IT CertificationsComprehensive Study Set

Comptia Certmaster Practice For Network+

516 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

10xBASE

ANSWER

The Ethernet-type networks can be subdivided into several types of network. The IEEE 802.3 standard uses the following notation to indicate Ethernet type: x-BASE-y, where "x" indicates the data rate (in Mbps), "BASE" denotes that baseband transmission is used and "y" either describes the maximum media distance or the cable type. More recent standards define gigabit (1000BASE-Y) and 10 Gigabit (10GBASE-Y) speeds.

QUESTION 2

110 Block

ANSWER

Punch-down cross-connect format offering high density (supporting up to 300 pairs). 110 wiring blocks are used for various applications. The 110 IDC format is used in most patch panels and wall jacks.

QUESTION 3

6to4

ANSWER

Transmits IPv6 traffic over IPv4 networks by mapping IPv4 addresses onto a special range of IPv6 prefixes.

QUESTION 4

802.1X

ANSWER

is an authentication standard, developed to allow remote, wireless, and wired authentication to be centrally managed. A client device such as an access point passes authentication information to a RADIUS server on the wired network for validation. The authentication information could be a username and password or could employ smart cards or tokens.

QUESTION 5

802 Protocols

ANSWER

A set of standards, published by the LAN/MAN Standards Committee of the Institute of Electrical and Electronics Engineers (IEEE), define technologies working at the physical and data link layers of the OSI model. These layers are subdivided into two sub-layers. The Logical Link Control (LLC) sub-layer is used with other, such as 802.3 and 802.11, which are conceived as operating at a Media Access Control (MAC) sublayer and the physical (PHY) layer.

QUESTION 6

AAAA (Address)

ANSWER

This resource record performs the same function as an A record but for resolving a host name to an IPv6 address.

QUESTION 7

AAA (authentication, authorization, and accounting)

ANSWER

The principal stages of security control. A resource should be protected by all three types of controls.

QUESTION 8

A (Address)

ANSWER

A resource record used to resolve a host name to an IPv4 address. This is the most common type of record in a DNS zone.

QUESTION 9

Access Layer

ANSWER

In terms of network hierarchy, this layer allows end-user devices, such as computers, printers, and smartphones to connect to the network. It also prevents the attachment of unauthorized devices.

QUESTION 10

Account Expiration

ANSWER

Some user accounts may be created to allow only temporary access (for guest users, contractors, temporary staff, and so on).

QUESTION 11

ACL (Access Control List)

ANSWER

The permissions attached to or configured on a network resource, such as folder, file, or firewall. This list specifies which subjects (user accounts, host IP addresses, and so on) are allowed or denied access and the privileges given over the object (read only, read/write, and so on).

QUESTION 12

Action Plan

ANSWER

This sets out the steps you take to solve a problem.

QUESTION 13

Active Directory

ANSWER

The database that contains the users, groups, and computer accounts in a Windows Server domain.

QUESTION 14

Adaptability

ANSWER

The ability for new or changed services and applications to be accommodated with minimum disruption to the existing physical and logical topology. For example, if the customer wants to switch from a traditional telephone system to Voice-over-IP, the network will be able to accommodate this without requiring the installation of new cable.

QUESTION 15

Addressing (Network)

ANSWER

In order to communicate on a network, each host must have an . Different protocols use different methods of addressing. For example, IPv4 uses a 32-bit binary number, typically expressed as a 4-part decimal number (dotted decimal notation) while IPv6 uses a 128-bit binary number expressed in hexadecimal. A routable scheme such as IP also provides identification for distinct networks as well as hosts.

QUESTION 16

Administrative Distance

ANSWER

Metric determining the trustworthiness of routes derived from different routing protocols.

QUESTION 17

AES (Advanced Encryption Standard)

ANSWER

Modern encryption suite providing symmetric encryption (the same key is used to encrypt and decrypt). is a very strong cipher with many applications, including being part of the WPA2 Wi-Fi encryption scheme.

QUESTION 18

Alert

ANSWER

A notification that is sent to an administrator if a network threshold is exceeded. These could be a low priority stating that something has been recorded in a log, or high priority notification via SMS or email or physical alarm.

QUESTION 19

Algorithm

ANSWER

Any defined method of performing a process but in encryption, the term specifically refers to the technique used to encrypt a message. The strength of an algorithm depends to a large extent on the size of its key (the code that enables a message to be encrypted or decrypted). A minimum key size of 2048 bits is considered secure by NIST. There are a number of in use for different types of encryption. Some of the main technologies are SHA-1 and MD5 (hash functions), 3DES, AES, RC (Rivest Cipher), IDEA, Blowfish/Twofish, and CAST (used for symmetric encryption [where the same key is used to encrypt and decrypt]), and Diffie-Hellman, RSA, ElGamal, and ECC (used for asymmetric encryption, where two linked keys are used).

QUESTION 20

Analog

ANSWER

A signal can be either or digital. An signal is characterized by a continually changing wave, while a digital signal has discrete states (for example, 1 or 0). Some devices still use signaling, as the wave form requires less capacity and can travel farther. However, most new technologies use digital signaling, to eliminate the need for conversion and to reduce the errors introduced by signaling.

QUESTION 21

ANDing

ANSWER

The process of applying a subnet mask by converting both the IP address and subnet mask to binary, then combinging the two binary numbers, thus yielding the network number of that address.

QUESTION 22

Antenna

ANSWER

Specially arranged metal wires that can send and receive radio signals. These are used for radio-based wireless networking. For WLANs, are small and short-range (~45m [150 feet] indoor range) and generally send and receive in all directions (omni-directional).

QUESTION 23

Anti-ESD Mat

ANSWER

A pad used for standing or working on and designed to dissipate electrical charge in order to avoid damanging equipment.

QUESTION 24

Anti-ESD Wrist Strap

ANSWER

A device worn around an individual's wrist and attached to a ground point to dissipate static charges more effectively and avoid equipment damage.

QUESTION 25

ANT+

ANSWER

A low-power connectivity standard working in the 2.4 GHz range closely associated with fitness monitors and sensor equipment.

QUESTION 26

Anycast

ANSWER

A transmission method in which data is sent from a server to the nearest host within a group.

QUESTION 27

AP (Access Point)

ANSWER

Device that provides connectivity between wireless devices and a cabled network. with Internet connectivity located in public buildings (cafes, libraries, airports for instance) are often referred to as hotspots.

QUESTION 28

API (Application Programming Interface)

ANSWER

A library of programming utilities used, for example, to enable software developers to access functions of the TCP/IP network stack under a particular operating system.

QUESTION 29

APIPA (Automatic Private IP Addressing)

ANSWER

was developed as a means for Windows clients configured to obtain an address automatically that could not contact a DHCP server to communicate on the local subnet. The host randomly selects an address from the range 169.254.0.1 - 169.254.254.255. This is also called a link-local address.

QUESTION 30

Appliance Firewall

ANSWER

A stand-alone hardware firewall that performs the function of a firewall only. The functions of the firewall are implemented on the appliance firmware.

QUESTION 31

Application Firewall

ANSWER

Software designed to run on a server to protect a particular application only (a web server firewall, for instance, or a firewall designed to protect an SQL Server database). This is a type of host-based firewall and would typically be deployed in addition to a network firewall.

QUESTION 32

Application Layer

ANSWER

OSI model layer providing support to applications requiring network services (file transfer, printing, email, databases, and so on).

QUESTION 33

Approaching Multiple Problems

ANSWER

If a user outlines multiple, separate issues during a single troubleshooting session, treat them each as separate problems and tackle on at a time. This may include filling out a separate support ticket.

QUESTION 34

ARP (Address Resolution Protocol)

ANSWER

When two systems communicate using TCP/IP, an IP address is used to identify the destination machine. The IP address must be mapped to a device (the network adapter's MAC address). This protocol performs the task of resolving an IP address to a hardware address. Each host caches known mappings in a table for a few minutes. It is also the name of a utility used to manage the cache.

QUESTION 35

ARP Poisoning

ANSWER

The Address Resolution Protocol (ARP) maps IP addresses to network interfaces (MAC addresses). This is the process of injecting a false IP:MAC lookup into the victim's ARP cache. This can be used to perform a variety of attacks, including DoS, spoofing, and man-in-the-middle.

QUESTION 36

Asymmetric Algorithm

ANSWER

uses different keys (public and private; the keys are linked but the private key is not derivable from the public one). The most popular type of asymmetric cryptography (RSA) is based on the fact that factoring large numbers to discover whether they are prime (a number that is only divisible by itself and 1) is difficult. If there were a breakthrough in mathematics that made factoring large numbers less computationally intensive, the security of these cryptographic products would be broken. Elliptic Curve Cryptography (ECC) is a different means of creating key pairs such that it is easy to determine that the keys are linked but very difficult to determine one key from the other. The other advantage of ECC is that the algorithm is more efficient, allowing smaller keys to give the same level of security as larger RSA keys.

QUESTION 37

ATM (Asynchronous Transfer Mode)

ANSWER

A WAN transfer protocol. The small size of the cells and their fixed length mean delays can be predictable so that time-sensitive data is readily accommodated

QUESTION 38

Attack Surface

ANSWER

The degree of exposure a network or piece of software has to attack. For example, the more ports a server has open or the more features installed under an OS, the greater the likelihood of an attacker finding a vulnerability.

QUESTION 39

Attenuation

ANSWER

Degradation of a signal as it travels over media. This determines the maximum distance for a particular media type at a given bit rate.

QUESTION 40

AUP (Acceptable Use Policy)

ANSWER

This policy governs employees' use of company equipment

QUESTION 41

Authentication

ANSWER

A means for a user to prove their identity to a computer system. is implemented as either something you know (a username and password), something you have (a smart card or key fob), or something you are (biometric information). Often, more than one method is employed (2- factor ).

QUESTION 42

Authoritative Name Server

ANSWER

A name server that holds complete records for a particular domain. This means that a record in the zone identifies the server as a name server for the domain.

QUESTION 43

Automatic Allocation

ANSWER

Refers to an address that is leased permanently to a client. This is distinct from static allocation as the administrator does not pre-determine which particular IP address will be leased.

QUESTION 44

Backbone

ANSWER

A fast link that connects the various segments of a network.

QUESTION 45

Backdoor

ANSWER

A remote administration utility providing a means of configuring a computer. Remote admin software may be installed intentionally, in which case it must be properly secured. These may also be installed by malware.

QUESTION 46

Backup

ANSWER

Recovery of data can be provided through the use of a backup system. Most systems provide support for tape devices. This provides a reasonably reliable and quick mechanism for copying critical data. Different types (full, incremental, or differential) balance media capacity, time required to , and time required to restore.

QUESTION 47

Bandwidth

ANSWER

Generally used to refer to the amount of data that can be transferred through a connection over a given period. It more properly means the range of frequencies supported by transmission media, measured in Hertz.

QUESTION 48

Bandwidth Speed Tester

ANSWER

Uses speed test sites, which are a web service that measures the bandwidth and latency of a visitor's Internet connection. Tests typically measure the data rate for the downloads and the upload data rate. These sites allow you to test your connection bandwidth and latency in a real world setting to see what the actual performance is.

QUESTION 49

Baseband

ANSWER

This form of transmission uses the complete bandwidth of the media as a single transmission path. LAN signaling normally uses this transmission method.

QUESTION 50

Baseline

ANSWER

The point from which something varies. A configuration is the original or recommended settings for a device while a performance is the originally measured throughput.

QUESTION 51

Baud

ANSWER

Also known as the symbol rate, this means the number of symbols per second transmitted in an analog signal (a symbol being some characteristic of the signal, such as a change in frequency or amplitude).

QUESTION 52

Beaconing

ANSWER

A means for a network node to advertise its presence and establish a link with other nodes, such as the management frame sent by an AP. Legitimate software and appliances do this but it is also associated with Remote Access Trojans (RAT) communicating with a Command & Control server.

QUESTION 53

Benefits of Subnetting

ANSWER

Conserving IP addresses, improving network performance, and providing a more secure network environment.

QUESTION 54

BGP (Border Gateway Protocol)

ANSWER

designed to be used between routing domains, or Autonomous Systems (AS), and as such is used as the routing protocol on the Internet, primarily between ISPs. Autonomous systems are designed to hide the complexity of private networks from the public internet. Border (or edge) routers for each AS exchange only as much route information as is required to access other autonomous systems, rather than hosts within each AS. Autonomous System Numbers (ASN) are allocated to ISPs by IANA via the various regional registries.

QUESTION 55

BIA (Business Impact Analysis)

ANSWER

A risk assessment will identify a range of threats and for each significant threat perform a to determine the likelihood of the threat exploiting a vulnerability and the cost to the business should a vulnerability be exposed.

QUESTION 56

Binary

ANSWER

a number system of base 2 where a digit can take any one of two different values (0 and 1). This is used whenever an on/off state is needed

QUESTION 57

Biometric

ANSWER

Identifying features stored as digital data can be used to authenticate a user. Typical features used include facial pattern, iris, retina, or fingerprint pattern, and signature recognition. This requires the relevant scanning device, such as a fingerprint reader, and a database of information (template).

QUESTION 58

Blackhole

ANSWER

A means of mitigating DoS or intrusion attacks by dropping (discarding) traffic.

QUESTION 59

Bluetooth

ANSWER

Short-range radio-based technology, the most used version of this working at up to 10m (30 feet) at up to 1 Mbps and used to connect peripherals (such as mice, keyboards, and printers) and for communication between two devices (such as a laptop and smartphone). The advantage of radio-based signals is that devices do not need line-of-sight, though the signals can still be blocked by thick walls and metal and can suffer from interference from other radio sources operating at the same frequency (2.4 GHz). A low energy version of this is designed for small battery-powered devices that transmit small amounts of data infrequently.

QUESTION 60

BNC (Bayonet Neill-Concelman)

ANSWER

Twist and lock connector for coaxial cable

QUESTION 61

Bonding

ANSWER

Using multiple network adapters for a single link for fault tolerance and load balancing. For Ethernet, this type of "adapter teaming" is defined in 802.3ad. 802.11n/ac Wi-Fi channels can also be to improve bandwidth.

QUESTION 62

BOOTP (Bootstrap Protocol)

ANSWER

TCP/IP protocol enabling a host to acquire IP configuration information from a server or download a configuration program using TFTP. is an earlier, simpler form of DHCP and also works over UDP port 67. Unlike DHCP, the configuration settings for each host must be manually configured on the server

QUESTION 63

Botnet

ANSWER

A network of computers that have been compromised by Trojan/rootkit/worm malware. Providing this network can also subvert any firewalls between the controller (or herder) and the compromised computers (zombies) they can be remotely controlled and monitored using covert channels.

QUESTION 64

Bottleneck

ANSWER

A point of poor performance that reduces the productivity of the whole network. This can occur because a device is underpowered or faulty, or because of a user behavior.

QUESTION 65

bps (Bits per Second)

ANSWER

is used to describe data transfer speed - the higher the number, the higher the transmission speed.

QUESTION 66

Bridge

ANSWER

A hardware device used to divide an overloaded network into separate segments. Intrasegment traffic (traffic between devices on the same segment) remains within this segment and cannot affect the other segments. This device works most efficiently if the amount of intersegment traffic (traffic between devices on different segments) is kept low. Segments on either side of the hardware are in separate collision domains but the same broadcast domain. The function of these devices is now typically performed by switches.

QUESTION 67

Broadband

ANSWER

In a technical ense, a transmission that divides the available media bandwidth into a number of transmission paths or channels. WAN signaling generally uses this form of transmission and consequently the term is used generally to refer to 1 MBps+ Internet links such as DSL or cable.

QUESTION 68

Broadcast Domain

ANSWER

A network or segment where any node connected to the network can directly transmit to any other node in the area without a central routing device. Microsegmentation does not stop broadcasts.

QUESTION 69

Broadcast

ANSWER

A packet sent to all hosts on the local network (or subnet). Routers do not ordinarily forward broadcast traffic. The address of IP is one where the host bits are all set to 1; at the MAC layer it is the address ff:ff:ff:ff:ff:ff.

QUESTION 70

Broadcast Storm

ANSWER

frames that circulate the network perpetually, but at the data link layer. This issue may quickly consume all link bandwidth and crash network appliances.

QUESTION 71

Business Continuity Plan (BCP)/Continuity of Operations Plan (COOP)

ANSWER

This plan is designed to ensure that critical business functions demonstrate high availability and fault tolerance. Typically, this is achieved by allowing for redundancy in specifying resources. Examples include cluster services, RAID disk arrays, UPS. should not be limited to technical elements however; they should also consider employees, utilities, suppliers, and customers. Associated with business continuity is the disaster recovery plan, which sets out actions and responsibilities for foreseen and unforeseen critical incidents.

QUESTION 72

Bus Topology

ANSWER

A linear network with all nodes attached directly to the main cable. The ends of themust be terminated so that the signal is absorbed once it has passed all of the connected devices. Signal transmission normally occurs in both directions from the source.

QUESTION 73

BYOD (Bring Your Own Device)

ANSWER

Security framework and tools to facilitate use of personally-owned devices to access corporate networks and data

QUESTION 74

Cable (Hybrid Fiber Coax)

ANSWER

A Internet connection is usually available along with a telephone/television service (Cable Access TV [CATV]). These networks are often described as as they combine a fiber optic core network with coax links to consumer premises equipment but are more simply just described as "cable". Consumers interface with the service via a cable "modem" (actually functioning more like a bridge).

QUESTION 75

Cable Stripper

ANSWER

Tool for stripping the cable jacket or wire insulation. Specialist tools are required to strip the various layers from fiber optic cable.

QUESTION 76

Cable Tester/Certifier

ANSWER

Troubleshooting devices designed to locate breaks in cable runs, faults in cable, and other problems with an installation (crosstalk, attenuation, noise, EMI, resistance, and so on). A is pre-programmed with the criteria of a particular wiring standard (TIA/EIA Cat 6 for example) and can test links against these criteria.

QUESTION 77

Cache-only Name Server

ANSWER

A name server that doesn't maintain a zone (primary or secondary). They often rely on forwarding to resolve queries for client resolvers.

QUESTION 78

CAM (Content Addressable Memory)

ANSWER

A special type of memory optimized for searching rather than random access. The MAC address table is often also referred to as the table

QUESTION 79

CAN (Campus Area Network)

ANSWER

A LAN that spreads over several buildings within the same overall area.

QUESTION 80

captive portal

ANSWER

A web page or website to which a client is redirected before being granted full network access. This might allow limited network browsing, provide an authentication me

QUESTION 81

Cat Cable Standards

ANSWER

twisted pair cabling is rated by the ANSI/TIA/EIA "cat" standards for different Ethernet applications. Cat3 is rated for 10 Mbps applications at up to 100m, Cat5 for 100 Mbps and Cat5e and Cat6 for 1 Gbps. Cat6 and Cat6a are also rated for 10 Gbps at 55m and 100m respectively.

QUESTION 82

CDMA (Code Division Multiple Access)

ANSWER

Method of multiplexing a communications channel using a code to key the modulation of a particular signal. This method is associated with Sprint and Verizon cellular phone networks.

QUESTION 83

Cell Phone

ANSWER

Mobile telephony works through a series of base station transmitters (cells) that connect to the cellular and telephone networks. This network can be used for voice and data communications. Data communications are divided into 2G (GSM; up to about 14 Kbps), 2.5G (GPRS, HSCSD, and EDGE; up to about 48 Kbps), and 3G (WCDMA; up to about 2 Mbps).

QUESTION 84

Certificate

ANSWER

A public key that has been certified by some agency, validating that the owner of the key is really who he or she says he or she is. This allows a sender to encrypt a message using the public key in the knowledge that only the recipient will be able to read it (using their linked private key). can also be used as proof of identity (for authentication or signing documents). Most are based on the X.509 standard though PGP web of trust are also popular.

QUESTION 85

Change Management

ANSWER

This process ensures that planned changes are introduced effectively. A large part of this is documenting changes and informing users.will generally spark a new risk assessment process as the impact of the changes on the current security configuration needs to be assessed. Two key concepts are the submission of a Request for Change (RFC) and the Change Advisory Board (CAB), responsible for authorizing change. When a system or procedure is changed, it is vital to document the change, explaining who authorized and actioned it, why it was made, details of what was changed, and the date that the change was made.

QUESTION 86

Channel

ANSWER

Wi-Fi frequency bands are divided into multiple smaller to allow multiple networks to operate at the same location without interfering with one another.

QUESTION 87

CHAP (Challenge Handshake Authentication Protocol)

ANSWER

Authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server. The challenge-response is repeated throughout the connection (though transparently to the user) to guard against replay attacks.

QUESTION 88

CIA Triad

ANSWER

Confidentiality, Integrity, and Availability - the goals for providing a secure information management system.

QUESTION 89

CIDR (Classless Interdomain Routing)

ANSWER

Using network prefixes to aggregate routes to multiple network blocks ("supernetting"). This replaced the old method of assigning class-based IP addresses based on the network size.

QUESTION 90

Circuit Switching

ANSWER

A form of switching that establishes a temporary dedicated path between nodes. The telephone network (PSTN) uses this form of switching.

QUESTION 91

Class A Addresses

ANSWER

This class of addressses provides a small number of network addresses for networks with a large number of hosts per network. Originally designed for use only by extremely large networks, this class of addresses is too expensive for most organizations. The technical definition of this class of addresses is any address where the first octet (on the left) begins with a binary 0.

QUESTION 92

Class B Addresses

ANSWER

This class of addresses provides a balance between the number of network addresses and the number of hosts per network. Most organizations lease this class of addresses for use on networks that connect to the Internet. The technical definition of this class of addresses is any address where the first octet (on the left) begins with binary 10.

QUESTION 93

Class C Addresses

ANSWER

This class of addresses provides a large number of network addresses for networks with a small number of hosts per network. The technical definition of this class of addresses is any address where the first octet (on the left) begins with binary 110.

QUESTION 94

Class D Addresses

ANSWER

This class of addresses are set aside to support multicast transmissions. Any network can use them, regardless of the base network ID. The technical definition of this class of addresses is any address where the first octet (on the left) begins with binary 1110.

QUESTION 95

Class E Addresses

ANSWER

This class of addresses are set aside for research and experimentation. The technical definition of this class of addresses is any address where the first octet (on the left) begins with binary 1111.

QUESTION 96

Classful Addressing

ANSWER

In the early days of IP addressing, the network ID was determined automatically from the first octet of the address. When subnet masks were introduced, the "default" masks (255.0.0.0, 255.255.0.0, and 255.255.255.0) that corresponded to treating the first octet as classful were commonly described as "class A", "class B", and "class C" masks. The Internet no longer uses classful addressing but many LANs use the private IP address ranges and the default masks.

QUESTION 97

Classless Addressing

ANSWER

an addressing scheme whereby the concept of address classes and default masks is abandoned in favor of representing the address with an appropriately sized network prefix.

QUESTION 98

Client

ANSWER

A network provides connectivity to file servers. Server is a model for providing network resources from a centrally controlled location. The server computer or application hosts the resource. A computer or application requests the resource from the server. You will require a for each type of server to which you have a connection - for example, Windows, NetWare, or Linux.

QUESTION 99

Closed Port

ANSWER

A TCP or UDP port number that rejects connections or ignores all packets directed at it.

QUESTION 100

Cloud Computing

ANSWER

Any environment where software (Software as a Service and Platform as a Service) or computer/network resources (Infrastructure as a Service and Network as a Service) are provided to an end user who has no knowledge of or responsibility for how the service is provided. These services provide elasticity of resources and pay-per-use charging models. These service access arrangements can be public, hosted private, or private (this type of cloud could be onsite or offsite relative to the other business units).

QUESTION 101

CNAME (Canonical Name)

ANSWER

This resource record is used to represent an alias for a host (A or AAAA)

QUESTION 102

Coaxial Cable

ANSWER

This type of cable is formed from two separate conductors that share a common axis. The outer conductor, a wire mesh, is isolated from the inner conductor, a copper wire, by plastic insulation

QUESTION 103

Console Router

ANSWER

A device used to provide remote access to the command-line interface of multiple switch and/or router appliances.

QUESTION 104

Content Filter

ANSWER

A software application or gateway that filters client requests for various types of internet content (web, FTP, IM, and so on). The software can work on the basis of keywords, URLs, time of day/total browsing time, and so on.

QUESTION 105

Contention

ANSWER

a system, each network device competes with the other connected devices for use of the transmission media. based systems require a set of protocols that reduce the possibility of data collisions, since if the devices compete and simultaneously send data packets, neither packet will reach its intended destination.

QUESTION 106

Convergence (Steady State)

ANSWER

The process whereby routers agree on routes through the network. As the network changes constantly (what with router failures, addressing changes, and unforeseen events), routers must be capable of adapting to these changes and communicating them quickly to other routers to avoid loops

QUESTION 107

Core Layer

ANSWER

In terms of network hierarchy, this provides a highly available network backbone. Its purpose should be kept simple: provide redundant traffic paths for data to continue to flow around the access and distribution layers of the network.

QUESTION 108

CRC (Cyclical Redundancy Check)

ANSWER

algorithm treats a block of transmitted data as a single large binary number and divides this by a 16- or 32-bit number (called the polynomial). The remainder of this division is termed the checksum. This is transmitted with the data and is compared to the checksum generated by the receiving modem. If the two are not the same, the data block is rejected and a request for data re-transmission is sent to the source.

QUESTION 109

Crimper

ANSWER

A tool to join a network jack to the ends of network patch cable.

QUESTION 110

Cross-connect

ANSWER

A distribution frame providing a central termination point for cabling. Horizontal cross-connects distribute wiring to user work areas. On a data network, these are usually implemented as patch panels.

QUESTION 111

Crossover Cable

ANSWER

Cabling where the transmit pair at one end is connected to the receive pair at the other. This enables two hosts to communicate directly without a hub (or the connection of two hubs).

QUESTION 112

Crosstalk

ANSWER

A phenomenon whereby one wire causes interference in another as a result of their close proximity. the wires ensures the emitted signals from one wire are cancelled out by the emitted signals from the other and it also protects the wires from external interference.

QUESTION 113

Cryptographic Algorithm

ANSWER

This is a mathematical function that transforms plaintext into ciphertext in such a way that the plaintext cannot be recovered without knowledge of the appropriate key.

QUESTION 114

CSIRT (Computer Security Incident Response Team)

ANSWER

a group of individuals at a company with extensive decision making and technical skills required to deal with incidents.

QUESTION 115

CSU/DSU (Channel Service Unit/Data Service Unit)

ANSWER

Appliance providing connectivity to a digital circuit. The encodes the signal from Data Terminal Equipment (DTE) - that is, a PBX or router - to a signal that can be transported over the cable. is used to perform diagnostic tests on the line.

QUESTION 116

Custom Subnet

ANSWER

A collection of IP addresses that are divided into smaller groups to serve a network's needs.

QUESTION 117

Data Deduplication

ANSWER

The techniques used to consolidate multiple copies of the same file in a single location.

QUESTION 118

Data Link Layer

ANSWER

OSI model layer responsible for transferring data between nodes. This layer is split into two sublayers: Media Access Control (MAC) and Logical Link. Devices operating at this layer include network adapters, bridges, switches, and wireless access points.

QUESTION 119

Data Rollup

ANSWER

A method of optimizing logs by summarizing them over a certain period of time through averaging out individual sample values.

QUESTION 120

Decimal

ANSWER

A number system of base 10 where a digit can take any one of ten different values (0 - 9).

QUESTION 121

Default Account

ANSWER

Default administrative and guest accounts configured on servers and network devices are possible points of unauthorized access

QUESTION 122

Default Gateway

ANSWER

is a TCP/IP address parameter that identifies the location of a router on the local subnet that the host can use to contact other networks.

QUESTION 123

Default Route

ANSWER

A special type of static route that identifies the next hop router for an unknown destination. This route is only used if there are no matches for the destination in the rest of the routing table.

QUESTION 124

Default Subnet Mask

ANSWER

This uses the value of eight 1s in binary, or 255 in decimal, to mask an entire octet of the IP address.

QUESTION 125

dhclient

ANSWER

A configuration utility that enables you to configure and manage DHCP settings on the network interfaces of a computer. Supported on Linux and UNIX.

QUESTION 126

DHCP ACK

ANSWER

The last step in the DHCP client initialization where, assuming the DHCPOFFER is still valid, the server will respond to a DHCPREQUEST from the client with an acknowledgement packet.

QUESTION 127

DHCPDISCOVER

ANSWER

The first step in DHCP client initialization where it broadcasts to find a DHCP server. All communications are sent using UDP, with the server listening on port 67 and the client on port 68.

QUESTION 128

DHCP (Dynamic Host Configuration Protocol) Address Pool

ANSWER

The range of IP addresses that a DHCP server can allocate to clients on a particular subnet. Microsoft refers to this as a scope.

QUESTION 129

DHCP (Dynamic Host Configuration Protocol) Discover

ANSWER

A broadcast sent by a node when it is ready to communicate with a DHCP server.

QUESTION 130

DHCP (Dynamic Host Configuration Protocol) relay Agent

ANSWER

A service that captures a BOOTP broadcast and forwards it through the router as a unicast transmission to a DHCP server on a remote subnet.

QUESTION 131

DHCP (Dynamic Host Configuration Protocol) Request

ANSWER

A message returned to a DHCP server by a client that asks to lease an IP address from the DHCP server.

QUESTION 132

DHCP (Dynamic Host Configuration Protocol) Reservation

ANSWER

DHCP lease assignments that enable you to configure a permanent IP address for a client.

QUESTION 133

DHCP (Dynamic Host Configuration Protocol) Scope

ANSWER

the IP addresses that a DHCP server is configured with and can assign to clients.

QUESTION 134

DHCP (Dynamic Host Configuration Protocol) Server

ANSWER

A TCP/IP networking service that allows a client to request an appropriate IP configuration from a server. The server is configured with a range of addresses to lease. Hosts can be configured to acquire an IP address dynamically or be assigned a static IP address, based on the host's MAC address. The server can also provide other TCP/IP configuration information, such as the location of DNS servers. utilizes UDP ports 67 and 68. It is important to monitor the network to ensure that only valid DHCP servers are running on the network.

QUESTION 135

DHCPOFFER

ANSWER

When a DHCP server responds to the client with an IP address and other configuration information after a DHCPDISCOVER broadcast from the client. The IP addressing information is offered for a period of time.

QUESTION 136

DHCPREQUEST

ANSWER

The packet sent when the client accepts the DHCPOFFER from the server.

QUESTION 137

DHCPv6 (Dynamic Host Configuration Protocol v6)

ANSWER

The IPv6 equivalent of DHCP for IPv4 networks. It is used to configure IPv6 hosts with IP addresses, IP prefixes, and other configuration data required to operate in an IPv6 network.

QUESTION 138

DHCPv6 Prefix Delegation (PD)

ANSWER

Used by Internet Service Providers (ISP) to provide routable address prefixes to a SOHO router, installed as Customer Premises Equipment (CPE).

QUESTION 139

Dial-up

ANSWER

A remote network access method that utilizes the local telephone line (Plain Old Telephone System [POTS]) to establish a connection between two computers fitted with modems.

QUESTION 140

DiffServ

ANSWER

The Differentiated Services Code Point (DSCP) field is used to indicate a priority value for a layer 3 (IP) packet to facilitate Quality of Service (QoS) or Class of Service (CoS) scheduling.

QUESTION 141

dig (Domain Information Groper)

ANSWER

Utility to query a DNS and return information about a particular domain name.

QUESTION 142

Digital Certificate

ANSWER

An X.509 digital certificate is issued by a Certificate Authority (CA) as a guarantee that a public key it has issued to an organization to encrypt messages sent to it genuinely belongs to that organization

QUESTION 143

Digital Signaling

ANSWER

This form of signaling using discrete states to represent simple values, such as 1 or

QUESTION 144

Directly Connected Route

ANSWER

Once a router has received a packet, it goes through the same process that the source host did to calculate whether the packet needs to be routed to another router or whether the packet can be delivered locally to another interface

QUESTION 145

Directory Services

ANSWER

These provide general and security information (permissions) for network users and objects.

QUESTION 146

Disaster Recovery Plan

ANSWER

A documented and resourced plan showing actions and responsibilities to be used in response to critical incidents.

QUESTION 147

Disposal

ANSWER

refers to both information security and environmental damage issues when decommissioning out-of-date or used systems

QUESTION 148

Distribution Layer

ANSWER

this layer provides fault-tolerant interconnections between different access blocks and either the core or other distribution blocks. This layer is often used to implement traffic policies, such as routing boundaries, filtering, or Quality of Service (QoS).

QUESTION 149

Distributed Switching

ANSWER

An enterprise network will feature multiple switch appliances arranged in a fault-tolerant hierarchy and often centrally managed and automated using Software Defined Networking (SDN)

QUESTION 150

Divide and Conquer Approach

ANSWER

An approach to troubleshooting in which, rather than starting at the top or bottom, you start with the layer of the OSI Mdel most likely to be causing the problem and then working either down or up depending on what your tests revea.

QUESTION 151

DLP (Data Loss Prevention)

ANSWER

Software that can identify data that has been classified and apply "fine-grained" user privileges to it to prevent copying it or forwarding by email, for instance.

QUESTION 152

DMVPN (Dynamic Multipoint VPN)

ANSWER

A software-based mechanism that allows VPNs to be built and deleted dynamically.

QUESTION 153

DMZ (Demilitarized Zone)

ANSWER

A private network connected to the Internet must be protected against intrusion from the Internet.

QUESTION 154

DNS (Domain Name System)

ANSWER

This industry standard name resolution system provides name to IP address mapping services on the Internet and large intranets. is a hierarchical, distributed database.

QUESTION 155

DNS Forwarder

ANSWER

A name server that has been configured to provide forwarding, transmitting a client query to another DNS server and routing the replies it gets back to the client.

QUESTION 156

DNS Records

ANSWER

DNS servers store information about resources in different types of records

QUESTION 157

DNS Root

ANSWER

The top of the DNS hierarchy, which is often represented by a period (.).

QUESTION 158

Documenting Findings, Actions, and Outcomes

ANSWER

Once an issue has been resolved, this is the process of recording what happened during the troubleshooting practice and the outcomes in order to effectively inform future issues and ensure troubleshooting efficiency.

QUESTION 159

Domain

ANSWER

A group of computers which share a common accounts database, referred to as the directory.

QUESTION 160

DoS (Denial of Service)

ANSWER

A network attack that aims to disrupt a service, usually by overloading it.

QUESTION 161

Dotted Decimal Notation

ANSWER

In IPv4, a way of writing each octet so that it is converted to a decimal value. The decimal numbers are separated using a period.

QUESTION 162

Driver

ANSWER

Software that provides an interface between the operating system and the device.

QUESTION 163

DSL (Digital Subscriber Line)

ANSWER

A technology for transferring data over voice-grade telephone lines. This technology uses the higher frequencies available in a copper telephone line as a communications channel. The use of a filter prevents this from contaminating voice traffic with noise. The use of advanced modulation and echo cancelling techniques enable high bandwidth, full-duplex transmissions.

QUESTION 164

DTLS (Datagram TLS)

ANSWER

Transport Layer Security (TLS) is usually used with TCP-based protocol. This is UDP that is secured with TLS. This is often used for VPNs.

QUESTION 165

Dual Stack

ANSWER

A host operating multiple protocols simultaneously on the same interface. Most hosts are capable of dual stack IPv4 and IPv6 operation for instance.

QUESTION 166

Dynamic DNS

ANSWER

A DNS server that allows clients to update their records automatically when their IP addresses change (if they are assigned by DHCP for instance). The main issue is ensuring that updates are secure.

QUESTION 167

Dynamic Ports

ANSWER

Ports that fall between 49,152 and 65,535 that are set aside for use by unregistered services and services (typically, client applications) needing a temporary connection.

QUESTION 168

Dynamic Routing

ANSWER

Routers that perform route discovery operations to build and update routing tables themselves by using specially designed software

QUESTION 169

Dynamic Routing Protocol

ANSWER

A protocol running on a router that can automatically detect network traffic congestion or device failures and calculate a different routing path.

QUESTION 170

EAP (Extensible Authentication Protocol)

ANSWER

Framework for negotiating authentication methods, supporting a range of authentication devices. EAP-TLS uses PKI certificates, Protected EAP (PEAP) creates a TLS-protected tunnel between the supplicant and authenticator to secure the user authentication method, and Lightweight EAP (LEAP) is a password-based mechanism used by Cisco.

QUESTION 171

Eavesdropping

ANSWER

Some transmission media are susceptible to listening in on communications sent over the media.

QUESTION 172

EGP (Exterior Gateway Protocol)

ANSWER

A protocol that can perform routing between autonomous systems.

QUESTION 173

EIGRP (Enhanced Interior Gateway Routing Protocol)

ANSWER

is a distance vector-based routing protocol using a metric composed of several administrator weighted elements including reliability, bandwidth, delay, and load. , the version now in use, supports classless addressing and more efficient route selection.

QUESTION 174

Elasticity

ANSWER

A benefit or capability of the cloud allowing it to scale to meet peak demand.

QUESTION 175

Email

ANSWER

An electronic store and forward messaging system.

QUESTION 176

EMI (Electromagnetic Interference)

ANSWER

EMI sources (such as fluorescent lights, air conditioning, and power cables) can corrupt signals.

QUESTION 177

Encryption

ANSWER

Scrambling the characters used in a message so that the message can be seen but not understood or modified unless it can be deciphered.

QUESTION 178

Enterprise LAN

ANSWER

A larger network with hundreds or thousands of servers and clients.

QUESTION 179

Environment

ANSWER

means ensuring stable supply of essential utilities (communications links, power, heating, water, transportation), protection against disaster (such as fire or flood), and shielding for communications systems (wired and wireless) to prevent eavesdropping.

QUESTION 180

Escalation

ANSWER

The process of referring a problem to a senior technician, manager, or third party with either more or more specific skills, or due to a unique problem that another individual specializes in.

QUESTION 181

ESD (Electrostatic Discharge)

ANSWER

The charging of a metal object due to it being in close proximity to electrical sources or if they are brushed against.

QUESTION 182

ES (End Systems)

ANSWER

Hosts with no capacity to forward packets to other IP networks.

QUESTION 183

Establishing a Plan of Action

ANSWER

Taken after you establish a probably cause, you'll create an action plan to resolve the issues, which could be to repair, replace, or ignore an issue.

QUESTION 184

Establishing a Probable Cause

ANSWER

Taken after you identify the problem, you use the answers to your initial questioning to establish a rough idea of where to look, what to look for, and what to diagnose.

QUESTION 185

Ethernet (802.3)

ANSWER

A popular Local Area Networking technology defining media access and signaling methods.

QUESTION 186

EUI (Extended Unique Identifier)

ANSWER

IEEE's preferred term for a network interface's unique identifier. An EUI-48 corresponds to a MAC address while an EUI-64 is one that uses a 64-bit address space. There is an IPv6 translation mechanism to convert EUI-48 addresses to EUI-64 ones.

QUESTION 187

Evil Twin

ANSWER

an attack where the attacker creates a malicious wireless access point masquerading as a genuine one, enabling the attacker to harvest confidential information as users connect via the AP.

QUESTION 188

Extended Unique Identifier (EUI-64)

ANSWER

A host computer running IPv6 can use this IEEE standard to self-assign its interface addresses. With this standard, the MAC address is padded in the center with FFFE, extending it to 64 bits in length.

QUESTION 189

Extranet

ANSWER

A network of semi-trusted hosts, typically representing business partners, suppliers, or customers. Hosts must authenticate to join this network.

QUESTION 190

False Positive/False Negative

ANSWER

Error in monitoring or identification technology that either reports an event as an incident when it is not (false positive) or does not report an event as an incident (false negative).

QUESTION 191

Fault Tolerance (Redundancy)

ANSWER

Protection against system failure by providing extra (redundant) capacity.

QUESTION 192

FC (Fibre Channel)

ANSWER

High-speed network communications protocol used to implement SANs.

QUESTION 193

FCoE (Fibre Channel over Ethernet)

ANSWER

Standard allowing for a mixed use Ethernet network with both ordinary data and storage network traffic.

QUESTION 194

Fiber Optic Cable

ANSWER

cable employs light signals as the basis for data transmission as opposed to the electrical signals that are used by the other main cable types.

QUESTION 195

Fire Suppression

ANSWER

These systems are mandatory in most public and private commercial premises. They can be water-based, dry pipe, or gas-based systems

QUESTION 196

Firewall

ANSWER

Hardware or software that filters traffic passing into or out of a network (for example, between a private network and the Internet). A basic packetfiltering works at Layers 3 and 4 (Network and Transport) of the OSI model.

QUESTION 197

Firmware

ANSWER

This refers to software instructions stored semi-permanently (embedded) on a hardware device (BIOS instructions stored in a ROM chip on the motherboard for instance).

QUESTION 198

First Responder

ANSWER

the first individuals on a scene who take the critical first steps when a security incident is discovered

QUESTION 199

Flat Routing System

ANSWER

A routing system where all routers can inter-communicate with one another. Each network ID requires a separate entry in the routing table, which can be problematic in very large internetworks.

QUESTION 200

Flood/Flooding

ANSWER

A network transmission state in which data arrives at a receiving node too quickly to be processed.

QUESTION 201

Flood Guard

ANSWER

A firewall or IPS that prevents DDoD attacks where multiple compromised "bots" attempt to deny network connectivity by flooding it with malicious packets.

QUESTION 202

Flow Control

ANSWER

An important function of TCP which handles the flow of packets to ensure the sender does not inundate the receiver with packets.

QUESTION 203

FQDN (Fully Qualified Domain Name)

ANSWER

a name in DNS specifying a particular host within a subdomain within a top-level domain.

QUESTION 204

Frame

ANSWER

The basic "unit" of data transmitted at layer 2. These contain several components - the source and target MAC (hardware) addresses as well as the data and error checking regions. Start and stop signals signify the beginning and the end of the frame respectively.

QUESTION 205

Frame Relay

ANSWER

Packet switched WAN protocol running over T-carrier or ISDN. Frame Relay is no longer widely deployed.

QUESTION 206

FTP (File Transfer Protocol)

ANSWER

A protocol used to transfer files across the Internet. Variants include S(ecure)FTP, FTP with SSL (FTPS and FTPES) and T(rivial)FTP. FTP utilizes ports 20 and 21.

QUESTION 207

FTPS

ANSWER

A type of FTP using SSL for confidentiality.

QUESTION 208

Full-duplex

ANSWER

Two-way communications taking place simultaneously.

QUESTION 209

Gateway

ANSWER

A computer or other device that acts as a translator between two completely dissimilar computer systems.

QUESTION 210

GPS (Global Positioning System)

ANSWER

Means of determining a receiver's position on the Earth based on information received from satellites. The receiver must have line-of-sight to such satellites.

QUESTION 211

GRE (Generic Routing Encapsulation)

ANSWER

A tunneling protocol allowing the transmission of encapsulated frames or packets from different types of network protocol over an IP network.

QUESTION 212

Ground Connection

ANSWER

This safety feature ensures that, if an electrical connection short circuits into a metal chassis, the current flows to the earth rather than electrocuting someone handling a faulty device.

QUESTION 213

GSM (Global System for Mobile Communication)

ANSWER

2G cellular data standard, capable of links of up to about 14.4 Kbps.

QUESTION 214

H.323

ANSWER

Session control protocol for VoIP and messaging networks running over TCP port 1720.

QUESTION 215

Half-duplex

ANSWER

Two-way communications not taking place simultaneously.

QUESTION 216

Hardware Failure

ANSWER

A fault in a physical electronic components of a computer system, cable, or other component. These often require that a component or system be partially or completely replaced.

QUESTION 217

Heat Map

ANSWER

In a Wi-Fi site survey, a diagram showing signal strength at different locations.

QUESTION 218

Hexadecimal

ANSWER

A number system of base 16 where a digit can take any one of 16 different values, 0-9 and A-F representing values greater than 9.

QUESTION 219

Hierarchical Routing System

ANSWER

A routing system where certain routers form a routing backbone and other routers are grouped into logical collections, sometimes called areas or domains.

QUESTION 220

Hoaxes

ANSWER

Email, instant messaging, and website pop-ups are commonly used to spread false information, such as false virus or spyware alerts.

QUESTION 221

Honeypot/Honeynet

ANSWER

A computer setup to entice attackers with the purpose of discovering attack strategies and weaknesses in the security configuration.

QUESTION 222

Hop

ANSWER

One link in the path from a host to a router or from router to router. Each time a packet passes through a router, the count of these (or TTL) is decreased by one.

QUESTION 223

Host ID

ANSWER

Of an IP address, the unique number that identifies a host on an IP network.

QUESTION 224

Host Name

ANSWER

A name assigned to a computer by an administrator. This name consists of letters, numbers, and hyphens.

QUESTION 225

Host

ANSWER

In TCP/IP networking terminology, this is a device that can directly communicate on a network.

QUESTION 226

HOSTS File

ANSWER

The first method for resolving host names to IP addresses before DNS was available, which was a text file of host name to IP address mappings.

QUESTION 227

HR Policy

ANSWER

Users are usually seen as the weak point of any security system. Other security considerations for the department are coordinating secure recruitment and termination procedures. This means screening new employees through background checks, ensuring employees are set up with the correct privileges when they join or change job roles, and ensuring that privileges are revoked if the employee is fired or retires.

QUESTION 228

HSP A+ (High Speed Packet Access)

ANSWER

is one of a number of data access standards over cellular networks (3GPP). It is usually described as a 3.5G standard as it provides significantly better bandwidth than technologies it replaces (168 Mbps downstream and 22 Mbps upstream).

QUESTION 229

HTTP

ANSWER

used to provide web content to browsers. uses port 80

QUESTION 230

Hub

ANSWER

An OSI layer 1 network device used to implement a star network topology on legacy Ethernet networks. These devices may also be known as "multiport repeaters" or concentrators. They are the central points of connection for segments and act like repeaters so that every segment receives signals sent from any other segment.

QUESTION 231

Hybrid Topology

ANSWER

A network that uses a combination of physical or logical topologies. In practice most networks use hybrid topologies

QUESTION 232

IaaS (Infrastructure as a Service)

ANSWER

A means of provisioning IT resources such as servers, load balancers, and Storage Area Network (SAN) components quickly. Rather than purchase these components and the Internet links they require, you rent them on an as-needed basis from the service provider's data center

QUESTION 233

IANA (Internet Assigned Numbers Authority)

ANSWER

the organization that organizes, maintains, and key elements of the Internet, including assigning processes to port numbers 0 through 1023.

QUESTION 234

ICMP Destination Unreachable

ANSWER

This class of message indicates that a local host or a host on a remote network (or a protocol or port on a host) cannot be contacted. might be caused by some sort of configuration error or by a host or router not being available.

QUESTION 235

ICMP Echo Request/Reply

ANSWER

these are used for testing a connection with the ping utility. If a request message reaches the destination host, it generates a reply and sends it back to the source. If the request message does not reach its destination, an appropriate error message is generated.

QUESTION 236

ICMP (Internet Control Message Protocol)

ANSWER

IP-level protocol for reporting errors and status information supporting the function of troubleshooting utilities such as ping.

QUESTION 237

ICMP Time Exceeded

ANSWER

This is used when the Time to Live (TTL) of a packet reaches zero. The TTL field in a packet has a maximum value of 255 and this value is reduced by one every time the packet crosses a router. The TTL is eventually reduced to zero if the packet is looping (because of a corrupted routing table) or when congestion causes considerable delays. The router then discards the packet and a warning packet is sent back to the source host.

QUESTION 238

ICMPv6 (Internet Control Message Protocol v6)

ANSWER

An updated version of ICMP for IPv6 that supports error messaging and informational messaging.

QUESTION 239

IDC (Insulation Displacement Connector)

ANSWER

Block used to terminate twisted pair cabling. The main formats are 110 and Krone.

QUESTION 240

Identifying the Problem

ANSWER

The first step in the troubleshooting process, used to establish what the best source of information about the problem may be. In this step, you gather information, question users, identify symtoms, duplicate the problem, and determine if anything has changed.

QUESTION 241

DS (Intrusion Detection System)

ANSWER

Software or security appliance designed to monitor network traffic (NIDS) or configuration files and logs on a host (HIDS) to record and detect unusual activity. Many systems can automatically take preventive action (Intrusion Prevention System [IPS]). Detection is either signature-based or anomaly- based (or both). IDS software typically requires a lengthy period of configuration and "training" to recognize baseline "normal" activity.

QUESTION 242

IEEE (Institute of Electrical and Electronics Engineers)

ANSWER

Formed as a professional body to oversee the development and registration of electronic standards.

QUESTION 243

ifconfig

ANSWER

A utility providing information about the IP configuration of a UNIX/Linux-based workstation.

QUESTION 244

IGMP (Internet Group Management Protocol)

ANSWER

TCP/IP suite network protocol supporting multicast operations.

QUESTION 245

IGP (Interior Gateway Protocol)

ANSWER

A protocol that performs routing within a network under the administrative control of a single owner, also referred to as an Autonomous System (AS).

QUESTION 246

IMAP (Internet Message Access Protocol)

ANSWER

TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server. supports mailbox management functions, such as creating subfolders and access to the same mailbox by more than one client at the same time. IMAP4 utilizes TCP port number 143.

QUESTION 247

Implicit Deny

ANSWER

A default firewall rule used to block any traffic that has not matched a rule.

QUESTION 248

Incident Response Policy

ANSWER

Procedures and guidelines covering appropriate priorities, actions, and responsibilities in the event of security incident

QUESTION 249

InfiniBand

ANSWER

A high-speed switching fabric used in SANs and data center networks.

QUESTION 250

Internet of Things

ANSWER

The global network of personal devices, such as phones, tablets, and fitness trackers), home appliances, home control systems, vehicles, and other items that have been equipped with sensors, software, and network connectivity. This is a term generally used to refer to Internet-enabled devices and appliances.

QUESTION 251

Internet

ANSWER

a worldwide network of networks based on the TCP/IP protocol.

QUESTION 252

Intranet

ANSWER

A network designed for information processing within a company or organization. This network uses the same technologies as the Internet but is owned and managed by a company or organization.

QUESTION 253

Inventory

ANSWER

a list of things, usually stored in a database. are usually compiled for assets.

QUESTION 254

IP Address

ANSWER

A unique address given to each IP host. This can be manually assigned or dynamically allocated (using a DHCP server).

QUESTION 255

IP AM (IP Address Management)

ANSWER

Software consolidating management of multiple DHCP and DNS services to provide oversight into IP address allocation across an enterprise network.

QUESTION 256

ipconfig

ANSWER

A utility providing information about the IP configuration of a Windows workstation.

QUESTION 257

IP Exclusions

ANSWER

In DHCP, the ability to configure a range of IP addresses (or a single IP address) to be excluded from those being offered for automatic assigning to DHCP clients. These addresses are often reserved for mission critical devices.

QUESTION 258

IP (Internet Protocol)

ANSWER

Network (internet) layer protocol in the TCP/IP suite providing packet addressing and routing for all higher level protocols in the suite.

QUESTION 259

ip

ANSWER

A utility providing information about the IP configuration of a UNIX/Linux-based workstation

QUESTION 260

IPsec

ANSWER

Layer 3 protocol suite providing security for TCP/IP. It can be used in two modes (transport, where only the data payload is encrypted, and tunnel, where the entire IP packet is encrypted and a new IP header added).

QUESTION 261

iptables

ANSWER

A command line utility provided by many Linux distributions that allows administrators to edit the rules enforced by the Linux kernel firewall.

QUESTION 262

IPv6 Address Compression

ANSWER

The process of shortening the IPv6 addresses (which is a series of eight 16-bit numbers expressed as hexadecimal digits) by omitting leading zeros and replacing consecutive fields of zeros with a double colon.

QUESTION 263

IPv6 Addresses

ANSWER

A long-term solution to the problem of address space exhaustion by using a 128-bit addressing scheme assigned to a computer on a TCP/IP network.

QUESTION 264

IPv6 Global Addresses

ANSWER

Globally routable public addresses. Also known as aggregatable global unicast addresses, they are designed such that they can be summarized for efficient routing. These are the equivalent of the entire IPv4 public address space.

QUESTION 265

IPv6 Link-local Addressing

ANSWER

Addresses that are used to communicate and automatically assigned on private network segments with no router. These addresses usually begin with FE80, but can range from FE80 to FCFF. They are the equivalent of self-assigned IPv4 automatic private IP addressing (APIPA) addresses.

QUESTION 266

IPv6 Prefix

ANSWER

the leftmost bits of the address that are used for routing IPv6 packets.

QUESTION 267

IPv6 Reserved Addresses

ANSWER

The 0000::/8 block (that is, IPv6 addresses where the first bits are 0000 0000) is reserved for special functions. These include two special addresses: unspecified address and loopback address

QUESTION 268

IPv6 Transitional Addresses

ANSWER

Addresses used on mixed networks to support routing of IPv6 data across IPv4 networks. This class will be phased out when all routers convert to IPv6

QUESTION 269

IR (Infrared)

ANSWER

Infrared Data Association (IrDA) was a wireless networking standard supporting speeds up to about 4 Mbps. These types of sensors are used in mobile devices and with IR blasters to control appliances.

QUESTION 270

ISAKMP (Internet Security Association and Key Management Protocol)

ANSWER

Most commonly referred to as part of the Internet Key Exchange (IKE) protocol as used in IPsec. This is a framework for creating a Security Association (SA). An SA establishes that two hosts trust one another (authenticate) and agree secure protocols and cipher suites to use to exchange data.

QUESTION 271

iSCSI (Internet SCSI)

ANSWER

IP tunneling protocol that enables the transfer of SCSI data over an IP-based network to create a SAN.

QUESTION 272

ISDN (Integrated Services Digital Network)

ANSWER

A digital phone/fax/data service, often used to provide Internet connectivity. There are two classes of this service: Basic Rate Interface (BRI) provides two 64 Kbps (B channels) for data and one 16 Kbps (D channel) for link management control signals; Primary Rate Interface (PRI) provides either T1 or E1 capacity levels (23B or 30B) channels, depending on location in the world and one 64 Kbps D channel.

QUESTION 273

IS (Intermediate Systems)

ANSWER

Routers that interconnect IP networks and can perform packet forwarding on behalf of hosts that cannot do so themselves.

QUESTION 274

ISP (Internet Service Provider)

ANSWER

provides a connection to the Internet and other web- and email-related services. A connection to these organizations' Internet routing equipment can be made using a variety of methods.

QUESTION 275

IV (Initialization Vector) Attack

ANSWER

Faults in the way that WEP implements the stream cipher used to encrypt traffic mean that the key can be recovered using cryptanalysis tools such as Aircrack given sufficient packets to analyze. Such tools can typically crack both 64-bit and 128-bit WEP encryption in a matter of minutes. WPA is not vulnerable to this attack (though weak passwords are still vulnerable to dictionary cracking).

QUESTION 276

Jitter

ANSWER

A variation in the time it takes for a signal to reach the recipient.

QUESTION 277

Jumbo Frame

ANSWER

An Ethernet frame with a payload larger than 1500 bytes (up to about 9000 bytes). are often used on Storage Area Networks.

QUESTION 278

Kerberos

ANSWER

this is an authentication standard and protocol. Windows networks use this protocol for client and server authentication. This provides a Single Sign-On (SSO) authentication scheme where clients authenticate once to a Key Distribution Center and are granted service tickets to use particular applications without having to log on to each application separately.

QUESTION 279

Key Benefits of IPv6

ANSWER

Small, efficient IP headers, stateless auto-reconfiguration of hosts, a new field in the header to guarantee network resource allocation, and network-layer encryption and authentication with IPSec.

QUESTION 280

LACP (Link Aggregation Control Protocol [IEEE 802.3ad/802.1ax])

ANSWER

IEEE protocol governing the use of bonded Ethernet ports (NIC teaming).

QUESTION 281

LAN (Local Area Network)

ANSWER

A type of network covering various different sizes but generally considered to be restricted to a single geographic location and owned/managed by a single organization.

QUESTION 282

Latency

ANSWER

The time it takes for a signal to reach the recipient.

QUESTION 283

LC (Lucent Connector)

ANSWER

Small Form Factor (SFF) version of the SC push-pull fiber optic connector; available in simplex and duplex versions.

QUESTION 284

LDAP (Lightweight Directory Access Protocol)

ANSWER

Standard for accessing and updating information in an X.500-style network resource directory. This protocol uses port 389.

QUESTION 285

Learned Route

ANSWER

A route that was communicated to the router by another router using a dynamic routing protocol. use these dynamic protocols to exchange information about connected networks periodically and select the best available route to a particular destination.

QUESTION 286

Licensing

ANSWER

Terms governing the installation and use of operating system and application software.

QUESTION 287

LLC (Logical Link Control)

ANSWER

This is a division of the data link layer described by the IEEE. It is responsible for establishing and maintaining a link between communicating devices for the transmission of frames. This process occurs at a service level (that is, whether the network is connection-oriented or connectionless) and at the flow and error control levels.

QUESTION 288

LLMNR (Link-Local Multicast Name Resolution)

ANSWER

A modified form of DNS that allows clients to perform name resolution on a local link without needing a server.

QUESTION 289

Load Balancer

ANSWER

A type of switch or router that distributes client requests between different resources, such as communications links or similarly-configured servers. This provides fault tolerance and improves throughput.

QUESTION 290

Load Testing

ANSWER

Also called stress testing, this is when a network administrator tests their systems under load to simulate working conditions or for assessing likely future problems under higher loads.

QUESTION 291

Logic Bomb

ANSWER

A malicious program or script that is set to run under particular circumstances or in response to a defined event.

QUESTION 292

Log

ANSWER

A list of events that contains metadata on those events and serves as a valuable information in understanding and aiding performance, troublshooting, and security (auditing).

QUESTION 293

Loopback Address

ANSWER

Part of a Class A IP address range used to configure a special address typically used to check that TCP/IP is correctly installed on the local host.

QUESTION 294

Loopback Test

ANSWER

used to verify the integrity of a port. To perform the test, a signal is generated by test software and sent to a loopback plug, connected to the port. The signal passes around the bus, network, or circuit and returns back to the plug. The plug compares what was sent to what was received, to evaluate whether the signal has degraded.

QUESTION 295

Loop Protection

ANSWER

if broadcast traffic is allowed to continually loop around a network, the number of broadcast packets increases exponentially, crashing the network.

QUESTION 296

LTE (Long Term Evolution)

ANSWER

Cellular provider (3GPP) upgrade to 3G technologies such as W-CDMA and HSPA. The advanced version of this is designed to provide 4G standard network access.

QUESTION 297

MAC Address Table

ANSWER

The table on a switch keeping track of MAC addresses associated with each port.

QUESTION 298

MAC Filter

ANSWER

Applying an access control list to a switch or access point so that only clients with approved MAC addresses can connect to it.

QUESTION 299

MAC (Media Access Control) Address

ANSWER

A unique hardware address that is hard-coded into a network card by the manufacturer

QUESTION 300

Mailbox

ANSWER

part of a message store designed to receive emails for a particular recipient.

QUESTION 301

Managed Switch

ANSWER

A switch that must be set up via a web interface or command line to effectively use and includes configuring settings for each of the switch port interfaces.

QUESTION 302

Management URL

ANSWER

An IP address or FQDN used to access the management interface of a network appliance

QUESTION 303

Man-in-the-middle

ANSWER

Where the attacker intercepts communications between two hosts.

QUESTION 304

MAN (Metropolitan Area Network)

ANSWER

A network that covers the area of a city (that is, no more than tens of kilometers). the network is larger than a LAN and smaller than a WAN, but it can operate at speeds that are comparable with LANs.

QUESTION 305

MD5 (Message Digest Algorithm v5)

ANSWER

A cryptographic hash function designed in 1990 by Ronald Rivest and uses a 128-bit hash value. It is now known to have extensive vulnerabilities.

QUESTION 306

Media Converter

ANSWER

Device to convert one media type to another (such as fiber optic to UTP).

QUESTION 307

Mesh Topology

ANSWER

A topology often used in WANs where each device has (in theory) a point-to-point connection with every other device (fully connected); in practice, only the more important devices are directly interconnected (partial mesh).

QUESTION 308

Metro Ethernet

ANSWER

A Metropolitan Area Network (MAN) using Ethernet standards and switching fabric.

QUESTION 309

Microsegmentation

ANSWER

The process of dividing up a network by using switches so that only two nodes exist in each collision domain.

QUESTION 310

MIMO (Multiple Input Multiple Output)/MU-MIMO

ANSWER

Wireless technology used in 802.11n and 4G standards. is the use of multiple reception and transmission antennas to boost bandwidth.

QUESTION 311

MLD (Multicast Listener Discovery Protocol)

ANSWER

This protocol allows nodes to join a multicast group and discover whether members of a group are present on a local subnet.

QUESTION 312

MMF (Multimode Fiber)

ANSWER

Category of fiber optic cable. is cheaper (using LED optics rather than lasers) but supports shorter distances (up to about 500m).

QUESTION 313

Modem (Modulator/Demodulator)

ANSWER

This device is used to interface a computer with the telephone network for data and fax communications.

QUESTION 314

MPLS (Multiprotocol Label Switching)

ANSWER

Developed by Cisco from ATM as a means of providing traffic engineering (congestion control), Class of Service, and Quality of Service within a packet switched, rather than circuit switched, network.

QUESTION 315

MSDS (Materials Safety Data Sheet)

ANSWER

Information sheet accompanying hazardous products or substances explaining the proper procedures for handling and disposal.

QUESTION 316

MT-RJ (Mechanical Transfer Registered Jack)

ANSWER

Small Form Factor duplex fiber optic connector with a snap-in design; used for multimode networks.

QUESTION 317

mtr (my traceroute)

ANSWER

Utility combining the ping and traceroute commands.

QUESTION 318

MTTR/MTTF/MTBF

ANSWER

Mean Time to Failure (MTTF) and Mean Time Between Failures (MTBF) represent the expected lifetime of a product or system. Mean Time to Repair (MTTR) is a measure of the time taken to correct a fault so that the system is restored to full operation.

QUESTION 319

MTU (Maximum Transmission Unit)

ANSWER

The maximum size in bytes of a packet's payload. If the payload cannot be encapsulated within a single packet of the transporting layer, it must be fragmented.

QUESTION 320

Multicast

ANSWER

A packet sent to a selection of hosts (in IP, those belonging to a multicast group)

QUESTION 321

Multifactor Authentication

ANSWER

A strong authentication method that requires multiple forms of authentication schemes, including something you know, something you have, or something you are (for example, protecting use of a smart card certification [something you have] with a PIN [something you know]).

QUESTION 322

Multilayer Switch

ANSWER

A switch that can route based on the contents of packets at layers 3 and up. A layer 3 switch is used to route more effectively in a VLAN environment.

QUESTION 323

Multimeter

ANSWER

An electrical meter capable of measuring voltage, resistance, and current

QUESTION 324

MX (Mail eXchanger)

ANSWER

A resource record used to identify an email server for the domain.

QUESTION 325

NAC (Network Access Control)

ANSWER

A means of ensuring endpoint security; that is, ensuring that all devices connecting to the network conform to a "health" policy (patch level, antivirus/firewall configuration, and so on).

QUESTION 326

Name Resolution Order

ANSWER

The process a client goes through when attempting to resolve a name, for example, starting with checking the DNS cache to quering DNS to using LLMNR to using NetBIOS.

QUESTION 327

Name Resolution

ANSWER

The process of resolving a host name or FQDN to its IP address, as well as ensuring the names are unique.

QUESTION 328

NAPT (Network Address Port Translation)

ANSWER

this maps private host IP addresses onto a single public IP address. Each host is tracked by assigning it a random high TCP port for communications.

QUESTION 329

NAS (Network Attached Storage)

ANSWER

A storage device with an embedded OS that supports typical network file access protocols (TCP/IP and SMB for instance).

QUESTION 330

NA T (Network Address Translation)

ANSWER

to map the private address to one or more publicly accessible IP addresses

QUESTION 331

NDA (Non-Disclosure Agreement)

ANSWER

The legal basis for protecting information assets.

QUESTION 332

Neighbor Discovery

ANSWER

the process of using Internet Control Message Protocol (ICMPv6) messages and solicited-host multicast addresses to determine the link-layer address of a host on the local link, verify that a neighbor host can be reached, and track neighboring devices.

QUESTION 333

Neighbor Discovery Protocol

ANSWER

This protocol replaces some functions of ARP and ICMP on IPv6 networks, and is used to perform address resolution while greatly reducing the number of hosts that are likely to receive network discovery messages, thus making it more efficient than ARP.

QUESTION 334

Neighbor

ANSWER

Another node on the same link.

QUESTION 335

NetBEUI/NetBIOS

ANSWER

A proprietary Microsoft network transport protocol typically found in non-routed networks. is a session management protocol used to provide name registration and resolution services on legacy Microsoft networks.

QUESTION 336

netstat

ANSWER

Utility to show network information on a machine running TCP/IP, notably active connections and the routing table.

QUESTION 337

Network Adapter (NIC [Network Interface Card])

ANSWER

This hardware componenet allows a physical connection between the host and the transmission media. It can address other cards and can recognize data that is destined for it, using a unique address known as the Media Access Control (MAC) address. The card also performs error checking.

QUESTION 338

Network ID

ANSWER

Of an IP address, the number common to all hosts on the same IP network.

QUESTION 339

Network Mapper

ANSWER

Software that can scan a network and identify hosts, addresses, protocols, network interconnections, and so on.

QUESTION 340

Network Monitoring

ANSWER

Auditing software that collects status and configuration information from network devices. Many products are based on the Simple Network Management Protocol (SNMP).

QUESTION 341

Network Operating System (NOS) Firewall

ANSWER

A software-based firewall running under a network server OS, such as Windows or Linux. The server would function as a gateway or proxy (see below) for a network segment.

QUESTION 342

Network Separation

ANSWER

Enforcing a security zone by separating a segment of the network from access by the rest of the network. This could be accomplished using firewalls or VPNs or VLANs. A physically separate network or host (with no cabling or wireless links to other networks) is referred to as air-gapped.

QUESTION 343

NFC (Nearfield Communications)

ANSWER

tandard for peer-to-peer (2-way) radio communications over very short (around 4") distances, facilitating contactless payment and similar technologies. This technology is based on RFID.

QUESTION 344

NGFW/Layer 7 Firewall

ANSWER

A Next Generation Firewall (NGFW) is capable of parsing application layer protocol headers and data (such as HTTP or SMTP) so that sophisticated,content-sensitive ACLs can be developed.

QUESTION 345

NGFW (Next Generation Firewall)

ANSWER

Also known as a Layer 7 Firewall or Application Layer Gateway, this firewall can inspect and parse (interpret) the contents of packets at the application layer.

QUESTION 346

Nmap

ANSWER

Versatile port scanner used for topology, host, service, and OS discovery and enumeration.

QUESTION 347

nslookup

ANSWER

A tool for querying DNS server records.

QUESTION 348

NS (Name Server)

ANSWER

A resource record that identifies authoritative DNS name servers for the zone.

QUESTION 349

NTP (Network Time Protocol)

ANSWER

TCP/IP application protocol allowing machines to synchronize to the same time clock. NTP runs over UDP port 123.

QUESTION 350

Octets

ANSWER

In IPv4 address structure, the 32 bits that are subdivided into four groups of 8 bits (1 byte).

QUESTION 351

OCx (Optical Carrier)

ANSWER

Alternative designation for SONET bandwidth service levels.

QUESTION 352

OOB (Out-of-Band) Management

ANSWER

Accessing the administrative interface of a network appliance using a separate network from the usual data network. This could use a separate VLAN or a different kind of link, such as a dial-up modem.

QUESTION 353

Open Port

ANSWER

A TCP or UDP port number that is configured to accept packets. These ports can be considered a potential security vulnerability if abused by hackers.

QUESTION 354

OS Fingerprinting

ANSWER

Identifying the type and version of an operating system (or server application) by analyzing its responses to network scans

QUESTION 355

OS Hardening

ANSWER

The process of making the OS (or Network OS) configuration secure.

QUESTION 356

OSI (Open Systems Interconnection) Reference Model

ANSWER

created by the ISO to aid the understanding of how a network system functions in terms of both software and hardware components. The model divides the actions of hardware and software into seven separate sub-tasks: Physical, Data Link, Network, Transport, Session, Presentation, and Application, each with a separate function. The model serves as a functional reference for network communication. It does not represent any individual standard although many protocols do comply with its guidelines.

QUESTION 357

OSPF (Open Shortest Path First)

ANSWER

A hierarchical link-state interior gateway routing protocol, this is well suited to large organizations with multiple redundant paths between various networks. It has high convergence performance.

QUESTION 358

OTDR (Optical Time Domain Reflectometer)

ANSWER

Used to measure the length of a fiber optic cable run and are able to locate faults

QUESTION 359

PaaS (Platform as a Service)

ANSWER

Provides resources somewhere between SaaS and IaaS.

QUESTION 360

Packet Analyzer

ANSWER

this is software that decodes a network traffic capture (obtained via a packet sniffer) and displays the captured packets for analysis, allowing inspection of the packet headers and payload (unless the communications are encrypted).

QUESTION 361

Packet Filtering

ANSWER

A basic type and feature of firewall that inspects the headers of IP packets and, based on a set of rules, can filter or manage packets.

QUESTION 362

Packet Flow Monitoring

ANSWER

Using statistics or metadata about network traffic to identify routes, applications, and interfaces that might be over-utilized or that are creating bottlenecks.

QUESTION 363

Packet Loss/Drops

ANSWER

refers to packets that do not reach their destination due to transmission errors, congestion, or security policies.

QUESTION 364

Packet Sniffer

ANSWER

A network troubleshoting application that provides a comprehensive view of an organization's network. As data flows across a network, this application can monitor the packet flow by intercepting it, logging it, and analyzing the information according to baseline specifications.

QUESTION 365

Packet Sniffing

ANSWER

Recording data from frames as they pass over network media.

QUESTION 366

Packet Switching

ANSWER

A circuit switched network (such as the PSTN) establishes a dedicated channel between two communicating devices. This is a way to make more efficient use of the available bandwidth by splitting data into small packets and routing them via any available path.

QUESTION 367

PAN (Personal Area network

ANSWER

Close range networking (usually based on Bluetooth or NFC) allowing communications between personal devices, such as smartphones, laptops, and printers/peripheral devices.

QUESTION 368

Password Cracker

ANSWER

guessing software can attempt to crack user passwords by running through all possible combinations (brute force

QUESTION 369

Password Policy

ANSWER

A weakness of password-based authentication systems is when users demonstrate poor password practice.

QUESTION 370

Patch Management

ANSWER

identifying, testing, and deploying OS and application updates.

QUESTION 371

Patch Panel

ANSWER

A type of wiring cross-connect with IDCs to terminate fixed cabling on one side and modular jacks to make cross-connections to other equipment on the other. Patch panels simplify Moves, Adds, and Changes (MACs) in network administration.

QUESTION 372

Pay-per-use

ANSWER

a feature of cloud usage that allows end users to pay only for services they use as they scale to meet various demands (elasticity).

QUESTION 373

PBX (Private Branch Exchange)

ANSWER

A device used to route incoming calls to direct dial numbers and provide facilities such as voice mail, Automatic Call Distribution (ACD), and Interactive Voice Response (IVR)

QUESTION 374

PDU (Protocol Data Unit)

ANSWER

Each network protocol working at a particular network layer encapsulates data using fields in a header plus a payload containing the PDU from the upper layer. At layer 2, PDUs are called frames, at layer 3 they are called datagrams or packets, and at layer 4 they are called segments if they use TCP or datagrams if they use UDP.

QUESTION 375

Peer-to-Peer

ANSWER

A network in which there is no dedicated server, but instead, each computer connected to the network acts as both a server and client (each computer is a peer of the other computers).

QUESTION 376

Penetration Testing

ANSWER

White hat hacking to try to discover and exploit any weaknesses in network security.

QUESTION 377

Performance Monitor

ANSWER

Tool for viewing CPU, memory, and pagefile utilization, accessible through the Performance and Reliability Monitor

QUESTION 378

Phishing

ANSWER

Obtaining user authentication or financial information through a fraudulent request for information

QUESTION 379

Physical Layer

ANSWER

Lowest layer of the OSI model providing for the transmission and receipt of data bits from node to node

QUESTION 380

Physical Security

ANSWER

Physical access to premises and equipment should not be overlooked in designing security. Barriers can be physical and/or psychological. Entry control mechanisms range from ID badges and simple key locks to certificate-based (physical tokens) or biometric access control.

QUESTION 381

PII (Personally Identifiable Information)

ANSWER

Data that can be used to identify or contact an individual (or in the case of identity theft, to impersonate them).

QUESTION 382

ping

ANSWER

This utility sends a configurable number and size of ICMP packets to a destination host.

QUESTION 383

PKI (Public Key Infrastructure)

ANSWER

solves the issue of making a link between a particular public-private key pair and a specific user. Under this system, keys are issued as digital certificates by a Certificate Authority (CA). The CA acts as a guarantor that the user is who he or she says he or she is. Under this model, it is necessary to establish trust relationships between users and CAs. In order to build trust, CAs must publish and comply with Certificate Policies and Certificate Practice Statements.

QUESTION 384

Plenum

ANSWER

designed to be fire resistant and uses Teflon coatings for the jacket material so it produces a minimal amount of smoke

QUESTION 385

PoE (Power over Ethernet

ANSWER

specification allowing power to be supplied via switch ports and ordinary data cabling to devices such as VoIP handsets and wireless access points. Devices can draw up to about 13W (or 25W for PoE+).

QUESTION 386

Point-to-Point/Point-to Multipoint Topology

ANSWER

A topology where two nodes have a dedicated connection to one another. In a point-to-multipoint topology, a central node mediates links between remote nodes

QUESTION 387

PON (Passive Optical Network)

ANSWER

This technology underpins some "near" fiber solutions (FTTx - Fiber to the Home, Fiber to the Curb, and so on). Cheap, unpowered optical repeaters (Optical Network Units [ONU]) process signals to and from Optical Line Termination (OLT) units at the exchange.

QUESTION 388

POP (Post Office Protocol)

ANSWER

TCP/IP application protocol providing a means for a client to access email messages stored in a mailbox on a remote server. The server usually deletes messages once the client has downloaded them. POP3 utilizes TCP port 110.

QUESTION 389

Port Forwarding

ANSWER

means that a router takes requests from the Internet for a particular application (say, HTTP/port 80) and sends them to a designated host on the LAN.

QUESTION 390

Port Mirroring

ANSWER

Copying ingress and/or egress communications from one or more switch ports to another port. This is used to monitor communications passing over the switch.

QUESTION 391

Port

ANSWER

in tcp/udp apps its a unique number assigned to a particular application protocol (such as HTTP or SMTP). The number (with the IP address) forms a socket between client and server.

QUESTION 392

Port Scanner

ANSWER

Software that enumerates the status of TCP and UDP ports on a target system. can be blocked by some firewalls and IDS.

QUESTION 393

Port Security

ANSWER

Preventing a device attached to a switch port from communicating on the network unless it matches a given MAC address or other protection profile.

QUESTION 394

POTS (Plain Old Telephone System

ANSWER

Parts of telephone network "local loop" using voice-grade cabling. Data transfer over this network is slow (33.3Kbps) and requires dial-up modems.

QUESTION 395

Power Anomalies

ANSWER

Surges and spikes in electrical power that can damage devices, cause very brief power outages (brown outs) or can cause systems to lockup or reboot.

QUESTION 396

Power Failures

ANSWER

Blackouts that put systems and infrastructure offline.

QUESTION 397

Power Level Controls

ANSWER

Enterprise-class wireless access points and adapters support configurable power level controls. In some circumstances, increasing power can increase range and overcome local interference.

QUESTION 398

PPP (Point to Point Protocol)

ANSWER

Dial-up protocol working at layer 2 (Data Link) used to connect devices remotely to networks. Often used to connect to an ISP's routers and out to the Internet.

QUESTION 399

PPTP (Point to Point Tunneling Protocol)

ANSWER

developed by Cisco and Microsoft to support VPNs over PPP and TCP/IP. uses TCP port 1723. Encryption can be provided by Microsoft Point-to-Point Encryption.

QUESTION 400

Presentation Layer

ANSWER

OSI model layer that transforms data between the formats used by the network and applications.

QUESTION 401

Pre-shared Key

ANSWER

Symmetric encryption technologies, require both parties to use the same private key. This key must be kept secret, which means that making the key known to both parties securely is a significant security problem. A pre-shared key is normally generated from a passphrase. A passphrase should be longer than a password and contain a mixture of characters.

QUESTION 402

Preventive Measures

ANSWER

The concept of implementing resolutions that not only solve an immediate problem but also eliminating the factors that cause the problem or creating solutions that prevent the problem from occurring again.

QUESTION 403

Protocol Binding

ANSWER

Assigning a protocol to a network interface card (NIC).

QUESTION 404

Protocol

ANSWER

A set of rules enabling systems to communicate (exchange data). A single network will involve the use of many of these. In general terms, this defines header fields to describe each packet, a maximum length for the payload, and methods of processing information from the headers.

QUESTION 405

Proxy Server

ANSWER

A server that mediates the communications between a client and another server. can filter and often modify communications as well as providing caching services to improve performance.

QUESTION 406

PSTN (Public Switched Telephone Network)

ANSWER

a global communications network that is capable of carrying more than simply voice-call services. The basis of this network is circuit-switched, but the infrastructure can also carry packet-switched data services.

QUESTION 407

PUA (Privileged User Agreement)

ANSWER

The rules of behavior for privileged users, i.e. ones who are given rights to administer resources.

QUESTION 408

Public vs. Private Addressing

ANSWER

Classful IP addresses are divided into blocks representing different network sizes. Public IPs are allocated to companies through ISPs. Certain address blocks are designated private and can be used on a LAN without registering them. Such addresses are not routable over the Internet though.

QUESTION 409

QoS (Quality of Service)

ANSWER

Systems that differentiate data passing over the network that can reserve bandwidth for particular applications. A system that cannot guarantee a level of available bandwidth is often described as Class of Service (CoS).

QUESTION 410

RADIUS (Remote Authentication Dial-in User Service)

ANSWER

is used by ISPs to authenticate and audit internet access by account holders. also widely used to manage remote and wireless authentication infrastructure. Users supply authentication information to RADIUS client devices, such as wireless access points. The client device then passes the authentication data to an AAA (Authentication, Authorization, and Accounting) server, which processes the request.

QUESTION 411

RAID (Redundant Array of Independent/Inexpensive Disks/Devices)

ANSWER

multiple hard disks can be configured to provide improved performance and/or protection for data (fault tolerance). Several levels of backup are suggested by this system, ranging from level 0 to level 6, each level representing a particular type of fault tolerance (note that 0 provides no fault tolerance).

QUESTION 412

Ransomware

ANSWER

A type of malware that tries to extort money from the victim, by appearing to lock their computer or by encrypting their files for instance.

QUESTION 413

RARP (Reverse ARP)

ANSWER

A now obsolete autoconfiguration mechanisms, this allows a host to obtain an IP address from a server configured with a list of MAC:IP address mappings. However, it can only be used to obtain an IP address, which is inadequate for most implementations of IP. It has been replaced by BOOTP.

QUESTION 414

RAS (Remote Access Server)

ANSWER

A server configured to process remote connections

QUESTION 415

RDP (Remote Desktop Protocol)

ANSWER

Microsoft's protocol for operating remote connections to a Windows machine (Terminal Services), allowing specified users to log onto the Windows computer over the network and work remotely. The protocol sends screen data from the remote host to the client and transfer mouse and keyboard input from the client to the remote host. It uses TCP port 3389

QUESTION 416

Reasons for Escalation

ANSWER

You may need to escalate an issue if the problem is beyond your knowledge, would better be dealt with by a supplier or other third party, a customer becomes difficult, or the scope is very large, among other reasons

QUESTION 417

Registered Ports

ANSWER

Ports that fall between 1024 and 49,151 that are registered to software makers for use by specific applications and services that are not as well-known as the services in the "well-known" range.

QUESTION 418

Repeater

ANSWER

A layer 1 device that takes a signal and repeats it to the devices that are connected to it. These can be used to maintain signal integrity and amplitude across a connection or a network

QUESTION 419

Resilience

ANSWER

Having multiple paths in a network so that if one link fails, the network can remain operational by forwarding frames over a different path.

QUESTION 420

Resource Record

ANSWER

Allows the DNS server to resolve requests that arrive from other network hosts into IP addresses. DNS zones contain numerous of these, including SOA, NS, A, AAAA, etc.

QUESTION 421

RFID (Radio Frequency IDentification)

ANSWER

A chip allowing data to be read wirelessly. These types of wireless tags are used in barcodes and smart cards and can be powered or unpowered

QUESTION 422

RF (Radio Frequency)

ANSWER

The frequency in which network or other communications take place. These waves propagate at different frequencies and wavelengths. Wi-Fi network products typically work at 2.4 GHz or 5 GHz

QUESTION 423

Ring Topology

ANSWER

A network topology in which all of the computers are connected in a circle. This topology comprises a series of point-to-point links between each device. Signals pass from device to device in a single direction with the signal regenerated at each device.

QUESTION 424

RIP (Routing Information Protocol)

ANSWER

A distance vector-based routing protocol that uses a hop count to determine the distance to the destination network.

QUESTION 425

RJ (Registered Jack) Connector

ANSWER

Connector used for twisted pair cabling.

QUESTION 426

Rollback/Downgrading

ANSWER

The process of reverting to a previous version of software or firmware for some reason, such as if a newly-applied software update interferes with system functionality.

QUESTION 427

Rollover Cable

ANSWER

This cable is used to connect the serial port on a host or modem to the console port on a network appliance

QUESTION 428

Root Bridge

ANSWER

the bridge at the top of the hierarchy when bridges are organized for spanning tree. The switch with the lowest bridge ID (comprised of a priority value and the MAC address) will be selected as the root

QUESTION 429

route

ANSWER

Command utility to configure and manage the routing table on a Windows or Linux host

QUESTION 430

Router

ANSWER

are able to link dissimilar networks and can support multiple alternate paths between locations based upon the parameters of speed, traffic loads, and cost. works at layer 3 (Network) of the OSI model. form the basic connections of the Internet. They allow data to take multiple paths to reach a destination (reducing the likelihood of transmission failure). can access source and destination addresses within packets and can keep track of multiple active paths within a given source and destination network.

QUESTION 431

routing table

ANSWER

A database created manually or by a route-discovery protocol that contains network addresses as perceived by a specific router.

QUESTION 432

RTP (Real-time Transport Protocol)

ANSWER

Opens a data stream for video and voice applications over UDP. The data is packetized and tagged with control information (sequence numbering and time-stamping).

QUESTION 433

SaaS (Software as a Service)

ANSWER

A different model of provisioning software applications. Rather than purchasing software licenses for a given number of seats, a business would access software hosted on a supplier's servers on a pay-as-you-go or lease arrangement (on-demand).

QUESTION 434

SAN (Storage Area Network)

ANSWER

A network dedicated to data storage, typically consisting of storage devices and servers connected to switches via Host Bus Adapters.

QUESTION 435

Satellite

ANSWER

System of microwave transmissions where orbital satellites relay signals between terrestrial receivers or other orbital satellites. This type of connectivity is enabled through a reception antenna connected to the PC or network through a DVB-S modem

QUESTION 436

Scalability

ANSWER

The ability for additional users or devices to be added to the network without having to significantly re-design or re-engineer the existing infrastructure

QUESTION 437

SC (Subscriber Connector)

ANSWER

Push/pull connector used with fiber optic cabling.

QUESTION 438

SDN (Software Defined Networking)

ANSWER

Application Programming Interfaces (API) and compatible hardware allowing for programmable network appliances and systems

QUESTION 439

Separation of Duties

ANSWER

A means of establishing checks and balances against the possibility that critical systems or procedures can be compromised by rogue use of access permissions. It includes least privilege, SOPs, shared authority, auditing, mandatory vacations, and other policies.

QUESTION 440

Serial Cable

ANSWER

Asynchronous serial transmission (RS-232) is one of the oldest PC bus standards. The serial port is now little used but does provide an "out-of-band" means of configuring network appliances such as switches and routers. Updated serial signaling technologies include USB and Firewire, which can be used for home networking.

QUESTION 441

Session Layer

ANSWER

OSI model layer that provides services for applications that need to exchange multiple messages (dialog control).

QUESTION 442

SFTP (Secure File Transfer Protocol)

ANSWER

A type of FTP using SSH for confidentiality.

QUESTION 443

SHA (Secure Hash Algorithm)

ANSWER

A cryptographic hashing algorithm created to address possible weaknesses in MDA

QUESTION 444

Shielding

ANSWER

can counteract the risk of media leak signals to some extent . Twisted pair cabling can be shielded or screened; whole rooms can be shielded using metal paint or wire mesh

QUESTION 445

Shoulder Surfing

ANSWER

Social engineering tactic to obtain someone's password or PIN by observing him or her as he or she types it in.

QUESTION 446

SIEM (Security Information and Event Management)

ANSWER

Software designed to assist with security logging and alerting. provides correlation between observables and indicators and usually includes graphing tools to assist analysis of trends

QUESTION 447

Signature-based Monitoring

ANSWER

Software that monitors a system for malware infection, intrusion detection, or performance may be configured to recognize threat signatures or definitions based on known malware or attack patterns. This sort of system is quite simple to install but cannot provide any defense against unknown threats (zero day exploits) and requires its signature database to be kept up to date

QUESTION 448

SIM (Subscriber Identity Module)

ANSWER

A small chip card that identifies the user and phone number of a mobile device, via an International Mobile Subscriber Identity (ISMI). This card also provides a limited amount of local storage, for contacts

QUESTION 449

SIP (Session Initiation Protocol)

ANSWER

A protocol used to establish, disestablish, and manage VoIP and conferencing communications sessions. It handles user discovery (locating a user on the network), availability advertising (whether a user is prepared to receive calls), negotiating session parameters (such as use of audio/video), and session management and termination

QUESTION 450

Site Survey

ANSWER

Planning a wireless deployment by identifying optimum locations for antenna and access point placement to provide the required coverage for clients and identifying sources of interference

QUESTION 451

SLA (Service Level Agreement)

ANSWER

Operating procedures and standards for a service contract

QUESTION 452

SLIP (Serial Line IP)

ANSWER

Prior to the emergence of PPP, this protocol provided dial-up TCP/IP support

QUESTION 453

Smart Jack

ANSWER

The termination point for a telecoms access provider's cabling, also referred to as the Network Interface Unit (NIU).

QUESTION 454

Smartphone

ANSWER

A mobile device that provides both phone and SMS text messaging functionality and general purpose computing functionality, such as web browsing and email plus running software apps. These devices typically have screen sizes of between 4 and 5.5 inches.

QUESTION 455

SMB (Server Message Block)

ANSWER

This protocol is used for requesting files from Windows servers and delivering them to clients. It allows machines to share files and printers, thus making them available for other machines to use.

QUESTION 456

SMF (Single Mode Fiber)

ANSWER

Category of fiber optic cable. is more expensive supports much longer distances (up to about 70 km).

QUESTION 457

SMS (Short Message Service)

ANSWER

system for sending text messages between cell phones

QUESTION 458

SMTP (Simple Mail Transfer Protocol)

ANSWER

The protocol used to send mail between hosts on the Internet. Messages are sent over TCP port 25.

QUESTION 459

SNMP (Simple Network Management Protocol)

ANSWER

is a widely used framework for management and monitoring remote devices. It is part of the TCP/IP protocol suite (operating at the Application layer of the OSI model)

QUESTION 460

Social Engineering

ANSWER

A hacking technique, widely publicized by Kevin Mitnick in his book "The Art of Deception," whereby the hacker gains useful information about an organization by deceiving its users or by exploiting their unsecure working practices. Typical methods include impersonation, domination, and charm.

QUESTION 461

SOHO (Small Office Home Office)

ANSWER

Typically used to refer to network devices designed for small-scale LANs (up to 10 users).

QUESTION 462

SONET

ANSWER

High-speed fiber optic network used for the new generation of telecommunications backbones. Service levels are defined in multiple of the original bandwidth (51.84 Mbps) and are variously titled STS, OCx, or SDH.

QUESTION 463

SPoF (Single Point of Failure)

ANSWER

A component or system that would cause a complete interruption of a service if it failed. These are mitigated by providing redundant parts, connections, or services that either provide failover (the replacement is automatically switched in) or swift replacement.

QUESTION 464

Spoofing

ANSWER

Where the attacker disguises their identity. Some examples include IP spoofing, where the attacker changes their IP address, or phishing, where the attacker sets up a false website

QUESTION 465

SSH (Secure Shell)

ANSWER

A remote administration and file copy program that is flexible enough to support VPNs too (using port forwarding). This runs on TCP port 22.

QUESTION 466

SSID (Service Set ID)

ANSWER

Identifies a particular Wireless LAN (WLAN). This "network name" can be used to connect to the correct network. When multiple APs are configured with the same network name, this is referred to as an E(xtended) SSID.

QUESTION 467

SSL (Secure Sockets Layer)

ANSWER

This was developed by Netscape to provide privacy and authentication over the Internet. It is application independent (working at layer 5 [Session]) and can be used with a variety of protocols, such as HTTP or FTP.

QUESTION 468

SSO (Single Sign-on)

ANSWER

Any authentication technology that allows a user to authenticate once and receive authorizations for multiple services. Kerberos is a typical example of an authentication technology providing this.

QUESTION 469

Standards and Guidelines

ANSWER

Policy sets the overall tone for how something should be done and is usually intended for a general audience. More detailed guidance and standards may be produced for different audiences, such as end users and technical staff. In addition to internal standards, many job tasks may be guided by external standards, legislation, and "best practice" guidance. External standards may come from industry practice, professional organizations, or legislation.

QUESTION 470

Star Topology

ANSWER

A network topology in which each node is connected to a central point, typically a switch or a router. The central point mediates communications between the attached nodes. When a device such as a hub is used, the hub receives signals from a node and repeats the signal to all other connected nodes. Therefore the bandwidth is still shared between all nodes. When a device such as a switch is used, point-to-point links are established between each node as required. The circuit established between the two nodes can use the full bandwidth capacity of the network media.

QUESTION 471

Stateful Firewall

ANSWER

A firewall that maintains stateful information about the session established between two hosts (including malicious attempts to start a bogus session). Information about each session is stored in a dynamically updated state table.

QUESTION 472

Static IP Addressing

ANSWER

The process of manually configuring TCP/IP parameters for all devices on a network. This was the original method for configuration, though static IP addressing still has uses today.

QUESTION 473

Static Route

ANSWER

A manually-defined route created by adding routing entries in the router's memory. These routes will only change if you manually edit them

QUESTION 474

Status Indicator

ANSWER

Light Emitting Diodes (LED) are used to indicate the status of various devices, including PC power supplies, batteries, drive activity, and network activity. Network equipment LEDs usually show connection speed and activity

QUESTION 475

STP (Spanning Tree Protocol)

ANSWER

Protocol allowing multiple bridges/switches to arrange themselves in such a way as to enable loop-free broadcast communications when redundant links are present between the devices. The frames exchanged are called Bridge Protocol Data Units (BPDU).

QUESTION 476

Straight-through Cable

ANSWER

Ethernet cables and connectors carry data over Transmit (Tx) and Receive (Rx) pairs. Normally, a host would be linked to a connectivity device such as a hub or a switch using _____ and connectors. The hub receives the Tx signal from the host on its Tx pair, performs a crossover, and broadcasts it to the destination host on the Rx pair

QUESTION 477

ST (Straight Tip) Connector

ANSWER

Bayonet-style twist-and-lock connector for fiber optic cabling.

QUESTION 478

Subnet Mask

ANSWER

An IP address consists of a Network ID and a Host ID. This mask is used to distinguish these two components within a single IP address. It is used to "mask" the host ID portion of the IP address and thereby reveal the network ID portion. The typical format for a mask is 255.255.0.0. Classless network addresses can also be expressed in the format 169.254.0.0/16, where /16 is the number of bits in the mask. IPv6 uses the same /nn notation to indicate the length of the network prefix.

QUESTION 479

Switching Loop

ANSWER

Causes broadcast frames to circulate the network perpetually. Such loops at the data link layer can cause what are often called broadcast storms.

QUESTION 480

Switch

ANSWER

These devices perform the functions of a specialized bridge: the device receives incoming data into a buffer, then the destination MAC address is compared with an address table. The data is then only sent out to the port with the corresponding MAC address

QUESTION 481

Syslog

ANSWER

A protocol enabling different appliances and software applications to transmit logs or event records to a central server.

QUESTION 482

T568A/T568B

ANSWER

Termination standards defined in the ANSI/TIA/EIA 568 Commercial Building Telecommunications Standards. 568A is mandated by the US government and for US residential wiring but the only commercial rule is not to mix the two on the same network. Wiring a cable with both 568A and 568B termination creates a crossover cable.

QUESTION 483

TACACS+ (Terminal Access Controller Access Control System)

ANSWER

An alternative to RADIUS developed by Cisco. The version in current use is TACACS+; TACACS and XTACACS are legacy protocols

QUESTION 484

Tagged/Untagged Port

ANSWER

On a switch with VLANs configured, a port with an end station host connected operates in untagged mode (access port). A tagged port will normally be part of a trunk link

QUESTION 485

Tap

ANSWER

A device used to eavesdrop on communications at the physical layer. In Ethernet, this can be inserted between a switch and a node while a passive form of this can intercept emanations from unshielded cable.

QUESTION 486

T-carrier

ANSWER

Developed by Bell Labs to allow multiple calls to be placed on a single cable. Each channel provides enough bandwidth for a voice communication session and is known as a DS0 or a Kilostream link.

QUESTION 487

tcpdump

ANSWER

A command-line packet sniffer

QUESTION 488

TCP/IP Layer Model

ANSWER

This protocol suite maps to a four-layer conceptual model: Application, Transport, Internet, and Link (or Network Interface). This model is referred to as the Internet Protocol Suite or the DoD (Department of Defense) model or the ARPA model. Each layer in the Internet Protocol Suite corresponds to one or more layers of the OSI model.

QUESTION 489

TCP/IP

ANSWER

The network protocol suite used by most operating systems and the Internet. It is widely adopted, industry standard, vendor independent and open. It uses a 4-layer network model that corresponds roughly to the OSI model as follows: Network Interface (Physical/Data Link), Internet (Network), Transport (Transport), Application (Session, Presentation, Application).

QUESTION 490

TCP (Transmission Control Protocol)

ANSWER

Protocol in the TCP/IP suite operating at the transport layer to provide connection-oriented, guaranteed delivery of packets. Hosts establish a session to exchange data and confirm delivery of packets using acknowledgements. This overhead means the system is relatively slow.

QUESTION 491

TDMA (Time Division Multiple Access)

ANSWER

Method of multiplexing a communications channel using time slots. GSM uses this method whereby groups of phone calls are bundled with each call getting assigned a channel and time slot. The receiving device only listens to the assigned channel and time slot to assemble the call.

QUESTION 492

TDR (Time Domain Reflectometer)

ANSWER

Used to measure the length of a cable run and are able to locate open and short circuits, kinks/sharp bends, and other imperfections in cables that could affect performance

QUESTION 493

Telnet

ANSWER

TCP/IP application protocol supporting remote command-line administration of a host (terminal emulation). This is unauthenticated and has therefore been superseded by SSH or graphical remote configuration utilities. This protocol runs over TCP port 23.

QUESTION 494

TFTP (Trivial File Transfer Protocol

ANSWER

A simplified form of FTP supporting only file copying (FTP can also enumerate directory contents, create directories, remove files and directories, and so on). TFTP works over UDP port 69.

QUESTION 495

Third-party/Cloud-hosted DNS

ANSWER

The act of having another organization be responsible for hosting your DNS records. Typically, this would be for Internet-accessible resources rather than local network ones. The DNS hosting provider must ensure the reliability and availability of services. A hosting provider might use cloud-based servers to do this, replicating the DNS information to multiple physical servers accessible using different Internet routes

QUESTION 496

Threshold

ANSWER

Points of reduced or poor performance that generate an administrative alert, such as packet loss or link bandwidth drop

QUESTION 497

Throughput Tester

ANSWER

The process of measuring the amount of data that the network can transfer in typical conditions via a software application. Goodput is typically used to refer to the actual "useful" data rate at the application layer (less overhead from headers and lost packets).

QUESTION 498

TKIP (Temporal Key Integrity Protocol)

ANSWER

Mechanism used in the first version of WPA to improve the security of wireless encryption mechanisms, compared to the flawed WEP standard

QUESTION 499

TLD (Top-level Domains)

ANSWER

In DNS hierarchy, the domains immediately below the root, including .com, .org, .net, and more.

QUESTION 500

Token

ANSWER

This contains some sort of authentication data.

QUESTION 501

Toner Probe (Tone Generator/Fox and Hound)

ANSWER

A network tone generator and probe are used to trace a cable from one end to the other. This may be necessary when the cables are bundled and have not been labeled properly.

QUESTION 502

Topology

ANSWER

The shape or structure of a network. These may be either physical (the actual appearance of the network layout) or logical (the flow of data across the network).

QUESTION 503

Top-to-Bottom vs Bottom-to-Top Approach

ANSWER

An approach to troubleshooting that follows working your way up or down the OSI Model to methodically diagnose and resolve an issue.

QUESTION 504

tracert/traceroute

ANSWER

This TCP/IP utility is used to trace the route taken by a packet as it "hops" to the destination host on a remote network.

QUESTION 505

Traffic Shaping

ANSWER

These applications enable administrators to closely monitor network traffic and to manage that network traffic. The primary function of a this application is to optimize network media throughput to get the most from the available bandwidth.

QUESTION 506

Transceiver

ANSWER

Converts the signal from the computer to a signal that can be sent over the network medium (and vice versa - that is, it transmits and receives). These are usually incorporated onto the network adapter and are specific to a particular media type. There are also modular versions of these, such as Small Form Factor Pluggable (SFP/SFP+/QSFP/QSFP+) and Gigabit Interface Converter (GBIC), designed to plug into switches and other network equipment.

QUESTION 507

Transfer Rate

ANSWER

The amount of data that can be sent over a network connection in a given amount of time, typically measured in bits or bytes per second (or some more suitable multiple thereof).

QUESTION 508

Transport Layer

ANSWER

OSI model layer responsible for ensuring reliable data delivery. In TCP/IP, this service is provided by the TCP protocol.

QUESTION 509

Troubleshooting Documentation

ANSWER

An organized set of information describing the issue, information gathered, possible causes you isolated, corrections formulated, results, and any external resources. This could be within a support ticket system.

QUESTION 510

Troubleshooting Model

ANSWER

a standardized step-by-step approach to the troubleshooting process. The model serves as a framework for correcting a problem on a network without introducing further problems or making unnecessary modifications to the network.

QUESTION 511

Troubleshooting

ANSWER

The process of applying a methodical approach to resolving issues. Having ensured that any data has been backed up, the first step is to gather information. The next is to analyze the problem, again consulting documentation, web resources, or manufacturer's help resources if necessary. The next step is to choose and apply the most suitable solution. Having applied a solution, the next step is to test the system and related systems to verify functionality. The last step is to document the problem, steps taken, and the outcome. If the problem cannot be solved, it may be necessary to escalate it to another technician or manager.

QUESTION 512

Trunk

ANSWER

Backbone links between switches and routers. Trunking protocols enable switches to exchange data about VLAN configurations. The 802.1q protocol is often used to tag frames destined for different VLANs across trunk links.

QUESTION 513

TTL (Time to Live)

ANSWER

Of an IP packet, this field is nominally the number of seconds a packet is allowed to stay on the network before being discarded; otherwise packets could endlessly loop around an internet.

QUESTION 514

Tunneling

ANSWER

Also called encapsulation, this is the act of wrapping up data from one protocol for transfer over a different type of network.

QUESTION 515

Twisted Pair Cable

ANSWER

is two insulated copper wires twisted about each other; a cable is made up of a number of pairs (usually four in data networking). The twisting of the wires acts to reduce interference and crosstalk. Each pair of wires is twisted at a different rate to ensure that the pairs do not interfere with each other. Drawbacks of twisted pair cabling are its sensitivity to EMI and eavesdropping and its attenuation (it cannot be used for long-distance transmission). Cabling is categorized according to EIA/TIA standards; Cat3 cable was specified for 10 Mbps Ethernet and Cat5 for 100 Mbps (Fast Ethernet). Cabling is now either Cat5e or Cat6, both of which support Gigabit Ethernet. Most cabling is unshielded (UTP) though in continental Europe, foil screened cabling is commonly used (Foil Twisted Pair [FTP] or Screened Twisted Pair [ScTP]). Screened cable is less susceptible to EMI and eavesdropping but is more complex to install and consequently more expensive.

QUESTION 516

Type I (Bare Metal) Hypervisor A

ANSWER

A hypervisor that is installed directly onto the computer and manages access to the host hardware without going through a host OS.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials