MeasureUp3 Flashcards

1
Q

What wireless standard operates at 5 GHz, offers about 35 meters, and transmissions speeds up to 54 MPS,

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You need to install an update on all computers that receive their IP address thru DHCP. What would you use to identify and locate the computers,

A

Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FTP and SMTP are implemented at which layer of the OSI,

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol is a connection oriented protocol that is responsible for sequencing and acknowledging packets,

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does it mean that a firewall defaults to using implicit deny,

A

Unsolicited traffic is blocked unless a rule allows the traffic to pass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On the sidewalk outside a diner, you see a symbol with 2 overlapping circles and the word ‘philnet’, this is an example of what,

A

War chalking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a RF spectrum analyzer do,

A

can be used to check signal strength for special radio frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

TCP and UDP are implemented at which layer of the OSI model

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A network has 100 routers. You need to reduce the overhead associated with exchanging routing table updates between routers–do what,

A

Use OSPF–and enable route summarization also called route aggregation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Financial, contractual and inventory life cycle accountability for computer hardware and software resources is know as what,

A

Asset management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ICMP is implement at which layer of the TCP/IP Model

A

Internet Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol in the TCP/IP protocol suite is responsible for reporting errors and providing info about packet delivery

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of software can analyze encrypted traffic and drop packets that contain suspicious data,

A

Host-based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless network devices using the 802.11g standard communicate on which frequency,

A

2.4 Gigahertz (GHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol is used to securely send data from a web browser to a web server,

A

TLS–Transport Layer Security is used to encrypt HTTPS and other TCP/IP Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Your network is attached to the internet thru a T3 connection. You add a firewall to create a DMZ and install a web server in the DMZ–2 where doc

A

Logical network and Physical network diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which protocol in the TCP/IP protocol suite allows you to securely monitor network attached devices,

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SSO

A

Singe sign on–provides authentication credentials once authenticated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an evil twin

A

A computer configured to act like a WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You want to receive alerts if unusual activity is detected relating to web servers deployed in your perimeter network–do what

A

Deploy an intrusion detection system (NIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which tools can you use to identify a rogue DHCP server–2 answers

A

Packet sniffer and IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Network layer of the OSI model is responsible for managing what function

A

Routing and subletting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A host is having trouble connecting to the network. You issue a ping command 127.0.0.1 and do not receive a reply–Why 2 ans.

A

Network adapter is not functioning and The TCP/IP drivers are corrupt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When would you configure a wireless network with an Extended Service Set Identifier (ESSID)

A

To configure multiple access points as a logical wireless local area network (WLAN) segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You employees are being targeted by phishing attacks. How can you minimize the impact of these–2 answers,

A

Through enforced policies and procedures & user education

26
Q

You want to view IP address info on a computer running UNIX–what should you use

A

Run ifconfig

27
Q

A router has a static routing table and is not configured with a default route. It receives a packet that does not have an associated routing table entry–result,

A

The router discards the packet and sends an error message to the sender

28
Q

When configuring port security to manage inbound and outbound traffic through a firewall, what info do you need to provide

A

Protocol and port number

29
Q

What term is used to refer to a network link carrying multiple virtual local area networks (VLANs) between 2 switches,

A

Trunking

30
Q

What is PoE,

A

a way of delivering electric current over data lines

31
Q

What is a DHCP reservation,

A

An IP address that will always be leased to a specific device on the network

32
Q

Span Tree Protocol,

A

facilitates redundant links between segments connected with Layer 2 switches

33
Q

What protocol is the distance vector routing protocol supported by the widest variety of routers that can be used to route packets between networks that use VLSM

A

RIPv2 supports variable length subnet masks (VLSM)

34
Q

What is a limitation of both RIP and RIPng,

A

They do not support authentication

35
Q

you need to configure a VPN that lets you establish an end to end connection over the Internet between 2 network hosts–tunnel between host–use what,

A

Layer 2 Tunneling Protocol (L2TP)

36
Q

What type of service does PPTP provide for VPNs,

A

It provides server to server tunnel only

37
Q

What physical access method is used by 10GBase configurations,

A

Full duplex connected by switches

38
Q

You want to configure secure authentication and encryption for RDP. You configured RDP support over Windows Server 2003 Terminal Services–use what,

A

TLS

39
Q

Cache Array Routing Protocol (CARP) is used for what purpose,

A

Load balancing proxy cache servers

40
Q

Which wireless broadband technology supports roaming Internet access using mobile phones

A

LTE–Long Term Evolution

41
Q

What connector is used in connecting fiber in a 100Base-FX network,

A

ST–could also use SC

42
Q

What is the available bandwidth for data transmissions using Integrated Services Digital Network Basic Rate Interface (ISDN BRI)

A

128 Kbps

43
Q

Which WAN technology reliably offers data transmission at 1.544 Mbps,

A

T1

44
Q

What is the transmission rate of a T3,

A

44.738 Mbps

45
Q

A user reports problems access files in a shared folder. You need to troubleshoot and resolve the problem–do next,

A

Ask whether the user can connect to other network resources

46
Q

What type of documentation is created immediately after installing a network and is later used to identify the impact of a change,

A

Baseline–set of performance statistics

47
Q

10BaseT Ethernet networks are wired using what physical topology,

A

Star–with host connecting to a central switch or hub

48
Q

Which LAN cable is a fiber optic cable that supports a cable length of 40 Kilometers

A

10GBASE-EW–supports interoperability with SONET

49
Q

Which LAN technology is used with 802.11x wireless to attempt to avoid collisions

A

CSMA-CA

50
Q

You deploy a WAP in your office. Some users complain that they have low signal strength when connecting. What should you do–2 ans

A

Move WPA and deploy another WPA

51
Q

What is the role of a switch in 802.1x port based authentication,

A

Authenticator

52
Q

A process of quarantining a system until it has a specific security update applied is an example of,

A

Network Access control

53
Q

On which layer of the TCP/IP model do routers operate,

A

Internet Layer

54
Q

How does a router that uses RIP determine the next hope to use when routing packets,

A

Based on fewest physical hops

55
Q

What is Bandwidth throttling,

A

It is a type of traffic shaping that allows you to limit bandwidth by a specific application, such as a web site.

56
Q

What type of device can prioritize VoIP network traffic based on QoS,

A

Multilayer switch

57
Q

You have just completed installing CAT 5 in a new installation. What should you do to ensure the installation meets TIA standards

A

Test the installation using a certifier

58
Q

Your network includes a link to a remote office. You need to determine the actual throughput offer that link, what should you do,

A

Run a throughput test

59
Q

Name 2 technologies that provide encryption and authentication,

A

IPsec and PPP

60
Q

An LC connector,

A

is a small form SC connector