Net+ Misc 2 Flashcards
To ensure your username / passwords are secure in remote VPN connections, this is present:
KERBEROS;
A network authentication protocol
How would you ensure new systems are protected against electronic snooping of Radio Frequency
Setup TEMPEST
What protocol applies to Ethernet networks and allows multiple devices on a network?
CSMA/CD
What is an SFP module for Fiber Optics?
LC connector
What is an SFP ?
Small Form-factor Pluggable (optical transceiver module)
What is a PDU?
Protocol Data Unit;
Describes data as it moves from one layer to another in OSI model
What PDU is used with connectionless protocols?
Datagrams
What protocol uses label switching routers to forward traffic?
MPLS
What supports long distance fast running WiFi?
WiMax
The last line of an ACL firewall is what?
Implicit Deny
If you secure your wireless network using WPA2-AES, what is the encryption method?
CCMP
CCMP
Encryption protocol;
Part of the 802.11i standard for wireless LANs;
Encryption mechanism that replaced TKIP,
Security standard used with WPA2 wireless networks.
What protocol allows switches to share VLAN information?
VTP
If you have prolonged contact with a thermal compound, what should you consult?
MSDS
When you need to ensure your server is monitored and you are warned of strange traffic
HIDS
What would you use to stop / block broadcasts?
Layer 3 switch
To monitor a T1, you should implement a loopback on what?
Channel Service Unit
Channel Service Unit
Device that translates incoming and outgoing data allowing network to work over the T1 line.
A survey of a wireless network and its signal strength:
Heat Map
Identify the main routing protocols?
RIP: Routing Information Protocol
OSPF: Open Short Path First
EIGRP: Enhanced Interior Gateway Routing Protocol
BGP: Border Gateway Routing Protocol
RIP
Routing Information Protocol;
Distance Vector (routing protocol);
Interior (routing protocol) limits # of hops in path
OSPF
Open Shortest Path First;
Interior (routing protocol);
Link State (routing protocol) …fiber or coax);
EIGRP
Enhanced Interior Gateway Routing Protocol
Common Hybrid routing protocol;
Distance Vector (routing protocol)
Link State (routing protocol)
BGP
Border Gateway Protocol;
Exterior (routing protocol);
Path Vector (routing protocol)
What helps prevent ROUTING loops?
Split Horizon
What protocol is used by switches to ensure switch routing loops do not occur?
802.1d
STP
How do you limit broadcast traffic and allow internal segments to communicate with each other?
Use a Layer 3 switch to create a VLAN
What setup allows switches to share VLAN information?
VTP: VLAN Trunking Protocol
802.1q
Trunking
What port would provide access to certain VOIP applications?
5060
How would a tech securely manage several remote network devices?
SNMPv3
What ports are used to provide secure sessions via the web by default?
22
443
A tech successfully pings the default gateway and DNS servers but cannot ping a website URL even though it can ping the website IP addr. How is this resolved?
Enable port 53 on the firewall
If setting up DHCP on a LAN, what options should be configured in DHCP scope to allow hosts on LAN using dynamic IP addresses to access the internet and internal locations?
Default gateway;
Subnet mask
DNS server
On a Linux workstation, how does a tech verify IP address settings?
run ifconfig
What must be configured on each network device if a tech will setup a monitoring tool?
SNMPv3
What technology must be supported to convert external IP addresses to internal ones
NAT… Network Address Translation
Identify and alert users to suspicious activity:
IDS: Intrusion Detection System
Identify, alert and take action to stop suspicious activity:
IPS: Intrusion Prevention System
Implement what to secure and protect a server?
HIDS / HIPS:
Host Intrusion Detection & Prevention
Implement what to secure and protect the network?
NIDS / NIPS:
Network Intrusion Detection & Prevention
When using Tracert to troubleshoot a website, and you receive a “Request Timed Out” error, what should be configured to allow using Tracert on external websites, but not allow outsiders to use it on your internal site?
Configure Firewall to allow echo reply in and echo request out
What uses and RJ-11 connector to connect a computer to an ISP using a POTS line?
MODEM
If you don’t have fiber or satellite connections, what connections are available?
DSL or Cable
What internet technology allows you to combine 24 signals using multiplexing technology onto one line?
T1
What leased internet technology can get you a set of 2.048 megabits over 32 channels?
E-1
What device will help provide data on a CSU/DSU to verify communications are working when troubleshooting a T1 connection?
Loopback plug - to CSU-DSU
CSU/DSU
Channel Service Unit/Data Service Unit;
Device that converts digital data frames and allows communications between a LAN and a WAN
Proxy Server
Middle man between clients and the internet;
Content filtering & Web caching
What server filters traffic between a WAN and LAN
Proxy Server
VOIP over PSTN(dial up) need what?
UC (VOIP) Gateway
VOIP is a form of what?
UC:
Unified Communications
Softphone
UC app that enables VOIP telephone calling
NAS
Network Attached Storage device
For a disaster recovery plan, what allows network devices to be replaced?
Archives / Backups
What class fire extinguisher is needed for computer systems?
Class C;
Fires involving energized electrical wiring or equip
iSCSI
Internet Small Computer Systems Interface;
Standard for linking data storage facilities
A tech connects a NAS device to an Ethernet network. What will be used to encapsulate the frames?
iSCSI
What WAN technology is associated with high latency?
Satellite
DDoS
Distributed Denial of Svc;
Flood a site with requests (Smurf/Zombie attack)
DNS poisoning
Alter DNS host (name) records
ARP poisoning
Sending fake MAC addresses to switch
ARP
Address Resolution Protocol;
Protocol translates network layer addresses into link layer addresses
What will secure traffic between a web browser and a website?
SSL
Attacker steals / alters data between two systems
Man in the Middle Attack
A NIC that transmits frames, operates at what layer
Layer 1 & 2
Cabling works at what layer?
Layer 2: Data Link
What layer and protocol would you open an application?
Layer 7, Application;
Example: access Web browser or email
What layer and protocol ensures there is a connection to the destination?
Layer 5, Session;
Example: PING (using ICMP) to test connection
What layer would SSL or SSH operate?
Layer 6, Presentation;
Example: HTTPS encrypted web page; encrypted command line (SSH)
What layer are IP addresses added to packet (envelopes)
Layer 3 Network;
Routers use IP addr to find dest
What layer does TCP or UDP cut data into packets (envelopes)
Layer 4 Transport layer
When you hear someone’s email is running slow, What is done first in the troubleshooting process?
Gather information
What is the last step taken in troubleshooting process?
Document findings
In troubleshooting process, what is done when a problem is discovered?
Establish a theory of probable cause
If your PC has IP addr 169.254.1.1, what port might be blocked?
67
If you need to discover the MAC addr for a device with a particular IP addr, what is used?
ARP
Address Resolution Protocol
What protocol allows switches to share VLAN information?
VTP
VLAN Trunking Protocol
What would be used to stop/block broadcasts?
Layer 3 switch
If you secure your wireless network using WPA2-AES, what encryption protocol is used?
CCMP
To monitor a T1, you should implement a loopback on what?
Channel Service Unit
What is the port # used by SNMP; the protocol used to help manage network devices
161
Two switches need to share VLAN information, what should be applied?
802.1q & VTP
If you want to stop looping between switches, what is used?
802.1d STP
To incorporate authentication for your WPA2-PSK network, use what?
WPA2 Enterprise
If users in building C are authenticating to wireless SSID in building A, do what to resolve the issue?
Reduce the transmission power
An attack that involves flooding a switch with fake frames to redirect traffic, would be what?
ARP poisoning
Network Topologies: LAN WAN MAN PAN CAN
LAN
WAN: ex. connecting companies across long distances
MAN: Metropolitan Area Network; ex. connect two college satellite campuses located across town;
PAN: Personal Area Net… supports bluetooth, …
CAN: Campus Area Network; network that spans several buildings within walking distance of each other
What two wires do not change in a Cat 5e UTP
4 & 5 (Blue)
7 & 8 (Brown)
What would be used to ensure users authenticate to a network?
802.1x, RADIUS or WPA2 Enterprise
What server is used to authenticate remote wireless users?
802.1x or RADIUS
AAA Protocol (Authentication, Authorization, Accounting), used by Microsoft RADIUS; Linux… incorporates what?
TACACS+
What are two authentication methods used by AAA authentication?
RADIUS and TACACS+
Route command
Used to display and manipulate a local routing table
NSLOOKUP command
Name Server Lookup;
Used to query the Domain Name System (DNS) to obtain an IP addr for a given host name or conversely obtain host name for a given IP addr
Netstat command
List open connections and ports on your computer
Routing table
Stored routing information about directly connected and remote networks;
Contains next hop associations
DOCSIS
Data Over Cable Service;
Standard allowing high bandwidth data transfer to CATV system
If firewall is configured to allow only ports 21, 110 and 25, but users cannot access URLs, what should be done
Allow ports 80 and 53
What protocol is used to encapsulate network layer protocols (like multicast) and is used as a tunnel protocol for remote connections?
GRE
NICs work at layer 2 and help encapsulate packets into this PDU (Protocol Data Unit) type
Frames
PDU
Protocol Data Unit;
Describes data as it moves from one layer to another;
Synonymous with the term packet
NICs work at layer 2, what else uses MAC addresses to forward data at layer 2?
Switch
ESS
Extended Service Set
Wireless networks that have multiple access points
What is the term for Ad Hoc mode (no access points) wireless networks
IBSS;
Independent Basic Service Set
Peer to Peer mode
What network device allows UC devices to connect to each other through phone lines (PSTN)?
UC Gateway
What is used to send a digital signal over analog PSTN
UC Gateway;
Converts digital signals to analog
PSTN
Public Switched Telephone Network;
Also known as POTS… Plain Old Telephone Service
A CSU/DSU device will connect what?
A T1 line to a network router
CSU / DSU
Channel Service Unit / Data Service Unit;
Device that converts digital data frame on LAN to a frame appropriate for WAN & vice versa
Port Scanner
Device used to identify active services on a network
What is used to do a one time posture assessment of the network?
Non Persistent Agent
SIEM
Security Information and Event Management
What could be used to analyze network security logs?
SIEM
What features are most important when implementing new switch to support VOIP phones and wireless access points?
PoE and QoS
What will need to be enabled if access points are configured in an environment with wireless standards 802.11b and 802.11n, and need to communicate?
Wireless Mixed Mode
To reduce interference with other nearby wireless networks, what should be configured on the target wireless access point?
alternate wireless channel
UDP
User Data Protocol;
Connectionless protocol;