Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
What is X.25?
|
The first commercially successful connection oriented packet switching network where packets travel over virtual circuits.
|
|
What is Link Access Procedure Balanced?
|
For use in X.25 networks defines frame types and is capable of retransmitting, exchanging, and acknowledging frames as well as detecting out of sequence or missing frames
|
|
What is Frame Relay?
|
A high-performance WAN protocol that was originally developed for ISDN and is considered the successor to X.25/LAPB
|
|
At what layer of the OSI model does Frame Relay operate?
|
Data link
|
|
What is the maximum effective radius of a Switched Multimegabit Data Service network?
|
30 Miles
|
|
What is a Switched Multimegabit Data Service network use for?
|
to extend LAN like performance to a MAN or WAN
|
|
Describe an ATM network
|
High-bandwidth, low delay technology that uses both switching and multiplexing. It uses 53-byte fixed size cells instead of frames
|
|
What is a multiplexer?
|
It enables several signals to be sent over one physical
|
|
What are the private IP address ranges?
|
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 |
|
What are the two primary types of ISDN interfaces?
|
Basic Rate Interface and Primary Rate Interface
|
|
How many channels (up/down) comprise a Basic Rate Interface?
|
Two B & one D
|
|
How many channels (up/down) comprise a Primary Rate Interface?
|
1 Single D channel + 23/30 channels for voice and data
|
|
What layer does the Point to Point Protocol operate at?
|
Data Link
|
|
What is the main difference between Layer 2 and Layer 3 tunneling protocols
|
Layer 2 protocols use frames and Layer 3 protocols use headers
|
|
IPSEC can support multiple ______ but not multiple _________
|
simultaneous tunnels; multiple protocols
|
|
To create an IPSEC tunnel that provides source authentication and integrity without encryption which protocol would I enable?
|
AH
|
|
To create an IPSEC tunnel that provides authentication, integrity and encryption what protocol would I use?
|
ESP
|
|
What is the early de facto standard for dial up communications
|
SLIP
|
|
What succeeded SLIP?
|
PPP
|
|
What type of authentication does PPP use?
|
PAP, CHAP and MS-CHAP
|
|
How does CHAP protect against replay attacks?
|
It does not send the password in clear text an it uses an arbitrary challenge string for each authentication attempt
|
|
How does CHAP prevent against remote client impersonation?
|
By sending challenge strings at random intervals.
|
|
What RFC defines CHAP/PAP
|
RFC1334
|
|
What is one advantage of MS-CHAP V2 over regular MS-CHAP/CHAP?
|
Mutual authentication support
|
|
What extention to EAP allows for authentication using digital certificates?
|
EAP-TLS
|
|
It can be said that TACAS and RADIUS are "standards based"...what does that mean?
|
That they can interoperate with other systems of the same time.
|
|
Is RADIUS TCP or UDP?
|
UDP
|
|
Why is RADIUS not used for router-to-router authentication?
|
It does not provide support for two-way authentication
|
|
What does TACAS+ provide that TACAS does not provide?
|
two factor password authentication
the ability for a user to change thier password the capability for resynchronizing security tokens better audit trails |
|
RAID 0
|
Striping
|
|
RAID 1
|
Mirroring
|
|
RAID 2
|
Hamming Code Parity (bit-interleaved parity)
|
|
RAID 3
|
Byte Level Parity
|
|
RAID 4
|
Block Level Parity
|
|
RAID 5
|
Interleave Parity
|
|
What is te most common implementation of RAID
|
RAID 5
|
|
What is the difference between remote journaling and electronic journaling?
|
Electronic vaulting happens at pretimed intervals whereas remote journaling is real time
|
|
802.11a
|
54 Mbps in the 5GHZ range
|
|
802.11b
|
11 Mbps
|
|
802.11g
|
54 Mbps in 2.4 GHZ band
|
|
802.15
|
PANs
|
|
What is 802.1X
|
Port based authentication for security in wireless networks
|
|
What is LEAP
|
it dynamically creates WEP keys making WEP more secure.
|
|
What are the two different spread spectrum technologies in use in 2.4GHZ LANs
|
Direct-dequence spread spectrum(DSSS) and frequency hopping spread spectrum (FHSS)
|
|
How many non-overlapping channels are used in DSSS?
|
Typically 3
|
|
What are the FCC regulations for FHSS networks?
|
75 or more frequencies can be used with a maximum dwell time of 400ms
|
|
What are the five layers of WAP?
|
application, session, transaction, security and transport
|
|
What does the application layer of WAP consist of?
|
The wireless application environment (WAE), a microbrowser specification for internet access, wireless markup language, WMLScript
|
|
What does the Transport layer of the WAP consist of?
|
Wireless Datagram Protocol
|
|
What are the three classes of WTLS security?
|
Class 1: anonymous authentication
Class 2: Server Authentication Class 3: Two-way client and server authentication |