Presentation is loading. Please wait.

Presentation is loading. Please wait.

Final Exam: Wednesday, October 18

Similar presentations


Presentation on theme: "Final Exam: Wednesday, October 18"— Presentation transcript:

1 Final Exam: Wednesday, October 18
CS/IS 190 Final Review Final Exam: Wednesday, October 18

2 Final Overview Chapters 12 through 21 Multiple Choice
Similar to questions at the end of each chapter and in the homeworks 50 questions You will have the full class time to complete

3 Chapter 12 Client / Server Peer to Peer (P2P)
Virtual Private Network (VPN) Point-to-Point Tunneling Protocol (PPTP) Routing and Remote Access Service (RRAS) Layer 2 Tunneling Protocol (L2TP) Virtual Local Area Networks (VLANs) Trunking : Q trunk standard Static VLAN vs. Dynamic VLAN

4 Chapter 12 Multilayer Switches DNS Load Balancing
Quality of Service (QoS) Traffic shaping Intrusion detection system (IDS) Intrusion prevention system (IPS) Port Mirroring Proxy Servers

5 Chapter 13 IPV6 128 Bits How to write addresses and how to shorten addresses 8 groups of four hexadecimal characters Leading zeros can be dropped from any group Use double colon to show groups of zeroes Link-Local Address (always starts with FE80:)

6 Chapter 13 Subnet masks Unicast Multicast Anycast
No subnet is ever longer than /64 Unicast Multicast Anycast Global Unicast Address (Global Address) Gets from router Required to use the Internet Aggregation

7 Chapter 13 DHCP in IPv6 Using tunnels for IPv6 Stateful Stateless
Tunnel Broker

8 Chapter 14 Remote Connectivity Plain Old Telephone Service (POTS)
Multiplexers Frequency Division Multiplexing (FDM) DS0 (64 Kbps) T1 Line 24 DS0 channels 1.544 Mbps

9 Chapter 14 T3 Line About 43 Mbps 672 DS0 channels CSU/DSU

10 Chapter 14 Fiber Carriers SONET and OC OC-1
51.85 Mbps The rest of the OC multiply the number to get the speed : OC-3 is * 3 = Mbps

11 Chapter 14 Packet Switching Frame Relay
Asynchronous Transfer Mode (ATM) Public Switched Telephone Network (PSTN) Modems Convert analog signals to digital and vice versa Universal Asynchronous Receiver/Transmitter (UART) Baud vs. Bits Per second ISDN Basic Rate Interface (BRI) = 128 Kbps Primary Rate Interface (PRI) = Mbps (T1 Line)

12 Chapter 14 DSL Cable Internet (DOCSIS protocol) Satellite Wireless
SDSL ADSL VDSL Cable Internet (DOCSIS protocol) Satellite Wireless Fiber Optics Powerline

13 Chapter 14 Remote Access Dial – up Private Dial-up VPNs
Dedicated Connections Remote Terminals, Remote Desktop Voice over IP (VoIP)

14 Chapter 15 Wireless Networking Modes: Link state vs. Signal strength
Ad Hoc Mode (Peer to Peer mode) Infrastructure Mode Link state vs. Signal strength Channels 14 channels, only 11 allowed in U.S.A. [for the 2.4 GHz standards] CSMA/CA

15 Chapter 15 802.11b 802.11a 802.11g 802.11n 802.11ac Security
MAC address filtering Wireless authentication 802.1X RADIUS

16 Chapter 15 Data Encryption Power Over Ethernet Implementing Wi-Fi
Wired Equivalent Privacy (WEP) [not secure] Wi-Fi Protected Access (WPA) [not secure] WPA2 Uses AES (Advanced Encryption Standard) Power Over Ethernet Implementing Wi-Fi Placing access points Configuration Extending the Network Adding a WAP Wireless Bridge

17 Chapter 16 Virtualization Hypervisor Virtual Machine Manager (VMM)
Guest Operating System Emulation vs. Virtualization Why? The VM that is shut down is a file or folder Power Saving Hardware Consolidation System Recovery System Duplication Research

18 Chapter 16 Virtual Switches Virtual NICs Virtual PBXs
Network as a Service (NaaS) Storage Area Networks (SANs) Network Attached Storage (NAS)

19 Chapter 17 Building a real-world network List of requirements
Device types/requirements Environment limitations Equipment limitations Compatibility requirements Wired/wireless considerations Security considerations

20 Chapter 17 Equipment Room Electrical Limits VLANs IP address scheme
Power converters Change AC to DC Electrical Limits VLANs IP address scheme External Connections Gateway router Choose ISP Security Network Segmentation Layer 1 – Air gap Layer 2 – VLANs Layer 3 – subnets Above layer 3

21 Chapter 18 Managing Risk Security Policies Change management
Acceptable Use Policy Network Access Policy Change management Patching and Updates Points of Failure Avoid single point of failure High Availability

22 Chapter 18 Security Preparedness Contingency Planning
Vulnerability Scanning Penetration Testing (pentest) Contingency Planning Disaster Recovery Business Continuity Cold site Warm site Hot site

23 Chapter 18 Emergency Procedures Building Layout Fire escape plan
Safety/emergency exits Fail open / Fail close Emergency alert system

24 Chapter 19 Protecting your Network Spoofing Packet / Protocol Abuse
ARP cache poisoning Denial of Service (DoS) Distributed DoS (DDos) Man in the Middle

25 Chapter 19 Malware Virus Worm Macro Trojan Rootkit Adware/Spyware

26 Chapter 19 Social Engineering Phishing Unnecessary Running Services
Unpatched / Legacy Systems Unencrypted Channels Physical Security Network Security Controlling User Accounts Principle of least privelege

27 Chapter 19 Firewalls Access Control Lists (ACLs) Network Zones
Network based Host Based Stateful vs. Stateless Access Control Lists (ACLs) Network Zones Demilitarized Zone (DMZ) Honeypots and Honeynets

28 Chapter 20 Network Monitoring SNMP
Packet Sniffers / Protocol Analyzers Wireshark Run in NIC in promiscuous mode Performance Monitors Windows Performance Monitor (PerfMon) Linux’s syslog

29 Chapter 21 Network Troubleshooting Hardware Tools Cable Testers TDR
OTDR Certifiers Voltage Recorders / Temp. Monitors Protocol Analyzer Cable Strippers / Snips Multimeters Toners Butt Sets Punchdown tools

30 Chapter 21 Software Tools Traceroute Ipconfig / Ifconfig
Ping, pathping, and ARP Ping NSLookup Hostname My Traceroute (MTR) Route (Route Print or netstat -r) Packet Sniffers Port Scanners Throughput testers

31 Chapter 21 Troubleshooting Process: 1. Identify the problem
2. Establish a theory of probable cause. 3. Test the theory to determine cause. 4. Establish a plan of action to resolve the problem and identify potential effects. 5. Implement the solution and escalate as necessary. 6. Verify full system functionality and, if applicable, implement preventative measures. 9. Document findings, actions, and outcomes.

32 Final Exam Bring a #2 pencil and eraser.
Mr. Hodges will supply the scantron form. Closed book, closed notes, closed computer Focus on items which were discussed in class 5 or 6 Extra Credit Questions which may be scenario-based like the questions seen on the CompTIA Network+ Exam.


Download ppt "Final Exam: Wednesday, October 18"

Similar presentations


Ads by Google