Final Exam Study Guide Flashcards
What is the popular protocol for today’s VPNs?
PPTP, L2TP, SSL.TLS, OpenVPN, IPsec VPN
Where do static VLANs assign VLANS to?
Ports
What is the most common method used to configure a LAN-capable switch?
SSH
What layer of the OSI model does a content switch work?
Layer 7
What does an IDS do?
Inspects packets, looking for active intrusions.
What client is needed to access IPv6 content on the internet?
Global unicast address
Is NAT needed with IPv6?
No, router advertisements are used
What is required to receive an IPv6 address automatically?
Multicast address
What kind of DNS records do IPv6 addresses use?
AAAA record
What service do tunnel brokers provide?
Create an actual tunnel to offer a custom-made endpoint client
What device do you use to connect to a T1 line?
RJ-48C
What is SONET used for?
Long-distance, high-speed, fiber-optic transmissions
What protocol do cable modems use?
DOCSIS
What device provides the fastest throughput?
DWDM
What does SIP stand for?
Session Initiation Protocol
Which technology enables the use of a WAP without directly connecting the WAP to an AC power outlet?
PoE
Where should the WAP be placed to achieve maximum Wi-Fi coverage?
Center of a room
What is known as a Basic Service Set in infrastructure mode?
A single WAP
What is the most secure method of wireless encryption?
AES
What consumer electronics cause interference with 802.11n wireless networks?
Mobile phone
What are the advantages of a virtual machine over a physical machine?
Power saving, hardware consolidation, system recovery, system duplication, and research
What needs to be upgraded on a host machine to enable running more virtual machines simultaneously?
RAM
What feature lets you save a VM’s state so you can quickly restore to that point?
snapshot
What enables 2 VMs hosted on the same physical machine to communicate without leaving the machine itself?
hypervisor
If you don’t own a server, what can you do to quickly create a new server to run a new service?
public cloud
What cellular WAN technology introduced the SIM card?
GSM
In order to pair to another Bluetooth device, the device must be set to what?
discovery or discoverable mode
A thermostat that you can control with an app on your smartphone, is an example of what?
IoT
What network technology does a TV remote use?
IR
How can you reduce your vulnerability to an open SSID?
Running HTTPS
What is a unique server function?
Network authentication
What standard is used by most NAS devices to enable them to connect easily to almost any network?
CIFS
Adding a generator to a server room is an example of what?
Power redundancy
What is the centerpiece of an ICS?
ICS server
What must be completed during and after change to the IT infrastructure?
Document changes
What is the job of a first responder?
Deciding whether an incident should be addressed, ignored, or escalated; evaluate scope and cause; preventing further disruption; resolving cause; restoring order to affected systems; and identifying ways to prevent a recurrence.
What is succession planning?
Identifying people who can take over certain positions in case the people holding those critical positions are incapacitated or lost in an incident.
When working inside equipment, what should you do?
Properly connect an anti-ESD wrist strap
The placement of a rack should optimize what?
Optimize the airflow
A hacker who sends an email but replaces the return email with a fake one is called what?
Spoofing
What is an attack where someone tries to hack a password using every possible password permutation?
Brute force
What kind of attack occurs when a user’s machine is locked to a screen telling the person they must call a number to gain access.
Ransomware
A compromised computer with malware to support a botnet is a what?
DDoS
What is Wireshark?
Protocol analyzer
Where does a packet sniffer store collected information?
Capture file
What tools allows you to compare network performance with a baselined network performance?
Graphing program
What tool allows you to capture and analyze traffic between two workstations?
Performance monitor
Know the troubleshooting steps
Establish a theory of probable cause, Test the theory to determine cause, Establish a plan of action and identify potential effects, Implement the solution or escalate as necessary, verify full system functionality and implement preventative measures, and Document findings, actions, and outcomes
Know what you should be doing during Problem Isolation.
Identify problem by gathering information, duplicate problem, question users, and identify symptoms. Determine in anything has changed the network. Approach multiple problems individually.