Networking Essentials Course Summary

May 22, 2025

Networking Essentials: Key Concepts and Exam Answers

CIA Triad Security Information Principle

  • Tokenization applies to confidentiality.
  • Explanation: Tokenization is a substitution technique for data protection without encryption.

Troubleshooting Methods

  • Substitution Method: Swap suspected faulty device with a good one to diagnose issues.

Cyber Threats

  • Hardware failure: disk drive crashes
  • Human error: inadvertent data entry error
  • Utility interruption: water damage from sprinkler failure
  • Software error: cross-site scripting or illegal server share

Advanced Persistent Threat (APT)

  • Continuous attacks using sophisticated malware and espionage tactics to access networks.

Authentication Methods

  • WPA, WPA3, WEP, WPA2 - differ in security standards and encryption levels.

Apple Security Features

  • Gatekeeper: Ensures only authentic, digitally-signed software is installed.

Cyber Threats Causing Outages

  • Utility interruption can lead to power outages.

Ransomware Attack

  • Encrypts data, demands payment for decryption.

IPv6 Address

  • Each group of four hexadecimal values represents 16 bits.

Network Design

  • Fewest broadcast domains achieved by minimizing router usage.

DHCP and IP Addresses

  • Initial DHCP requests are sent to broadcast addresses.

Multicast Transmission

  • Single packet sent to a group, used for routing info exchange.

Email Phishing

  • Hoax emails deceive users, causing disruption.

Biometric Identification

  • Behavioral characteristic example: voice

Stateful Firewalls Limitations

  • No Application Layer inspection, limited stateless protocol tracking.

Windows Utilities

  • Event Viewer: logs user activities during critical issues.

CIA Information Security Triad

  • Availability: ensures uninterrupted access to resources.

Twisted-Pair Cable Deployment

  • Suitable for office workstation connections.

Static IP Address Assignments

  • Should be used for servers, printers, gateways.

Host-Based Security Solutions

  • Include firewalls, intrusion detection/prevention, and data loss prevention systems.

TCP/IP Model

  • Internet Layer: Responsible for routing messages.

Data Encoding Technologies

  • Copper cables use electrical pulses.

Switch Table Information

  • Built using source MAC addresses from incoming frames.

Logical Address Addition

  • Occurs at the network layer.

Reference vs Protocol Models

  • Reference Model: Describes functions, not protocol specifics.

IPv4 Routing Table Codes

  • C for directly connected routes.

Network Address Translation (NAT)

  • Acts during specific conditions, e.g., when sending packets to remote sites.

Packet Forwarding in Switches

  • Broadcast sent when destination MAC isn't in table.

Valid IPv6 Addresses

  • Must follow rules for zero compression and omission.

DHCP Process

  • New client sends DHCP request to broadcast address.

Network Troubleshooting

  • Tracert: Identifies location of network issues.

TCP Header Fields

  • Acknowledgment and Sequence Numbers: Confirm data receipt.

VoIP Data Encapsulation

  • Encapsulated as IP packets.

Network Connectivity Issues

  • Security features may block default gateway responses.

Cloud Computing

  • Provides on-demand access to shared resources.

Quality of Service (QoS)

  • Prioritizes voice/video data to ensure quality.

Cisco Hierarchical Network Design

  • Core, Distribution, Access layers serve distinct functions.

Hypervisor Types

  • Type 1 runs directly on hardware; Type 2 requires host OS.

Network Troubleshooting Commands

  • Netstat: Displays active TCP connections.

ARP Table Entries

  • Map Layer 3 addresses to Layer 2 MAC addresses.

Static Route Configuration

  • Default gateway allows network device management over different networks.

Security: Firewall Types

  • Stateful and stateless differ in how they manage packet data.

VLANs

  • Isolate traffic, enforce specific network permissions.

IPv6 Multicast Addresses

  • FF02::1 for all local link devices.

Social Engineering Tactics

  • Intimidation used to manipulate victims.

Cybersecurity: Administrative Access Controls

  • Involve authentication, authorization, and accounting.

Powerline Networking

  • Connects network devices using existing electrical outlets.

Wireless Network Configuration

  • Disable SSID broadcast to prevent network detection.

Tethering for Internet Access

  • Smartphone can create hotspot for laptop connectivity.

IPv6 Prefixes and Addresses

  • Understanding network and host components in addresses.

Network Layer Functions

  • Facilitates cross-network data transmission with unique identifiers.

This summary captures the key points and concepts presented in the Networking Essentials course final exam answers, providing a concise reference of the covered topics.