Network+ Study Cards Flashcards
What should you not do with an iSCSI SAN?
Implement on a standard production network with other network traffic.
Which command would you use on a switch to enable management from a remote network?
ip default-gateway X.X.X.X
You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?
802.11n
Which protocol and port number is used by TFTP?
UDP 69
A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn’t know, and he is asking for immediate clarification on several of the project’s details so the project can get back on schedule. Which type of an attack best describes the scenario?
Whaling
A user reports that she can’t connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?
Create an action plan
When a cisco device shows a significant number of RUNTS occurring, what would be the cause of this?
Collisions are occurring
What is the primary difference between impersonation and masquerading?
One is more active, and the other is more passive.
From the options of FDDI, 10BaseFL, Token Ring, and 1000BaseT, which of the following use the CSMA/CD access method?
1000BaseT
What command shows you the computer’s route table?
netstat -r
You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor?
Intermediate Distribution Frame
When troubleshooting network issues, what are the specific steps you should use to correct the issue(s)?
Establish a theory of probable cause. Establish a plan of action. Identify the problem. Test the theory to determine the cause. Verify full system functionality. Document the findings, actions, and outcomes. Implement the solution or escalate.
1) Identify the problem.
2) Establish a theory of probable cause.
3) Test the theory to determine the cause.
4) Establish a plan of action.
5) Implement the solution or escalate.
6) Verify full system functionality.
7) Document the findings, actions, and outcomes.
What are the steps in the change and configuration management process?
Conduct a feasibility analysis.
Implement the change.
Test the implementation.
Notify the affected parties of the pending change.
Conduct a feasibility analysis.
Document the change.
Define the procedure for implementing the change.
1) Identify the need for a change.
2) Conduct a feasibility analysis.
3) Define the procedure for implementing the change.
4) Notify the affected parties of the pending change.
5) Implement the change.
6) Test the implementation.
7) Document the change.
What form of penetration testing would using NMAP to probe various network hosts be?
Active fingerprinting.
What form of penetration testing would Social Engineering be?
Passive fingerprinting.
What form of penetration testing would war driving be?
Passive fingerprinting.
What form of penetration testing would war dialing be?
Passive fingerprinting.
What form of penetration testing would Banner Grabbing be?
Passive fingerprinting.
What form of penetration testing would Firewalking be?
Passive fingerprinting.
What is war driving?
Driving around looking for broadcasted wireless networks.
What is war dialing?
Calling numbers to determine if they have a modem installed.
What is firewalking?
Testing to see what services can pass through a firewall or router.
What is the Class A IP Range?
0-126
What is the Class B IP Range?
128-191
What is the Class C IP Range?
192-223
What is the Class D IP Range?
223-239
What is the Class E IP Range?
240-255
What is another name for a logic bomb?
Asynchronous attack.
What wireless signal method uses a narrow frequency band and hops data signals in a predictable sequence?
Frequency Hopping Spread Spectrum (FHSS)
What wireless signal method breaks data into pieces and sends the pieces across multiple frequencies in a defined range?
Direct-Sequence Spread Spectrum (DSSS)
What wireless signal method breaks data into very small data streams in order to send the information across long distances?
Orthogonal Frequency-Division Multiplexing (OFDM)
What type of broadcast domain is a Hub?
Single broadcast domain
What type of broadcast domain is an unmanaged switch?
Single broadcast domain
What type of broadcast domain is an 802.11n wireless access point?
Single broadcast domain
What type of broadcast domain is a Router?
Multiple broadcast domain
What type of broadcast domain is a Bridge?
Single broadcast domain
What type of broadcast domain is a Repeater?
Single broadcast domain
What type of broadcast domain is a Layer 3 Switch?
Multiple broadcast domain
A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?
Identify possible effects of the solution.
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?
Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.