Uploaded by aaronwheeler1411

ExamHints (2)

advertisement
M1 - Intro to networks
•
Identify types of applications and protocols used on a network
•
Distinguish between the client-server and peer-to-peer models used to control
access to a network
•
Describe various networking hardware devices and the most common physical
topologies
•
Describe the seven layers of the OSI model
•
Explore best practices for safety when working with networks and computers
•
Describe the seven-step troubleshooting model for solving a networking problem
Key Terms
• Active Directory (AD)
• Active Directory Domain Services
• (AD DS)
• API (application programming interface)call
• Application layer
• ARP (Address Resolution
• Protocol)
• backbone
• bandwidth
• best-effort protocol
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
bus topology
call tracking system
CAN (campus area network)
catastrophic failure
client-server applications
client-server network model
connectionless protocol
connection-oriented protocol
convergence
Data Link layer
Data Link layer address
datagram
decapsulation
delay-sensitive
demarc
demarcation point
domain
electrostatic discharge (ESD)
emergency alert system
encapsulation
fail close
fail open
file server
file services
fire suppression system
fragmentation
frame
FTP (File Transfer Protocol)
global account
grounding
hardware address
header
heating, ventilation, and air conditioning
(HVAC) system
host
HTTP (Hypertext Transfer
Protocol)
HTTPS (HTTP Secure)
hybrid topology
ICMP (Internet Control Message
Protocol)
IMAP4 (Internet Message Access
Protocol, version 4)
IP (Internet Protocol)
IP address
knowledge base
Layer 2 switch
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Link layer
Link layer switch
local account
local area network (LAN)
logical topology
loss-tolerant
MAC (Media Access Control)
address
MAN (metropolitan area
network)
material safety data sheet (MSDS)
multicast distribution
network
network adapter
network interface card (NIC)
Network layer
network operating system (NOS)
network services
node
onboard network port
Troubleshooting Network Problems
•
Describe the steps involved in an effective troubleshooting methodology
•
Follow a systematic troubleshooting process to identify and resolve networking
problems
•
Document symptoms, solutions, and results when troubleshooting network
problems
•
Use a variety of software and hardware tools to diagnose problems
Troubleshooting Network Problems
• Methodical, logical troubleshooting methodology
• Key to solving network problems
• Troubleshooting tools
o Tone generator, tone locator
o Multimeters
o Cable continuity testers
o Cable performance tester
o Voltage event recorder
o Butt set
o Network monitors and protocol analyzers
o Wireless network testing tools
Key Terms
Baseline
A record of how a network operates under normal conditions (including its
performance, collision rate, utilization rate, and so on). Baselines are used for comparison
when conditions change.
Butt Set
A tool for accessing and testing a telephone company’s local loop. The butt set,
also known as a telephone test set or lineman’s handset, is essentially a telephone handset
with attached wires that can be connected to local loop terminations at a demarc or
switching facility.
cable checker See continuity tester.
Cable performance tester
A troubleshooting tool that tests cables for continuity, but can
also measure cross talk, attenuation, and impedance; identify the location of faults; and
store or print cable testing results.
cable tester A device that tests cables for one or more of the following conditions:
continuity, segment length, distance to a fault, attenuation along a cable, near-end cross
talk, and termination resistance and impedance. Cable testers may also issue pass/fail
ratings
for wiring standards or store and print cable testing results.
call tracking system A software program used to document technical problems and how
they were resolved (also known as help desk software).
change management system A process or program that provides support personnel with a
centralized means of documenting changes made to the network.
Network Services





IPv4 configuration relies on a number of network services which are normally
implemented on servers
DHCP – Assigns addresses – what is? What is opposite?
DNS (what is?) – Resolves computer names (Fully Qualified Domain Names) to IP
addresses and vice versa
APIPA (Automatic Private IP Addressing )– Configures a private IP address if the
DHCP server is unavailable (implemented by the client) – 169.254.x.x address
NAT (what is?) – Allows devices on private networks to gain access to the internet
through one public IP address
IP addressing
•IPv4
• Decimal representation of a 32 bit, 4 octet sets separated by dots.
•Binary numbers
• Represented by either a 1 or a 0
Classful IP Addressing
ABC
Subnetting
Breaking /24 networks in to smaller chunks
/26 and /27
What masks do each have?
What does 255 represent?
Do conversions
Class A network – large number of hosts
Class B – medium number of hosts
Class C – small number of hosts
FH, LH, GW, BC address
Subnetting
Breaking /24 networks in to smaller chunks
/26 and /27
Virtualisation and VLANs


Describe methods of network design unique to TCP/IP networks, including
subnetting, CIDR.
Explain virtualization and identify characteristics of virtual network components
Describe techniques for incorporating virtual components in VLANs
Explain the advanced features of a switch and understand popular switching
techniques, including VLAN management
Identify methods of combining VM and VLAN technologies
















Key Terms
access port
BID (Bridge ID)
BPDU (Bridge Protocol
Data Unit)
BPDU filter
BPDU guard
bridged mode
CAPWAP (Control and Provisioning
of Wireless Access Points)
CIDR (Classless Interdomain
Routing)
CIDR block
CIDR notation
classful addressing
classless routing
control plane
















































data plane
default VLAN
designated port
DHCP relay agent
extended network prefix
guest
host
host-only mode
HSRP (Hot Standby Routing
Protocol)
Hyper-V
hypervisor
in-band management
ip helper-address
KVM (Kernel-based Virtual
Machine)
LWAPP (Lightweight Access Point
Protocol)
magic number
Management console
MSTP (Multiple Spanning Tree
Protocol)
NAT mode
native VLAN
network controller
network ID
network number
network prefix
OpenFlow
out-of-band management
prefix mask
root bridge
root port
route aggregation
route prefix
route summarization
routing prefix
RSTP (Rapid Spanning Tree
Protocol)
SAID (security association
identifier)
slash notation
software defined networking
(SDN)
SPB (Shortest Path Bridging)





































stack master
STP (Spanning Tree Protocol)
supernet
supernet mask
supernetting
tag
thick AP
thin AP
TRILL (Transparent Interconnection
of Lots of Links)
trunk port
trunking
unmanaged switch
virtual adapter
virtual appliance
virtual bridge
virtual console
virtual IP address
virtual machine manager
virtual server
virtual switch
virtual terminal
virtual workstation
VirtualBox
virtualization
VLAN (virtual local area network)
VLAN hopping attack
VLAN pooling
VMware
vNIC (virtual network interface
card)
VRRP (Virtual Router Redundancy
Protocol)
VTP (VLAN trunking protocol)
Wi-Fi controller
wireless controller
WLAN controller
Pen Testing and vulnerability scanning




Pent test concepts
Reconnaisance (active / passive)
Pivot
Initial Exploitation







Persistence
Elevation of privilege
Testing Security controls
Vulnerability identification
Identify/by pass security controls
Common misconfigurations
Scanning (cred v non-cred)
Download