CertMaster Flashcards

1
Q

South traffic

A

API calls between SDN controller + infrastructure devices

SDN inserts control layer between application layer + infrastructure layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

North traffic

A

Interface between SDN applications + SDN controller

“Service interface”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reasons to NOT use WPA2

A

WPA2 not supported by some adapters

WPA2 not supported by some APs

WPA2 not supported by some OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reason to implement RBAC + least privilege

A

Give rights to users implicitly

Grant users sufficient rights to perform job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AAA server that can validate user credentials to provide remote access

A

RADIUS

Remote access devices (i.e.) VPN servers function as client devices of RADIUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Authentication protocol that may detect when server is down

A

TACACS+

Authenticating administrative access to routers + switches

Uses reliable delivery offered by TCP to help detect if server is down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What wireless standard uses 2.4 GHz spectrum + OFDM

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Reasons to document findings, actions, outcomes during troubleshooting process

A

Creates installation procedures

Establishes new baseline for template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Part of MAC address that determines whether frame is addressed to individual node or group

A

I/G bit

Individual (0)

Group (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network topology commonly used in variety of WANs

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allows fine-grained control over traffic parameters

A

QoS

via protocols like MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Functions of CoS

A

Categorize protocols into groups that require different service levels

Provide tagging mechanism to identify frame/packet class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Framework that classifies each packet passing through a device

A

Differentiated Services (DiffServ)

Router policies can then be defined to use packet classification to prioritize delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be implemented to limit clutter when installing multi-functional phones

A

PoE

QoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solution where leased fiber link is terminated at demarc

A

Fiber to the Premises (FTTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solution that retains some copper wiring to the demarc while extending fiber link to communications cabinet servicing multiple subscribers

A

Fiber to the Node (FTTN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used by service providers based in telephone networks to support FTTC

A

Very high-speed DSL (VDSL)

Allows for asymmetric + symmetric modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How a T1 line is terminated at demarc

A

Smartjack

RJ-48C / RJ-48X interface on customer side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Device that controls logical network traffic

A

Router

IP address = logical addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Framework for deploying multiple types of authentication protocols + technologies

A

EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Packets that are moving through network from hosts to endpoints

A

Send / receive traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cable type that uses RG-59 / RG-6

A

Coaxial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Commands to test remote server’s network configuration + confirm packet’s routing path

A

ping

tracert/traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Diagram that shows data path between client + server

A

Physical network diagram

Logical network diagram

Wiring diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Step in troubleshooting process that involves approaching multiple problems individually
Step 1 Part of identifying the problem
26
OSI layer in which deciding between wired / wireless AP belongs
Physical
27
Network function of a bridge
Connects different networks as if they were one
28
Topology of 2 or more nodes that share access to network but only 1 node can be active at any 1 time
Bus
29
E-line / E-LAN services are examples of what type of network
MAN
30
Protocols to connect multiple branch locations to main database located in central location
mGRE - supports point-to-multipoint links MPLS - supports point-to-point / point-to-multipoint links between nodes regardless of underlying physical + data link topologies
31
Punchdown tool with adjustable blades on 1 end
BIX
32
Punchdown tool with scissor-like function on front instead of set blade
Krone
33
110 vs 66 punchdown block
110 - LAN technology + RJ-45 66 - telecom + phone panels
34
Fiber connection to use when space is limited
LC
35
Converter that may accept multiple LC connections
SFP
36
Transceiver form factor that supports 4 x 1 Gbps links, typically aggregated into a single 4 Gbps channel
QSFP
37
Widely deployed pinout standard
TIA/EIA 568b
38
How to verify network service installation + that device can communicate with Layer 3 switch
Ping loopback (confirms TCP/IP is correctly installed) Ping default gateway
39
Functions of CIDR
Uses bits normally assigned to network ID to mask complexity of subnet + host addressing scheme within network Enables maintaining 1 routing table instead of multiple tables
40
Function of VLSM
Allows network designer to allocate ranges of IP addresses to subnets that match predicted need for number of subnets + hosts per subnet
41
SIP Uniform Resource Indicator (URI) for employee "Corn Pig" / phone number "1234567890" / domain "@abccompany"
sip: corn.pig@abccompany.com sip: corn.pig@1234567890
42
Protocol that provides additional options, rather than only leases, for host IP addresses
DHCPv6 Used with IPV6
43
Port that must be enabled to access file repository through web-based interface
80
44
Protocol that uses Network Level Authentication (NLA) which requires client to authenticate before full remote session starts
RDP
45
Protocol that allows for protected dialog between client + server by assigning web server digital certificate issued by CA
HTTPS
46
Used by DHCP servers to issue configuration options
Scope options
47
Minimum DHCP scope options to simplify adding computers to domain
Default gateway DNS IP addresses NTP IP addresses
48
Benefits of each cloud model
Hybrid - utilization benefits Community - shared costs Public - multi-tenant use Private - Third-party secure
49
System to enable voice message functionality i.e. voice message functionality
VoIP Private Branch Exchange (PBX)
50
Translates between VoIP systems and legacy voice equipment
Voice gateway
51
Features provided by forward proxy server
Caching engine Traffic filtering (protocol-specific outbound traffic)
52
Proxy configured with filters for multiple protocol types
Multipurpose proxy
53
AP in bridged mode
Doesn't support wireless clients
54
Transparent vs nontransparent vs web proxy
Transparent - no client configuration (implemented on inline appliance) Nontransparent - requires client configuration (port 8080) Web - prevent malware from Internet, block spam, restrict browsing to authorized sites
55
QoS functional planes
Control plane - how to prioritize traffic Data plane - switching of traffic Management plane - monitors traffic conditions As traffic conditions change, changes occur at control + data plane levels QoS service is basically a traffic shaper
56
Used to interconnect switches on large networks
Trunks
57
CSMA/CA vs CSMA/CD
CSMA/CA - nodes listen + transmit when media is clear CSMA/CD - simultaneous node transmission + jam signal
58
Configure VoIP on existing data network without using trunk ports
Auxiliary VLAN Multiple broadcast domains
59
Considerations when selecting AP to reach all users in area
Omnidirectional antennas 2.4 + 5.0 GHz bands
60
Cellular technology real-world speeds
5G - 300 Mbps 4G/4G LTE - 20 Mbps 3G - 3.1 Mbps down + 1.8 Mbps up
61
Cellular technologies that don't accept SIM cards
Code Division Multiple Access (CDMA) 3G
62
Cellular technologies that can accept SIM cards
GSM LTE
63
Define value of numbers: 4x4:2
Number of transmit antennas x number of receive antennas : number of simultaneous transmit + receive streams
64
Indicator to help identify problem with slow network connections despite high bandwidth configuration
Latency
65
What to implement to provide port-based authentication for network access to devices
802.1X Port-based Network Access Control (PNAC)
66
Protocol switch authenticating via 802.1X would use
EAP over LAN (EAPoL)
67
Protocol to mitigate risk of rogue APs
EAP-TLS Authentication server + clients perform mutual authentication
68
Protocol that allows an AP to forward authentication data without allowing any other type of network access
EAP over Wireless (EAPoW)
69
Biometric recognition as intrusion detection / continuous authentication mechanism
Something you do Behavioral biometric recognition Subject to high error rates
70
Types of attacks that can utilize pharming, DoS, traffic interception + cache corruption
DNS poisoning ARP poisoning
71
How to configure AP if it must support entire location on its own
Mount AP in ceiling Configure maximum power output
72
Wireless access features that can support + secure a guest network that should only be accessible to customers in immediate lobby area of office floor
Captive portal Network isolation Power levels
73
Effective ways to ensure security of physical switch port access
Disabling switch port using management software Isolating ports to black hole VLAN Configuring MAC filtering on switch
74
MAC limiting vs MAC filtering
MAC limiting - restricts number of address (drops any traffic beyond maximum connected addresses) MAC filtering - defining which addresses are permitted to connect to switch port
75
Sending data over internet where data + original IP address are encrypted
Transport mode Secure communication between hosts on private network ESP - only payload data is encrypted AH - provide integrity for IP header
76
Mode used for communication between VPN gateways across unsecure network
Tunnel mode AKA "router implementation" ESP - whole packet is encrypted + encapsulated AH - no real use in tunnel mode
77
Policy that secures authentication mechanism that a host must be able to match at least 1 matching security method to establish connection
IPSec Secure local network communication + remote access protocol Each host required to use IPSec must be assigned a policy
78
Authentication methods to ensure only authorized collection of users are connecting securely to network
PSK Group authentication MAC filtering
79
Method used to encapsulate IP packets for transmission over serial digital lines
Point-to-point protocol (PPP) Works at Data Link layer Used to communicate multiprotocol data between 2 routers No security mechanisms (must be used with other protocols to provision secure tunnel)
80
Layer 3 encapsulation protocol
Generic Routing Encapsulation (GRE) Can encapsulate IP packet as payload Doesn't have any mechanisms for authenticating users / devices (often used with other protocols in VPN solution)
81
Biometric authentication considerations
Users find biometric recognition invades privacy Biometric recognition technology can be discriminatory Setup + maintenance costs for biometric recognition are high
82
Layers of security to detect + alert to tampering of devices
Tamper detection Circuit alarm Duress alarm
83
Benefits of surveillance systems
Detect attempts to penetrate barricade Improve resilience of perimeter gateways Recording movement + access
84
Physical security policies to control access to specific authorized access zones
ID badge Lock mechanism
85
Methods to help pinpoint / isolate actual issue user, system, organization may be experiencing
Question users Duplicate the problem
86
User can reach Internet but can't access internal network resources while out of office
Incorrect DNS
87
Troubleshooting step that includes open + closed approaches to obtaining information
Question users
88
Logical approach that allows methodical steps to diagnose cause of network issue
OSI reference model guidance
89
Method to identify which device is experiencing issues when too much jitter suspected on network backbone
LED status indicators
90
Tool to test fiber optic cable spectral attenuation to ensure each channel has enough power to support wavelength division multiplexing
Optical spectrum analyzer (OSA)
91
PoE cable requirements
PoE - Cat 3 or better PoE+ - Cat 5e or better Should use shielded cabling (capable of dispersing heat more efficiently than unshielded)
92
Sources of fiber optic signal loss
Dirty optical cables Incorrect transceivers Mismatched coupled cables
93
Command to examine OUTPUT chain in Linux
iptables
94
All telnet operations are sent as:
8 bits
95
Service to make management of allocated IP addresses easier
IPAM Scans DHCP + DNS servers Log IP address usage to database Used to manage + reconfigure DHCP + DNS servers remotely
96
Command to visualize general NetFlow data on command line
Show ip cache flow
97
Command-line packet capturing utility
tcpdump
98
Sum of transmit power, antenna cable / connection loss, antenna gain
Effective Isotropic Radiated Power (EIRP)
99
Issue indicated by being redirected to HTTP rather than HTTPS site
Captive portal Should use HTTPS Most modern browsers will block redirection to sites that don't use TLS
100
Reason that number of ports available on a router may be restricted
Licensed feature issue May affect number of ports available, number of routes allowed in routing table, availability of routing protocols
101
Reasons a certificate could be untrusted
Certificate subject name doesn't match URL Certificate not being used for its stated purpose Certificate is expired / revoked
102
Possible risks associated with BYOD devices
Compatibility / support Security
103
Reason to shorten DHCP lease times
Avoid expired IP addresses