Term
|
Definition
| It is the smallest unit of information (data) a computer can process; a "1" or "0." |
|
|
Term
|
Definition
| It is a preset sequence of bits that is arranged and understood by the sender and receiver. |
|
|
Term
| A code set of 10 bits has how many possible combinations? |
|
Definition
| A code set of 10 bits represents 1024 possible choices. |
|
|
Term
|
Definition
| A set of bits (ones and zeros) of a specific length that represents a value in a computer coding scheme. |
|
|
Term
| Normally, how long is a byte? |
|
Definition
| Normally bytes are 8 (binary) data bits in length. |
|
|
Term
| What term is used in networking when referring to 8 bits of information? |
|
Definition
|
|
Term
| What is the ANSI's main focus? |
|
Definition
| ANSI focuses on standards used by the software and hardware vendors who make the products the software engineer uses. |
|
|
Term
| What role does EIA serve? |
|
Definition
| Enables US electronics producers to be competitive by developing technical standards, hosting tradeshows and seminars, performing market analysis, and facilitating relations with the government. |
|
|
Term
|
Definition
| A government organization providing services and programs to help US industries commercialize new technologies and compete internationally. |
|
|
Term
| Which organizations' specifications are supported by ANSI? |
|
Definition
| Electronic Industries Alliance and Telecommunications Industry Association |
|
|
Term
|
Definition
| A European body for telecommunication policy making and regulation. |
|
|
Term
|
Definition
| It develops the telecommunications standards for Europe. |
|
|
Term
|
Definition
| The digital telecommunications services backbone system of Europe. |
|
|
Term
| The IETF tracks ideas or suggestions. What are these ideas and suggestions called? |
|
Definition
| Request for comments (RFC). |
|
|
Term
| What organization assumed responsibility for the IP address space allocation? |
|
Definition
|
|
Term
| What are some of the Project 802 standards? |
|
Definition
| 802.1: Internetworking Standards; 802.2: The LLC layer; 802.3: Ethernet; 802.4: Token Bus; 802.5: Token Ring; 802.6: MAN; 802.7: Broadband Technologies; 802.8: Fiber-Optic Technologies; 802.9: Integrated Voice/Data Networks; 802.10: Network Security Standards and Technologies; 802.11: Wireless Networking Technologies and Standards; 802.12: Demand Priority Saccess Technologies; 802.13: Cable Television Access |
|
|
Term
| What organization was known as the International Telegraph and Telephone Consultative? |
|
Definition
| The ITU Telecommunications Standardization Sector, or ITU-T. |
|
|
Term
| List some X-series standards that you may encounter. |
|
Definition
| X.20, X.20 bis, X.21, X.21 bis, X.25, X.400, and X.500 |
|
|
Term
| List the V-series standards that you may encounter. |
|
Definition
|
|
Term
| What are three distinct specifications that the RS-232-C standard meets? |
|
Definition
| (1) Type of connector, (2) purpose and definition of connector pins, and (3) electrical characteristics of those pins. |
|
|
Term
| The RS-232-C pins can be easily understood by knowing how they are grouped. What are the different categories? |
|
Definition
| Data, clock, control, common or ground leads. |
|
|
Term
| What is the function of RS-232-C data leads? |
|
Definition
| They are those pins that carry the data intelligence from the DTE to the DCE and vice versa. They are divided into two categories: primary channel and secondary channel. |
|
|
Term
| What is the function of the RS-232-C clock leads? |
|
Definition
| They provide "clock" or "timing" for the data transmission synchronization. |
|
|
Term
| What is the function of the RS-232-C control leads? |
|
Definition
| Control leads are used to enable and disable data transmission and reception; they are also used to indicate the operational status and condition of the DTE and DCE. |
|
|
Term
|
Definition
| RTS-Pin 4, CTS-Pin 5, DSR-Pin 6, DTR-Pin 20, and Received Line Signal Detector (Carrier Detector-CD)-Pin 8. |
|
|
Term
| What is the function of the RS-232-C Protective Ground --Pin 1? |
|
Definition
| This ground connection keeps you from getting shocked when you touch the equipment. |
|
|
Term
| What is the function of the RS-232-C Common (Signal) Ground -- Pin 7? |
|
Definition
| This ground establishes a common reference for all interchange circuits except pin 1. |
|
|
Term
| What are the two categories that the OSI model can be divided into? |
|
Definition
| Application and Data transport layers. |
|
|
Term
| What are the four lower layers of the OSI model responsible for? |
|
Definition
| They are responsible for defining how data is sent across the physical media, throug internetwork devices, to the destination computer, and to the application on the destination machine. |
|
|
Term
| At what layers of the OSI model do LAN protocols operate? |
|
Definition
| They operate at the network and data link layers of the OSI model and define communication over the various LAN media. |
|
|
Term
| At what layers do WAN protocols operate? |
|
Definition
| At the lowest three layers (network, data link and physical) of the OSI model and define communication over the various wide-area media. |
|
|
Term
| What is the difference between routing and routed protocols? |
|
Definition
| Routing protocols are responsible for path determination and traffic switching and routed protocols are responsible for preparing the data to be placed onto the network media. In essence, routing protocols route routed protocols. |
|
|
Term
| With the exception of the layers on each end, what OSI model layers does each layer communicate with? |
|
Definition
| With the peer layer in other network devices and the layers directly above and below. |
|
|
Term
| What are the two forms of control information typically used to exchange communications between peer OSI layers. |
|
Definition
|
|
Term
| What is known as encapsulation as it relates to the OSI model? |
|
Definition
| The data portion of an information unit at a given OSI layer can potentially contain headers, trailers, and data from all the higher layers. |
|
|
Term
| The asynchronous data communications protocol data frames use what for synchronization? |
|
Definition
|
|
Term
| What three elements of the message block (frame) format can be contained in each BSC transmission? |
|
Definition
| A header, the text, and a trailer. |
|
|
Term
| All BOP transmissions in a link follow the frame format. The frame consists of what fields? |
|
Definition
| Start flag field, Station address field, Control field, Data Information field, Frame check sequence, and Close Flag field. |
|
|
Term
| In HDLC, what is used so the receiving station can determine if the data is information or a flag indicating the end of a frame? |
|
Definition
|
|
Term
| What network is an informal collection of government, military, commercial, and educational computer networks that all interconnected and transmit information? |
|
Definition
|
|
Term
| A LAN may serve how many users? |
|
Definition
| A LAN may serve as few as two or three users or as many as thousands of users. |
|
|
Term
| What type of network is also used as a means to interconnect several local area networks by bridging them with backbone lines? |
|
Definition
|
|
Term
| What network provides a private tunnel through the internet? |
|
Definition
|
|
Term
| What are the advantages of using peer-to-peer network? |
|
Definition
| Advantages of using a peer-to-peer network are: that they're easy to configure, don't require additional server hardware and software, users can manage their own resources, they don't require a network administrator, and they reduce cost. |
|
|
Term
| What are the disadvantages of client/server networks? |
|
Definition
| The disadvantages of client/server networks include: planning, design, and management are complicated; managing servers requires dedicated staff; and server hardware and software are expensive. |
|
|
Term
| The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at one of what four layers? |
|
Definition
| The Data Link, Network (also known as the Internet layer in TCP/IP model), Transport or Application layer. |
|
|
Term
| The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network based on what protocol standards? |
|
Definition
| The standards that have been adopted by the IEEE as the Project 802 standards. |
|
|
Term
| What are the four most important TCP/IP protocols that function within the network layer? |
|
Definition
| The IP, ARP, RARP, and ICMP. |
|
|
Term
| Within the IP, what are the datagram fields? |
|
Definition
| Version, IHL, DiffServ Field, Total length, Identification, Flags, Fragment offset, TTL, Protocol, Header checksum, Source IP address, Destination IP address, Options, Padding, and Data. |
|
|
Term
| What fields belong to a TCP segment? |
|
Definition
| Source port, Destination port, Sequence number, ACK, TCP header length, Reserved, Flags, Sliding-window size (or window), Checksum, Urgent pointer, Options, Padding, and Data. |
|
|
Term
| What are some reasons for implementing DHCP? |
|
Definition
| To reduce the time and planning spent on IP address management, to reduce the potential for errors in assigning IP addresses, to enable users to move their workstations and printers without having to change their TCP/IP configuration, and to make IP addressing transparent for mobile users. |
|
|
Term
| Between what layers do the application layer protocols reside? |
|
Definition
| Between the Session and Application layer of the OSI model. |
|
|
Term
| What's the difference between File Transfer Protocol (FTP) and Trivial File Transfer Protocol? |
|
Definition
| TFTP uses UDP which means it doesn't guarantee deliverability, FTP use TCP. |
|
|
Term
| What protocol is responsible for matching a host name to an IP address? |
|
Definition
| Domain Name System (DNS). |
|
|
Term
| What utility sends out Internet Control Message Protocol (ICMP) requests in hopes to get an ICMP echo reply? |
|
Definition
|
|
Term
| Which IP address is a 32-bit number, usually represented as a four-part decimal number, with each of the four parts separated by a period or decimal point? |
|
Definition
|
|
Term
| IP addresses with a first octet from 192 to 223 are part of what IPv4 class? |
|
Definition
|
|
Term
| What two questions must you ask yourself during the selection of a subnet mask? |
|
Definition
| How many routed subnets are required on the network and what is the likely maximum number of hosts on any one of those subnets? |
|
|
Term
| Nowadays, what protocol is likely employed for subnetting large networks? |
|
Definition
| A protocol supporting variable length subnet masking. |
|
|
Term
| What type of routing protocols supports VLSM? |
|
Definition
| Classless routing protocols. |
|
|
Term
| What are some examples of classless routing protocols? |
|
Definition
| OSPF, RIP version 2, Cisco's EIGRP, BGP, IS-IS. |
|
|
Term
| How many bits are in an IPv6 address? |
|
Definition
|
|
Term
| How many sets of 16 bit sections make up an IPv6 address? |
|
Definition
|
|
Term
| What unique part of a network device is used when acquiring an IPv6 address by way of autoconfiguration? |
|
Definition
| The Media Access Control (MAC) address. |
|
|
Term
| What does it mean to have dual stack router? |
|
Definition
| The router has both IPv4 and IPv6 protocols running on it. |
|
|
Term
| What IPv4 protocol is needed to tunnel IPv6? |
|
Definition
|
|
Term
| What are the IPv6 two tunneling classes? |
|
Definition
|
|
Term
| Which IPv6 transition approach doesn't require a dual stack router? |
|
Definition
| Network Address Translation-Protocol Translation (NAT-PT). |
|
|
Term
| Transceivers are capable of operating in what modes? |
|
Definition
| Transcievers are capable of operating in full duplex, half duplex, and simplex mode. |
|
|
Term
| At what layer of the OSI model do transceivers operate and how are they used? |
|
Definition
| They operate at the Physical layer of the OSI model and are used in Ethernet networks to connect a device to fiber or copper cable. |
|
|
Term
| What device can be viewed as the actual interface between workstations, servers, clients, and the shared media of the network? |
|
Definition
|
|
Term
| Nearly all NICs contain what device that transmits and receives data signals? |
|
Definition
|
|
Term
| What is one way repeaters overcome attenuation? |
|
Definition
| Repeaters remove the unwanted noise in an incoming signal. |
|
|
Term
| What do all devices on a network share when connected to a hub? |
|
Definition
| They share the same amount of bandwidth and the same collision domain. |
|
|
Term
| What are the three central hub classifications? |
|
Definition
| Passive, Active, and Intelligent. |
|
|
Term
| What are some advantages of switches? |
|
Definition
| Switches have an internal processor, an operating system, memory, and several ports that enable other nodes to connect to it; have multiple ports and can make better use of of limited bandwidth and prove more cost-efficient than bridges; each port on the switch acts like a bridge, and each device connected to a switch effectively receives its own dedicated channel; and a switch limits the number of devices in a collision domain, it limits the potential for collisions. |
|
|
Term
| What are some disadvantages of switches? |
|
Definition
| Although they contain buffers to hold incoming data and accomodate bursts of traffic, they can become overwhelmed by continuous, heavy traffic. In that event, the switch cannot prevent data loss. |
|
|
Term
| Why would you replace a backbone router with a switch? |
|
Definition
| Because a switch provides at least two advantages: better security and better performance. |
|
|
Term
| What are the four types of switching devices? |
|
Definition
| Cut-through, Store and forward, Hybrid and Fragment-free. |
|
|
Term
| Hybrid switches represent a combination of what switching devices? |
|
Definition
| Cut-through and store and forward switches. |
|
|
Term
| What is a major advantage of a hybrid switch? |
|
Definition
| Its minimal latency when error rates are low and it becomes a store and forward when error rates rise, allowing it to discard frames when error rates get high. |
|
|
Term
| Routers operate at what layer of the OSI model? |
|
Definition
| Routers operate at the Network layer (Layer 3). |
|
|
Term
| What does a typical router contain? |
|
Definition
| A typical router has an internal processor, an operating system, memory, input and output jacks for different types of network connectors (depending on the network type), and usually, a management console interface. |
|
|
Term
| What tasks can all routers do? |
|
Definition
All routers can: connect dissimilar networks, interpret Layer 3 addressing and other information (such as quality of service indicators), determine the best path for data to follow from point A to point B, and reroute traffic if a primary path is down but another path is available.
Routers may optionally perform the following: filter out broadcast transmissions to alleviate network congestion, prevent certain types of traffic from getting to a network, enabling customized segregation and security, support simultaneous local and remote connectivity, provide high network fault tolerance through redundant components such as power supplies or network interfaces, monitor network traffic and report statistics, and diagnose internal or other connectivity problems and trigger alarms. |
|
|
Term
| Identify and define the four common routing protocols. |
|
Definition
RIP--The oldest routing protocol is an interior routing protocol, meaning that it is used on interior or border routers. RIP does not work ell in very large network environments; RIP is slower and less secure.
OSPF--Used on interior or border routers; OSPF uses a more complex algorithm for determining best paths. In OSPF, each router maintains a database of the other routers' links, and if notice is received indicating the failure of a given link, the router can rapidly compute an alternate path. OSPF is supported by all modern routers. Therefore, it is commonly used on LANs that rely on a mix of routers from different manufacturers.
EIGRP--Used on interior or border routers, was developed in the mid-1980s by Cisco Systems. It has a fast convergence time and a low network overhead, and is easier to configure and less CPU-intensive than OSPF. EIGRP also offers the benefits of supporting multiple protocols and limiting unnecessary network traffic between routers. It accomodates very large and heterogenous networks, but is only supported by Cisco routers. On LANs that use exclusively Cisco routers, EIGRP is generally preferred over OSPF.
BGP--Used on border and exterior routers. |
|
|
Term
|
Definition
| As the name suggests, it is a device that's a cross or hybrid between bridges and routers. |
|
|
Term
| Where can a Gateway reside? |
|
Definition
| Gateways can reside on servers, microcomputers, connectivity devices (such as routers), or mainframes. |
|
|
Term
| What are some popular types of gateways? |
|
Definition
| Popular types of gateways include e-mail gateway, IBM host gateway, internet gateway, LAN gateway, voice/data gateway, and firewall. |
|
|
Term
| What do VPN concentrators create to extend a network? |
|
Definition
| VPNs create tunnels using secure connections across a network such as the Internet. |
|
|
Term
| What function does a VPN concentrator perform? |
|
Definition
| VPN concentrators establishes tunnels, negotiates tunnel parameters, authenticates users, assigns user addresses, encrypts and decrypts data, manages security keys, manages data transfer across the tunnel manages data transfer inbound and outbound as a tunnel endpoint or router, and invokes various standard protocols to accomplish these functions. |
|
|
Term
| What is the purpose of a TDR? |
|
Definition
| It uses pulses to locate and test for sheath faults, damaged conductors, loose connectors, splices, bridge taps, split pairs and other problems. |
|
|
Term
| What type of cable discrepancies can be detected by a TDR? |
|
Definition
| Opens, shorts, and pin holes in cable shielding, kinks, and mismatched or corroded cable connectors. |
|
|
Term
| How does the OTDR use "backscattered" light to make measurements? |
|
Definition
| It correlates the returned light pulses with a location in the fiber. |
|
|
Term
| What determines the amount of light-pulse power that is transmitted down the cable? |
|
Definition
|
|
Term
| What function of the cable scanner shows the manner in which each wire is mated to connectors at both ends of the cable? |
|
Definition
|
|
Term
| What are the primary capabilities provided by a protocol analyzer? |
|
Definition
| Digital network diagnostics and software development. |
|
|
Term
| Explain the difference between a protocol analyzer NIC and other NICs. |
|
Definition
| The NIC in a protocol analyzer is configured to process all frames; oher NICs only process broadcast frames and frames with its MAC address. |
|
|
Term
| What function of the protocol analyzer excludes specific types of frames? |
|
Definition
|
|
Term
| List four types of specific occurrences that can be displayed by counters. |
|
Definition
| Any four of the following: packets transmitted, CRC errors, undersize packets, oversize packets, ARP requests, collisions, and bit errors. |
|
|
Term
| What menu is best used to report errors that occur at the physical layer such as bad FCS, short frames, and jabbers? |
|
Definition
|
|
Term
| What kind of information does the connection statistics menu provide? |
|
Definition
| Connection statistics provide information concerning the bandwidth utilization and the number of connections that are related to specific nodes. |
|
|
Term
| Identify the three types of active tests that are conducted with a protocol analyzer |
|
Definition
| Ping, trace route, and traffic generator. |
|
|
Term
| MIBs contain a set of managed objects. How are they identified? |
|
Definition
|
|
Term
| What two things may an MIB be identified by? |
|
Definition
| Its object name or object descriptor. |
|
|
Term
| What TCP/IP ports are used by SNMP? |
|
Definition
|
|
Term
| What are the four basic SNMP commands? |
|
Definition
| Read, write, trap and traversal operations. |
|
|
Term
| How does the NMS notify you of the occurence of a trigger event or alarm? |
|
Definition
| It is identified by a change in the color of a device or link on the network map that is displayed on the NMS's monitor screen. |
|
|
Term
| What must be done to each managed device on the network so that it provides data to the NNM? |
|
Definition
| Each managed device on the network must be individually configured for SNMP. |
|
|
Term
| Which NNM menu includes the SNMP MIB browser selection? |
|
Definition
| The Tools menu from any network map. |
|
|
Term
| Which NNM submenu do you use to start the data collection process? |
|
Definition
| The NNM's Data Collection and Threshold submenu. |
|
|
Term
| Which NNM submenu do you use to change alarm thresholds? |
|
Definition
| The NNM's Data Collection and Threshold submenu. |
|
|
Term
| Using the NNM, what are the steps involved in printing performance graphs? |
|
Definition
| Performance graphs can be printed by selecting File and Print from the Graph window. |
|
|
Term
| Name and describe the four types of reports that can be created using the report templates? |
|
Definition
| An availability report shows the percentage availability of the managed device's network interfaces; the exception report lists the threshold events that have been exceeded; an inventory report lists all the nodes that are in the MIB; and the performance report provides a summary table of statistical data for the managed device's network interfaces. |
|
|
Term
| When configuring a report, what data intervals can you select? |
|
Definition
| Data collection intervals are selected in 5-, 10-, or 15-minute intervals. |
|
|
Term
| What is the name of the Air Force initiative that defines and drives network information security? |
|
Definition
|
|
Term
| What is the basic stance of the network security policy? |
|
Definition
| To allow all unauthorized traffic and deny all else. |
|
|
Term
| What does the classic "Defense in Depth" approach to security require you to do? |
|
Definition
| Minimize the exposure of your protective assets as much as possible. |
|
|
Term
| What service is essential to network security and must not be susceptible to spoofing? |
|
Definition
|
|
Term
| What is the most common form of a proxy for common services? |
|
Definition
|
|
Term
| What is an adverse event that threatens some element of computer security such as loss of data? |
|
Definition
| A computer security incident. |
|
|
Term
| What results from a denial of service security incident? |
|
Definition
| Either a system is disabled or a worm has saturated network bandwidth. |
|
|
Term
| What is used to protect and measure the security posture of information systems? |
|
Definition
| Information protection tools. |
|
|
Term
| What is one of the primary functions of the NCC, and what are the purposes for that function? |
|
Definition
| System monitoring; it verifies that the system is operational and makes sure that the system is being operated within the parameters established by network security policy and the DAA. |
|
|
Term
| What is internal control? |
|
Definition
| Internal control defines the various mechanisms employed to provide internal system security. They may include but are not limited to access control methods, system identification and authentication programs, and system configuration. |
|
|
Term
| What two possible security postures are used based on the information you want to protect, system usability, and the cost of required security measures? |
|
Definition
| "Default deny" posture and "Open" posture. |
|
|
Term
| Information security-related access controls fall into what two categories? |
|
Definition
| Technical controls, such as passwords and encryption that are part of normal network security, and administrative controls, such as segregation of duties and security screening of users. |
|
|
Term
| What are one-time passwords? |
|
Definition
| Passwords used only once and change for each user access session. |
|
|
Term
| What does Biometrics refer to? |
|
Definition
| An identification process based physical or behavioral characteristics unique to a user, such as fingerprints; keystroke patterns; patterns associated with the voice, retina, or iris; and facial characteristics. |
|
|
Term
| What agency approves high-robustness encryption? |
|
Definition
| The National Secuiry Agency. |
|
|
Term
| What must be employed to preclude unauthorized use of legitimate identification and authentication data? |
|
Definition
| Network anti-spoofing capability. |
|
|
Term
| How is an IDS used in relation to a firewall? |
|
Definition
| An IDS complements a firewall and provides additional protection, particularly against threats originating from outside the firewall. |
|
|
Term
| What are some examples of an intrusion a firewall might miss but IDS might catch? |
|
Definition
| Tunneling or application based attacks. |
|
|
Term
| Of what does a firewall physically consist? |
|
Definition
| One or more routers and host machines with filtering software containing a series of rules that accept or reject packets of information, connection types or application specific communications attempting to cross the firewall. |
|
|
Term
| What is the simplest and least expensive type of firewall, and what is its purpose? |
|
Definition
| Packet filtering firewall; to stop messages with inappropriate network addresses. |
|
|
Term
| What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? |
|
Definition
|
|