- Network problems:
- Initialization vector attack
- Replay attack
- Virus infection:
- What’s the best tool to use if virus is suspected of infecting network and
using large amounts of bw?
- Network sniffer
- Packet analyzer
- What’s the best tool to use if virus is suspected of infecting network and
using large amounts of bw?
- Network hardening:
- Avoid using privileged accounts
- Track hardware and software for patch reqs
- Keep account roles separated to avoid conflicts of interest
- It’s ok to save certs, pw’s, and keys in the same protected vault
- Review incident preparation and management
- Preparation for incidents is a multifaceted process that includes which
tasks?
- Vulnerability scanning
- Penetration testing
- Preparation for incidents is a multifaceted process that includes which
tasks?
- Review how TCP closes connections
- Sends FIN
- Security:
- Review smurf attack
- Encryption:
- Review asymmetric encryption
- What are two examples of asymmetric encryption?
- Elliptic Curve Cryptography
- Rivest-Shamir-Adleman
- What are two examples of asymmetric encryption?
- Review asymmetric encryption
- Wireless:
- WPS is used for what purpose?
- Automatically configures a wireless device to connect to a WAP
- WPS is used for what purpose?
- Ethernet standards:
- Review what the letters mean at the end of the designation:
- 10GBaseSW: S stands for short-range and W stands for WAN
- 10GBaseSR: S stands for short-range and R means it works with existing Ethernet standards.
- Does L stand for long-range?
- 1000BaseSX:
- supports runs of up to 500 m over MMF.
- Doesn’t support 10km runs.
- Remember S stands for short-range
- 1000BaseLX:
- Runs MMF and has maximum length of 550 meters
- What networking technology is also known as Fast Ethernet?
- 100Base_XY_
- Anything with 100 in it is good for Fast Ethernet
- Gigabit Ethernet standards
- 1000Base-CX
- uses copper cabling and is limited to 25 meters
- 1000Base-CX
- Review what the letters mean at the end of the designation:
- Port forwarding allows outside access to hosts on the LAN side of the NAT router.
- Fiber-optic:
- Review multi-modal distortion
- Protocol analyzers:
- Wireshark:
- Protocol analyzers can’t generate packets and frames. Can only capture and display them.
- Wireshark:
Up to here reviewed
- IP
- Routing:
- Subnetting:
- Subnet masks are never sent out of a host, they’re not part of the IP header.
- Review subnet masks
- Subnetting:
- Review IPv6
- Routing:
- Cabling
- Coaxial
- RG-58 impedence: 50 ohms
- RG-8 impedence: 50 ohms
- Coaxial
- SNMP
- Get, Response, Set, and Trap are communications that occur between an SNMP
manager and an SNMP managed device. These communications are examples of
what?
- PDU’s
- The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU).
- Review SNMP
- Review PDU
- Get, Response, Set, and Trap are communications that occur between an SNMP
manager and an SNMP managed device. These communications are examples of
what?
- Review HA
- Common techniques to acheive HA are?
- Install RAID
- Redundant Systems
- Aggregate links
- Common techniques to acheive HA are?