Networking Essentials: Key Concepts and Exam Answers
CIA Triad Security Information Principle
- Tokenization applies to confidentiality.
- Explanation: Tokenization is a substitution technique for data protection without encryption.
Troubleshooting Methods
- Substitution Method: Swap suspected faulty device with a good one to diagnose issues.
Cyber Threats
- Hardware failure: disk drive crashes
- Human error: inadvertent data entry error
- Utility interruption: water damage from sprinkler failure
- Software error: cross-site scripting or illegal server share
Advanced Persistent Threat (APT)
- Continuous attacks using sophisticated malware and espionage tactics to access networks.
Authentication Methods
- WPA, WPA3, WEP, WPA2 - differ in security standards and encryption levels.
Apple Security Features
- Gatekeeper: Ensures only authentic, digitally-signed software is installed.
Cyber Threats Causing Outages
- Utility interruption can lead to power outages.
Ransomware Attack
- Encrypts data, demands payment for decryption.
IPv6 Address
- Each group of four hexadecimal values represents 16 bits.
Network Design
- Fewest broadcast domains achieved by minimizing router usage.
DHCP and IP Addresses
- Initial DHCP requests are sent to broadcast addresses.
Multicast Transmission
- Single packet sent to a group, used for routing info exchange.
Email Phishing
- Hoax emails deceive users, causing disruption.
Biometric Identification
- Behavioral characteristic example: voice
Stateful Firewalls Limitations
- No Application Layer inspection, limited stateless protocol tracking.
Windows Utilities
- Event Viewer: logs user activities during critical issues.
CIA Information Security Triad
- Availability: ensures uninterrupted access to resources.
Twisted-Pair Cable Deployment
- Suitable for office workstation connections.
Static IP Address Assignments
- Should be used for servers, printers, gateways.
Host-Based Security Solutions
- Include firewalls, intrusion detection/prevention, and data loss prevention systems.
TCP/IP Model
- Internet Layer: Responsible for routing messages.
Data Encoding Technologies
- Copper cables use electrical pulses.
Switch Table Information
- Built using source MAC addresses from incoming frames.
Logical Address Addition
- Occurs at the network layer.
Reference vs Protocol Models
- Reference Model: Describes functions, not protocol specifics.
IPv4 Routing Table Codes
- C for directly connected routes.
Network Address Translation (NAT)
- Acts during specific conditions, e.g., when sending packets to remote sites.
Packet Forwarding in Switches
- Broadcast sent when destination MAC isn't in table.
Valid IPv6 Addresses
- Must follow rules for zero compression and omission.
DHCP Process
- New client sends DHCP request to broadcast address.
Network Troubleshooting
- Tracert: Identifies location of network issues.
TCP Header Fields
- Acknowledgment and Sequence Numbers: Confirm data receipt.
VoIP Data Encapsulation
- Encapsulated as IP packets.
Network Connectivity Issues
- Security features may block default gateway responses.
Cloud Computing
- Provides on-demand access to shared resources.
Quality of Service (QoS)
- Prioritizes voice/video data to ensure quality.
Cisco Hierarchical Network Design
- Core, Distribution, Access layers serve distinct functions.
Hypervisor Types
- Type 1 runs directly on hardware; Type 2 requires host OS.
Network Troubleshooting Commands
- Netstat: Displays active TCP connections.
ARP Table Entries
- Map Layer 3 addresses to Layer 2 MAC addresses.
Static Route Configuration
- Default gateway allows network device management over different networks.
Security: Firewall Types
- Stateful and stateless differ in how they manage packet data.
VLANs
- Isolate traffic, enforce specific network permissions.
IPv6 Multicast Addresses
- FF02::1 for all local link devices.
Social Engineering Tactics
- Intimidation used to manipulate victims.
Cybersecurity: Administrative Access Controls
- Involve authentication, authorization, and accounting.
Powerline Networking
- Connects network devices using existing electrical outlets.
Wireless Network Configuration
- Disable SSID broadcast to prevent network detection.
Tethering for Internet Access
- Smartphone can create hotspot for laptop connectivity.
IPv6 Prefixes and Addresses
- Understanding network and host components in addresses.
Network Layer Functions
- Facilitates cross-network data transmission with unique identifiers.
This summary captures the key points and concepts presented in the Networking Essentials course final exam answers, providing a concise reference of the covered topics.