CS/IS 190 Final Review Final Exam: Wednesday, Oct. 21
Dec 13, 2015
Final Overview
• Chapters 12 through 21• Multiple Choice• Similar to questions at the end of each chapter
and in the homeworks• 50 questions• You will have the full class time to complete
Chapter 12
• Client / Server• Peer to Peer (P2P)• Virtual Private Network (VPN)– Point-to-Point Tunneling Protocol (PPTP)– Routing and Remote Access Service (RRAS)
• Layer 2 Tunneling Protocol (L2TP)• Virtual Local Area Networks (VLANs)– Trunking : 802.1Q trunk standard– Static VLAN vs. Dynamic VLAN
Chapter 12
• Multilayer Switches• DNS Load Balancing• Quality of Service (QoS)• Traffic shaping• Intrusion detection system (IDS)• Intrusion prevention system (IPS)• Port Mirroring• Proxy Servers
Chapter 13
• IPV6• 128 Bits• How to write addresses and how to shorten
addresses• 8 groups of four hexadecimal characters• Leading zeros can be dropped from any group• Use double colon to show groups of zeroes• Link-Local Address (always starts with FE80:)
Chapter 13
• Subnet masks– No subnet is ever longer than /64
• Unicast• Multicast• Anycast• Global Unicast Address (Global Address)– Gets from router– Required to use the Internet
• Aggregation
Chapter 14
• Remote Connectivity• Plain Old Telephone Service (POTS)• Multiplexers• Frequency Division Multiplexing (FDM)• DS0 (64 Kbps)• T1 Line– 24 DS0 channels– 1.544 Mbps
Chapter 14
• Fiber Carriers• SONET and OC• OC-1– 51.85 Mbps
• The rest of the OC multiply the number to get the speed :
• OC-3 is 51.85 * 3 = 155.52 Mbps
Chapter 14
• Packet Switching– Frame Relay– Asynchronous Transfer Mode (ATM)– Public Switched Telephone Network (PSTN)– Modems
• Convert analog signals to digital and vice versa• Universal Asynchronous Receiver/Transmitter (UART)• Baud vs. Bits Per second
– ISDN• Basic Rate Interface (BRI) = 128 Kbps• Primary Rate Interface (PRI) = 1.544 Mbps (T1 Line)
Chapter 14
• DSL– SDSL– ADSL– VDSL
• Cable Internet (DOCSIS protocol)• Satellite• Wireless• Fiber Optics• Powerline
Chapter 14
• Remote Access– Dial – up– Private Dial-up– VPNs– Dedicated Connections– Remote Terminals, Remote Desktop– Voice over IP (VoIP)
Chapter 15
• Wireless Networking• Modes:– Ad Hoc Mode (Peer to Peer mode)– Infrastructure Mode
• Link state vs. Signal strength• Channels– 14 channels, only 11 allowed in U.S.A. [for the 2.4
GHz standards]• CSMA/CA
Chapter 15
• 802.11b• 802.11a• 802.11g• 802.11n• 802.11ac• Security– MAC address filtering– Wireless authentication
• 802.1X• RADIUS
Chapter 15
• Data Encryption– Wired Equivalent Privacy (WEP) [not secure]– Wi-Fi Protected Access (WPA) [not secure]– WPA2
• Uses AES (Advanced Encryption Standard)
• Power Over Ethernet• Implementing Wi-Fi
– Placing access points– Configuration– Extending the Network
• Adding a WAP• Wireless Bridge
Chapter 16• Virtualization• Hypervisor• Virtual Machine Manager (VMM)• Guest Operating System• Emulation vs. Virtualization• Why?
– The VM that is shut down is a file or folder– Power Saving– Hardware Consolidation– System Recovery– System Duplication– Research
Chapter 16
• Virtual Switches• Virtual NICs• Virtual PBXs• Network as a Service (NaaS)• Storage Area Networks (SANs)• Network Attached Storage (NAS)
Chapter 17
• Building a real-world network– List of requirements– Device types/requirements– Environment limitations– Equipment limitations– Compatibility requirements– Wired/wireless considerations– Security considerations
Chapter 17• Equipment Room
– Power converters• Change AC to DC
• Electrical Limits• VLANs• IP address scheme• External Connections
– Gateway router– Choose ISP
• Security• Network Segmentation
– Layer 1 – Air gap– Layer 2 – VLANs– Layer 3 – subnets– Above layer 3
Chapter 18
• Managing Risk• Security Policies– Acceptable Use Policy– Network Access Policy
• Change management• Patching and Updates• Points of Failure– Avoid single point of failure– High Availability
Chapter 18
• Security Preparedness– Vulnerability Scanning– Penetration Testing (pentest)
• Contingency Planning– Disaster Recovery– Business Continuity• Cold site• Warm site• Hot site
Chapter 18
• Emergency Procedures– Building Layout– Fire escape plan– Safety/emergency exits– Fail open / Fail close– Emergency alert system
Chapter 19
• Protecting your Network• Spoofing• Packet / Protocol Abuse• ARP cache poisoning• Denial of Service (DoS)• Distributed DoS (DDos)• Man in the Middle
Chapter 19
• Social Engineering• Phishing• Unnecessary Running Services• Unpatched / Legacy Systems• Unencrypted Channels• Physical Security• Network Security– Controlling User Accounts
• Principle of least privelege
Chapter 19
• Firewalls– Network based– Host Based– Stateful vs. Stateless
• Access Control Lists (ACLs)• Network Zones– Demilitarized Zone (DMZ)
• Honeypots and Honeynets
Chapter 20
• Network Monitoring• SNMP• Packet Sniffers / Protocol Analyzers– Wireshark– Run in NIC in promiscuous mode
• Performance Monitors– Windows Performance Monitor (PerfMon)– Linux’s syslog
Chapter 21• Network Troubleshooting• Hardware Tools
– Cable Testers– TDR– OTDR– Certifiers– Voltage Recorders / Temp. Monitors– Protocol Analyzer – Cable Strippers / Snips– Multimeters– Toners– Butt Sets– Punchdown tools
Chapter 21
• Software Tools• Traceroute• Ipconfig / Ifconfig• Ping, pathping, and ARP Ping• NSLookup• Hostname• My Traceroute (MTR)• Route (Route Print or netstat -r)• Packet Sniffers• Port Scanners• Throughput testers
Chapter 21
• Troubleshooting Process:1. Identify the problem2. Establish a theory of probable cause.3. Test the theory to determine cause.4. Establish a plan of action to resolve the problem and identify potential effects.5. Implement the solution and escalate as necessary.6. Verify full system functionality and, if applicable, implement preventative measures.9. Document findings, actions, and outcomes.