1/65
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Fault Tolerance
Having redundancy; multiple paths to a destination.
Packet Switched Network
A network that splits traffic into multiple packets routed through a shared network.
Scalability
The ability to add a new network to an existing network.
Quality of Service (QoS)
A priority-based system to manage traffic congestion.
BYOD
The freedom for any device, with any ownership, used anywhere.
Cloud Computing
Leasing data center services from larger companies.
Public Clouds
Cloud services offered to the general population.
Private Clouds
Cloud services offered to a specific client.
Hybrid Clouds
A combination of public and private clouds.
Community Clouds
Cloud services for a specific type of client, like healthcare providers.
Powerline Networking
Transmitting information through electricity lines in homes.
Zero-day Attacks
Attacks occurring on the first day a vulnerability is known.
Internal Breaches
Most common data breaches. Caused by users from within the network.
Firewall Filtering
Blocks unauthorized access to devices.
Dedicated Firewall Systems
Filter large amounts of traffic with granularity.
Access Control Lists (ACL)
Filter access and traffic based on IPs and applications.
VPN
Secure access into a network for remote workers.
Data
The general term for the PDU used at the application layer.
Segment
The transport layer PDU.
Packet
The network layer PDU.
Frame
The data link layer PDU.
Bits
The physical layer PDU used for data transmission.
Shell
The user interface for requesting tasks in an operating system.
Kernel
Communicates between hardware and software in an operating system.
Console Connection
Out-of-band access to a device using a console port.
Secure Shell (SSH)
Recommended method for remote CLI access.
Telnet
Insecure method for remote CLI access.
Boldface
Commands and keywords entered literally in IOS.
Italics
Arguments for which values are supplied in IOS.
Abort Keystroke
Ctrl-Shift-6, used to abort commands in IOS.
enable secret ____
Secure Privileged Mode
ip address _ip_ ___default gateway___, make sure to also run “no shutdown” after
Configure IP Addresses
* Physical Layer
* Data Link Layer
* Network Layer
* Transport Layer
* Session Layer
* Presentation Layer
* Application Layer
OSI Reference Model Order
Network Access layer
Internet Layer
Transport Layer
Application Layer
Nine Idiots Took Americans Hostage
TCP/IP Protocol Layers
Physical Layer
Receives, encodes, and sends data over the network.
Bandwidth
The capacity of a medium to carry data.
Latency
The time delay for data to travel.
Throughput
The measure of bits transferred over time.
Goodput
Usable data transferred over time.
Copper Cabling
Cheapest, most commonly used cabling
Unshielded Twisted Pair (UTP)
The most common and cheapest copper cabling.
Shielded Twisted Pair (STP)
better noise protection than UTP but more expensive
Coaxial Cable
A cable with a copper conductor surrounded by insulation.
Fiber Optic Cables
High bandwidth cables immune to EMI and RFI.
Single-mode Fiber
Fiber with a small core for long-distance transmission.
Multimode Fiber
Fiber with a larger core for shorter distances.
Aux Console Access
Connection over telephone call
Enter user EXEC mode
enable command
Line Configuration Mode
Used to configure console, SSH, Telnet, or Aux access
Interface Configuration Mode
Used to configure a switch port or router interface.
Square Brackets in IOS Commands [x]
Optional
Braces in IOS commands {x}
Required
Return to Command Keystroke (command interruption)
CTRL + R
Secure Console Access (and VTY)
In global configuration mode (layer 3), use “password _______”
Secure Privileged Mode Access Command
In privileged mode (Layer 2), enable secret _______
Encrypt Passwords Command
In privileged mode (Layer 2), service password-encryption. Use show running-config to ensure the passwords are now encrypted
Internet Society (ISOC)
Responsible for promoting the open development and evolution of internet use
Internet Architecture Board (IAB)
Responsible for the overall management and development of internet standards
Internet Engineering Task Force (IETF)
Develops, updates, and maintains internet and TCP/IP. Includes developing new protocols and updating existing ones.
Internet Research Task Force (IRTF)
Focused on long-term research related to the internet including the Anti-Spam Research Group (ASRG), Crypto Forum Research Group (CFRG) and P2P Research Group (P2PRG)
Internet Corporation for Assigned Names and Numbers (ICANN)
Coordinates IP address allocation, the management of domains, and assignment of other information used in TCP/IP protocols.
Internet Assigned Numbers Authority (IANA)
Responsible for overseeing and managing IP address allocation, domain name management and protocol identifiers for the other organization that actually does it.
Institute of Electrical and Electronics Engineers (IEEE)
Organization of electrical engineering and electronics dedicated to advancing innovation and creating standards in a wide are of industries. Made important standards such as the 802.3 Ethernet standard and 802.11 WLAN standard.
Electronic Industries Alliance (EIA)
Organization best known for its standards relation to electrical wiring, connectors, and the 19-inch racks for networking equipment.
Telecommunications Industry Association (TIA)
Organization responsible for developing communication standards in a variety of areas including radio equipment, cell towers, VoIP, satellite communications, and more.
International Telecommunications Union (ITU-T)
One of the largest and oldest communications standards organizations. Defines standards for video compression, IPTV, and broadband communications such as DSL.