Combined Network+

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/498

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

499 Terms

1
New cards

Protocol Analyzer/Packet Capture

Software that captures data packets traveling over a network. Allows for detailed analysis of network traffic to identify issues, monitor performance, and ensure secure network transfer

2
New cards

ping

Sends ICMP data packets to test connectivity between two devices

3
New cards

tracert/traceroute (linux)

Traces the path packets take from the source to the destination, showing each hop along the route

In linux, it uses UDP by default. Can be configured to use ICMP echo request probes instead of UDP by using traceroute -I. traceroute -6 or traceroute6 for IPv6

windows:

tracert -d = switch to suppress name resolution

tracert -h = specify max number of hops

tracert -w = specify a timeout in ms. If, after increasing its value, if the destinations are then reachable, you probably have a bandwidth issue.

tracert -6 = ipv6

4
New cards

nslookup

Windows utility that queries DNS servers to find the IP address. Helps identifies DNS issues

5
New cards

dig

Querying DNS servers on linux, to help diagnose DNS issues. Can retrieve detailed info such as A, AAAA, CNAME, MX, and NS records

6
New cards

tcpdump

Linux command, captures and filters TCP/IP packets that are received or transmitted over a network. Can be automated (things like Wireshark and other GUI tools aren’t good at doing that)

tcpdump -i eth0

-r/-w switches write ouitput to a file and read the contents of the file

-e shows the ethernet header

7
New cards

netstat

Windows command showing incoming and outgoing connections, routing tables, and other network interface statistics

8
New cards

ipconfig/ifconfig/ip

Displays or configures the network configuration on the device

ipconfig=windows

ifconfig=older linux/mac

ip=modern linux systems

9
New cards

arp

Address Resolution Protocol command, displays or modifies the IP-to-MAC address translation tables used by ARP

10
New cards

nmap

A network scanning tool that discovers devices and services on a network and tells you if the host is working, and if/what ports are working. Done by sending packets and analyzing the responses

Different types of scans:

TCP SYN (-sS): A fast technique (aka half-open scanning), as the scanning host requests a connection without acknowledging it. The targets response identifies the port state

TCP connect (-sT): A half open scan requires nmap to have privileged access to the network driver so that it can craft packets

UDP scans (-sU): Scans UDP ports. As they don’t use ACKs, Nmap needs to wait for a response or timeout to determine the port state, so it can take a long time

Port range (-p): Dy default, scans 1000 commonly used ports, but can define a port range.

After services are discoverd, you can use Nmap with the -sV or -A switch to probe a host more intensively to discover the software/software version operating each port. This is known as fingerprinting

11
New cards

LLDP/CDP

Link Layer Discovery Protocol/Cisco Discovery Protocol. Network discovery protocols used to exchange information about devices on the same network.

LLDP: Vendor neutral protocol used to discover and share information between network devices, such as identity, capabilities, and neighbors.

  • Usage: Helps in identifying network topology, troubleshooting connectivity issues, and ensuring proper network config

CDP: A Cisco proprietary protocol similar to LLDP, specifically for Cisco networks to share info about connected Cisco devices

  • Usage: Facilitates network management and troubleshooting by providing detailed information about neighboring Cisco devices

12
New cards

Toner

Tool (tone generator and probe) for tracing/identifying individual wires or cables within a bundle.

13
New cards

Cable Tester

Verifies integrity and performance of network cables. Tests for continuity, signal strength, and wiring faults such as shorts, opens, and cross connections. Essential for validating new cable installations and diagnosing existing cable issues

14
New cards

Tap

A network tap is a hardware device that provides a way to access data flowing across a network cable. Creates a copy of data packets for monitoring and analysis WITHOUT interrupting the network flow. Used for network monitoring and security applications to analyze traffic for troubleshooting, performance, monitoring, and intrusion detection

15
New cards

Visual Fault Locator

Tool used to identify faults in fiber optic cables. Emits a visible red laser light that travels through the fiber, revealing breaks, bends, and faulty connectors

16
New cards

Command displaying the MAC address table of a switch. Used to help identify which MAC addresses are associated with which ports, helps for troubleshooting connectivity issues and ensuring proper network segmentation

show mac-address-table

17
New cards

Command displaying the routing table of a router/Layer 3 switch.

  • Shows active routes, route sources, and next-hop addresses

  • Essential for verifying correct routing and diagnosing routing issues

Helps ensure data packets are taking the optimal path through the network (doesn’t work for Cisco - show ip route instead)

show ip route

18
New cards

show interface

Command providing detailed info about the status and configuration of network interfaces.

  • Displays interface status, traffic statistics, and error counts

  • Useful for diagnosing issues such as link failures, duplex mismatches, and interface errors

Helpful for physical layer issues (show interfaces on cisco)

19
New cards

show config

Displays the current configuration of the network device.

  • Shows all configured settings, including IP addresses, routing protocols, and security settings

  • Useful for verifying config consistency and identifying misconfigurations.

(show runnin-config on Cisco)

20
New cards

show arp

Shows ARP table

  • Maps IP addresses to MAC addresses

  • useful for troubleshooting IP-to-MAC resolution issues

  • Can help in identifying/resolving connectivity issues related to ARP, ensuring reliable IP communication

21
New cards

show vlan

Command displaying info about VLAN configs

  • Shows VLAN IDs, names, and associated ports

  • Useful for verifying VLAN setup and troubleshooting VLAN related issues

  • Ensures proper network segmentation and enhances security by managing VLAN configs effectively

22
New cards

show power

Command providing info about the power status and consumption of PoE devices

  • Displays power allocation, usage, and available power

  • Useful for managing PoE budgets and diagnosing power related issues

23
New cards

Switching Issues

Can disrupt network connectivity and performance. Common switching issues include problems with the Spanning Tree Protocol (STP)

Proper implementation/management of STP is crucial for preventing network loops and mainlining efficient data flow. Addressing issues with root bridge selection, port roles, and port states ensures a stable/reliable network environment

24
New cards

Root Bridge Selection

In STP, the root bridge is the central reference point. Typically the most powerful device.

  • Determined by the lowest bridge ID, which consists of a priority value and the MAC address

  • Issues: Incorrect root bridge selection can lead to suboptimal network performance

  • Resolution: Adjust bridge priorities

25
New cards

STP Port Roles

STP assigns specific roles to switch ports.

Port roles:

  • Root port: Best path to the root bridge

  • Designated Port: Best path to a designated network segment

  • Blocked port: Prevents loops by not forwarding traffic

26
New cards

STP Port States

STP ports transition through several states to ensure network stability

States:

  • Blocking: Prevents traffic to avoid loops

  • Listening: Prepares to forward traffic without adding to the MAC table

  • Learning: adds MAC addresses to the table without forward

  • Forwarding: Actively forwards traffic

Issues: Incorrect port states can cause connectivity problems

Resolution: Verify/configure port states appropriately

27
New cards

Incorrect VLAN Assignment

Can cause network segmentation/communication/security issues

Verify and correct VLAN assignments, along with regular audits

28
New cards

ACLs

Used to control network traffic by specifying which users or systems can access network resources and under what conditions. Review and regularly audit ACLs

29
New cards

Route Selection Issues

Issues can cause suboptimal routing, increased latency, and network failures

30
New cards

Stale Routes

Routes that are no longer valid but remain in the routing table and can cause misrouting of packets

Resolution: Regularly update and clean routing tables to remove outdated routes

31
New cards

Misconfigured Static Routes

Incorrect static route entries can lead to packet loss and routing loops. Resolution: Verify static route configs

32
New cards

Dynamic Routing Protocol Conflicts

Inconsistent routing information due to misconfigured or conflicting routing protocols

Resolution: Ensure proper configuration and compatibility of dynamic routing protocols like OSPF, EIGRP, and BGP

33
New cards

Default Route Issues

Default routes act as a catch-all, forwarding packets to a specified gateway when no more specific route matches the destination. Default routes are essential for simplifying routing tables, especially in small or edge networks.

Missing Default Route: Absence of a default route can cause packets destined for unknown networks to be dropped

Incorrect Default Route: Misconfigured default routes can direct traffic to the wrong gateway, causing connectivity issues

34
New cards

Address Pool Exhaustion

Occurs when the available IP addresses in a networks DHCP scope are depleted

Common issues:

  • Over-subscription: Too many devices for a limited pool

  • Improper scope config: DHCP scopes are not configured to meet network demands, leading to insufficient IP allocation

  • Leased IPs Not Released: Devices not releasing IP addresses properly/quickly enough

Resolutions:

  • Expand the DHCP scope or subnet to include more IP addresses

  • Implement IP address management (IPAM) to monitor and optimize IP address allocation

  • Ensure proper lease times/release mechanisms are configured

35
New cards

Incorrect Default Gateway

Common issues:

  • Misconfigured Gateway Address

  • gateway outside subnet

  • multiple gateways

resolutions:

  • Verify/correct default gateway IP address on affected devices

  • Address subnet issues

36
New cards

Incorrect IP Addresses

Manual config errors, or static vs DHCP conflicts. Double check IP config, and/or use DHCP reservations

Duplicate IP Address: Can occur with overlapping DHCP scopes, DHCP leasing an IP address that’s already in use. Can use IPAM tools to detect/resolve IP conflicts as well as ensure scopes don’t overlap

37
New cards

Congestion/Contention

Occurs when network demand exceeds capacity, leading to slowdowns and delays.

Causes: Excessive data transfers, or malware

38
New cards

Bottlenecking

Common causes:

  • Insufficient bandwidth on a network link

  • Overloaded network devices

Resolutions:

  • Identify/upgrade the problem device

  • Implement better load balancing

39
New cards

Bandwidth

Maximum data transfer rate of a network connection. Exceeding it causes slow network performance

Resolutions:

  • Monitor bandwidth usage and optimize allocation

  • Implement traffic shaping and prioritization policies

40
New cards

Throughput Capacity

The actual rate at which data is successfully transmitted through the network

Issues:

  • Network inefficiencies and congestion can reduce throughput

  • Discrepancies between theoretical bandwidth and actual throughput

Resolutions:

  • Optimize network configurations and reduce interference

  • Ensure hardware and software are capable of supporting desired throughput levels

41
New cards

Latency

Delays in transmission and congestion.

Use high speed connections and optimize routing paths.

42
New cards

Packet loss

Packets failing to reach their destination, leading to incomplete transmission

Issues:

  • Causes include network congestion, faulty hardware, and interference

  • Leads to retransmissions, reduced throughput, and degraded application performance

Resolutions:

  • Improve network infrastructure and hardware reliability

  • Use error detection

Common causes:

  • Server, router, or switch is overloaded

  • Power outage

  • Firewall is blocking packets

  • Malicious actors

  • Faulty firemware

43
New cards

Jitter

Variability in packet arrival times, leading to choppy audio/video. Implement QoS and use jitter buffers

44
New cards

Overlapping channels

Results in increased interference and reduced throughput. Symptoms include degraded signal quality and slower network speeds

Resolutions:

  • Configure access points to use non-overlapping channels (such as 1, 6, 11 on 2.4ghz)

  • Implement automatic channel selection

45
New cards

Signal degradation

Leads to weaker signal strength and high error rates. Symptoms include intermittent connectivity, slower data transfer rates, and higher packet loss. Optimize access point placement and use signal boosters/repeaters to extend coverage

46
New cards

Insufficient wireless coverage

Can result in dead zones, conduct a wireless site survey/heat map to ensure proper coverage

47
New cards

Client Disassociation Issues

Frequent disassociation causes unstable connections and constant reconnecting. Symptoms include interrupted network access and inconsistent performance

Ensure strong and stable signal strength to fix

48
New cards

Roaming Misconfiguration

Poorly configured roaming can lead to slow handoffs between access points, causing temporary disconnections

Symptoms include lag during movement within the network and dropped connections

Resolutions: Optimize roaming settings on access points for smoother transmissions

49
New cards
50
New cards

STP vs UTP

Using UTP in environments with high electromagnetic interference instead of STP can result in signal degradation and data corruption (microwaves, fluorescent lights, etc)

51
New cards

Signal Degradation

Occurs when the quality of the signal diminishes over distance or due to interference, leading to poor network performance. Common causes include incorrect cable types, physical damage, EMI/RFI

52
New cards

Crosstalk

When one cable/channel interferes with a signal on another cable/channel. Two types:

  • Near-End Cross Talk (NEXT): Interference measured at the transmitting end

  • Far-End Cross talk (FEXT): Interference measured at the received end

Using incorrect or low quality cable can increase risk. Effects include corrupted data, reduced transmission speeds, and decreased network reliability/performance

53
New cards

Attenuation

Gradual loss of signal strength as it travels through a cable or medium. Increases with distance. Can affect the quality of the communication, need to use repeaters or amplifiers to maintain signal integrity

54
New cards

Improper Termination

Issues:

  • Signal loss and reflection, leading to data transmission errors and reduced network performance

  • Increased electromagnetic interference, causing further degradation of signal quality

55
New cards

Transmitter (TX)/Receiver (RX) Transposed

Happens when the transmitter and receiving wires are incorrectly connected, leading to communication failures.

Issues:

  • Devices cannot establish a proper link, leading to a complete loss of communication between networked devices

  • troubleshooting becomes more complex, as the issue is often not immediately obvious

56
New cards

Interface issues

Can significantly impact network performance, leading to reduced efficiency and more troubleshooting needs.

Monitoring interface counters helps identify problems

57
New cards

Increasing Interface counters

Interface counters track various metrics related to network traffic and errors. Increasing errors can indicate potential issues

58
New cards

CRC Errors

Cycle Redundancy Errors. Occurs when there is a mismatch in the data checksum, indicating data corruption during transmission. Causes:

  • Faulty cable

  • EMI

  • Hardware Failures

Results in data retransmission, increased latency, and reduced throughput

59
New cards

Runts, Giants, Drops

Runts: Packets smaller than the minimum allowed size (usually less than 64 bytes)

Giants: Packets that exceed the maximum allowed size (usually greater than 1518 bytes for ethernet frames)

Drops: Occur when packets are discarded due to congestion, buffer overflow, or configuration issues

60
New cards

Port status issues

Can affect network connectivity/performance. Make sure to understand port statuses

61
New cards

Error Disabled

A port in error disable status has been automatically shut down by the network device due to a detected issue

Cause:

  • Security violations, such as port security breaches

  • network problems, such as excessive errors or link flaps

62
New cards

Administratively Down

A port that has been manually disabled by an Admin

63
New cards

Suspended

Refers to a port that has been temporarily disabled, usually due to network policies or dynamic configurations

Causes: Policy enforcement, such as violation of network access controls or dynamic adjustments by protocols like LACP

64
New cards

Power Budget Exceeded

When the Total Power consumption of connected PoE devices exceeds the available power budget of the switch, some devices wont receive proper power

65
New cards

Incorrect Standard

Need to ensure each device/switch has the same PoE standard

66
New cards

Transceiver Issues

Transceivers are modules used to connect network devices via fiber optic or copper cables, and issues with them can affect transmission. Mismatched transceivers and signal strength problems are common issues

Mismatched transceivers: Incompatible transceivers can cause connectivity/performance issues.

Symptoms:

  • No link light

  • Data errors

  • Intermittent connections

Resolution: Ensure they’re from the same manufacturer/standard

67
New cards

Poor signal strength

Can result in data transmission errors and reduced network performance

Symptoms:

  • High error rates

  • dropped packets

  • no connectivity

Resolution: Check/clean fiber optic connectors, ensure proper cable length and quality, and verify transceiver specifications to maintain adequate signal strength

68
New cards

Step 1: Identify the problem

  1. Gather information, look at system logs, talk to the user, ask questions. ie "“Could you access the file server yesterday? What can’t you access on it? Did you have a map drive for it?:

69
New cards

Step 2: Identify a Theory of Probable Cause

70
New cards

Step 3: Test the theory to determine the cause

71
New cards

Step 4: Establish a plan of action to resolve the problem and identify potential side effects

Ste

72
New cards

Step 5: Implement the solution or escalate as necessary

73
New cards

Step 6: Verify full system functionality and implement preventative measures if applicable

74
New cards

Step 7: Document findings, actions, outcomes, and lessons throughout the process

75
New cards

Top-to-bottom/bottom-to-top OSI model

Either start troubleshooting from either the top (application layer) down, or the bottom (physical layer) up, depending on the symptoms

76
New cards

CIA Triad

Confidentiality, Integrity, and Availability

77
New cards

Confidentiality

  • Access Controls: Mechanisms such as passwords, biometric verification, or access cards that limit resource access to authorized personnel

  • Encryption

  • Secure Communication: Using secure protocols like SSl/TLS for transmitting data to prevent interception by unauthorized entities

78
New cards

Integrity

Protecting data from unauthorized changes to ensure that it is reliable and correct. Key aspects:

  • Data accuracy

  • Data consistency

  • Data trustworthiness

Various methods are used, such as Cryptographic hash functions and digital signatures, Access controls as well

79
New cards

Availability

Ensuring data, systems, and services are accessible to authorized users when needed. Ways to do so:

  • Fault tolerance

  • Backup Systems

80
New cards

Risk

Asset: Anything within an environment that should be protected

Asset Valuation: A dollar value assigned to an asset based on actual cost and non-monetary expenses

Threats: Any potential occurrence that may harm the asset

Threat Agent/Actors: People, programs, hardware, or systems that used threats to cause harm

Threat events

Threat Vectors: A threat/attack vector is the path or means by which an attack/attacker can gain access to a target in order to cause harm

Vulnerabilities: Weakness in an asset or the absence or the weakness of a safeguard or countermeasure that could be exploited

Exposure: Actual or anticipated damage from a threat

Safeguards: Anything that removes/reduces risk

Attack: The threat exploiting the vulnerability, (the attempt to attack/exploit it)

Breach: The occurrence of a security mechanism being bypassed or thwarted by a threat agent (a successful attack)

81
New cards

Identity and Access Management (IAM)

A framework of business processes, policies, and technologies that facilitates the management of electronic or digital identities. Ensures the right people can access the right resources at the right times for the right reasons. Crucial for security and regulatory compliance

82
New cards

MAC (Mandatory Access Controls)

A security model in which access rights are regulated by a central authority based on different levels of security clearance. Use case: Common in government and military systems where classified info is involved.

Key aspect: Users cannot change access permissions… they are set and enforced by a system admin

83
New cards

DAC (Discretionary Access Control)

Security model where the resource owner decides on access levels. Most flexible access model. Used in environments where users need control over the resources they own, like file permissions etc.

Key aspect: Risk of users granting excessive access potentially leading to security breaches

84
New cards

RBAC (Role Based Access Control)

Assigns permissions based on a user’s role in an organization. Common in corporate environments. Streamlines access management

85
New cards

Rule Based Access Control

Access decisions are based on a set of rules defined by a system admin. Useful in environments requiring stringent access control, like securing network resources.

Key aspect: Rules can be based on various criteria, such as source/destination IP in firewalls

86
New cards

Attribute-Based Access Control (ABAC)

Uses policies that evaluate attributes of users, the environment, and resources. Effective in complex environments with diverse and dynamic user attributes.

Key aspect: Provides fine-grained control, allowing for more nuanced access decisions based on multiple factors (like access based on location, time, browser you use, etc)

87
New cards

SSO Importance

  • Reduced password fatigue

  • Centralized Authentication Control (Easier to enforce security policies)

  • Reduced IT workload (Simplified management of user accounts)

88
New cards

LDAP

Protocol for accessing and maintaining distributed directory information services, like user and group details, over a IP network

89
New cards

Federation

The process of linking and managing identities/credentials across different systems and organizational boundaries (SSO for multiple sites/apps/websites)

90
New cards

SAML

Security Assertion Markup Language, an open standard for exchanging authentication and authorization data between parties, specifically between an identity provider and a service provider. Very popular for federation

Usage: Widely used for SSO to allow users to log in to multiple applications with one set of credentials

Uses XML for data exchange. Particularly useful in enterprise-level SSO

Key Components:

  • Identity Providers (IdPs): Services that authenticate users and provide identity information to service providers. Examples: Okta, Microsoft Azure AD, and Google Identity. Attestation (formal verification that something is true) is done with the IdPs.

  • Service Providers: The applications or services that rely on information from the IdP to provide access to the user (like Best Buy, Facebook, New sites, etc)

<p>Security Assertion Markup Language, an open standard for exchanging authentication and authorization data between parties, specifically <strong>between an identity provider and a service provider</strong>. Very popular for federation</p><p>Usage: Widely used for SSO to allow users to log in to multiple applications with one set of credentials</p><p>Uses XML for data exchange. Particularly useful in enterprise-level SSO</p><p>Key Components:</p><ul><li><p><strong>Identity Providers (IdPs): </strong>Services that <strong>authenticate users</strong> and provide identity information to service providers. Examples: Okta, Microsoft Azure AD, and Google Identity. <u>Attestation</u> (formal verification that something is true) is done with the IdPs.</p></li><li><p><strong>Service Providers: </strong>The applications or services that rely on information from the IdP to provide access to the user (like Best Buy, Facebook, New sites, etc)</p></li></ul><p></p>
91
New cards

OAuth

Open standard for access delegation. Used to grant websites or applications access to their information on other websites but without giving them the passwords. Commonly used for authorizing third-party applications to access a user’s data without exposing their credentials.

Is about authorization not authentication, and is used to grant limited access on behalf of the user

92
New cards

OpenID Conect

An identity layer on top of OAuth 2.0. Allows clients to verify the identity of the end-user based on authentication performed by an authorization server. Primarily used for authentication in modern web applications and mobile applications

93
New cards

Geofencing

Limiting access to resources (using GPS, RFID, WiFi, or cellular data) based on location, using either a mobile device or RFID tag for instance.

94
New cards

Deception and Disruption Technology

Refers to a set of cybersecurity strategies/tools designed to mislead, confuse, or disrupt the actions of malicious actors. used to create traps or illusions that protect real network assets by diverting attackers to decoy systems/files

95
New cards

Honeypot

A security mechanism setup to detect, deflect, or study hacking attempts. Acts as a decoy, imitating a real computer system, network, or information system, but is isolated and monitored. Provides valuable info about their techniques/intentions without endangering the actual network

96
New cards

Honeynet

A network of honeypots. Simulates a network environment to attract attackers. More complex, but can provide deeper insights

97
New cards

Honeyfiles

Decoy files placed with an network’s file systems. Appears legitimate and contains attractive data, but are monitored for access. Unauthorized access can alert security personnel

98
New cards

Honeytoken

Any decoy data or token inserted into a system. Could be a fake user account, database record, or any other type of digital bait that when interacted with indicates a compromise or unauthorized access

99
New cards

Data locality

Refers to the geographical location where data is stored, processed, and managed. Compliance with data locality regulations ensures that data handling practices meet regional legal requirements

100
New cards

PCI DSS

Payment Card Industry and Data Security Standards. Involves implementing encryption, access control, and regular monitoring to protect cardholder data from breaches and fraud