1001: Networking Flashcards

1
Q

What layer does a hub operate at?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer do bridges operate at?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary advantages of a switch over a hub?

A

Increased bandwidth
Increased performance by reducing collisions
Increased security by managing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some primary disadvantages of switches?

A

More expensive
Can be difficult to troubleshoot
Device MACs can be spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What layer do repeaters and range extenders work in?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the standard for Power over Ethernet connections?

A

IEEE 802.3bt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of filtering can a hardware firewall provide over a software based firewall?

A

Both support port filtering

Hardware firewall supports IP filtering as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cloud-based network controller?

A

A software based controller used to make switching and routing decisions, devices simply perform the forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the maximum ranges for all Bluetooth Classes?

A

Class 3 - <10 meters
Class 2 - 10 meters
Class 1 - 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to connect your laptop to the company network but the SSID does not show up in the network list? What should you do?

A

Manually create the wireless network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your PC has an IP of 169.254.10.24. What type of IP address is this?

A

APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the maximum speed and length of Cat 5 cable?

A

100 Mbps

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the maximum speed and length of Cat 5e cable?

A
1000 Mbps (1 Gbps)
100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the maximum speed and length of Cat 6 cable?

A

10 Gbps

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary way for a firewall to filter traffic?

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between an active and passive hub?

A

Passive - simply passes signals along to all ports

Active - regenerates signal, has ability to buffer signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a cable or DSL modem?

A

Places traffic on the ISPs network to forward to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a POE injector?

A

A device that provides power over Ethernet when the switch does not support it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What connector does a DSL line use from the modem to the jack to the ISP?

A

RJ-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the criteria called that are used to manage traffic allowed into a network through a firewall?

A

Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the term used to describe a firewall port that only opens/turns on when it is needed?

A

Port Triggering

22
Q

What does UPnP stand for? What is a big issue with UPnP devices?

A

Universal Plug and Play - allows computers, printers, devices to be easily discoverable

Poses large security risk

23
Q

What is the primary issue with WEP wireless security?

A

Encryption algorithms are easily cracked, less than 5 mins

24
Q

WPA uses what technology standard? What is the difference between WPA and WPA2?

A

802.11i

WPA only uses some of 802.11i, WPA2 uses all

25
Q

What is TKIP (temporal key integrity protocol) and how does it work?

A

Used in WPA security. Scrambles encryption keys using hashing algorithm

26
Q

WPA2 uses what in place of TKIP?

A

CCMP

27
Q

CCMP uses what encryption method?

A

AES (advanced encryption security)

28
Q

What numbers can be assigned to 2.4 GHz wireless channels? What are the most commonly used wireless channel numbers in the US?

A

1 thru 11

1, 6, and 11

29
Q

What IEEE wireless standards operate in the 2.4 GHz frequency spectrum?

A
  1. 11b
  2. 11g
  3. 11n
30
Q

What IEEE wireless standards operate in the 5 GHz frequency spectrum?

A
  1. 11a
  2. 11n
  3. 11ac
31
Q

What is the speed and distance of the 802.11a and 802.11g protocols?

A

54 Mbps

115 feet and 125 feet respectively

32
Q

What is the speed and distance of the 802.11b protocol?

A

11 Mbps

115 feet

33
Q

What is the speed and distance of the 802.11n protocol?

A

600 Mbps

380 feet

34
Q

What is the speed and distance of the 802.11ac protocol?

A

6.9 Gbps

115 feet

35
Q

What are the two main types of RFID systems and how do they differ?

A

Active Reader/Passive Tag (ARPT) - reader xmits signals and receives replies from passive tags

Active reader/active tag (ARAT) - tags are awoken with signals from active reader

36
Q

Zigbee is designed for simple PAN networks (short range, low rate wireless data xfer). What is the IEEE standard for Zigbee, and what are the data transmission rates?

A

802.15.4

250 kbps

37
Q

What frequency range does Z-Wave operate at, and what is it’s open-air operating range?

A

800-900 MHz
Outdoor - 300 ft
Indoor - 80+ ft

38
Q

What is the max data rate of 3G, 4G, and 5G cellular technologies?

A

3G - 2 Mbps
4G - 1 Gbps
5G - 100 Gbps

39
Q

What is Unified Thread Management? (UTM)

A

One device performing multiple security functions (firewall, antivirus, VPN, content filtering, etc.)

40
Q

What is an IDS, and how does it classify threats?

A

Intrusion detection system - identifies threats from inside and outside the network

Classified by network or host-based

41
Q

What is the difference between an IDS and IPS?

A

IDS detects threats

IPS detects threats and takes steps to neutralize the threat

42
Q

What is the device called that is used to aggregate VPN connections?

A

VPN concentrator

43
Q

What two protocols are mandatory for VPN operation?

A

LAN Protocol

Remote access or line protocol

44
Q

Break down the Ethernet network type of 100BaseT.

A

100 - speed of network (Mbps)
Base - Technology used (baseband or broadband)
T - Twisted pair cabling

45
Q

What is a WMN network?

A

Ad-hoc wireless LAN, uses a mesh of routers and devices to create fault tolerance

46
Q

What three tools are always included in a multimeter?

A

Voltmeter, ohmeter, and ammeter (voltage, resistance, and current respectively)

47
Q

What are the purpose of the toner and probe in a tone generator?

A

Toner - sends tone through a wire to other end of cable

Probe - contacted to individual wires on the other end until a signal or tone is emitted

48
Q

What is the purpose of a loopback plug (also called wrap plugs)?

A

Takes the signal going out and echos it back. Used to test ports for functionality

49
Q

What is the first octet range of class B private ipv4 addresses?

A

128-191

50
Q

What is the first octet range of class C private ipv4 addresses?

A

192-223

51
Q

What is the first octet range of class A private ipv4 addresses?

A

1-126

52
Q

Which technology would be the best choice for authenticating wireless users to a RADIUS server?

A

802.11X