General 1 Flashcards

(37 cards)

1
Q

CSMA/CD

A

(Carrier Sense Multiple Access with Collision Detection) - a network protocol for half-duplex lines where devices listen before sending packets by detecting if multiple transmissions collide. If transmissions collide the device will stop, send a jam signal, and wait a random time before retrying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collison domain

A

a network segment where data packets can “collide” if multiple devices try to send data simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CAM

A

Content addresable memory - a specialized, high-speed memory used in network devices like switches and routers to rapidly look up and forward data by matching content (like MAC or IP addresses) to stored entries, enabling quick decisions and efficient traffic flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SOHO network

A

Small office / home office network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Port based authentication

A

secures network access by requiring devices to prove their identity to an authentication server (like RADIUS) via an authenticator (switch/AP) before granting full network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PoE

A

Power over ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routing table

A

A list of paths to various network destinations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Netmask

A

crucial 32-bit/4 byte number in IP addressing that separates an IP address into its network part and its host part, defining the size and boundaries of a local network (subnet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-link

A

devices or IP addresses directly reachable on the same local network segment, without needing a router (gateway)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Interface

A

the connection point where a device (like a computer) meets a network, enabling data exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Metric

A

is a value that helps determine the priority of routes when there are multiple possible paths to the same destination. A lower metric value indicates a preferred route. The metric of 25 is the preferred route; it is also the default route. Metric is also sometimes called the adminis- trative distance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default route

A

(0.0.0.0) used by the router as a last resort
If the router doesnt know where to send the packet , it forwards it to the default route which connects to either the network gateway or the ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OSPF

A

Open shortest path first - a widely used, open-standard link-state routing protocol that efficiently finds the best path for IP packets within a single large network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

RIP

A

Routing information protocol - an older, simple distance-vector routing protocol that helps routers find the best path for data using hop count (number of routers) as its metric, limited to 15 hops,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

BGP

A

Boarder gateway protocol -the core routing protocol of the internet, acting like a postal service that directs data between different networks (Autonomous Systems, or ASes) by exchanging reachability information and choosing the most efficient paths, using policies and rules, not just shortest distance, to send traffic across the global network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ACL

A

Access control list - a set of rules on a router, firewall, or switch that filters network traffic, deciding whether to permit or deny packets based on criteria like source/destination IP, protocol, and port numbers

17
Q

IDS

A

Intrusion Detection system - monitors traffic and flags suspicious activity without stopping it (passive)

18
Q

IPS

A

Intrusion prevention system - directly addresses the threat by preventing access based on intelligence

19
Q

Passive versus proactive roles of IDS and IPs

A

IPS is proactive : it continuously analyzes traffic with the adidability to take a immediate action .

IDS is passive : it acts as an early warning system but does not block .

20
Q

Signature based vs behavioral based detection for firewalls

A

Behavioral based :focuses on anomalies from normal traffic patterns * useful for detecting new threats

Signature based : matches traffic against a database of known threats .* requires regular updates to remain effective

21
Q

Indicators of a threat (firewalls)

A

DDOS Signal : a massive spike in traffic from a single ip address .

Malware signal : data packets containing specific signatures

Exhilaration signal : a sudden transfer of sensitive data to an unfamiliar location

22
Q

What is inline analysis and which firewall system uses it

A

IPS is used for inline analysis

It is placed in front of incoming traffic so that it can Inspect and potentially block packets as they pass through in real time .

23
Q

How does IDS/IPS gather information

A

Sensors and collectors

User behavioral analytics (used to determine baseline activity)

Signature database (a reference library of known attack methods and viruses)

24
Q

The downside of high volume IDS amd IPS inspection

A

Bottlenecks - large volumes of traffic inspection can degrade network performance . Solution use a load balancer

25
SMB
Server Message Block - a network protocol for sharing files, printers, and other resources
26
LUNs
Logical Unit Number - a unique identifier for a logical disk or storage partition in a (SAN), allowing servers to access specific volumes (physical disks, RAID groups, or subsets) as if they were local drives
27
FCP
Fibre Channel Protocol - a high-speed protocol for connecting servers to storage in (SANs) by carrying SCSI commands over dedicated Fibre Channel (FC) networks, enabling block-level storage access.
28
Fc switches
Fibre Channel switches
29
HBAs
Host Bus Adapters - used to connect servers to storage devices (like SANs)
30
WLC
Wireless LAN controller - centrally manage multiple Wi-Fi Access Points (APs), simplifying deployment, configuration, security, and roaming for large networks
31
iSCP
Intelligent Service Control Protocol - used by SANS to allow them to communicate over the ethernet
32
CDN
Content delivery network - a global network of servers that stores caches of website content closer to users
33
SaaS
Software as a service (often deployed in different regions using CDN)
34
SSID
The name of the wirless network (to identify the network before connecting)
35
BSSID
The unique identifier assigned to each AP withing a wirless network(ussually the mac address of the APs wireless interface)
36
ESSID
The identifier for the entire wirless network (especially when there are multiple APs involved)
37
Autonomous AP vs LWAP
Autonomous APs do everything required to manage networks on their own (small networks) whereas LAWAPs connect to a central controller that handles most of the important tasks (large networks)