Networking (5) Flashcards

1
Q

Which networking protocol allows systems to discover local systems and other devices?

DHCP

HTTP

SLP

A

SLP

Service Location Protocol (SLP) enables a computer to discover local systems and other devices, if it is not already preconfigured with their location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following features does not require a managed network switch?

Priority of traffic

VLAN configuration

Directing Layer 2 traffic

A

Directing Layer 2 traffic

An unmanaged switch will simply perform the one task a switch should do: direct Layer 2 traffic out the correct destination port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The senior network administrator struggles to configure company network devices spanning several cities. The challenge is because he is required to be on premises for the network infrastructure of each building. What would be a cost-effective solution?

Employ network administration at each building

Train a local sales associate

Employ a cloud-based network controller

A

Employ a cloud-based network controller

Migrating network configuration to the cloud would allow the network administrator to perform his duties without requiring travel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the maximum distance allowed between power over Ethernet injector and the Ethernet device?

50 meters

100 meters

250 meters

A

100 meters

The distance for Power over Ethernet (PoE) is limited by the maximum distance set by the Ethernet cabling: 100 meters. The power injector, the device that sources the electrical power to certain wires in the cable, can be as much as 100 meters from the powered device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When setting up a small office, home office (SOHO) network, what end-user device configuration must be performed?

Network switch broadcast configuration settings

Devices utilize service location protocol

NIC set with static address or be DHCP- served

A

NIC set with static address or be DHCP- served

The end-user devices are configured to at least request a DHCP-assigned IP address or be preconfigured with a static IP, gateway and DNS information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the typical method for IoT device configuration to connect to the wireless network?

AD

SLP

DHCP

A

DHCP

Unless an Internet of Things device (IoT) possesses an end-user accessible management interface, that device will likely connect by starting network connectivity using DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What method is effective in defining how a firewall allows outbound access when the group of approved devices rarely changes?

MAC filtering

Dynamic DNS

Whitelist

A

MAC filtering

If the group of devices is small and rarely changes, a great way of defining only them as approved traffic sources is to use MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What firewall rule technique allows only a known list of applications or traffic as legitimate?

MAC filtering

Dynamic DNS

Whitelist

A

Whitelist

The whitelist is a defined list of approved applications to pass through the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What communication technology establishes connectivity between enabled devices only when the devices are placed within 4 cm of each other?

RFID

NFC

UHF

A

NFC

Near-field communication (NFC) sets up connections between two devices that are within 2 inches, or 4 cm, of each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What communication technology allows for low power, close-proximity passive reading of a small tag or patch on an object?

RFID

NFC

UHF

A

RFID

RFID uses radio frequencies and can be implemented to detect and read a “passive” (no power) tag that is essentially an antenna as it passes within a few feet in range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the server for publishing information about the company’s values, purpose, and available products or services to the public?

Proxy server

File server

Web server

A

Web server

The web server hosts and serves information available to the public (or internally as an intranet web server). Originally, files on the web server would be primarily HTML files, but today’s web servers would also serve style sheets, scripts, and various media files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What server would function as a central repository of documents and provide network shared file storage for internal users?

Proxy server

File server

Web server

A

File server

The file server is a centralized repository for users, typically company employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What server sits between the protected, controlled network and the public internet, functioning as a gatekeeper of traffic?

Proxy server

File server

Web server

A

Proxy server

Proxy servers act as a gateway or “middle-man,” through which Internet access requests are handled, monitored, and, if need be, filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of server can host files for easy access and fetching, similar to how a web server serves web pages?

FTP server

File server

Web server

A

FTP server

The File Transfer Protocol (FTP) server hosts files for easy access, allowing users who are able to browse it to transfer and upload the files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What server is added to a company infrastructure to avoid the need to attach printers to each individual desktop?

Syslog server

DNS server

Print server

A

Print server

The print server provides centralized availability of print services to anyone on the network. The print server accepts print jobs from authorized users, and the documents are printed according to order of receipt or some configured priority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What server is used to resolve domain names to IP addresses to facilitate web browsing or locating a directory resource on the network?

Syslog server

DNS server

Print server

A

DNS server

If a user types www.sybex.com in a web browser, the domain name system (DNS) server will resolve the domain name to an IP address. Similarly, DNS servers will resolve a fully qualified domain named (FQDN) network directory resource on the network to make locating that resource possible

17
Q

What server is accessed each time it’s necessary to challenge and validate a user’s credentials in order for the user to access a network resource?

DNS server

Print server

Authentication server

A

Authentication server

The authentication server facilitates the challenge/response service for validating someone’s credentials

18
Q

What service can collect and journal all the system-generated messages produced by servers and network devices?

Syslog server

DNS server

Print server

A

Syslog server

The Syslog server operates with the Syslog protocol, which is used by many different operating systems and devices. These system-generated messages vary from the mundane “System started” to critical alerts

19
Q

A company wanting to monitor network traffic or host system behaviour to identify suspect activity will install what type of service?

IDS

UTM

Email

A

IDS

An intrusion detection system (IDS) will monitor and alert you on suspect behavior. The IDS can be a network-based device or host-based, meaning it runs as a process in the background

20
Q

What is the primary difference between an IDS and IPS?

IDS will not actively alert on suspect activity

IPS works in pairs

IPS will actively react to suspect activity

A

IPS will actively react to suspect activity

The IDS will alert on suspect activity, but will not react or actively attempt to block the activity. The IPS, however, should attempt to block the activity

21
Q

Your client is interested in a security device that will take action when suspicious activity is identified, as well as filter traffic and perhaps also provide some antivirus functionality. What type of device is the client looking for?

Firewall

UTM

IPS

A

UTM

Unified threat management (UTM) systems can be hardware network devices, virtual devices, or an off-premises service. The UTM’s primary value is the integration of multiple security services into a singular device

22
Q

Your client is now looking at improving control over all the user devices. Particularly, the client wants resource access controlled based on policy and the users meeting a few criteria. What device would you suggest?

End-point management server

Perimeter authentication server

RADIUS server

A

End-point management server

The end-point management server can be a policy-based or directory-based technique toward controlling access to network resources

23
Q

Last weekend you installed and booted several more computers to be ready for Monday morning. Later Monday mourning you hear from employees as they come in that they cannot log in. Their desktop don’t seem to want to connect. You investigate and find that each faulty workstation has a 169.254.x.x IP address. What might you look at next?

DHCP reservation

LAN connector broken

Corrupted Registry

A

DHCP reservation

With many new systems added and already booted, it is likely that the DHCP reservation pool is now too small for the number of systems requesting IP addresses. Expand the DHCP reservation to solve the problem