Network+ Part 2 Flashcards
What is the signal rate for DS0?
64Kbps
ADSL can run up to what speed?
15Mbps
What is the popular Microsoft Remote Access server program called?
Routing and Remote Access Service (RRAS)
What device is used to connect a T1 line?
CSU/DSU
BRI ISDN uses ______
2 B Channels and 1 D Channel
The V.90 standard defines a modem speed of ___
56Kbps
You have just had DSL installed at your house. Although the Internet connection is fast, your phones no longer work. What is the problem?
The installer failed to install the POTS filters on the phones.
What protocol do cable modems use?
DOCSIS
What is SONET used for?
Long-Distance, High-Speed, Fiber-optic transmission
What does SIP stand for?
Session Initiation Protocol
Which Wireless networking technology used the 5.0GHz frequency range?
802.11a
Which Technology enables use of a WAP without directly connecting the WAP to an AC power outlet?
PoE (Power over Ethernet)
What is known as a Basic Service Set in Infrastructure model?
A WAP
What feature enables 802.11n networks to minimise dead spots?
Transit Beamforming
To achieve maximum Wi-Fi coverage in a room, where should you place the WAP?
To achieve maximum coverage, place the WAP in the centre of the room
Which two pieces of hardware enables wireless PCs to connect to resources on a wired network segment in infrastructure mode?
- Wireless Access Point
- A Wireless Bridge
What type of server supports EAP-encrypted passwords in accordance with 802.1x standard?
A RADIUS Server
What is the most secure method of Wireless encryption?
WPA2
Upgrading which component of a host machine would most likely enable you to run more virtual machines simultaneously?
RAM
What enables two VMs hosted on the same physical machine to communication without leaving the machine itself?
Virtual Switch
What feature lets you save a VM’s state so you can quickly restore to that point?
Snapshot
What do you need to install a legal copy of Windows 10 into a virtual machine using VMware Workstation?
Valid Windows 10 installation media
What is the advantage of a Virtual Machine over a physical machine?
Hardware consolidation
Janelle wants to start a new photo-sharing service for real pictures of bigfoot, but doesn’t own any servers. How can she quickly create a new server to run her service?
Public Cloud
Janelle has a new idea for a new service to report Loch Ness Monster sightings. What service would help keep her from having to play system administrator?
Platform as a Service
John has two sets of machines that need to be on their own subnet. What should he use to subnet each group of virtual machines without moving or re-cabling hardware?
Virtual Router
What would enable you to use iSCSI to read and write data over the network?
Storage Area Network
Which Cellular WAN technology introduced the concept of the SIM card?
GSM (Global System for Mobile)
GSM, EDGE and LTE all use what?
Sim cards and TDMA (Time-Division Multiple Access)
A thermostat that you can control from your smart phone, fits under which category?
IoT (Internet of Things)
You can reduce the vulnerability of your cell phone when automatically connecting to open SSIDs by ___
Requiring HTTPS
In order to pair another Bluetooth device, it must be set into _______ Mode
Discoverable
A Bluetooth PIN Code is at least ____ digits long
four
NFC tags are always ____
Passive
All tap-to-pay services use which networking technology?
NFC (Near Field Communication)
A TV remote control most likely uses which network technology?
Infrared Technology
Which network technology uses the least power?
ANT+
In which deployment model does the company own all devices, issue whichever device it chooses to a given employee, and retain control of which apps are installed?
COBO (Corporate-Owned Business-Only)
When designing a basic network, what two factors should you consider?
- List of Requirements
- Equipment limitations
Network authentication is a unique server function, True or False?
True
What standard is used by most NAS devices, enabling them to connect easily to almost any network?
CIFS - Common Internet File System
Adding a generator to a Server room is an example of what?
Power Redundancy
H.323 uses which TCP Port number?
1720
The RTP Protocol runs on top of which protocol?
SIP
What is medianet’s primary tool to ensure bandwidth for VTC?
Quality of Service
The centrepiece of any ICS will be what?
ICS Server
What differentiates a PLC from a DCS controller?
A PLC traditionally uses ordered steps to control a machine (Sequential control)
What should be found in a security policy?
Acceptable use policy
Through what mechanism is a change to the IT structure initiated?
Users submit a change request to the change management team
Users need training from the IT department to understand what?
How to secure workstations with screen-locking and password-security techniques
When is a memorandum of understanding used?
When a legal contract is not appropriate
The best way to know the vulnerabilities of an IT Infrastructure is to run what?
Vulnerabilities scanner
What is succession planning?
Identifying personnel who can take over certain positions in response to an incident
During and after a change to the IT infrastructure, what must be done?
The changes must be documented
What is the job of a first responder?
React to the notification of a computer crime
When working inside of equipment, what should Jane do?
Wear a properly connected anti-ESD wrist strap
The placement of the rack should optimize what?
Airflow
A hacker who sends an email but replaces his return e-mail address with a fake one is _____ the email address
Spoofing
What is a tool to prevent ARP Cache Poisoning?
DAI (Dynamic ARP Inspection)
A computer compromised with malware to support a botnet is called _____
A Zombie
The goal of this aspect of a DoS attack is to make the attacked system process each request for as long as possible.
Amplification
A user’s machine is locked to a screen telling her she must call a umber to unlock her system. What kind of attack is this?
Ransomware
An attack where someone tries to hack a password using every possible password permutation is called what?
Brute force
Which Windows utility displays open ports on a host?
Netstat
Which two protocols are notorious for cleartext passwords?
Telnet and POP3
The NSA’s TEMPEST security standards are used to combat which risk?
RF Emanation
Bob is told by his administrator to go to www.runthisantimalware.com and click ‘Run the Program’ to check for malware. What form of anti-malware delivery is this called?
Cloud-Based
Which PDU does an SNMP manager use to query agents?
Get
In an SNMP managed network, which software does a managed device run?
Agent Software
How does an SNMP managed system categorise data that can’t be queried?
MIBs (Management Information Bases)
An SNMP manager listens on which port when used with TLS?
10162
Jason is concerned about the communication between two workstations and wants to capture and analyse that traffic to see if anything illicit is going on. Which tool would best serve his needs?
Packet Flow Monitor
Where does a packet sniffer put information it collects?
A Capture File
An analysis of a network capture packet shows a lot of traffic on one machine on port 161. What kind of machine is it?
Managed Device
What should you create when a network is running correctly?
A baseline (So you can compare network performance later on)
What tool enables you to compare current network performance with correctly functioning network performance?
A Performance monitor
When should you use a cable tester to troubleshoot a network cable?
When you have a dead connection and you suspect a broken cable
What are tone probes and tone generators used for?
Locating a particular cable
What does NSLOOKUP do?
Queries DNS for the IP Address of the supplied host name
What is WireShark?
Protocol Analyzer, Packet Sniffer and Packet analyzer
What will the command route print return on a windows system?
The current systems route table
When trying to establish symptoms over the phone, what kind of questions should you ask of a novice or confused user?
You should ask open-ended questions and let the user explain the problem in their own words
While you are asking the user problem-isolating questions, what else should you be doing?
Asking yourself if there is anything on your side of the network that could be causing the problem.
Which command shows you detailed IP information, including DNS server addresses and MAC Addresses?
ipconfig /all
What is the last step in the troubleshooting process?
Documenting the solution
One of your users calls you with a complaint that he can’t reach www.google.co.uk. You try and access the site and discover you can’t connect but you can ping the site with its IP Address. What is the most probable culprit?
The DNS Server is down.