Light Study Pack Flashcards

(40 cards)

1
Q

What is a SQL Injection?

A

SQL injection a specific type of injection attack that targets databases to execute malicious SQL commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Zero-Day Exploits?

A

Zero-day attacks target software vulnerabilities that are unknown to the software vendor and have no patch available yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Password Attacks?

A

Password attacks attempt to gain unauthorized access by guessing passwords, using keyloggers to capture keystrokes, or using other methods to crack credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an .iso file?

A

A disk image that contains an exact copy of the contents of a storage device, typically an optical disc such as a CD or DVD. It is commonly used for distributing software, operating systems, and other large datasets and can be mounted as a virtual disk for installation or access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does trunking work?

A

Trunking carries traffic for multiple VLANs using tagging (IEEE 802.1Q). It’s primarily a switch-to-switch connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a native VLAN?

A

Native vLAN the untagged VLAN on a trunk port — typically VLAN 1, and the best practice is to change it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Devices not joining the network after VLAN change.

A

TheVLAN is not assigned, or DHCP scope doesn’t include that VLAN’s subnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an internal switch in Hyper-V?

A

A type of virtual switch that allows communication between virtual machines on the same host while remaining isolated from the external network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does “Enable virtual LAN identification” do in Hyper-V?

A

Enabling VLAN identification allows the VM to tag outgoing network frames with a VLAN identifier, facilitating communication within a specific VLAN.

This configuration is useful when working with Virtual Local Area Networks (VLANs) to logically segment network traffic within a virtualized environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Difference between Link Aggregation Control Protocol (LACP) and Port Aggregation Protocol (PAgP)?

A

LACP (IEEE standard) and PAgP (Cisco proprietary) both combine the bandwidth of multiple physical ports into a single logical port.

They also negotiate EtherChannel formation

The difference is that LACP is IEEE standard and PAgP is Cisco proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What’s Port Security?

A

Port security limits which MAC addresses can connect to a switch port to reduce unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why enable Bridge Protocol Data Units (BPDU) Guard?

A

BPDU disables ports receiving unexpected STP messages — protecting against rogue switches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What causes a “link light” notification but there’s no connectivity?

A

Duplex mismatch | vLAN misconfiguration | wrong port assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Intermittent connectivity for one PC?

A

Possibly a:

  • bad cable
  • patch port
  • NIC

— swap components to isolate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Slow network response after upgrade?

A

Duplex mismatch or switch port misconfiguration — check for auto/forced negotiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool checks for cable breaks or length?

A

A Time Domain Reflectometer (TDR) for copper or Optical TDR (OTDR) for fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s attenuation?

A

Signal loss over distance or poor-quality cable — often fixed with shorter runs or better cable.

18
Q

What’s the effect of near-end crosstalk (NEXT)?

A

Reduced signal quality — usually caused by improper twists or cable damage.

19
Q

How to fix No Link on a copper cable?

A
  • Check pins
  • Verify crimps
  • Confirm whether straight-thru or crossover cable is appropriate
20
Q

When do you use a cable certifier?

A

To validate that installed cabling meets specifications and supports the desired speed.

21
Q

Users get 169.254.x.x addresses — what’s wrong?

A

DHCP server unreachable or scope exhausted. The OS assigns APIPA automatically.

22
Q

What are the APIPA IP addresses for IPv4 and IPv6 referred to as?

A

They are Link-Local addresses that are automatically generated by a host device

23
Q

What does the ping test do?

A

Layer 3 IP connectivity — basic reachability using ICMP Echo Request/Reply.

24
Q

Users can ping IPs but not hostnames.

A

DNS resolution issue — check DNS server configuration or client settings.

25
Web traffic blocked but ping works.
Layer 4–7 issue: * Check firewall * Check proxy * **DNS filtering likely**
26
When would you use ipconfig or ifconfig?
To ***view or renew IP configuration*** on a host. ## Footnote ifconfig command is for Linux systems
27
What’s traceroute used for?
***Maps the path*** packets take and identifies routing or latency issues.
28
What’s netstat good for?
***Displays open ports and active connections*** — useful for identifying unwanted traffic.
29
What’s nmap used for?
***Scans*** *devices or networks to identify open ports, OS types, and active hosts*
30
What does Wireshark do?
***Captures and analyzes network packets*** — best for detailed protocol-level troubleshooting.
31
CSMA/***CA*** vs. CSMA/***CD***
32
What are some step-by-step Network-level troubleshooting tips?
33
What are some methods of traffic shaping?
* Packet scheduling * Rate limit/ Policing * Traffic classification * Buffers and Ques
34
**Packet scheduling** (traffic shaping method)
* Determines which packets are sent first. [Examples]: Weighted Fair Queuing (WFQ) Priority Queuing
35
**Rate limiting/ policing** (traffic shaping method)
* Restricts traffic to a specific bandwidth. * Excess packets can be dropped or delayed
36
**Traffic classification** (traffic shaping method)
* Identifies traffic by protocol, port, IP, or application. * Enables granular control for shaping or prioritizing traffic
37
**Buffers and Ques** (traffic shaping method)
* Temporarily store packets during congestion. * Can delay lower-priority packets while allowing high-priority traffic to pass
38
What is Maximum Transmission Unit (MTU)?
***The biggest data packet size, in bytes, that may be sent over a network***. MTU enables the efficiency of transmitting data and is crucial for preventing fragmentation issues. ## Footnote Proper MTU configuration ensures that data is transmitted optimally and without the need for packet fragmentation, contributing to network performance and reliability
39
What does modifying the MTU involve?
***Adjusting the maximum size of data packets that can be transmitted over a network*** is done to optimize network performance or accommodate specific network requirements. ## Footnote Reasons for modifying MTU include **reducing latency, improving bandwidth efficiency, and ensuring compatibility** with network devices that support non-standard MTU values.
40
What is the difference between scalability and elasticity in cloud computing?
***Scalability*** refers to a system's ability to handle increased workloads by adding resources, typically through vertical scaling (upgrading existing hardware) or horizontal scaling (adding more machines) ***Elasticity*** is the capability of a cloud system to automatically and dynamically adjust resources in response to real-time changes in demand. ## Footnote Scalability focuses on the system's capacity to grow over time, while elasticity emphasizes immediate, automated adaptation to fluctuating workloads