Mike Meyers - TOTAL: Network+ Certification N10-008 Udemy Course Flashcards

1
Q

At which Layer of the OSI Model do Routers Operate?

Layer 1
Layer 2
Layer 3
Layer 4

A

Layer 3 (Network Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many Bytes can a Frame hold?

Approximately 1500 Bytes
Approximately 1200 Bytes
Approximately 1000 Bytes
Approximately 600 Bytes

A

Approximately 1500 Bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an Example of a VALID MAC Address?

GG:00:45:ZC:00:4F
0A:24:D3:00:00:FF
Z0:4F:9H:6F:22:00
99:00:FF:FF:FH:11

A

0A:24:D3:00:00:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On which Layer of the OSI Model do NICs Operate?

Layer 1
Layer 2
Layer 7
Layer 6

A

Layer 2 (Data Link Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which device is used to connect two computers on two different networks?

Hub
Switch
Firewall
Router

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which network topology uses a Central Device to connect All Hosts?

Star
Bus
Ring
Mesh

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of Radio Grade (RG) is the most common for Coaxial Cable?

RG-59
RG-8
RG-6
RG-32

A

RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following BEST describes an advantage of Coaxial Cable?

Very easy to work with when installing
It is very inexpensive
Highly resistant to EMI
The BNC connector makes termination much easier

A

Highly resistant to EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which is the main difference between Multimode and Single-mode Fiber?

Multimode uses LED and Single-mode uses Laser
Multimode can travel farther than Single-mode
Multimode uses Laser and Single-mode uses Light
There really is NO difference.

A

Multimode uses LED and Single-mode uses Laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

There was recently a fire in the building in which you work and the UTP cabling was completely burned and gave off a very strong odor. Which grade of cabling was used?

Plenum Grade
Multimode Fiber
STP Grade
PVC Grade

A

PVC Grade

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is NOT part of the Basic Ethernet Frame?

FCS
Source IP Address
Source MAC Address
Data Type

A

Source IP Address

Explanation:
Base Ethernet Frame:

FCS/CRC (Frame Check Sequence) > Data TYPE > DATA > MAC Address (Source & Destination)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of Connector is used for Terminating a UTP Cable?

RJ-11
RS-232
RJ-45
F-Type

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the order of Colors for the 568B standard?

Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown

Green/White + Green + Orange/White + Blue + Blue/White + Orange + Brown/White + Brown

Green/White + Blue + Orange/White + Blue + Brown/White + Brown + Blue/White + Green

Orange/Blue + Brown/White + Brown + Orange/White + Green + Blue/White

A

Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown

Explanation: (My Take)
The Greens are in the Middle for 568B.

The Greens are in the Front for 568A.
Green/White + Green + Orange/White + Blue + Blue/White + Orange + Brown/White + Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the MAIN difference between a Hub and a Switch?

A Hub puts all Hosts in their own Collision Domain
A Hub operates at Layer 1 and a Switch operates at Layer 4
A Hub uses ARP, and a Switch doesn’t.
A Switch puts all Hosts in their own Collision Domain.

A

A Switch puts all Hosts in their own Collision Domain.

Explanation:
Collision Domains in Hubs means that ALL Hosts belong to the Same Collision Domain. Only one device can transmit at a time, and all other Hosts “Listen” to the Network in order to avoid Collisions. Total Network Bandwidth is Shared among all Hosts.

In contrast, with Switches, each Host belongs to it’s own Collision Domain, eliminates the possibility of Collisions on a Switch because of Point to Point Connections. The same is true for Bridges, Switches, and Routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which Technology is used for Devices to listen and see who is communicating?

ARP
CSMA/CD
Full-Duplex
CSMA/CA

A

CSMA/CD

Explanation:
CSMA/CD is a Technology used for devices to listen and see who is Communicating. Collision Detection.

ARP is a Method used to get the MAC Address of Hosts.

Full-Duplex is a Communication Mode where two devices can talk at the same time.

CSMA/CA is for Collision Avoidance rather than Detection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of these would be an example of Full Duplex?

Using a CB Radio
Talking on the Phone
Receiving a Text Message
Pinging a Device

A

Talking on the Phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Network Tech can connect two Switches with a Standard Straight-Through Cable. Why?

Today’s Switches have Auto-Sensing Ports
This is not accurate. The Tech needs a Crossover Cable
The Switch is malfunctioning
This cable looks like it works because there is a Link Light, but it is the wrong cable.

A

Today’s Switches have Auto-Sensing Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following standards uses Fiber Optic?

100Base-T
1000Base-T
10Base-T
1000Base-LX

A

1000Base-LX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

There is a Small Network in an office with Two Switches connected to each other. A New Network Tech installs a Third Switch and connects it to the Second Switch. After this, the whole Network Crashes. Why would this happen?

The Network Tech created a Switching Loop
There was no Router Installed
Some Ports have been Disabled
The Switches were not Layer 3 Switches

A

The Network Tech created a Switching Loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which piece of hardware can be installed into a Switch to allow a Fiber Connection?

RJ-11 Connector
A Fiber Regenerator
An RS-232 to USB Convertor
SFP

A

SFP (Small Form-Factor Pluggable)

Explanation: (My Take)
SFP is a type of Transceiver that connects to a MSA Module slot on the Motherboard to allow any Fiber Connector to be used with any Switch.
There are 2 other types of SFP Transceivers - SFP+ which is the upgraded version of SFP, and Quad SFP (QSFP) which allows 40 Gigabit Ethernet.

Gigabit Interface Converter (GBIC)

Bidirectional (BIDI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following is NOT part of the Structured Cabling System?

Horizonal Runs
Wall Jacks
Equipment Room
Work Area

A

Wall Jacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which Tool is used to connect UTP Cable to a 110-Block?

Punchdown Tool
Toner Probe
Crimper
Screwdriver

A

Punchdown Tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are talking to a Network Tech. He mentions the MDF and the IDF. What is the difference between the two of them?

The IDF is where the Main Equipment is stored for your Network.
The MDF ALWAYS houses the Demarc
The MDF is where the Main Equipment is stored for your Network.
An IDF is another term for the Work Area

A

The MDF is where the Main Equipment is stored for your Network

Explanation:
MDF = Main Distribution Frame - The room in a building that stores the demarc, telephone cross-connects, and LAN cross-connects.

IDF = Intermediate Distribution Frame - Telecommunications Room, The room where all the horizontal runs from all the work areas on a given floor in a building come together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When troubleshooting Structured Cabling, you notice that you cannot access any Network resources or get on the Internet. You cannot even ping another Host on your Subnet. What would be the MOST logical thing to check first?

The Horizonal Runs
The Configuration on the Router
If your Computer has an IP Address
If the NIC has a Link Light

A

If the NIC has a Link Light

Explanation:
The first thing to check if you cannot access ANYTHING AT ALL is the Link Light.
The Link Light will verify that you have a Connection.

Checking for an IP Address is an Earlier Step, it isn’t the MOST logical one based on the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How many inches is a “U”?

1.5”
1.75”
1”
.5”

A

1.75”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What would 239 be in Binary?

10101010
11001111
11101111
11110011

A

11101111

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Broadcast Address for ARP?

FF:FF:FF:FF:FF:FF
00:00:00:00:00:00
1A:2B:3C:4D:5E:6F
11:11:11:11:11:11

A

FF:FF:FF:FF:FF:FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which command will show the ARP Cache?

arp -v
arp -q
arp -c
arp -a

A

arp -a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What would the Subnet Mask be for Network 172.16.3.0 /24?

255.255.0.0
255.255.255.0
255.0.0.0
256.255.0.0

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

When using Class Licenses, what is the Range for a Class A IP Address?

0 - 126
128 - 191
192 - 223
224 - 239

A

0 - 126

Explanation:
Class A = 0 - 126
Class B = 128 - 191
Class C = 192 - 223
Class D = 224 - 239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What would the Subnet Mask be for a Network that is 194.55.4.3 /26?

255.255.255.0
255.255.255.128
255.255.255.192
255.255.0.255

A

255.255.255.192

32
Q

Which Protocol uses UDP?

TFTP
HTTP
IMAP
SNMP

A

TFTP (Trivial File Transfer Protocol)

Explanation:
UDP = Connectionless

33
Q

Many users are complaining that they cannot get on the Internet. You arrive at one user’s computer and ping the company’s Router and it’s successful. What would be the next command you should type?

netstat
nslookup
net use
tracert

A

tracert

Explanation:
This will determine if there’s a problem once the data leaves the company’s Router.

34
Q

Elliot is a new Network Tech at a company, and he is learning about Wireshark. He asks you the general purpose of the program. What would you say is the BEST description of Wireshark?

It is a tool that captures packets and frames and examines them at a more granular level.
It is a tool that can figure out why hosts cannot reach a DHCP server.
It is a tool that only works on Linux systems, and it captures and analyzes frames larger than usual.
It is an expensive tool that provides a diagram of your network.

A

It is a tool that captures packets and frames and examines them at a more granular level.

35
Q

You are using netstat, and you want to show all Active Ports. What would you type?

netstat -n
netstat -o
netstat -b
netstat -a

A

netstat -a

Explanation:
-n = Will show Foreign Addresses in a Numerical Format (Cleans up the Report)
-b = Shows the executable for every connection.
-o = Will show the Process ID column.
-a = Shows all ACTIVE/OPEN Ports.

36
Q

Which PORT does HTTP use?

20
80
143
443

A

80

37
Q

What is the proper name for a DNS server that can respond to a query with their own DNS information?

Authoritative
Administrative
Authenticated
Admissible

A

Authoritative

38
Q

Which type of record is used with IPv4?

AAAA Record
CNAME
MX
A Record

A

A Record

Explanation:
A = IPv4
AAAA = IPv6
CNAME = Alias
MX = Mail Exchange Servers

39
Q

You type www.google.com and you receive an error. However, if you type a known IP address for Google, it works. What might be the problem?

DHCP Scope Issue
Misconfigured IP Address
Incorrect Default Gateway
DNS

A

DNS (Domain Name System)

Explanation:
DNS = Resolves FQDN to IP Addresses

40
Q

You are using DHCP on your home Network, but you cannot access a Web Site based on its Host Name. What is MOST likely the problem?

You have an APIPA Address
You are not getting DNS Settings from DHCP
Your preferred DNS Server isn’t configured propertly
Your home Router is failing

A

You are not getting DNS Settings from DHCP

41
Q

Which tool is used for testing DNS using a third-party tool?

dig
nslookup
ping
netstat

A

dig

42
Q

What is an example of Authentication?

Accessing a Folder you were granted rights to?
Showing an ID
Proving through Credentials that you have rights to a System.
Using a Retinal Scanner

A

Proving through Credentials that you have rights to a System.

43
Q

What are the 3 Methods of Security Access to a System?

Identification, Authentication, Authorization
Identification, Automating, Authorization
The “Three Ps” - Proof, Proper Rights, and Proper Access
Authorization, Authentication, Accessibility

A

Identification, Authentication, Authorization

44
Q

A User needs to enter a high clearance area that requires a PIN on a touchpad and a retinal scan. What type of authentication is this?

Multi-factor Authentication
More than Once Authentication
Mult-user Authentication
Single Sign-On

A

Multi-factor Authentication

45
Q

Which would be an example of Role-Based Access control?

Logging in with a Username and Password to Access a System
Assigning Rights to a Folder based on a User
Labeling a Resource with a specific Name that would provide Access
Placing an “Owner” Label on a User Account

A

Assigning Rights to a Folder based on a User

Explanation:
Role Based is assigning users and groups specific rights to specific resources.

Authentication is Logging in with a Username and Password

Mandatory Access Control is Labeling a Resource with a Specific Name that would provide Access

Discretionary Access Control is placing an “Owner” Label on a User Account

46
Q

Which of the following is a benefit of Virtualization?

It allows you to create more efficient VPNs
Hardware consolidation
It’s very expensive, but worth the price
It can run on very low-end computers

A

Hardware consolidation

47
Q

What is meant by Network Function Virtualization (NFV)?

It removes the control plane and replaces it with a Network Control that dictates how physical and virtual devices move traffic.
It is a type of hypervisor
It is a Network Architecture that describes how physical network devices will be virtualized
It allows one switch to be electronically broken down into several broadcast domains.

A

It is a Network Architecture that describes how physical network devices will be virtualized

48
Q

In Cloud Computing, what is meant by Elasticity?

Increasing or decreasing application instances based on need.
Running a VM using more or less of the host’s resources based on need.
Supporting multiple customers on the same device or infrastructure.
Stretching a host computer’s resources as much as possible to support one virtual machine.

A

Increasing or decreasing application instances based on need.

49
Q

You have an application that you are developing, but you don’t want the hassle of setting up servers, ACLs, backups, and managing them. Which type of cloud service would you use?

Software as a Service (SaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Infrastructure as Code (IaC)

A

Platform as a Service (PaaS)

50
Q

When discussing Infrastructure as Code (IaC), what does automation mean?

Using code to provision and maintain systems in a consisten manner.
Creating pipelines that automate using longer sequences.
Automatically updating services using Windows Update
Running serveral instances of an application automatically.

A

Using code to provision and maintain systems in a consisten manner.

51
Q

Which of the following data center implementations connects the access and core layers through the distribution layer?

Spine-and-Leaf Architecture
Top-of-Rack Switching
Three-Tiered Architecture
North-South Traffic Flow

A

Three-Tiered Architecture (Classic)

52
Q

Big Corp’s data center has a fiber and cable ISP. What aspect of security does this represent?

Active-Passive
Multipathing
Redundancy
Clustering

A

Redundancy

53
Q

Which document contains details about all the hardware and software installed in a datacenter and provides the foundation for future upgrades?

Baseline Configuration
Logical Network Diagram
Performance Baseline
System Diagram

A

Baseline Configuration

54
Q

What network type connects multiple networks within a city range?

Wide Area Network (WAN)
Local Area Network (LAN)
Metropolitan Area Network (MAN)
Campus Area Network (CAN)

A

Metropolitan Area Network (MAN)

55
Q

Which is an example of IoT using your wireless network to connect to IoT Services?

Amazon Echo base connecting to your home router.
Using your phone as a hot spot to get a smart bulb to work.
Asking Siri a question and her searching the Internet for you.
Opening a garage door from your phone.

A

Amazon Echo base connecting to your home router.

56
Q

You have several devices connected to your network. You recently purchased cameras for your house. What would be the BEST way to secure your cameras so nobody can hack you and get the footage?

Place a physical lock on the cameras
Place the cameras in a separate VLAN
Use a separate SSID for the cameras
Contact your ISP and pay more money for another line to your hosue just for the cameras.

A

Place the cameras in a separate VLAN

57
Q

With VoIP, which Port does Session Initiation Protocol (SIP) use?

3389
5060/5061
143
80

A

5060/5061

58
Q

Which policy describes what users can and cannot do with company equipment?

Acceptable Use Policy (AUP)
Non-Disclosure Agreement (NDA)
BYOD Policy (Bring Your Own Device)
Memorandum of Understanding (MOU)

A

Acceptable Use Policy (AUP)

59
Q

You work as a Network Tech for an advertising agency. The art departement is going to be going from local installation of Adobe products to the Adobe Creative Cloud. After the conversion, which document should you update?

Statement of Work (SOW)
Service Level Agreement (SLA)
Change Management
Memorandum of Understanding (MOU)

A

Change Management

60
Q

What would be the MOST efficient method of installing Windows 10 Updates on Host Systems that are on the Network?

Configure a deployment server that will pass all updates down to hosts.
Test the updates first on a Virtual Machine to ensure their stability.
Allow users to manually update their own systems.
Download the updates to a USB stick and then manually install them on host computers.

A

Test the updates first on a Virtual Machine to ensure their stability.

Explanation:
The most efficient way is to test updates first, preferably on a virtual machine. Sure, you CAN configure a deployment server as this is common practice, but only AFTER you test the updates. Never allow users to manually update their systems as this can cause many problems. Downloading updates to a USB stick and manually installing them is not practical at all and would take forever in a large organization.

61
Q

What would be an example of an external threat to Network Assets?

Hackers
Employees
Water Main Break
A Tropical Storm

A

Hackers

62
Q

What would be the BEST example of a posture assessment?

Assessing possible threats from threat actors
Installing a Firewall
Configuring ACLs on a Firewall
Doing a Wireless

A

Assessing possible threats from threat actors

63
Q

The CIA Model is a basic model for security. What does CIA stand for?

Confidentiality, Integrity, and Availability
Central Intelligence Agency
Confidentiality, Intelligence and Accessibility
Computers, Intelligence, Adaptibility

A

Confidentiality, Integrity, and Availability

64
Q

Which would be an example of a Denial of Service (DoS) Attack?

Masquerading
Opening tons of Web Browser pages on a Computer
VLAN Hopping
Ping Flood

A

Ping Flood

65
Q

Which would be the BEST example of an On-Path Attack (Man-in-the-Middle)?

Listening in on a conversation between two network administrators.
Connecting a laptop to an access point to sniff packets and intercept them.
Hacking into someone’s phone while they use Apple Pay
A Ping Flood

A

Connecting a laptop to an access point to sniff packets and intercept them.

66
Q

A standard user in a company receives an email from what looks like her bank. It requests that she click on a link to fix her account information. What type of social engineering is this?

Phishing
Masquarading
Shoulder Surfing
Whaling

A

Phishing

67
Q

Which type of Malware seems innocent until you perform a specific action?

Trojan
Worm
Virus
Adware

A

Trojan

68
Q

When discussing end of life for a device, what is an important thing to have within your oganization?

Asset Tags
An MSDS
City Ordinances
A locker to place old items

A

Asset Tags

69
Q

Which tool allows Network admins to manage their Network remotely?

ICMP
SNMP
Netstat
NSLookup

A

SNMP (Simple Network Management Protocol)

70
Q

Which is the most common tool used for Network Monitoring?

Syslog
Performance Monitor
Event Viewer
Resoruce Monitor

A

Syslog

71
Q

What might be an example of a Network metric?

Memory Timings
Bandwidth Use
Dropped Packets
CPU Usage

A

Bandwidth Use

Explanation:
Bandwidth usage is very important when determining if your Network is running at optimal performance.
Memory Timing and CPU usage are more of a Local Hardware issue.
Dropped Packets is something left for pinging another device.

72
Q

Which might be an example of an SNMP Agent?

A computer that needs to manage a printer on the Network
A piece of software that monitors Network traffic.
A Network admin with rights to manage Network traffic.
A Printer that needs to be managed from another computer.

A

A Printer that needs to be managed from another computer.

73
Q

What is the purpose of SIEM?

It is a technology that handles all types of security monitoring and management.
It is a way of enforcing any policy put in place for the network.
It allows firewalls to use ACLs.
It is a networking monitoring tool built into Windows.

A

It is a technology that handles all types of security monitoring and management.

74
Q

A user calls and says they cannot get onto the Internet. Based on the Troubelshooting Model, what would be the first question to ask?

What is the error that is coming up?
Did you install anything new?
What is your IP Address?
When was the last time that you could get on the Internet?

A

What is the error that is coming up?

75
Q

A user calls and says that they are getting an error while loading the company web page. You go over and try to get onto www.totalsem.com, it doesn’t work. However, you type a known IP Address for totalsem and it works. You realize it is a DNS Problem. What do you do next?

Reboot the DNS Server
Ask other users if they can access the Website
Establish a theory of why it is a DNS problem.
Reboot the Router

A

Establish a theory of why it is a DNS problem.