MeasureUp3 Flashcards

1
Q

What wireless standard operates at 5 GHz, offers about 35 meters, and transmissions speeds up to 54 MPS,

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to install an update on all computers that receive their IP address thru DHCP. What would you use to identify and locate the computers,

A

Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTP and SMTP are implemented at which layer of the OSI,

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is a connection oriented protocol that is responsible for sequencing and acknowledging packets,

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean that a firewall defaults to using implicit deny,

A

Unsolicited traffic is blocked unless a rule allows the traffic to pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On the sidewalk outside a diner, you see a symbol with 2 overlapping circles and the word ‘philnet’, this is an example of what,

A

War chalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a RF spectrum analyzer do,

A

can be used to check signal strength for special radio frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP and UDP are implemented at which layer of the OSI model

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network has 100 routers. You need to reduce the overhead associated with exchanging routing table updates between routers–do what,

A

Use OSPF–and enable route summarization also called route aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Financial, contractual and inventory life cycle accountability for computer hardware and software resources is know as what,

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP is implement at which layer of the TCP/IP Model

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol in the TCP/IP protocol suite is responsible for reporting errors and providing info about packet delivery

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of software can analyze encrypted traffic and drop packets that contain suspicious data,

A

Host-based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless network devices using the 802.11g standard communicate on which frequency,

A

2.4 Gigahertz (GHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol is used to securely send data from a web browser to a web server,

A

TLS–Transport Layer Security is used to encrypt HTTPS and other TCP/IP Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your network is attached to the internet thru a T3 connection. You add a firewall to create a DMZ and install a web server in the DMZ–2 where doc

A

Logical network and Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which protocol in the TCP/IP protocol suite allows you to securely monitor network attached devices,

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SSO

A

Singe sign on–provides authentication credentials once authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an evil twin

A

A computer configured to act like a WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You want to receive alerts if unusual activity is detected relating to web servers deployed in your perimeter network–do what

A

Deploy an intrusion detection system (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which tools can you use to identify a rogue DHCP server–2 answers

A

Packet sniffer and IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Network layer of the OSI model is responsible for managing what function

A

Routing and subletting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A host is having trouble connecting to the network. You issue a ping command 127.0.0.1 and do not receive a reply–Why 2 ans.

A

Network adapter is not functioning and The TCP/IP drivers are corrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When would you configure a wireless network with an Extended Service Set Identifier (ESSID)

A

To configure multiple access points as a logical wireless local area network (WLAN) segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
You employees are being targeted by phishing attacks. How can you minimize the impact of these--2 answers,
Through enforced policies and procedures & user education
26
You want to view IP address info on a computer running UNIX--what should you use
Run ifconfig
27
A router has a static routing table and is not configured with a default route. It receives a packet that does not have an associated routing table entry--result,
The router discards the packet and sends an error message to the sender
28
When configuring port security to manage inbound and outbound traffic through a firewall, what info do you need to provide
Protocol and port number
29
What term is used to refer to a network link carrying multiple virtual local area networks (VLANs) between 2 switches,
Trunking
30
What is PoE,
a way of delivering electric current over data lines
31
What is a DHCP reservation,
An IP address that will always be leased to a specific device on the network
32
Span Tree Protocol,
facilitates redundant links between segments connected with Layer 2 switches
33
What protocol is the distance vector routing protocol supported by the widest variety of routers that can be used to route packets between networks that use VLSM
RIPv2 supports variable length subnet masks (VLSM)
34
What is a limitation of both RIP and RIPng,
They do not support authentication
35
you need to configure a VPN that lets you establish an end to end connection over the Internet between 2 network hosts--tunnel between host--use what,
Layer 2 Tunneling Protocol (L2TP)
36
What type of service does PPTP provide for VPNs,
It provides server to server tunnel only
37
What physical access method is used by 10GBase configurations,
Full duplex connected by switches
38
You want to configure secure authentication and encryption for RDP. You configured RDP support over Windows Server 2003 Terminal Services--use what,
TLS
39
Cache Array Routing Protocol (CARP) is used for what purpose,
Load balancing proxy cache servers
40
Which wireless broadband technology supports roaming Internet access using mobile phones
LTE--Long Term Evolution
41
What connector is used in connecting fiber in a 100Base-FX network,
ST--could also use SC
42
What is the available bandwidth for data transmissions using Integrated Services Digital Network Basic Rate Interface (ISDN BRI)
128 Kbps
43
Which WAN technology reliably offers data transmission at 1.544 Mbps,
T1
44
What is the transmission rate of a T3,
44.738 Mbps
45
A user reports problems access files in a shared folder. You need to troubleshoot and resolve the problem--do next,
Ask whether the user can connect to other network resources
46
What type of documentation is created immediately after installing a network and is later used to identify the impact of a change,
Baseline--set of performance statistics
47
10BaseT Ethernet networks are wired using what physical topology,
Star--with host connecting to a central switch or hub
48
Which LAN cable is a fiber optic cable that supports a cable length of 40 Kilometers
10GBASE-EW--supports interoperability with SONET
49
Which LAN technology is used with 802.11x wireless to attempt to avoid collisions
CSMA-CA
50
You deploy a WAP in your office. Some users complain that they have low signal strength when connecting. What should you do--2 ans
Move WPA and deploy another WPA
51
What is the role of a switch in 802.1x port based authentication,
Authenticator
52
A process of quarantining a system until it has a specific security update applied is an example of,
Network Access control
53
On which layer of the TCP/IP model do routers operate,
Internet Layer
54
How does a router that uses RIP determine the next hope to use when routing packets,
Based on fewest physical hops
55
What is Bandwidth throttling,
It is a type of traffic shaping that allows you to limit bandwidth by a specific application, such as a web site.
56
What type of device can prioritize VoIP network traffic based on QoS,
Multilayer switch
57
You have just completed installing CAT 5 in a new installation. What should you do to ensure the installation meets TIA standards
Test the installation using a certifier
58
Your network includes a link to a remote office. You need to determine the actual throughput offer that link, what should you do,
Run a throughput test
59
Name 2 technologies that provide encryption and authentication,
IPsec and PPP
60
An LC connector,
is a small form SC connector