1001: Networking Flashcards

1
Q

What layer does a hub operate at?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What layer do bridges operate at?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the primary advantages of a switch over a hub?

A

Increased bandwidth
Increased performance by reducing collisions
Increased security by managing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some primary disadvantages of switches?

A

More expensive
Can be difficult to troubleshoot
Device MACs can be spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What layer do repeaters and range extenders work in?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the standard for Power over Ethernet connections?

A

IEEE 802.3bt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What kind of filtering can a hardware firewall provide over a software based firewall?

A

Both support port filtering

Hardware firewall supports IP filtering as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cloud-based network controller?

A

A software based controller used to make switching and routing decisions, devices simply perform the forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the maximum ranges for all Bluetooth Classes?

A

Class 3 - <10 meters
Class 2 - 10 meters
Class 1 - 100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You need to connect your laptop to the company network but the SSID does not show up in the network list? What should you do?

A

Manually create the wireless network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your PC has an IP of 169.254.10.24. What type of IP address is this?

A

APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the maximum speed and length of Cat 5 cable?

A

100 Mbps

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the maximum speed and length of Cat 5e cable?

A
1000 Mbps (1 Gbps)
100 meters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the maximum speed and length of Cat 6 cable?

A

10 Gbps

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the primary way for a firewall to filter traffic?

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between an active and passive hub?

A

Passive - simply passes signals along to all ports

Active - regenerates signal, has ability to buffer signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of a cable or DSL modem?

A

Places traffic on the ISPs network to forward to internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a POE injector?

A

A device that provides power over Ethernet when the switch does not support it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What connector does a DSL line use from the modem to the jack to the ISP?

A

RJ-11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the criteria called that are used to manage traffic allowed into a network through a firewall?

A

Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the term used to describe a firewall port that only opens/turns on when it is needed?

A

Port Triggering

22
Q

What does UPnP stand for? What is a big issue with UPnP devices?

A

Universal Plug and Play - allows computers, printers, devices to be easily discoverable

Poses large security risk

23
Q

What is the primary issue with WEP wireless security?

A

Encryption algorithms are easily cracked, less than 5 mins

24
Q

WPA uses what technology standard? What is the difference between WPA and WPA2?

A

802.11i

WPA only uses some of 802.11i, WPA2 uses all

25
What is TKIP (temporal key integrity protocol) and how does it work?
Used in WPA security. Scrambles encryption keys using hashing algorithm
26
WPA2 uses what in place of TKIP?
CCMP
27
CCMP uses what encryption method?
AES (advanced encryption security)
28
What numbers can be assigned to 2.4 GHz wireless channels? What are the most commonly used wireless channel numbers in the US?
1 thru 11 | 1, 6, and 11
29
What IEEE wireless standards operate in the 2.4 GHz frequency spectrum?
802. 11b 802. 11g 802. 11n
30
What IEEE wireless standards operate in the 5 GHz frequency spectrum?
802. 11a 802. 11n 802. 11ac
31
What is the speed and distance of the 802.11a and 802.11g protocols?
54 Mbps | 115 feet and 125 feet respectively
32
What is the speed and distance of the 802.11b protocol?
11 Mbps | 115 feet
33
What is the speed and distance of the 802.11n protocol?
600 Mbps | 380 feet
34
What is the speed and distance of the 802.11ac protocol?
6.9 Gbps | 115 feet
35
What are the two main types of RFID systems and how do they differ?
Active Reader/Passive Tag (ARPT) - reader xmits signals and receives replies from passive tags Active reader/active tag (ARAT) - tags are awoken with signals from active reader
36
Zigbee is designed for simple PAN networks (short range, low rate wireless data xfer). What is the IEEE standard for Zigbee, and what are the data transmission rates?
802.15.4 | 250 kbps
37
What frequency range does Z-Wave operate at, and what is it's open-air operating range?
800-900 MHz Outdoor - 300 ft Indoor - 80+ ft
38
What is the max data rate of 3G, 4G, and 5G cellular technologies?
3G - 2 Mbps 4G - 1 Gbps 5G - 100 Gbps
39
What is Unified Thread Management? (UTM)
One device performing multiple security functions (firewall, antivirus, VPN, content filtering, etc.)
40
What is an IDS, and how does it classify threats?
Intrusion detection system - identifies threats from inside and outside the network Classified by network or host-based
41
What is the difference between an IDS and IPS?
IDS detects threats | IPS detects threats and takes steps to neutralize the threat
42
What is the device called that is used to aggregate VPN connections?
VPN concentrator
43
What two protocols are mandatory for VPN operation?
LAN Protocol | Remote access or line protocol
44
Break down the Ethernet network type of 100BaseT.
100 - speed of network (Mbps) Base - Technology used (baseband or broadband) T - Twisted pair cabling
45
What is a WMN network?
Ad-hoc wireless LAN, uses a mesh of routers and devices to create fault tolerance
46
What three tools are always included in a multimeter?
Voltmeter, ohmeter, and ammeter (voltage, resistance, and current respectively)
47
What are the purpose of the toner and probe in a tone generator?
Toner - sends tone through a wire to other end of cable Probe - contacted to individual wires on the other end until a signal or tone is emitted
48
What is the purpose of a loopback plug (also called wrap plugs)?
Takes the signal going out and echos it back. Used to test ports for functionality
49
What is the first octet range of class B private ipv4 addresses?
128-191
50
What is the first octet range of class C private ipv4 addresses?
192-223
51
What is the first octet range of class A private ipv4 addresses?
1-126
52
Which technology would be the best choice for authenticating wireless users to a RADIUS server?
802.11X