- Network problems:
- Initialization vector attack
- Replay attack
- Virus infection:
- What's the best tool to use if virus is suspected of infecting network and
using large amounts of bw?
- Network sniffer
- Packet analyzer
- What's the best tool to use if virus is suspected of infecting network and
using large amounts of bw?
- Network hardening:
- Avoid using privileged accounts
- Track hardware and software for patch reqs
- Keep account roles separated to avoid conflicts of interest
- It's ok to save certs, pw's, and keys in the same protected vault
- Review incident preparation and management
- Preparation for incidents is a multifaceted process that includes which
tasks?
- Vulnerability scanning
- Penetration testing
- Preparation for incidents is a multifaceted process that includes which
tasks?
- Review how TCP closes connections
- Sends FIN
- Security:
- Review smurf attack
- Encryption:
- Review asymmetric encryption
- What are two examples of asymmetric encryption?
- Elliptic Curve Cryptography
- Rivest-Shamir-Adleman
- What are two examples of asymmetric encryption?
- Review asymmetric encryption
- Wireless:
- WPS is used for what purpose?
- Automatically configures a wireless device to connect to a WAP
- WPS is used for what purpose?
- Ethernet standards:
- Review what the letters mean at the end of the designation:
- 10GBaseSW: S stands for short-range and W stands for WAN
- 10GBaseSR: S stands for short-range and R means it works with existing Ethernet standards.
- Does L stand for long-range?
- 1000BaseSX:
- supports runs of up to 500 m over MMF.
- Doesn't support 10km runs.
- Remember S stands for short-range
- 1000BaseLX:
- Runs MMF and has maximum length of 550 meters
- What networking technology is also known as Fast Ethernet?
- 100Base_XY_
- Anything with 100 in it is good for Fast Ethernet
- Gigabit Ethernet standards
- 1000Base-CX
- uses copper cabling and is limited to 25 meters
- 1000Base-CX
- Review what the letters mean at the end of the designation:
- Port forwarding allows outside access to hosts on the LAN side of the NAT router.
- Fiber-optic:
- Review multi-modal distortion
- Protocol analyzers:
- Wireshark:
- Protocol analyzers can't generate packets and frames. Can only capture and display them.
- Wireshark:
Up to here reviewed * IP + Routing: - Subnetting: - Subnet masks are never sent out of a host, they're not part of the IP header. - Review subnet masks + Review IPv6 * Cabling + Coaxial - RG-58 impedence: 50 ohms - RG-8 impedence: 50 ohms * SNMP + Get, Response, Set, and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what? - PDU's - The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU). - Review SNMP - Review PDU * Review HA + Common techniques to acheive HA are? - Install RAID - Redundant Systems - Aggregate links