Objective 1 Flashcards

1 (109 cards)

1
Q

NAS

A

(Network Attached Storage) Dedicated file storage device that provides centralized access to data across a network. NAS devices are commonly used for backup and file sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAN

A

(Storage Area Network) A dedicated high-speed network that makes storage devices accessible to servers by attaching storage directly to an operating system. It centralizes storage devices so they are easier to manage and communicate faster over media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AP

A

(Access Point) Device that allows wireless devices to connect to a wired network using WI-Fi, enabling Internet or network access in a specific location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controller

A

A device or software that centrally manages multiple wireless access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CDN

A

(Content Delivery Network) Network of distributed servers that delivers web content to users on the basis of their geographical location, optimizing speed and performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VPN

A

(Virtual Private Network) Creates a secure, encrypted connection over a less secure network, such as the Internet, allowing remote users to safely access private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

QoS

A

(Quality of Service) Network feature that prioritizes specific types of traffic, such as voice and video, to ensure smooth performance and avoid latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TTL

A

(Time To Live) Field in an IP packet that specifies the number of hops the packet can take before it is discarded, preventing routing loops.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NFV

A

(Network Functions Virtualization) Replaces traditional hardware appliances with software-based VMs that perform network functions such as routing, switching, or firewalling.
Allows for flexibility in deploying and scaling network services without the need for physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VPC

A

(Virtual Private Cloud) Logically isolated section of a cloud provider’s network where users can deploy resources such as VM’s and databases.
Provides a private, secure environment within the larger public cloud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network security groups

A

Act as virtual firewalls to control inbound and outbound traffic for cloud-based resources.
Define rules that specify allowed or denied traffic on the basis of IP address, protocol, or port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network security lists

A

Define rules for controlling traffic to and from cloud resources but are generally used at the subnet level rather than at the instance level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Internet Gateway

A

Virtual router that allows resources within a VPC to communicate with the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NAT Gateway

A

(Network Address Translation Gateway) Allows instances within a private subnet to access the internet or other external services without exposing the instances to incoming traffic from the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN

A

Allows secure access to a private network over the Internet by encrypting the connection between the user and the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cloud Gateways

A

Entry and exit points that let traffic move between a cloud network and something outside of it.
Example: Internet gateway, NAT gateway, VPN gateway, Transit gateway, and Application gateway/Loadbalancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Direct Connect

A

Provides a dedicated, private connection between an on-premises network and a cloud provider, offering higher bandwidth and lower latency compared to a VPN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Public Cloud

A

Cloud-computing model where resources are shared among multiple users and hosted by a third-party provider.
Cost-effective and scalable but less secure than private clouds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Private Cloud

A

Dedicated to a single organization, offering enhanced security and control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hybrid Cloud

A

Combines Public and Private clouds, allowing data and applications to be shared between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SaaS

A

(Software as a Service) Delivers software applications over the internet on a subscription basis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

IaaS

A

(Infrastructure as a Service) Provides virtualized computing resources over the Internet, allowing users to manage and deploy VMs, storage, and networking components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

PaaS

A

(Platform as a Service) Provides a platform allowing users to build, test, and deploy applications without managing underlying infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Scalability

A

System’s ability to increase or decrease resources as demand fluctuates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Elasticity
Ability of a cloud service to automatically adjust computing resources in real time to match demand.
26
Multitenancy
Allows multiple customers to share the same physical cloud infrastructure while keeping their data isolated.
27
ICMP
(Internet Control Message Protocol) Network protocol used to send error messages and operational information.
28
TCP
(Transmission Control Protocol) Connection-oriented protocol that ensures reliable transmission of data by checking for errors and retransmitting lost packets.
29
UDP
(User Datagram Protocol) Connectionless protocol that is faster but less reliable than TCP.
30
GRE
(Generic Routing Encapsulation) Tunneling protocol that encapsulates packets to send them across different types of networks
31
IPSec
(Internet Protocol Security) Protocol suite for securing IP communications by encrypting and authenticating packets.
32
AH
(Authentication Header) Authenticates the origin of packets. Used with IPSec protocol
33
ESP
(Encapsulating Security Payload) Provides encryption, ensuring the contents of a packet are secure. Used with IPSec protocol
34
IKE
(Internet Key Exchange) Sets up a security association (SA) in IPSec for exchanging cryptographic keys.
35
Unicast
Data sent from a single source to a single destination.
36
Multicast
Data sent from a single source to multiple destinations that belong to a specific group.
37
Anycast
Data sent to multiple destinations but delivered to the closest destination on the basis of routing metrics.
38
Broadcast
Data sent from a single source to all devices in a network or subnet.
39
Single-mode fiber
Uses a small core to carry light signals over long distances with minimal signal loss (Laser Beam)
40
Multi-mode fiber
Has a larger core and is used for shorter distances (LED)
41
42
CAT 5
100BASE-T (Fast Ethernet) 100 Mbps 100 Meters Max 100 MHz Frequency
43
CAT 5e
1000Base-T (Gigabit Ethernet) 1 Gbps 100 Meters Max 100 MHz
44
CAT 6 (100 Meters or less)
1000BASE-T (Gigabit Ethernet) 1 Gbps 100 Meters Max 250 MHz
45
CAT 6 (55 Meters of less)
10GBASE-T (10-Gigabit Ethernet) 10 Gbps 55 Meters or less
46
CAT 6a
10GBASE-T (10- Gigabit Ethernet) 10 Gbps 100 Meters Max 500 MHz Frequency
47
CAT 7
10GBASE-T (10 Gigabit Ethernet) 10 Gbps 100 Meters Max 600 MHz Frequency
48
CAT 8
10GBASE-T, 25GBASE-T, 40GBASE-T 40 Gbps Max 30 Meters Max 2000 MHz/2 GHz Frequency
49
Plenum Cables
Plenum Cables have a fire resistant jacket and are used in spaces with air circulation, such as ceilings or raised floors.
50
Non-Plenum Cable
They lack fire resistance and are used in less critical areas
51
Transceivers
Devices that can transmit and receive signals over a network, converting data from electrical signals to optical signals (& vice versa) when using fiber optics
52
Transceivers Protocol: Ethernet
Common transceiver protocol used in LANs for wired communication
53
Transceiver Protocol: Fibre Channel (FC)
High speed protocol used primarily in SANs to connect servers to storage devices
54
SFP
(Small Form-factor pluggable) Compact, hot-swappable transceiver used in networking equipment such as switches and routers, for both fiber-optic and copper connections.
55
QSFP
(Quad Small Form Factor Pluggable) Higher capacity version of SFP that supports 4 channels, enabling faster speeds and higher data rates.
56
DAC
(Direct Attach Copper Cable) High speed cable used to connect devices in a data center
57
Twinaxial Cable
Specific type of DAC cable used for short range, high speed interconnections in SANs and data centers.
58
SC
Subscriber Connector Fiber-optic connector with a push-pull locking mechanism, commonly used in high speed networks
59
LC
Local Connector Smaller, high-performance fiber-optic connector used in dense networking environments
60
ST
Straight tip Bayonet-style fiber-optic connection used primarily in industrial and military applications
61
MPO
Multi-fiber push on High density connector used to connect multiple fibers in data centers
62
RJ11
Registered Jack 11 Connector used for telephone wiring
63
RjJ45
Registered Jack 45 Standard connector for Ethernet cabling in LANs
64
F-type
Coaxial cable connector used in television and broadband Internet connections
65
BNC
Bayonet Neill-Concelman Quick connect radio frequency (RF) connector used in professional video and RF equipment
66
Mesh
Each device is connected to every other device
67
Hybrid
Combination of multiple topologies in a single network
68
Star/hub & Spoke
Devices are connected to a central hub or switch
69
Spine & Leaf
High speed data center topology where leaf switches connect to end devices (servers) and spine switches provide high-bandwidth inter-connectivity between leaf switches
70
Point to point
Direct connection between two devices or nodes
71
Three-tier hierarchical model
Network design that divides devices into three layers-Core, distribution, and access-allowing for scalability and organization.
72
Core Layer: Distribution layer: Access layer:
1. High speed backbone of the network, connecting distribution layers 2. Connects access layer to core, providing routing, filtering, & access control 3. Where end devices, such as desktops and printers, connect to the network
73
Collapsed Core
Simplified version of the three-tier model where the core and distribution layers are combined into a single layer, typically used in smaller networks
74
North-South
Between the data center and external clients, typically involving traffic that enters and leaves the network
75
East-West
Between devices within the same data center or network, such as communication between servers
76
APIPA
Automatic Private IP Addressing Automatically assigns an IP address from the 169.254.X.X range when a DHCP server is not available
77
RFC1918
Defines private IP address ranges that are used within a local network Class A: 10.0.0.0 - 10.255.255.255 Class B: 172.16.0.0 - 172.31.255.255 Class C: 192.168.0.0 - 192.168.255.255
78
Loopback/Localhost
127.0.0.1. Is used to test network functionality on a local machine.
79
VLSM
Variable Length Subnet Mask Allows different subnets to have different subnet masks, enabling more efficient use of IP addresses
80
CIDR
Classless Inter-Domain Routing Method of IP address allocation that eliminates the traditional class based addressing
81
IPv4 address classes
Class A: 16 million Hosts. 1.0.0.0 - 126.0.0.0 Class B: 65,000 Hosts. 128.0.0.0 - 191.255.0.0 Class C: 254 Hosts. 192.0.0.0 - 223.255.255.0 Class D: Multicast traffic. 224.0.0.0 - 239.255.255.255 Class E: Experimental. 240.0.0.0 - 255.255.255.255
82
SDN & SD-WAN
SDN: Software-Defined Network SD-WAN: Software-Defined WAN They provide a flexible, programmable approach to managing network infrastructure. They allow for dynamic routing and traffic optimization based on real-time network conditions, making them ideal for evolving network environments.
83
Application aware
SDN & SD-WAN can dynamically optimize traffic on the basis of the type of application being used
84
Zero-touch provisioning
Automates the setup and configuration of network devices without manual intervention, reducing errors and deployment time. (Plug it in-it configures itself)
85
Transport agnostic
SD-WAN can route traffic over various transport options, such as multiprotocol label switching (MPLS), broadband, or LTE, without being tied to a specific technology, allowing for better flexibility and cost savings.
86
Central policy management
SDN allows centralized management of network policies, enabling administrators to define, deploy, and enforce policies across the entire network.
87
VXLAN
Virtual Extensible Local Area Network A network virtualization technology that extends layer 2 networks over layer 3 infrastructure, typically used in data center environments to scale and manage networks more effectively.
88
DCI
Data center interconnect VXLAN allows multiple data centers to be connected over layer 3 networks while maintaining layer 2 services.
89
Layer 2 Encapsulation
VXLAN encapsulates layer 2 Ethernet frames in UDP packets, allowing them to travel over layer 3 networks.
90
ZTA
Zero trust architecture A security model that assumes no user, device, or application should be trusted by default, even if they are inside the network perimeter. Instead, access must be continuously verified.
91
Policy-based authentication
Access is granted on the basis of strict policies, ensuring users and devices are authenticated each time they access resources.
92
Authorization
Access is controlled on the basis of roles, ensuring users only have access to the data or systems they need.
93
Least privilege access
Users are given the minimum level of access necessary to perform their job functions, reducing the risk of unauthorized access.
94
SASE
Secure Access Secure Edge Combines SD-WAN capabilities with cloud-based security services, including firewall as a service (FWaaS), secure web gateways (SWG), and cloud access security brokers (CASB)
95
SSE
Security Service Edge Focuses on the security aspect of SASE, ensuring secure access to resources through identity based policies.
96
IaC
Infrastructure as code Automates the provisioning, management, and configuration of infrastructure using code. IaC allows for consistent and repeatable deployments, improving operational efficiency.
97
Playbooks/templates/reusable tasks
Automating routine tasks, such as configuring network devices or deploying VMs with predefined scripts or templates
98
Configuration drift/compliance
Automatically detecting and correcting deviations from desired configurations, ensuring network devices stay compliant with security and operational policies.
99
Upgrades
Automating firmware or software updates across network devices to ensure all systems are running the latest, most secure versions.
100
Dynamic inventories
Automatically tracking and managing network assets, ensuring accurate and up-to-date records
101
Version control
Tracking changes to configuration files over time, allowing rollbacks and auditing of network changes.
102
Central repository
Storing all network configurations, playbooks, and templates in a centralized location, making it easy for teams to access and collaborate.
103
Conflict identification
Detecting configuration conflicts during collaborative work to prevent errors or outages.
104
Branching
Using separate branches in version control to develop, test, and deploy network configurations without affecting production systems.
105
IPv6 addressing
IPv6 addressing is essential in modern networks to mitigate the exhaustion of IPv4 addresses and ensure continued scalability.
106
Mitigating address exhaustion
IPv6 provides a vastly larger address space than IPv4, using 128-bit addresses compared to IPv4's 32 bit addresses.
107
Compatibility requirements: Tunneling
Allows IPv6 traffic to be encapsulated inside IPv4 packets for transmission over IPv4 networks, ensuring compatibility between the two protocols.
108
Compatibility requirements: Dual Stack
Allows devices to run both IPv4 and IPv6 protocols simultaneously, ensuring seamless communication in mixed network environments.
109
NAT 64
Enables IPv6-only devices to communicate with IPv4 services by translating IPv6 addresses to IPv4.