• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/168

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

168 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
LLC is defined under what IEEE standard?

What OSI model layer?
802.2

OSI Layer 2 (Data-link)
MAC is defined under what IEEE standard?

What layer of OSI model?
802.3

OSI Layer 2 (Data-link)
What encapsulates data into frames and starts frame transmission and recovery?
MAC

Framing is created in layer 2.
How many bits are in a MAC address?
48 bit
12 digit alpha-numeric.
What is OUI?
Organizationally unique identifier

First 6 digits of a MAC designate the vendor. (First 24 bits)

Last 6 digits are random. (Last 24 bits)
What is the maximum MTU of an Ethernet frame?
1500 bytes
What is CIDR?
Classless Inter-Domain Routing

Uses /XX to denote the network bits.

Example 192.168.5.20 /24
What is the maximum number of nodes (hosts) under an AppleTalk non-extended network?
AppleTalk NE uses 1-1024 (10bit)

NE can only have 1 AppleTalk zone.
List the 4 AppleTalk media access protocols.
EtherTalk
TokenTalk
FDDITalk
LocalTalk
How many bits are in AppleTalk's network address?
48 bits

network 16 - node 16 - socket 16
What is RTMP?
Routing Table Maintenance Protocol

Based on RIP, stores dynamic info on routers, uses hop count metrics.

For AppleTalk networks.
What type of network address is this?

00000001:1c.0f1e.8d7a.a36c
IPX/SPX

Network + Node separated by colon.
32 bit network + 48 bit MAC = 80 bits
What does TCP and UDP stand for?
Transmission Control Protocol
and
User Datagram Protocol
FTP uses which ports?
FTP uses TCP ports 20 and 21
What port does IMAP4 use?
IMAP4 uses TCP 143
HTTPS uses what port?
HTTPS uses TCP port 443
Telnet uses what port?
Telnet uses TCP port 23
SSH uses what port?
SSH uses TCP port 22
NNTP uses what port?
NNTP uses port 119
SMTP uses what port?
SMTP uses TCP port 25
DNS uses what port?
DNS uses UDP port 53
What kind of packets have no connection, no reliability, no flow control, no error recovery, and a smaller overhead?
UDP

User Datagram Protocol
WINS uses what port?
WINS uses TCP/UDP port 42
TFTP uses what port?
TFTP uses UDP port 69
What packet format only has 4 fields?
UDP

User Datagram Protocol
NTP uses what port?
NTP uses port 123

Network Time Protocol
LMHOSTS is mostly used for what?
Addressing NetBIOS names to logical IP addresses

Used when WINS fails or as a static version
The HOSTS file is used for what?
Used to statically assigning FQDN names to IP addresses.
Ex) www.google.com to 74.125.127.100

Used when DNS fails.
What is LDAP?
Lightweight Directory Access Protocol

Allows clients/servers to access the active directory database
What is NAT?
Network Address Translation

"IP Masquerading"

Allows many hosts to access the Internet via a single IP address.
What is ICMP and what port does it use?
Internet Control Message Protocol

Used to troubleshoot and diagnose network problems. Ping and traceroute use ICMP.

ICMP is encapsulated in an IP datagram, it does not have it's own port number.
What is IGMP?
Internet Group Multicast Protocol

Standard for IP multicasting on the Internet.
What is LPR or LPD?
Line Printer Remote

Provides network print services and spooling.

LPD is installed on printer/print server.

LPR is installed on client devices.
What switching method involves opening a channel to provide full duplex communication with a set bandwidth?
Circuit switched

Think telephone conversations
What switching method involves the use of multiplexing and is used by ATM, Frame Relay, SMDS, and X.25?
Packet switched
This high performance, flexible WAN protocol uses packet switching and is strictly a layer 2 (data-link) suite. It is more efficient and better performing than X.25 and uses DLCI for layer 2 addressing.

What is it?
Frame Relay
This service uses 2 64 kbps 'B' channels and a single 16 kbps D channel to provide internet access.

What is it?
ISDN BRI

Basic Rate Interface

128kbps for data (B)
16kbps for broadcast (D)
144 kbps total
This service uses 23 64 kbps 'B' channels and a single 64kbps 'D' channel to provide Internet access.

What is it?
ISDN PRI

1.544 mbps

(same as T1)
What is DCE?
Data Communication Equipment

Examples: modems, CSU/DSU, multiplexers, protocol translators

This is the device between you and your provider.
What is DTE?
Data Terminal Equipment

This is most often going to be the terminal equipment at your provider.
What is the speed of T3, and how many T1 lines make up at T3 trunk?
45 mbps

T3 = 28 T1 lines

Also remember that E3 (the European version of T3) is 34 mbps.
What is the speed of OC1?
51.85 mbps
Knowing that OC1 is 51.84 mbps, what is the speed of OC3?
155.52 mbps
Knowing that OC1 is 51.84 mbps, what is the speed of OC-12?
622.08 mbps
Knowing that OC1 is 51.84 mbps, what is the speed of OC-24?
1.244 gbps
Knowing that OC1 is 51.84 mbps, what is the speed of OC-48?
2.488 gbps
Knowing that OC1 is 51.84 mbps, what is the speed of OC-192?
9.952 gbps
This oldest and least used WAN protocol uses packet switching and emerged in the 1970's when the need arose for a WAN standard.

What is it?
X.25

Uses PAD- Packet Assembler/Disassembler
This IP telephony signaling protocol is primarily used for voice over IP (VoIP) calls, though with some extensions it can also be used for instant messaging.

What is it?
SIP

Session Initiation Protocol

This VOIP protocol is mainly used to initiate the connection or session between remote users. This is not to be confused with RTP, which actually carries the data.
This protocol defines a standardized packet format for delivering audio and video over the Internet. This is used most commonly in VOIP applications.

What is it?
RTP

Real-time Transfer Protocol

This is the protocol that actually transports the data for voice/video communications and is commonly used in VOIP. This is not to be confused with SIP, which is for initiating the session.
This layer 2 protocol is used for addressing network layer logical addresses to data-link MAC addresses and for caching this information for convenience and efficiency.

What is it?
ARP

Address Resolution Protocol

Common commands:
arp -a (displays) arp -s (adds)
This IP protocol is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
SNMP

Simple Network Management Protocol

Typically, SNMP uses UDP ports 161 for the agent and 162 for the manager.
This is a communications protocol used to manage the membership of Internet Protocol multicast groups.

What is it?
IGMP

Internet Group Management Protocol

This does not use a set port.
A cryptographic protocol that provides security for communications over networks such as the Internet.

Think transport layer
TLS

Transport Layer Security

SSL is the predecessor of TLS.
What is the port number for BOOTPS/DHCP?
BOOTPS/DHCP uses port number 67
What port number is SNMP?
SNMP uses port 161
What kind of address is this?

2001:0db8:85a3:0000:0000:8a2e:0370:7334
This is IPV6

IPV6 uses a 128 bit, 32 digit, hexadecimal format.
What kind of address is this?

192.168.1.101
This is IPV4

More specifically, this is a class C ip address since it's first octet is in the 192-223 range.
What kind of address is this? How many bits?

01:23:45:67:89:ab
This is a physical MAC address. MAC addresses have 12 hexadecimal digits and are 48 bit.
Your company owns the ip address, 207.14.3.0/24, and they want to subnet this into 2.

What will the new subnet be, and what are the ranges for each subnet?
Subnet will be: 207.14.3.192

Subnet 1: X.X.X.1--X.X.X.127
Subnet 2: X.X.X.128--x.x.x.254

We get 192 because under the bit table, 2 (2^1) is the second from the bottom. One the other table, the second from the bottom is 192, so that is how we determine the subnet.

128, 64, 32, 16, 8, 4, (2), 1

255, 254, 252, 248, 240, 224, (192), 128

Take the possible amount of numbers from 0-255 (256) and subtract 2 (for the 0 and 255) and that gives us 254. Since we have 2 subnets, divide that into 2 and that gives us our ranges.
Use the table:

128 64 32 16 8 4 2 1
255 254 252 248 240 224 192 128

Match the amount of subnets with the first table (or number >= ) and then correspond it's position to the second table for the subnet. Then just divide the subnets into mulitples of the amount of subnets.
Your company owns the class C IP of, 207.14.3.0/24, and they want to now subnet this into 10 different subnets to represent the 10 departments.

What will the subnet mask be?
How many IPs per subnet?
What will be the ranges for these 10 subnets?
Subnet: 207.14.3.240
25 IPs per subnet

.1-25 | .26-50 | .51-75 | .76-100
.101-125 | .126-150 | .151-175
.176-200 | .201-225 | .226-250

We know that we need 10 subnets, so from the subet table, the closest number to 10 without being less than is 16. This is the 5th from the bottom, which corresponds to 240 on the other table.

Since we take 256 and subtract 2 for the 0 (network) and 255 (broadcast) addresses, this leaves us with 254 possible IPs. The most multiples of 10 you can put in 254 is 25. As you can see, there are 4 leftover ips available for a 26th subnet of 4 if needed. (Irrelevant)

128 64 32 (16) 8 4 2 1
255 254 252 248 (240) 224 192 128

Now you just take those 25 addresses and start from the bottom, going all the way to 10 subnets.
What is PAT?
Port Address Translation

(similar to NAT)
What is SNAT?
Source Network Address Translation

Involves translation of the source IP address and/or source port is called source NAT or SNAT. This re-writes the IP address and/or port number of the computer which originated the packet.

Also known as Secure NAT by M'soft, Stateful NAT by Cisco, and Softwires Network Address Translation by IETF.
What type of address is this?

169.254.40.85
APIPA

Anything in the 169 range is APIPA, where the DHCP server cannot be reached. This is used as a failsafe to provide an internal network between computers as part of a peer to peer environment in the event of a failure.
The sending of information packets to a single network destination is known as what kind of transmission?
Unicast
What wireless standard operates at 11, 5.5, 2, and 1 mbps and on the 2.4 GHz frequency band?
802.11b

Far distances and/or more users will make the speed fall back to what it can handle.

Remember that this is not compatible with 802.11a.
What wireless standard operates at 54 mbps and 2.4 GHz frequency band?
802.11g

Not compatible with 802.11a, although it is backwards compatible with 802.11b but the speed will fall back to the 11mbps.
What wireless standard operates at 54 mbps and 5 GHz frequency band?
802.11a

Although it came before 802.11b, this standard offers more speed and a higher frequency band.

The downside is that it is not compatible with other 802.11 standards such as b/g/n.
This wireless technology uses light to carry data, can operate at up to 4 mbps, and uses line of sight up to 18 inches.

What is it?
IR

Infrared

(Think remotes)
This splits info over a radio channel frequencies. Data is sent to almost all of the channels before being demodulated (or combined) at the receiving radio system.

What is it?
DSSS

Direct Sequence Spread Spectrum

The stream is divided into small chunks which are assigned to frequency channels across the spectrum. This offers better performance than FHSS but it is more susceptible to interference.

802.11b uses this as well as cordless phones operating in the 900 MHz, 2.4 GHZ and 5.8 GHz bands.
This is a frequency-division multiplexing (FDM) scheme utilized as a digital multi-carrier modulation method. A large number of closely-spaced orthogonal sub-carriers are used to carry data. This spectrum type is the basis for 802.11a/g/n.

What is it?
OFDM

Orthogonal Frequency-Division Multiplexing
This uses repeat swapping (or hopping) of frequencies or channels during transmission and was originally used to minimize the effects of electronic eavesdropping, interference, and jamming during WWII.

What is it?
FHSS

Frequency Hopping Spread Spectrum
This is short range wireless standard can operate at up to 3 mbps and is widely used in cell phones/PDAs to create PANs.

What is it?
Bluetooth
This access protocol accesses remote networks using serial ports and modems.
SLIP

Serial Line Internet Protocol

Packet based protocol for IP only.
(replaced by PPP)
This data link protocol is commonly used to establish a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression.

This is more feature rich than SLIP because it does not have to be configured to the extent that SLIP does.

What is it?
PPP

Point to Point Protocol

PPP supports IP, IPX, DECNET as well as multiplexing.

HDLC frames datagrams over serial links
LCP for connection management
NCP for multiprotocol support
True or False

Cable modems and DSL modems both use PPPoE.
True

Point to Point over Ethernet enables modems to service LANs by encapsulating PPP into an Ethernet frame.
This outdated service is for remote networking through dial-up connectivity from remote users/LANs. This uses a client/server software for access.

What is it?
RAS

Remote Access Service
(replaced by RRAS)

RAS uses modem dial-up, X.25, or a WAN link and works with networking protocols like NetBEUI, IPX, and TCP/IP.

Client and server need special RAS software in order to establish connection.
Remote connectivity used by Linux and Microsoft to get access to GUI of workstation to work remotely.

What is it?
RDP

Remote Desktop Protocol

RPD server listens on port 3389.
This service enables hosts to access the internet through a single computer's internet connection by sharing a single IP address.

What is it?
ICS

Internet Connection Sharing

ICS uses DHCP and NAT.

ICS can be used with just about all major internet connection types including dial-up.
True/False

In order to provide max connectivity, you should put a RAS server in a DMZ.
True
Novell Open Enterprise Server uses what linux-based OS?
SuSe
This is an encrypted connection over a public network between terminating points of two or more private networks.

What is it?
VPN

Virtual Private Network
This is a framework of open standards that operates at the network layer to encrypt and authenticate IP packets between peers.

Which tunnelling protocol is this?
IPSec

Provides 4 core services:

Confidentiality
Data Integrity
Authentication
Anti-replay
This tunnelling protocol combines Microsoft's PPTP and Cisco's L2F to support VPN tunnelling that supports multiple protocols and NAT.

What is it?
L2TP
This encrypts data over the www for confidentiality and uses public key infrastructure (PKI).
SSL

Secure Socket Layer

This is used as the main protocol for secure transactions between web browsers and servers and is commonly implemented in e-commerce sites that involve monetary transactions.
This widely used and flawed wireless security implementation is used to prevent eavesdropping, packet capture, and unauthorized use of private network access.

What is it?
WEP

Wired Equivalent Privacy
This wireless security implementation is meant to be used with RADIUS or TACACST although it can also run on personal networks. It uses strong 48 or 128 bit keys which can change rapidly and offers improved payload integrity and secure message authentication.

What is it?
WPA

Wi-Fi Protected Access
What is PAP?
Password Authentication Protocol

The most basic form where credentials are compared to table of name/password pairs.

Basic authentication of clear text http.
This verifies client's identity at regular intervals using a 3 way handshake.

What is it?
CHAP

Challenge Handshake Authentication Protocol

CHAP agents sends client a key used to encrypt the username/password. CHAP also sends challenges at regular intervals to ensure that the client computer is who it says it is.

MS-CHAP is Microsoft's variant of the same authentication method but it also is integrated with the OS to prevent unauthorized access.
This stores authentication information, records access to objects/resources, and keeps up with start/stop time for different services.

What is it?
RADIUS

Remote Authentication Dial In User Service

Credentials are passed to a NAS via PPP and then forwarded to the RADIUS server.

Good for keeping up with records of access for security and billing purposes.
This is used in Unix and Cisco infrastructures for authentication and authorization with limited accounting. It stores usernames and passwords, encrypts commnication to NAS, and authorizes centralized management for remote sites.

What is it?
TACACS

Terminal Access Controller Access Control System

For better accounting, or keeping records of access, you would be better off going with RADIUS.
In the AAA process, what is accounting?

Hint: AAA= Authentication, Authorization, Accounting
Accounting refers to keeping up with what services a host uses on the network and how long it uses them.

A good example would be an ISP keeping record of how long you stayed online and how much bandwidth you used up during your sessions. This is used for billing but can also be used for security purposes.
What is EAP?
Extensible Authentication Protocol

This protocol can be used in various scenarios to authenticate a user because of it's entensible nature. What I mean by this is that it can be modified for specific applications such as passwords, tokens, digital certificates, and even security clearance badges.

WPA and WPA2 use 5 different types of EAP.
This IETF authentication standard uses a central ticket granting server to authenticate instead of using usernames & passwords.

What is it?
Kerberos

Time sensitive encrypted tickets are transmitted back and forth to authenticate OS's and applications without having to send usernames and passwords that could potentially be intercepted and cracked.

KDC = Kerberos Distribution Center
This is a dynamic interior gateway protocol that routes Internet Protocol (IP) packets solely within a single routing domain (autonomous system). It gathers link state information from available routers and constructs a topology map of the network.

While very similar to IS-IS, this protocol is used more often in enterprise networks while IS-IS is used more often by ISP's.
OSPF

Open Shortest Path First

OSPF is perhaps the most widely-used interior gateway protocol (IGP) in large enterprise networks.

OSPF was designed to support variable-length subnet masking (VLSM) and Classless Inter-Domain Routing (CIDR) addressing models.

OSPF detects changes in the topology, such as link failures, very quickly and converges on a new loop-free routing structure within seconds. It computes the shortest path tree for each route using a method based on Dijkstra's algorithm, a shortest path first algorithm.
This protocol is used by network devices (routers) to determine the best way to forward datagrams through a packet-switched network. While very similar to OSPF, this protocol has the advantages of being able to map more routers and also easily adjusts to IPV6 without needing much overhaul. Also like OSPF, this uses link state information to determine dynamic routing paths in the network.

What is it?
IS-IS

Intermediate System to Intermediate System

IS-IS is an Interior Gateway Protocol (IGP) meaning that it is intended for use within an administrative domain or network. It is not intended for routing between Autonomous Systems. Like OSPF, IS-IS supports variable length subnet masks (VLSM) and it multicasts to find and map it's neighboring topology for fast efficient routing.
This dynamic routing protocol is used in local and wide area networks. As such it is classified as an interior gateway protocol (IGP). It uses the distance-vector routing algorithm and is considered by many to be absolete in the light of many newer routing protocols such as OSPF.

What is it?
RIP

Routing Information Protocol

RIP is a distance-vector routing protocol, which employs the hop count as a routing metric. The hold down time is 180 seconds. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15. This hop limit, however, also limits the size of networks that RIP can support.

Slow convergence compared to OSPF, IS-IS, and EIGRP.
True/False

RIP v2 supports CIDR.
True

RIP v2 supports CIDR but in order to be backwards compatible it still has a hop limit of 15 which limits the size of the network in which it can route.
This now obsolete distance vector interior routing protocol (IGP) was invented by Cisco and is used by routers to exchange routing data within an autonomous system.

What is it?
IGRP

Interior Gateway Routing Protocol

IGRP is a proprietary protocol. IGRP was created in part to overcome the limitations of RIP (maximum hop count of only 15, and a single routing metric) when used within large networks. IGRP supports multiple metrics for each route, including bandwidth, delay, load, MTU, and reliability;

It is now obsolete as EIGRP has totally replaced it.
What is EIGRP and what advantages does it have over standard IGRP?
EIGRP

Enhanced Interior Gateway Routing Protocol

In order to address the issues of address space and other factors, Cisco created EIGRP (Enhanced Interior Gateway Routing Protocol). EIGRP adds support for VLSM (variable length subnet mask) and adds the Diffusing Update Algorithm (DUAL) in order to improve routing and provide a loopless environment. EIGRP has completely replaced IGRP, making IGRP an obsolete routing protocol.
What is convergence?
Convergence is the state of a routing network that is completely and definitively mapped so that all routers agree on the correct topological layout and the correct pathways for the fastest and most efficient transport of data.
What is the difference between EGP and IGP?
IGP is a routing protocol that is used IN an autonomous system while EGP is the protocol that linked the EXTERIOR of autonomous systems together.
This IEEE wireless standard improves upon 802.11b/g by doubling the 20 MHz channel width to allow 40 MHz MIMO that can potentially achieve a data rate of 600 mbps.

What is it?
802.11n

Performs well up to ~300 ft. Uses 2.4 and 5 GHz frequencies. 14 total channels.

802.11n achieves such high speeds by using multiple antennas and MIMO (Multiple In Multiple Out) technology to spatially multiplex the signal allowing for incredible throughput capabilities.
What is TKIP and it's relation to WPA?
TKIP

Temporal Key Integrity Protocol

TKIP was implemented as a result of the need for a more secure wireless standard in light of WEP's vulnerability flaws. TKIP and WPA are synonymous in many technical circles.
True or False

CAT 3 can be used at speeds of 100 mbps.
True

While normal telephone cable cannot achieve any more than 10 mbps, there are cable standards such as 100BASE-T4 and 100BASE-T2 that do indeed use CAT 3 UTP.
What is the maximum speed of CAT 4 UTP?
16 mbps
20 MHz BW
4 wire pairs (8 wires)

CAT 4 is an older standard that was mostly used in token ring networks. It was quickly replaced by CAT 5.
What are the specifications for CAT 5?

Max speed?
Performance in MHz?
How many cable pairs?
CAT 5

Up to 1,000 mbps (1gbps)
100 MHz
4 wire pairs (8 wires)
What are the differences between CAT5 and CAT5e?
High quality copper.
High twist ratio for decreased crosstalk.
350 MHz instead of 100 MHz
What are the specifications of CAT 6?

Max speed?
Performance?
How many pairs?
CAT 6

1000 mbps (1 gbps)
250 MHz
4 pairs (8 wires)

Remember that CAT 6e can be used for up to 10gbps.
What is the difference between STP and UTP?
Shielded Twisted Pair cable is insulated with a foil wrapper that reduces interference (ingress), but is also quite a bit more expensive due to the extra material required to produce it.

By the way, UTP stands for Unshielded Twisted Pair.
What is the 5-4-3 rule?
According to the 5-4-3 rule, between 2 communicating nodes there can only be:

5 (or less) network segments
4 (or less) repeaters
3 (or less) populated networks
Expalin the specifications of 10BASE-T.
10mbps
Baseband transmission
"T" is for twisted pair cabling
Distance: 100m (328 ft)
CAT 3 or higher UTP
Star topology
Explain the specifications of 10BASE-FL.
10mbps
Baseband transmission
Distance: 1000m (1 km, 3,200ft)
2000m 2 km 1.2mi if used with repeater
Uses MultiMode Fiber
Star topology
Explain the specifications of 100BASE-TX.
100 mbps
Baseband transmission
"T" is for twisted pair cabling
The "X" just shows that it's for fast ethernet (100 mbps)
Distance: 100m (328 ft)
CAT 5 or higher UTP
Star topology
Explain the specifications of 1000BASE-T.
1000BASE-T

1000 mbps (1 gbps)
Baseband transmission
"T" is for twisted pair cabling
Distance: 100m (328 ft)
CAT 5 or higher (CAT5e preferred)
Star topology
What cable type offers the shortest distance of only 25 meters (82 ft), offers speed up to 1gbps, and is typically used for server rooms and short distance communications?
1000BASE-CX

1000 mbps
Baseband transmission
Copper twinaxial cable
Star topology
(rarely used)
Explain the specifications of 100BASE-FX.
100BASE-FX

100 mbps
Baseband transmission
"F" is for fiber cabling
Distance:
Full Duplex- 2000m (2 km, 1.2mi)
Half Duplex- 412m (1,300 ft)
Multi-Mode Fiber
Star topology
Explain the specifications of 1000BASE-LX.
1000BASE-LX

1000 mbps (1 gbps)
Baseband transmission
"LX" means long wavelengths
Distance:
SMF- 5000m (5km, 3mi)
MMF- 550m (1,800 ft)
Uses SMF or MMF
Star topology

Remember that long wavelengths travel further than short wavelengths.

LX/LR = Longer distances
SX/SR = Shorter distances
Explain the specifications of 1000BASE-SX.
1000BASE-SX

1000 mbps (1 gbps)
Baseband transmission
"S" means short wavelengths
Distances: up to 500m (1,600 ft)
Multi-Mode Fiber
Star topology
Explain the specifications of 10GBASE-SR.
10GBASE-SR

10 gbps
Baseband transmission
"S" means short reach
Distance: up to 300m (984 ft)
Multi-Mode Fiber
Star topology
Explain the specifications of 10GBASE-LR.
10GBASE-LR

10 gbps
Baseband transmission
"LR" means long reach
Distance: 10,000 m (10 km, 6.2 mi)
Single Mode Fiber
Star topology
Explain the specifications of 10GBASE-ER.
10GBASE-ER

10 gbps
Baseband transmission
Distance: 40,000 m (40 km, almost 25 mi)
Single Mode Fiber
Star topology
What is the nickname for 10BASE2 and what are it's specifications?
10BASE2
"Thin net" (Thin Ethernet)
10 mbps
Baseband transmission
Distance: 185m (roughly 200m)
Outdated, used for bus topologies in the 1980's but may still be around.
What is the nickname for 10BASE5 and what are it's specifications?
10BASE5
"Thick net" (Thick Ethernet)
Baseband transmission
Distance: 500m (1,600 ft)
Outdated, used on older networks.
What is RG-6?
"RG-6" is generally used to refer to coaxial cables with an 18 AWG center conductor and 75 ohm characteristic impedance.

This is what you find in most homes that are serviced by cable and satellite tv.
What is RG-59?
RG-59/U is a specific type of coaxial cable, often used for low-power video and RF signal connections. The cable has a characteristic impedance of 75 ohms.

The conductive core is smaller in diameter than RG-6 and because of that, RG-59 is intended only for short distances.
What is plenum grade cable?
Plenum cable is jacketed with a fire retardant plastic jacket of either a low-smoke polyvinyl chloride (PVC) {patented 1987} or a fluorinated ethylene polymer (FEP). This is used in areas that are susceptible to a building fire to prevent the cable from burning or putting off toxic smoke for safety purposes.
What is BNC?
Though it has many names, just remember that this is a screw on barrell connector used for coaxial connections. Bus topology uses these to connect to the cable bus using vampire taps/Y-adapters.
Token rings use what kind of topology?
Token Ring
Which topology provides the most redundancy but is also the most expensive to install?
Mesh

Because mesh links every host to every other host on the network directly, it is the most redundant but also the most expensive due to the excess of cabling/equipment that makes it possible.
What do the 568a and 568b standards refer to?
They represent two different ways to terminate an RJ-45 cable.
True/False?

To link hubs together, you would need a straight patch cable.
False

Since you are connecting two network devices together directly, you would need a crossover cable or the devices would not be able to communicate because of the order in which the wires are ordered.
What is ADSL?
Asymetric Digital Subscriber Line

The distinguishing characteristic of ADSL over other forms of DSL is that the volume of data flow is greater in one direction than the other.

I.E. 3 mbps down, 1 mbps up

While some variants can extend up to 5 miles, remember that the test is going to refer to the limit as 18,000 ft as the maximim distance for DSL
What is SDSL?
Symetric Digital Subscriber Line

Internet service that runs over one pair of copper wires, with a maximum range of 10,000 feet (3,000 m). It cannot co-exist with a conventional voice service on the same pair as it takes over the entire bandwidth.

The upstream/downstream rates are the same, therefore it's symetrical.
What is VDSL?
Very high bitrate Digital Subscriber Line

VDSL (or VHDSL) is a communications service that uses POTS line to provide very high bandwidth over relatively short distances.

Up to 100 mbps can be achieved, but it can only be extended 300 m before the signal starts to degrade.
Is token ring CSMA/CD or CSMA/CA?
Since it is impossible for token ring to have packet collisions, it is CSMA/CA.

CA is collision avoidance, CD is collision detection.
Explain the specifications for 10GBASE-SW.
10GBASE-SW

10 gbps
Baseband transmission
"S" for short wave
Distance: 300 m
Multi-Mode Fiber
Computers sending and recieving data between each other in a small office is an example of what type of network?
Peer to peer
What is a DEMARC and where does it begin?
The demarcation point is the point at which the telephone company network ends and connects with the wiring at the customer premises.
What type of NID is used to test telephony systems with diagnostic software?
a "Smart Jack"
A device that converts an AUX port to an RJ-45 is an example of what type of converter?
Media Converter
This is software and/or hardware designed to detect unwanted attempts at accessing, manipulating, and/or disabling of computer systems, mainly through a network, such as the Internet.

What is it?
IDS

Intrusion Detection System
This is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real-time, to block or prevent those activities.

What is it?
IPS

Intrusion Prevention System
You are FTP'ing into a webserver to get sensitive information. How safe is that connection, and how could you improve upon the security?
FTP is not encrypted, so you would be exposed to the internet and anyone that wanted to sniff the packets could very easily.

SFTP using port 22 would improve this situation by encypting the information transferred.
This useful switch service provides "virtual" segments depending on what physical ports the computers are connected to on the switch.

What is it?
VLAN

Virtual Local Area Network

- Provides improved bandwidth
- Provides increased security
- Flexible to change
What is trunking?
Trunking is the process of taking multiple VLANs and multiplexing them together.
What does a multilayer switch provide?
A multilayer switch provides layer 2 function while also routing packets and other layer 3 functions and features such as QoS, ip fragmentation, and access list security.

Uses store and forward switching. These can be used to totally bypass routers.
What layer of the OSI model does a brouter belong to?
Because a brouter is both a bridge and a router, it can provide both layer 2 and 3 functionality.
What are the 7 steps in troubleshooting a problem?
1. Define the problem
2. Gather data
3. Isolate the problem
4. Formulate a plan of action
5. Implement a solution
6. Observe the results
7. Document everything
This Windows command clears the arp cache.

What is it?
arp -d
What is TTL and how is it used?
TTL

Time To Live

This is a set number that will decrement every time the packet hits a router. Once it hits 0, the packet will be lost.

An example of this is a ping.
This is a packet-oriented transfer method that uses asynchronous time division multiplexing (TDM) techniques. It encodes data into small fixed-sized cells (cell relay) and provides data link layer services that run over OSI Layer 1 physical links.

What is it?
ATM

Asynchronous Transfer Mode

It encodes data into small fixed-sized cells (cell relay) and provides data link layer services that run over OSI Layer 1 physical links. This differs from other technologies based on packet-switched networks (such as the Internet Protocol or Ethernet), in which variable sized packets (known as frames when referencing Layer 2) are used. ATM exposes properties from both circuit switched and small packet switched networking, making it suitable for wide area data networking as well as real-time media transport.
What is SONET and what does it involve?
Synchronous Optical Networking

These are standardized multiplexing protocols that transfer multiple digital bit streams over optical fiber using lasers or light-emitting diodes (LEDs).
This is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next. This makes "virtual links" between nodes.

What is it?
MPLS

Multiprotocol Label Switching

MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol.
What is the term '25 pair' referring to?
It's a color code chart for telecommunications wiring. There are 25 different possible coloring pairs, thus the name.
This is a Layer 2 link management protocol that provides path redundancy while preventing undesirable loops in the network.

What is it?
STP

Spanning Tree Protocol

For a Layer 2 Ethernet network to function properly, only one active path can exist between any two stations. Spanning tree operation is transparent to end stations, which cannot detect whether they are connected to a single LAN segment or a switched LAN of multiple segments.
This is a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux (Unix) or Macintosh OS X operating system.

What is it?
dig
This unix/linux command combines the functionality of the traceroute and ping programs in a single network diagnostic tool.

What is it?
mtr
What is the unix equivalent of Window's ipconfig command?
IFCONFIG
You have been told that a possible cable break has occurred. The segment in question is very long and extends throughout the building. What tool could you use to find the exact distance on the line where the fault is?
TDR

Time Domain Reflectometer

If it is a fiber optics line, you would use an OTDR. 'O' is for optical.
What is a butt set?
Also known as a "lineman's headset", a butt set is a device that is used to test telephone lines for connectivity.

Basically, you have two different wire clamps attached to a telephone test box that you would physically clamp to the telephone pair and you could listen for a dial tone or even dial out all without the wires actually touching. In other words, the twisted copper lines do not have to be bare in order to test the line.
A voltage event recorder is used for what?
A voltage event recorder is used to monitor and datalog the electrical flow and can spot sags, swells, transients, outages and frequency variations that could affect electrical equipment.
Instead of using telnet, what could you implement that would dramatically increase the security of your file sharing network resources?
SSH

Secure Shell

(port 22)
You are surfing the web and notice that your bank website is using a secure connection because the address prefix is different.

What is this, and what port number does it use?
HTTPS

Secure HTTP

(uses port 443)
What is a smurf attack?
In such an attack, a perpetrator sends a large amount of ICMP echo request (ping) traffic to IP broadcast addresses, all of which have a spoofed source IP address of the intended victim. If the routing device delivering traffic to those broadcast addresses delivers the IP broadcast to all hosts (for example via a layer 2 broadcast), most hosts on that IP network will take the ICMP echo request and reply to it with an echo reply, multiplying the traffic by the number of hosts responding. On a multi-access broadcast network, hundreds of machines might reply to each packet.
What is a DoS attack?
Denial of Service

This refers to any attack that is specifically designed to take down a service or function of a service such as a website or server.

A 'DDOS' attack has the same basic idea, only it uses multiple attackers. Hackers can use botnets (armies of infected computers) to wreak havoc upon websites and computers by sending junk data that is designed to overload or crash the resource or service.
What is a "Man In The Middle" attack?
A MITM attack occurs when a hacker gets inbetween a connection between two hosts and can intercept, eavesdrop, or even inject information into the conversation without the host knowing.
What are the 3 best ways to prevent social engineering and other malicious activities from interrupting your network or services?
Policies and procedures
User training
Patches and updates