Measure up questions1 Flashcards

1
Q

a host is having trouble connecting to the network. You issue ping 127.0.0.1 No reply–why? 2 answers,

A

The TCP/IP drivers are corrupt & Network adapter is not functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When designing a network infrastructure, where is the required bandwidth necessary to meet minimum performances target documented,

A

Baseline documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logical Network diagram,

A

Describes the network from a logical standpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To what does convergence refer in reference to network routers? (choose 2),

A

All network routers contain correct route information & The network is in a steady state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cache Array Routing Protocol (CARP) is used for what purpose,

A

Load balancing proxy cache servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious program that resides in the memory, copies itself and sends copies of itself to other networks hosts is known as what,

A

A worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Trojan,

A

A program that appears to be one thing but actually something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Virus,

A

Similar to a worm but must attach itself to another program or file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to identify if any applications are using clear text password, what should you use,

A

Packet sniffer–capture and analyze packets passed by network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Syslog,

A

Standard that is used in computer data logging and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which DHCP option should you use to identify the IP address of DNS servers that DHCP clients can use,

A

Option 6 identifies the IP address of the DNS servers to that DHCP clients can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP Option 1,

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DHCP Option 3,

A

Identifies the IP addresses of routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DHCP Option 15,

A

Identifies the DNS domain name that should be used in names resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use a butt set,

A

When checking for a dial tone on the line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog messages,

A

A severity of 0 represents a severity of Emergency, computer is not useable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Syslog–Severity of 1

A

Identifies an alert message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Syslog–Severity of 6

A

Identifies an information message–no action required

19
Q

What is the role of a switch in 802.1x port-based authentication,

A

Authenticator

20
Q

What is a scenario where a unidirectional antenna would be better than an omnidirectional antenna,

A

To communicate between one WAP and a wireless bridge

21
Q

Name a LAN technology that is packet-switching technology,

A

MPLS–Multiprotocol Label Switching

22
Q

How can you mitigate the risk of a Smurf attack,

A

Prevent routers and computers from responding to ICMP requests

23
Q

You cannot connect using its name. You need to run a command on a Linux computer to query DNS for computer’s IP address,

24
Q

What type of connector is used with 10BaseT Ethernet networks,

A

RJ-45–also on 100BaseT; and 10GBaseT networks

25
What type of connector is used with 10Base2 Ethernet networks,
BNC
26
What type of connector is used with RG-58 coaxial cable networking implementations
BNC
27
What is most likely cause of crosstalk,
Poor Cable placement
28
What is a limitation of both RIP and RIPng,
They do not support authentication
29
You are using SNMP to manage network devices--what port,
UDP port 161
30
What information can you obtain by using a protocol analyzer
The source address, destination address and payload for each packet on network
31
What is RADIUS,
Centralized authentication management
32
Which ports are used for traffic that is required to resolve host names to IP addresses,
TCP port 53 and UDP port 53
33
Name 2 authentication methods to provide centralized management of remote user authentication and authorization,
Terminal Access Controller Access Control System and RADIUS
34
What type of software can analyze encrypted traffic and drop packets that contain suspicious data,
Host based IPS
35
What would you use to determine where to install additional wireless access points,
Use an Radio Frequency (RF) spectrum analyzer
36
What is the most likely cause of interference on an 802.11g network
Cordless phones
37
What device is used to connect a router to a T1 line,
CSU/DSU
38
A local IPv6 link local address will begin with what prefix
FE80
39
A server is running Windows Server 2003. You need to determine whether the server's network adapter is a bottleneck-what should you do,
Capture a performance log
40
Multiple hubs connected to a linear backbone is an example of a:
hybrid topology
41
For what purpose would you use a T1 crossover cable,
To connect a PBX to another PBX
42
What is the primary goal of change management
Providing an approach for dealing with change
43
Which kind of attack can be mitigated by using TLS
man in the middle attack--TLS is one encryption protocol commonly used with web traffic
44
For what purpose would you use a virtual switch,
To allow communication between two virtual machines (VMs)