MeasureUp2 Flashcards

1
Q

What distance vector routing protocol is used for routing packets between host and provides the best interoperability between routers made by multiple vendors

A

RIPv2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two statements that describe a network layer firewall,

A
  1. it prevents incoming traffic addressed to a specific port. 2. It can either be stateful or stateless
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What 1000BaseX cable supports single-mode fiber,

A

1000BASE-LX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which 2 wireless standards support channel bonding,

A

802.11n and 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe a MTRJ connector

A

a duplex fiber optic connector used with multimode fiber only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe a SC connector

A

modular connector used with single mode fiber systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe a ST connector

A

ST is a bayonet mount and the most popular of multimode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You plan to connect an IDS to a switch port–what feature must the switch support

A

Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T or F– A bridge lets you connect 2 different media types as one logical subnet,

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What device is used to connect a router to a T1 line

A

CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does traffic shaping do,

A

controls bandwidth usage, letting you identify priority traffic to support latency sensitive applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wide area network technology offers 78 Mbps wireless transmission,

A

WiMAX–is based on 802.16 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your company’s public web site hosts a critical app that needs 24/7 uptime. Solution for peak times.

A

Implement load balancing–one server fails other servers are available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do SSL 2.0 and TLS 1.2 compare for providing internet security,

A

TLS 1.2 is more secure and is not connection compatible with SSL 2.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

2 or more network interfaces on a computer are combined to provide redundancy and increase the amount of throughput–referred as,

A

Bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what category of twisted pair cable do you use when wiring 10GBaseT Ethernet network,

A

CAT 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What statement best characterizes the concept of latency in a routed network environment,

A

Latency is the time it takes to a packet to travel from its source to its destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what are the recommended channels in the US for 802.11g,

A

1,6,11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what are the recommended channels in the rest of the world for 802.11g,

A

1,5,9,13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What information can you obtain by using a protocol analyzer

A

The source address, destination address and payload for each packet on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

you need a firewall that can intercept packets and block inappropriate packets that use a specific protocol such as FTP and DNS–what kind of firewall,

A

An application layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe a network firewall

A

Does not perform detailed content inspection and is less sophisticated. Operates on Network layer of OSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Describe a stateless firewall,

A

filters based on packet header info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Describe a stateful firewall,

A

Monitors active connections and filters in the context of connections thru which they are passed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Deploying VoIP on Network, you need to be able to ensure that VoIP is given priority so that it has sufficient bandwidth with–do what,

A

Implement traffic shaping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

For what purpose is UDP port 67 used,

A

IP address assignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

For what purpose would you use a virtual switch,

A

To allow communication between 2 virtual machines

28
Q

What metric does OSPF use to determine the path to a destination,

A

Lowest cost

29
Q

When would you use a stateful firewall to filter traffic,

A

To filter by monitoring connections and allowing valid traffic by connection type

30
Q

Which virtualization component would allow end user data to be stored centrally in the data center but then accessed using a RDC

A

A virtual desktop

31
Q

T or F–WPA2 Enterprise does not require an authentication server,

A

False–it would require an authentication server such as RADIUS

32
Q

What is the primary purpose of Dynamic DNS,

A

To allow DNS client computers to dynamically update their resource records with the DNS server

33
Q

The primary benefit of using STP over UTP is that STP,

A

has better immunity to EMI

34
Q

Multiple hubs connected to a linear backbone is an example of a,

A

hybrid topology

35
Q

What protocol is used to fine a network device’s MAC address when its IP address is known

A

ARP

36
Q

What device can you use to notify an administrator without disrupting normal network access if traffic patterns indicate an attacker is attempting DOS attack

A

IDS–monitors traffic on network & can be configured to alert admins

37
Q

Authentication protocol that supports mutual authentication between clients and servers on LAN

A

Kerberos–port 88

38
Q

You are using SNMP to manage network devices–what port SNMP agent listen for request from SNMP manager,

A

UDP 161

39
Q

SNMP manager to receive SNMP notifications, which are known as traps in SNMPv1,

A

UDP 162

40
Q

You need to configure your perimeter network so that firewalls can be automatically reconfigured in response to threats

A

Deploy an intrusion prevention system (IPS)

41
Q

When designing a network infrastructure where is the required bandwidth necessary to meet minimum performance targets documented

A

Baseline documentation

42
Q

What is a property of DHCP scope,

A

A rang of IP addresses that can be dynamically assigned to clients

43
Q

Your network is connected with a large number of Layer 2 switches–poor performance–why,

A

A broadcast storm caused by switching loops

44
Q

How many bits are used to define an IPv4 address

A

32

45
Q

What is the role of an Interior Gateway Protocol in a network infrastructure,

A

To exchange routing information with autonomous networks

46
Q

What does an autonomous network refer,

A

A private LAN or set of LANs

47
Q

Which types of connectors can be used with 100BASE-FX cable–2 answers

A

ST and SC connectors

48
Q

What does a RS connector connect to,

A

Serial devices–legacy peripherals

49
Q

What is a RG-6,

A

Coaxial cable that is commonly used in cable to installations

50
Q

Your network is configured to a single IP subnet, Multiple hubs connect–what would improve performance,

A

Install a switch

51
Q

Which LAN technology is a packet-switching technology,

A

MPLS–Multiprotocol Label Switching

52
Q

What physical network topology provides the best reliability,

A

Mesh, because there are multiple paths to each node

53
Q

What is a disadvantage to Mesh topology

A

Cost of implementation

54
Q

You install a firewall–which server would you typically place in the DMZ,

A

Web server that hosts a public web site

55
Q

You are setting a wireless network–only employees can view wireless network–do what,

A

Disable SSID broadcasting

56
Q

A proxy server is used to connect the internal network to the Internet–Users the same info pages–optimize web site,

A

Enable caching on the proxy server

57
Q

You need to quickly test a cable terminator resistor. What should you use,

A

Multimeter–the resistance of a terminator resistors a measured in

58
Q

What command can your use to define a static route between two hosts,

A

route–route command allows you to create or view a static routing table

59
Q

Explain an omnidirectional antenna

A

sends and receives transmissions focused in a specific direction

60
Q

What mechanism is used to prevent data loops between switches operating on layer 2 of the OSI model

A

Spanning Tree Protocol

61
Q

What type of connector is used with 10BaseT Ethernet networks,

A

RJ-45

62
Q

Which term refers to a service provider offering a virtualized network solution hosed in its own data center

A

NaaS–

63
Q

Diagramming connection between network devices is an example of which of the following–

A

Cable management–documenting the cable plant

64
Q

What device is a layer 3 device that connectors different IP subnets

A

Router

65
Q

What is the fastest type of Ethernet that can run over CAT 3 Cable

A

10BASE-T