Network+ Extra Revision Flashcards
Gap in Knowledge
What port is SMB?
Server Message Block Port 445 or 139 - Layer 6 and 7 of OSI Layer
What command do you use to figure out to trouble shoot DHCP Snooping?
Show Config
How can you increase the security in a VLAN by adding something in the VLAN gateway?
ACL
Which terms represent the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?
RPO - Recovery point objective (RPO) is defined as the maximum amount of data – as measured by time – that can be lost after a recovery from a disaster, failure, or comparable event before data loss will exceed what is acceptable to an organization.
What is MTTR?
Mean time to repair (MTTR), sometimes referred to as mean time to recovery, is a metric that is used to measure the average time it takes to repair a system or piece of equipment after it has failed. MTTR includes the time from when the failure occurs to when the system or equipment is fully functional again.
Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?
Wiring Diagram
What is RTO?
Recovery time objective (RTO) often refers to the amount of time that an application, system and process can be down without causing significant damage to the business and the time spent restoring the application and its data to resume normal business operations after a significant incident.
What is MTBF?
MTBF (mean time between failures) is the average time between repairable failures of a technology product. The metric is used to track both the availability and reliability of a product. The higher the time between failure, the more reliable the system.
What is nbstat used for?
nbtstat -r: displays the count of all NetBIOS names resolved by broadcast and querying a WINS server. nbtstat -R: purges and reloads the remote cache name table.
What can you use for a better server availability in the future? Instead of using UPS and replacing the battery?
Add a redundant power supply to the server
Which technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on?
GPS Location and NAC
Which type of network model requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?
Client Server
Explain BGP?
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used with individual usernames and passwords for each client. MAC filtering does not use a password or preshared key. WEP uses a pre-shared key to secure a wireless network, but WPA uses a stronger encryption standard than WEP.
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
De-encapsulation
Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?
802.11b
802.11ax
802.11g
802.11a
802.11ac
802.11n
802.11g
Level 0
Emergency System unstable
Level 1
Alert Correct Immediately
Level 2
Critical - Failure in primary application, requires immediate attention.
Level 3
Error - Preventing Proper Function
Level 4
Warning - Error might occur if action not taken soon
Level 5
Notice - Unusual but no error
Level 6
Information - no action required
Level 7
Debugging
What does Parabolic antenna used for?
Parabolic antennas work well for outside wireless applications where you want directional control of the signal (such as when connecting two buildings) and over a longer distance (such as “down the street”)
What is RADIUS and Port?
The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.
What is Kerberos and functions?
Kerberos is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT. Challenge-Handshake Authentication Protocol (CHAP) is used to authenticate a user or network host to an authenticating entity.
How to link duplicate NIC to create higher bandwidth?
The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol is used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.
An On-Path attack happens and all the Layer 2 traffic destined for the gateway is now being redirected to the employee’s computer. What type of attack is this an example of?
ARP spoofing (also known as ARP poisoning) is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer, server, or gateway on the network.
What is the standard 802.3af?
PoE
What Port does SIP use?
5060/5061 - Session Initiation Protocol
What is the port for SQLNet?
1521
Bandwidth vs Throughput
What is the difference between bandwidth and throughput? Network bandwidth determines the network’s capacity of how much data in network can possibly travel in a period of time, while network throughput measures how much data actually travels in a period of time.
Which of the following communication types are used in IPv6 to send a packet to the nearest interface that shares a common address in a routing table?
Anycast
Multicast
Multicasting addresses messages for a specific group of devices in a network. Note that, even if a group contains all the devices in a network, multicast is theoretically different from the broadcast. This difference consists that, in the multicast case, devices effectively subscribe to receive messages. In the broadcast case, however, devices receive messages regardless of whether or not they want to.
Broadcast
The broadcast addressing method considers the communication through a network that involves a single sender (source) and multiple receivers (destinations). By default, the broadcast receivers are every device connected to the same network as the sender. So, using the same analogy as for unicast, we can comprehend the broadcast communication as some person (sender) in a party (network) standing up on a table and shouting a message to everyone (receivers) listening.
Anycast
The anycast addressing method forwards messages to a single device of a specific group of devices. Typically, considering the sender’s position, the topologically nearest device of the aimed anycast group will receive the message. In our party (network) example, we can comprehend anycast communication when a person (sender) will leave the party but first wants to say goodbye to the hosts (anycast group). As the party is going on and most of the hosts are occupied with several guests, it is okay to say goodbye to a single one. So, the person looks around and finds the closest party host (destination), thanks for the party, and goes away.
Unicast
The unicast addressing method indicates that communication through a network involves a unique sender (source) and a single receiver (destination). Making an analogy, we can see unicast communication as a particular conversation with a single person (unicast) at a party with many people (network). Thus, addressing messages with the unicast method supposes private communication. However, since other entities can intercept the messages, employing unicast addressing doesn’t guarantee private communication in the network. In the analogy of a party, similarly, just the fact of talking to a single person doesn’t imply that other people near you will not listen to the conversation.
What does STP sit in the OSI model?
Layer 2
What does a Split Horizon function entail?
A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
What protocol is used in DB-9 Connector?
RS-232 is a standard for serial communication transmission of data. It formally defines the signals connecting a DTE (data terminal equipment) such as a computer terminal and a DCE (data circuit-terminating equipment or data communication equipment).
A DB-9 connector is often found on a rollover or console cable and is used to connect a router to a laptop using the RS-232 serial transmission protocol for configuring a network device.
What Port does a System Logging Protocol (Syslog) Use?
Port 514 System Logging Protocol (Syslog) uses port 514, and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.
Which of the following network devices is used to separate collision domains?
A bridge is networking hardware that forwards traffic between network segments at the data link layer (Layer 2) of the OSI model using MAC addresses. Each switch port on a bridge is a separate collision domain, but all switch ports are in a common broadcast domain.
What is an example of a signaling protocol used to initiate, maintain, and terminate a real-time VoIP session?
SIP (Session Initiation Protocol) is a signaling protocol for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications.
What does VRRP Port use?
VRRP uses port 112
What Procol is used to transfer files and put a file onto a remote host and port that is used?
TFTP Port 69
You have been asked to troubleshoot a router which uses label-switching and label-edge routers to forward traffic. Which of the following types of protocols should you be familiar with to troubleshoot this device?
Multiprotocol label switching (MPLS) is a technique for speeding up network connections that was first developed in the 1990s. The public Internet functions by forwarding packets from one router to the next until the packets reach their destination.
MPLS is implemented between the data link layer and network layer in the TCP/IP protocol stack. MPLS replaces IP forwarding with label switching
According to the OSI model, at which of the following layers is data encapsulated into bits?
Layer 3
Layer 1
Layer 4
Layer 2
Data is transmitted at Layers 5, 6, and 6 of the OSI model. At Layer 4, the data is encapsulated into segments. At layer 3, the segments are encapsulated into packets. At layer 2, the packets are encapsulated into frames. At layer 1, the frames are encapsulated into bits.
Where does the VLAN sit on the OSI Layer?
Data Link Layer (Layer 2)