In terms of CPU usage, what devices are primarily referred to?
Routers and firewalls
CPU usage in these devices increases as traffic increases.
What strategies can be used to manage traffic volume in a network?
Managing traffic effectively can reduce latency and errors.
What is the MDF in networking?
Main Distribution Frame
It is the central point where cables enter the building.
What does an IDF refer to?
Intermediate Distribution Frame
It distributes cables throughout the building to workstations.
What are some common factors affecting network performance?
These factors can complicate the identification of network problems.
What is a common cause of cabling and connectivity issues?
Defective cables
Cables can break or become disconnected due to physical damage.
What is the role of the Domain Name System (DNS)?
DNS serves as the internet’s phonebook, translating human-readable domain names, such as www.example.com—into machine-readable IP addresses, like 192.0.2.1
DNS issues can lead to loss of connectivity to the Internet and local systems | This translation is essential because while users can easily remember domain names, computers require numerical IP addresses to locate and access websites, services, and devices
What is a Forward zone type in relation to DNS?
Forward zone type translates domain names into IP addresses
Primarily uses A (Address) records for IPv4 and AAAA for IPv6 | When a user types a website name into a browser, the DNS server checks the forward zone to find the matching IP address
What is a Reverse zone type in relation to DNS?
Reverse zone type translates IP addresses back into domain names.
Uses PTR (Pointer) records |Common in network diagnostics, logging, and security auditing to identify which host is associated with a given IP
True or false: It is advisable to have only one DNS server for redundancy.
FALSE
Always have at least two DNS servers to ensure backup connectivity.
What is Domain Name Security Extensions (DNSSEC)?
DNSSEC a suite of security protocols that adds cryptographic authentication to DNS, ensuring that the responses to DNS queries are authentic and haven’t been tampered with.
What is DNS over HTTPS (DoH)?
DoH a security protocol that encrypts DNS queries using HTTPS, protecting users from eavesdropping, spoofing, and manipulation of DNS data
What is DNS over TLS (DoT)?
DoT a security protocol that encrypts DNS queries using TLS, protecting them from interception, manipulation, and surveillance
What are some network metrics that can indicate problems?
Monitoring these metrics helps in diagnosing network issues.
What does latency refer to in a network context?
The delay or time it takes for a data packet to travel from its source to its destination, often measured in milliseconds.
High latency can be related to increased traffic volume; also referred to as slow traffic
What is the Simple Network Management Protocol (SNMP) used for?
SNMP simplifies network management tasks.
What are the roles of Managers and Agents in SNMP?
This client-server model is fundamental to SNMP’s operation.
What significant security improvements were made in SNMP version 3?
Improvements in v3 include:
These enhancements help protect against unauthorized access.
What is a Management Information Base (MIB) in SNMP?
MIB a hierarchical collection of manageable device definitions that identifies device property information.
Each device maintains its own MIB to describe its characteristics
What is the purpose of network logging features?
Log files provide critical information for network management.
True or false: Log files proactively inform you about network events.
FALSE
You must manually examine log files to ascertain information.
What is a potential drawback of enabling logging on devices?
Enabling logging requires additional processing and storage
When logging is configured, high severity levels such as level 7 (Debug), which generates a large volume of detailed messages can result in device and network instability | The decision to enable logging should be based on security needs.
What is the purpose of logging in network operations?
Logging maintains a comprehensive record of all activities, events, errors, and system statuses occurring within the network infrastructure
Logging helps make better decisions for implementing preventative measures | Logging doesn’t inform in real-time, it reports on events that have already occurred
True or false: Logging can proactively prevent events from happening.
FALSE
Logging only informs about past events and does not prevent occurrences.