Network+ 009 practice exam missed questions Flashcards
802.11h
Refers to an amendment to the IEEE 802.11 standard that focuses on managing spectrum usage and transmit power control, primarily designed to allow wireless networks to share the 5GHz band with radar systems by utilizing features like Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) to avoid interference with radar signals; essentially, it allows wireless devices to dynamically switch channels when encountering radar activity and adjust their transmission power to minimize interference.
Crosstalk
Occurs when signals from adjacent cables interfere with each other, leading to signal degradation.
Make a card for all cable faults like crosstalk, open, short, and others since it’s confusing.
What happens when you run a speed test?
When you run a speed test, your computer downloads a sample file from the test website’s server, then uploads it back to the server to determine your connection speed.
Usage cases: Twin-axial, Coaxial, Twisted pair, Fiber Optic.
Twinaxial cabling, or “Twinax”, is a type of cable similar to coaxial cable, but with two inner conductors instead of one. Due to cost efficiency, it is commonly used in very short-range high-speed differential signaling applications, such as SATA 3.0 cables and uplinks between SFP+ modules in switches or routers.
Fiber optic cables are commonly used for long-range high-speed applications.
Coaxial cables and twisted-pair copper cables are commonly used for medium-range applications.
In the context of Virtual Extensible Local Area Network (VXLAN), what is the purpose of the VXLAN Network Identifier (VNI)?
The VXLAN Network Identifier (VNI) is a 24-bit identifier that helps differentiate between different VXLAN overlay networks. Each VXLAN segment or overlay network typically has a unique VNI assigned to it, allowing VXLAN endpoints to correctly identify and route traffic within the appropriate overlay network.
VXLAN overlay network
A virtual Layer 2 network built on top of an existing physical Layer 3 network (underlay), allowing virtual machines (VMs) across different physical networks to communicate as if they were on the same local area network (LAN) by encapsulating Layer 2 Ethernet frames within Layer 3 UDP packets, essentially creating a logical tunnel between them; this is considered an overlay technology because it operates on top of the existing infrastructure, providing greater scalability and flexibility compared to traditional VLANs
Routing prefixes are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR). What are the unique identifiers used to manage these assignments known as?
An ASN (or Autonomous System Number) is used to control routing with BGP routing protocols to route traffic across the network. An Autonomous System (AS) is a group of one or more IP prefixes (lists of IP addresses accessible on a network) run by one or more network operators that maintain a single, clearly defined routing policy. Network operators need Autonomous System Numbers (ASNs) to control routing within their networks and to exchange routing information with other Internet Service Providers (ISPs). There are 2-byte and 4-byte ASN variants in use on the internet.
What one of the following systems is commonly used to manage digital certificates, ensuring secure communication and authentication over a network?
PKI
Symmetric Key
TLS
2FA
Public Key Infrastructure (PKI) manages digital certificates, including their issuance, revocation, and verification, providing a framework for secure communication and authentication. Symmetric key encryption uses a single key for both encryption and decryption, which doesn’t address the issues of authentication and certificate management. Transport Layer Security (TLS) provides a means for privacy for communications over the internet, but does not deal with managing digital certificates. While two-factor authentication (2FA) enhances security by requiring additional verification beyond passwords, it doesn’t directly manage digital certificates.
Dion Training believes there may be a rogue device connected to their network. They have asked you to identify every host, server, and router currently connected to the network. Which of the following tools would allow you to identify which devices are currently connected to the network?
IP scanner
NetFlow analyzer
Port scanner
Protocol analyzer
An IP scanner is used to monitor a network’s IP address space in real-time and identify any devices connected to the network. Essentially, the tool will send a ping to every IP on the network and then creates a report of which IP addresses sent a response. A NetFlow analyzer is used to perform monitoring, troubleshooting, inspection, interpretation, and synthesis of network traffic flow data. A port scanner is used to determine which ports and services are open and available for communication on a target system. A protocol analyzer is used to capture, monitor, and analyze data transmitted over a communication channel.
Which of the following standards is commonly used for exchanging authentication and authorization data between parties, facilitating single sign-on (SSO) across different systems?
Security Assertion Markup Language (SAML) is designed for exchanging authentication and authorization data between trusted parties, enabling SSO and secure access to multiple systems.
Syslog severity levels
The syslog severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system’s primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.
You are a network technician troubleshooting connectivity issues in a large office building with multiple WiFi networks. To identify potential interference and optimize signal strength, which tool would be most effective for analyzing WiFi signals?
A WiFi analyzer is specifically designed to scan and analyze WiFi networks, providing detailed information on signal strength, channel utilization, and potential interference. Options, such as a multimeter, spectrum analyzer, and cable tester, are not tailored for WiFi signal analysis and would not provide the necessary insights for troubleshooting WiFi connectivity issues in a complex office environment.
Link Layer Discovery Protocol
(LLDP)/Cisco Discovery Protocol
(CDP)
Network discovery protocol allows devices to advertise their identity, capabilities, and neighboring devices, facilitating network management and troubleshooting.
Tabletop exercise
A discussion-based training activity where a team walks through a simulated cyber security incident scenario, allowing them to practice their response strategies, identify potential weaknesses in their incident response plan, and improve communication and coordination within the team, all in a non-technical, hypothetical setting.
Purpose of a patch panel
Installing a patch panel is the most effective solution for centralized cable management. Patch panels allow for easy access and identification of cable connections, which facilitates quick troubleshooting and fault isolation in a server room environment.
Cable certifier
Used to test the continuity of a cable and verify that a cable meets its specifications such as the bandwidth, frequency, and length.
802.3ad
Link Aggregation Control Protocol.
802.3af
POE.
802.1d
STP.
802.1x
Port security.
802.1q
VLAN
Jobs done in each OSI layer
Data is transmitted at Layers 5, 6, and 7 of the OSI model.
At Layer 4, the data is encapsulated into segments.
At layer 3, the segments are encapsulated into packets.
At layer 2, the packets are encapsulated into frames.
At layer 1, the frames are encapsulated into bits.
Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?
An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol in a standard web browser to provide secure, remote-access VPN capability. In modern browsers and servers, it is more common to use TLS (transport layer security) which is the successor to SSL.
Use for microwave connection
Microwave connections are ideal for mountainous regions, offering high-speed data transmission over short distances.