Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

651 total results found

Fault Tolerance and Redundancy

CompTIA Network+

i need more numbers Mean Time Between Failures - expected lifetime of an asset. (total operation time divided by number of failures) Mean Time to Failure - expected lifetime of a non-repairable asset (total operational time divided by number of devices) Mean T...

Disaster Recovery Sites

CompTIA Network+

i need several popeyes locations in the hood in case one gets shut down A Disaster Recovery Plan (DRP) describes the steps an organization takes to restore a system or site to a working state. Disasters span anything from a power loss, minor component failure,...

Disaster Recovery Metrics

CompTIA Network+

i need a number that tells me how good we are at not imploding We love a number that directly states how reliable a service on the Internet is. Availability The percentage of time that the system is online over a set amount of time, usually a year. The oppo...

First Hop Redundancy

CompTIA Network+

having a single gate to your gated neighborhood is bad because what if they just lock you in one day In a full or partial mesh network topology, alternate routes can be found to bypass failed routers or faulty connections. However, end systems are typically co...

Configuration and Backups

CompTIA Network+

what if something goes wrong? Configuration management means identifying and documenting all the infrastructure and devices installed at a site. It's a systematic approach to ensuring that the desired state of an IT system is maintained throughout it's lifecyc...

Packet Capturing

CompTIA Network+

i need to plant a bug in the oval office Protocol analyzers, often called 'packet sniffers,' are useful hardware devices used to inspect traffic received by a host or passing over a network link. Software-based Sniffers These are software applications that ana...

Bandwidth Management

CompTIA Network+

I NEED MORE LANES ON THE INTERSTATE Latency and jitter are hard to control and predict due to the number of involved parties that influence. However, on local networks, delay is either caused by congestion or contention. Congestion When the network infrastruct...

Traffic Testing Tools

CompTIA Network+

i need my handy handy spy device How do I detect poor network performance? Throughput Testers Transfer a big file between two hosts. The time it takes to transfer said large file tells you how fast your network is. For example, if it takes half an hour to tran...

Attack Types

CompTIA Network+

ranged, mental, physical, etc. Fingerprinting and Footprinting The attacker wishes to list all the network devices/services on the internal network, usually to select a weak target to attack and exploit. Footprinting is for the general topology and configurati...

MAC Flooding

CompTIA Network+

i have the flipper zero to spam light changes at traffic lights While other on-path attacks like ARP poisoning target hosts, MAC flooding is used to attack a switch, aiming to exhaust the memory used to store the MAC address table. Remember, when a switch is o...

VLAN Hopping Attacks

CompTIA Network+

what am i a frog VLAN hopping is designed to send packets that escape the current VLAN. This is done by either double tagging or using a malicious switch to route packets and to perform inter-VLAN sniffing. This exploits the main feature of 802.1Q. Double Tagg...

Encryption

CompTIA Network+

keys. lots of keys. you have the two big boys of encryption. Encryption Algorithm A function that converts a human-readable plaintext into a ciphertext. The ciphertext can only be decrypted using a key linked to the initial encryption process. Cryptographic Ha...

Common Security Terminology

CompTIA Network+

911 hehehehehehehehehe fnuuy CIA and FBI i mean VTR Confidentiality, Integrity, and Availability (CIA) Confidentiality - certain information should only be known to certain people Integrity - data is stored and transferred as intended; all modifications are au...

DHCP Snooping

CompTIA Network+

i need a soviet grade wiretap for spying on the white house in the form of a trojan horse This was implemented as a feature on Cisco routers and switches to inspect the layer 2 Dynamic-Host-Configuration-Protocol traffic traversing a network for two very impor...

Network Federation

CompTIA Network+

what if people that aren't exactly employees need to access the company network This idea is called federation. While the company can manage it's own accounts easily enough, managing accounts for everybody else that might need to access specific parts of it ne...

Encryption Key Management

CompTIA Network+

The operational considerations for the various stages in the lifecycle of an encryption key or keypair. Key Generation Creates an asymmetric key pair or symmetric secret key of the required strength, using the chosen cipher. Storage Prevents unauthorized acces...

Authentication Providers

CompTIA Network+

oh yes we all need government-issued digital IDs that compromise all forms of privacy and are prone to leaks Authentication providers are the software architecture and code that underpins (whatever that means) the mechanism by which the user is authenticated b...

Access Control

CompTIA Network+

license and registration please Access Control Systems govern how subjects and principals interact with objects. Modern access control is implemented as an IAM system, which have four main parts: Identification: Creating an account or ID that uniquely represe...