Measure up questions2 Flashcards

1
Q

Which wireless networking security method used AES for data encryption,

A

Wi-FI Protected Access version 2 (WPA2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A 100BASE-T Ethernet network configured for full-duplex,

A

Uses one pair for receiving packets and another pair for sending packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What kind of cable would you use on a 1000BAS-TX on your network,

A

It requires a CAT ^

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is a connection oriented protocol that is responsible for sequencing and acknowledging packets,

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You need to be able to passively monitor activity in your perimeter network. Alerted at a potential hazard-use what,

A

A network intrusion detection system (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A contrator needs a document that shows the location of the network cabling in the building

A

Wiring diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name 2 tools you can use to identify a rogue DHCP server,

A

IDS and Packet Sniffer–IDS would analyze network traffic patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a difference between CSMA/CD and CSMA/CA,

A

CSMA/CD resends packets after a packet collision but a CSMA/CA does not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of an Interior Gateway Protocol (IGP) in a network infrastructure,

A

To exchange routing information within autonomous networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When would you use a stateful firewall to filter traffic

A

To filter by monitoring connections and allowing valid traffic by connection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which layer of the OSI model is responsible for frame sequencing and acknowledment

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens in a switch during port mirroring,

A

Packets are forwarded from one port to another for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following ports are open on your perimeter network firewall–22, 23, 443, 992. Greatest security risk,

A

23–open is a potential risk. Port 23 is used by unsecured telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pin order of T568A,

A

green/white, green; orange/white; blue; white with blue stripe; orange; brown/brown; brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You plan to connect and IDS to a switch port–what feature must the switch support,

A

Port Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What device simplifies network client configuration

A

SHCP Server

17
Q

What is the binary representation of the host portion of the IPv4 address 198.24.192/24

A

10000010

18
Q

What protocol is used to securely send data from a web browser to a web server,

A

TLS

19
Q

Authentication between client and severs on a local are network–must support Windows versions, Linux and UNIX

A

Kerberos

20
Q

Primary purpose of a loopback cable,

A

Troubleshooting

21
Q

You have a wireless network with a single WAP. You are experiencing latency issues with the network–2 ans what is the problem

A

Signal bounce is occurring and Packet collision is occuring

22
Q

You want to retrieve information about TCP/IP network connections and protocol statistics–what do you use,

A

Run Netstat

23
Q

What does it mean that a firewall defaults to using implicit deny,

A

Unsolicited traffic is blocked unless a rule allows the traffic to pass

24
Q

What TCP port is used to secure communications between web clients and web servers

A

Port 443

25
Q

What category of twisted pair cable should you use when wiring a 10GBaseT Ethernet network,

A

CAT 6

26
Q

What is the fastest type of Ethernet that can run over CAT 3 cable

A

10BASE-T

27
Q

What is the primary difference between the 568A and 568B wiring standards,

A

Pairs 2 and 3 are connected to different pairs