Net+ Misc 3 Flashcards
IBSS
Ad Hoc mode Wireless network with no access points;
Independent Basic Service Set
If data transmissions are failing due to frame errors, what layer is this?
Layer 2, Data Link
A company wants to ensure users are required to authenticate prior to being allowed on the network involves what standard?
802.1x
If users are having accessibility problems reaching devices on the cloud, what monitoring tool should you use to locate possible outages?
Network Analyzer
What is a specialized piece of hardware designed to encrypt and decrypt user traffic?
VPN concentrator
A tech needs to identify active services that should be DISABLED on the network. What can help do this?
Port Scanner
NIC’S work at Layer-2 and help encapsulate packets into this PDU type?
Frames
Setup what to get all devices to send system level information to a centralized server for admin review?
SYSLOG server
In Layer-4, TCP breaks data into SEGMENTS (UDP breaks into Datagrams). What does Layer 3 break your PDU’s (Packet Distribution Units) into?
Packets
A company plan established to resume normal system operations following a disruption in business would be described as what?
Business Continuity
After a breach, the tech decides the company needs to analyze its security logs. What should be used to analyze the security logs/information to help make a decision?
SIEM;
Security Information and Event Management
What command did you run if you now see Active Connections including the Protocol being used (like TCP), the Local IP Addresss, Port number being used in active connections and the PID?
netstat
The Internet is not working. After using a toner to test your cable you get a STATIC SOUND. What is most likely issue?
Cross wires
If you have 172.16.1.1 with 255.255.0.0 with /12 and you are told you need 30 rooms/subnets. What should you be?
/13
A CROSSOVER map would be 12345678 as compared to the other end which is:
1 2 3 4 5 6 7 8
………..|…|……|…|……………
3 6 1 4 5 2 7 8
If you know a data transmission is failing due to frame errors; then you are worried about:
Layer 2, Data-Link layer
NetBIOS uses what port?
Port 137
Which provides 256-512 encryption bytes of integrity hashing protection?
SHA3
You are running OC3 into an IDF but the SFP does not have a plug. What Media Converter do you need?
Singlemode to Ethernet
Combining two devices (links) like two 1000-Mbps switchs to get higher speeds is:
LACP
Link Aggregate Control Protocol
SIP uses what port?
Port 5060
If you PING with ICMP what layer are you working at?
Layer 3
ST, SC, LC and MTRJ are Fiber-optic connectors. Which of the following is a SFP (Small Form-Factor Pluggable) module, often used to connect Singlemode fiber optic cabling?
LC
SIP uses what port?
Port 5060
Which is best to secure one-end to another (end-to-end encryption)?
IPSEC
What is the difference between a PAN and a WLAN?
WLAN uses Wifi to get more data/range; PAN uses Bluetooth for less data/range
What type of equipment should be used for telecommunications and have an open design?
2/4 Post Rack
You have 172.16.0.0 /12. But you need 30 rooms/subnets. What must your CIDR subnet mask be?
/13 ??????????????
ICMP and TTL is implemented as a part of the IP layer. What layer does ICMP work at?
Network layer
If an attack goes after your switches by loading them with fake-frames; at what layer does the attack occur?
DATA-LINK (LAYER 2)
What port is used for NETBIOS?
137 / 138
What port is used for DHCP?
67 / 68
What port is used for SNMP?
161
What port is used for TFTP?
69
To check when an interface goes offline, what would you enable on your network device?
SNMP TRAP
Even with STP two switches seem to be overloaded with loop issues & traffic. You should now try;
RSTP / 802.1w
Which routing protocol utilizes the DUAL algorithm (multiple protocols) for determining best path?
EIGRP
What will SECURE one ENDPOINT to ANOTHER ENDPOINT?
IPSEC
You have only one switch capable of 1000-Mbps but you need to reach 10-Gbps. When two or more links need to pass traffic as if they were one physical link, which would be used to satisfy requirement?
LACP
A tech is troubleshooting a problem and they establish a plan of action to resolve it. What is next step?
Implement solution
The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?
Posture assessment
What is difference between CDMA cell phone and GSM cell phone?
A. GSM uses SIM Cards; CDMA doesn’t
If you have a Crossover cable, with two switches connected together directly, then your wiremap is 1 to:
1 to 3
You have TV’s that support High-Data transfer located 10-meters from AP.
You have printers with low bandwidth that are 20-meters on the opposite side of a wall from AP.
Select ‘3’ below to make this work properly
Set TV’s to 5 GHz
Set Printers to 2.4 GHz
Set Router/AP to Dual-Band
How do you measure the times a signal in a communications channel changes its State?
Baud rate
If a WAP keeps sporadically dropping connections and it is surrounded by multiple AP’s, and you are told to ensure seamlessly easy operations for users and ensure they have access to similar resources, then do what?
Match SSID’s between AP’s
Set on altering channels between AP’s
A tech notices a spike in bandwidth due to packet overhead. Which two below can assist? (Select 2)
Configure switches to use jumbo frames
Update backbone to 10-Gbps
Least intrusive way to resolve hostname to IP?
TRACERT
In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, what should security ensure are up-to-date & enforced for all?(Select TWO)
Memorandum of understanding;
Acceptable use Policy
A firewall ACL is configured as follows:
- Deny Any Trust to Any DMZ eq to TCP port 22
- Allow 10.200.0.0/16 to Any DMZ eq to Any
- Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
- Deny Any Trust to Any DMZ eq to Any
A TECH notices that users in the 10.200.0.0/16 network are unable to SSH into servers. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL which way would meet the company’s objectives?
11, 10, 12, 13