Measure up questions1 Flashcards

1
Q

a host is having trouble connecting to the network. You issue ping 127.0.0.1 No reply–why? 2 answers,

A

The TCP/IP drivers are corrupt & Network adapter is not functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When designing a network infrastructure, where is the required bandwidth necessary to meet minimum performances target documented,

A

Baseline documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logical Network diagram,

A

Describes the network from a logical standpoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

To what does convergence refer in reference to network routers? (choose 2),

A

All network routers contain correct route information & The network is in a steady state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cache Array Routing Protocol (CARP) is used for what purpose,

A

Load balancing proxy cache servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious program that resides in the memory, copies itself and sends copies of itself to other networks hosts is known as what,

A

A worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Trojan,

A

A program that appears to be one thing but actually something else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A Virus,

A

Similar to a worm but must attach itself to another program or file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need to identify if any applications are using clear text password, what should you use,

A

Packet sniffer–capture and analyze packets passed by network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Syslog,

A

Standard that is used in computer data logging and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which DHCP option should you use to identify the IP address of DNS servers that DHCP clients can use,

A

Option 6 identifies the IP address of the DNS servers to that DHCP clients can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

DHCP Option 1,

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DHCP Option 3,

A

Identifies the IP addresses of routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DHCP Option 15,

A

Identifies the DNS domain name that should be used in names resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use a butt set,

A

When checking for a dial tone on the line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Syslog messages,

A

A severity of 0 represents a severity of Emergency, computer is not useable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Syslog–Severity of 1

A

Identifies an alert message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Syslog–Severity of 6

A

Identifies an information message–no action required

19
Q

What is the role of a switch in 802.1x port-based authentication,

A

Authenticator

20
Q

What is a scenario where a unidirectional antenna would be better than an omnidirectional antenna,

A

To communicate between one WAP and a wireless bridge

21
Q

Name a LAN technology that is packet-switching technology,

A

MPLS–Multiprotocol Label Switching

22
Q

How can you mitigate the risk of a Smurf attack,

A

Prevent routers and computers from responding to ICMP requests

23
Q

You cannot connect using its name. You need to run a command on a Linux computer to query DNS for computer’s IP address,

A

nslookup

24
Q

What type of connector is used with 10BaseT Ethernet networks,

A

RJ-45–also on 100BaseT; and 10GBaseT networks

25
Q

What type of connector is used with 10Base2 Ethernet networks,

A

BNC

26
Q

What type of connector is used with RG-58 coaxial cable networking implementations

A

BNC

27
Q

What is most likely cause of crosstalk,

A

Poor Cable placement

28
Q

What is a limitation of both RIP and RIPng,

A

They do not support authentication

29
Q

You are using SNMP to manage network devices–what port,

A

UDP port 161

30
Q

What information can you obtain by using a protocol analyzer

A

The source address, destination address and payload for each packet on network

31
Q

What is RADIUS,

A

Centralized authentication management

32
Q

Which ports are used for traffic that is required to resolve host names to IP addresses,

A

TCP port 53 and UDP port 53

33
Q

Name 2 authentication methods to provide centralized management of remote user authentication and authorization,

A

Terminal Access Controller Access Control System and RADIUS

34
Q

What type of software can analyze encrypted traffic and drop packets that contain suspicious data,

A

Host based IPS

35
Q

What would you use to determine where to install additional wireless access points,

A

Use an Radio Frequency (RF) spectrum analyzer

36
Q

What is the most likely cause of interference on an 802.11g network

A

Cordless phones

37
Q

What device is used to connect a router to a T1 line,

A

CSU/DSU

38
Q

A local IPv6 link local address will begin with what prefix

A

FE80

39
Q

A server is running Windows Server 2003. You need to determine whether the server’s network adapter is a bottleneck-what should you do,

A

Capture a performance log

40
Q

Multiple hubs connected to a linear backbone is an example of a:

A

hybrid topology

41
Q

For what purpose would you use a T1 crossover cable,

A

To connect a PBX to another PBX

42
Q

What is the primary goal of change management

A

Providing an approach for dealing with change

43
Q

Which kind of attack can be mitigated by using TLS

A

man in the middle attack–TLS is one encryption protocol commonly used with web traffic

44
Q

For what purpose would you use a virtual switch,

A

To allow communication between two virtual machines (VMs)