Mike Meyers - TOTAL: Network+ Certification N10-008 Udemy Course Flashcards

1
Q

At which Layer of the OSI Model do Routers Operate?

Layer 1
Layer 2
Layer 3
Layer 4

A

Layer 3 (Network Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many Bytes can a Frame hold?

Approximately 1500 Bytes
Approximately 1200 Bytes
Approximately 1000 Bytes
Approximately 600 Bytes

A

Approximately 1500 Bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an Example of a VALID MAC Address?

GG:00:45:ZC:00:4F
0A:24:D3:00:00:FF
Z0:4F:9H:6F:22:00
99:00:FF:FF:FH:11

A

0A:24:D3:00:00:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On which Layer of the OSI Model do NICs Operate?

Layer 1
Layer 2
Layer 7
Layer 6

A

Layer 2 (Data Link Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which device is used to connect two computers on two different networks?

Hub
Switch
Firewall
Router

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network topology uses a Central Device to connect All Hosts?

Star
Bus
Ring
Mesh

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of Radio Grade (RG) is the most common for Coaxial Cable?

RG-59
RG-8
RG-6
RG-32

A

RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following BEST describes an advantage of Coaxial Cable?

Very easy to work with when installing
It is very inexpensive
Highly resistant to EMI
The BNC connector makes termination much easier

A

Highly resistant to EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is the main difference between Multimode and Single-mode Fiber?

Multimode uses LED and Single-mode uses Laser
Multimode can travel farther than Single-mode
Multimode uses Laser and Single-mode uses Light
There really is NO difference.

A

Multimode uses LED and Single-mode uses Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There was recently a fire in the building in which you work and the UTP cabling was completely burned and gave off a very strong odor. Which grade of cabling was used?

Plenum Grade
Multimode Fiber
STP Grade
PVC Grade

A

PVC Grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT part of the Basic Ethernet Frame?

FCS
Source IP Address
Source MAC Address
Data Type

A

Source IP Address

Explanation:
Base Ethernet Frame:

FCS/CRC (Frame Check Sequence) > Data TYPE > DATA > MAC Address (Source & Destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of Connector is used for Terminating a UTP Cable?

RJ-11
RS-232
RJ-45
F-Type

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the order of Colors for the 568B standard?

Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown

Green/White + Green + Orange/White + Blue + Blue/White + Orange + Brown/White + Brown

Green/White + Blue + Orange/White + Blue + Brown/White + Brown + Blue/White + Green

Orange/Blue + Brown/White + Brown + Orange/White + Green + Blue/White

A

Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown

Explanation: (My Take)
The Greens are in the Middle for 568B.

The Greens are in the Front for 568A.
Green/White + Green + Orange/White + Blue + Blue/White + Orange + Brown/White + Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the MAIN difference between a Hub and a Switch?

A Hub puts all Hosts in their own Collision Domain
A Hub operates at Layer 1 and a Switch operates at Layer 4
A Hub uses ARP, and a Switch doesn’t.
A Switch puts all Hosts in their own Collision Domain.

A

A Switch puts all Hosts in their own Collision Domain.

Explanation:
Collision Domains in Hubs means that ALL Hosts belong to the Same Collision Domain. Only one device can transmit at a time, and all other Hosts “Listen” to the Network in order to avoid Collisions. Total Network Bandwidth is Shared among all Hosts.

In contrast, with Switches, each Host belongs to it’s own Collision Domain, eliminates the possibility of Collisions on a Switch because of Point to Point Connections. The same is true for Bridges, Switches, and Routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Technology is used for Devices to listen and see who is communicating?

ARP
CSMA/CD
Full-Duplex
CSMA/CA

A

CSMA/CD

Explanation:
CSMA/CD is a Technology used for devices to listen and see who is Communicating. Collision Detection.

ARP is a Method used to get the MAC Address of Hosts.

Full-Duplex is a Communication Mode where two devices can talk at the same time.

CSMA/CA is for Collision Avoidance rather than Detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these would be an example of Full Duplex?

Using a CB Radio
Talking on the Phone
Receiving a Text Message
Pinging a Device

A

Talking on the Phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Network Tech can connect two Switches with a Standard Straight-Through Cable. Why?

Today’s Switches have Auto-Sensing Ports
This is not accurate. The Tech needs a Crossover Cable
The Switch is malfunctioning
This cable looks like it works because there is a Link Light, but it is the wrong cable.

A

Today’s Switches have Auto-Sensing Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following standards uses Fiber Optic?

100Base-T
1000Base-T
10Base-T
1000Base-LX

A

1000Base-LX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There is a Small Network in an office with Two Switches connected to each other. A New Network Tech installs a Third Switch and connects it to the Second Switch. After this, the whole Network Crashes. Why would this happen?

The Network Tech created a Switching Loop
There was no Router Installed
Some Ports have been Disabled
The Switches were not Layer 3 Switches

A

The Network Tech created a Switching Loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which piece of hardware can be installed into a Switch to allow a Fiber Connection?

RJ-11 Connector
A Fiber Regenerator
An RS-232 to USB Convertor
SFP

A

SFP (Small Form-Factor Pluggable)

Explanation: (My Take)
SFP is a type of Transceiver that connects to a MSA Module slot on the Motherboard to allow any Fiber Connector to be used with any Switch.
There are 2 other types of SFP Transceivers - SFP+ which is the upgraded version of SFP, and Quad SFP (QSFP) which allows 40 Gigabit Ethernet.

Gigabit Interface Converter (GBIC)

Bidirectional (BIDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is NOT part of the Structured Cabling System?

Horizonal Runs
Wall Jacks
Equipment Room
Work Area

A

Wall Jacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which Tool is used to connect UTP Cable to a 110-Block?

Punchdown Tool
Toner Probe
Crimper
Screwdriver

A

Punchdown Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are talking to a Network Tech. He mentions the MDF and the IDF. What is the difference between the two of them?

The IDF is where the Main Equipment is stored for your Network.
The MDF ALWAYS houses the Demarc
The MDF is where the Main Equipment is stored for your Network.
An IDF is another term for the Work Area

A

The MDF is where the Main Equipment is stored for your Network

Explanation:
MDF = Main Distribution Frame - The room in a building that stores the demarc, telephone cross-connects, and LAN cross-connects.

IDF = Intermediate Distribution Frame - Telecommunications Room, The room where all the horizontal runs from all the work areas on a given floor in a building come together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When troubleshooting Structured Cabling, you notice that you cannot access any Network resources or get on the Internet. You cannot even ping another Host on your Subnet. What would be the MOST logical thing to check first?

The Horizonal Runs
The Configuration on the Router
If your Computer has an IP Address
If the NIC has a Link Light

A

If the NIC has a Link Light

Explanation:
The first thing to check if you cannot access ANYTHING AT ALL is the Link Light.
The Link Light will verify that you have a Connection.

Checking for an IP Address is an Earlier Step, it isn’t the MOST logical one based on the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How many inches is a "U"? 1.5" 1.75" 1" .5"
1.75"
26
What would 239 be in Binary? 10101010 11001111 11101111 11110011
11101111
27
What is the Broadcast Address for ARP? FF:FF:FF:FF:FF:FF 00:00:00:00:00:00 1A:2B:3C:4D:5E:6F 11:11:11:11:11:11
FF:FF:FF:FF:FF:FF
28
Which command will show the ARP Cache? arp -v arp -q arp -c arp -a
arp -a
29
What would the Subnet Mask be for Network 172.16.3.0 /24? 255.255.0.0 255.255.255.0 255.0.0.0 256.255.0.0
255.255.255.0
30
When using Class Licenses, what is the Range for a Class A IP Address? 0 - 126 128 - 191 192 - 223 224 - 239
0 - 126 Explanation: Class A = 0 - 126 Class B = 128 - 191 Class C = 192 - 223 Class D = 224 - 239
31
What would the Subnet Mask be for a Network that is 194.55.4.3 /26? 255.255.255.0 255.255.255.128 255.255.255.192 255.255.0.255
255.255.255.192
32
Which Protocol uses UDP? TFTP HTTP IMAP SNMP
TFTP (Trivial File Transfer Protocol) Explanation: UDP = Connectionless
33
Many users are complaining that they cannot get on the Internet. You arrive at one user's computer and ping the company's Router and it's successful. What would be the next command you should type? netstat nslookup net use tracert
tracert Explanation: This will determine if there's a problem once the data leaves the company's Router.
34
Elliot is a new Network Tech at a company, and he is learning about Wireshark. He asks you the general purpose of the program. What would you say is the BEST description of Wireshark? It is a tool that captures packets and frames and examines them at a more granular level. It is a tool that can figure out why hosts cannot reach a DHCP server. It is a tool that only works on Linux systems, and it captures and analyzes frames larger than usual. It is an expensive tool that provides a diagram of your network.
It is a tool that captures packets and frames and examines them at a more granular level.
35
You are using netstat, and you want to show all Active Ports. What would you type? netstat -n netstat -o netstat -b netstat -a
netstat -a Explanation: -n = Will show Foreign Addresses in a Numerical Format (Cleans up the Report) -b = Shows the executable for every connection. -o = Will show the Process ID column. -a = Shows all ACTIVE/OPEN Ports.
36
Which PORT does HTTP use? 20 80 143 443
80
37
What is the proper name for a DNS server that can respond to a query with their own DNS information? Authoritative Administrative Authenticated Admissible
Authoritative
38
Which type of record is used with IPv4? AAAA Record CNAME MX A Record
A Record Explanation: A = IPv4 AAAA = IPv6 CNAME = Alias MX = Mail Exchange Servers
39
You type www.google.com and you receive an error. However, if you type a known IP address for Google, it works. What might be the problem? DHCP Scope Issue Misconfigured IP Address Incorrect Default Gateway DNS
DNS (Domain Name System) Explanation: DNS = Resolves FQDN to IP Addresses
40
You are using DHCP on your home Network, but you cannot access a Web Site based on its Host Name. What is MOST likely the problem? You have an APIPA Address You are not getting DNS Settings from DHCP Your preferred DNS Server isn't configured propertly Your home Router is failing
You are not getting DNS Settings from DHCP
41
Which tool is used for testing DNS using a third-party tool? dig nslookup ping netstat
dig
42
What is an example of Authentication? Accessing a Folder you were granted rights to? Showing an ID Proving through Credentials that you have rights to a System. Using a Retinal Scanner
Proving through Credentials that you have rights to a System.
43
What are the 3 Methods of Security Access to a System? Identification, Authentication, Authorization Identification, Automating, Authorization The "Three Ps" - Proof, Proper Rights, and Proper Access Authorization, Authentication, Accessibility
Identification, Authentication, Authorization
44
A User needs to enter a high clearance area that requires a PIN on a touchpad and a retinal scan. What type of authentication is this? Multi-factor Authentication More than Once Authentication Mult-user Authentication Single Sign-On
Multi-factor Authentication
45
Which would be an example of Role-Based Access control? Logging in with a Username and Password to Access a System Assigning Rights to a Folder based on a User Labeling a Resource with a specific Name that would provide Access Placing an "Owner" Label on a User Account
Assigning Rights to a Folder based on a User Explanation: Role Based is assigning users and groups specific rights to specific resources. Authentication is Logging in with a Username and Password Mandatory Access Control is Labeling a Resource with a Specific Name that would provide Access Discretionary Access Control is placing an "Owner" Label on a User Account
46
Which of the following is a benefit of Virtualization? It allows you to create more efficient VPNs Hardware consolidation It's very expensive, but worth the price It can run on very low-end computers
Hardware consolidation
47
What is meant by Network Function Virtualization (NFV)? It removes the control plane and replaces it with a Network Control that dictates how physical and virtual devices move traffic. It is a type of hypervisor It is a Network Architecture that describes how physical network devices will be virtualized It allows one switch to be electronically broken down into several broadcast domains.
It is a Network Architecture that describes how physical network devices will be virtualized
48
In Cloud Computing, what is meant by Elasticity? Increasing or decreasing application instances based on need. Running a VM using more or less of the host's resources based on need. Supporting multiple customers on the same device or infrastructure. Stretching a host computer's resources as much as possible to support one virtual machine.
Increasing or decreasing application instances based on need.
49
You have an application that you are developing, but you don't want the hassle of setting up servers, ACLs, backups, and managing them. Which type of cloud service would you use? Software as a Service (SaaS) Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Infrastructure as Code (IaC)
Platform as a Service (PaaS)
50
When discussing Infrastructure as Code (IaC), what does automation mean? Using code to provision and maintain systems in a consisten manner. Creating pipelines that automate using longer sequences. Automatically updating services using Windows Update Running serveral instances of an application automatically.
Using code to provision and maintain systems in a consisten manner.
51
Which of the following data center implementations connects the access and core layers through the distribution layer? Spine-and-Leaf Architecture Top-of-Rack Switching Three-Tiered Architecture North-South Traffic Flow
Three-Tiered Architecture (Classic)
52
Big Corp's data center has a fiber and cable ISP. What aspect of security does this represent? Active-Passive Multipathing Redundancy Clustering
Redundancy
53
Which document contains details about all the hardware and software installed in a datacenter and provides the foundation for future upgrades? Baseline Configuration Logical Network Diagram Performance Baseline System Diagram
Baseline Configuration
54
What network type connects multiple networks within a city range? Wide Area Network (WAN) Local Area Network (LAN) Metropolitan Area Network (MAN) Campus Area Network (CAN)
Metropolitan Area Network (MAN)
55
Which is an example of IoT using your wireless network to connect to IoT Services? Amazon Echo base connecting to your home router. Using your phone as a hot spot to get a smart bulb to work. Asking Siri a question and her searching the Internet for you. Opening a garage door from your phone.
Amazon Echo base connecting to your home router.
56
You have several devices connected to your network. You recently purchased cameras for your house. What would be the BEST way to secure your cameras so nobody can hack you and get the footage? Place a physical lock on the cameras Place the cameras in a separate VLAN Use a separate SSID for the cameras Contact your ISP and pay more money for another line to your hosue just for the cameras.
Place the cameras in a separate VLAN
57
With VoIP, which Port does Session Initiation Protocol (SIP) use? 3389 5060/5061 143 80
5060/5061
58
Which policy describes what users can and cannot do with company equipment? Acceptable Use Policy (AUP) Non-Disclosure Agreement (NDA) BYOD Policy (Bring Your Own Device) Memorandum of Understanding (MOU)
Acceptable Use Policy (AUP)
59
You work as a Network Tech for an advertising agency. The art departement is going to be going from local installation of Adobe products to the Adobe Creative Cloud. After the conversion, which document should you update? Statement of Work (SOW) Service Level Agreement (SLA) Change Management Memorandum of Understanding (MOU)
Change Management
60
What would be the MOST efficient method of installing Windows 10 Updates on Host Systems that are on the Network? Configure a deployment server that will pass all updates down to hosts. Test the updates first on a Virtual Machine to ensure their stability. Allow users to manually update their own systems. Download the updates to a USB stick and then manually install them on host computers.
Test the updates first on a Virtual Machine to ensure their stability. Explanation: The most efficient way is to test updates first, preferably on a virtual machine. Sure, you CAN configure a deployment server as this is common practice, but only AFTER you test the updates. Never allow users to manually update their systems as this can cause many problems. Downloading updates to a USB stick and manually installing them is not practical at all and would take forever in a large organization.
61
What would be an example of an external threat to Network Assets? Hackers Employees Water Main Break A Tropical Storm
Hackers
62
What would be the BEST example of a posture assessment? Assessing possible threats from threat actors Installing a Firewall Configuring ACLs on a Firewall Doing a Wireless
Assessing possible threats from threat actors
63
The CIA Model is a basic model for security. What does CIA stand for? Confidentiality, Integrity, and Availability Central Intelligence Agency Confidentiality, Intelligence and Accessibility Computers, Intelligence, Adaptibility
Confidentiality, Integrity, and Availability
64
Which would be an example of a Denial of Service (DoS) Attack? Masquerading Opening tons of Web Browser pages on a Computer VLAN Hopping Ping Flood
Ping Flood
65
Which would be the BEST example of an On-Path Attack (Man-in-the-Middle)? Listening in on a conversation between two network administrators. Connecting a laptop to an access point to sniff packets and intercept them. Hacking into someone's phone while they use Apple Pay A Ping Flood
Connecting a laptop to an access point to sniff packets and intercept them.
66
A standard user in a company receives an email from what looks like her bank. It requests that she click on a link to fix her account information. What type of social engineering is this? Phishing Masquarading Shoulder Surfing Whaling
Phishing
67
Which type of Malware seems innocent until you perform a specific action? Trojan Worm Virus Adware
Trojan
68
When discussing end of life for a device, what is an important thing to have within your oganization? Asset Tags An MSDS City Ordinances A locker to place old items
Asset Tags
69
Which tool allows Network admins to manage their Network remotely? ICMP SNMP Netstat NSLookup
SNMP (Simple Network Management Protocol)
70
Which is the most common tool used for Network Monitoring? Syslog Performance Monitor Event Viewer Resoruce Monitor
Syslog
71
What might be an example of a Network metric? Memory Timings Bandwidth Use Dropped Packets CPU Usage
Bandwidth Use Explanation: Bandwidth usage is very important when determining if your Network is running at optimal performance. Memory Timing and CPU usage are more of a Local Hardware issue. Dropped Packets is something left for pinging another device.
72
Which might be an example of an SNMP Agent? A computer that needs to manage a printer on the Network A piece of software that monitors Network traffic. A Network admin with rights to manage Network traffic. A Printer that needs to be managed from another computer.
A Printer that needs to be managed from another computer.
73
What is the purpose of SIEM? It is a technology that handles all types of security monitoring and management. It is a way of enforcing any policy put in place for the network. It allows firewalls to use ACLs. It is a networking monitoring tool built into Windows.
It is a technology that handles all types of security monitoring and management.
74
A user calls and says they cannot get onto the Internet. Based on the Troubelshooting Model, what would be the first question to ask? What is the error that is coming up? Did you install anything new? What is your IP Address? When was the last time that you could get on the Internet?
What is the error that is coming up?
75
A user calls and says that they are getting an error while loading the company web page. You go over and try to get onto www.totalsem.com, it doesn't work. However, you type a known IP Address for totalsem and it works. You realize it is a DNS Problem. What do you do next? Reboot the DNS Server Ask other users if they can access the Website Establish a theory of why it is a DNS problem. Reboot the Router
Establish a theory of why it is a DNS problem.