1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
802.1d
STP
802.1q
VLAN
FHRP
First Hop Redundancy Protocol
LACP
Link Aggregation Control Protocol, a network protocol that automatically combines several physical links to create a single logical link to increase bandwidth and provide redundancy.
IGP
Interior Gateway Protocol - OSPF, RIP, EIGRP
EGP
Exterior Gateway Protocol - BGP
MTTR
Mean Time to Repair
MTBF
Mean Time between Failures
RTO
Recovery Time Objective - Max time a business can be down for (how long it would take to install a backup)
RPO
Recovery Point Objective - How much data a business can lose, measured in time (i.e. loss of 4 hours of data)
MTD
Max Tolerable Downtime - Longest Period of time a business can be inoperable
OSI Layer 1
Physical
OSI Layer 2
Mac Address (Frame)
OSI Layer 3
IP Routing (Packet)
OSI Layer 4
TCP UDP (Transport) (Segments and Datagrams)
OSI Layer 5 6 7
DNS, DHCP, FTP (Session, Presentation, Application) (Data)
show interface
stats for network interface
show config
shows startup configuration for interface (i.e. DNS, tacacs+, STP, syslog, etc)
show route
displays routing table
show mac-address-table
shows what MAC is attached to the port
show arp
MAC and IP pairs
show vlan
shows what VLAN’s are attached to what interfaces
show power
POE settings per port
syslog level 0
Emergency
syslog level 1
Alert
syslog level 2
Critical
syslog level 3
Error
syslog level 4
Warning
syslog level 5
Notice
syslog level 6
information
syslog level 7
debugging
VIP
Virtual IP, Shared IP address for accessing services
Teredo Tunneling
Tunnels IPv6 devices in an IPv4 Network
NAT Gateway
allows resources within a Virtual Private Cloud (VPC) to access the internet without being directly exposed to the internet
jump box/host/server
hardened and monitored device that spans two dissimilar security zones and provides a controlled means of access between them
SAML
Security Assertion Markup Language - Exchange Auth data between parties for SSO
SOAP
Simple Object Access Protocol - Used by API’s to communicate, higher security than REST
REST
Representational State Transfer - Straightforward communication for API’s
VXLAN
Virtual Extensible LAN - Far more possible LAN’s due to VNI (VXLAN network Identifier)
Netflow Analyzer
Monitors network traffic flow data
IP Scanner
Finds every IP connected to the network
dig
query dns for info
SIP
Session Initiation Protocol, Porto 5060/5061, initiates and maintains voice, video, and messaging sessions.
IPsec
Auth and Encryption for packets between 2 computers over an IP Network
CDP and LLDP
Discovery Protocols
SD-WAN
Software Defined WAN
EUI-64
Automatic IPv6 Config
POTS
Plain old telephone server (2 Pins)
Defense in Depth
Layered CyberSec Security Measures to Protect Info
MS-CHAPv2
Microsoft Authentication Protocol for NAC
Network Security Lists
Traffic Flow and Security Control for Cloud resources
Split Horizon
Blocks routing loops at layer 3
BPDU
Bridge Protocol Data Unit - Used by STP to stop switching loops
Visual Fault Locator
Locates cracks, bends, etc in fiber cables
Wet Pipe
Most Basic and common, releases water when fire alarms go off. Avoid use in data centers for obvious reasons
Pre-action
Minimizes risk of accidental releases. Better version of wet pipe, 2 sensors must be tripped for water to be released
Special Suppression System
Clean agent instead of water (Halo-carbon or inert gas), suffocates people.
PAP
Password Authentication Protocol (Old and Weak Auth)
Stateless
Preconfigured Parameters for Firewall
Stateful
Intelligent Firewall, makes decisions based on learned parameters