Network+ Extra Revision Flashcards

Gap in Knowledge

1
Q

What port is SMB?

A

Server Message Block Port 445 or 139 - Layer 6 and 7 of OSI Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command do you use to figure out to trouble shoot DHCP Snooping?

A

Show Config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can you increase the security in a VLAN by adding something in the VLAN gateway?

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which terms represent the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?

A

RPO - Recovery point objective (RPO) is defined as the maximum amount of data – as measured by time – that can be lost after a recovery from a disaster, failure, or comparable event before data loss will exceed what is acceptable to an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MTTR?

A

Mean time to repair (MTTR), sometimes referred to as mean time to recovery, is a metric that is used to measure the average time it takes to repair a system or piece of equipment after it has failed. MTTR includes the time from when the failure occurs to when the system or equipment is fully functional again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?

A

Wiring Diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RTO?

A

Recovery time objective (RTO) often refers to the amount of time that an application, system and process can be down without causing significant damage to the business and the time spent restoring the application and its data to resume normal business operations after a significant incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is MTBF?

A

MTBF (mean time between failures) is the average time between repairable failures of a technology product. The metric is used to track both the availability and reliability of a product. The higher the time between failure, the more reliable the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is nbstat used for?

A

nbtstat -r: displays the count of all NetBIOS names resolved by broadcast and querying a WINS server. nbtstat -R: purges and reloads the remote cache name table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What can you use for a better server availability in the future? Instead of using UPS and replacing the battery?

A

Add a redundant power supply to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on?

A

GPS Location and NAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of network model requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?

A

Client Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain BGP?

A

If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?

A

Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used with individual usernames and passwords for each client. MAC filtering does not use a password or preshared key. WEP uses a pre-shared key to secure a wireless network, but WPA uses a stronger encryption standard than WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

A

De-encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?

802.11b
802.11ax
802.11g
802.11a
802.11ac
802.11n

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Level 0

A

Emergency System unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Level 1

A

Alert Correct Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Level 2

A

Critical - Failure in primary application, requires immediate attention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Level 3

A

Error - Preventing Proper Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Level 4

A

Warning - Error might occur if action not taken soon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Level 5

A

Notice - Unusual but no error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Level 6

A

Information - no action required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Level 7

A

Debugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What does Parabolic antenna used for?

A

Parabolic antennas work well for outside wireless applications where you want directional control of the signal (such as when connecting two buildings) and over a longer distance (such as “down the street”)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is RADIUS and Port?

A

The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is Kerberos and functions?

A

Kerberos is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT. Challenge-Handshake Authentication Protocol (CHAP) is used to authenticate a user or network host to an authenticating entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How to link duplicate NIC to create higher bandwidth?

A

The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol is used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

An On-Path attack happens and all the Layer 2 traffic destined for the gateway is now being redirected to the employee’s computer. What type of attack is this an example of?

A

ARP spoofing (also known as ARP poisoning) is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer, server, or gateway on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the standard 802.3af?

A

PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What Port does SIP use?

A

5060/5061 - Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the port for SQLNet?

A

1521

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Bandwidth vs Throughput

A

What is the difference between bandwidth and throughput? Network bandwidth determines the network’s capacity of how much data in network can possibly travel in a period of time, while network throughput measures how much data actually travels in a period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following communication types are used in IPv6 to send a packet to the nearest interface that shares a common address in a routing table?

A

Anycast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Multicast

A

Multicasting addresses messages for a specific group of devices in a network. Note that, even if a group contains all the devices in a network, multicast is theoretically different from the broadcast. This difference consists that, in the multicast case, devices effectively subscribe to receive messages. In the broadcast case, however, devices receive messages regardless of whether or not they want to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Broadcast

A

The broadcast addressing method considers the communication through a network that involves a single sender (source) and multiple receivers (destinations). By default, the broadcast receivers are every device connected to the same network as the sender. So, using the same analogy as for unicast, we can comprehend the broadcast communication as some person (sender) in a party (network) standing up on a table and shouting a message to everyone (receivers) listening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Anycast

A

The anycast addressing method forwards messages to a single device of a specific group of devices. Typically, considering the sender’s position, the topologically nearest device of the aimed anycast group will receive the message. In our party (network) example, we can comprehend anycast communication when a person (sender) will leave the party but first wants to say goodbye to the hosts (anycast group). As the party is going on and most of the hosts are occupied with several guests, it is okay to say goodbye to a single one. So, the person looks around and finds the closest party host (destination), thanks for the party, and goes away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Unicast

A

The unicast addressing method indicates that communication through a network involves a unique sender (source) and a single receiver (destination). Making an analogy, we can see unicast communication as a particular conversation with a single person (unicast) at a party with many people (network). Thus, addressing messages with the unicast method supposes private communication. However, since other entities can intercept the messages, employing unicast addressing doesn’t guarantee private communication in the network. In the analogy of a party, similarly, just the fact of talking to a single person doesn’t imply that other people near you will not listen to the conversation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What does STP sit in the OSI model?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What does a Split Horizon function entail?

A

A split-horizon route advertisement is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What protocol is used in DB-9 Connector?

A

RS-232 is a standard for serial communication transmission of data. It formally defines the signals connecting a DTE (data terminal equipment) such as a computer terminal and a DCE (data circuit-terminating equipment or data communication equipment).

A DB-9 connector is often found on a rollover or console cable and is used to connect a router to a laptop using the RS-232 serial transmission protocol for configuring a network device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What Port does a System Logging Protocol (Syslog) Use?

A

Port 514 System Logging Protocol (Syslog) uses port 514, and is a way network devices can use a standard message format to communicate with a logging server. It was designed specifically to make it easy to monitor network devices. Devices can use a Syslog agent to send out notification messages under a wide range of specific conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which of the following network devices is used to separate collision domains?

A

A bridge is networking hardware that forwards traffic between network segments at the data link layer (Layer 2) of the OSI model using MAC addresses. Each switch port on a bridge is a separate collision domain, but all switch ports are in a common broadcast domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is an example of a signaling protocol used to initiate, maintain, and terminate a real-time VoIP session?

A

SIP (Session Initiation Protocol) is a signaling protocol for initiating, maintaining, and terminating real-time sessions that include voice, video, and messaging applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does VRRP Port use?

A

VRRP uses port 112

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What Procol is used to transfer files and put a file onto a remote host and port that is used?

A

TFTP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

You have been asked to troubleshoot a router which uses label-switching and label-edge routers to forward traffic. Which of the following types of protocols should you be familiar with to troubleshoot this device?

A

Multiprotocol label switching (MPLS) is a technique for speeding up network connections that was first developed in the 1990s. The public Internet functions by forwarding packets from one router to the next until the packets reach their destination.

MPLS is implemented between the data link layer and network layer in the TCP/IP protocol stack. MPLS replaces IP forwarding with label switching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

According to the OSI model, at which of the following layers is data encapsulated into bits?

Layer 3
Layer 1
Layer 4
Layer 2

A

Data is transmitted at Layers 5, 6, and 6 of the OSI model. At Layer 4, the data is encapsulated into segments. At layer 3, the segments are encapsulated into packets. At layer 2, the packets are encapsulated into frames. At layer 1, the frames are encapsulated into bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Where does the VLAN sit on the OSI Layer?

A

Data Link Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which communication technology would MOST likely be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?

A

Dense wavelength-division multiplexing (DWDM) is an optical fiber multiplexing technology that is used to increase the bandwidth of existing fiber networks. It combines data signals from different sources over a single pair of optical fiber, while maintaining complete separation of the data streams.

51
Q

When using a Type 1 hypervisor virtualized environment, which of the following hardware types is necessary to connect the VMs to the corporate network?

A

Virtual NIC

52
Q

What port number does POP3 over SSL utilize?

A

port 995

53
Q

Which cellular technology is compromised of LTE and LTE-A to provide higher data speeds than previous cellular data protocols?

A

4G

54
Q

Which of the following errors would be received if an ethernet frame less than 64 bytes is received by a switch?

A

Runt

55
Q

Which of the following ports should be allowed to enable access to certain VoIP applications?

A

5060

56
Q

What network device uses ACLs to prevent unauthorized access into company systems?

A

Firewalls

57
Q

Which of the following tools would allow you to detect running services, applications, or operating systems on the network’s clients, servers, or devices by sending specifically crafted packets to them and analyzing their responses?

A

Nmap, or Network Mapper, is a cross-platform, open-source tool used to scan IP addresses and ports on a target network, and to detect running services, applications, or operating systems on that network’s clients, servers, and devices.

58
Q

Which of the following BEST describes how a DHCP reservation works?

A

When the client requests an IP address by sending a message on the network to the DHCP server, the DHCP server will assign an IP from its DHCP scope to the client and reserve it based on its MAC address. DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user or client devices.

59
Q

Sahra connects a pair of switches using redundant links. When she checks the link status of the two ports, one of them is not active. She changes the inactive link to another switchport, but the second link still remains inactive. What MOST likely is causing the second link to become disabled?

A

The Spanning Tree Protocol (STP) is a network protocol that builds a loop-free logical topology for Ethernet networks. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. If STP detects a switching loop being created by the redundant connection, it will disable the switchport automatically.

60
Q

What is IGRP?

A

The Interior Gateway Routing Protocol (IGRP) is a distance-vector interior gateway protocol developed by Cisco to exchange routing data within an autonomous system. IGRP is used with layer 3 devices (routers) and not layer 2 devices (switches).

61
Q

A technician installs a new WAP, and users in the area begin to report poor performance. The technician uses ping, and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?

A

A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is almost like a spectrum interference issue.

62
Q

You just started work as a network technician at Dion Training. You have been asked to determine if Ethernet0/0 is currently connected using OSPF or EIGRP on one of the network devices. Which of the following commands should you enter within the command line interface?

A

The “show route” command is used on a Cisco networking device to display the current state of the routing table for a given network device. To determine if Ethernet0/0 is connected using OSPF or EIGRP, you would need to use the “show route” command to display the current status.

63
Q

DMVPN

A

DMVPN (Dynamic Multipoint VPN) is a routing technique we can use to build a VPN network with multiple sites without having to statically configure all devices.

64
Q

What functions does mGRE use?

A

Multipoint GRE (Multi Point Generic Routing Encapsulation) is a protocol that can be used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network. The mGRE protocol is often used in Dynamic Multipoint VPN (DMVPN) connections.

65
Q

What is BEST used to perform a one-time temporary posture assessment in a NAC environment?

A

A non-persistent agent is used to access the device during a one-time check-in at login.

A persistent agent is agent software that resides on the client making the connection, and a non-persistent agent is software the client runs (usually from a browser) as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect. This is beneficial in BYOD (Bring Your Own Device) policies.

66
Q

What is NAT used for?

A

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. Using NAT, you can have the internal IP address of each workstation mapped to a public IP address or port when it crosses the router to access the WAN.

67
Q

What IEEE standard does STP and Bridging use?

A

802.1d

68
Q

A network technician needs to install a server to authenticate remote users before accessing corporate network resources when working from home. Which kind of server should the network technician implement?

A

A technician who needs to install a server for authenticating remote users before granting them access to corporate network resources for telecommuting purposes should implement a Remote Access Service (RAS) server.

69
Q

At which of the following OSI layer does QoS operate?

A

Quality of Service (QoS) occurs at both Layer 2 and Layer 3 of the OSI Model. Layer 2 Quality of Service (QoS) allows for traffic prioritization and bandwidth management to minimize network delay using Cost of Service (CoS) classification, and DSCP marking under the 802.1p standard. Layer 3 Quality of Service (QoS) allows for managing the quality of network connections through its packet routing decisions.

70
Q

Which of the following network performance metrics is used to represent the actual measure of how much data is successfully transferred from a source to a destination in a given amount of time?

A

Throughput

71
Q

Which of the following levels would a notice condition generate?

A

Level 5

72
Q

Which of the following components is used by an agent to send a single key-pair value about a significant event or condition that is occurring in real-time to a manager?

A

Granular Trap

73
Q

Which of the following tools allows you to view and modify the layer 2 to layer 3 address bindings?

A

arp

74
Q

Thomas has a server that streams media to the local network, and the device is currently visible on the network. All of the workstations on the LAN can ping the device, and all the firewalls are currently turned off. The goal is for the streaming media server to allow different workstations to watch the stream if they choose to subscribe to it. The streaming device appears to be functioning properly, but the media won’t stream when requested. Which of the following TCP/IP technologies is MOST likely not implemented properly?

Multicast
Anycast
Unicast
Broadcast

A

Multicast is a TCP/IP technology that sends out the packets to the requested devices when streaming to multiple workstations from a single streaming media server. As opposed to broadcast (one-to-all), which sends out packets to all devices, multicast (one-to-many-of-many/many-to-many-of-many) only sends packets to the clients that specifically requested to be a part of the distribution and not just every client on the network. Multicast requires the proper implementation and configuration to route the traffic to the right devices on the LAN so that streaming can properly function. Multicast works with IPv4 or IPv6. Unicast communication only has one sender and one receiver. Unicast works with IPv4 or IPv6. Broadcast communication has one sender, but it sends the traffic to every device on the network. Broadcast only works with IPv4. Anycast communications are sent to the nearest receiver in a group of receivers with the same IP. Anycast only works with IPv6.

75
Q

You have been asked to recommend a capability to monitor all of the traffic entering and leaving the corporate network’s default gateway. Additionally, the company’s CIO requests to block certain content types before it leaves the network based on operational priorities. Which of the following solution should you recommend to meet these requirements?

Install a firewall on the router’s internal interface and a NIDS on the router’s external interface

Install a NIPS on the internal interface and a firewall on the external interface of the router

Configure IP filtering on the internal and external interfaces of the router

A

Due to the requirements provided, you should install a NIPS on the gateway router’s internal interface and a firewall on the external interface of the gateway router. The firewall on the external interface will allow the bulk of the malicious inbound traffic to be filtered before reaching the network. Then, the NIPS can be used to inspect the traffic entering the network and provide protection for the network using signature-based or behavior-based analysis. A NIPS is less powerful than a firewall and could easily “fail open” if it is overcome with traffic by being placed on the external interface. The NIPS installed on the internal interface would also allow various content types to be quickly blocked using custom signatures developed by the security team. We wouldn’t want to place the NIPS on the external interface in the correct choice for the same reasons. We also wouldn’t choose to install a NIPS on both the internal and external connections. IP filtering on both interfaces of the router will not provide the ability to monitor the traffic or to block traffic based on content type. Finally, we would not want to rely on a NIDS on the external interface alone since it can only monitor and not provide the content blocking capabilities needed.

76
Q

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

A

SSL

77
Q

You have been asked to connect a new computer to a 100BaseTX network switch on switchport 3. Which type of cable should you utilize?

A

Straight-through

78
Q

You have been contracted by Dion Training to conduct a penetration test against its learning management system (LMS). The LMS is a web application that is hosted in the organization’s DMZ. Which of the following appliance allow lists should the organization add your source IP in before the engagement begins?

HIDS
DLP
NIDS
WAF

A

The learning management system (LMS) is a web application, therefore the source IP of the attacking workstation needs to be added to the web application firewall’s allow list to prevent it from being blocked. Adding a source IP address to the allow list will exclude it from ACL rules and other signatures. This prevents an active device, like a web application firewall (WAF), layer 4 firewall, or an intrusion protection system (IPS) from blocking the penetration tester during the assessment. By having your IP added to the allow list, you can focus your time and efforts on finding vulnerabilities with the servers themselves instead of trying to break through a compensating control like a WAF or IPS.

79
Q

You have just replaced the edge switch on the second floor of Dion Training. After you finish, a user states they can no longer access the network but everything was working fine yesterday before you replaced the switch. The user’s coworkers claim their computers are able to access the network without any issues. You check the back of the user’s workstation and you do not see any LED lights lit or blinking on their network interface card. Which of the following should you check next to solve this issue?

Verify the network cable is attached to the new switch
Verify the device is using the correct cable type
Verify the switch is connected to the router
Verify the network interface card is operating properly

A

Since the workstation was working yesterday, it shouldn’t fail just because you upgraded the switch. You should first double-check what changed. In this case, you unplugged the old switch and replaced it with the new switch. If you didn’t fully plug the patch cables back into the new switch after the upgrade, this would lead to no LED lights being lit on the workstation’s NIC. Similarly, if you recently moved a workstation, you would want to double-check the cable connection on the workstation itself. Based on the symptoms, this is most likely a layer 1 (physical layer) issue. You should first question the obvious and what has changed before any of the other options.

80
Q

What are the functions of HSRP?

A

The Hot Standby Router Protocol (HSRP) is an IP routing redundancy protocol designed to allow for transparent failover at the first-hop IP router. HSRP provides high network availability, because it routes IP traffic from hosts on networks without relying on the availability of any single router.

81
Q

What does can a Asymmetric routing cause in transferring data?

A

Asymmetric routing is when network packets leave via one path and return via a different path (unlike symmetric routing, in which packets come and go using the same path). Remember, asymmetric routing doesn’t cause any routing issues necessarily, but they do cause issues with dropped packet flows by our security devices like firewalls and unified threat management systems, so you need to consider this in the design of your network architectures to prevent this issue from occurring. If you don’t, then packet flow drops will occur and your clients can experience network intermittent connectivity.

82
Q

What does the Hostname command show?

A

The hostname command is used to view or change a computer’s hostname and domain. On a Windows system, the hostname, computer name, and NetBIOS name are all the same.

83
Q

What is the TFTP?

A

A trivial file transfer protocol (TFTP) server is used to send or receive files over a TCP/IP network.

TFTP servers are commonly used to transfer firmware images and configuration files to network appliances like routers, switches, firewalls, and VoIP devices.

84
Q

Which of the following communication types cannot be used with IPv6?

Broadcast
Multicast
Unicast
Anycast

A

Broadcast

85
Q

What is used to define how much bandwidth can be used by various protocols on the network?

A

Traffic Shaping

86
Q

Which of the following wireless characteristic does channel bonding improve?

A

Connection Speed

87
Q

What port doe the SNMP use?

A

161

88
Q

Which of the following network issues can be prevented by configuring the split-horizon options on your network devices?

A

Routing loops

89
Q

What port is SMB and what can it facilitate?

A

Port 139 is used for file and printer sharing over NetBIOS, running over TCP/IP. This setup is typical in older versions of Windows and in various Unix systems. On the other hand, port 445 is used for direct SMB communications without the need for NetBIOS

90
Q

What does a ROAS do?

A

ROUTER ON A STICK, also known as a “one-armed router” is a method for running multiple VLANs over a single connection in order to provide inter-VLAN routing without the need of a Layer 3 switch. Essentially the router connects to a core switch with a single interface and acts as the relay point between networks.

91
Q

What is iSCSI used for?

A

Internet Small Computer Systems Interface or iSCSI is an Internet Protocol-based storage networking standard for linking data storage facilities. iSCSI provides block-level access to storage devices by carrying SCSI commands over a TCP/IP network.

92
Q

What tool can you use to find information on port flapping?

A

Syslog

93
Q

What is an IBSS used for?

A

An Independent Basic Service Set or ad hoc network is the simplest of all IEEE 802.11 networks in that no network infrastructure is required (access point). As such, an IBSS is simply comprised of one or more Stations which communicate directly with each other.

94
Q

What is the difference between an IBSs and a BSS?

A

A basic Service Set represents the basic building bloc k of wireless network and consists of wireless devices communicating with each oher. It is commonly used in infrastructure mode, where devices connect to an access point.

95
Q

What is a ESS used for?

A

An extended Service Set is a set of connected BSS in a wireless network. It typically involves multiple access points working together in infrastructure mode, forming a larger network.

96
Q

What is a DSS used for?

A

Distribution System Service is related to the distribution of traffic in wireless networks. It involves the distribution system that connects to multiple access points to the wired network infrastructure.

97
Q

RTSP Port Number?

A

The Real-Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams (such as interactive media, video and audio) over a suitable transport protocol.

98
Q

What port does SMTP with submission with TLS?

A

587

99
Q

What does ping - t utilize?

A

It continuously ping and needs to manually stopped by the user

100
Q

What does ping - w utilize?

A

This option specifies the time out, which is the maximum time, in milliseconds, that the ping command waits for each reply.

101
Q

What does ping - i utilize?

A

This option sets the time interval between successive ping packets. It controls the rate at which the ping command sends requests.

102
Q

What does ping - s utilize?

A

This options specifies the size of the ping packets in bytes. It allows the technician to adjust the size of the packets sent during the ping.

103
Q

What are the functions of WLAN Controller?

A

Wireless Local Area Network Controller is designed to centrally manage and control wireless access points (APs) within a network. It can handle tasks such as configuring AP settings, managing firmware versions, and collecting logs from distributed wireless devices. This centralized management simplifies administration and ensure consistently across the wireless network.

104
Q

What is encapsulated directly inside of a frame?

A

IP Packet

105
Q

How do DNS root names servers respond to a DNS queries?

A

DNS root name servers give referrals to the appropriate authoratative Top Level Domain DNS Server.

A TLD nameserver maintains information for all the domain names that share a common domain extension, such as .com, . net, or whatever comes after the last dot in a URL. For example, a .com TLD nameserver contains information for every website that ends in ‘.com’.

106
Q

What is the three-tiered architecture layer? (all in order)

A

The three tier network architecture comprises three crucial layers: the core layer, aggregation layer, and access layer. These layers undertake different connections and functionalities, aiming to enhance the network architecture’s performance, reliability, and flexibility.

All runs exclusively at OSI Layer 3

107
Q

Which of the following would be BEST to use to detect MACspoofing attack?

ICMP
DHCP
IMAP
RARP

A

A Mac spoofing consists of changing the MAC addressof a network device (network card). A client computer can use REverse Address Resolution Protocol to request its Internet Protocol (IPv4 addressand MAC address from a computer network to check its accuracy.

108
Q

What is the name of the DHCP message that client sends when it needs to obtain IP address information. This message is the frist step in the four-way DHCP process?

A
  1. Discover - Client broadcasts a message to discover a DHCP server.
  2. Offer - DHCP servers offer an IP address.
  3. Request - Client selects an offer and formally requests to use the IP.
  4. Acknowledge - The Server formally allocates the IP (and options) to the client.
109
Q

Where might you set the lease duration for DHCP server that is servicing many clients in the network?

A

Scope Options

110
Q

What type of DNS message is often used to perform reverse lookups?

A

PTR

111
Q

Which of the following types of system are frequently used to collect informaiton from IDS?

A

Security information and event management system (SIEM) can function as a central clearinghouse for info gathered by IDSs and other security processes. NextGeneration Firewall (NGFW) RADIUS and VOIP are not systems that collect IDS information .

112
Q

What is the distance limitation of a 1000BASE-T Ethernet network has a distance limitation of 100meters for each segment of TP cabling?

A

100 metres

113
Q

If two devices simultaneously transmit data on the Ethernet network and a collision occurs, what does each station do in an attempt to resent the data and avoid another collision?

A

Each device sets a random back-off timer and device attempts retransmission after timer expires.

114
Q

What the difference between latency and jitter?

A

Jitter is when a latency and response rate vary.

115
Q

Does a VLAN have a single broadcast domain?

A

Yes

116
Q

Does two VLAN need to be routed in order to pass traffic between each other?

A

Yes

117
Q

What is the maximum amount of power a switch is allowed to provide per port, according to the IEEE 802.3af standad?

A

15.4w

118
Q

What is CVE?

A

CVE identifiers are intended for use with respect to identifying vulnerabilities: Common Vulnerabilities and Exposures (CVE) is a dictionary of common names (i.e., CVE Identifiers) for publicly known information security vulnerabilities.

119
Q

RDSL?

A

Rate Adaptive Digital Subscriber Line - A version of ADSL in which modems test the line at start-up and adapt their operating speed to the fastest the line can handle.

120
Q

Which layer of the three-tiered model is most concern with speed?

A

Core

121
Q

How is connectivity for the CISCO ACI (Application Centric Infrastructure) spine and leaf model implemented?

A

Each leaf device connects to each spine device

122
Q

How much percentage do you need to create minimal overlap over a channel to avoid dropping connection in 2.4ghz connection?

A

5-10%

123
Q

What does WEP use that has 24 bit string of characters added to the transmitted data before encryption?

A

Initialization vector

124
Q

What are logical groupings of SNMP system known as?

A

Communities