Networking Flashcards
In addition to Remote Desktop, which of the following protocols can an administrator use for remote access administration? (Select all that apply.)
Telnet
SSH
Telnet opens a plain-text, unsecured, remote console connection. Telnet
Secure Shell (SSH) provides the same capabilities as Telnet but encrypts the data while transferring to the port. SSH uses TCP port 22.
A client connects to an IMAP server over port TCP/143, but this port is unsecure. Instead, the client wants a secure connection established using Transport Layer Security (TLS). What is the default port for the secure POP3/IMAP?
TCP port 993 or 995
The default ports for a secure connection are either transport control p
As an alternative to static configuration, wired and wireless hosts can receive their IP address, subnet mask, default gateway, and DNS server addresses from which protocol? (Select all that apply.)
DHCP
APIPA
Host servers have a failover mechanism when an IP configuration specifie
Windows machines will default to automatic private IP addressing (APIPA) if the DHCP service fails or if there is some connectivity error.
The network administrator is configuring a network attached storage (NAS) appliance. What file sharing protocol should the administrator use to allow access to Windows, Linux, and Apple macOS clients?
Server Message Block (SMB)
The Server Message Block (SMB) protocol that implements Windows File/Pri
A top-level domain (i.e., .com) falsely represents the top of the Domain Name System (DNS) hierarchy. Why is this considered false?
The DNS uses root servers at the hierarchy top, represented by a trailing dot at the end of a fully qualified domain name (FQDN), ensuring a unique host name.
Domain Name System (DNS) is a global hierarchy of distributed name serve
A client wishes to upload and download a few files from the network server. The client wants to upload some of the files to a website. Which ports would establish an active connection? (Select all that apply.)
TCP/20
TCP/21
FTP is associated with the use of Transfer Control Protocol/21 (TCP/21) to establish a connection.
File transfer protocol (FTP) is associated with Transfer Control Protocol/20 (TCP/20) to transfer data in active mode or a server-assigned port in passive mode.
An HTTPS application is secured using the SSL/TLS protocol but should use a different port for unencrypted HTTP. Which port should unencrypted HTTP use?
TCP/80
By default, HTTPS uses TCP port 443. Unsecure default HTTP port is TCP p
A client wishes to download some files from home to upload onto the company’s website. Which ports would establish a connection for the client to achieve this? (Select all that apply.)
TCP/20
TCP/21
File transfer protocol (FTP) is associated with Transfer Control Protoco
FTP is associated with the use of Transfer Control Protocol/21 (TCP/21) to establish a connection.
Authentication, authorization, and accounting (AAA) allows switches and access points to hold directory information to authenticate clients as they connect to the network. Which protocol would the AAA server use if it wanted to communicate with the directory service?
LDAP
The AAA server uses Lightweight Directory Access Protocol (LDAP) to communicate with the directory service (Active Directory) from an access point with no configured user account credentials, and it cannot decrypt any authentication traffic.
What network protocol is obsolete and should be disabled on most networks as it poses a significant security risk?
NetBIOs
NetBIOS is obsolete and only required if the network must support file sharing for Windows versions earlier than Windows 2000.
During a company meeting, a technician scribbled some notes about a firewall configuration on a whiteboard. The technician has listed only the port numbers 25 and 587. What is the purpose of these protocols that use these ports?
The ports are for message relay between SMTP servers to submit secure and unsecure messages for delivery.
Port TCP/25 is for unsecure message relays (MTAs) between Simple Mail Tr
Port TCP/587 submits encrypted, authenticated, and secured messages for delivery by an SMTP server.
The IT department is setting up for outsourced management of their client firms. The IT department has asked a server administrator to configure a Linux server and accept remote terminal connections from clients without using passwords, along with encrypted terminal emulations. How does the administrator set up this access? (Select all that apply.)
Use a Secure Shell (SSH) connection.
Use an Open Secure Shell (OpenSSH) connection.
A Secure Shell (SSH) connection is the principal means of obtaining secu
The most widely used SSH is OpenSSH. Therefore, a common Secure Shell connection is considered OpenSSH.
When advising a company on configuring systems, the administrator wants to provide better information about network device status and how to monitor them in a client manual. Which of the following is the correct protocol that maintains a database containing statistics related to the activity of devices for review?
SNMP
All PC motherboards have a built-in 1000BASE-T compatible adapter to establish connectivity with the Ethernet. What other devices connect to different types of Ethernets, such as fiber optics? (Select all that apply.)
SOHO router
Modem
Network interface card (NIC)
A network administrator is completing an installation as part of a team. Another group cabled the wall ports but left the ends of the cables bundled in the network closet. What additional infrastructure will the network administrator require to complete this installation? (Select all that apply.)
A switch
A patch panel
A network administrator is expanding the company network with new settings and requirements for switches, VLANs, and IP subsets. What is the purpose of what the administrator is doing?
To divide the VLAN into multiple secure broadcast domains through managed switches, allowing additional remote access via VPNs
The TIA/EIA-568 standard defines two methods for terminating twisted pairs: T568A or T568B. In T568A, pin 1 is wired to green/white, pin 2 is wired to green, pin 3 is wired to orange/white, and pin 6 is wired to orange. In T568B, the position of the green and orange pairs swap over so that orange terminates to 1 and 2, while green terminates to 3 and 6. What is the reason for this specific standard?
To use the same termination method consistently to support a Gigabit Ethernet or an upgrade to an optical network terminal
Which hardware networking device implements Ethernet cabling and ports to repeat transmission from one device to another as a concentrator function instead of the outdated hub? (Select all that apply.)
A switch
A router or modem
A firewall
A network administrator sets up a high-speed, long-range Asymmetrical DSL (ADSL) router/modem for a client. Unfortunately, the vendor did not include a list of the box contents and the instructions. What type of cable does the administrator need to connect the router’s interface?
An RJ11-terminated patch cord over 300m long
The network administrator wants to deploy one or more access points to provision a wireless network supporting a given range of protocols/standards containing supports, such as RADIUS, Kerberos, and TACACS+, with nonoverlapping channels. TACACS+, RADIUS, and Kerberos are another way of doing what?
Implementing AAA service on a server or network for enterprise authentication
A network administrator is assessing standards compatibility for a Wi-Fi network. Most employees have mobile devices with single-band 2.4 GHz radios. Which Wi-Fi standards work in this band? (Select all that apply.)
Wi-Fi 6 (802.11ax)
Wi-Fi 4 (802.11n)
Cloud services require the rapid provisioning and deprovisioning of server instances and networks. These components must be fully accessible to scripting, which brought about software-defined networking (SDN). According to the definition by the Internet Engineering Task Force (IETF), the principal innovation of SDN is to do what?
To insert a control layer between the application and infrastructure layers
A network administrator plans to install a network of wireless access points with power supplied over data cabling. Each access point requires a 20W power supply. What version of Power over Ethernet (PoE) must the switch support to fulfill this requirement? (Select all that apply.)
PoE+ (802.3at)
PoE++/4PPoE (802.3bt)
The standards compatibility for a Wi-Fi network that will also be supporting most employees with mobile devices plans to use 802.11b/g/n to support its clients. Which GHz band is the best to use to support clients? (Select all that apply.)
Wi-Fi 6 to work with the 2.4 GHz band
Wi-Fi 6 working with a dual band adapter using both the 2.4 GHz and 5 GHz bands
Wi-Fi 5 is designed to work in which band(s)?
5GHz
During a meeting, the network supervisor argued that they should use a 5 GHz band in their new open-plan office setting, but the owner heard that the 2.4 GHz band is the one to use since it has a shorter range. Who is right and why? (Select all that apply.)
The supervisor is correct. A 2.4 GHz network does not have enough space for separate networks.
The supervisor is correct. A 5 GHz band power’s regulations and DFS prevents signals from interfering.
The network supervisor plans to predominantly use the 5 GHz band for an open plan office network. However, the business owner has heard that this has a shorter range and thinks the network supervisor should use the 2.4 GHz band. Why should the 5 GHz band be preferred over the 2.4 GHz band in this case? (Select all that apply.)
On a 2.4 GHz network, there is not enough space for separate networks.
The chances of overlap are high on a 2.4 GHz band, increasing the risk of interference from other products.
Regulations on power and dynamic frequency selection (DFS) prevent signals from interfering with other nearby installations in a 5 GHz band.
What is the difference between licensed and unlicensed when using wireless technology to configure a bridge between two networks? (Select all that apply.)
Licensed means the operator purchased exclusive rights to a band in a given location.
Unlicensed means the operator uses a public frequency that anyone can use.
Suppose a network specialist establishes a fixed long-range wireless device to configure a bridge between two networks and wants to use a specific frequency. What would be the best way for the operator to ensure signal quality?
Obtain a license to purchase exclusive rights to the frequency within a geographical area from the FCC.
Some products are known to use the combined throughput of all radios. For example, the AX6000 claims nominal rates of 1,148 Mbps on the 2.4 GHz radio and 4,804 Mbps over 5 GHz. This type is an example of what?
A device for Wi-Fi 6 that can operate on both bands
A 2.4 GHz band allows legacy connections with WPA2-Personal security, while the 5 GHz network is for 802.11ax or Wi-Fi 6-capable devices using WPA3-SAE authentication.
The network operator is trying to minimize the potential for conflicts in an unlicensed power output but knows regulatory requirements limit them. Gain measures a wireless signal’s power. What is gain, and how is it measured?
Gain is the amount of boost that occurs in a focused antenna signal, measured in dBi.
The network specialist sets up a long-range fixed wireless installation and operates on a public frequency without a license. Is this legal?
Yes. Installations may use an unlicensed spectrum but cannot exceed the Effective Isotropic Radiated Power (EIRP) defined from regulations.
Unlicensed spectrum refers to the operator using a public frequency band, such as 900 MHz or which band(s)?
Both 2.4 and 5 GHz