CertMaster Flashcards

1
Q

South traffic

A

API calls between SDN controller + infrastructure devices

SDN inserts control layer between application layer + infrastructure layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

North traffic

A

Interface between SDN applications + SDN controller

“Service interface”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reasons to NOT use WPA2

A

WPA2 not supported by some adapters

WPA2 not supported by some APs

WPA2 not supported by some OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reason to implement RBAC + least privilege

A

Give rights to users implicitly

Grant users sufficient rights to perform job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA server that can validate user credentials to provide remote access

A

RADIUS

Remote access devices (i.e.) VPN servers function as client devices of RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication protocol that may detect when server is down

A

TACACS+

Authenticating administrative access to routers + switches

Uses reliable delivery offered by TCP to help detect if server is down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless standard uses 2.4 GHz spectrum + OFDM

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reasons to document findings, actions, outcomes during troubleshooting process

A

Creates installation procedures

Establishes new baseline for template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Part of MAC address that determines whether frame is addressed to individual node or group

A

I/G bit

Individual (0)

Group (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network topology commonly used in variety of WANs

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allows fine-grained control over traffic parameters

A

QoS

via protocols like MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Functions of CoS

A

Categorize protocols into groups that require different service levels

Provide tagging mechanism to identify frame/packet class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Framework that classifies each packet passing through a device

A

Differentiated Services (DiffServ)

Router policies can then be defined to use packet classification to prioritize delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be implemented to limit clutter when installing multi-functional phones

A

PoE

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solution where leased fiber link is terminated at demarc

A

Fiber to the Premises (FTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solution that retains some copper wiring to the demarc while extending fiber link to communications cabinet servicing multiple subscribers

A

Fiber to the Node (FTTN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used by service providers based in telephone networks to support FTTC

A

Very high-speed DSL (VDSL)

Allows for asymmetric + symmetric modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How a T1 line is terminated at demarc

A

Smartjack

RJ-48C / RJ-48X interface on customer side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Device that controls logical network traffic

A

Router

IP address = logical addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Framework for deploying multiple types of authentication protocols + technologies

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Packets that are moving through network from hosts to endpoints

A

Send / receive traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cable type that uses RG-59 / RG-6

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Commands to test remote server’s network configuration + confirm packet’s routing path

A

ping

tracert/traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Diagram that shows data path between client + server

A

Physical network diagram

Logical network diagram

Wiring diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Step in troubleshooting process that involves approaching multiple problems individually

A

Step 1

Part of identifying the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

OSI layer in which deciding between wired / wireless AP belongs

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network function of a bridge

A

Connects different networks as if they were one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Topology of 2 or more nodes that share access to network but only 1 node can be active at any 1 time

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

E-line / E-LAN services are examples of what type of network

A

MAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Protocols to connect multiple branch locations to main database located in central location

A

mGRE - supports point-to-multipoint links

MPLS - supports point-to-point / point-to-multipoint links between nodes regardless of underlying physical + data link topologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Punchdown tool with adjustable blades on 1 end

A

BIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Punchdown tool with scissor-like function on front instead of set blade

A

Krone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

110 vs 66 punchdown block

A

110 - LAN technology + RJ-45

66 - telecom + phone panels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Fiber connection to use when space is limited

A

LC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Converter that may accept multiple LC connections

A

SFP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Transceiver form factor that supports 4 x 1 Gbps links, typically aggregated into a single 4 Gbps channel

A

QSFP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Widely deployed pinout standard

A

TIA/EIA 568b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How to verify network service installation + that device can communicate with Layer 3 switch

A

Ping loopback (confirms TCP/IP is correctly installed)

Ping default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Functions of CIDR

A

Uses bits normally assigned to network ID to mask complexity of subnet + host addressing scheme within network

Enables maintaining 1 routing table instead of multiple tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Function of VLSM

A

Allows network designer to allocate ranges of IP addresses to subnets that match predicted need for number of subnets + hosts per subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

SIP Uniform Resource Indicator (URI) for employee “Corn Pig” / phone number “1234567890” / domain “@abccompany”

A

sip: corn.pig@abccompany.com
sip: corn.pig@1234567890

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Protocol that provides additional options, rather than only leases, for host IP addresses

A

DHCPv6

Used with IPV6

43
Q

Port that must be enabled to access file repository through web-based interface

A

80

44
Q

Protocol that uses Network Level Authentication (NLA) which requires client to authenticate before full remote session starts

A

RDP

45
Q

Protocol that allows for protected dialog between client + server by assigning web server digital certificate issued by CA

A

HTTPS

46
Q

Used by DHCP servers to issue configuration options

A

Scope options

47
Q

Minimum DHCP scope options to simplify adding computers to domain

A

Default gateway

DNS IP addresses

NTP IP addresses

48
Q

Benefits of each cloud model

A

Hybrid - utilization benefits

Community - shared costs

Public - multi-tenant use

Private - Third-party secure

49
Q

System to enable voice message functionality i.e. voice message functionality

A

VoIP Private Branch Exchange (PBX)

50
Q

Translates between VoIP systems and legacy voice equipment

A

Voice gateway

51
Q

Features provided by forward proxy server

A

Caching engine

Traffic filtering (protocol-specific outbound traffic)

52
Q

Proxy configured with filters for multiple protocol types

A

Multipurpose proxy

53
Q

AP in bridged mode

A

Doesn’t support wireless clients

54
Q

Transparent vs nontransparent vs web proxy

A

Transparent - no client configuration (implemented on inline appliance)

Nontransparent - requires client configuration (port 8080)

Web - prevent malware from Internet, block spam, restrict browsing to authorized sites

55
Q

QoS functional planes

A

Control plane - how to prioritize traffic

Data plane - switching of traffic

Management plane - monitors traffic conditions

As traffic conditions change, changes occur at control + data plane levels

QoS service is basically a traffic shaper

56
Q

Used to interconnect switches on large networks

A

Trunks

57
Q

CSMA/CA vs CSMA/CD

A

CSMA/CA - nodes listen + transmit when media is clear

CSMA/CD - simultaneous node transmission + jam signal

58
Q

Configure VoIP on existing data network without using trunk ports

A

Auxiliary VLAN

Multiple broadcast domains

59
Q

Considerations when selecting AP to reach all users in area

A

Omnidirectional antennas

2.4 + 5.0 GHz bands

60
Q

Cellular technology real-world speeds

A

5G - 300 Mbps

4G/4G LTE - 20 Mbps

3G - 3.1 Mbps down + 1.8 Mbps up

61
Q

Cellular technologies that don’t accept SIM cards

A

Code Division Multiple Access (CDMA)

3G

62
Q

Cellular technologies that can accept SIM cards

A

GSM

LTE

63
Q

Define value of numbers: 4x4:2

A

Number of transmit antennas x number of receive antennas : number of simultaneous transmit + receive streams

64
Q

Indicator to help identify problem with slow network connections despite high bandwidth configuration

A

Latency

65
Q

What to implement to provide port-based authentication for network access to devices

A

802.1X

Port-based Network Access Control (PNAC)

66
Q

Protocol switch authenticating via 802.1X would use

A

EAP over LAN (EAPoL)

67
Q

Protocol to mitigate risk of rogue APs

A

EAP-TLS

Authentication server + clients perform mutual authentication

68
Q

Protocol that allows an AP to forward authentication data without allowing any other type of network access

A

EAP over Wireless (EAPoW)

69
Q

Biometric recognition as intrusion detection / continuous authentication mechanism

A

Something you do

Behavioral biometric recognition

Subject to high error rates

70
Q

Types of attacks that can utilize pharming, DoS, traffic interception + cache corruption

A

DNS poisoning

ARP poisoning

71
Q

How to configure AP if it must support entire location on its own

A

Mount AP in ceiling

Configure maximum power output

72
Q

Wireless access features that can support + secure a guest network that should only be accessible to customers in immediate lobby area of office floor

A

Captive portal

Network isolation

Power levels

73
Q

Effective ways to ensure security of physical switch port access

A

Disabling switch port using management software

Isolating ports to black hole VLAN

Configuring MAC filtering on switch

74
Q

MAC limiting vs MAC filtering

A

MAC limiting - restricts number of address (drops any traffic beyond maximum connected addresses)

MAC filtering - defining which addresses are permitted to connect to switch port

75
Q

Sending data over internet where data + original IP address are encrypted

A

Transport mode

Secure communication between hosts on private network

ESP - only payload data is encrypted

AH - provide integrity for IP header

76
Q

Mode used for communication between VPN gateways across unsecure network

A

Tunnel mode

AKA “router implementation”

ESP - whole packet is encrypted + encapsulated

AH - no real use in tunnel mode

77
Q

Policy that secures authentication mechanism that a host must be able to match at least 1 matching security method to establish connection

A

IPSec

Secure local network communication + remote access protocol

Each host required to use IPSec must be assigned a policy

78
Q

Authentication methods to ensure only authorized collection of users are connecting securely to network

A

PSK

Group authentication

MAC filtering

79
Q

Method used to encapsulate IP packets for transmission over serial digital lines

A

Point-to-point protocol (PPP)

Works at Data Link layer

Used to communicate multiprotocol data between 2 routers

No security mechanisms (must be used with other protocols to provision secure tunnel)

80
Q

Layer 3 encapsulation protocol

A

Generic Routing Encapsulation (GRE)

Can encapsulate IP packet as payload

Doesn’t have any mechanisms for authenticating users / devices (often used with other protocols in VPN solution)

81
Q

Biometric authentication considerations

A

Users find biometric recognition invades privacy

Biometric recognition technology can be discriminatory

Setup + maintenance costs for biometric recognition are high

82
Q

Layers of security to detect + alert to tampering of devices

A

Tamper detection

Circuit alarm

Duress alarm

83
Q

Benefits of surveillance systems

A

Detect attempts to penetrate barricade

Improve resilience of perimeter gateways

Recording movement + access

84
Q

Physical security policies to control access to specific authorized access zones

A

ID badge

Lock mechanism

85
Q

Methods to help pinpoint / isolate actual issue user, system, organization may be experiencing

A

Question users

Duplicate the problem

86
Q

User can reach Internet but can’t access internal network resources while out of office

A

Incorrect DNS

87
Q

Troubleshooting step that includes open + closed approaches to obtaining information

A

Question users

88
Q

Logical approach that allows methodical steps to diagnose cause of network issue

A

OSI reference model guidance

89
Q

Method to identify which device is experiencing issues when too much jitter suspected on network backbone

A

LED status indicators

90
Q

Tool to test fiber optic cable spectral attenuation to ensure each channel has enough power to support wavelength division multiplexing

A

Optical spectrum analyzer (OSA)

91
Q

PoE cable requirements

A

PoE - Cat 3 or better

PoE+ - Cat 5e or better

Should use shielded cabling (capable of dispersing heat more efficiently than unshielded)

92
Q

Sources of fiber optic signal loss

A

Dirty optical cables

Incorrect transceivers

Mismatched coupled cables

93
Q

Command to examine OUTPUT chain in Linux

A

iptables

94
Q

All telnet operations are sent as:

A

8 bits

95
Q

Service to make management of allocated IP addresses easier

A

IPAM

Scans DHCP + DNS servers

Log IP address usage to database

Used to manage + reconfigure DHCP + DNS servers remotely

96
Q

Command to visualize general NetFlow data on command line

A

Show ip cache flow

97
Q

Command-line packet capturing utility

A

tcpdump

98
Q

Sum of transmit power, antenna cable / connection loss, antenna gain

A

Effective Isotropic Radiated Power (EIRP)

99
Q

Issue indicated by being redirected to HTTP rather than HTTPS site

A

Captive portal

Should use HTTPS

Most modern browsers will block redirection to sites that don’t use TLS

100
Q

Reason that number of ports available on a router may be restricted

A

Licensed feature issue

May affect number of ports available, number of routes allowed in routing table, availability of routing protocols

101
Q

Reasons a certificate could be untrusted

A

Certificate subject name doesn’t match URL

Certificate not being used for its stated purpose

Certificate is expired / revoked

102
Q

Possible risks associated with BYOD devices

A

Compatibility / support

Security

103
Q

Reason to shorten DHCP lease times

A

Avoid expired IP addresses