Network+ Study Cards Flashcards

1
Q

What should you not do with an iSCSI SAN?

A

Implement on a standard production network with other network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which command would you use on a switch to enable management from a remote network?

A

ip default-gateway X.X.X.X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol and port number is used by TFTP?

A

UDP 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn’t know, and he is asking for immediate clarification on several of the project’s details so the project can get back on schedule. Which type of an attack best describes the scenario?

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user reports that she can’t connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point. What should you do next?

A

Create an action plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a cisco device shows a significant number of RUNTS occurring, what would be the cause of this?

A

Collisions are occurring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the primary difference between impersonation and masquerading?

A

One is more active, and the other is more passive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

From the options of FDDI, 10BaseFL, Token Ring, and 1000BaseT, which of the following use the CSMA/CD access method?

A

1000BaseT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command shows you the computer’s route table?

A

netstat -r

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have a network that occupies both floors of a building. The WAN service provider has installed the line for the WAN service in a wiring closet on the main floor. You have a second wiring closet on the second floor directly above the wiring closet that holds the demarc. Which of the following terms describes the closet on the second floor?

A

Intermediate Distribution Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When troubleshooting network issues, what are the specific steps you should use to correct the issue(s)?

Establish a theory of probable cause.
Establish a plan of action.
Identify the problem.
Test the theory to determine the cause.
Verify full system functionality.
Document the findings, actions, and outcomes.
Implement the solution or escalate.
A

1) Identify the problem.
2) Establish a theory of probable cause.
3) Test the theory to determine the cause.
4) Establish a plan of action.
5) Implement the solution or escalate.
6) Verify full system functionality.
7) Document the findings, actions, and outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the steps in the change and configuration management process?

Conduct a feasibility analysis.
Implement the change.
Test the implementation.
Notify the affected parties of the pending change.
Conduct a feasibility analysis.
Document the change.
Define the procedure for implementing the change.

A

1) Identify the need for a change.
2) Conduct a feasibility analysis.
3) Define the procedure for implementing the change.
4) Notify the affected parties of the pending change.
5) Implement the change.
6) Test the implementation.
7) Document the change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What form of penetration testing would using NMAP to probe various network hosts be?

A

Active fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What form of penetration testing would Social Engineering be?

A

Passive fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What form of penetration testing would war driving be?

A

Passive fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What form of penetration testing would war dialing be?

A

Passive fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What form of penetration testing would Banner Grabbing be?

A

Passive fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What form of penetration testing would Firewalking be?

A

Passive fingerprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is war driving?

A

Driving around looking for broadcasted wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is war dialing?

A

Calling numbers to determine if they have a modem installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is firewalking?

A

Testing to see what services can pass through a firewall or router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Class A IP Range?

A

0-126

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the Class B IP Range?

A

128-191

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the Class C IP Range?

A

192-223

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the Class D IP Range?

A

223-239

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the Class E IP Range?

A

240-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is another name for a logic bomb?

A

Asynchronous attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What wireless signal method uses a narrow frequency band and hops data signals in a predictable sequence?

A

Frequency Hopping Spread Spectrum (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What wireless signal method breaks data into pieces and sends the pieces across multiple frequencies in a defined range?

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What wireless signal method breaks data into very small data streams in order to send the information across long distances?

A

Orthogonal Frequency-Division Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What type of broadcast domain is a Hub?

A

Single broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What type of broadcast domain is an unmanaged switch?

A

Single broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What type of broadcast domain is an 802.11n wireless access point?

A

Single broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What type of broadcast domain is a Router?

A

Multiple broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What type of broadcast domain is a Bridge?

A

Single broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What type of broadcast domain is a Repeater?

A

Single broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What type of broadcast domain is a Layer 3 Switch?

A

Multiple broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing some research, you find that the most likely cause of the problem is a bug in the router software. A new patch is available from the manufacturer that is supposed to eliminate the problem. What should you do next?

A

Identify possible effects of the solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?

A

Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

A user reports that she can’t connect to the Internet. After some investigation, you find that the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point.

A

Create an action plan.

42
Q

Which of the following actions typically involves the use of 802.1x authentication?

A

Enabling or disabling traffic on a port and Allowing authenticated users full access to the network.

43
Q

What is the main difference between RIP and RIPv2?

A

RIP is a classful protocol, while RIPv2 is a classless protocol.

44
Q

Which protocol uses traps to send notifications from network devices?

A

Simple Network Management Protocol (SNMP)

45
Q

What protocol is used to send packets to hosts that are a member of a group?

A

Internet Group Management Protocol (IGMP)

46
Q

What protocol is is an echo/response protocol that is used for exchanging simple requests between devices?

A

Internet Control Message Protocol

ICMP

47
Q

You want to know what protocols are being used on your network. You’d like to monitor network traffic and sort traffic based on protocol. Which tool should you use?

A

Packet Sniffer

48
Q

Which of the following tunneling methods is used to send IPv4 traffic through an IPv6 network?

A

4to6 Tunneling

49
Q

You have been hired to design a wireless network for a SOHO environment. You are currently in the process of gathering network requirements from management. Which of the following questions should you ask?

A

1) How many devices will need to be supported?
2) What type of data will be transmitted on the network?
3) Is the size of the business expected to grow in the future?

50
Q

Which of the following protocols is used by PPP to enable support for multiple Network layer protocols?

A

Network Control Protocol (NCP)

51
Q

A network switch detects a DHCP frame on the LAN that appears to have come from a DHCP server that is not located on the local network. In fact, it appears to have originated from outside the organization’s firewall.

As a result, the switch drops the DHCP message from that server. Which security feature was enabled on the switch to accomplish this?

A

DHCP snooping

52
Q

What form of security control is a Hardened Carrier?

A

Protected Cable Distribution

53
Q

What form of security control is Biometric Authentication?

A

Door Locks

54
Q

What form of security control are Barricades

A

Perimeter Barrier

55
Q

What form of security control are Emergency Escape Plans?

A

Saftey

56
Q

What form of security control are Alarmed Carriers?

A

Protected Cable Distribution

57
Q

What form of security control is an Anti-Passback System?

A

Physical Access Control

58
Q

What form of security control are Emergency Lights?

A

Safety

59
Q

What form of security control are Exterior Floodlights?

A

Perimeter Barrier

60
Q

What two pins are used to transmit data on a 100BaseT Ethernet Network on a RJ45 connector?

A

Pins 1 & 2

61
Q

What two pins are used to receive data on a 100BaseT Ethernet Network on a RJ45 connector?

A

Pins 3 & 6

62
Q

What pins aren’t used on a 100BaseT Ethernet Network on a RJ45 connector?

A

Pins 4, 5, 7, & 8

63
Q

What is handled during encapsulation/decapsulation in the Transport Layer?

A

Segments

64
Q

What is handled during encapsulation/decapsulation in the Network Layer?

A

Packets

65
Q

What is handled during encapsulation/decapsulation in the Data Link Layer?

A

Frames

66
Q

What is handled during encapsulation/decapsulation in the Physical Layer?

A

Bits

67
Q

Which of the following is a feature of MS-CHAP v2 that is not included in CHAP?

A

Mutual Authentication

68
Q

You manage a server at work that has just been configured with a new application. Consequently, the server has crashed several times during the last week. You think you have resolved the problem, but you would like to be able to manage the server remotely just in case more issues occur.

Which of the following protocols would you use for remote management?

A

Independant Computing Architecture (ICA) & Virtual Network Computing (VNC)

69
Q

What is the name for a frame or rack that is used to interconnect and manage telecommunication wiring in a building?

A

Main Distribution Frame (MDF)

70
Q

What tool reflects a signal from the transmit port on a device to the receive port on the same device?

A

Loopback Plug

71
Q

What tool uses an intelligent loopback device that is installed at the DEMARC for a WAN service?

A

Smartjack

72
Q

What tool sends electrical pulses on a wire in order to discover information about the cable?

A

Time-Domain Reflectometer (TDR)

73
Q

What tool sends light pulses into the a fiber cable and measures the light that is scattered or reflected back to the device?

A

Optical Time-Domain Reflectometer (OTDR)

74
Q

What tool verifies that a cable or an installation meets the requirements for a specific architecture implementation?

A

Cable Certifier

75
Q

What is the proper way to wire a straight through patch cable using the T568A standard?

A

GW, G, OW, B, BW, O, BrW, Br

76
Q

What is the proper way to wire a straight through patch cable using the T568B standard?

A

OW, O, GW, B, BW, G, BrW, Br

77
Q

What is the proper way to wire a crossover patch cable?

A

Use T568A on one end and T568B on the other end of the patch cable.

78
Q

What is the loss of signal strength from one end of a cable to the other end?

A

Attenuation

79
Q

What is interference that is caused by signals within the twisted pairs of wires?

A

Crosstalk

80
Q

What is the term for a mismatch in the measurement of resistance within a transmission media?

A

Open Impedance Mismatch (Echo)

81
Q

What happens when an electrical signal takes a path other than the intended path?

A

Short

82
Q

What happens when a cut in a wire prevents the original signal from reaching the end of the wire?

A

Open Circuit

83
Q

How much signal loss occurs per 1000 meters in Multi-Mode fiber cables when using a 850nm light source?

A

3dB

84
Q

How much signal loss occurs per 1000 meters in Multi-Mode fiber cables when using a 1300nm light source?

A

1dB

85
Q

How much signal loss occurs per 1000 meters in Single-Mode fiber cables when using a 1310nm light source?

A

0.5dB

86
Q

How much signal loss occurs per 1000 meters in Single-Mode fiber cables when using a 1550nm light source?

A

0.4dB

87
Q

What is the max attenuation, or the least amount of signal drop from the total power of the transmission source, for a fiber optic cable?

A

No more than 3dB.

88
Q

What is the 1st layer of the OSI Model?

A

Physical Layer

89
Q

What is the 2nd layer of the OSI Model?

A

Data Link Layer

90
Q

What is the 3rd layer of the OSI Model?

A

Network Layer

91
Q

What is the 4th layer of the OSI Model?

A

Transport Layer

92
Q

What is the 5th layer of the OSI Model?

A

Session Layer

93
Q

What is the 6th layer of the OSI Model?

A

Presentation Layer

94
Q

What is the 7th layer of the OSI Model?

A

Application Layer

95
Q

Which OSI Model layer integrates network functionality into the host operating system and enables communication between clients and services?

A

Application Layer (Layer 7)

96
Q

Which OSI Model layer formats data in a compatible form for receipt by the destination system?

A

Presentation Layer (Layer 6)

97
Q

Which OSI Model layer provides a transition between the upper and lower layers of the OSI model?

A

Transportation Layer (Layer 4)

98
Q

Which OSI Model layer describes how data is routed across networking and on to the destination?

A

Network Layer (Layer 3)

99
Q

How many hexadecimal bits are in a MAC Address?

A

48bits

100
Q

How many digits are in a MAC Address?

A

12 digits

101
Q

What is a Rollover Cable used for?

A

Connecting a workstation to a console connector on a router or switch.

102
Q

What is the proper way to wire a Rollover Cable?

A

Pin 1 connects to Pin 8
Pin 2 connects to Pin 7
Pin 3 connects to Pin 6
Pin 4 connects to Pin 5