Sunteți pe pagina 1din 2

RIP uses hop count

OSPF and EIGRP use bandwidth in their calculations


BGP uses a varity of options and is used for moving prefixes back an forth
TACACS+ uses port 49 and was made by cisco
hub and spoke doesnt directly connect 2 remote locations
File Transfer Protocol FTP is used to transfer files in a non secure fashion
Trivial File Transfer Protocol TFTP requires login, doesnt require credentials,
non secure
Secure Shell SSH used to securely conect to a host normally through terminal emu
lator
secture FTP SFTP provides FTP file transfer over SSH connection
Secure Copy SCP provides secure file transfer over SSH and offers a files origin
al data and time info
Logical Link Control LLC is like mac and is layer 2 of osi
HSRP and CARP are layer 3 redundancy mechanisms
serial cable when connecting through serial ports
cross over cable when going through routers
straight through when going through switches
Main Distribution Frames MDF is like cable racks, used in telecommunications, ma
nages wiring
Intermediate Distribution Frames IDF manages the wires in an MDF
Hosted PBX is a telephone system hosted by a service provider and not a company
Virtual PBX is a voip based telephone system hosted by a service provider
a smart jack is a network interface device NID that converts between framing for
mats and digital circuit
PPP is a common protocol found on dedicaed leased lines
T1 and T3 are leased lines
Gateways intelligently route msgs within a voicemail network
DOCSIS data over cable service interface specification needs to be the same as a
n ISPs
ATMs have a 48 byte payload
Media Termination Recommended Jack MTRJ has 2 fiber strands
F connector is used in cable tv connections
BNC can be used in some ethernet networks
DHCP order is discover, offer, request, acknowledge
BOOTP came before DHCP and offers less stuff
ARP address resolution protocol is used to resolve mac address corresponding to
a known IP add.
root domain is like .com, .gov, etc, the end of a FQDN
EDNS is extension mechanism DNS, its more secure and overcomes size limitations,
backwards compatable
start of authority SOA is a DNS record that shows contact information of an admi
n
canonical name CNAME allows multiple DNS records to map to the same IP address
native VLAN is the VLAN on an IEEE 802.1Q trunk that does not have tag bytes add
ed
ISDN is a circuit switched WAN type
base-E whatever is 40 km

base-L is 10 km
base-S is 300m
IBSS is no AP used, BSS is 1 AP used, ESS is more than 1 AP used
omnidirectional antenna sends equal power in all directions
unidirectional antenna focuses its power in a specific direction
yagi antenna is a type of directional antenna
sector antenna provides a pie shaped coverage area
isotropic antenna that sends equal power in all directions in a sphere and has a
gain of 0dbi
BAG'n the B and G have 2.4ghz, A and N have 5ghz. B and G also support DSSS
802.11n has 300ft range
802.11b and g have 150ft range
802.1X has highest security
marking is a QoS function that alters bits in a frame, cell, or packet
queueing is another name for congestive management in a QoS
voip has 150ms delay
sys logs
7 is debugging, 4 is warning, 1 is altert, 0 ic emergency
OTDR can be used to locate a fiber optic cable break
throughput tester can simulate heavy network load
SNMP agent runs on a managed device, like a server, router, or switch
SNMP trap is a message sent from a SNMP managed device the alerts of a signifiga
nt event occuring on the managed device
tunneling follows a secure communication between a private network and a public
network
TFA requires 2 authentication types from a user seeking admission to a network
ISAKMP is a secure session where IPsec sessions are negotiated
PKI uses digital certificates and a certificate authority CA
IDS sensor recieves copy of traffic being analyzed and communicate with a securi
ty appliance to prevent attack
RSSI is a measure of a wireless signals strength
PPDIOO is an example of asset management
Security Information and Event Manager SIEM gives real time security analysis in
formation
WIPS stops rogue APs and routers

S-ar putea să vă placă și