Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

614 total results found

Configuration and Backups

CompTIA Network+

what if something goes wrong? Configuration management means identifying and documenting all the infrastructure and devices installed at a site. It's a systematic approach to ensuring that the desired state of an IT system is maintained throughout it's lifecyc...

Packet Capturing

CompTIA Network+

i need to plant a bug in the oval office Protocol analyzers, often called 'packet sniffers,' are useful hardware devices used to inspect traffic received by a host or passing over a network link. Software-based Sniffers These are software applications that ana...

Bandwidth Management

CompTIA Network+

I NEED MORE LANES ON THE INTERSTATE Latency and jitter are hard to control and predict due to the number of involved parties that influence. However, on local networks, delay is either caused by congestion or contention. Congestion When the network infrastruct...

Traffic Testing Tools

CompTIA Network+

i need my handy handy spy device How do I detect poor network performance? Throughput Testers Transfer a big file between two hosts. The time it takes to transfer said large file tells you how fast your network is. For example, if it takes half an hour to tran...

Attack Types

CompTIA Network+

ranged, mental, physical, etc. Fingerprinting and Footprinting The attacker wishes to list all the network devices/services on the internal network, usually to select a weak target to attack and exploit. Footprinting is for the general topology and configurati...

MAC Flooding

CompTIA Network+

i have the flipper zero to spam light changes at traffic lights While other on-path attacks like ARP poisoning target hosts, MAC flooding is used to attack a switch, aiming to exhaust the memory used to store the MAC address table. Remember, when a switch is o...

VLAN Hopping Attacks

CompTIA Network+

what am i a frog VLAN hopping is designed to send packets that escape the current VLAN. This is done by either double tagging or using a malicious switch to route packets and to perform inter-VLAN sniffing. This exploits the main feature of 802.1Q. Double Tagg...

Encryption

CompTIA Network+

keys. lots of keys. you have the two big boys of encryption. Encryption Algorithm A function that converts a human-readable plaintext into a ciphertext. The ciphertext can only be decrypted using a key linked to the initial encryption process. Cryptographic Ha...

Common Security Terminology

CompTIA Network+

911 hehehehehehehehehe fnuuy CIA and FBI i mean VTR Confidentiality, Integrity, and Availability (CIA) Confidentiality - certain information should only be known to certain people Integrity - data is stored and transferred as intended; all modifications are au...

DHCP Snooping

CompTIA Network+

i need a soviet grade wiretap for spying on the white house in the form of a trojan horse This was implemented as a feature on Cisco routers and switches to inspect the layer 2 Dynamic-Host-Configuration-Protocol traffic traversing a network for two very impor...

Network Federation

CompTIA Network+

what if people that aren't exactly employees need to access the company network This idea is called federation. While the company can manage it's own accounts easily enough, managing accounts for everybody else that might need to access specific parts of it ne...

Encryption Key Management

CompTIA Network+

The operational considerations for the various stages in the lifecycle of an encryption key or keypair. Key Generation Creates an asymmetric key pair or symmetric secret key of the required strength, using the chosen cipher. Storage Prevents unauthorized acces...

Authentication Providers

CompTIA Network+

oh yes we all need government-issued digital IDs that compromise all forms of privacy and are prone to leaks Authentication providers are the software architecture and code that underpins (whatever that means) the mechanism by which the user is authenticated b...

Access Control

CompTIA Network+

license and registration please Access Control Systems govern how subjects and principals interact with objects. Modern access control is implemented as an IAM system, which have four main parts: Identification: Creating an account or ID that uniquely represe...

Advanced VLAN Configuration

CompTIA Network+

i need a superhighway that destroys all the poor neighborhoods but instead it's a network ok so since VLANs need to be explicitly (logically) connected to each other even though they might be on the same physical interface we need to be able to connect switche...

Access Control Methods

CompTIA Network+

now how exactly should i go about ensuring that employee's can't see the 15 terabytes of data i've scraped from them over the years Authenticated users can be granted rights and permissions to access resources on a network. This is called authorization. How do...

IEEE 802.1X

CompTIA Network+

what if i just used a specific port and trusted everything on that 802.1X: Port-Based Network Access Control (NAC) 802.1X is a standard for encapsulating EAP communications over a LAN network to implement port-based authentication. It basically lets identity p...

Network Access Control

CompTIA Network+

you better be able to trust your network administrators (i.e. pay them well) Network Access Control is basically authenticating endpoints before they can fully connect to the network. We can do this using any type of port security mechanism. Disable Unneeded S...