Network+ 009 practice exam missed questions Flashcards

1
Q

802.11h

A

Refers to an amendment to the IEEE 802.11 standard that focuses on managing spectrum usage and transmit power control, primarily designed to allow wireless networks to share the 5GHz band with radar systems by utilizing features like Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) to avoid interference with radar signals; essentially, it allows wireless devices to dynamically switch channels when encountering radar activity and adjust their transmission power to minimize interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Crosstalk

A

Occurs when signals from adjacent cables interfere with each other, leading to signal degradation.

Make a card for all cable faults like crosstalk, open, short, and others since it’s confusing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What happens when you run a speed test?

A

When you run a speed test, your computer downloads a sample file from the test website’s server, then uploads it back to the server to determine your connection speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Usage cases: Twin-axial, Coaxial, Twisted pair, Fiber Optic.

A

Twinaxial cabling, or “Twinax”, is a type of cable similar to coaxial cable, but with two inner conductors instead of one. Due to cost efficiency, it is commonly used in very short-range high-speed differential signaling applications, such as SATA 3.0 cables and uplinks between SFP+ modules in switches or routers.

Fiber optic cables are commonly used for long-range high-speed applications.

Coaxial cables and twisted-pair copper cables are commonly used for medium-range applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the context of Virtual Extensible Local Area Network (VXLAN), what is the purpose of the VXLAN Network Identifier (VNI)?

A

The VXLAN Network Identifier (VNI) is a 24-bit identifier that helps differentiate between different VXLAN overlay networks. Each VXLAN segment or overlay network typically has a unique VNI assigned to it, allowing VXLAN endpoints to correctly identify and route traffic within the appropriate overlay network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VXLAN overlay network

A

A virtual Layer 2 network built on top of an existing physical Layer 3 network (underlay), allowing virtual machines (VMs) across different physical networks to communicate as if they were on the same local area network (LAN) by encapsulating Layer 2 Ethernet frames within Layer 3 UDP packets, essentially creating a logical tunnel between them; this is considered an overlay technology because it operates on top of the existing infrastructure, providing greater scalability and flexibility compared to traditional VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routing prefixes are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR). What are the unique identifiers used to manage these assignments known as?

A

An ASN (or Autonomous System Number) is used to control routing with BGP routing protocols to route traffic across the network. An Autonomous System (AS) is a group of one or more IP prefixes (lists of IP addresses accessible on a network) run by one or more network operators that maintain a single, clearly defined routing policy. Network operators need Autonomous System Numbers (ASNs) to control routing within their networks and to exchange routing information with other Internet Service Providers (ISPs). There are 2-byte and 4-byte ASN variants in use on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What one of the following systems is commonly used to manage digital certificates, ensuring secure communication and authentication over a network?

PKI
Symmetric Key
TLS
2FA

A

Public Key Infrastructure (PKI) manages digital certificates, including their issuance, revocation, and verification, providing a framework for secure communication and authentication. Symmetric key encryption uses a single key for both encryption and decryption, which doesn’t address the issues of authentication and certificate management. Transport Layer Security (TLS) provides a means for privacy for communications over the internet, but does not deal with managing digital certificates. While two-factor authentication (2FA) enhances security by requiring additional verification beyond passwords, it doesn’t directly manage digital certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dion Training believes there may be a rogue device connected to their network. They have asked you to identify every host, server, and router currently connected to the network. Which of the following tools would allow you to identify which devices are currently connected to the network?

IP scanner
NetFlow analyzer
Port scanner
Protocol analyzer

A

An IP scanner is used to monitor a network’s IP address space in real-time and identify any devices connected to the network. Essentially, the tool will send a ping to every IP on the network and then creates a report of which IP addresses sent a response. A NetFlow analyzer is used to perform monitoring, troubleshooting, inspection, interpretation, and synthesis of network traffic flow data. A port scanner is used to determine which ports and services are open and available for communication on a target system. A protocol analyzer is used to capture, monitor, and analyze data transmitted over a communication channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following standards is commonly used for exchanging authentication and authorization data between parties, facilitating single sign-on (SSO) across different systems?

A

Security Assertion Markup Language (SAML) is designed for exchanging authentication and authorization data between trusted parties, enabling SSO and secure access to multiple systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Syslog severity levels

A

The syslog severity levels range from zero to seven, with zero being the most severe and seven being the least severe. Level 0 is used for an emergency and is considered the most severe condition because the system has become unstable. Level 1 is used for an alert condition and means that there is a condition that should be corrected immediately. Level 2 is used for a critical condition, and it means that there is a failure in the system’s primary application and it requires immediate attention. Level 3 is used for an error condition, and it means that something is happening to the system that is preventing the proper function. Level 4 is used for warning conditions and it may indicate that an error will occur if action is not taken soon. Level 5 is used for notice conditions and it means that the events are unusual, but they are not error conditions. Level 6 is used for information conditions and it is a normal operational message that requires no action. Level 7 is used for debugging conditions and is just information that is useful to developers as they are debugging their networks and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are a network technician troubleshooting connectivity issues in a large office building with multiple WiFi networks. To identify potential interference and optimize signal strength, which tool would be most effective for analyzing WiFi signals?

A

A WiFi analyzer is specifically designed to scan and analyze WiFi networks, providing detailed information on signal strength, channel utilization, and potential interference. Options, such as a multimeter, spectrum analyzer, and cable tester, are not tailored for WiFi signal analysis and would not provide the necessary insights for troubleshooting WiFi connectivity issues in a complex office environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Link Layer Discovery Protocol
(LLDP)/Cisco Discovery Protocol
(CDP)

A

Network discovery protocol allows devices to advertise their identity, capabilities, and neighboring devices, facilitating network management and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tabletop exercise

A

A discussion-based training activity where a team walks through a simulated cyber security incident scenario, allowing them to practice their response strategies, identify potential weaknesses in their incident response plan, and improve communication and coordination within the team, all in a non-technical, hypothetical setting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Purpose of a patch panel

A

Installing a patch panel is the most effective solution for centralized cable management. Patch panels allow for easy access and identification of cable connections, which facilitates quick troubleshooting and fault isolation in a server room environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cable certifier

A

Used to test the continuity of a cable and verify that a cable meets its specifications such as the bandwidth, frequency, and length.

17
Q

802.3ad

A

Link Aggregation Control Protocol.

18
Q

802.3af

19
Q

802.1d

20
Q

802.1x

A

Port security.

21
Q

802.1q

22
Q

Jobs done in each OSI layer

A

Data is transmitted at Layers 5, 6, and 7 of the OSI model.
At Layer 4, the data is encapsulated into segments.
At layer 3, the segments are encapsulated into packets.
At layer 2, the packets are encapsulated into frames.
At layer 1, the frames are encapsulated into bits.

23
Q

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

A

An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol in a standard web browser to provide secure, remote-access VPN capability. In modern browsers and servers, it is more common to use TLS (transport layer security) which is the successor to SSL.

24
Q

Use for microwave connection

A

Microwave connections are ideal for mountainous regions, offering high-speed data transmission over short distances.

25
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. What protocol is likely to be used with this cable?
RS-232 is a standard for serial communication transmission of data. It formally defines the signals connecting a DTE (data terminal equipment) such as a computer terminal and a DCE (data circuit-terminating equipment or data communication equipment). A DB-9 connector is often found on a rollover or console cable and is used to connect a router to a laptop using the RS-232 serial transmission protocol for configuring a network device. IEEE 802.3 is the standard for Ethernet. Ethernet commonly uses twisted pair, fiber optic, and coaxial connections, not a DB-9 serial connector. Asynchronous Transfer Mode (ATM) uses a fiber or twisted pair cable similar to an ethernet connection. Token ring usually uses a fiber optic cable, not a DB-9 serial cable.
26
Classful vs Classless routing protocols
Classless protocols offer more efficient IP address allocation compared to classful protocols which are considered outdated. Examples of classful routing protocols include RIPv1 and IGRP. Examples of classless routing protocols include RIPv2, EIGRP, OSPF, and IS-IS.
27
You are optimizing the DNS setup for a multinational corporation to ensure fast and reliable access to various web resources. The goal is to minimize the latency experienced by users when accessing web pages by reducing the time taken to resolve domain names. This requires a DNS server type that can handle queries for any domain by interacting with multiple DNS servers across the internet. Which type of DNS server is best suited to achieve this goal?
Set up recursive DNS servers to resolve domain names by querying the necessary authoritative servers. Recursive DNS servers are designed to resolve domain names by querying other DNS servers until they find the authoritative source for the requested domain. This process ensures that users receive accurate and up-to-date information for any domain, minimizing latency in DNS resolution by effectively navigating the DNS infrastructure. Secondary DNS servers replicate records from a primary DNS server for redundancy and do not independently resolve external domain names. Primary DNS servers manage and serve DNS records for domains they are authoritative for, but they do not query other servers to resolve external domain names. A caching-only DNS server serves previously cached queries but does not perform the recursive querying necessary to resolve unknown domain names.
28
RIP EIGRP
Distance vector routing protocol. Relatively little configuration. Good for smaller networks.
29
OSPF
Link state routing protocol. Large networks. Scalable.
30
Spanning Tree Protocol
A Layer 2 protocol designed to prevent loops and broadcast storms in bridged Ethernet networks by ensuring only one active path between any two network devices.
31
LACP vs. PAGP
LACP is open standard and supported by most of vendors, while PAGP is Cisco proprietary only used between Cisco devices.
32
Recursive DNS vs Iterative DNS
It tells the DNS resolver, “Hey, I need the IP address for this domain, please hunt it down and don’t get back to me until you have it.” Meanwhile, in an iterative query, the client tells the DNS resolver, “Hey, I need the IP address for this domain. Please let me know the address of the next DNS server in the lookup process so I can look it up myself.”
33
STP vs Split Horizon
A layer 2 protocol that operates on bridges and switches to create a loop-free logical topology in Ethernet networks. A layer 3 network protocol technique that prevents routing loops in distance-vector routing protocols.
34
Patch cable (straight through) vs Rollover vs Crossover vs RG6
Straight through: As the name suggests, pin1 connected to pin 1 and so on. Pin 4 is empty. Rollover: Opposite pin assignments, 1 to 8. Crossover: Pin 1 to 6. RG6: One internal copper wire.
35
Visual fault locator vs OTDR
VFL: Specifically designed to identify breaks, micro-bends, and other faults in fiber optic cables. OTDR: used for testing the integrity of fiber optic cable, while useful for assessing overall cable health, it may not pinpoint specific faults like breaks or bends.
36
NFV
Network Function Virtualization. Network functions such as switch, router, firewall to run on hypervisor.
37
hot aisle/cold aisle
A data center layout where server racks are arranged in alternating rows, with the front of the racks facing each other in a "cold aisle" where cool air is drawn in, and the back of the racks facing each other in a "hot aisle" where hot exhaust air is expelled.
38
Microwave in the way presents interference problem for which frequency?
2.4GHz