lol
Personal area network (PAN) -
network that connects devices within the range of an individual person - commonly through Bluetooth
Local area network (LAN)
network that connects devices using wire cables in a small geographic area. Typically owned by an individual or wholly managed by an IT department
Virtual LANs (VLAN)
allow an administrator to segment the ports on a single switch as if it were multiple switches; allow end devices to be grouped together for administrative purposes
Wireless LAN
Wirelessly connects users and devices in a small geographical area using radio waves
Wireless mesh network (WMN)
Uses multiple access points to extend the WLAN
Metropolitan area network (MAN)
Network that spans across a large campus or city; various buildings connected through wireless or fiber optic media
Wide area network (WAN)
connects multiple networks that are in geographically separated locations. Users contract for WAN access from a service provider
Virtual private network (VPN)
used to securely connect to another network over an insecure network, such as the internet
Which type of network applies Bluetooth technology?
PAN
Where do you find internet in the different types of network?
WAN
IPV4 uses…
32-bit binary
IPV6 uses…
128-bit hexadecimal
Network interface card (NIC)
provides the physical connection to the network at the PC or other end device
Repeaters
Regenerates weak signals to extend the distance a signal can travel
Hubs
Receive data on one port and send it out to all other ports to extend the reach of a network - legacy devices
Bridge
Keep a record of all the devices on each segment; filter traffic between LAN segments to reduce the amount of traffic
Switches
Microsegments a LAN; filters and segment network traffic by ending data only to the device to which it is sent - legacy device
Wireless access points (APs)
Provide network access to wireless devices, such as laptops and tablets
Routers
Connect networks; use IP addresses to forward traffic to other networks
What layer of the OSI are network devices on?
The third layer - Network layer
Frame
Unit of data on a network
Switches look at…
MAC addresses and frames
Routers look at…
IP addresses and packets
Fiber optic cables
Uses light to transmit signals
Single-mode fiber (SMF)
Consists of a very small core and uses laser technology to send a single ray o flight
Multimode fiber (MWF)
Consists of a larger core and uses LED emitters to send light pulses
Does single-mode or multimode have a longer transmission distance?
SMF
The first part of an IPV4 address…
Identifies the network
The second part of an IPV4 address…
Identifies the device on the network
The subnet mask is used by the device to…
Determine the network
Default gateway
Address of the router
TCP/IP Model
Consists of layers that perform functions necessary to prepare data for transmission over a network - consists of TCP and IP
Transmission Control Protocol (TCP)
Tracks all the network connections between a user’s device and multiple destinations
Internet Protocol (IP)
Responsible for adding addressing so that data can be routed to the intended destination
What are the two protocols that operate at the transport layer?
TCP and UDP
Virus
Require human action to propagate and infect other computers; executes and infects the computer
Trojan horse
A program that looks useful but also comes with malicious code; often provided with free online programs such as computer games
Adware
displays unsolicited advertising through op-up web browser windows
Ransomware
Denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key
Rootkit
used to gain administrator-account level access to computer
Spyware
Used to gather information about the user and send to cybercriminals
Worm
Self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software
Social engineering
an access attack that attempts to manipulate individuals into performing actions or divulging confidential information; single most serious threat to a secure network
Phishing
attacker sends fraudulent email disguised as being from a legitimate, trusted source to trick the recipient
Dumpster diving
In-person type of attack; attacker rummages through trash bins to discover confidential documents
Shoulder surfing
In person attack; attacker inconspicuously looks over someone’s shoulder
Data wiping
Also known as secure erase; software tools specifically designed to overwrite existing data multiple times, rendering the data unreadable
Data degaussing
Using a magnet to disrupt or eliminate the magnetic field on a hard drive; can be done with a wand or electromagnetic device
Are data wiping and degaussing techniques reversible?
No
What is the minimum recommended amount of characters for a password?
8 characters
When an employee leaves an organization…
Immediately disable the account or change the login credentials to the account
Hashing
uses a mathematical function to create a numeric value, called a message digest that is unique to the data
Symmetric Encryption
If a encrypted message is intercepted, it can only be decrypted using the passwork/key that it was encrypted with
Asymmetric encryption
Requires a private key and a public key
RSA is a type of
Asymmetric encryption
WPA2
Uses a wireless encryption system to encode the information being sent to prevent unwanted capture and use of the data
WPA (Wi-Fi Protected Access)
Uses WEP but secures the data with much stronger Temporal Key Integrity Protocol (TKIP) encryption algorithm
The preferred choice when securing a wireless network is..
The strongest WPA2 security mode possible
WPS (Wi-Fi Protected Setup)
Both the router and wireless device will have a button that when both are pressed, automatically configures Wi-Fi security between the devices; is vulnerable and should be turned off
Port Forwarding
Rule-based method of directing traffic between devices on separate networks
Port triggering
Allows the router to temporarily forward data through inbound ports to a specific device
MAC (Media Access Control)
Hard-coded onto the Ethernet or wireless network interface card by the manufacturer; stays the same
How large is a MAC address?
48 bits
IP Address
Assigned by network administrators based on the location within the network; when device moves from one network to another, it will likely change
802.11 is the standard for…
Wireless networks
802.3 is the standard for…
Ethernet networks
Coaxial cables
Use electrical signals over copper/aluminum to transport data
Twisted-pair cables
Copper cabling that is twisted to privde protection against crosstalk
What are some examples of anti-malware programs?
McAfee, Symantec (Norton), Kaspersky, Trend Micro, Bitdefender, etc
Service licensing agreement
Contract that outlines the legal use, or redistribution, of that software. Important because they ensure that the software owner’s copyright is maintained
What type of cable is not affected by EMI or radio frequency interference?
Fiber optic cable
Computer forensics
Collection and analysis of data for criminal investigation
Cyber law
Term to describe the international, regional, country, and state laws that affect computer security professionals
First response
Official procedures employed by those people who are qualified to collect investigation.
Why is first response important?
If the forensic profess is improperly performed, evidence might not be admissible in court
Level one technicians
Primary responsibility is gaining important information from the customer or solve very simple problems
Level two technicians
Receive the work order with the description of the problem, is the one resolving the problem
Do level one or level two technicians have more experience?
Level two technicians
Demilitarized zone (DMZ)
Network that provides services to an untrusted network
Best practices for configuring wireless access points
Basic security settings that are compatible with the existing network security, change the default username of the admin account, assign IP addresses instead of using DHCP
An IPV6 device must always be configured with a…
Link-local IPv6 address
Link-local address
Used by a device to communicate with other computers connected to the same network with the same IP address range
DHCP Server
Service used to automatically assign IP addressing information to hosts
DNS server
Method that computers use to translate domain names into IP addresses
Web server
Provides web resources
Proxy server
Have the authority to act as another computer
Syslog Server
Allows networking devices to send their system messages across the network to syslog servers
Network Address Translation (NAT)
Converts private IPV4 addresses to Internet-routable IPv4 addresses
First step in compressing IPV6 address
Omit leading 0s
Second step in compressing IPV6 address
Omit all 0 segments
Bandwidth
How much data can be received every second
Half-duplex
Sends or receives data one at a time
Full-duplex
Sends and receives data at the same time
What is the OSI layer model?
Physical, Data-Link, Network, Transport, Session, Presentation, Application
(Please do not throw sausage pizza away)
UDP
Simple transport layer protocol, considered unreliable because there is no acknowledgement that the data is received at the destination
WPA2
Industry standard for securing WLANs
Layers in TCP/IP
Application, Transport, Internet, Network Access
(Armadillos take in new ants)
What layer of the OSI are bridges on?
Layer 2 - Data-link
What layer of the OSI are repeaters and hubs on?
Layer 1 - Physical