Dion N10-008 Practice Test #1 Flashcards

1
Q

What type of network device operates at layer 1 of the OSI model and requires connected devices to operate at half-duplex using CSMA/CD?

A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSMA/CD

A

Carrier Sense Multiple Access / Collision Dection

The collision recovery procedure can be likened to what happens at a dinner party, where all the guests talk to each other through a common medium (the air). Before speaking, each guest politely waits for the current speaker to finish. If two guests start speaking at the same time, both stop and wait for short, random periods of time (in Ethernet, this time is measured in microseconds). The hope is that by each choosing a random period of time, both guests will not choose the same time to try to speak again, thus avoiding another collision.

Why Half-Duplex?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the network ID associated with the host located at 192.168.0.123/29?

A

192.168.0.120

/29 means the subnet will have 8 IP address (/32 has 2 address, count backward including /32 to /29 = 4. 4 multiplied by 2 = 8)

Since the address go up to 256, subtract 8 from 256 a bunch of times (17 times for this example, getting to 120-128, until you get to the range the host is located in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Analog Modem

A

Converts digital signals to analog tones, which can be carried over analog telephone lines (DSL being another type that is carried over telephone connection - uses RJ11)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DOCSIS Modem

A

Coaxial cable modem with F type connector, transmits data over the existing cable television lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?

A

An evil twin - masquerades as a legitimate WiFi access point

This is considered an On-Path attach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP Spoofing

A

an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host, SUCH AS THE DEFAULT GATEWAY, causing any traffic meant for that IP address to be sent to the attacker instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LDAP (Lightweight Directory Access Protocol) Port

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SLP (Service Location Protocol)

A

protocol or method of organizing and locating the resources (such as printers, disk drives, databases, email directories, schedulers, etc.) in a network - alternative to LDAP in newer networks - uses port 427

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What happens to data as it travels from Layer 1 to Layer 7 in the OSI Model

A

De-encapsulation

in order to be at Layer 1, the data would have needed to already have been encapsulated in order to travel to Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fdx

A

full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Severity Level 0

A

Emergency

most severe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Severity Level 3

A

error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Severity Level 4

A

warning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Severity Level 1

A

alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Severity Level 6

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Severity Level 2

A

critical condition

18
Q

Severity Level 7

A

debugging

19
Q

Microsoft SQL port

A

1433

20
Q

MySQL port

A

3306

21
Q

SQLnet port

A

1521

22
Q

how to request a new IP address on the command line , i.e. if two machines have the same one

A

ipconfig /release | ipconfig /renew

only doing ipconfig /renew would renew the exisiting DHCP lease

23
Q

NAC

A

Network Access Control

It is an APPROACH to network security, with Port Security being an example of a NAC

24
Q

Port Security

A

Also known as Persistent MAC - used with ports - only allows network connection to the computer with the original MAC address

25
Q

SMF

A

Single Mode Fiber

26
Q

nbstat -R

A

purge and reload the cache name table from the LMHOST file on a windows workstation

used when trying to connect to a windows server using NetBIOS, which stores a local cached name table in LMHOSTS file on each client – so if an entry in a client’s file is pointing to the wrong IP, it would cause a connectivity issue and this command would reload the cached name table

27
Q

RTO

A

Recovery Time Objective

Duration of time and a service level within which a business process must be restored after a disaster to avoid unacceptable consequences associated with a break in continuity

28
Q
A
28
Q
A
29
Q
A
29
Q
A
29
Q
A
30
Q

What technology combines with functionality of a firewall, malware scanner and other security appliances into one device?

A

UTM

(On the practice test, other options are IPS and IDS. These are SYSTEMS, and the question asks for a DEVICE)

31
Q

SMB port

A

139 and 445

32
Q

NTP port

A

123

Network Time Protocol

The Network Time Protocol goes 123

33
Q

IMAP Port

A

143

34
Q

Syslog port

A

514

35
Q

RST Flag

A

Used in TCP connections when the sender feels something has went wrong and wants to terminate the connection

used for something ‘bad’ (unlike FIN in TCP (?))

36
Q

SNMPv3 options

A

AuthPriv - authenticate and encrypt traffic

AuthNoPriv - no authentication and no encryption

37
Q
A