Final Exam: Wednesday, October 18 CS/IS 190 Final Review Final Exam: Wednesday, October 18
Final Overview Chapters 12 through 21 Multiple Choice Similar to questions at the end of each chapter and in the homeworks 50 questions You will have the full class time to complete
Chapter 12 Client / Server Peer to Peer (P2P) Virtual Private Network (VPN) Point-to-Point Tunneling Protocol (PPTP) Routing and Remote Access Service (RRAS) Layer 2 Tunneling Protocol (L2TP) Virtual Local Area Networks (VLANs) Trunking : 802.1Q trunk standard Static VLAN vs. Dynamic VLAN
Chapter 12 Multilayer Switches DNS Load Balancing Quality of Service (QoS) Traffic shaping Intrusion detection system (IDS) Intrusion prevention system (IPS) Port Mirroring Proxy Servers
Chapter 13 IPV6 128 Bits How to write addresses and how to shorten addresses 8 groups of four hexadecimal characters Leading zeros can be dropped from any group Use double colon to show groups of zeroes Link-Local Address (always starts with FE80:)
Chapter 13 Subnet masks Unicast Multicast Anycast No subnet is ever longer than /64 Unicast Multicast Anycast Global Unicast Address (Global Address) Gets from router Required to use the Internet Aggregation
Chapter 13 DHCP in IPv6 Using tunnels for IPv6 Stateful Stateless Tunnel Broker
Chapter 14 Remote Connectivity Plain Old Telephone Service (POTS) Multiplexers Frequency Division Multiplexing (FDM) DS0 (64 Kbps) T1 Line 24 DS0 channels 1.544 Mbps
Chapter 14 T3 Line About 43 Mbps 672 DS0 channels CSU/DSU
Chapter 14 Fiber Carriers SONET and OC OC-1 51.85 Mbps The rest of the OC multiply the number to get the speed : OC-3 is 51.85 * 3 = 155.52 Mbps
Chapter 14 Packet Switching Frame Relay Asynchronous Transfer Mode (ATM) Public Switched Telephone Network (PSTN) Modems Convert analog signals to digital and vice versa Universal Asynchronous Receiver/Transmitter (UART) Baud vs. Bits Per second ISDN Basic Rate Interface (BRI) = 128 Kbps Primary Rate Interface (PRI) = 1.544 Mbps (T1 Line)
Chapter 14 DSL Cable Internet (DOCSIS protocol) Satellite Wireless SDSL ADSL VDSL Cable Internet (DOCSIS protocol) Satellite Wireless Fiber Optics Powerline
Chapter 14 Remote Access Dial – up Private Dial-up VPNs Dedicated Connections Remote Terminals, Remote Desktop Voice over IP (VoIP)
Chapter 15 Wireless Networking Modes: Link state vs. Signal strength Ad Hoc Mode (Peer to Peer mode) Infrastructure Mode Link state vs. Signal strength Channels 14 channels, only 11 allowed in U.S.A. [for the 2.4 GHz standards] CSMA/CA
Chapter 15 802.11b 802.11a 802.11g 802.11n 802.11ac Security MAC address filtering Wireless authentication 802.1X RADIUS
Chapter 15 Data Encryption Power Over Ethernet Implementing Wi-Fi Wired Equivalent Privacy (WEP) [not secure] Wi-Fi Protected Access (WPA) [not secure] WPA2 Uses AES (Advanced Encryption Standard) Power Over Ethernet Implementing Wi-Fi Placing access points Configuration Extending the Network Adding a WAP Wireless Bridge
Chapter 16 Virtualization Hypervisor Virtual Machine Manager (VMM) Guest Operating System Emulation vs. Virtualization Why? The VM that is shut down is a file or folder Power Saving Hardware Consolidation System Recovery System Duplication Research
Chapter 16 Virtual Switches Virtual NICs Virtual PBXs Network as a Service (NaaS) Storage Area Networks (SANs) Network Attached Storage (NAS)
Chapter 17 Building a real-world network List of requirements Device types/requirements Environment limitations Equipment limitations Compatibility requirements Wired/wireless considerations Security considerations
Chapter 17 Equipment Room Electrical Limits VLANs IP address scheme Power converters Change AC to DC Electrical Limits VLANs IP address scheme External Connections Gateway router Choose ISP Security Network Segmentation Layer 1 – Air gap Layer 2 – VLANs Layer 3 – subnets Above layer 3
Chapter 18 Managing Risk Security Policies Change management Acceptable Use Policy Network Access Policy Change management Patching and Updates Points of Failure Avoid single point of failure High Availability
Chapter 18 Security Preparedness Contingency Planning Vulnerability Scanning Penetration Testing (pentest) Contingency Planning Disaster Recovery Business Continuity Cold site Warm site Hot site
Chapter 18 Emergency Procedures Building Layout Fire escape plan Safety/emergency exits Fail open / Fail close Emergency alert system
Chapter 19 Protecting your Network Spoofing Packet / Protocol Abuse ARP cache poisoning Denial of Service (DoS) Distributed DoS (DDos) Man in the Middle
Chapter 19 Malware Virus Worm Macro Trojan Rootkit Adware/Spyware
Chapter 19 Social Engineering Phishing Unnecessary Running Services Unpatched / Legacy Systems Unencrypted Channels Physical Security Network Security Controlling User Accounts Principle of least privelege
Chapter 19 Firewalls Access Control Lists (ACLs) Network Zones Network based Host Based Stateful vs. Stateless Access Control Lists (ACLs) Network Zones Demilitarized Zone (DMZ) Honeypots and Honeynets
Chapter 20 Network Monitoring SNMP Packet Sniffers / Protocol Analyzers Wireshark Run in NIC in promiscuous mode Performance Monitors Windows Performance Monitor (PerfMon) Linux’s syslog
Chapter 21 Network Troubleshooting Hardware Tools Cable Testers TDR OTDR Certifiers Voltage Recorders / Temp. Monitors Protocol Analyzer Cable Strippers / Snips Multimeters Toners Butt Sets Punchdown tools
Chapter 21 Software Tools Traceroute Ipconfig / Ifconfig Ping, pathping, and ARP Ping NSLookup Hostname My Traceroute (MTR) Route (Route Print or netstat -r) Packet Sniffers Port Scanners Throughput testers
Chapter 21 Troubleshooting Process: 1. Identify the problem 2. Establish a theory of probable cause. 3. Test the theory to determine cause. 4. Establish a plan of action to resolve the problem and identify potential effects. 5. Implement the solution and escalate as necessary. 6. Verify full system functionality and, if applicable, implement preventative measures. 9. Document findings, actions, and outcomes.
Final Exam Bring a #2 pencil and eraser. Mr. Hodges will supply the scantron form. Closed book, closed notes, closed computer Focus on items which were discussed in class 5 or 6 Extra Credit Questions which may be scenario-based like the questions seen on the CompTIA Network+ Exam.