is Riser Rated Cable |
|
Definition
Used in vertical applications such as cable runs between floors. |
|
|
Term
What is the IEEE 802.3 standard for? |
|
Definition
|
|
Term
What is the IEEE 802.11 standard for? |
|
Definition
|
|
Term
What does IEEE Stand for? |
|
Definition
The Institute of Electrical and Electronics Engineers |
|
|
Term
What are all the CAT Ratings and Speeds/Cable Run Lengths? |
|
Definition
|
|
Term
What does an Ethernet frame consist of? |
|
Definition
a preamble, destination MAC, source MAC, data type, data, pad, and FCS |
|
|
Term
how much data can a Jumbo frame carry? |
|
Definition
|
|
Term
|
Definition
Frame Check Sequence, is used for error detection. |
|
|
Term
|
Definition
carrier sense multiple access / collision detection |
|
|
Term
What does 10Base5 and 10Base2 require? |
|
Definition
Terminating resistors at both ends of a segment (cable) |
|
|
Term
What should you always use when connecting to 10Base2? |
|
Definition
|
|
Term
What does MSAU stand for? |
|
Definition
|
|
Term
|
Definition
runs at 10mbps over Cat 3 or better. can have 1024 nodes per switch, and runs a max of 100 meters between switch and node. |
|
|
Term
What is an 8P8C connector |
|
Definition
|
|
Term
what is a straight-through cable? |
|
Definition
a patch cable that uses the same wiring standard on both ends. Most commonly used. |
|
|
Term
what is a crossover cable? |
|
Definition
a cable with different wiring standards on each end, usually to connect a machine directly to another or connecting switches directly. |
|
|
Term
Switches forward frames based on ___? |
|
Definition
|
|
Term
What do switches do to map ports and host devices? |
|
Definition
Create and use MAC Address Tables. |
|
|
Term
10Base5 connects to a network card with a ____ connector |
|
Definition
|
|
Term
|
Definition
100mbps 1024 nodes per hub 100 meters Cat 3 |
|
|
Term
|
Definition
100 mbps 1024 nodes per hub Multimode 2 KM |
|
|
Term
what does half-duplex mean? |
|
Definition
Allows transmission of signals in both directions but not simultaneously. |
|
|
Term
|
Definition
Special port on a switch or hub that reverses the transmit and receive circuits. Basically a pre-crossover port. Straight through cables would work in an uplink port. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Gigabit Interface Converter.
[image] |
|
|
Term
|
Definition
Small form-factor pluggable
[image] |
|
|
Term
|
Definition
Quad small form-factor pluggable designed for 40Gbps Ethernet [image] |
|
|
Term
|
Definition
|
|
Term
|
Definition
Telecommunications Industry Association
they specify the wiring standards for structured cabling. |
|
|
Term
Patch Panels terminate one end of ____ |
|
Definition
|
|
Term
|
Definition
a type of punch block used to terminate runs on a structured cabling system. to distribute copper wired networks. There's also a 66 block although its older and not used as much. (non-VoIP) |
|
|
Term
|
Definition
Main distribution frame : primary equipment room |
|
|
Term
|
Definition
U or unit, standard height for components in a rack |
|
|
Term
What is a Demarc/extension? |
|
Definition
seperates the telecom company's property from your responsibility. |
|
|
Term
What is a fiber distribution panel? |
|
Definition
used to distribute fiber-optic networks |
|
|
Term
|
Definition
Optical TDR (time domain reflectometer)
TDR shows length of cable and helps pinpoint mid-cable breaks. |
|
|
Term
|
Definition
Near-end crosstalk, and far-end crosstalk |
|
|
Term
What is Continuity testing? |
|
Definition
Shows if the cable has any breaks. |
|
|
Term
|
Definition
tool to test the NICs ability to send and receive. |
|
|
Term
|
Definition
|
|
Term
What do tone generators do? |
|
Definition
create a signal for the probe to pickup at the switch area. |
|
|
Term
|
Definition
Address Resolution Protocol. Resolves IP Addresses. Used when the IP is known but needs the MAC address. Arp -a to see cache. |
|
|
Term
What numbers can you NOT use for a HOST ID? |
|
Definition
|
|
Term
What does a host use a subnet mask for? |
|
Definition
to know if the destination is local or remote |
|
|
Term
What is the default gateway for? |
|
Definition
Router, hosts use to to forward traffic to remote networks. |
|
|
Term
|
Definition
Internet Assigned Numbers Authority.
oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System, media types, and other Internet Protocol-related symbols and Internet numbers |
|
|
Term
|
Definition
divides network IDs into two or more networks. |
|
|
Term
What is classful subneetting? |
|
Definition
first effort to divide network IDs. Class A, B, and C licenses.
[image] |
|
|
Term
|
Definition
Classless Inter-Domain Routing |
|
|
Term
Each broadcast domain must have only one ____ |
|
Definition
|
|
Term
|
Definition
Enables a single DHCP server to service more than one broadcast domain. |
|
|
Term
|
Definition
Automatic Private IP Addressing
IP looks like (169.254.x.x) |
|
|
Term
what does a private ip address start with? |
|
Definition
|
|
Term
What is a loopback address for IPv4 an IPv6? |
|
Definition
|
|
Term
What are other special internal IPs? |
|
Definition
172.16.x.x
172.31.x.x
192.168.x.x |
|
|
Term
What do all routers have to show a list of ip addresses? |
|
Definition
|
|
Term
What are well known ports? |
|
Definition
|
|
Term
what does every TCP packet have? |
|
Definition
|
|
Term
clients generate ephemeral port numbers that are always between? |
|
Definition
|
|
Term
|
Definition
Packet Address Translation. Translates internal IPs to an internet address and tracks the packets. |
|
|
Term
|
Definition
a unit of data that is routed between an origin and a destination. |
|
|
Term
|
Definition
Static Network Address Translation - sends specific traffic to one internal ip address. |
|
|
Term
|
Definition
Dynamic NAT - has a limited pool of Internet addresses to give to a number of internal devices. |
|
|
Term
SOHO routers ship with ___ enabled |
|
Definition
|
|
Term
Older routers may call NAT _____ |
|
Definition
|
|
Term
|
Definition
20 and 21 File Transfer Protocol |
|
|
Term
|
Definition
allows external devices to have internal communications through a router. |
|
|
Term
|
Definition
Opens an alternative assigned port when the initial port is contacted. |
|
|
Term
Enabling the DMZ when setting up port forwarding places that device ____ |
|
Definition
outside the protection of the router |
|
|
Term
All home routers have a default : |
|
Definition
|
|
Term
Router WAN connections are commonly ____ clients by default |
|
Definition
|
|
Term
SOHO routers are for small groups btwn ____ and can have built-in capability for : |
|
Definition
5-6 devices.
Switches, Firewalls, and WAPs |
|
|
Term
SOHO routers often have _____ interfaces
enterprise routers typically have their own ____ |
|
Definition
web-based interfaces
OS interface |
|
|
Term
|
Definition
a fixed route that is manually configured and persistent |
|
|
Term
use ____ or ____ to display current known routes from the routing table |
|
Definition
route print or netstat -r |
|
|
Term
|
Definition
information for destination, subnet mask, gateway, and NIC |
|
|
Term
|
Definition
Maximum Transmission Unit
the size of the largest protocol data unit (PDU) that can be communicated in a single network |
|
|
Term
|
Definition
|
|
Term
|
Definition
Border Gateway Protocol, hybrid protocol. Primary for the internet. |
|
|
Term
|
Definition
|
|
Term
Dynamic routing protocols use metrics to determine routes and are either ___ or ____ |
|
Definition
Distance Vector or Link State |
|
|
Term
|
Definition
Interior Gateway Protocol and Exterior Gateway Protocol
IGP is used to exchange routing information with an Autonomous System (AS)
EGP is used for determining network reachability between AS' and makes use of IGPs to resolve routes. |
|
|
Term
BGP is the EGP protocol used for: |
|
Definition
Inter-Autonomous System Routing |
|
|
Term
|
Definition
Routing Information Protocol. Distance Vector Interior Gateway protocol that uses hop count to determine routes. |
|
|
Term
What is RIPs max hop count? |
|
Definition
|
|
Term
|
Definition
Open Shortest Path First. Link state protocol. IGP |
|
|
Term
What is a Distance Vector Protocol? |
|
Definition
routing protocol that uses distance of numbers of routers a packet has to pass. |
|
|
Term
What is a link-state protocol? |
|
Definition
a routing protocol used that is performed by every switching node in a network where they construct a map of the connectivity and calculates the best logical path to use (OSPF) is a link-state protocol. |
|
|
Term
What is the job of a router? |
|
Definition
To connect networks with different network IDs |
|
|
Term
What is the role of port numbers in ip headers? |
|
Definition
Port numbers identify the sending and receiving processes between the two hosts. |
|
|
Term
Port Forwarding allows what? |
|
Definition
Outside access to to hosts on the LAN side of a NAT router. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Protocol Data Unit. information used by different protocols provided in frame segments. |
|
|
Term
Ethernet Frames are used by : |
|
Definition
|
|
Term
|
Definition
Transmission Control Protocol is connection-oriented; 2-way communication initiated by a 3-way handshake process (syn, syn-ack, ack) |
|
|
Term
|
Definition
User Datagram Protocol is connectionless-oriented, has low overhead with one-way communication. |
|
|
Term
|
Definition
Internet Control Message Protocol: works at the Internet(2) layer in the TCI\IP model and the Network (3) in the OSI Model |
|
|
Term
Multicast Addresses always start with |
|
Definition
|
|
Term
What commands display the hops through a router to reach a destination? |
|
Definition
tracert for Windows and traceroute for Linux |
|
|
Term
using the alternative command ____ can get a quicker ping response from the routers |
|
Definition
|
|
Term
|
Definition
a protocol analyzer, integrated with a frame capture tool |
|
|
Term
|
Definition
displays the traffic flow of Ethernet frames, and can drill down into the frame-viewing various protocols, ports, timelines, and services. |
|
|
Term
What command lists all open ports and network connections on a computer? |
|
Definition
|
|
Term
|
Definition
presents all results numerically |
|
|
Term
|
Definition
shows the executable for every connection |
|
|
Term
|
Definition
shows the executable and process id for every connection |
|
|
Term
|
Definition
shows all active ports
Check if a web server is running. |
|
|
Term
|
Definition
shows the local routing table |
|
|
Term
|
Definition
Internet Information Services |
|
|
Term
the ____ command downloads and the ___ uploads |
|
Definition
|
|
Term
FTP is not an ______ protocol |
|
Definition
encrypted. SFTP is more secure. |
|
|
Term
FTP servers listen on port __ and send data on ___ |
|
Definition
|
|
Term
|
Definition
Simple Mail Transfer Protocol on port 25 |
|
|
Term
|
Definition
110
Assumes access by only one client |
|
|
Term
|
Definition
|
|
Term
What are email port numbers after Implementing TLS? |
|
Definition
IMAP 143 ->993 Encrypted POP3 110 -> 995 Encrypted SMTP 25 -> 465 Encrypted |
|
|
Term
the STARTTLS extension uses only one port for encrypted communication |
|
Definition
|
|
Term
|
Definition
Runs on TCP port 23. unencrypted |
|
|
Term
|
Definition
Secure Shell. Runs over TCP port 22. fully encrypted, almost replaced telnet. |
|
|
Term
|
Definition
UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
port 513. not secure. replaced by SSH |
|
|
Term
|
Definition
Network Time Protocol. used for clock synchronization. uses port 123. Hundreds of NTP servers worldwide. |
|
|
Term
|
Definition
IP Address Management tools:
track and manage allotted ip addresses, keeping address requirement available for server and VM farms. |
|
|
Term
Ping uses which IP layer Protocol? |
|
Definition
ICMP - The internet control message protocol is on layer 3 (network) of the OSI Model and layer 2 of the TCP\IP model. (internet) |
|
|
Term
What is the primary purpose of netstat? |
|
Definition
Displays all connections to and from a host computer. |
|
|
Term
TCP uses the ___ message to close a connection |
|
Definition
|
|
Term
|
Definition
Domain Name System - resolves FQDNS (fully qualified domain names) to IP addresses. |
|
|
Term
What are examples of Top-level domains? |
|
Definition
|
|
Term
|
Definition
Start of Authority
Type of resource record in the DNS containing administrative information about the zone. |
|
|
Term
what is a DNS A record for? |
|
Definition
|
|
Term
what is a dns AAAA record for? |
|
Definition
|
|
Term
|
Definition
|
|
Term
CNAME record creation makes an alias name or ____ |
|
Definition
|
|
Term
What does a reverse lookup zone do? |
|
Definition
Resolves an ip address to an FQDN, used by mail servers. |
|
|
Term
TXT records, DKMI, and SPF are used to ____ |
|
Definition
identify email users and reduce spam. |
|
|
Term
the hosts file contains ___ |
|
Definition
ip addresses and their names. Every computer that runs TCP/IP has one. it takes precedence over DNS |
|
|
Term
this command shows all user information |
|
Definition
|
|
Term
this command shows detailed information about currently mapped drives and devices and sets drive names for shares. |
|
Definition
|
|
Term
this command creates and configurees network shares |
|
Definition
|
|
Term
This command shows everything that is on the network. |
|
Definition
|
|
Term
this command shows workstation account settings such as password length etc. |
|
Definition
|
|
Term
this command allows you to start and stop a service |
|
Definition
|
|
Term
This is an old protocol that manages connections based on the names of computers within a LAN |
|
Definition
|
|
Term
___is a protocol that allows hosts to name resolution for hosts on the same local link |
|
Definition
LLMNR - Link Local Multicast Name Resolution |
|
|
Term
a network utility tool for Netbios that displays connections for TCP but has some issues with LLMNR |
|
Definition
|
|
Term
Enables you to use a DHCP assigned IP address for connection |
|
Definition
|
|
Term
|
Definition
Domain information groper. can be used to check status of a DNS server |
|
|
Term
|
Definition
queries the DNS to obtain domain name or ip address mapping. |
|
|
Term
where is the HOSTS file in a windows pc? |
|
Definition
C:\Windows\System32\Drivers\etc |
|
|
Term
For making TCP\IP secure, what is the acronym to go by? |
|
Definition
CIA Confidentiality Integrity Availability |
|
|
Term
What uses a public and private key? |
|
Definition
|
|
Term
public keys ____, private keys _____ |
|
Definition
encrypt, decrypt
public key also sends a hash of the Web page |
|
|
Term
for two people to communicate, they must exchange _____ |
|
Definition
|
|
Term
What are Hashes used for? |
|
Definition
to verify data integrity . they are always a fixed value in size. |
|
|
Term
|
Definition
common hashes. Hashing is the transformation of a string of characters into a usually shorter-fixed length value or key that represents the original string. |
|
|
Term
Authentication requires sharing of these three things __ |
|
Definition
something you know, something you have, or something you do |
|
|
Term
Federated system trust is inherited from a ___ |
|
Definition
|
|
Term
|
Definition
Mandatory Access Control (not same as mac address) uses labels. |
|
|
Term
|
Definition
Discretionary Access Control. Gives creators control over permissions |
|
|
Term
|
Definition
role-based access control. uses groups |
|
|
Term
What is RADIUS and what ports does it use? |
|
Definition
Remote Authentication Dial-in User Service
UDP ports 1812-1813 and udp ports 1645-1646. |
|
|
Term
what is TACACS+ and what port does it use. |
|
Definition
Terminal Access Controller Access-Control System Plus TCP
protocol that handles authentication, authorization, and accounting (AAA) services.
port 49 |
|
|
Term
|
Definition
Key Distribution Center
part of a cryptosystem intended to reduce the risks inherent in exchanging keys |
|
|
Term
|
Definition
Protected Extensible Authentication Protocol
Encapsulates the EAP protocol within an encrypted TLS tunnel. |
|
|
Term
|
Definition
|
|
Term
|
Definition
secure EAP. EAP enables flexible authentication. |
|
|
Term
|
Definition
handles authentication and authorization for wired networks. Relies heavily on time stamps |
|
|
Term
|
Definition
Security Assertion Markup Language. Used to manage multiple apps using a single account. |
|
|
Term
What do you use for single sign-on in a LAN? |
|
Definition
|
|
Term
|
Definition
Provides a variety of service provider samples. |
|
|
Term
|
Definition
Public Key infrastructure
A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption. |
|
|
Term
Certificates include a ____ and at least one _____ |
|
Definition
public key and digital signature |
|
|
Term
What is a 443 error for a certificate? |
|
Definition
A self-signed certificate can throw this error. it hasn't been issued by a CA (certificate authority) |
|
|
Term
What is a digital signature? |
|
Definition
a hash of an encrypted data chunk that sender and receiver both have. |
|
|
Term
|
Definition
Tunnels can encapsulate unencrypted protocols to create encrypted communication channels. Often used with remote access connections. |
|
|
Term
|
Definition
Virtual Private Network. provides a secure tunnel connection for remote computers to get to a designated endpoint. |
|
|
Term
what is a client-to-site VPN? |
|
Definition
connects remote computer to a local network. |
|
|
Term
what is a site-to-site VPN? |
|
Definition
connects distant networks into a single network |
|
|
Term
|
Definition
Virtual LAN. splits one broadcast domain into two or more broadcast domains. |
|
|
Term
|
Definition
they move traffic from all VLANs between switches. enables VLANs to be on more than one. |
|
|
Term
higher-end switches offer _______ |
|
Definition
|
|
Term
|
Definition
can be used to connect to and manage a switch or router. |
|
|
Term
Cisco routers and switches use |
|
Definition
|
|
Term
|
Definition
Bridge Protocol Data Units Guard is a cisco method allowing only non-switch devices to connect to the switch |
|
|
Term
|
Definition
a layer 2 security tech built into the OS of a switch that drops DHCP traffic determined to be unacceptable. This is used to prevent rogue DHCP servers offering IP addresses. |
|
|
Term
Switch ports do not use ip addresses or work with layer |
|
Definition
|
|
Term
Switch interconnections use ___ to detect looping by deactivating the port, if necessary. |
|
Definition
STP. Spanning Tree Protocol. |
|
|
Term
|
Definition
protects the STP attack of replacing with a rogue root bridge. |
|
|
Term
|
Definition
The Root Bridge (Switch) is a special bridge at the top of the STP tree. |
|
|
Term
|
Definition
Link Aggregation Control Protocol. Cisco protocol to perform port bonding. |
|
|
Term
|
Definition
links switchports to increase bandwidth |
|
|
Term
|
Definition
enables traffic flowing through one port to be monitored on another. Enables admins to remotely inspect traffic. |
|
|
Term
|
Definition
Quality of Service. helps better manage available bandwidth. one type is traffic shaping. |
|
|
Term
|
Definition
Intrusion Detection System. detects and reports possible attacks to admins. |
|
|
Term
|
Definition
Intrusion Prevention System. runs in-line with networks and acts to stop detected attacks. |
|
|
Term
a firewall _____, IDS ____, and IPS _____ |
|
Definition
filters, notifies, acts to stop. |
|
|
Term
|
Definition
hides the clients from the server by forwarding messages. Can be reconfigured for caching, content filtering, and firewall capability. |
|
|
Term
|
Definition
hide the server, and can provide load balancing and caching for high activity pages. |
|
|
Term
|
Definition
can route to the most available server, either configured by a list (round robin) or by least response time.
can be configured as client-side or server side. Server side uses a sophisticated hardware device within the server. |
|
|
Term
|
Definition
Demilitarized Zones, used to protect public-facing servers by creating an isolated area for those devices. |
|
|
Term
two ____ are used in a DMZ: one allowing unsolicited traffic to the public service, and the second maintaining isolation of the private network |
|
Definition
|
|
Term
what would be the best solution to make an encrypted tunnel using SSH? |
|
Definition
piggyback an existing tunnel program onto SSH |
|
|
Term
|
Definition
Neighbor Discovery Protocol
Multicast based protocol similar to ARP for IPv6
IPv6 Machines talk to each other and auto-configure. |
|
|
Term
|
Definition
|
|
Term
ipv6 addresses have _ segments seperated by _ colons |
|
Definition
|
|
Term
ipv6 address have to IPs: a ___ and a ___ |
|
Definition
link-local address and internet address |
|
|
Term
the second part of the IPv6 address using EUI-64 is generated from the |
|
Definition
MAC address. creates a unique 64-bit ID automatically. |
|
|
Term
IPv6 uses _____ to access internet route information |
|
Definition
router solicitations/advertisements |
|
|
Term
If you are on IPv4 you need a tunneling protocol to get to the ____ |
|
Definition
|
|
Term
What are the Carrier Speeds and Channels? |
|
Definition
|
|
Term
original telephone systems used _____ multiplexing. today they use _____ |
|
Definition
frequency division multiplexing, time division multiplexing. |
|
|
Term
E1 and E3 are _____ carriers |
|
Definition
|
|
Term
What are is the first SONET Optical level and speed? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Multiprotocol Label Switching
routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses |
|
|
Term
|
Definition
Asynchronous Transfer Mode
Packet switching technology |
|
|
Term
|
Definition
packet switching protocol that specifies the physical and data link layers of channels. |
|
|
Term
an ISP will give a username and password dial-up using the ____ protocol |
|
Definition
|
|
Term
|
Definition
Digital Subscriber Line. Asymettric is common. DSL filtering is used to clear the phone line of noise. |
|
|
Term
|
Definition
come from the company and use F-type connectors. |
|
|
Term
|
Definition
cable from dish to modem, 75ohms, suitable for long distance runs. |
|
|
Term
|
Definition
Integrated Service Digital Network. ran at two speeds: 64kbps and 128kbps. has a telephone number. |
|
|
Term
|
Definition
Broadband over power lines |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Supervisory Control and Data Acquisition. handle ICS (industrial control systems) over a large area. |
|
|
Term
What are the key pieces of Advanced Remote Control Systems? |
|
Definition
programmable logic controller, human machine interface, and a remote terminal unit. |
|
|
Term
Cable modems use which network standard? |
|
Definition
|
|
Term
|
Definition
carries a single digitized voice call at 64kbps. 24 DS0 lines can be combined (multiplexed) to create a DS1 line with a 1.544 mbps bandwidth. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Direct-sequence spread-spectrum
significantly improves protection against interfering (or jamming) telecom signals, especially narrowband and makes the signal less noticeable |
|
|
Term
|
Definition
a Wireless Access Point, is a bridging device that connects into an ethernet network and communicates via radio waves to wireless clients. |
|
|
Term
|
Definition
Carrier sense multiple access with collision avoidance. is the method used to prevent wireless collisions. |
|
|
Term
What are all the Wireless Standards, bandwidths, and speeds? |
|
Definition
|
|
Term
What are all the Antenna Types? |
|
Definition
Dipole, Patch, Directional/Yagi, Directional/Parabolic, SMA(subminiature version A) |
|
|
Term
What are the wireless security protocols? |
|
Definition
|
|
Term
To make your wifi more secure what 3 things would you do? |
|
Definition
Disable SSID broadcast, use MAC filtering, and limit the number of DHCP-issued addresses. |
|
|
Term
|
Definition
the act of driving around and mapping the location and state of wireless access points |
|
|
Term
|
Definition
drawing a symbol on the sidewalk indicating the current state of a present WAP. |
|
|
Term
|
Definition
Wi-fi protected setup is a one button setup of wireless devices and it can be a security threat. |
|
|
Term
Enterprise wireless systems have what? |
|
Definition
multiple WAPs that can all have the same wireless controller for configuration setup. |
|
|
Term
Wireless controllers can do what? |
|
Definition
monitor traffic, set up various zones or access areas, and defines services access to specific WAP destinations. |
|
|
Term
what does ad-hoc mode best describe? |
|
Definition
A wireless network comprised of only peer computers. |
|
|
Term
What is the difference between emulation and virtualization? |
|
Definition
Emulation emulates hardware that isn't on the machine. Virtualization runs off of actual physical hardware to create more environments. Saves power and consolidates hardware. |
|
|
Term
A private cloud with contracted management is a considered a |
|
Definition
|
|
Term
What are the four clouds to remember? |
|
Definition
public, private, community, and hybrid. |
|
|
Term
|
Definition
Virtual Private Cloud. depends on the services requested. services are very flexible, expandable. |
|
|
Term
What is IaaS, PaaS, and SaaS? |
|
Definition
Cloud Models. Infrastructure as a service and Platform as a service. and Software as a service. |
|
|
Term
|
Definition
the current state of a virtual system. |
|
|
Term
|
Definition
Host bus adapter.
connects a computer, which acts as the host system, to other network and storage devices. The terms are primarily used to refer to devices for connecting SCSI, Fibre Channel and SATA devices. |
|
|
Term
|
Definition
Network Attached Storage at the file-level. |
|
|
Term
|
Definition
Storage Area Network at block level. SANS either use Fibre channel or ISCSI. SANS are very expensive but well worth the money for an enterprise environment. it hosts files using shared protocols such as SAMBA or Apple File Share. |
|
|
Term
|
Definition
High Speed Packet Access. 3G cellular technology |
|
|
Term
|
Definition
|
|
Term
What are the specs of bluetooth? |
|
Definition
2.4GHz, 100 meters, 3 Mbps |
|
|
Term
What are the specs of NFC |
|
Definition
Near Field Communication (NFC) close-range communication 13.56 MHz 4 cm distance 424 Kbps |
|
|
Term
What are ANT/ANT+ used for? |
|
Definition
Health appliances. they run in 2.4 GHz band, range is 20 meters, and speed is 20 Kbps. |
|
|
Term
|
Definition
infrared technology. uses infrared light, 1+ meter range, transfer speed of 1 Gbps, requires line-of-sight. |
|
|
Term
What are the mobile deployment options |
|
Definition
COBO: Corporate Owned, Business Only COPE: Corporate Owned, Personally Enabled CYOD: Choose your own Device BYOD: Bring your own device |
|
|
Term
|
Definition
Network Access Control
A NAC system can deny network access to noncompliant devices, place them in a quarantined area, or give them only restricted access to computing resources, thus keeping insecure nodes from infecting the network. |
|
|
Term
What is mobile on-boarding? |
|
Definition
the process of making a network available to BYOD mobile devices. I.E portal sign-in page. |
|
|
Term
Access control on a SOHO router can be decided using what two things? |
|
Definition
Whitelisted or Blacklisted MAC addresses. |
|
|
Term
What power management methods are often used for critical systems? |
|
Definition
Dual Power Supplies with redundant circuitry |
|
|
Term
What are the pros and cons of offsite recovery options? |
|
Definition
cold: Takes weeks to bring online, basic office space, no equipment, cheapest. warm: takes days to bring online, some equipment but little or no data hot: takes hours to bring online, real-time synchronization, almost all data ready after an update. most expensive option. |
|
|
Term
Mission Critical equipment should have a known: |
|
Definition
Mean Time To Failure (MTTF), Mean Time to Repair (MTTR), and Mean Time Between Failures (MTBF). |
|
|
Term
|
Definition
|
|
Term
What is the difference between incremental and differential backups? |
|
Definition
Differential: Backup of all the changes since the last full backup
Incremental: Only backs up changes made from last backup |
|
|
Term
|
Definition
National Institute of Standards and Technology |
|
|
Term
|
Definition
Memorandum of Understanding. |
|
|
Term
|
Definition
|
|
Term
What are examples of high availability methods? |
|
Definition
Raid array, redundant power supply, UPS, clustering, and failover systems. it means that services aren't lost. |
|
|
Term
|
Definition
Distributed Denial-of-service. an malicious attack on a system using a network of zombies (computers or network devices) sent to overload a system and prevent others from accessing it. |
|
|
Term
DoS attacks can broadly be broken down into: |
|
Definition
volumetric, protocol, and application attacks |
|
|
Term
What is the difference between a virus and malware? |
|
Definition
Viruses do things to files and then propagate
Malware collects keystrokes and information. polymorphic and armored malware are hard to detect and destroy. |
|
|
Term
|
Definition
A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. |
|
|
Term
|
Definition
malicious software that escalates privileges to execute other things on a computer. |
|
|
Term
What is the difference between a stateful and stateless firewall? |
|
Definition
Stateless firewalls use pattern analysis and heuristics to decide which packets should be blocked. and filter based off ports and ip addresses.
Stateful Firewalls examine each packet to decide which packets should be blocked. and track the state of conversations. |
|
|
Term
|
Definition
Man-in-the-middle. A type of attack where someone "gets in the middle" of communicating devices to steal information. |
|
|
Term
|
Definition
Unified Threat Management |
|
|
Term
|
Definition
Filter traffic based on specific criteria, can be network or host based, comes in hardware and software varities. |
|
|
Term
context-and application-aware firewalls filter based on: |
|
Definition
|
|
Term
|
Definition
any machine directly exposed to the public internet |
|
|
Term
What are examples of user account management? |
|
Definition
Role seperation, Access Control Lists (ACL), and privileged account security. |
|
|
Term
What are parts of the hardening process? |
|
Definition
Patching, firmware, and driver updates. |
|
|
Term
What are the three types of physical controls? |
|
Definition
Deterrent, preventative, and detective. |
|
|
Term
_____ are temporarily used if a control is compromised or vulnerable. |
|
Definition
|
|
Term
|
Definition
a free program that can scan a system and identify any open ports, services, and devices. |
|
|
Term
|
Definition
Simple Network Management Protocol. uses UDP port 161 or 10161 when using TLS. SNMP managed devices run an agent that talks with a Network Management Station (NMS) |
|
|
Term
SNMPv1 is _____, SNMPv2 added basic ______, SNMPv3 added ____ |
|
Definition
unencrypted, encryption, TLS |
|
|
Term
What are the types of logs in Event Viewer? |
|
Definition
Application, Security, Setup, System. |
|
|
Term
|
Definition
Security Information and Event Management. SIEM tools aggregate and correlate data, allowing organization into valuable info. |
|
|
Term
What is the Network Troubleshooting Theory? |
|
Definition
To find the problem, gather information, identify the symptoms, question users, see if there have been changes.
Establish a theory of probable cause, use the OSI model, consider future prevention methods.
Test the theory, isolate variables, establish plan of action, plan out steps, implement, verify, and test. |
|
|
Term
What Wireless standards have a 2.4 GHz band? |
|
Definition
802.11
802.11b
802.11.g
802.11n is dual band |
|
|
Term
What Wireless standards are 54 Mbps? |
|
Definition
|
|
Term
What is RTP and what port is it on? |
|
Definition
Real-time transport protocol. Used for delivering media-based data.
TCP Ports 5004 & 5005 |
|
|
Term
What is SIP and what port is it on? |
|
Definition
Session Initiation Protocol. Used to create and end sessions for media connections.
TCP 5061 UDP 5060 |
|
|
Term
What is H.323 and what port is it on? |
|
Definition
A signaling protocol that provides multimedia comms over a network.
TCP 1720 |
|
|
Term
What is MGCP and what port is it on? |
|
Definition
Media Gateway Control Protocol. Used as a call control and communication protocol for VoIP networks.
UDP 2427, 2727 |
|
|
Term
What is DHCP and what port is it on? |
|
Definition
Dynamic Host Configuration Protocol. Dynamically assigns ip information.
UDP 67, 68 |
|
|
Term
What is LDAP and what port is it on? |
|
Definition
Lightweight Directory Access Protocol. Provides directory services
TCP 389
LDAPS over SSH: TCP 636 |
|
|
Term
What is the NetBIOS and what ports is it on? |
|
Definition
Network Basic Input/Output System. Provides network communication services for LANs that use NetBIOS.
TCP 139
UDP 137,138 |
|
|
Term
What is rsh and what port is it on? |
|
Definition
Remote Shell: allows commands to be executed from a remote user.
TCP 514 |
|
|
Term
What is RTSP and what port is it on? |
|
Definition
Real-time streaming protocol: communicates with a media server and controls playback of files.
TCP/UDP 554 |
|
|
Term
What is SCP and what port is it on? |
|
Definition
Secure Copy: provides a secure file-transfer service over SSH.
TCP 22 |
|
|
Term
|
Definition
a notification from an snmp agent to a manager. TCP/UDP 162
used to inform an SNMP manager when an important event happens at the Agent leve |
|
|
Term
What is telnet and what port is it on? |
|
Definition
Used to connect to a remote host via a terminal emulator.
TCP 23 |
|
|
Term
What is TFTP and what port is it on? |
|
Definition
Trivial File Transfer Protocol: transfer files with a remote host (no user auth)
UDP 69 |
|
|
Term
What is SMTP and what port is it on? |
|
Definition
Simple Mail Transfer Protocol: Used for sending email
TCP port 25 |
|
|
Term
What is SMB and what port is it on? |
|
Definition
Server Message Block: used to share files, printers, and other network resources.
TCP 445 |
|
|
Term
What is DNS and what port is it on? |
|
Definition
Domain Name System
TCP/UDP 53 |
|
|
Term
What is SNTP and what port is it on? |
|
Definition
Simple Network Time Protocol: Supports time synchronization among network devices. UDP 123
Simplified version of NTP |
|
|
Term
What is the number of channels on a T1 line and what is the speed? |
|
Definition
24 Channels and 1.544 Mbps |
|
|
Term
What is the number of channels on a T3 line and what is the speed? |
|
Definition
672 Channels and 44.736 Mbps |
|
|
Term
What is the number of channels on a E1 line and what is the speed? |
|
Definition
32 channels and 2.048 Mbps |
|
|
Term
What is the number of channels on a E3 line and what is the speed? |
|
Definition
512 Channels and 34.368 Mbps |
|
|
Term
What is the Class A IP address range and possible number of hosts? |
|
Definition
|
|
Term
What is the Class B IP address range and possible number of hosts? |
|
Definition
|
|
Term
What is the Class C IP address range and possible number of hosts? |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Fiber Optic, Multimode, 500 meters |
|
|
Term
|
Definition
Fiber Optic, single-mode or multi-mode, 5km |
|
|
Term
|
Definition
|
|
Term
|
Definition
SONET, 10 gigabit, Cat 6 (6-55m), Cat6a (100m) |
|
|
Term
|
Definition
Synchronous Optical Networking |
|
|
Term
|
Definition
Coaxial, 50 Ohm rating and has a locking BNC connector |
|
|
Term
What is Circuit Switching? |
|
Definition
The opposite of packet switching - creates a hard wired circuit between two nodes. |
|
|
Term
Cost is not included in what request? |
|
Definition
|
|
Term
100BaseTX speed and length |
|
Definition
|
|
Term
Which protocol maps ip addresses to layer 2 addresses? |
|
Definition
|
|
Term
Which network solution provides at least 50 mbps of bandwidth and supports full duplex communication? |
|
Definition
|
|
Term
What is a secure email protocol? |
|
Definition
STLS (start transport layer security) |
|
|
Term
What are 2 examples of asymmetric encryption? |
|
Definition
Eliptical Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) |
|
|
Term
What are 2 examples of symmetric encryption? |
|
Definition
Blowfish and Data Encryption Standard (DES) |
|
|
Term
What does the S stand for in fiber optic ratings? |
|
Definition
|
|
Term
What does the W stand for in fiber optic ratings? |
|
Definition
|
|
Term
What is Thicknet and THinnet and what impedence do they have? |
|
Definition
|
|
Term
TCP and UDP work at what layer of the OSI Model? |
|
Definition
|
|
Term
what layer of the OSI model does the PPP protocol work at? |
|
Definition
|
|
Term
What protocol is associated with monitoring devices on a network? |
|
Definition
SNMP (simple network management protocol) |
|
|
Term
the commands and responses passed between SNMP managers are sent as what? |
|
Definition
PDUs (Protocol Data Units) |
|
|
Term
|
Definition
attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. |
|
|
Term
Which fiber technology is best defined as Fast Ethernet? |
|
Definition
100BaseT, any 100Base is Fast Ethernet. Although T would be the main. |
|
|
Term
|
Definition
Establishes documented performance level for later comparison. |
|
|
Term
Which device can determine the length of a cable? |
|
Definition
TDR (Time Domain Refloctometer) |
|
|
Term
|
Definition
Certificate Revocation List
a list of digital certificates that have been revoked by the issuing Certificate Authority |
|
|
Term
To check the configuration of a port on a switch, what tool would you most likely use? |
|
Definition
|
|
Term
what is an initialization vector attack? |
|
Definition
Wireless network attack that modifies the IV of an encrypted wireless packet during transmission. Common. |
|
|
Term
What is a long run fiber optic cable that supports gigabit speeds? |
|
Definition
|
|
Term
What is the max distance of 1000Base-LX multi-mode fiber optic cable? |
|
Definition
|
|
Term
what tool is best used to determine what workstations are affected in an attack? |
|
Definition
|
|
Term
Redundand Systems, Raid Arrays, and _____ achieve High Availability |
|
Definition
|
|
Term
What does L stand for in fiber optic cable names? |
|
Definition
Long Distance, usually a few thousand meters |
|
|
Term
What does E stand for in fiber optic cable names? |
|
Definition
Extra long distance, tens of thousands of meters |
|
|
Term
|
Definition
Link Local Multicast Name Resolution
protocol based on the DNS packet format that allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link. |
|
|
Term
What 6 things should you consider when setting up a wireless network? |
|
Definition
Interference, Reflection, Refraction (Bend), Absorption, and Attenuation (distance), and Antenna placement |
|
|
Term
What tool would you use to check different bands to asses a wireless network? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What are the ports for the Session Initiation Protocol? |
|
Definition
|
|
Term
What port is the signaling protocol H.323? |
|
Definition
|
|
Term
What is the port for the Media Gateway Control Protocol? |
|
Definition
|
|
Term
What ports is the Lightweight Directory Access Protocol? |
|
Definition
|
|
Term
What port is LDAPS over SSH? |
|
Definition
|
|
Term
What are the port numbers for NetBios? |
|
Definition
|
|
Term
What port is the Network News Transport Protocol on? |
|
Definition
|
|
Term
What is the port number for remote shell? |
|
Definition
|
|
Term
What is the port number for the Dynamic Host Configuration Protocol? |
|
Definition
|
|
Term
what are the port numbers for the Real Time Transport Protocol? |
|
Definition
|
|
Term
What are the port numbers for the Real Time Streaming Protocol? |
|
Definition
|
|
Term
What are the port numbers for Secure Copy? |
|
Definition
|
|
Term
|
Definition
|
|
Term
What port is the Trivial File Transfer Protocol on? |
|
Definition
|
|
Term
What port is the Simple Mail Transfer Protocol on? |
|
Definition
|
|
Term
What is the port number for the Server Message Block? |
|
Definition
|
|
Term
If you have a connection to your wifi but aren't getting to your internet what is most likely the problem? |
|
Definition
Wrong password, check for an APIPA address. |
|
|
Term
Whats the GHz, max indoor range and speed of 802.11? |
|
Definition
|
|
Term
Whats the GHz, max indoor range and speed of 802.11a? |
|
Definition
|
|
Term
Whats the GHz, max indoor range and speed of 802.11b? |
|
Definition
2.4 GHz, 11 Mbps, 115 feet |
|
|
Term
Whats the GHz, max indoor range and speed of 802.11g? |
|
Definition
2.4 GHz, 54 Mbps, 125 feet |
|
|
Term
Whats the GHz, max indoor range and speed of 802.11n? |
|
Definition
2.4 GHz or 5 GHz, 150 Mbps, 230 feet |
|
|
Term
Whats the GHz, max indoor range and speed of 802.11ac? |
|
Definition
5 GHz, 866 Mbps, 115 feet |
|
|
Term
|
Definition
Internet Group Management Protocol
operates between a host and a router on the Network layer of the OSI model (3)
A network designed to deliver a multicast service uses IGMP |
|
|
Term
What colors are multimode and single mode fiber cables? |
|
Definition
Multimode are orange and single mode are yellow. |
|
|
Term
|
Definition
|
|
Term
What port is secure SNMP on? |
|
Definition
|
|
Term
What is the port for SNMP? SecureSNMP? |
|
Definition
|
|
Term
What does auto-sensing on a NIC do? |
|
Definition
determines link duplex, speed, and bandwidth |
|
|
Term
What's the connection for 10Base5? |
|
Definition
10Base5 is connected by dropping a cable from a tranceiver directly to the NIC |
|
|
Term
A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following? |
|
Definition
|
|
Term
Enterprise WAPS with a common __ work cooperatively |
|
Definition
|
|
Term
Broadcast storms can be an indication of what? |
|
Definition
Someone plugged in a switch without implementing STP |
|
|
Term
|
Definition
|
|
Term
Whats the best way to discover why a user is getting a slow internet connection? |
|
Definition
|
|
Term
What would be parts of Contingency planning? |
|
Definition
Backup Site, Restoration of order of operations, business continuity, and disaster recovery. |
|
|
Term
what are 2 advantages Switches have over hubs? |
|
Definition
Switches have smaller collision domains and hubs require crossover cables. |
|
|
Term
What part of a mobile NAC is not exclusive to it? |
|
Definition
Two-factor authentication |
|
|
Term
A honeynet is a network of ____ |
|
Definition
honeypots - devices on a network that create vulnerabilities to lure in attacks. |
|
|
Term
|
Definition
Network Intrusion Detection System |
|
|
Term
Character encoding, Data compression, and encryption/decryption take place at what layer of the OSI model? |
|
Definition
The Presentation layer (6) |
|
|
Term
What layer of the OSI model does the protocol FTP reside at? |
|
Definition
|
|
Term
|
Definition
|
|
Term
An Ethernet switch forwards LAN traffic from connected devices based on the information stored in |
|
Definition
|
|
Term
an IPv4 address is __ bits |
|
Definition
|
|
Term
an ipv6 link-local address is equivalent to an IPv4s ____ |
|
Definition
|
|
Term
An IPv6 protocol performing the function of IPv4's Address Resolution Protocol (ARP) is called: |
|
Definition
NCP - Network Control Protocol |
|
|
Term
What typically applies to a request that doesn't match the criteria defined in an ACL? |
|
Definition
|
|
Term
a _____ switch enables configuration for an entire network using a single interface |
|
Definition
|
|
Term
.224-339 is is a class ____ address |
|
Definition
|
|
Term
.240-254 is a class _ address |
|
Definition
E, reserved for future use |
|
|
Term
___ is a technology is an approach to cloud computing that facilitates network management and enables programmatically efficient network configuration in order to improve network performance and monitoring |
|
Definition
SDN - Software Defined networking |
|
|
Term
Whats the formula for calculating the number of connections in a fully meshed topology? |
|
Definition
n=number of devices/nodes
n-1
n(n-1)/2 |
|
|
Term
|
Definition
Variable Length Subnet Mask
Subnetting subnets into more specific ranges as to not have extra hosts |
|
|
Term
|
Definition
Class of Service
a way of managing traffic in a network by grouping similar types of traffic together with its own set priorities. |
|
|
Term
|
Definition
networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing QoS. |
|
|
Term
|
Definition
Enhanced Interior Gateway Protocol is an advanced distance-vector routing protocol that is used for automating routing decisions and configuration. |
|
|
Term
|
Definition
Global System for Mobile Communication |
|
|
Term
|
Definition
Time Division Multiple Access
Divides each cell channel into three time slots in order to increase the amount of data that can be carried. |
|
|
Term
|
Definition
nameserver records. used if you want to break your domain into subdomains. |
|
|
Term
|
Definition
Voip private box exchange is a business system that goes over a LAN or WAN instead of circuit switched networks |
|
|
Term
What does a UTM appliance entail? |
|
Definition
Every appliance has a firewall, VPN, and Intrusion Prevention System. |
|
|
Term
|
Definition
a VMM (virtual machine monitor) that manages and runs the VMs. (HyperV, etc).
Type 2 hypervisor runs on top of OS
Type 1 hypervisor runs directly on top of hardwarer. |
|
|
Term
|
Definition
Infiniband, networking standard used in high-performance computing that features very high throughput and very low latency. |
|
|
Term
|
Definition
Internet Small Computer System Interface.
Creates harddrives for a virtualized environment. |
|
|
Term
|
Definition
Fiber Channel Over Ethernet |
|
|
Term
|
Definition
Point-To-Point Protocol over Ethernet.
Encapsulates ppp frames inside ethernet frames. Was used for tunneling packets over a DSL connection |
|
|
Term
|
Definition
Dynamic Multipoint VPN.
DMVPN provides the capability for creating a dynamic-mesh VPN network without having to pre-configure (static) all possible tunnel end-point peers, including IPsec |
|
|
Term
|
Definition
enables the end point’s PBX to send and receive calls via Internet |
|
|
Term
|
Definition
Channel Service Unit / Data Service Unit.
digital-interface device used to connect data terminal equipment (DTE), such as a router, to a digital circuit, such as a Digital Signal 1 (DS1) T1 line |
|
|
Term
|
Definition
|
|
Term
|
Definition
Internet Security Protocol.
Secure network protocol suite that authenticates and encrypts the packets of data sent over an internet protocol network. used in VPNs |
|
|
Term
|
Definition
Software-Defined Networking. like SNMP but for cloud computing. |
|
|
Term
|
Definition
Virtual Private Address.
For one-to-many NAT, a VIP address is advertised from the NAT device (often a router), and incoming data packets destined to that VIP address are routed to different actual IP addresses (with address translation) |
|
|
Term
|
Definition
Rapid Spanning Tree Protocol
Faster convergence with topology changes than STP. backwards-compat. |
|
|
Term
What layer of the OSI model is PPP, ATM, and Frame Relay located? |
|
Definition
|
|
Term
What layer of the OSI model is ICMP and IGMP?
Also ipv4, ipv6 and IPsec |
|
Definition
|
|
Term
What layer of the OSI Model is TCP and UDP? |
|
Definition
|
|
Term
What layer of the OSI Model is NetBIOS and RTP? |
|
Definition
|
|
Term
What layer of the OSI Model is SIP, DNS, FTP, HTTP, NFS, NTP, SMTP, SNMP, Telnet, DHCP, TLS, and RADIUS at? |
|
Definition
the Application layer (7) |
|
|
Term
What is the channel bandwidth for 802.11a, b, and g? |
|
Definition
|
|
Term
Which wireless standard introduced Channel Bonding? |
|
Definition
|
|
Term
|
Definition
Cloud Access Security Broker. sits between an organizations infrastructure and a clouds and acts as a security gatekeeper. |
|
|
Term
What DNS record maps a domain name to a list of mail servers? |
|
Definition
|
|
Term
What DNS record specifies a host port and information to find specific services on the network? |
|
Definition
|
|
Term
The IEEE 802.11n standard specifies available channel bandwidth options of: |
|
Definition
|
|
Term
The IEEE 802.11ac standard specifies a maximum channel bandwidth of: |
|
Definition
|
|
Term
|
Definition
Time to Live - Hop limit mechanism |
|
|
Term
A Reverse lookup zone returns a: |
|
Definition
Domain name for a given IP address |
|
|
Term
A Forward lookup zone returns a: |
|
Definition
IP address for a given Domain name |
|
|
Term
a modular network device designed to provide a seamless link between different types of network interfaces |
|
Definition
|
|
Term
|
Definition
Optical signals to electrical signals |
|
|
Term
an SFP can convert signals back and forth from |
|
Definition
|
|
Term
SFP+ has a data transfer rate of |
|
Definition
|
|
Term
QSFP offers data transfer rates of up to: |
|
Definition
|
|
Term
A type of Ethernet interface that automatically detects the required cable connection type |
|
Definition
|
|
Term
A device designed to filter and transfer data packets between dissimilar types of computer networks is called: |
|
Definition
|
|
Term
a network bridge forwards decisions in: |
|
Definition
|
|
Term
a network switch forwards decisions in: |
|
Definition
|
|
Term
A network link consisting of two dissimilar transmission medium types requires an intermediary device known as: |
|
Definition
|
|
Term
|
Definition
Next-generation firewall. application specific layer 7 |
|
|
Term
VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: |
|
Definition
PSTN (public switched telephone network) and a POTS |
|
|
Term
An application software used to selectively block access to certain websites is an example of: |
|
Definition
|
|
Term
technology designed to provide connectivity between servers and data storage devices over fiber-optic or copper cable links? |
|
Definition
|
|
Term
lower-cost alternative to Fibre Channel technology? |
|
Definition
|
|
Term
high-speed alternative to Fibre Channel technology? |
|
Definition
|
|
Term
Packet switching technologies such as MPLS, ATM and Frame Relay are used for connecting devices on a : |
|
Definition
|
|
Term
VPN type enables direct communication links between remote hosts on a WAN? |
|
Definition
|
|
Term
A remote-line diagnostic device placed at the joining point between an ISP's line and customer's premises wiring is known as: |
|
Definition
|
|
Term
What is this a Cisco symbol for?
[image] |
|
Definition
|
|
Term
What is this a Cisco symbol for?
[image] |
|
Definition
|
|