Final Exam Study Guide Flashcards

1
Q

What is the popular protocol for today’s VPNs?

A

PPTP, L2TP, SSL.TLS, OpenVPN, IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where do static VLANs assign VLANS to?

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most common method used to configure a LAN-capable switch?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What layer of the OSI model does a content switch work?

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does an IDS do?

A

Inspects packets, looking for active intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What client is needed to access IPv6 content on the internet?

A

Global unicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is NAT needed with IPv6?

A

No, router advertisements are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is required to receive an IPv6 address automatically?

A

Multicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of DNS records do IPv6 addresses use?

A

AAAA record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What service do tunnel brokers provide?

A

Create an actual tunnel to offer a custom-made endpoint client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device do you use to connect to a T1 line?

A

RJ-48C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SONET used for?

A

Long-distance, high-speed, fiber-optic transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol do cable modems use?

A

DOCSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What device provides the fastest throughput?

A

DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SIP stand for?

A

Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technology enables the use of a WAP without directly connecting the WAP to an AC power outlet?

A

PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where should the WAP be placed to achieve maximum Wi-Fi coverage?

A

Center of a room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is known as a Basic Service Set in infrastructure mode?

A

A single WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the most secure method of wireless encryption?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What consumer electronics cause interference with 802.11n wireless networks?

A

Mobile phone

21
Q

What are the advantages of a virtual machine over a physical machine?

A

Power saving, hardware consolidation, system recovery, system duplication, and research

22
Q

What needs to be upgraded on a host machine to enable running more virtual machines simultaneously?

A

RAM

23
Q

What feature lets you save a VM’s state so you can quickly restore to that point?

A

snapshot

24
Q

What enables 2 VMs hosted on the same physical machine to communicate without leaving the machine itself?

A

hypervisor

25
Q

If you don’t own a server, what can you do to quickly create a new server to run a new service?

A

public cloud

26
Q

What cellular WAN technology introduced the SIM card?

A

GSM

27
Q

In order to pair to another Bluetooth device, the device must be set to what?

A

discovery or discoverable mode

28
Q

A thermostat that you can control with an app on your smartphone, is an example of what?

A

IoT

29
Q

What network technology does a TV remote use?

A

IR

30
Q

How can you reduce your vulnerability to an open SSID?

A

Running HTTPS

31
Q

What is a unique server function?

A

Network authentication

32
Q

What standard is used by most NAS devices to enable them to connect easily to almost any network?

A

CIFS

33
Q

Adding a generator to a server room is an example of what?

A

Power redundancy

34
Q

What is the centerpiece of an ICS?

A

ICS server

35
Q

What must be completed during and after change to the IT infrastructure?

A

Document changes

36
Q

What is the job of a first responder?

A

Deciding whether an incident should be addressed, ignored, or escalated; evaluate scope and cause; preventing further disruption; resolving cause; restoring order to affected systems; and identifying ways to prevent a recurrence.

37
Q

What is succession planning?

A

Identifying people who can take over certain positions in case the people holding those critical positions are incapacitated or lost in an incident.

38
Q

When working inside equipment, what should you do?

A

Properly connect an anti-ESD wrist strap

39
Q

The placement of a rack should optimize what?

A

Optimize the airflow

40
Q

A hacker who sends an email but replaces the return email with a fake one is called what?

A

Spoofing

41
Q

What is an attack where someone tries to hack a password using every possible password permutation?

A

Brute force

42
Q

What kind of attack occurs when a user’s machine is locked to a screen telling the person they must call a number to gain access.

A

Ransomware

43
Q

A compromised computer with malware to support a botnet is a what?

A

DDoS

44
Q

What is Wireshark?

A

Protocol analyzer

45
Q

Where does a packet sniffer store collected information?

A

Capture file

46
Q

What tools allows you to compare network performance with a baselined network performance?

A

Graphing program

47
Q

What tool allows you to capture and analyze traffic between two workstations?

A

Performance monitor

48
Q

Know the troubleshooting steps

A

Establish a theory of probable cause, Test the theory to determine cause, Establish a plan of action and identify potential effects, Implement the solution or escalate as necessary, verify full system functionality and implement preventative measures, and Document findings, actions, and outcomes

49
Q

Know what you should be doing during Problem Isolation.

A

Identify problem by gathering information, duplicate problem, question users, and identify symptoms. Determine in anything has changed the network. Approach multiple problems individually.