CCST Networking Flashcards

1
Q

Three main Windows network config tools are:

A

1) Settings app
2) Control Panel
3) command line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPv6 link local addresses begin with…

A

FE80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Three tools to get network info on a Mac station:

A

1) GUI
2) CLI
3) System Information app (under Utilities in Finder)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In a Mac, any settings changed by ifconfig might be overwritten by…

A

configd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two Linux commands to display network config info are…

A

1) ip
2) ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What four issues does the RINA (Recursive InterNetwork Architecture) model address?

A

Error control
Flow control
Multiplexing
Marshaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cable-based internet service to the home is covered by what set of standards?

A

DOCSIS (Data Over Cable Service Interface Specification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What size keys does WEP use?

A

64 or 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What size keys does WPA use?

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WPA-PSK creates a public key using what information?

A

The SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Where does WPA get its public key from?

A

An external server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is more appropriate for a home network, WPA or WPA-PSK?

A

WPA-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is more appropriate for a corporate wifi, WPA or WPA-PSK?

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Four types of last-mile layer 1 technologies are:

A

1) Fixed wireless access (FWA)
2) Fiber to the neighborhood/curb using GPON (Gigabit Passive Optical Network)
3) DOCSIS (cable)
4) MAN using ROADM (reconfigurable optical add-drop multiplexer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Peering points are…

A

Where ISPs connect to other ISPs, can be public or private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Settlement-free peering is…

A

when two ISPs want to connect and believe the traffic each way will be roughly equal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Open peering is…

A

when an ISP provides connectivity to an organization for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Two types of spine-and-leaf fabrics are…

A

1) Clos
2) butterfly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Early crossbar and Strowger fabrics were replaced by…

A

Clos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IPv4 packet fragmentation has been largely replaced by…

A

Path MTU discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do PA and PI stand for?

A

Provider-Assigned (addresses)
Provider-Independent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does “grammar” refer to?

A

Context describing what a set of bits contains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does a “dictionary” refer to?

A

How to translate a set of bits into data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How many connections are involved in an FTP session and what are they used for?

A

Two - control and data

25
Q

Hybrid cloud models use…

A

A combo of public and private clouds

26
Q

Multi-cloud models use…

A

More than one cloud provider

27
Q

What are the three main security goals?

A

Confidentiality, Integrity, and Availability

28
Q

Five types of network documentation:

A

1) Network diagrams
2) Descriptions
3) Baselines
4) Failure reports
5) Hardware and software

29
Q

Refactoring is the solution to…

A

technical debt

30
Q

The frequency of an electronic signal or wave is defined as…

A

how often the signal changes polarity

31
Q

Far-end crosstalk is…

A

the amount of interference between two copper wires carrying different signals (one being external noise)

32
Q

In the 10BASE-2 spec, the -2 stands for…

A

thin coax or “thinnet”

33
Q

In the 10BASE-5 spec, the -5 stands for…

A

thick coax or “thicknet”

34
Q

How many pairs of twisted copper wires are used in the 1000BASE-T spec?

A

4 (all 8 wires)

35
Q

The main standard covering wifi technologies is…

36
Q

What organization oversees wifi standards?

37
Q

What are the responsibilities of the mobile core?

A

Authentication of users, tunnel endpoint termination in the RAN, user location tracking, and usage/billing

38
Q

You know bandwidth and throughput, but what is “goodput”?

A

The amount of data transmitted without error

39
Q

What does Mike’s TraceRoute test?

A

Delay and jitter across a network - Linux only (are they seriously going to ask about this?)

40
Q

Two types of network diagrams…

A

Physical
Logical

41
Q

What is a CRAC?

A

Computer Room Air Conditioner

42
Q

What is a hot aisle?

A

When pairs of racks are placed back to back

43
Q

iperf does or does not measure latency?

A

Does not (it measures throughput only)

44
Q

What does a firewall block by default?

A

Blocks all traffic coming into the data center from the outside, but permits all traffic going out

45
Q

True or false: WPA authentication is based on TKIP encryption

46
Q

True or false: WPA uses a static WEP key

47
Q

True or false: WPA cannot use RADIUS

48
Q

What encryption does WPA2 use?

A

AES (as opposed to TKIP)

49
Q

“Nonblocking” means…

A

a network will never drop data, it will instead reject the connection setup

50
Q

Four characteristics of fabrics are:

A

1) Repeatable
2) Regular
3) Nonplanar
4) use fan-outs

51
Q

“Noncontending” means…

A

A network will not reject any incoming data at the edge

52
Q

IPv6 multicast addresses begin with…

53
Q

Unique local IPv6 addresses are not internet-routable, and start with…

54
Q

What is the IPv6 loopback address?

55
Q

Four types of exploits are:

A

email phishing, MITM, spoofing, DDoS.

56
Q

What is a route prefix?

A

The subnet mask, e.g. /27

57
Q

What wireless frequency provides the longest range?