Jason Dion Network Plus
60 community-sourced questions and answers. Free — no login.
Channel bonding
Used to reduce redundancy or increase throughput, directly affecting a wireless connection's speed. Signal strength only refers to the maximum transmitted power by an antenna
Network analyzer
a useful tool, helping you do things like track traffic and malicious usage on the network i.e. Wireshark
Bluejacking
sends unsolicited messages over bluetooth to bluetooth enabled devices such as mobile phones, PDAs, or laptop computers
Router
Allows network segments and broadcast domains to communicate with each other. Allows two broadcast domains for each side of the router
Correct Order of Fiber Connectors
ST, SC, LC, LC, FC
Crossover cables
Switch to a switch Workstation to workstation
Straight-Through Cables
Computer to switch Router to modem
Multimode Fiber (MMF)
Shorter distances than single-mode fiber Larger core size allows for multiple modes of travel for the light signal
Change Management
Coordinated system to account for upgrades, installs, and network outages Should include the specific details of what was changed and what things may have been affected by the change
Off-site backups
Important for a company's long-term health in the event of a disaster
Network-attached storage (NAS)
Is a self-contained computer that connects to a home business network and can share files over TCP/IP Consists of a hard disk for storage of files and usually utilizes a RAID system for redundancy and/or performance
Storage Area Network (SAN)
Specialized LAN designed for data transfer/storage Transfers data at block level with special protocol
Fibre Channel over Ethernet (FCoE)
Removes need for specialized software Runs over your Ethernet
iSCSI (IP Small Computer System Interface)
Lower cost, built using Ethernet switches (<10 Gbps) Relies on configuration allowing jumbo frames over the network
DHCP snooping
Layer 2 The switch is DHCP firewall Trusted: routers, switches, DHCP servers Untrusted: Other computers, unofficial DHCP servers
Quarantine
Where devices go that do not meet the regular network's standards can be placed. They can be checked in this area before connecting
Raised floors
allow the cabling to be placed under the floor, but still accessible to the network administrators (Hides the cabling)
syslog server
enables the network administrator to view device error information from a central location All network infrastructure devices send system-level information to a centralized server
Evil Twin access points
Man-in-the-middle attack on a wireless network May be used to steal the passwords of unsuspecting users by monitoring their connections or phishing, which involves setting up a fraudulent website
CNAME
canonical name records can be used to alias one name to another i.e. google.com & www.google.com
Switching loop
There is more than one layer 2 path between two endpoints i.e. Two switches connected using both a Cat 6 and a Cat 5e It can be prevented with Spanning Tree Protocol (STP)
Configuration backup
Allows a new piece of hardware to be installed and the configuration from the previous device can be restored
802.11ac
5Ghz MIMO provides support for dozens of non-overlapping channels
Troubleshooting Theory
Steps a technician uses to solve a problem: identify the problem, establish a theory of probable cause, test the theory, establish and implement a plan of action, verify functionality, and document findings.
NAT
A method of remapping one IP address space into another by modifying network address information in the IP header packet
RAS (Remote Access Server)
is a type of server that provides a suite of services to connect users to a network or the internet remotely. Will usually be an RDP or VNC
CSU/DSU (Channel Service Unit/Data Service Unit)
A piece of equipment that connects a T-carrier leased line from the telephone company to a customer's equipment (such as a router). It performs line encoding and conditioning functions, and it often has a loopback function for testing.
Proxy Servers
A third-party computer that passes traffic to and from a specific address without revealing the address of the connected user. Can come up as an unexpected source IP address
You want to ensure that the hypervisor's VM can communicate but don't want the network traffic to leave the hypervisor
Install and configure a virtual switch
switch
A device for making, breaking, or changing the connections in an electrical circuit.
virtual switch
A software-based switch that provides functionality similar to physical switches, and is used for connecting virtual systems to form a network.
LACP (Link Aggregation Control Protocol)
Used to control the combining of ports. Can increase bandwidth and throughput. Can provide network redundancy and load balancing
BEST way to deal with personal cellphones working with company data
Conduct real-time monitoring of the phone's activity and usage
Protocol/Packet Analyzer
Has the capability to capture the TCP handshake and display it for analysis
Bus
Firewall connects directly to the router, and the router connects directly to the computer. This would form a single line
RADIUS
Used to manage credentials centrally, combines authentication and authorization
ISAKMP
Used for securing key exchanges during client-to-server VPN connection. Used in IPsec, which is commonly used in securing the key exchange during the establishment of a client-to server VPN connection
Frame Relay
relies on virtual circuits and point-to-multipoint connections. specifies the physical and data link layers of digital telecommunication channels using a packet switching methodology
Cable Certifiers
Can provide a pass or fail status following the industry standards - can show info such as open and short or the length
MX
record requires in the DNS for a domain for the email server to accept emails - would allow the new server to receive email on behalf of diontraining.com
Time-division multiplexing
allows for two or more signals or bitstreams to be transferred in what appears to be simultaneous sub channels in one communication channel Delivers multiple calls over a copper wire if you have an ISDN or T1-connection
Management Information Base (MIB)
used for managing all entities on a network using SNMP protocol
Non-persistent Agent
Used to access the device during a one-time check-in at login Used to perform a one time temporary posture
Rollover cable
a router/switch console port is connected using this
All ports on a hub make up one
collision domain
Each port on a router is a
collision domain
Ladder Trays
cables can be easily removed or added cost-effective and allow for easy installation
Route Poisoning
a method to prevent a router from sending packets through a route that has become invalid within computer networks Prevents routing loops
Multilayer switch is in
Layer 3
10GBase-SR
10GB Ethernet LAN standard over MMF
Straight Tip
A fiber connection most common used in fiber and LAN networking applications
ESSID
a wireless network that can utilize multiple WAPs to a broadcast network
Jumbo frames are commonly used
in a SAN
What benefit does network segmentation provide?
Security through isolation
Switches to routers
Straight-through cable
Switch/hub to switch/hub
crossover cable
Switch/hub to router/PC
Straight-through cable
router/pc to router/pc
crossover cable
Layer 7 firewalls
Deep pack inspection to identify which applications or protocol is actually being used to send traffic over a given port
NAS uses ____ level storage
file
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials