Extra 2 Flashcards

1
Q

Which of the following answers refers to a network protocol used in the most common types of spoofing attacks?

SMTP

A

A security protocol designed to strengthen existing WEP implementations without requiring the replacement of legacy hardware is called:

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a network authentication protocol that provides the single sign-on functionality?

Kerberos

A

A network protocol that allows for secure file transfer over SSL is known as:

FTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following remote file-access protocols do not offer encryption? (Select 2 answers)

FTP

TFTP

A

A non-proprietary alternative to RDP that enables control over another computer on the network with the use of a graphical user interface is called:

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of protocols used for implementing secure VPN tunnels include: (Select 3 answers)

DTLS

IPsec

SSL/TLS

A

Which network protocol enables detection of packet loss?

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which network protocol enables encapsulation of PPP frames within 802.3 frames?

PPPoE

A

Which of the answers listed below refer(s) to PPP? (Select all that apply)

  • Network protocol used for connecting devices on a WAN
  • Enables encapsulation of IP traffic
  • Used for establishing a direct connection between two networked devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dynamic Host Configuration Protocol version 6 (DHCPv6) is the IPv6 equivalent of the Dynamic Host Configuration Protocol (DHCP) for IPv4.

True

A

Which of the IPv6 protocols listed below is used by networked nodes for locating routers?

NDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An IPv6 protocol used by routers to advertise their presence on a network is known as:

NDP

A

Which IPv6 protocol is used by networked hosts to determine the link layer address of adjacent nodes?

NDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An IPv6 protocol performing the function of IPv4’s Address Resolution Protocol (ARP) is called:

NDP

A

Border Gateway Protocol (BGP) falls into the category of:

Hybrid routing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following answers refers to a link-state routing protocol?

OSPF

A

Examples of distance-vector routing protocols include: (Select 2 answers)

RIP

EIGRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A hybrid routing protocol combines the features of distance-vector and link-state routing protocols.

True

A

A type of routing protocol that calculates the best path between source and destination nodes based on a map of network connectivity between nodes is called:

Link-state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to a type of routing protocol that determines the best route for data packets based on the lowest number of hops?

Distance-vector

A

Which of the following protocols provide protection against switching loops? (Select 2 answers)

STP

RSTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The purpose of the Carrier Sense Multiple Access (CSMA) protocol is to verify the absence of other traffic on a shared medium before transmitting to prevent collisions and loss of data.

True

A

The SMTP protocol is used for: (Select 2 answers)

Sending email from a client device

Sending email between mail servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristic features of TFTP? (Select 2 answers)

Provides no security features

A very basic form of file sharing protocol

A

Telnet: (Select 3 answers)

  • Provides username & password authentication
  • Transmits data in an unencrypted form
  • Enables remote login and command execution
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services?

SIP

A

What are the characteristics of SMB/CIFS? (Select 2 answers)

Provides shared access to files, directories, and devices

Used mainly by computers running Microsoft Windows operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP3 is used for:

Email retrieval

A

Which of the answers listed below refer to IMAP4? (Select 2 answers)

  • Offers improved functionality in comparison to POP3
  • Serves the same function as POP3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the answers listed below refers to a protocol used for managing VoIP and VTC services?

H.323

A

The ATM PDU is the cell
OSI physical layer PDU is the bit
OSI data link layer PDU is the frame
OSI network layer PDU is the packet
OSI transport layer PDU is the segment
PDUs between OSI session and application layers are referred to simply as the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A DSL connection is set up between a pair of modems on either end of a copper wire that is between the CPE and the digital subscriber line access multiplexer (DSLAM). A DSLAM is the device located at the provider’s CO that concentrates connections from multiple DSL subscribers.

A

The term last mile has been used quite a bit in the last few years with broadband-type connections. It basically means the same thing as local loop and defines the physical connection from the customer to the first aggregation device of the provider network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the answers listed below refer to the components that can be found at the OSI network layer? (Select 3 answers)

   Router
   Network cabling
   IP address	
   TCP/UDP protocol
   Switch
   Packet
A

Router

IP address

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the protocols listed below reside at the OSI transport layer? (Select 2 answers)

  UDP	
  SSL/TLS
  ICMP
  TCP	
  ATM
A

UDP

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Character encoding, data compression and encryption/decryption take place at the:

A

Presentation layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following protocols reside at the application layer of the OSI model? (Select 3 answers)

A

HTTP

FTP

SMTP

22
Q
Bounded media is considered to be 
-Copper cables
-Fiber optic cables
Unbounded media is:
-Infrared
-Radio frequency
-Free-air optical (direct laser transmission)
A

Wifi Signal Troubleshooting

  • check physical connection, wireless router connection
  • Client wireless network adapter
  • Windows, doors, walls, create levels of attenuation
  • relocate/add wireless APs
23
Q

MAC Address Troubleshooting
Common commands
-show mac-address-table - detect if a switch is learning MAC addresses

A

Common commands

-clear mac address-table dynamic: clears out table of dynamic address

24
Q

Common commands

-sh vlan: verifies VLAN and displays ports

A

Common commands

-sh int switchport: summaary information for a port

25
Q

It is best practice to hide a Wireless Access Point inside a metal file cabinet for asthetics.
A. TRUE

B. FALSE

A

FALSE

26
Q

Which set of bits in a standard MAC address are assigned by the manufacturer?
A. 1st 24 bits

B. 2nd 24 bits

C. 3rd 24 bits

D. 4th 24 bits

A

B. 2nd 24 bits

27
Q

How do we define the loss of signal as it moves through a medium?
A. Loss leader

B. Signal fatigue

C. Attenuation

D. Intermittency

A

C. Attenuation

28
Q

A header, data, and a trailer make up what part of Layer 2 networking?
A. Data Frame

B. Letter

C. Data Packetx

D. Info Box

A

A. Data Frame

29
Q

Which is the upper sublayer of the Data Link layer?
A. Logica Link Control

B. Media Access Control

C. Remote terminal unit

D. Master terminal unit

A

A. Logica Link Control

30
Q

What category of tool is used to perform basic continuity functions?
A. Certificationx

B. Qualification

C. Verification

D. Quantification

A

C. Verification

31
Q

This switch configuration replicates data from any and all ports to a secondary single port.
A. Port Release

B. Port Capture

C. Port Mirroring

D. Port Verification

A

C. Port Mirroring

32
Q

What converts a stream of raw bits into groupings of info?
A. Segment

B. Packet

C. Byte

D. Frame

A

B. Packet

33
Q

Which Layer 2 protocol detects the LAN’s topology?
A. Spanning Tree Protocol

B. Frame Relay

C. Token Ring

D. PPP

A

A. Spanning Tree Protocol

34
Q

When in a passive state, a network sniffer is usually placed in what mode and listens only?
A. Promiscuous

B. Alert

C. Vibrate

D. Active

A

A. Promiscuous

35
Q

What is the most common type of network cabling?
A. Unshielded Twisted Pair

B. Coaxial Cable

C. Fiber-Optic Cable

D. Shielded Twisted Pair

A

A. Unshielded Twisted Pair

36
Q

Which of the following is the process of turning bits into ‘physical’ transmission?
A. Data Encoding

B. Data Recording

C. Data Biting

D. Data Signaling

A

D. Data Signaling

37
Q

Which of the following OSI layers does the Physical layer interface with?
A. Network

B. Session

C. Data-Link

D. Transport

A

C. Data-Link

38
Q

The Data Link layer provides data to the Physical layer in what form?
A. Raw data

B. Frames

C. Electrical signals

D. Pulse of light

A

Frames

39
Q

Which Media Access Control service provides the ability to deliver to a single interface in a set?
A. Unicast

B. Mulitcast

C. Anycast

D. Broadcast

A

C. Anycast

40
Q

What is the general guideline for maximum Ethernet size (segments and repeaters)?
A. 5-1-2 rule

B. 1-1-3 rule

C. 9-1-1 rule

D. 5-4-3 rule

A

D. 5-4-3 rule

41
Q

What open source tool allows the ability to scan a large number of machines at once?
A. Wireshark

B. ARP

C. Ping

D. Nmap

A

.

42
Q

What open source tool allows the ability to scan a large number of machines at once?
A. Wireshark

B. ARP

C. Ping

D. Nmap

A

Nmap

43
Q

OPTICAL CARRIER LEVELS
OC-1 - 51.84 Mbps
OC-3 155.52 Mbps
OC-12 - 622.08 Mbps

A

OPTICAL CARRIER LEVELS
OC-48 - 2.488 Gbps
OC-192 -9.953 Gbps
OC-768 -39.813 Gbps

44
Q
Connection Max Speeds
T1 - 1.544 Mbps
T1C - 3.152 Mbps
T2 - 6.312 Mbps
T3 - 44.736 Mbps
T4 - 274.176 Mbps
A
E carrier line data rates
E0 - 64 kbps
E1 - 2.048 Mbps
E2 -8.448 Mbps
E3 -34.368 Mbps
45
Q

An OC-3 line supports transmission rates of up to:

  1. 544 Mbps
  2. 736 Mbps
  3. 84 Mbps
  4. 52 Mbps ( Your answer)
A

Which of the following answers refers to a dedicated local network consisting of devices that provide data access?
SAN

46
Q

A dedicated storage appliance that can be added to a local network is known as:
NAS

A

VoIP gateway is a network device that converts voice and fax calls, in real time, between an IP network and: (Select 2 answers)
PSTN ( Your answer)
POTS ( Missed)

47
Q

A type of advanced firewall capable of more in-depth inspection of network traffic that enables detection of application-specific attacks is referred to as: (Select 2 answers)
NGFW ( Your answer)
Layer 7 firewall ( Missed)

A

Which of the following answers refer(s) to authentication protocol(s) providing the AAA functionality? (Select all that apply)

TACACS+ ( Your answer)
RADIUS ( Your answer)

48
Q

What are the characteristic features of RADIUS? (Select 3 answers)

Primarily used for network access ( Your answer)
Combines authentication and authorization ( Your answer)
Encrypts only the password in the access-request packet ( Your answer)

A
Examples of technologies used for SAN connectivity include:
   FCoE
   InfiniBand
   iSCSI
   Fibre Channel
   All of the above ( Your answer)
49
Q
Which of the following answers refers to a lower-cost alternative to Fibre Channel technology?
   ATM
   iSCSI ( Missed)
   InfiniBand ( Your answer)
   MPLS
A
Which VPN type enables direct communication links between remote hosts on a WAN?
   Site-to-site VPN
   DMVPN ( Missed)
   Remote-access VPN
   Client-to-site VPN ( Your answer)
50
Q

Which of the answers listed below refer(s) to PPP? (Select all that apply)
Network protocol used for connecting devices on a WAN ( Your answer)
Enables encapsulation of IP traffic ( Your answer)
Used for establishing a direct connection between two networked devices ( Your answer)

A
Which of the following enables VoIP calls between PBXs?
   VTP
   PSTN ( Your answer)
   SIP trunk ( Missed)
   PPPoE