IT Infrastructure, Virtualization, Cybersecurity, and Business Continuity Concepts

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/190

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

191 Terms

1
New cards

What standard does IEEE 802 establish?

The standard for copper cabling used in networking computers via Ethernet.

2
New cards

What is the maximum cable run for Ethernet without repeaters?

100 meters, with 90 meters for the actual run and 5 meters for patch cables on both ends.

3
New cards

What is the purpose of twisting wires in Ethernet cables?

To eliminate crosstalk, or interference.

4
New cards

What does SF/UTP stand for?

Shielded Foil Unshielded Twisted Pair, featuring a braided screen and foil shield for extra EMI protection.

5
New cards

What distinguishes Cat 5e cables from Cat 5 cables?

Cat 5e cables are built under strict standards to reduce crosstalk issues.

6
New cards

What is the maximum speed supported by Cat 6 cables?

Up to 10 Gbps for distances of up to 55 meters.

7
New cards

What is the primary purpose of Cat 6a cables?

To support twice the maximum bandwidth and higher transmission speeds over longer cable lengths.

8
New cards

What is the maximum transmission speed of Cat 7 cables?

Up to 100 Gbps at a range of 15 meters.

9
New cards

What color Ethernet cable typically denotes a crossover connection?

Green Ethernet cables.

10
New cards

What is the difference between single-mode and multi-mode fiber optic cables?

Single-mode uses a thin core for long-distance transmission, while multi-mode uses a thicker core for short distances.

11
New cards

What is the purpose of cladding in fiber optic cables?

To allow light to bounce off the wall of the fiber and continue traveling along its path.

12
New cards

What color jacket is typically used for OM 1/2 multimode fiber optic cables?

Orange.

13
New cards

What is the function of a network interface unit (NIU)?

It serves as the point of demarcation between the carrier network and the customer's network.

14
New cards

What does CSU/DSU stand for?

Channel Service Unit/Data Service Unit.

15
New cards

What is the role of a CSU/DSU?

To convert digital data frames from LAN to WAN formats and handle clocking and digital signals.

16
New cards

What is the purpose of repeaters in networking?

To reamplify the signal to overcome distance limitations of transmission media.

17
New cards

What distinguishes a regenerator from a repeater?

A regenerator reamplifies, reshapes, and retimes the signal, while a repeater only reamplifies.

18
New cards

What type of fiber optic cable construction is recommended for device-to-device applications?

Breakout or Fan Out construction.

19
New cards

What is the typical use of loose tube fiber optic cables?

For Telco standards, usually not used in Audio/Video or Ethernet applications.

20
New cards

What is the significance of the color yellow in Ethernet cables?

It indicates Power over Ethernet (POE) connections, which deliver a 30W current.

21
New cards

What is the maximum distance for Cat 6 cables to support 10 Gbps?

55 meters.

22
New cards

What is the primary function of fiber optic cable jackets?

To protect the fibers from mechanical and environmental damage.

23
New cards

What is the typical construction of distribution or TightPack fiber optic cables?

All buffered fibers under a single jacket with strength members.

24
New cards

What does attenuation in fiber optics refer to?

The loss of signal strength as light travels through the fiber.

25
New cards

What is the typical core size for single-mode fiber optic cables?

A thin 9-micrometer core.

26
New cards

What type of shielding do Cat 6a cables always have?

They are always shielded.

27
New cards

What is the purpose of the test jack in a network interface unit?

To allow technicians to plug in testing equipment for diagnostics.

28
New cards

What is a Network Interface Card (NIC)?

A hardware component that allows a device to communicate over a network, either as a separate card or integrated into the motherboard.

29
New cards

What types of NICs exist?

Wired (Ethernet) and wireless (Wi-Fi).

30
New cards

What is the primary function of a NIC?

To transmit and receive layer 1 data and to be reachable via layer 2 switching.

31
New cards

What does the ROM in a NIC store?

The factory-assigned medium access control (MAC) address, a unique 48-bit address.

32
New cards

What standards do modern NICs operate according to?

IEEE 802.3 for Ethernet and IEEE 802.11 for Wi-Fi.

33
New cards

What is the role of a switch in a network?

A layer 2 device that routes traffic via frames using MAC addresses.

34
New cards

How do unmanaged switches differ from hubs?

Unmanaged switches transmit data only to the selected device, while hubs transmit data to all connected devices.

35
New cards

What is a managed switch?

A switch that allows subdividing LANs into multiple virtual LANs (VLANs).

36
New cards

What is the purpose of a bridge in networking?

To create a single, aggregate network from multiple network segments.

37
New cards

How many ports do most bridges have?

Typically 2 or 4 ports.

38
New cards

What is the difference between bridges and switches?

Bridges are software-based and have fewer ports, while switches are hardware-based and use chips for faster forwarding decisions.

39
New cards

What is the function of a router?

To connect two or more packet-switched networks and forward traffic to the intended device.

40
New cards

What is stored in a router's routing table?

Paths made up of the IP addresses of devices along a path.

41
New cards

What is the Address Resolution Protocol (ARP)?

A protocol used to discover other hosts on a network by mapping MAC addresses to IP addresses.

42
New cards

What does the Routing Information Protocol (RIP) do?

Multicasts IP addresses to other routers within a network.

43
New cards

What is the purpose of a firewall?

To filter incoming and outgoing traffic by port, IP address, and application.

44
New cards

At which layers do firewalls operate?

Layers 3 and 4; application firewalls operate at layer 7.

45
New cards

What is the difference between UDP and TCP?

UDP is a lightweight protocol without handshakes, while TCP requires handshakes for quality delivery.

46
New cards

What are the three types of modern firewalls?

Packet-filtering, stateful inspection, and proxy firewalls.

47
New cards

What is a multiplexer?

A device that allows the transmission of multiple streams of data across a single transmission medium.

48
New cards

What is Dense Wave Division Multiplexing (DWDM)?

A method of transmitting multiple streams of data over a fiber optic carrier using different wavelengths of light.

49
New cards

What is Time Division Multiplexing (TDM)?

A method of transmitting multiple streams of data using synchronized switches on either end of the circuit.

50
New cards

What is the significance of the Shortest Path First (SPF) algorithm?

It is used in the Open Shortest Path First (OSPF) protocol for efficient routing in IP networks.

51
New cards

What is the function of the Enhanced Interior Gateway Routing Protocol (EIGRP)?

A distance vector routing protocol used for IP, AppleTalk, and NetWare networks, designed to follow on from IGRP.

52
New cards

What does the Border Gateway Protocol (BGP) do?

It transfers routing information between routers in different autonomous systems and is the routing protocol of the internet.

53
New cards

What is the difference between distance vector and link-state routing protocols?

Distance vector protocols share routing information based on distance, while link-state protocols share information about the state of the links.

54
New cards

What is the primary function of a load balancer?

To distribute traffic evenly among a group of servers.

55
New cards

What are the two main types of load balancing algorithms?

Static and Dynamic.

56
New cards

Describe the round-robin load balancing method.

An authoritative name server distributes traffic to servers in a sequential manner.

57
New cards

What does the weighted round-robin method do?

Assigns different weights to servers based on their capacity, directing more traffic to higher-weighted servers.

58
New cards

How does the IP hash method work in load balancing?

It uses a mathematical computation on the client IP address to determine which server to route traffic to.

59
New cards

What is the least connection method in dynamic load balancing?

It directs traffic to the server with the fewest active connections.

60
New cards

Explain the weighted least connection method.

It assigns weights to servers based on their capacity to handle connections and directs traffic accordingly.

61
New cards

What does the least response time method consider when distributing traffic?

It combines server response time and active connections to determine the best server.

62
New cards

What is the resource-based method in load balancing?

It analyzes the current server load and distributes traffic based on available resources.

63
New cards

What is the standard width of IT equipment racks?

19 inches.

64
New cards

How is rack height expressed?

In rack units (U), where one rack unit is 1.75 inches high.

65
New cards

What is a 42U rack?

A rack that is 42 rack units high, theoretically allowing for fourteen 3U servers.

66
New cards

What is virtualization?

The abstraction of an execution environment that can be dynamically allocated to clients.

67
New cards

What is a virtual machine (VM)?

A logical compute system with virtual hardware that runs on a physical machine.

68
New cards

What is the role of a hypervisor in virtualization?

To allow multiple operating systems to run concurrently on a single compute system.

69
New cards

What distinguishes a type 1 hypervisor from a type 2 hypervisor?

Type 1 runs directly on the host hardware, while type 2 runs on top of an operating system.

70
New cards

What are the advantages of using virtual machines?

They allow for easier creation, backup, and migration of machines, and can run legacy systems.

71
New cards

How does a hypervisor manage virtual machines?

It maps virtual hardware to physical hardware and manages VM files for data protection.

72
New cards

What is the purpose of an Application Programming Interface (API)?

To provide an interface for communication between software applications.

73
New cards

What are first platform applications based on?

Mainframes and terminals, where applications are hosted centrally.

74
New cards

What characterizes second platform applications?

They use a distributed application architecture with servers providing services to client applications.

75
New cards

What technologies are third platform applications based on?

Cloud, Big Data analytics, mobile, and social technologies.

76
New cards

What is a virtual workspace?

An abstraction of an execution environment available to authorized clients using defined protocols.

77
New cards

What is the function of an agent in resource-based load balancing?

To calculate server resource usage and report free resources to the load balancer.

78
New cards

What does the term 'latency' refer to in the context of hypervisors?

The delay experienced in communication between the hypervisor and the virtual machines.

79
New cards

What is the significance of 'clean' installs in virtualization?

They allow for software testing in a controlled environment without interference from previous installations.

80
New cards

What does a hypervisor view a virtual machine as?

A discrete set of files.

81
New cards

What is a Configuration File in virtualization?

Stores VM's configuration, including VM name, BIOS information, guest OS type, memory size, and number of CPU.

82
New cards

What does a Virtual Disk File do?

Stores the contents of the VM's disk drive.

83
New cards

What is the purpose of a Memory State File?

Stores the memory contents of a VM in a suspended state.

84
New cards

What information does a Log File keep?

Keeps a record of the VM's activity.

85
New cards

What is a Virtual Appliance?

A pre-configured VM created using Open Virtualization Format (OVF), pre-installed with OS and applications, ready to run on a hypervisor.

86
New cards

What does Virtual Infrastructure consist of?

Includes resource pools, CPU, memory, network bandwidth, storage pools, and identity pools.

87
New cards

What is a Virtual Network Interface Card (virtual NIC)?

Appears to guest OS as NIC, has a unique MAC address, and can be bridged to a real network or connected to a virtual network.

88
New cards

What was the total reported cybercrime loss in 2021?

$6.4 billion.

89
New cards

What is the estimated annual cost of cybercrime globally?

$600 billion.

90
New cards

What was the value of the cybersecurity market in 2020?

$156 billion.

91
New cards

What is a Threat in cybersecurity?

A person or organization that seeks to obtain or alter data without the owner's knowledge.

92
New cards

Define Attack in the context of cybersecurity.

A human-originated exploitation of a vulnerability.

93
New cards

What is a Vector in cybersecurity?

A pathway or method used by a hacker to illegally access a network or computer.

94
New cards

What is a Vulnerability?

An opportunity for threats to gain access to individual or organizational assets.

95
New cards

What is a Safeguard?

Protective measures prescribed to meet security requirements such as confidentiality, integrity, and availability.

96
New cards

What does Risk refer to in cybersecurity?

Exposure to danger; also known as exposure.

97
New cards

What are Black Hat hackers?

Criminals who break into computer networks with malicious intent for personal gain.

98
New cards

What defines Gray Hat hackers?

Hackers who look for vulnerabilities without permission but may report them for a fee.

99
New cards

What are White Hat hackers?

Ethical hackers who identify security flaws to recommend improvements.

100
New cards

What is Pretexting?

Pretending to be someone else to gain information.