MeasureUp3 Flashcards
What wireless standard operates at 5 GHz, offers about 35 meters, and transmissions speeds up to 54 MPS,
802.11a
You need to install an update on all computers that receive their IP address thru DHCP. What would you use to identify and locate the computers,
Physical network diagram
FTP and SMTP are implemented at which layer of the OSI,
Application Layer
What protocol is a connection oriented protocol that is responsible for sequencing and acknowledging packets,
TCP
What does it mean that a firewall defaults to using implicit deny,
Unsolicited traffic is blocked unless a rule allows the traffic to pass
On the sidewalk outside a diner, you see a symbol with 2 overlapping circles and the word ‘philnet’, this is an example of what,
War chalking
What does a RF spectrum analyzer do,
can be used to check signal strength for special radio frequency
TCP and UDP are implemented at which layer of the OSI model
Layer 4
A network has 100 routers. You need to reduce the overhead associated with exchanging routing table updates between routers–do what,
Use OSPF–and enable route summarization also called route aggregation
Financial, contractual and inventory life cycle accountability for computer hardware and software resources is know as what,
Asset management
ICMP is implement at which layer of the TCP/IP Model
Internet Layer
What protocol in the TCP/IP protocol suite is responsible for reporting errors and providing info about packet delivery
ICMP
What type of software can analyze encrypted traffic and drop packets that contain suspicious data,
Host-based IPS
Wireless network devices using the 802.11g standard communicate on which frequency,
2.4 Gigahertz (GHz)
What protocol is used to securely send data from a web browser to a web server,
TLS–Transport Layer Security is used to encrypt HTTPS and other TCP/IP Protocols
Your network is attached to the internet thru a T3 connection. You add a firewall to create a DMZ and install a web server in the DMZ–2 where doc
Logical network and Physical network diagram
Which protocol in the TCP/IP protocol suite allows you to securely monitor network attached devices,
SNMPv3
What is SSO
Singe sign on–provides authentication credentials once authenticated
What is an evil twin
A computer configured to act like a WAP
You want to receive alerts if unusual activity is detected relating to web servers deployed in your perimeter network–do what
Deploy an intrusion detection system (NIDS)
Which tools can you use to identify a rogue DHCP server–2 answers
Packet sniffer and IDS
The Network layer of the OSI model is responsible for managing what function
Routing and subletting
A host is having trouble connecting to the network. You issue a ping command 127.0.0.1 and do not receive a reply–Why 2 ans.
Network adapter is not functioning and The TCP/IP drivers are corrupt
When would you configure a wireless network with an Extended Service Set Identifier (ESSID)
To configure multiple access points as a logical wireless local area network (WLAN) segment