Network+ Flashcards

1
Q

OSI model layers

A
  1. Physical
  2. Data Link
  3. Network
  4. Transport
  5. Session
  6. Presentation
  7. Application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which OSI layer handles IP addresses?

A

Layer 3 - Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which OSI layer deals with MAC addresses?

A

Layer 2 - Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which OSI layer assembles and disassembles packets?

A

Layer 4 - Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which OSI layer uses port numbers?

A

Layer 5 - Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

length of a frame

A

up to 1500 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

where is a game generated and eaten up?

A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

device that connects host to a central location where they share bandwidth

A

hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

command to display MAC addresses

A

ipconfig /a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

length of a MAC address

A

48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

device that connects multiple LANs

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

device that connects multiple hosts within the same network

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is the current standard for coaxial cabling?

A

RG-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is the resistance of RG-6?

A

75 Ohms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

most common RG-6 connector

A

F-type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

type of cable where two inner conductors share an outer conductor

A

twinaxial/twinax cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

advantages of coaxial cable

A

resistant to EMI

resistant to physical damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

disadvantages of coaxial cable

A

inflexible

expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

max distance of UTP

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

difference between multimode and single mode fiber optic cabling

A

multimode uses LED signals, single mode uses lasers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

standard that defines ethernet

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

components of an ethernet frame

A

preamble, destination MAC, source MAC, data type, data, pad, FSC (frame check sequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

ITA/EIA-568A wire order

A

Brown, Brown/White, Orange, Blue/White, Blue, Orange/White, Green, Green/white

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TIA/EIA-568B color order

A

Brown, Brown/White, Green, Blue/White, Blue/Green/White. Orange, Orange/White

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

type of port on a switch that allows you to use a straight through cable instead of a crossover cable

A

uplink port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

protocol that delegates one switch to be in charge and prevent switching loops

A

spanning tree protocol (STP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

netstat -n

A

presents results numerically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

netstat -b

A

shows executable for every connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

netstat -o

A

shows executable and process ID for every connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

netstat -a

A

shows all active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

netstat -r

A

shows the local routing table (identical to route print)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

tool that lists all open ports and network connections on your computer

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what are the two most popular web server softwares?

A

Microsoft IIS and Apache (open source)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

protocol analyzer that’s integrated with a frame capture tool

A

wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

a command that’s a variant of ping and quicker than tracert

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

tool that verifies the upload and download speeds to an individual computer

A

bandwidth speedtester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

protocol analyzer integrated with a frame capture tool

A

wireshark

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

netstat -n

A

presents results numerically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

netstat -b

A

shows executable for every connection; needs admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

netstat -o

A

shows executable and process ID for every connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

netstat -a

A

shows all active ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

netstat -r

A

shows the local routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

IP version that uses A Record

A

IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

IP version that uses AAAA Record

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

an algorithm that does not encrypt but verifies data, creates a fixed size hash value

A

cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

what are two common hashes?

A

MD5 and SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

an access control that uses labels

A

Mandatory Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

access control that gives creators control over permissions and provides more flexibility

A

Discretionary Access Control (DAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

access control that assigns rights and permissions to a group

A

Role-based Access Control (RBAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

client that handles authentication requests from supplicants and provides AAA

A

RADIUS client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

a bridging device that connects into an ethernet network and communicates via radio waves to wireless clients

A

WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

the method used to prevent wireless collisions

A

CSMA/CA (carrier sense multiple access with collision avoidance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

what are the current fastest 802.11 standards?

A

802.11n and 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

type of antenna used on exterior walls

A

patch antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

encryption protocol used with WPA

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

type of encryption protocol used with WPA2

A

CCMP-AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are three ways to implement wireless security?

A
  • disable SSID broadcast
  • use MAC filtering
  • limit the number of DHCP-issued addresses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

difference between rogue access points and evil twins

A

evil twins are intentional, rogue access points can be accidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

monitors traffic, sets up various zones or access areas, and define services’ access to specific WAP destination

A

wireless controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

environmental issues that can affect the wireless signal

A

interference, reflections, and absorption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

what are some sources of interference?

A

other WAPs, wireless mice and keyboards, and microwaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

enablles virtualization to occur and emulates the physical hardware

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

disk storage delivered as a service over TCP/IP (file level)

A

Network Attached Storage (NAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

specialized LAN that transfers data at block-level with a special protocol

A

Storage Area Network (SAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

what two types of connections do SANs use?

A

Fibre Channel (FC) or iSCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

lowers cost and relies on configuration that allows jumbo frames over the network

A

IP Small Computer System Interface (iSCSI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

virtualized storage technology that uses a switched fabric topology and features very high throughput and very low latency

A

InfiniBand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

provides an easy-to-use front end to configure physical and virtual devices throughout the network

A

software-defined networking (SDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

hypervisor that runs on top of the OS

A

Type 2 hypervisor

70
Q

hypervisor that boots off of the system

A

Type 1 or bare metal

71
Q

What are three benefits of virtualization?

A
  1. saves power
  2. hardware consolidation
  3. system recovery
72
Q

aspects of cloud computing

A

scalability, elasticity, multitenancy, security implications

73
Q

the management of infrastructure in a descriptive model, using the same versioning as developers use for source code

A

Infrastructure as Code (IaC)

74
Q

a network architecture that describes how physical network devices will be virtualized

A

Network Function Virtualization (NFV)

75
Q

What are five ways to help ensure high availability of data?

A
  • redundancy protocols
  • load balancing
  • clustering
  • uninterruptible power supplies (UPSes)
  • generators
76
Q

what are the three layers connected by three-tiered architecture in the classic data center?

A

access, distribution, and core

77
Q

What are five hardening techniques for IoT devices?

A
  • use separate SSID
  • create a long PSK
  • put device(s) on a separate VLAN
  • periodically update firmware
  • use access control lists (ACLs)
78
Q

What are the four steps of the forensic process?

A
  1. secure the area
  2. document the scene
  3. collect evidence
  4. interface with authorities (submit forensics report)
79
Q

What type of attack can DHCP servers be used to perform?

A

on-path (man-in-the-middle)

80
Q

Data traveling through which layers of the OSI model does de-encapsulation take place?

A

Layers 1 to 7

81
Q

method used on Layer 2 of the OSI model in 802.1q to identity ethernet traffic as part of a specific VLAN

A

tagging

82
Q

on which layer of the OSI model does tunneling take place?

A

Layer 2

83
Q

tool used to create long fiber optic cable lengths by combining multiple cables together, or to repair a break in a fiber optic cable

A

fusion splicer

84
Q

the process of varying one or more properties of a periodic waveform, called the carrier signal, with a separate signal that typically contains information to be transmitted

A

modulation

85
Q

what are three common types of modulation?

A
  • Orthogonal frequency-division multiplexing (OFDM)
  • Quadrature Amplitude Modulation (QAM)
  • Quadrature Phase-shift keying (PSK)
86
Q

space between floors used to circulate air conditioning ductwork, piping, electrical an network cables throughout the building

A

plenum

87
Q

flag used to terminate a connection between two hosts when the sender believes something has gone wrong with the TCP connection between them

A

RST (reset)

88
Q

flag used to request that the connection be terminated. This usually occurs at the end of a session and allows for the system to release the reserved resources that were set aside for this connection

A

FIN (finish)

89
Q

flag that is set in the first packet sent from the sender to a receiver as a means of establishing a TCP connection and initiating a three-way handshake

A

SYN (synchronization)

90
Q

what are the seven severity levels?

A

0 - emergency, system unstable
1 - alert condition, needs correction immediately
2 - critical condition, failure in the system’s primary application, requires immediate attention
3 - error condition, something preventing proper function
4 - warning condition, error may occur if action not taken soon
5 - notice condition, unusual events
6 - information condition, no action required
7 - debugging condition, info for developers

91
Q

type of antenna for outside wireless applications where you want directional control of the signal and over longer distances

A

parabolic

92
Q

type of unidirectional antenna that can focus the transmission over a long distance

A

yagi

93
Q

a standardized protocol designed to exchange routing and reachability information between autonomous systems on the internet

A

Border Gateway Protocol (BGP)

94
Q

SNMPv3 option that ensures that the communications are sent with authentication and privacy

A

authPriv

95
Q

maximum amount of data, measured in time, that an organization is willing to lose during an outage

A

RPO (recovery time objective)

96
Q

implementation where separate DNS servers are provided for security and privacy management for internal and external networks

A

Split Domain Name System (Split DNS)

97
Q

security feature that enables an interface to retain dynamically learned MAC addresses when the switch is restarted or if the interface goes down and is brought back online

A

port security

98
Q

most common way to perform an on-path attack on a wireless network

A

evil twin

99
Q

802.3ad protocol used to group numerous physical ports to make one high bandwidth path

A

LACP (Link Aggregation Control Protocol)

100
Q

authentication protocol developed by Cisco that provides authentication, authorization, and accounting services

A

TACACS+

101
Q

which OSI layer do ATM cells operate at?

A

Data Link (Layer 2)

102
Q

maximum rate of data transfer across a given network

A

bandwidth

103
Q

what tool would you use to determine where a cable break occured

A

time-domain reflectometer

104
Q

an attack where the attacker sends a large number of requests to one or more legitimate DNS servers while using a spoofed source IP of the targeted victim. The DNS server then replies to the spoofed IP and unknowingly floods the targeted victim with responses to DNS requests that it never sent.

A

reflective DNS attack

105
Q

two methods of allowing multiple devices on a LAN to be mapped to a single public IP address to conserve IP addresses

A

NAT (network Address Translation) and PAT (Port Address Translation)

106
Q

technique where private IP addresses are translated into public IP addresses

A

NAT (Network Address Translation)

107
Q

technique where private IP addresses are translated into a single public IP address and their traffic is segregated by port numbers

A

PAT (Port Address Translation)

108
Q

tool used to measure the magnitude of an input signal’s frequency

A

spectrum analyzer

109
Q

tool used to accurately identify the location of a cable pair or conductor within a wiring bundle, cross-connection point, or at the remote end

A

tone generator

110
Q

tool that measures the voltage, resistance, and amperage of a cable or conduit

A

multimeter

111
Q

tool used to verify the electrical connections in a twisted pair or coaxial cable

A

cable tester

112
Q

tool used to certify the performance of new fiber optics links and detect problems with existing fiber links, can provide an approx. location of a break

A

Optical Time Domain Reflectometer (OTDR)

113
Q

IPv6 communication type that sends a packet to the nearest interface that shares a common address in a routing table

A

anycast

114
Q

approach to security that unified endpoint security tech, user or system authentication, and network security enforcement. Restricts access to authorized devices by placing it into an automated testing area first

A

Network Access Control (NAC)

115
Q

network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network

A

IEEE 802.1x

116
Q

At which layer of the OSI model do ping requests occur?

A

Layer 3 (Network Layer)

117
Q

what are the software defined networking layers?

A

Application - communication resource requests or info about the network
Control - uses information from the applications to decide how to route a data packet on the network
Infrastructure - switches and routers, physical hardware
Infrastructure - physical networking devices
Management Plane - monitors traffic conditions, status of network, allows admin to oversee network operations

118
Q

what mode do devices operate in when connected to a hub?

A

half-duplex

119
Q

communication mode where devices cannot listen and talk at the same time

A

half-duplex

120
Q

what network device allows devices to operate in full duplex mode?

A

switch

121
Q

communication mode that allows devices to listen and talk simultaneously

A

full duplex

122
Q

maximum distance of copper cables

A

100 meters

123
Q

what happens to the speed of CAT 6 at 100 meters?

A

speed goes from 10 Gbps to 1 Gbps

124
Q

what can the speed of CAT 6 be at under 55 meters?

A

10 Gbps

125
Q

what is the distance range of multimode fibers?

A

200 - 500 meter range

126
Q

which is better for longer distances, single mode or multi mode fibers?

A

single mode

127
Q

what does S is not Single mean?

A

Ethernet standards with S in the name are multimode, not single mode

ex. 100BASE-SX = multimode

128
Q

which ethernet standard works with both single mode and multimode?

A

1000BASE-LX

129
Q

what is IEEE 802.3ad?

A

link aggregation

130
Q

what is the ethernet standard for power over ethernet?

A

PoE 802.3af

131
Q

what is the ethernet standard for power over ethernet plus?

A

PoE+ 802.3at

132
Q

what is the wattage of PoE 802.3af?

A

15.4 watts

133
Q

what is the wattage of PoE+ 802.3at?

A

25.5 watts

134
Q

what is 802.1x used for?

A

user authentication

135
Q

flag used to ensure data is given priority and is processed at the sending or receiving ends

A

PSH (push)

136
Q

what is the ideal range for humidity?

A

40-60%

137
Q

type of trap message that has a OID to distinguish each message as a unique message being received using SNMP

A

granular

138
Q

the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers (OID)

A

Management Information Base (MIB)

139
Q

SNMP trap that may be configured to contain all information about a given alert or event

A

verbose

140
Q

in SNMP, asynchronous notifications sent from the managed agent to the manager to notify it of significant events in real time

A

trap messages

141
Q

a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned

A

split-horizon route advertisement

142
Q

a method to prevent a router from sending packets through a route that has become invalid within computer networks by changing the route’s metric to a value that exceeds the maximum allowable hop count so that the route is advertised as unreachable

A

route poisoning

143
Q

tool used to connect a network cable (such as Cat 5e) to a patch panel, 110-block, or the inside portion of a wall jack

A

punchdown tool

144
Q

tool used to join the internal wires of a twisted pair cable with metallic pins housed inside a plastic connector, such as an RJ-45 connector

A

cable crimper

145
Q

type of attack by stealing or predicting a valid session token to gain unauthorized access to the web server

A

session highjacking

146
Q

an unintended connection between two points in a cable or wire allowing current to flow where it should not

A

short

147
Q

occurs within a twisted pair cable when the pairs become untwisted or no shielding or insulation remains

A

crosstalk

148
Q

standard used to define VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames

A

IEEE 801.q

149
Q

standard that defines STP (Spanning Tree Protocol)

A

IEEE 802.1d

150
Q

what devices are used to split up broadcast domains?

A

Router

151
Q

devices that split up broadcast domains

A

routers, VLANs, layer 3 switch

152
Q

a password-based authentication protocol used by Point to Point Protocol (PPP) to validate users

A

Password Authentication Protocl (PAP)

153
Q

an approach to cybersecurity in which a series of defensive mechanisms are layered in order to protect valuable data and information

A

Defense in Depth

154
Q

provides a method to control the bonding of several physical ports to form a single logical channel

A

LACP (Link Aggregation Protocol)

155
Q

a mechanism used within computer network infrastructures to speed up the time it takes a data packet to flow from one node to another. The label-based switching mechanism enables the network packets to flow on any protocol

A

MPLS (Multi-protocol label switching)

156
Q

Which remote access tool that allows you to connect to a desktop remotely and see their screen is open-source?

A

VNC (Virtual Network Computing)

157
Q

an attack where the attacker is able to send traffic from one VLAN into another by either double tagging the traffic or conducting switch spoofing

A

VLAN Hopping

158
Q

what is the first flag used in a three way handshake?

A

SYN

159
Q

type of denial of service attack that targets communication between a user and a Wi-Fi wireless access point by causing the wireless client to disconnect from the wireless network and then reconnect, during which time an attacker can conduct a packet capture of the authentication handshake and use that to attempt to brute force the network’s pre-shared key

A

deauthentication attack

160
Q

a broadcast domain that is partitioned and isolated in a computer network at the data link layer.

A

VLAN

161
Q

type of data center that is equipped but no customer data

A

warm site

162
Q

which wireless standard uses MU-MIMO on non-overlapping channels to increase the wireless network’s bandwidth?

A

802.11ac

163
Q

technology that allows a wireless access point to communicate with multiple devices simultaneously to decrease the time each device has to wait for a signal and dramatically speeds up the entire wireless network

A

MU-MIMO (Multi-user, Multiple-input, Multiple-output technology)

164
Q

what happens to data in each layer of the OSI model?

A

Layers 5, 6, 7 - data transmitted
Layer 4 - data encapsulated into segments
Layer 3 - segments encapsulated into packets
Layer 2 - packets encapsulated into frames
Layer 1 - frames encapsulated into bits

165
Q

DHCP security techniques that can configure a LAN switch to prevent malicious or malformed DHCP traffic or rogue DHCP servers

A

DHCP snooping

166
Q

command used on a Cisco networking device to display the current state of the routing table for a given network device

A

show route

167
Q

Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

A

4G

168
Q

the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs, or laptop computers, sending a vCard which typically contains a message in the name field to another Bluetooth-enabled device via the OBEX protocol.

A

bluejacking

169
Q

cross-platform, open-source tool used to scan IP addresses and ports on a target network, and to detect running services, applications, or operating systems on that network’s clients, servers, and devices

A

nmap, or Network Mapper

170
Q

authentication protocol that uses strong encryption to securely send data over insecure networks

A

Kerberos