Random Flashcards

1
Q

In STP port states, what is Blocking?

A

Not forwarding to prevent a loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I’m STP port states, what is Listening?

A

Not forwarding and cleaning the MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

I’m STP port states, what is Forwarding?

A

Data passes through and is fully operational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What designates the interface closest to the singular Root Bridge (Root of the network)

Root Server
Root Guard
Root Interface
Root Port

A

Root Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Power provided by an Ethernet Cable. One wire for both network and electricity

A

Power over Ethernet (PoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For IPV6, a broadcast is sent across all devices in order to build an ARP

A

False, IPV6 uses multicast (no broadcasts) and there is no ARP in IPV6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Neighbor MAC Discovery?

A

Replaces IPv4 ARP.
1.Work station A sends a Neighbor Solicitation (NS) multicast on the network with the destination MAC address.
2. Whichever work station matches that MAC address will then accept.
3. It sends back a Neighbor Advertisement (NA) to inform the first work station of the receipt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which 802.11 standards support 5 GHz and what are their max theoretical throughput per stream/total?

A

•802.11a- 54 Mbits
•802.11n (4 x MIMO)150mbits, 600 Mbits
•802.11ac (8 x DL MU-MIMO)- 867 Mbits, 6.9 Gbits
•802.11ax (8 x DL and UL MU-MIMO)- 1,201mbits, 9.6 Gbits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What OSI layer does Application encryption (SSL/TLS) occur?

A

Later 6 Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the RFC 1918 private IPv4 addresses?

A

10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the lowest amount a payload can be?

46
1426
60
1526

A

46

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Carrier Sense Multiple Access Collision Detection (CSMA/CD) communicates with full duplex,

A

False, CSMA/CD uses half duplex. If 2 frames are sent from different devices at the same time a collision occurs and a jam signal is sent to all devices to wait a random amount of time before being able to send frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is configured on a trunk port and Carries traffic for multiple VLAN’s. These frames are not tagged when transmitted over the trunk link.

A

Native VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VLAN assigned to switch port when it is not assigned to a specific VLAN

A

Default VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

will tag outgoing frames and remove the tag on incoming frames.

A

Trunk ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.3x

Power over Ethernet
Pause frame
Disassociation
STP

A

Pause frame, used for flow control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some MDIX devices?

A

Switches
Hubs
NICs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

1,3
2,6
4,7
5,8

A

Crossover cable pins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Transmit +
Transmit -
Receive +
Receive -

A

1
2
3
6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Improves signal quality, Increases signal strength/speed and allows you to transmit and receive multiple data streams simultaneously through antennas

A

Multiple-input-multiple-output (MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Allows a wireless access points (WiFi router) to communicate simultaneously with multiple client devices.

A

MU-MIMO

As opposed to MIMO which can only do 1 device at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Divides wireless communication into sub channels which each user gets their own set of to use, allowing many users on the network at the same time without interfering with one another

A

Orthogonal Frequency Division Multiple Access (OFDMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

802.11g can use up to 40mhz

A

False, A, B, G can only use 20 mhz
N- 20,40,60,80,
AC- 20,40,60,80,80+80,160
AX- 20,40,60,80,80+80,160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This type of network allows devices to connect to each other dynamically to form a temporary network without connecting to a central device

A

Ad hoc (peer to peer) - devices can communicate to each other directly without a centralized infrastructure like a router or access point (WiFi commonly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

2 devices communicating directly to each other using 802.11 without an access point required

A

IBSS- Independent Basic Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

SSID is the name of the wireless network and BSSID is the hardware address of an access point.

A

True! SSID is like the name of your WiFi (Lizard King) and BSSID is the physical hardware. The SSID will be the same but you may auto configure to a different BSSID depending on location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is an Extended Service Set Identifier (ESSID)?

A

It allows you to roam from one physical AP (BSSID) while remaining on the same network/WiFi (SSID) to another AP (BSSID) automatically. Connected multiple BSSID’s to a singular SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are Omnidirectional antennas?

A

Evenly distributed signal on all sides. Very common and used on access points. Rubber duck.
Cannot focus a signal to a direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which antenna below is directional:

Omnidirectional
Yagi
Parabolic

A

Yagi- medium directional signal/gain, tree branch like with dipole in middle, medium range

Parabolic- focus the signal to a single point, very directional, dish shaped with a central feed (dipole), long range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What masks are in 240 CIDR?

A

/4
/12
/20
/28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What masks are in a 192 CIDR?

A

/2
/10
/18
/26

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the CIDR notation numbers?

A

128
192
224
240
248
252
254
255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Compress this IPV6 address:

2600:DDDD:1111:0001:0000:0000:0000:0001

A

2600:DDDD:1111:1::1

Remove leading 0’s
Group of 0’s can be abbreviated with double colons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Name an availability percentage and it’s annual downtime.

A

99.9999 - 00:00:32
99.999 - 00:05:15 (5 9’s)
99.99 - 00:52:34
99.9 - 08:45:36
99.0 - 87:36:00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the Mean Time Between Failure (MTBF) and how is it different than the Mean Time To Failure (MTTF)

A

MTTBF= devices multiplied by total time, divided by failures

MTTF= device multiplied by total time, divided by devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IPv4 has a TTL and IPv6 uses hop limit to avoid packets looping forever.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

0.0.0.0/0

Default gateway
Default local address
Default route
Default dns suffix

A

Default Route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Describe Distance Vector routing protocols and give examples.

A

Makes forwarding decisions based on how many hops
•RIP (Routing Info Protocol)
-v1 has 15 hops
-v2 has 16 hops
•EIGP (Enhanced Interior Gateway Routing Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which routing protocol is the most scalable and used in large networks?

Link state
DV
Rip
BGP

A

Link State. Makes forwarding decisions based on speed.
•OSPF (Open Shortest Path First)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is BGP (Border Gateway Protocol)

A

Determines route based on paths, network policies or configured set of rule sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Centralized management of access points: reporting, configuring/changing, security/monitoring, and adding new AP’s

A

Wireless LAN Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Connects different physical networks and topologies with 2-4 ports distributing traffic based on MAC addresses

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

WPA (Wifi Protected Access)

A

RC4 with TKIP
-Initialization Vector (IV) is a larger and encrypted hash
-every packet gets a unique 128 but encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Security protocol that uses per packet mixing to dynamically modify the encryption key used for each packet

A

TKIP (Temporal Key Integrity Protocol) used in WPA and combined with RC4
Replaced by AES algorithm for WPA2 and 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Standard for securing wireless networks that utilizes AES for data confidentiality, integrity and authentication within CCMP block cipher mode

A

WPA2 (WiFi Protected Access 2)
Provides authentication and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Widely used Symmetric(same key is used to encrypt/decrypt) for protecting data confidentiality and integrity in various applications.

A

AES (Advanced Encryption Standard)
-resistance to cryptographic attacks like brute force
-Block Cipher
-encryption algorithm used within WPA2 and WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Latest generation of WiFi security protocol that utilizes data confidentiality with AES, MIC, and GCMP

A

WPA3,
Stronger than WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Encryption and authentication protocol that combines GMAC (Galois Message Authentication Protocol) for MIC and AES for confidentiality

A

GCMP (Galois/Counter Mode Protocol)
WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SAE (Simultaneous Authentication of Equals) using a Diffie Hellman key exchange combined with everyone using a different session key

A

Dragon Fly Handshake
Used in WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

changes the PSK authentication process with mutual authentication which creates a shared session key without it going across the network.

WPA3
AES
WPA2
TKIP

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What are some home wireless security modes and some used for businesses?

A

Home:
WPA2/3 Personal /WPA2/3-PSK (everyone uses same pre shared key)

Business:
WPA2/3 Enterprise /WPA2/3-802.1x (authenticates users individually through an authentication server like radius)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

If I didn’t need any security for my wireless AP what mode would I have it in?
WPA
WPA2
WEP
Open System

A

Open System- no authentication password is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Allows callers to communicate at the same time with each call using a different code that filters each call on the receiving side

A

CDMA (Code División Múltiple Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

First performance metric we typically look at and determines how much work a device is doing

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What are 3 Bandwidth monitor tools that will have network statistics and show the amount of network being used over time?

A

SNMP, Netflow, sFlow, IPFIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What tool would I use to determine if latency is coming from an application or if it is from the network?

A

Packet Capture- can analyze each response times with an analyzer tool inside of it.
Ex. Wireshark, tcpdump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Metric used in SNMP

A

MIB II or MIB (Management Information Base)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

When using SNMP to monitor the interface, what are 3 things being monitored?

A

•Link Status- up or down
•Error Rate- signal problems
•Utilization- network usage, run bandwidth tests
•Packet Drops (Discards)
•Interface Resets- Queued packets
•Speed and Duplex

Lemon Eels Under Pirates Red Sails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

T568A

A

White Green
Green
White Orange
Blue
White Blue
Orange
White Brown
Brown

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

CAT5 is 1000BASE-T

A

False, Cat 5 ID 100BASE-TX (fast Ethernet)
Cat 5e is 1000BASE-T
Both have 100MHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

100BASE-SX uses 100megabjt Ethernet over fiber, cheap uses LED and has a max distance of 300 meters

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Multi mode fiber, laser components, 400 meters (half duplex) 2kilometers (full duplex)

A

100BASE-FX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

1000BASE-LX is multi mode, users lasers and is 400 meters half duplex and 2kilometers full duplex

A

False, that is 100BASE-FX

1000BASE-LX is Gigabit instead of megabit
Multi mode 550m
Single mode 5 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

1000BASE-SX

A

Gigabit, short wavelength laser, multi mode and 220 to 550m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

10GBASE-SR Vs 10GBASE-LR

A

SR is multi mode 26-400meters

LR is single mode 10 kilometers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Shows how many packets were sent and received as well as the round trip time

A

Ping, tests reach ability (hosts), uses ICMP and is a primary trouble shooting tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What would IPconfig/ifconfig show me?

A

DNS suffix
IPv4/6 address
Subnet mask
Default gateway
Tcp/ip network adapter information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What Is contained inside MIB’s

A

Object identifiers (OIDs) uniquely identify managed objects and help monitor and control network devices that are referenced by name or number

Ex. .iso(1).org(3).dod(6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

This contains bulk transfers, data enhancements while having message integrity, authentication, and encryption

A

snmp v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

SIEM

A

is a central logging receiver integrated into Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Gathers traffic (packets) statistics from shared communication between devices using a probe and collector

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Botnet attack

A

Distributed Denial of Service Attack (DDOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Common Plan Procedures

A

Disaster Recovery Plan
COOP
System Life Cycle
SOP
SLA
MOU
NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Determines existing wireless landscape by showing access points and existing frequencies

A

Site Surveys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Heat Maps

A

Identify wireless signal strengths in an area/building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Many different clients are using the same cloud infrastructure

A

Multitenancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Encrypted access to a virtual private cloud, what would you use?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What service is basic application usage: apps run on a remote server, VDI, local device is a keyboard, mouse and screen, minimal operating system on the client (no huge CPU), network connecivity is most important: big network requirement, everything over the wire

A

Desktop as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

No special networking hardware needed, usually integrated with an existing Fibre Channel infrastructure, not for cable

Infiniband
Fibre channel over Ethernet
Iscsi
Fibre channel

A

Fibre Channel over Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

RFC standard that makes a remote disk look and operate like a local disk with drivers available for many OS without any hardware needed

A

Iscsi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Requires a lot of bandwidth, can use an isolated network and high speed network technologies

A

SAN- looks and feels like a local storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

High speed storage technology that servers (initiators) connect to and need an FC interface

FC
FC over Ethernet
PoE
PoE +

A

Fibre Channel (FC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Redundancy is maintaining uptime in the case of a failure

A

False, Fault Tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Server farms with load balancing and network paths are examples of single device fault tolerance

A

False. Those are multiple device fault tolerance.
Single device would be RAID, redundant power supplies, redundant NIC’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Redundancy

A

Having multiple components so if one component fails, your system can use another component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Extra disk in case one fails

A

RAID (Redundant Array of independent Disks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

This will Aggregate bandwidth; has redundant paths with multiple network adapters

A

NIC Teaming (also called Load Balancing/Failover LBFO)

NIC’s talk to each other through multicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Combining multiple data streams over network connections into a single higher capacity link.
Increases bandwidth and efficiency by pooling resources and distributing traffic across those links for performance, redundancy and load balancing.

Multiplexing
Mímo
Mu mimo
Aggregate

A

Aggregate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

A Generator is a short term power backup

A

False, it is a long term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

What is Active-passive network redundancy?

A

2 devices are installed and configured, only one operates at a time, if one fails the other takes over

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Computer configured with a single default gateway

A

FHRP (First Hop Redundancy Protocol)
Also called Hot Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What protocol allows devices to use a virtual IP for the default gateway, if a router disappears another one takes it’s place

A

VRRP ( Virtual Router Redundancy Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What 3 things comprise Confidentiality?

A

•Encryption
•Access Controls- restrict access to resource
•Steganography- info concealed within another info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Information being accessible to authorized users, Redundancy, Fault Tolerance and Patching are which if the Triad?

A

Availability- systems and network must be up and running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Non-repudiation

A

Proof someone sent something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is in the Core infrastructure?

A

Web servers, database, applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

cloud based architecture, splits functions into separate logical units, extends functionality and management of a device

A

SDN (Software Defined Networking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What does the infrastructure layer/data plane do?

A

Real work if networking. Processes network frames, packets, forwarding, trunking, encryption etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Routing protocols, routing tables, switching tables are in which of the SDN planes?

A

Control Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In SDN what are all the planes?

A

Data Plane
Control Plane
Application Plane

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

mesh topology of switches and routers that optimized east -west traffic flow within a data center

A

Spine Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Commonly used network design in data centers to connect servers and network devices

A

Top of Rack (ToR) switch is placed at the top of each rack or cabinet providing connectivity to the devices within it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Pointer Records are human readable text information

A

False, that is Text records
Pointer records are the reverse of an A or AAAA/reverse dns lookup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

A name that handles multiple services, one physical server

A

CNAME (Canonical Name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

Describes DNS zone details

A

SOA (Start of Authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Top level of the DNS hierarchy that provides resolution of domain names to IP addresses

DNS Host file
Dns root server
SOA
DNS Root Port

A

DNS root server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Where does Authoritative dns query comes from?

Source file
Host file
Root server
Root port

A

Source file,
non authoritative comes from the cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Name 3 Top Level Domains

A

.com
.net
.edu
.org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

adds integrity and encryption

A

AH, only integrity
ESP does both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Name 2 Database port #’s

A

Tcp 1433 ms sql
Tcp 1521 oracle sql net
Tcp 3306 my sql

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What port is LDAP?

389
339
587
589

A

Tcp 389- store info in network directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

UDP 514

A

Syslog consolidates all device logs inside a SIEM with a lot of storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

FTP Control tells the system which file to send

A

Port 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Tcp 20

A

FTP active mode, transferring file has authentication functionality with username and password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

IMAP over tls

A

Port 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Tcp 995

A

Pop3 over tls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Tcp 587

A

SMTP using TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Dual Stack Routing

A

Allows routers and devices to communicate using IPv6 and IPv4 simultaneously with dynamic routing protocols with separate routing tables within it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Teredo tunnels IPv4 through NAT’d IPV6 network

A

False, IPv6 through IPv4
Miredo does the same but on more operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Rights are gained implicitly and windows uses groups to provide this

A

RBAC (Role Based access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Examples of Zero trust

A

Multifactor authentication, encryption, system permissions, additional firewalls, monitoring and analytics are examples of what?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

What consists of a screened subnet?

A

It is a DMZ, additional layer of security between the internet and you
Ex. Public access to public resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

What is 802.1x?

A

NAC (Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Not getting access until you authenticate and makes extensive use of EAP and Radius?

A

NAC (port based network access control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Authentication credentials that are stored on a wireless router or local device

A

Local authentication, home WiFi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Centralize authentication for users on
-routers, switches, firewalls
-server authentication
-remote VPN access, 802.1x network access

A

RADIUS (Remote Authentication Dial In User Service) available on all OS and common AAA protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Remote authentication protocol for the network and devices commonly

-TACACS
-Radius
-RDP
-LDAP

A

TACACS+ (Terminal Access Controller Access Control System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

X.500 specification used with Windows authentication

A

LDAP (lightweight directory access protocol) reading and writing directories over IP network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

Kerberos uses SSO by use of a PSK

A

False, through cryptographic tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

TACACS+ is commonly used to authenticate with Windows

A

False, Cisco
Kerberos or LDAP commonly are with Windows (Microsoft)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What do RADIUS servers commonly authenticate with?

A

VPN Concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

EAP is exclusive to Radius Servers

A

False, EAP can use radius, TACACS, and LDAP, 802.1x (NAC)
Multiple ways to authenticate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

How a posture assessment determines if a device is safe to be used on the network

A

Performs a health check
-is it a trusted device
-is running up to to date antivirus
-are corporate applications installed
-is it a mobile device? Is it encrypted?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Where do devices go that fail a posture assessment?

A

To a Quarantine network to be fixed by administrators and then try again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Name 3 components of SIEM

A

-Security Alerts
-log aggregation (all devices sending logs to here) and long term storage
-data correlation
-forensic analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

What is forensic analysis?

A

Gathering details after an event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

sends infrastructure device data, operating systems and netflow sensor data

Syslog
Snmp
Siem
Sflow

A

SIEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

How do you stop a bot?

A

Patches, antivirus, on demand scans, network monitoring,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

How do you prevent C&C? (Command and control?

A

Block at fire wall and identify at workstation with host based firewall or host based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Multiple attacks from different services at once is a

A

DDOS (Distributed Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Turns small attack into a big attack, becoming increasingly common and takes advantage of common not secure protocols (DNS, ICMP)

A

DDOS amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Who is in charge of Botnets?

A

Command and Control (C&C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

How is an on path attack different from a man in the middle attack?

A

They aren’t different because they are the same thing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

Name 3 on the path attacks (man in the middle)

A

DNS poisoning
ARP poisoning
Session hijacking
HTTP spoofing
WiFi eaves dropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Best way to prevent an on path attack?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

An attacker pretending to be a router by having the actual routers IP address and communicating to a device on a subnet

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

Modify a DNS server with the client host file and sending a fake response to a DNS request

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

VLAN’s cannot access another VLAN

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

A VLAN attack can come about from a switch using auto configuration and someone pretending to be a switch to send a trunk connection

A

True, Switch Spoofing (Type of VLAN hopping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Switches should be automatically configured because there is less chance of error

A

False, they should be manually configured to prevent switch spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Takes advantage of native VLAN configuration by including 2 VLAN tags where the first is removed but the second is forwarded to the target

A

Double tagging/VLAN hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Remote sites connecting with one another directly instead of to a main site and the connection disappearing when done.

A

MGRE (multiple generic routing encapsulation) used DMVPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

What cable is used with Twin Axial?

A

10G Ethernet and SFP+(transceiver) cables, full duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

This Coaxial cable is used as patch cables for short distances

A

RG-59

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

When using fiber, it is important to make sure you are on the right channel so you don’t have radio frequency interference

A

False, fiber is immune to RF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

APC (Angled Physical Contact) is at an 8 degree angle with a low return loss

A

True,
UPC (Ultra Polished Connection) has a high return loss and are at 0 degree angles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Which connector has 2 different fibers inside of it (send and receive) ?

Mtrj
LC
F
Sc

A

LC (Local Connector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

What type of connector is used with a cable modem( docis) and coaxial cable

A

F Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

SFP Transceiver supports up to 16 Gbit

A

False, 1Gbit and used with RJ45
SFP+ is up to 16Gbit but commonly 10gbit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

QSFP and QSFP+ are both Bi-Directional

A

True,
QSFP is 4 1Gbit= 4gbit
QSFP+ is 4 10gbit= 40gbit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Installation commonly used between floors or buildings

A

Fiber distribution panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Bidirectional communication over a single strand of fiber

A

WDM (Wavelength Division Multiplexing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Spoofing

A

Pretending to be something you aren’t
Ex. Fake web server, fake dns, caller ID, email address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

How would you disable a Rogue DHCP server?

A

-enable DHCP snooping on your switch
-authorized DHCP servers in Active Directory
-renew IP lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Why would 802.1x prevent a rogue access point?

A

Because it is an unauthorized wireless access point and 802.1x (network access control) you must authenticate regardless of connection type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

Configuring an access point to look like a network, using the same or a similar SSID (WiFi name)

A

Wireless evil twin, prevent by encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

APIPA

A

169.254.0.1-169.254.254.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

Link Local

A

Can only communicate to other local devices. Can’t communicate across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Classful Subnetting Ranges

A

A. 1-127
B. 128-191
C. 192-223
D. 224-239
E. 240-254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

IPV6 addressing Shortcut

A

0/2
1/3
4/6
5/7
8/A
9/B
C/E
D/F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

What does high gain mean?

A

Increased signal strength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Assembly line network

A

SCADA/ICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

What subnet mask is commonly for point to point links?

A

/30 or /31

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

malware gathers information by keystrokes

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

A worm Takes advantage of a vulnerability and installs malware with a remote back door, bot may be installed later

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What prevents a worm?

A

Keeping your system up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Using common words to gain access to a system

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Impossible to steal a password if you store your password as this

A

A hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

You are working as usual and then you lose service, and then you connect again to the wireless network and this happens repeatedly what may be happening?

A

Disassociation/ de authentication DoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Encrypts frames to prevent 3rd party de authentication/disassociation attacks

802.11w
802.11ac
802.11d
802.11e

A

802.11w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Scanning can be useful to avoid tailgating

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

You can configure a maximum number of source MAC addresses on an interface , if it is exceeded the interface disables

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

IP tracking on a switch which works as a DHCP firewall to create a table of untrusted devices by watching for DHCP conversations

A

DHCP Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Most ideal fire wall to control access

Network
NGFW
Host
Flow based

A

NGFW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

What allows or disallows traffic based on tuples

A

ACL’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

This will Validate all router advertisement by policies set up from an Admin

A

Router Advertisement Guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Creating a map of all devices and IP addresses by DHCP Snooping and then decides whether an ARP request legitimate

A

Dynamic ARP inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

Restricting any communication to other devices on a switch or access point

A

Port isolation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Put management on a separate VLAN from the default VLAN

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Wireless devices on an access point can’t communicate with each other in Wireless isolation

A

True
Commonly at hotels or public areas, guest network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

LAN analysis is an easy way to find working IP addresses

A

False, MAC addresses not IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

A captive portal only allows authentication to devices in its access table that is within its access point.

A

False, if you’re device is not on the access table it will redirect your web access to a captive portal page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

How is a guest network different from a Screened subnet (DMZ)?

A

A guest network only has access to the internet and not internal resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

Encrypted (private) data traversing a public network is what?

A

A VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

A VPN Concentrator is an access device

A

True, often integrated into a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Site to site VPN has all communication encrypted always

A

True, concentrators are both typically firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

An administrator deciding what traffic goes to the VPN and what traffic goes outside the VPN scope is an ACL

A

False, Split Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Linux version of RDP

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Managing systems and devices when network isn’t available by using a serial connection (modem) to dial into the device interface or a console router

A

Out of band management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Networking Trouble Shooting Methodology

A

-Identify problem (gather info)
-establish theory of probable cause
-test the theory
-establish a plan of action
-implement the solution
-verify full system functionality
-document findings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

What is throughput?

A

Amount of data transferred in a given time frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Was built for modem communication, printers and mic and now used as a configuration port

Interface
MTRJ
Patch Panel
Serial Console

A

Serial Console/ cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

RJ-45 to serial communication and used in conjunction with serial port connectors

Rollover cable (yost)

A

Rollover cable (yost)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

802.3bt

PoE +
PoE
PoE +++
PoE ++

A

PoE ++

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

Rollover device wiring

A

1-8
2-7
3-6
4-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

-S

A

Braiding shielding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

3 Most common serial console cables.

A

DB-25
DB-9
Send RS-232 signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

-No signal/connectivity or poor performance is likely a loss of what?

A

Decibel loss/attentuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Power cords, fluorescent lights, electrical systems, bend radius/twisting and fire prevention can cause what to a copper cable?

A

EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

How is a short circuit different from an open?

A

A short is 2 connections touching, an open is a break in the connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

What May late collisions indicate you have a configuration issue with?

A

Duplex mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

Fiber optic cables can have communication issues due to dirty cables/connectors.

A

True, clean thoroughly before using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

Final step of cable installation that pinches connector onto the wire that pushes metal prongs through insulation. Connects RJ-45 Connector
Coaxial, twisted pair and fiber

A

Cable crimper, connects modular connector to the Ethernet cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Trims the wires and breaks insulation, forces wire into a wiring block.

A

Punch down tool
66 bloc
110 block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

Puts an analog sound on the wire, inductive probe doesn’t need to touch the copper. Easy wire tracing.

A

Tone generator
Fox and hound (toner and probe)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

Tests physical ports and is not a cross over cable. Serial, Ethernet, T1, fiber

-rollover
-NIC
-modem
-Loopback plug

A

Loopback plug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

Estimate fiber lengths, measures signal loss, determine light reflection, and create wire maps.

A

TDR (cable)
OTDR (fiber)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

Multimeter

A

Measures AC/DC voltages, continuity, and wire mapping
Cable connectivity, fuse status, wire mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

Tests for continuity, identifies missing pins and crossed wires, not used for advanced testing

Cable tester
Toner probe
Cable certifier
TDR

A

Cable tester

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

Taps (active or passive) and ports mirrors (from a switch) do what?

Test the network
Add encryption
Port forwarding
intercept network traffic

A

intercept network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

Send a light from one side and measure light power on the other

A

Light meter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

Views the frequency spectrum and identify frequency conflicts

A

Spectrum analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Join 2 fiber ends together, add connectors and repair fiber using heat. Extend fiber length or remove a section of damaged fiber.

A

Fusion splicer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

What do you connect a tone generator to?

A

Modular jack
Coax
Punch down connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

Locate copper or fiber breaks and certify cable installations

A

TDR/OTDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

sends an electrical pulse down a cable and calculates time and distance for impedance discontinuities

TDR
Toner probe
Otdr
Multimeter

A

TDR is electrical. OTDR uses light

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

Views wireless information, signal to noise ratio, channel information etc.

Wireless packet analyzer
Wireless packet inspection
Packet capture
Protocol analyzer

A

Wireless packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

Protocol analyzer captures and displays network traffic, use a physical tap or redirect on the switch

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

View traffic patterns, what frames are on the network and has large scale storage

San
Protocol analyzer
Nas
Vulnerability scanner

A

Protocol analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

This is Bandwidth testing (measure throughput), pre and post change analysis( test the install firewall/packet shaper), not all sites are the same.

A

Speed test sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

Performance monitoring and speed testing. Run tests across different OS. Your own speed testing

A

Iperf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

IP and port scanners

A

-Scan for open ports and IP addresses. -Visually map the network and rogue system detection.
-Pick a range of IP addresses. Gather information on each device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

Netflow

A

Gather traffic statistics and standard collection method. Probes and collectors to create reports. Shows trends of traffic on network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

Trivial file transfer protocol that transfers files and upgrades firmware. Your device is the TFTP.

A

TFTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

Terminal emulator

A

SSH, encrypted communication that supports across many OSes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

Ping <IP></IP>

A

Test reachability to a TCP/IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

Ping until stopped

A

Ping -t <ip></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

ping -a <ip></ip>

Shows all active connections
Resolve address to hostname
Answers a Ping request
Ack

A

Resolve address to a hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

ping -f <ip></ip>

A

Send with Don’t Fragment flag set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

ipconfig

A

Windows TCP/IP config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

•ipconfig /all-

A

Display all IP configuration details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

Flush the DNS resolver cache

A

Ipconfig /flushdns-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

The latest Linux utility

A

ip address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q
  • Lookup information from DNS servers
A

•nslookup <ip>
dig <ip></ip></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

This command determines the route a packet takes to a destination, takes advantage ICMP TTL exceeded error message

A

Traceroute <ip></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

Netstat -a

A

Show all active connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

Show binaries

A

Netstat -b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

Do not resolve names

Ipconfig-n
Netstat-n
Nbstat-n
Ping-n

A

Netstat -n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

What comprises hostname?

A

FQDN and ip address of device on windows, Linux etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

This command finds out which way packets will go, View device’s routing table

Show route
Show config
Route
Ipconfig

A

route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

tcpdump is a Windows packet capture tool

A

False, it is Linux written pcap
Windows is Windump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

Name 2 things nmap does besides these

-Find network devices/network mapper
-port scan/find device ports

A

-operating system scan
-service scan
-additional scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

Command to View interface on a device, detailed interface information

A

Show interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

View device config command

A

Show config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

View routing table command

A

Show route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

Route print in windows or Linux is netstat-r does what?

Creates a routing table
Find a devices routing table
Maps an ip address to a mac address
Registers up address in a routing table

A

find a device’s routing table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

Determine round trip time using ICMP

A

Ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

Canonical names, IP addresses, cache timers can all be found using a what command?

A

dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

ARP -a

A

Determines a MAC address based on an IP address with this command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

What is a great way to use Telnet?

A

Useful for checking a port application
Telnet <ip> <port></port></ip>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

Parabolic is an antenna that focuses the signal to a single point

A

True, Yagi is very directional and high gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

Orientation of an antenna that is relative to the surface of the Earth

A

Polarization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

Strength of a received radio signal shown as a negative number

A

RSSI (Received Signal Strength Indication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

Radiated signal strength that shows transmit strength + antenna gain - cable loss

A

EIRP (Effective isotropic radiated power)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

Association

A

Devices connecting to an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

Sight surveys

A

Determine existing wireless landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

A WiFi password is an example of a Pre shared key (PSK)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

Client and the access point need the same encryption

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

Problems are often found here with errors and mismatches that are viewed on a console

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

Every router interface is configured as an access port or a trunk port and each access port is assigned a VLAN

A

False, every switch not router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

If you are having Intermittent or all day issues you should check an individual device performance for this

A

Utilization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

These separate broadcast domains and are a single VLAN

A

Routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

How could you identify the source of a broadcast?

A

Packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

Duplicate MAC attacks can be common

A

False, they are not common and check for man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

Duplicate IP address is blocked by what?

A

OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

Broadcast is sent to every switch port

A

False, multicast is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

A switch directs multicast transmissions using this by watching messages

A

IGMP Snooping (internet Group Management Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

What command would help you find an asymmetric route?

A

Using traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

Sending information to a router but the router has no idea where the traffic is supposed to go. ICMP host unreachable message

A

Missing route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

IP addresses assigned by a non authorized server

A

Rogue DHCP, no inherent security in DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

Monitors and reports on IP address shortages

A

IPAM (IP address management protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

If a client receives an APIPA what does that mean?

A

Exhausted DHCP scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

What type of issue do you have if you can if you can communicate to local IP addresses but not outside of your subnet?

Dns configuration
Interface configuration
Ip configuration
Duplex configuration

A

Ip configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

Name 2 common ways to trouble shoot IP configuration

A

-Check IP address, subnet mask, gateway, DNS
-monitor traffic, examine local broadcast
-check devices,
-traceroute and ping local IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

If your network has copper don’t block the light

A

False, fiber, low optical link budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

Name 2 certificate issues

A

-Expired
-wrong domain name
-untrusted certificate
-correct time and date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

How is a network based firewall config confirmed?

Ping
Ipconfig
Acl
Policy list

A

Check the policy list and logs, packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

For host based firewall settings, you would check the accessibility and central console

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

Common troubleshooting for VLAN is to confirm physical interface with VLAN number and confirm voice data is on a separate VLAN from internet

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

If web browsing isn’t working it means you have a DHCP issue

A

False, DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

Kerberos uses a time stamp

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

If you have a lot of users coming in and out of an office you would want to increase the lease time

A

False, you would want to lower the ip lease time so you don’t exhaust the DHCP scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

To make a straight through cable you would punch down a 568B on one end and a 568A on the other.

A

False. You would punch down 568B and 568B on both ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

IPv6 uses 64bits

A

False, 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

When configuring a wireless access point you want to select the channel with the frequency range least used in that area

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

What device would you use to test the operation of a NIC?

A

Loopback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

The connection is established and ready for normal data flow is ACK

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

Transport handles the routing of data across segments

A

False, networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

There are 12 broadcast domains in a 24 port switch configured with 12 VLAN’s

A

True, each vlan is a broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

A laptop would plug into a hub to see all the communication on the network segment as a network sniffer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

supports equal cost load balancing and has all the routers contain the same topology view

DV
BGP
EIGRP
OSPF

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

What allows multiple network interfaces to work together as a single virtual network interface?

A

NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

An admin needs to be aware of this when installing wireless network in a building with multiple floors.

A

Channel overlap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

SSL VPN has the least connection overhead

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

designed for testing connectivity to a remote server on a specific port.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

/1 /9 /17 /25

A

128 CIDR
2 Networks
128 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

/2 /10 /18 /26

A

192CIDR
4 Networks
64 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

/3 /11 /19 /27

A

224 CIDR
8 Networks
32 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

/4 /12 /20 /28

A

240 CIDR
16 Networks
16 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

/5 /13 /21 /29

A

248 CIDR
32 Networks
8 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

/6 /14 /22 /30

A

252 CIDR
64 Networks
4 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

/7 /15 /23 /31

A

254 CIDR
128 Networks
2 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
313
Q

/8 /16 /24 /32

A

255 CIDR
256 Networks
1 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
314
Q

Loopback for IPv6?

0000/0
127.0.1
::1
192.172.3.2

A

::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
315
Q

802.1d

A

STP and avoids loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
316
Q

When setting up a VPN, a firewall should be the first device configured

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
317
Q

WAP’s are good up to how many feet to connect to?

125
150
75
30

A

150

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
318
Q

Someone who is logged into a company VPN will have an unexpected source ip address because of a proxy server

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
319
Q

A packet analyzer (protocol analyzer) can capture a TCP handshake and analyze it

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
320
Q

2/4 post racks are used for telecommunications equipment

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
321
Q

RAS is associated with what?

A

RDP or VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
322
Q

used to terminate DS3/T3 lines

CSU/DSU
Modem
Ftype
BBC

A

BBC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
323
Q

25 pair cable is used for

Telephony
RJ11
Voice
PSTN

A

voice on vertical connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
324
Q

This is a text file that maps hostname a to ip addresses

Nslookup
Dns server
Local host file
Root server

A

local host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
325
Q

A network based firewall is software based and on workstations and servers. Allows admin to manage incoming and outgoing traffic at the device level

A

False, Host based firewall
Network based firewall is at edge of network and manages traffic between internal network and outside world. More broad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
326
Q

10GBase-EW (WAN) distance is 10,000 meters

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
327
Q

purpose is to view data grams

A

Packet Sniffer’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
328
Q

How many pairs are crossed in a crossover cable?

A

2 pairs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
329
Q

CAT 7 has solid Kevlar and can’t bend 90 degrees

A

False, CAT 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
330
Q

What tool tests for continuity

TDR
Tone generator
Multimeter
Punch down

A

multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
331
Q

connect vertical cross connects when using data connections

Patch panels
IDF
Mdf
Demarc extensión

A

patch panels
66 block connects telephone or voice connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
332
Q

A load balancer can cache web content and serve it to users locally

A

False, proxy server
Load balancer evenly distributes network traffic across multiple servers or resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
333
Q

allows remote users to securely access corporate resources through a web browser on their devices

Radius
TACACS
Kerberos
SSL

A

SSL or SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
334
Q

44.7 Mbps

A

T3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
335
Q

Used to connect a router or switch to a terminal for console management

A

Rollover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
336
Q

Cable establishes a direct connection between a device and terminal for console management

A

Console cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
337
Q

Loop back

A

Cable that allows to test functionality of network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
338
Q

Request timed out is a common find when using this command

A

Tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
339
Q

1.544 mbps

A

T1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
340
Q

What cable is used to connect telephony distribution

66 pair
100 pair
Rollover
Console

A

100 pair cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
341
Q

How many broadcast domains are in a 24 port unmanaged switch?

A

1, BD is split by routers and VLAN
24 collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
342
Q

shares information to all switches in a network

Port forwarding
Multicast
Broadcast
VTP

A

VLAN Trunking (VTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
343
Q

One time temp posture assessment in a NAC

A

Non persistent agent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
344
Q

Captive portal relies on what to authentication?

A

802.1x which uses RADIUS authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
345
Q

High utilization threshold exceeded on gi/1/0/24 would be what kind of update?

A

Interface link status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
346
Q

Host based anti malware can keep a system secure by testing all communication from a distributed target

A

False, Network based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
347
Q

Only allows certain traffic through that is specified by certain ports

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
348
Q

Terminates a T1 line at a customer’s site

A

CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
349
Q

Relies on virtual circuits and point to multi point connections

Ip helper
Frame relay
MGRE
VLAN’s

A

Frame relay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
350
Q

CAT3-CAT6 would use this connector

A

RJ-45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
351
Q

Channel bonding improves this

Bandwidth
Teaming
Aggregate
Speed

A

Connection speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
352
Q

Dynamic routing protocol that supports IPv4 and VLSM

A

OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
353
Q

Connects a terminal device to a T1

A

CSU/DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
354
Q

RS-232, DB-9 and DB-25 are this type of cable that connects to a console port

A

Rollover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
355
Q

Without this a VLAN has no additional security

A

ACL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
356
Q

Locate possibly outages and track traffic and malicious usage in a network

Network analyzer
Network sniffer
Protocol sniffer
Packet capture

A

network analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
357
Q

A cable tester can be used in locating positions in a cross connect when changing a location of a phone b/w 66 blocks

A

False, Toner probe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
358
Q

actual encryption over VPN

A

PPTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
359
Q

A Toner Probe sends a signal down a cable and measures how long it takes to come back

A

False, TDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
360
Q

This network device creates a DMZ

A

Network based firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
361
Q

What are the tools needed to create a CAT5e crossover cable

A

A cable crimper and snips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
362
Q

Fiber connector that is pushed in with no twisting

A

SC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
363
Q

Large amount of CRC errors on a router interface would mean you have this issue

A

Faulty cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
364
Q

nmap

Network statistic
Open ports
Active hosts
Nbstat data

A

Identify Open ports on a remote server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
365
Q

A routing table has 2 different routes to the same IP subnet, the router will choose the route listed first in the routing table when forwarding a packet

A

False, route with lowest administrative distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
366
Q

An Ethernet having slow connection would be due to this

A

Duplex mismatch, this will cause late collisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
367
Q

uses certificates to negotiate access to the network

SSL
EAP-TLS
Kerberos
RDP

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
368
Q

Device that connects 2 or more network segments or subnets

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
369
Q

Connects multiple devices on the same network segment

A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
370
Q

What are the Ethernet cables with RJ-45 connectors that are used to connect ports to the switch?

A

Patch cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
371
Q

Portion of IP address that identifies the network the device is assigned to

A

Subnet address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
372
Q

SDWAN is a tunnel interface

A

False, mGRE
SDWAN is a WAN that uses software to control connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
373
Q

What is the Intranet accessed by authorized outside users securely over the internet

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
374
Q

Provides network resources

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
375
Q

What are the key sizes in AES?

A

-supports 3 key sizes: 128, 192, 256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
376
Q

divides plaintext into 128 bit blocks and transforms them into ciphertext, used in WPA2

A

CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
377
Q

What is the difference between a subnet and a network I’d?

A

Same thing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
378
Q

Devices that send and receive electrical signals

Switch
Modem
Loop back
NIC

A

Network interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
379
Q

DMVPN topology configuration

A

Hub and spoke configuration for full mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
380
Q

Hosts assigned specific roles like file sharing. Other hosts Access but don’t host devices of their own

A

Client-server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
381
Q

Network where each device is provided access to shared files

A

Peer-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
382
Q

Provides flow control and transmission for analog and or digital streams over a shared link

CSU/DSU
Switch
Modem
LLC

A

LLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
383
Q

Conversion of digital data to electric pulses is what layer?

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
384
Q

Physical network device identification and data transmission between hosts are in which layer?

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
385
Q

End to end flow control is at which layer?

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
386
Q

Method to retrieve or send a piece of data over the internet

A

HTTP GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
387
Q

What layer is encapsulation at?

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
388
Q

Top to bottom is de encapsulated

A

False, encapsulate
Bottom to top Is de encapsulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
389
Q

ARP is used to determine the MAC address of the host using the destination IP address

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
390
Q

ACK starts a connection between 2 systems

A

False, SYN
ACK acknowledges a packet has been received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
391
Q

You use this when trying to use TCP to connect to a port

A

3 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
392
Q

3 way handshake

A

CP1 sends SYN
CP2 receives and sends back a SYN/ACK
CP1 sends an ACK and the connection is complete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
393
Q

Open ports respond with SYN/ACK and closed ports respond with an RST flag

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
394
Q

Sends SYN packet to a port but the 3 way handshake does not occur because the original system doesn’t reply with an ACK. No connection is made or security log

A

Stealth scan (half open)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
395
Q

All flags are turned on

A

Xmas Tree scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
396
Q

Finds a target machine but finds another system to take blame (zombie machine)

A

Idle scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
397
Q

RST

A

TCP flag that resets a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
398
Q

Directs the sending system to send buffered data

RST
DNF
PSH
BUFF

A

PSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
399
Q

When does a router use ARP?

A

If a router’s routing table doesn’t have a MAC address of devices on the local LAN and they need to forward a frame to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
400
Q

SSL is a more advanced security protocol than TLS

A

False, TLS is more advanced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
401
Q

Used by browsers and web servers to exchange files

A

HTTP

402
Q

TLS secures messages being transmitted over the internet with RSA authentication and encryption. Web browsers use for safe web transactions

A

False, SSL

403
Q

TLS implementation through what 2 protocols

A

TLS Record- connection security with encryption
TLS Handshake- provides mutual authentication and choice of encryption

404
Q

How does FTP protect access to files?

A

User names and passwords

405
Q

CAT 6 has a solid plastic core that keeps twisted pair separated and prevents bend in cable

A

True

406
Q

CAT 8 is 40Gbit with foiled twisted and shielding

A

True

407
Q

4 connectors that support up to 2 pairs and is used to connect a DSL router to the telephone network

A

RJ-11

408
Q

Solid wires conduct signals better but are prone to break when bent. Stranded are flexible but don’t carry electrical signals well

A

True

409
Q

GG45 or TERA connectors are the connectors for this CAT cable that requires shielding on each twisted pair

A

CAT 7, 10GBASE-T

410
Q

3 coaxial cables

A

RG6, , RG58 and RG59

411
Q

BNC connector is used for coaxial

A

True, also BNC coupler and F Connector

412
Q

RJ48c is a connector that connects what?

Ethernet
T1 Wan service
Switch
Router

A

T1 WAN service

413
Q

What’s connector would you use for 10BASE2?

BNC
F type
MTRJ
LC

A

BNC, 10BASE2 is a thinnet

414
Q

Connector for cable, satellite and broadband cable connections

A

F-Type

415
Q

Impedance rating of 75 ohms would use what cable?

A

RG-6 and RG-59

416
Q

How is CAT 5e different than CAT 3

A

More twists per inch
Reduce crosstalk
Supports higher data rates

417
Q

If a fiber cable is bent and wants to run straight, how does it still work?

A

Cladding, will reflect it back into the core and around the bend

418
Q

Connector for multimode and single, bayonet, push and twist

A

ST

419
Q

Used with single and multimode and is a push on/pull off with a locking tan

LC
ST
MTRJ
SC

A

SC

420
Q

Plastic connector with a locking tab

A

LC

421
Q

Duplex connector, send and receive fibers in one connector with a plastic tab

LC
ST
MTRJ
SC

A

MTRJ

422
Q

Single mode connector, threaded. Shouldn’t pop loose

LC
SC
ST
FC

A

FC

423
Q

Include both cables in a single connector

Sc
St
LC
Mtrj

A

LC
MTRJ

424
Q

Multi mode fiber operates at 850nm and 1300 nm

A

True
Single is 1310-1550nm

425
Q

Multi mode has a smaller central core than single mode

A

False, single mode

426
Q

SC and ST require what for assembly

A

Polishing

427
Q

Determines which wire goes to which pin of the connector

A

Pinout

428
Q

Solid core cables are for patch cables and drop cables where flexibility is needed

A

False, Stranded core cables
Solid is for longer runs inside walls or ceilings

429
Q

4, 5, 7, and 8 pins are unused in gigabit I’m CAT 3,5,5e

A

True

430
Q

Tera and GG45 terminate cables in CAT 7

A

True

431
Q

Not wiring through an MDF but through an IDF on the floor you need it

Demarcation extension
Punch down tool
Pinout
Patch Panel

A

Demarc extension

432
Q

True or False, Horizontal cross connects IDF’s on the same floor

A

True

433
Q

66 blocks go up to CAT 5e

A

False, 5

434
Q

Where twisted pair cables are terminated

A

Patch panel

435
Q

When trimming excess wires you point the cut side of the tool toward the connected end of the wire

A

False, point the cut side of the tool towards the wire end

436
Q

When punching down a 66 block, this type of blade

A

Straight

437
Q

What tool do you use to extend networ services beyond a demarcation?

A

Punch down tool

438
Q

Use this to remove the plastic coating over the cable

A

cable stripper

439
Q

An open circuit is an electrical signal taking a path a different path than I tended. Signal sent on a wire will arrive on a different wire

A

False, Short (plastic on wire has worn down)

440
Q

Which CAT cables have drain wires to absorb EMI?

A

CAT6 and 7

441
Q

Measures the crosstalk that occurs at the same connector on different wires

Alien crosstalk
FEXT
Short
Next

A

NEXT

442
Q

NEXT measures the crosstalk that happens on the opposite end of where transmission occurred

A

False, FEXT (far)

443
Q

when a single wire bundle that parallels with another wire bundle

A

alien crosstalk

444
Q

Crosstalk typically occurs in where?

Connector
Sheath
Wire end
End of wire

A

usually is in the connector

445
Q

Crosstalk preventions

A

-connectors properly connected
-maintain twists up to both ends of wire

446
Q

What could you use if you need to use a cable longer than 100m?

A

Repeater

447
Q

Measure of resistance within the transmission medium and is measured in ohms. Like friction in wire

A

Impedance

448
Q

How many Ohms is cable tv?

A

75

449
Q

Name of the Pins between 2 pairs and are crossed

Crossover
Straight through
Split pair
Rollover

A

Split pair

450
Q

PoE is used on CAT6 or higher

A

False, Cat 5 or higher

451
Q

Impedance rating for a cable must match that impedance for the transmitting device

A

True, mostly used in coaxial

452
Q

Having a link loss margin less than 12dB ensures the cable run will continue to function

A

False, 3dB

453
Q

Whenever a copper cable in installed a degree of signal loss occurs

A

False, fiber

454
Q

helps limit the degree of signal loss

Attenuation
Mimo
OFDMA
Polishing

A

Polishing

455
Q

Physical contact polishing is only used with single mode fiber, slight curve, only cores of the fiber touch each other

A

True

456
Q

has a higher grade of polish/curve to reduce ORL (Optical Return Loss)

A

UPC/SPC (ultra physical contact)

457
Q

What are ways APC (colored green) reduces back reflection?

A

-8 degree cut in ferrule
-angle cut prevents light going back into fiber
-light is reflected into the cladding
-only use with other APC
-excessive insertion loss with another polish connector

458
Q

A failure in a Loopback plug means this

Bad cable
Interface issue
Faulty network card
Disabled

A

Faulty network card

459
Q

Use a cable certifier to test for opens, shorts, splits, wire mappings etc.

A

False, cable tester

460
Q

Verifies a cable installation meets requirements for network architecture and multifunctional to test bandwidth, duplex settings etc

A

Cable certifier

461
Q

How is snips different than a wire stripper?

A

Snips cut wire to a specific length to remove damaged sections, wire stripper cut sheath to expose wire

462
Q

A cable certifier tests for continuity

A

False, cable tester

463
Q

A device connected to your switch is only running at 100mbps. What is likely the cause?

Crosstalk
Impedance
Continuity
Duplex mismatch

A

Crosstalk, a wire doesn’t operate at the desired standard

464
Q

An echo occurs when?

Speed mismatch
Duplex mismatch
Impedance mismatch
Connection mismatch

A

Impedance mismatch,
Ex RG6 has 75 ohms and you Connect it to a RG58 with 50 ohms

465
Q

What is the difference between a NIC and a network adapter

A

Nothing, same thing

466
Q

What are common transceivers?

A

GBIC
SFP
XFP
QSFP

467
Q

RARP is trying to find a MAC address from an IP address

A

False, ARP

468
Q

Network adapter that converts digital signals into analog sound signals across phone wires

CSU/DSU
CDMA
Modem
Transceiver

A

Módem.

469
Q

Within multiplexing, transmit and receive data through a single optical fiber

A

BiDi (bi directional)

470
Q

Media converters, transceivers and switches are layer 2 devices

A

False, media converter and transceiver are layer 1

471
Q

What is the broadcast address for ARP?

FF.FF
FF:FF
127.01
0.0.0.0/0

A

FF.FF.FF.FF.FF.FF or FF:FF:FF:FF:FF:FF

472
Q

A wireless NIC uses electronic signals

A

False, radio
Wired NIC sends electronic

473
Q

The NIC you choose has to match the network architecture, even if you have a media converter

A

True, can convert fiber into copper but it has to have same architecture

474
Q

Sends signals from a computer onto a network

Transceiver
Modem
CSU/DSU
CDMA

A

Transceiver

475
Q

This device repeats all information across all ports. What is another name for a repeater?

A

Hub

476
Q

Connects 2 different network segments that use different transmission mediums or different architectures

A

Wireless Bridge (AP)

477
Q

MAC addresses change as a frame is routed along the path to its destination (computer to router interface, router interface to router interface) but the packet information (destination and source ip) stay the same

A

True

478
Q

A switch learns where devices are located on a network by look at an incoming frames destination MAC address

A

False, Source MAC address

479
Q

Connects multiple cable segments and forwards frames to appropriate segment

A

Switch

480
Q

For Hexadecimal there is 0-9 but what numbers go with A B C D E F?

A

10
11
12
13
14
15

481
Q

11000111 is C7 in binary

A

True,
1100 and 0111 split into nibbles
1100 =12 (C)
0111=7
11000111=C7

482
Q

172.16.0.0/16 but you need 24 subnets. How would you find this?

A

-2 to the 5th =32 which would be enough subnets
-Network id becomes 172.16.0.0/21 because you add the 5 to the /16
-# of hosts 2 to the 11th - 2= 2,046 because you subtract 5 from the /16

483
Q

How would you use Anding to find a Network ID of 172.16.77.54/21

A

Convert each to binary and multiple top row to bottom
IP- 1010110.00010000.01001101.00110110
Subnet mask 11111111.11111111.11111000.00000000

10101100.00010000.01001000.00000000
Then convert to 172.16.72.0

484
Q

Fixed length subnet masks are mostly used in private networks

A

True, variable is used in public

485
Q

What is included in a DHCP scope?

A

-range of ip addresses
-subnet mask
-Address of dns server
-address of the gateway

486
Q

DHCP requests pass through routers to other subnets

A

False, use broadcast frames at layer 2 and use IP helper or DHCP relay function on a router if it has it to

487
Q

How many IP addresses are able to be assigned with a network address of 137.65.0.0 with a subnet mask of 255.255.0.0

A

65534,
1. 255.255.0.0 is /16
2. N power - 2(hosts per subnet)
3. 2 to the 16th power - 2=65534

488
Q

What’s is the subnet mask for 165.245.12.88/26?

A

255.255.255.192

489
Q

What is the Network address and first address for 165.245.12.88/20, it’s subnet mask is 255.255.240.0

A

165.245.0.0
165.245.0.1

Because it is in the 16 range

490
Q

What’s is the broadcast and last ip address for 18.172.200.77/11 with the subnet mask as 255.224.0.0 and network address 18.160.0.0

A

18.191.255.255
18.191.255.254

Since 160 in the network address is apart of the 32 address range, the next segment would be 192 so we use 191 since it ends 160-191

491
Q

What are 2 host ranges for a network ID of 192.168.5.0 where the number of hosts is 64

A

192.168.5.1 - 192.168.5.62 (192.168.5.63 is broadcast)
192.168.5.64 - 192.168.5.126 (192.168.5.127 is broadcast)

492
Q

What is the last subnet address you can use for 192.168.5.88/26? Subnet mask is 255.255.255.192
Network address is 192.168.5.64

A

192.168.5.126 (192.168.5.127 is Broad cast address)

493
Q

If a DHCP server goes down, a computer with a static ip address can no longer communicate with the server

A

False, if it is static then it can

494
Q

For appipa what 2 are only configured?

ip address
DNS
subnet mask
Default gateway

A

Ip address and subnet mask

495
Q

An alternate ip address is a static ip address you set when a device is experiencing APIPA

A

True

496
Q

What protocol is used by a device to ensure an APIPA is not already on a network?

A

ARP

497
Q

If a user has an APIPA and you confirm the physical connection is good, what should you do next?

A

Renew the ip address

498
Q

DHCP exclusion and reservation are the same thing

A

False, exclusion are ip addresses that the server won’t assign
Reservations are static ip addresses

499
Q

What type of devices are DHCP exclusions typically used for?

A

Servers, printers, routers, or other devices that cause issues if ip address changes

500
Q

After distributing IP addresses you reboot each client system but they can’t get an IP from DHCP server. Why?

A

You have to configure the clients to obtain ip addressing from a dhcp server

501
Q

Ñame 2 systems that prevent duplicate IP addresses.

A

DHCP server
APIPA

502
Q

Longer lease times increase network traffic

A

True

503
Q

Dhcp exclusions assign a static ip to a device with a MAC address table

A

False, reservation

504
Q

NTP, DNS, and NETBIOS can use an IP helper

A

True

505
Q

Dhcp relay sends a broadcast from the router directly to a dhcp server

A

False, unicast

506
Q

What happens when a device sends a broadcast for an ip address

A

If the dhcp server is on the same subnet it will go through Dora, if not it will go to a router (router should have a relay of helper) that sends it directly to the dhcp server for dora

507
Q

Forwards received dhcp frames to the remote dhcp server if it is 172.16.30.1

A

Ip helper-address 172.16.30.1

508
Q

Specifying which server network interface the agent listens on for dhcp message is a required step for configuration on a Linux server

A

False, windows

509
Q

Before using a dhcp relay you have to install this

VNC
Radius
Remote Desktop
Remote Access service

A

Remote access service

510
Q

AAA maps hostname to ipv6 address

A

False, AAAA

511
Q

Defines the authoritative sever for a specific domain

Host file
SOA
Name Server
Root Port

A

Name Server

512
Q

Which Is the hostname?

FQDN
TDR
Http
Www.

A

Www.

513
Q

Renewing the dhcp servers IP address lease or entering the ipconfig /register dns command on a workstation does what if dynamic dns is in use?

New ip address
New subnet mask
Update arp table
Update host records

A

Causes a dynamic update of the host records

514
Q

These 2 do not automatically update dynamically in the dns

A

MX and CNAME

515
Q

If you have an ip address that is connecting to a site but the hostname isn’t what do you need to configure?

DNS server
Forward lookup zone
Recursive cache
Authoritative file

A

Forward lookup zone

516
Q

First place a computer looks at during name resolution process

Hosts file
SOA
FQDN
Root Server

A

Hosts file

517
Q

What time standard does NTP use?

A

UTC (Coordinated Universal Time)

518
Q

highest stratum level allowed

16
51
55
15

A

15

519
Q

A system clock having small, rapid variations

A

Jitter

520
Q

One packet persecond is 2 machines to an accuracy within a millisecond of each other

A

False, one packet per minute

521
Q

Systems clock being off by a few seconds or minutes is

Time drift
Jitter
Latency
Dropped packet

A

Time drift

522
Q

This is a Unicast assigned to more than one interface, typically belonging to different hosts

A

Anycast

523
Q

Ip address that verifies if TCP/IP protocol stack is properly installed on the host

A

Loopback address

524
Q

Multicast is an address that represents a static group of hosts

A

False, dynamic hosts

525
Q

ISATAP is a dual stack router that can send IPv4 and IPv6 but only for intrasite and not over the internet

A

True

526
Q

IPv6 is 8 hexadecimal values with each block being 16 bits of data

A

False, 4 hexadecimal values

527
Q

The prefix for IPv6 is 64bits

A

True,
48 is site prefix (isp, location of host, geo location)
16 is subnet

528
Q

What is C in Hexadecimal?

A

1100 because C is 12

A=10
B=11
C=12
D=13
E=14
F=15

529
Q

What are steps for EUI-64 address subnet prefix? 2600:dddd:1111:0001and MAC address 8c:2d:aa:4b:98:a7

A
  1. Leave the first 64 (prefix) as is
    Ex 2600:dddd:1111:0001
  2. Take the mac address off the interface (48 bits) and write it out
    Ex 8c:2d:aa:4b:98:a7
  3. Split the MAC in 2 and put FFFE in the middle (16 bits)
  4. Invert the 7th bit
    Ex 8c into 8e

2600:dddd:1111:0001:8e2d:aaff:fe4b:98a7

530
Q

FE80::/10, FE8, FE9, FEA, FEB are all link local addresses

A

True

531
Q

FC00 is a unique local address

A

True, FC00::/7 or FD00::/7

532
Q

Multicast is FF00::/8 prefix

A

True, FF02::/16 and FF01::/16 are restricted and not forwarded by routers

533
Q

Name 2 well known multicasts

A

FF02::1
FF02::2
FF02::1:2

534
Q

What is is the local Loopback address?

A

::1

535
Q

Why is 343F:1EEE:ACDD:2034:1FF3:5012 not a valid ipv6 address?

A

It only has 6 sections, it needs 8

536
Q

With the following IPv6 address FD01:0001:0001:005::7/64 what are the:
-Global routing prefix
-Subnet ID
-Interface ID
-Prefix length
-Global ID
-Unique Local unicast

A

-Global routing prefix is FD01:0001:005
-Subnet ID is :005
-Interface ID is ::7
-Prefix length is /64
-Global ID is none
-Unique Local unicast is FD

537
Q

Tunneling used to create a router to router tunnel b/w 2 sites through IPv4 network

A

6to4 tunneling

538
Q

IPv6 hosts communicating over IPv4 within a site

6/4
4/6
ISATAP
Dual stack

A

ISATAP

539
Q

This tunneling to configure host to host tunnel between 2 hosts separated by symmetric NAT

Teredo
6to4
ISATAP
4to6

A

Teredo

540
Q

can be used to send data over the internet, is configured between individual hosts and has dual stack hosts

ISATAP
6 to 4
Teredo
4 to 6

A

Teredo tunneling

541
Q

FC00::8907:FF:FE76:ABC

A

Unique local because it begins with FD (or FC)

542
Q

FF00:98BD:6532::1

A

Multicast begin with FF

543
Q

FEA0::AB89:9FF:FE77:1234

A

Link local because FEA, also FE8, FE9, FEB

544
Q

2001:6789:9078::ABCE:AFFF:FE98:0001

Global unicast
Global Multicast
Global local link
Global link unicast

A

Global unicast, begins with 20

545
Q

FF02::1:2

A

Multicast for all hosts on the link

546
Q

The MAC address of a frame containing a multicast packet begins with 01-00-5E and ends with a form of the IP multicast group address. True or False

A

True

547
Q

Keeps frames from being forwarded to hosts that are not a member of the multicast group

A

IGMP snooping

548
Q

Anycast advantages

A

Speed
Redundancy
Ddos mitigation

549
Q

Broadcasting is used for streaming video and audio applications like video conferencing and real time functions

A

False, multicasting

550
Q

Any cast gives same IP address to multiple servers in a IPv4 network

A

False, BGP does
Anycast is for IPv6

551
Q

198.162.12.254/24 is a unicast address

A

True

552
Q

Refreshes all dhcp leases and reregisters dns names, use it to troubleshoot issues with dns

A

Ipconfig/registerdns

553
Q

Display the contents of the dns resolver cache. Use it to troubleshoot issues with dns

A

Ipconfig/displaydns

554
Q

Would 192.168.1.0 be a valid address on a 192.168.2.0/24 subnet?

A

No, it would be need to be 192.168.2.

555
Q

If someone can’t connect to a website after a server upgrade, use this command

A

Ipconfig /flushdns to remove all entries from dns resolver cache and will force the dns mapping upgrade

556
Q

Would 192.168.2.0 default gateway be on the same subnet as 192.168.1.0/24

A

No

557
Q

DNS servers need to be on the same subnet as an ip address and default gateway

A

False, they do not.
Only IP address, host, subnet mask and default gateway

558
Q

4.2.2.1 is the

A

root DNS server

559
Q

If you ping a remote host and it is successful then the problem is not network connectivity

A

True, check name resolution or service access

560
Q

Inet and inet6 are associated with ipconfig

A

False, it is in ifconfig and used with Linux

561
Q

You would use this command to view a systems default gateway

A

Ipconfig or ifconfig

562
Q

Interface: 192.168.4.102 on interface 0x3
Internet Address Physical Address Type
192.168.1.23 00-d1-b6-b7-c2-af dynamic

A

Arp, specifically results of an arp-a command

563
Q

Shows you the MAC addresses associated with ip addresses that the local station contacted recently

A

Arp

564
Q

Name a common dns problem

A

-Dns server is down
-Routing problem between host and dns server
-sending host has wrong ip address for dns server

565
Q

Nslookup can be used on which operating systems?

A

windows and Unix

566
Q

Nslookup has more information in it default usage than dig

A

False, dig has more

567
Q

Dig -axfr runs a query of all records in the zone

A

True

568
Q

Linux reverse lookup of 10.0.0.3 is dig -x 10.0.0.3

A

True

569
Q

You can eliminate collision problems by using a switch instead of a hub

A

True

570
Q

Most common transmission medium of cable and connector for Ethernet

A

UTP and RJ45 connectors

571
Q

When would you uses crossover cable to connect a switch to a router?

A

Uplink port is in use

572
Q

Pins used for Loopback plug to RJ45 connector

A

Pin 1 connected to pin 3
Pin 2 connected to pin 6

573
Q

What cable is used to connect 2 switches using their uplink ports?

Crossover
Straight through
Rollover
RJ45

A

Crossover, only would use straight through if one is connected to uplink and the other isn’t

574
Q

Cable that connects a workstation to the bus breaks. What will happen?

A

No devices will be able to communicate

575
Q

You see a switch with continually lit lights and a workstation that is flashing rapidly. What is wrong?

Spanning tree is in place
In a loop
Working as usual
Faulty network card

A

Faulty network card

576
Q

Circuit level gateway makes filtering decisions based off of sessions

A

True, session layer 5

577
Q

This firewall filters packets by the payload within a packet

Application layer
Packet filtering
Session layer
Stateless

A

Application layer (7)

578
Q

A proxy server handles requests coming from the internet to internal servers

A

False, reverse proxy server

579
Q

Is a packet filtering firewall stateful or stateless?

A

Stateless, does see if data has an active session.
Layer 5 is stateful and caches those known sessions

580
Q

A proxy server should be used with an application firewall

A

False, proxy server is a type of application firewall

581
Q

Combines a traditional firewall with other network device filtering functionalities

A

NGFW

582
Q

Linux command to update or install iptables, retrieve the iptables package by entering this

A

Sudo apt install iptables-services

583
Q

What are the 3 iptable chains?

Input, output, listening
Input, output, learning
Input, output, forwarding
Input, output, blocking

A

Input- controls behavior of incoming connections
Forward- incoming connections not delivered locally
Output- outgoing connections

584
Q

What 3 options are you able to set on a firewall?

A

-packet source address
-port number
-packet destination address

585
Q

Use a vpn to protect against internet based attacks

A

False, host based firewall

586
Q

Sudo iptables -F

Fragments rules
Clears rules
Creates rules
Adds rules

A

Clears all the current rules

587
Q

UTM firewall Inspection used when traffic throughput and speed are a priority

-flow bases
-NGFW
-host based
-networking

A

Flow based,
Proxy inspection when data integrity is priority

588
Q

If you can Ping from a to b but not from b to a what kind of issue may you have?

Connection
Speed
NIC
Firewall

A

Firewall

589
Q

prevents the response to port scans from the WAN to protect against port floods

Port forwarding
Idle scan
Stealth mode
IPS

A

Stealth mode

590
Q

An organization exposing some servers to the public through the internet for mail, web, extranet or vpn

A

Screened subnet, uses a firewall with a connection to the screened subnet that’s separate from internal network connection

591
Q

Which is a use for an extended acl?

-control network access for ip traffic
-identify traffic for vpn access and filtering
-allow remote access vpn’s to configure client firewalls and set dynamic access policies

A

-control network access for ip traffic
-identify traffic for vpn access and filtering
-allow remote access vpn’s to configure client firewalls and set dynamic access policies

592
Q

What firewall is used to create a screened subnet to make a web server available to internet users

A

network based is used to create subnets

593
Q

What do you need to add to an acl that is on a Cisco device?

Implicit deny
DV
Permit
Traceroute

A

You need to add a permit and identify the type of traffic
Cisco all have implicit deny

594
Q

This firewall counts as a router hop and support multiple interfaces

A

Routed firewalls

595
Q

How would you set up a web server in a screened subnet?

A

You would place it in between 2 firewalls, one facing the internet and the other facing the internal network

596
Q

How would you allow access to private resources from the internet in a screened subnet?

A

Place a vpn server in the screened subnet that one must authenticate to

597
Q

3 network interfaces for dual homed gateway that need to be logged onto

A

-1connected to the internet
-1 connected to the public subnet
-1connected to the private network

598
Q

Anomaly based detection is an IDS that looks for patterns in network traffic and compares to known signatures (malicious packets or another name is finger prints)

A

False, Signature based
Anomaly defines a baseline and looks for anything that falls outside of that baseline by using thresholds as alerts

599
Q

If IPS has more functions than IDS, why would you used IDS still?

A

As a back up if a malicious packet makes it through an IPS, an IDS may be able to catch it and alert the security team

600
Q

can scan the content of encrypted traffic to prevent malicious attacks

Nids
Hids
Nips
Hips

A

Host based IDS

601
Q

Managed switches are fast, less expensive and good for small networks and unmanaged switches are configurable (web based or command line), VLANs , port security and Link aggregation for bigger networks

A

False, reverse

602
Q

SSH is in band management

A

True, need an ip address for authentication
Connecting a work station to a console port on a switch with a rollover cable is out of band and needs to be done first on a switch

603
Q

Place this in a wiring closet configured for vlan, port security and voip and then connect switches to faster upstream switch

A

Access level switch

604
Q

What device would you use if you have 10 VLAN’s that need to communicate with each other?

A

Layer 3 switch to perform inter vlan routing

605
Q

When you subdivide a switch into VLAN’s each vlan behaves as an independent switch and creates its own MAC address table

A

True

606
Q

What OSI layer is each at below:

-firewall blocking traffic using TCP 80
-a login process with multi-factor authentication
-tech pings a server at 10.10.22.17
-Ethernet inactive from speed mismatch
-MAC address of workstation

A

Layer 4
Layer 7
Layer 3
Layer 1
Layer 2

607
Q

A dns request May be sent to one of many dns servers separated geographically on the internet. Which method of casting is this?

A

Anycast, single ip address has multiple paths to 2 or more endpoints

608
Q

An internet connection at a distant site has failed. How would you remotely manage this router?

A

Out of band management, no internet access to use RDP or SSH

609
Q

Which of these is untrue?
-each port can be assigned to only one vlan
-each vlan has its own MAC address table
-to create a vlan assign individual ports on the switch to the broadcast domain desired

A

All are true

610
Q

For a MAC address table, the frame is replicated and sent to every active port on the switch except the source port

A

True

611
Q

Command to configure a switch to obtain an ip address from a dhcp server

Ipconfig
Ip dhcp
Dhcp ip address
Ip address dhcp

A

Ip address dhcp

612
Q

Command to enable switch management from a remote network

Dig
Ipconfig
IP Default gateway
IP address

A

Ip default-gateway 192.168.10.185

613
Q

Name one of 4 switch config commands you need to configure the switch ip address

A

Terminal
Interface vlan
Ip address subnet mask
No shut down

614
Q

STP uses this to prevent switching loops

BPDU
Encryption
Open ports
Root Port

A

BPDU (Bridge Protocol Data Unit)

615
Q

802.1ax

Fault tolerance
NIC bonding
Link aggregation
NIC teaming

A

Link aggregation

616
Q

Ports in a blocked state still receive BPDU’s

A

True

617
Q

You would use trunking to enable devices in different VLAN’s to communicate with each other

A

False, layer 3 switch or router
Trunks use Gigabit Ethernet uplink ports, VLAN tags are only used for frames that travel between switches on the trunk ports

618
Q

PoE
PoE +
PoE ++
PoE ++ type 4

A

15.4 watts
25.5
51
71.3

619
Q

Maintained by switch that contains MAC addresses and their corresponding port locations

MAC address table
CAM Table
Port Table
Route Table

A

Content addressable memory table

620
Q

A trusted device is a device managed by an administrator in your company

A

True

621
Q

ARP spoofing occurs in a router

A

False, a switch because it replaces a Mac address with an attackers MAC address in an arp table

622
Q

How would you prevent vlan hopping?

Disable auto negotiation
Enable encryption
Configure 802.1x
Stateless firewall

A

Disable the switch’s auto negotiation setting for all ports except for those to which an authorized switch is attached.

623
Q

keeps ports in assigned roles

Root guard
Bpdu
Router advertisement guard
Root port

A

root guard
BPDU guard puts an interface into a blocking state when it receives a BPDU packet meant to change the root bridge switch

624
Q

a method used on a LAN to allow or deny based on port or network connection such as controlling an access switch

ACL
Radius
802.1x
Port forwarding

A

802.1x

625
Q

Arp spoofing changes the mac address on a frame

A

False, that is mac spoofing
Arp spoofing associates an attackers mac address with the ip address of a victims device

626
Q

something an attacker can do through Mac spoofing

A

-Bypass 802.1x port based security
-Bypass mac filtering
-Hide identity to impersonate another device on the network

627
Q

To make a switch a root bridge how would you do it?

A

configure a priority number lower than the default (32768)

628
Q

Dynamic trunking protocol attack bypasses normal function of a router to communicate between VLAN’s and gain unauthorized access to traffic on another VLAN

A

False, switch spoofing
Dynamic trunking protocol attack is not secure and allows a device to modify configuration information

629
Q

manipulates a switch’s auto negotiation setting to access a vlan that’s connected to the same switch as the attackers vlan

Arp spoofing
Switch spoofing
Vlan spoofing
Max spoofing

A

Switch spoofing

630
Q

Private network under one administrative authority who controls the network, interior routing

A

Autónomos system
Exterior routing is done between 2 or more of these

631
Q

shares its entire routing table with every neighbor at every routing update

Distance vector
BGP
OSPF
Arp

A

Dv

632
Q

RIP 2 supports vlsm

A

True
rip 1 doesn’t, rip 2 does

633
Q

BGP is the only exterior gate way protocol (EGP)and is a hybrid

A

False, it is not hybrid it is a dv and supports vlsm

634
Q

Eigrp is a hybrid routing protocol, interior gateway protocol and makes decisions based off of bandwidth and delays

A

True

635
Q

Virtual ip (vip) can have multiple devices with the same ip address

A

True

636
Q

Which routing protocol would you use if you wanted uninterrupted internet connectivity?

BGP
OSPF
Rip
Eigrp

A

BGP, Exterior dynamic routing protocols provide redundancy in internet connectivity

637
Q

link state routing protocol, interior, classless, divides large networks into areas and is IPV6

A

IS-IS routing

638
Q

One physical interface but you want to connect 2 ip networks. What would you use?

Sub interfaces
Nic teaming
Link aggregate
Wireless bridge

A

Sub interfaces

639
Q

Permanently Mapping a particular host with a private ip address to a particular port number on a NAT router

Port forwarding
Static ip
802.1x
Port isolation

A

Port forwarding or DNAT
Data can come from in to out, but not out to in

640
Q

NAT/PAT allows multiple private hosts to share a single public address

A

True

641
Q

Hosts on a private network share a virtual ip address if the network utilizes a NAT router

A

False, physical ip address

642
Q

If you have 5 servers that need to be accessed from outside your network and you put them behind a firewall so they can’t be accessed directly, which NAT method would you use?

Static NAT
Screened Subnet
Dynamic NAT
Port Forwarding

A

Static NAT, used for web servers because it will have the same ip address

643
Q

2 stateful routers in traffic flow would cause an issue with asymmetric routing

A

True, the 2nd firewall would drop the inbound packets coming in

644
Q

Routing loops cause broadcast storms

A

False, switching loops

645
Q

Need a computer with access to the network but do not want hosts on the network to communicate with it

A

Use a VLAN

646
Q

Ñame 2 dominant SAN technologies

A

-fibre channel
-iscsi
-fibre channel over Ethernet
-Infiniband

647
Q

What are san targets?

Storage devices
Servers
Clients
Hosts

A

Name for storage devices

648
Q

What does a host use to connect to a San?

San fabric
Nic
Switch
Router

A

NIC or host based adapter (HBA)

649
Q

Infiniband can support longer distances for San than fc

A

False, fc is 10km
Infiniband is 300 meters

650
Q

2 types of SANs that need special switches to create San fabric that client systems are not directly connected to

A

Iscsi and fibre channel sans

651
Q

This storage is grouped together to provide fault tolerance and to users on the network appears as a single file server

Static nas
San clustering
Nas clustering
Static san

A

Nas clustering, without clustering users would see multiple servers instead of 1

652
Q

3 components of SAN

A

Hosts (hypervisors)
Storage (targets/devices)
San fabric (cabling)

653
Q

Fibre channel needs 10gbit to function

A

True

654
Q

configures an iscsi target and defines its security settings, including chap and pap

San
Initiator
Fibre
Cluster

A

Initiator

655
Q

Voip is on what layer?

Application
Session
Transport
Network

A

transport layer and mostly udp

656
Q

Voip hooks up to what connector?

Rj11
BNC
RJ45
F connector

A

rj45 for the internet

657
Q

Algorhythm to compress data in order to save bandwidth for voip

A

Codec

658
Q

Voice data transmission through a packet switched ip network

A

Voip

659
Q

Latency should be below 250 milliseconds and between 75-150 milliseconds

A

True

660
Q

How would you fix increased bandwidth due to voip?

A

Replace codec with a more efficient one

661
Q

Hypervisor types

A

1 bare metal and OS on physical machine
2 software application

662
Q

3 Hardware components controlled by hypervisor

A

RAM, cpu, storage

663
Q

Allows virtual machines to interact with hardware without going through the host operating system

A

Hypervisor

664
Q

Type 2 hypervisor is an enterprise level type

A

False, type 1
Type 2 is installed on pc of laptop and is small scaled (no server)

665
Q

Impossible to decrease once allocated in virtualization

A

Storage

666
Q

Multiple virtual NIC’s can be added to a virtual machine and they need the appropriate driver to function

A

True

667
Q

Multiple networks can connect to a single interface on a physical router

A

False, virtual router
Physical routers can only do one interface per network

668
Q

Allows physical and virtual machines to communicate with each other

Hypervisor
Vlan
Virtual switch
VNC

A

Virtual switch

669
Q

Software applications to the client either over the internet or on a local area network. Most used model

SDN
SDWAN
SaaS
MGRE

A

SaaS

670
Q

Everything a developer needs to build an application. Don’t manage hardware or software. Client in charge of securing data. Provider handles updated

Saas
Paas
Iaas
Daas

A

PaaS

671
Q

Processing, storage, networks and virtualized environment. Runs software without purchasing servers, data centers, space or network equipment. Provider handles update. Client is responsible to secure networks and data

IaaS
PaaS
SaaS
Daas

A

IaaS, responsible for everything but hardware

672
Q

Tunnel mode only encrypts each packers internal data. Destination and source address are in the clear

A

False, transport mode (end to end or host to host) later 4
Tunnel entire packet is encrypted, put into a non encrypted packet and is given a new ip header (site to site)

673
Q

SSL requires these for encryption and identification

Username and passwords
Mutual authentication
Time stamps
Certificates

A

Certifícates

674
Q

Encryption algorithms to prevent cyber attacks from read packet contents

Availability
Accounting
Integrity
Confidentiality

A

Confidentiality

675
Q

Using hashing algorithms to ensure packets were not altered in delivery

Encryption
Integrity
Confidentiality
SSL

A

Integrity

676
Q

Uses this to authenticate source and destination

802.1x
Pnac
Radius
IKE

A

IKE

677
Q

Ñame 2 VPN benefits

A

-cost savings
-compatibility
-Security
-Scalability

678
Q

Z wave and Zigbee both are wireless mesh networks for communication with smart devices. What is the difference?

A

Z Wave is simpler and cheaper

679
Q

Devices, gateway, data storage and remote control are 4 primary IoT technologies

A

True

680
Q

Ad hoc is used to establish temporary connectivity such as to copy data from one system to another

A

True

681
Q

Wireless networks operate in full duplex

A

False, half duplex

682
Q

5ghz is a longer frequency that can travel through physical barriers like walls and floors

A

False. 2.4
5ghz is faster, but more prone to interference

683
Q

Encodes data over a wireless network using non overlapping channels

OFDM
Mimo
T1WAN
Mu mimo

A

OFDM

684
Q

Time it takes for a wireless client to find a wireless access point

Beacon interval
Time drift
Connection speed
Stratum

A

Beacon interval, also announces SSID, support speeds and signaling method

685
Q

If you can’t ping systems on different segments you should use this device

Bridge
Router
Switch
Nic

A

Network bridge

686
Q

How would you connect to a wireless access point if ssid broadcast is disabled?

A

Manually configure a profile on the wireless client

687
Q

Use this at different times of the day to check channel utilization and identify sources of RF interference at each location you deploy an access point

Spectrum analyzer
Wireless inspection
Vulnerability scanner
Beacon interval

A

a spectrum analyzer

688
Q

9 decibels is a high gain antenna

A

False, 2-9 is normal
12 or higher is high gain

689
Q

Known for home security and act as a repeater with low data transfer

A

Z wave

690
Q

Compares WiFi signal yo level of background radio signals

Wireless inspection
Sight survey
Heat map
Signal to noise ratio

A

Signal to noise ratio

691
Q

SNR higher than 1:1

A

More signal than noise

692
Q

Pushes a common configuration out to all the access points in a large enterprise. Typically hub and spoke

Broadcast
Wireless controller
Ip helper
Multicast

A

Wireless controller

693
Q

These access points contain very little intelligence and need a wireless controller to manage them

Unmanaged switch
LWAP
Managed switch
Layer 3 switch

A

Light weight access points (LWAP)

694
Q

How would you get rid of a bottle neck in a wireless controller?

Load balancer
ACL
Proxy server
Distributed wireless mesh

A

Use a distributed wireless mesh

695
Q

What would you need for 2 buildings to be able to use a wireless bridge to connect them?

A

Directional antenna facing each other

696
Q

Connects wireless network to internal wired network

Bridge
Wireless controller
Content switch
Router

A

Wireless controller

697
Q

Need these 3 to be the same to enable roaming in a wireless network

A

SSID
Channel
IP Subnet

698
Q

WAP and NAT router create what?

Wireless router
SSID broadcast consumer
Grade Layer 3 switch
Consumer grade access point

A

Consumer grade access point

699
Q

Roaming uses multicast for the same SSID across multiple AP’s

A

False, broadcast

700
Q

Wireless controller can provide DHCP, work as a router and connect wireless network to wired network

A

True

701
Q

Cisco wireless equipment to route frames back and forth between the wireless network and wired lan

Wireless controller
Light weight access point
Bridge
Content switch

A

LWAPP

702
Q

Auto partitions a single broadcast domain into multiple VLAN’s

Trunking
Trunk port
Default vlan
Vlan pooling

A

Vlan pooling

703
Q

Proving your identity

A

Authentication

704
Q

Open authentication would include Mac filtering and an active portal

A

True

705
Q

Wireless signals extending beyond the intended area of coverage

Channel overlap
Data emanation
Attenuation
RFI

A

Data emanation, do not place AP’s near walls and encrypt all traffic

706
Q

Attacker gains unauthorized access to an existing Bluetooth connection between phones, desktops or laptops

A

Bluesnarfing

707
Q

Anonymously sending messages to a blue tooth recipient with a distance of 10-100 meters

Bluetipping
Bluejacking
Bluesnarfing
Bluemessaging

A

Bluejacking

708
Q

For 802.1x authentication where would you configure the password?

A

On a radius server

709
Q

What provide the most interference for wireless access points

A

Cordless phones
Backup generators

710
Q

You would use this in an environment where there is no clear line of sight between clients and access points and radio signals are reflected along multiple paths before being received

Antenna diversity
Cladding
Mimo
OFDMA

A

Antenna diversity,
Improves quality and reliability of a wireless link

711
Q

Place access points on the highest floor to avoid interference

A

True

712
Q

Uniquely identifies the Wap

A

Ssid

713
Q

Cable that extends from central office to the customer location. Owned and maintained by the service provider

Smartjack
Local loop
Demarc extension
Pstn

A

Local loop

714
Q

Wan technology that provides increase bandwidth within the local loop

MGRE
ISDN
Multiplexing
BiDi

A

ISDN

715
Q

2 forms of ISDN?

A

Basic rate interface (BRI)- digital signal over POTS
Primary rate interface (PRI) - uses digital signals either T1 or E1

716
Q

Wan data classification and data carrying mechanism. Packet switching technology that supports variable length frames

SDN
Frame relay
Mpls
MGRE

A

Mpls

717
Q

Collection of devices and structure that connect 2 distant locations which is managed by the service provider

Cloud
Wan
Vpn
Demarc

A

Cloud or wan

718
Q

Difference between circuit and packet switching?

A

Packet can take different routes to reach destination

719
Q

Metro Ethernet configuration

Star
Mesh
Ring
Bus

A

Star or mesh topology, collection of routers and switches connected by fiber to create a metro area network

720
Q

T1 runs at 64kbps and has 672 channels

A

False, T3
T1 is 24 channels and runs at 64kbps

721
Q

DSU reads and writes synchronous digital signals

A

True,
csu manages the digital channel
DSU reads and writes synchronous digital signals

722
Q

E1 is 32 channels at 64kbps

A

True

723
Q

OC1 is 51.84 and OC3 is 622.08

A

False, OC 12 is 622.08
OC3 is 155.52

724
Q

What kind of switching is often used in telephone networks?

Distributed
Packet
Circuit
Public

A

Distributed switching

725
Q

Coarse wavelength division multiplexing can carry 40-80 different signals

A

False, dense wavelength multiplexing
CWDM is 16 signals

726
Q

BRI is 2 B channels at 64kbps and one d channel at 16 kbps

A

True, pri uses 23 B channels and and 1 Channel at 64kbps

727
Q

Which single form of internet connectivity provides the greatest potential connectivity wherever you travel?

PSTN
WLAN
WAN
Open

A

PSTN

728
Q

T1 uses 2 pairs of copper and transfers data at 64kbps

A

True

729
Q

Available regardless of whether telephone company network is available

Cable modem
Out of band management
RDP
Nic

A

Cable modem

730
Q

First internet compatible technology and offers speed of 400 to 1,000kbps

A

Edge cellular technology

731
Q

GSM uses this to allow multiple connections on the same frequency?

Time division multiple access
OFDMA
Multiplexing
Mu mimo

A

Time division multiple access

732
Q

Cellular network type that uses mimo to increase 3G data throughput

A

LTE and hspa+

733
Q

Existing needs are minimal which internet connectivity would you use?

A

Pstn

734
Q

Process of identifying resources that a user can access over the remote access connections

RDP
Client-server
Authorization
Accounting

A

Authorization

735
Q

Activity that tracks or logs the use of the remote access connection

Snmp
Netflow
SFlow
Accounting

A

Accounting

736
Q

Connection requests from remote clients are sent to what server to be approved or denied?

Radius
TACACS
AAA
Vpn concentrator

A

AAA server (authen, authorize, accounting)

737
Q

Password authentication protocol
2 way handshake with a username and password in clear text, not secure

A

PAP

738
Q

What is CHAP?

A

Challenge Handshake Authentication Protocol
3 way handshake and not sent in clear text like pap

739
Q

Radius encrypts the entire communication session between the remote servers and radius server

A

False, TACACS +

740
Q

Eap negotiates authentication through tickets

A

True, also password, smart cards and more methods

741
Q

Ñame 2 protocols used for a AAA remote access

A

Radius and TACACS+

742
Q

Splits each AAA into a separate server

A

TACACS +

743
Q

What would you use to connect to a server at a remote location?

Vpn
Remote access
TKIP
Client

A

Remote access

744
Q

Port 49

A

TACACS +

745
Q

Port 1812 and 1813

A

Radius

746
Q

Provides privacy and data integrity between 2 communication applications

TLS
IPSec
SSL
PPTP

A

TLS

747
Q

3 types of vpn protocols

A

Carrier protocol (IP)
Tunneling protocol (L2TP)
Passenger Protocol (data being transmitted)

748
Q

3 things IPsec encryption combined with L2TP (Layer2 Tunneling Protocol) provides

A

Per packet data origin authen (non repudiation)
Replay protection
Data confidentiality

749
Q

Intermediary devices (routers) can examine packet headers in transport mode

A

True

750
Q

In a vpn only this can unwrap packets and. Decrypt the packet contents

Source destination tunnel point
Radius server
Destination tunnel endpoint
NGFW

A

Destination tunnel endpoint

751
Q

IPSec cannot be used with NAT

A

True

752
Q

What 2 vpn protocols merged to create L2TP?

A

Layer 2 forwarding and PPTP

753
Q

Vpn concentrator controls access to private network through multiple servers

A

False, single server
Radius is multiple

754
Q

routes layer 3 protocols across an ip network

GRE
IPSec
T1
Frame relay

A

GRE

755
Q

Uses port 443 and encrypts entire communication session

A

Ssl vpn

756
Q

A healthy cpu utilization range should be what percent?

41-80%
8-40%
50-75%
75-90%

A

8-40%

757
Q

When a new app is launched, it is normal for utilization to spike up to 85-90%

A

True

758
Q

Term for when a system is unable to keep up with demands placed on it

Latency
Jitter
Bottleneck
Hard fault

A

Bottleneck, happen in systems
The other 3 happen in devices and the network, not in a system

759
Q

Speed at which packets travel from source to destination and back

Iperf
Speed test
Latency
Packet switched

A

Latency

760
Q

If the hard disk light on the front of the system stays lit what does it mean?

STP
Working as usual
Bad NIC
Needs more RAM

A

Computer is constantly working to move data into and out of memory. Needs more physical ram

761
Q

Resource monitor will show memory utilization

A

True

762
Q

If a computer is restarting crashing constantly it means what?

A

Overheated

763
Q

Where do you check your CPU’s temperature?

NIC
Internal hardware
Bios
Database

A

Bios

764
Q

Defines and organizes the parameters that snmp agents will monitor on respective devices (router, server, firewall etc)

Walk
MIB
Oid
Get

A

MIB

765
Q

An agent sending to the manager to confirm receipt of a transmission for snmp

Get
Walk
Trap
Inform

A

Inform

766
Q

Snmp uses this to identify a group of devices under the same administrative control

A

Community strings

767
Q

In snmp when an event occurs the agent logs details regarding the event is called what?

A

Trap

768
Q

In snmp this component uses getnexr messages to navigate the MIB structure

A

Walk

769
Q

*Aug 8 11:18:12.081: %LINEPROTO-5-UPDOWN: Line protocol on Interfaxe FastEthernet0/0 changed state to down

A

Default log message
-Time Stamp- *Aug 8 11:18:12.081:
-Facility (created message)- %LINEPROTO
-severity level- -5-
-mnemonic- UPDOWN
-message text- Line protocol on Interfaxe FastEthernet0/0 changed state to down

770
Q

This log shows access, events, crashes, updates and anything else valuable for conducting a root analysis

A

Application log

771
Q

Log that records information related to logins, incorrect passwords and user rights

A

Security log

772
Q

Where can you view if you have a bad video driver if it gives you issues

Network interface
Dump files
Ipconfig
Netstat

A

Dump files

773
Q

Level 7 is the most severe level in logging

A

False, 0 is an emergency that can severely impact the system
7 is debugging

774
Q

You think an attacker is on the web server and can make modifications to the system and logs. What should you do?

A

Use Syslog to send logs to another server

775
Q

You want to look at a log of when some restarts occurred.

Application
History
System
Security

A

System log, shows os and hardware events, new hardware or when system started or shut down

776
Q

Shows when a user logged onto your site, tedious to go through

Web server log
Application log
Security log
History log

A

Web server log

777
Q

In this the Nic receives only packets that are addressed to its MAC address

Switch
Promiscuous mode
Stealth scan
Non promiscuous mode

A

non promiscuous mode
Promiscuous is the Nic receives all packets on the same network segment

778
Q

Determine which os is running based on how a system responds to different types of network traffic

Protocol analyzer
Packet capture
Fingerprinting
Packet sniffer

A

Fingerprinting

779
Q

Connecting to a switch and overloading it with fake Mac addresses to have it work as a hub to send out all traffic to each device

MAC flooding
MAC spoofing
Vlan flooding
Vlan spoofing

A

Mac flooding

780
Q

Passive device that copies frames and allows you to view frame contents but does not allow you to capture, modify and retransmit frames

Taps
Port mirror
Protocol analyzer
Packet sniffer

A

Protocol analyzer

781
Q

Low humidity results in

EMI
Electrostatic charge
Short
Open

A

Electrostatic charge

782
Q

Bringing cold air in the front and ducting heat in the back. Ñame for where heat is sent

Hot aisle
Cold aisle
Health check
Temperature check

A

Hot aisle

783
Q

When you use packet sniffing software you see frames addressed to workstations but not to a router. What switch feature should you configure?

A

Port mirroring, all frames are sent to all other switch ports instead of just the one it is on

784
Q

Electrical equipment fire, use this

Extinguisher
Fire blanket
Halon
CO2

A

Halon or CO2

785
Q

Metal fires use dry powder to suppress

A

True

786
Q

For combustible liquids(oil, alcohol) use water or soda acid

A

False, CO2 or FM200
Combustible, wood, cloth etc use water or soda acid

787
Q

Primary focus of scope for BCP

Human life
Business processes
Recovery time objective
Company assets

A

Business processes

788
Q

An agreement that outlines the organization’s monitoring activities

EMA
SLA
MOU
COOP

A

Employee monitoring agreement

789
Q

You want to make sure the correct ports on a firewall are open and closed. Which document should you look at?

Baseline configuration
Wiring schematic
Wireless site survey
IDF

A

Baseline configuration

790
Q

Shows layout of electrical, hvac, plumbing and networking wiring

Wiring diagram
Rack diagram
Floor plan
Network diagram

A

Floor plan

791
Q

Ability to respond to an unexpected hardware or software failure without loss of data or loss of operation

Coop
Fault tolerance
Redundancy
UPS

A

Fault tolerance

792
Q

What is the SPOF with a cluster of 2 servers with a single shared storage device and each has a single connection to the shared storage and a single connection to the ISP?

A

The ISP, provide redundancy by connecting one server to a different ISP

793
Q

Converts DC power stored in the batteries into ac power that can be used for the data center

A

Inverter

794
Q

What is the least effective power loss protection for a computer system?

Surge protector
UPS
2nd power source
Back up generator

A

Surge protector

795
Q

You should not run a cable across the data center floor

A

True

796
Q

Increases network performance and provides a failover solution for network adapters

A

Ethernet bonding

797
Q

Ethernet bonding increases speed

A

False

798
Q

Clusters are identified by an ip address. This is where client requests are directed to

A

True

799
Q

This allows you to use a secondary router to serve as an alternate

Redundancy
VRRP
FHRP
Faul tolerance

A

FHRP

800
Q

Backs up everything since the last full back up

A

Incremental

801
Q

Looks for files that have been modified since the last full backup. Backs up everything since last full backup

A

Differential back up, does not back up everything since the last differential backup

802
Q

NAS is typically used in large companies for storage

A

False, SAN

803
Q

Incremental backup has a shorter restoration time but may consume more disk space from file changes

A

False, differential

804
Q

Backs up files that have archive but set and does not mark them

A

Differential

805
Q

Backs up only files that have archive bit set but marks them as being backed up

A

Incremental

806
Q

Full back up every night, Wednesday morning the storage system fails. How many restore operations do you need to recover all data

A

One, just restore the last full back up of wednesday

807
Q

Fastest restoration of all data if a system failure occurred on a Friday

-Restore the full backup from Sunday and all incremental backups
-Restore the full backup from Sunday and the last incremental backups
-Restore the full backup from Sunday and all differential backups
-Restore the full backup from Sunday and the last differential backups

A

-Restore the full backup from Sunday and the last differential backups

808
Q

Full back up every Sunday and differential Monday through Saturday
System fails Wednesday morning. How many restore operations to recover?

A

2
Restore full back up Sunday
Restore differential from Tuesday

809
Q

Full backup Sunday night
Incremental Monday through Sunday
Thursday morning the storage fails. How many restore operations?

A

4
Restore full from Sunday
Restore incremental M-W

810
Q

This backup includes system volume, OS, installed programs, drivers and user data file

Full
System image backup
Differential
Incremental

A

System image backup

811
Q

Translates between the external network and internal network, placed inside a screened subnet

Dmz
Web server
Remote Desktop gateway
NAT

A

Remote Desktop gateway

812
Q

RD gateway encrypts RDP using TLS

A

False, SSL

813
Q

Identifies the internal resources that users can access

Fingerprinting
Sniffing
RD RAP
RDP access

A

RD RAP (resource authorization policy)

814
Q

Citrix RDP

A

ICA

815
Q

Set of rules and practices that protect the data and resources from unauthorized access

Policies
Firewall
Vpn
Confidentiality

A

Confidentiality

816
Q

SFTP uses SSL to be secure

A

False, SSH
FTPS uses SSL

817
Q

Secure form of SLIP

A

PPP, uses PAP or CHAP for authentication and encryption to create a connection between 2 devices

818
Q

Most common insider attacker

Spoofing
Man in the middle
Unintentional threat actor
Arp poisoning

A

Unintentional threat actor

819
Q

Which is an internal threat?

-Delivery man is able to walk into a controlled area
-user accidentally deleted the new product design
-server back door allows an attacker to gain access

A

-user accidentally deleted the new product design

820
Q

A honeypot reveals information about an attackers methods and gathers evidence for identification or prosecution purposes

A

True

821
Q

No prior knowledge to the infrastructure they are testing

A

Black box testing

822
Q

Grey box testing is when the person has full disclosure of information to mimic an internal attack

A

False, white box
Grey is some information

823
Q

an attacker trying to figure out an OS or applications

A

finger printing/footprinting?

824
Q

Seems to identify costs that cannot be concretely defined for analysis

Cost ratio
Forensic analysis
Quantitative
Qualitative

A

Qualitative

825
Q

Performed in the security perimeter and what is performed outside of the perimeter?

Vulnerability scanner
Ingress
Penetration testing
Egress

A

Vulnerability scanner, penetration testing

826
Q

Thorough systematic discovery of as much corporate network as possible. Examples are war driving, social engineering and fire walking

Ip spoofing
Network enumeration
Network mapping
Whaling

A

Network enumeration/mapping

827
Q

Single blind test is when tester has no prior knowledge and admin has no idea a test is being done

A

False, double
Single is one of them does know

828
Q

Gathers all event logs from devices and sends securely to the SIEM

Trap
Get
Collector
Walk

A

collectors
Data handling receives data from the collector, analyzes and puts it into categories

829
Q

Finds potentially vulnerability and attempts to exploit it

Intrusive scan
Threat
Vulnerability
Weakness

A

Intrusive scan

830
Q

Looks for vulnerability and gives you a report on what it finds

Pen test
Stealth scan
Non intrusive scan
SFlow

A

Non intrusive scan

831
Q

Not authenticating to a system before you scan the system

Open
Non credentialed
Credentialed
TACACS+

A

Non credentialed

832
Q

sees what services are running on a set of servers on your network

Netstat
Vulnerability scanner
Protocol analyzer
Ipconfig

A

vulnerability scanner

833
Q

How do network mappers discover devices?

Open ports
Open ip address
Ping scan
OS scan

A

Using a ping scan, can make geographical representation

834
Q

Gathers information on which applications and services are running. Identify open firewall ports, missing patches and default or blank passwords

A

Vulnerability scanner

835
Q

CCTV type used in area with little light

A

Infrared

836
Q

Measure of sensitivity to light

Light meter
Lux
Fiber optic
OTDR

A

LUX

837
Q

Tailgating is following someone with their consent into a building

A

False, piggybacking

838
Q

Trojan horse

A

System that looks safe but has a virus inside it

839
Q

Set of programs that allow attackers to maintain permanent and hidden admin level access to a computer

A

Rootkit

840
Q

Spoofs the source address in ICMP packets.

A

Smurf attack

841
Q

Exploits the 3 way handshake

WPA2
SYN Flood
Dragon Fly
Multicast flooding

A

Syn flood

842
Q

Attacker steals an open communication session from a user

A

Session hijacking

843
Q

Attacker uses a protocol analyzer or sniffer to capture authentication info from client to server is what kind of attack?

Man in the middle
Dns poisoning
Replay attack
Arp poisoning

A

Replay attack

844
Q

Malware software

A

Designed to take over or damage a computer

845
Q

Table of passwords and generated hashes

A

Rainbow table attack

846
Q

Random characters added at beginning or end of password

Encryption
TKIP
Cipher
Salting

A

Salting the hash

847
Q

Difference between a worm and virus?

A

Worm can replicate itself, virus requires a host for distribution

848
Q

Source ip address of a packet is changed

A

IP spoofing

849
Q

DNS poisoning steps

A
  1. Request DNS info in addition to ip address. Server provides 50 times more information
  2. Spoof their own ip address to be that of the target machine
  3. Repeat steps 1 and 2 to overwhelm the dns server (DOS)
850
Q

MAC spoofing changes the MAC address associated with an ip address

A

False, arp spoofing
MAC spoofing is spoofs the MAC address of a valid host in MAC address table of switch

851
Q

Examines packets incoming to the network and the opposite examines packets going outward

A

Ingress and egress

852
Q

Router on the border of your network detects a packet with a source address from an internal client but the packet was received on the internet facing interface. What is happening?

A

Spoofing is in place

853
Q

Act of spying on private information or communication. Sniffing is an example

Confidentiality
Encryption
Snooping
Stealth inspection

A

Snooping

854
Q

Bypasses acl’s on several routers by bypassing a computer on a network or allowing a pc to impersonate another device

A

MAC spoofing

855
Q

Linking MAC address with ip address of legitimate computer on server or network

A

Arp poisoning

856
Q

Most effective protection against ip packet spoofing on a private network

Encryption
Honeypot
Hashing
Ingress/egress filters

A

Ingress and egress filters

857
Q

A switch shutting down when max amount of mac addresses is reached is counter measures against what?

Sniffing
Penetration test
Threat
Max spoofing

A

Sniffing

858
Q

Reviews messages that are delivered to the device and determines whether they are coming from authorized devices

Router advertisement guard
HIDS
Nids
Packet capture

A

Router advertisement guard

859
Q

Switch ports connected to hosts (servers, workstations, and printers) are configured to be untrusted

A

True,
Switch ports configured to network other switches are trusted

860
Q

Disable unused protocols, services, and ports to harden this

A

Router

861
Q

Install only required software hardens what?

Router
Workstation
Switch
Server

A

Server

862
Q

If a device doesn’t have the latest OS patch, it will go to this special server

San
Web
Quarantine
Remediation

A

Remediation server

863
Q

Best practice for hardening a server is to apply latest patch, disable unnecessary software, ensure a host based firewall is running

A

True

864
Q

Use each below to harden a user account:

Multi factor authentication
Account lockout threshold
Time of day restrictions
Auto account expiration

A

True

865
Q

A false positive is when a person. Who should be allowed access is denied access

A

False, false negative
Reverse

866
Q

Strong authentication using a secret crypto key. Can provide identification across insecure connection

Kerberos
AES
CHAP
TLS

A

Kerberos

867
Q

Authentication Verifies user

A

False, Identification
Authentication verifies I’d credentials

868
Q

Provides authentication to a WLAN and uses a public key over TLS

CHAP
EAP
PAP
PEAP

A

PEAP

869
Q

Authentication used for remote access connections

Kerberos
Radius
CHAP
TACACS+

A

CHAP or MS-CHAP

870
Q

Used to authenticate users within a LAN with usernames and passwords

Radius
802.1x
Kerberos
PPTP

A

Kerberos

871
Q

Authentication for wireless devices

Radius
TACACS+
802.1x
Kerberos

A

802.1x and for ports

872
Q

Identifies how credentials are submitted, protected during transmission, and validated.

Authentication
Confidentiality
Accounting
Authorization

A

Authentication protocol:

passwords, certificates and digital certificates for identity

873
Q

Digital document that identifies a user or a computer. Includes subject name that is the name of the user

Digital signature
CA
SSL
Certificate

A

Certificate

874
Q

a collection of hardware, software, policies, and organizations that create, issue, and manage digital certificates.

OSI
PKI
Floor plan
Network map

A

A public key infrastructure (PKI) made up of CA’s

875
Q

You can obtain certificates from a public CA such as DigiCert or install your own PKI and CAs to issue certificates to users and computers in your organization.

A

True

876
Q

Computers accept as valid any certificate issued by a trusted CA. By default, most computers trust well-known public CAs

A

True

877
Q

Accepts certificate requests.
Verifies the information provided by the requester.
Creates and issues the certificate to the requester.
Revokes certificates, which invalidates them.
Publishes a list of revoked certificates known as the certificate revocation list (CRL

A

CA

878
Q

digital document that is altered in such a way that it could have come only from the subject identified in the certificate.

CA
Integrity
Digital Signature
CHAP

A

Digital signature

879
Q

The server generates a challenge message and sends it to the client.
The client responds with the username and a value created using a one-way hash function on the challenge message.
The server checks the response against its own value that was created using the same hash. If the values match, the client is authenticated. Is steps for what?

A

CHAP Steps

880
Q

Voice recognition is an example of something you do

A

False, something you are
Typing behavior is something you do

881
Q

This authentication controls access through switches and access points

A

802.1x

882
Q

Provides support for smart card authentication

Something you have
Ssl
Multi factor
Eap

A

EAP

883
Q

Ms chap and chap both use 3 way handshake to authenticate

A

True, MS only uses mutual authentication though

884
Q

You want to make sure that all users have passwords over eight characters in length and that passwords must be changed every 30 days. Where would you configure this?

Ethernet settings
Password hardening
Group policy
SSH

A

Configure account policies in Group Policy

885
Q

You have just configured the password policy and set the minimum password age to 10.
What is the effect of this configuration?

A

User can’t change password for 10 days

886
Q

Upon running a security audit in your organization, you discover that several sales employees are using the same domain user account to log in and update the company’s customer database. What actions should you take?

A

-Delete that sales account
-Train them to use their own user accounts

Reasoning:
You should prohibit the use of shared user accounts. Allowing multiple users to share an account increases the likelihood of the account being compromised. Because the account is shared, users tend to take security for the account less seriously.

887
Q

Manages deployments of updates to system and how aggressively work stations will ge updated

Servicing channels
CSU
DSU
Rings

A

Servicing channels and rings

888
Q

How long can windows 10 pause updates?

A

7 days

889
Q

-Windows Update for Business works with all versions of Windows 10 except Windows 10 Home.
-Windows Update for Business provides the latest features for your Windows 10 devices, including security upgrades.

A

True

890
Q

provides you with Windows and Store app updates and other Microsoft products.

A

Windows Update Delivery Optimization function

891
Q

A log or record of all notable changes made to a Windows system.

A

WindowsUpdate.log

892
Q

Layer 3 protocol used to classify IP packets In the IP header that Inserts a code value in this field to prioritize data flow. Routers forward packets according to this field

Diffserv
COS
QOS
Tcp flags

A

Diffserv,

893
Q

Restricts the amount of data type that can be sent during a specific time frame

Bandwidth throttling
Port isolation
Switch
Firewall

A

Bandwidth throttling

894
Q

What would you use to improve the speed of file transfers?

San
Trunking
Fibre Channel
Port aggregating

A

Port aggregation

895
Q

How many collision domains with 2 computers and a router connected to a switch, but also connected to that router is a hub with 2 computers connected to it?

A

2, both computers and the router to the switch and then the hub with its 2 computers. Router is not in a collision domain

896
Q

Individual frames marked and classified at layer 2 with a priority value between 0-7 with each number indicating a traffic type

TCP Flags
COS
QOS
Severity

A

Class of Service (COS)

897
Q

use specialized hardware called an application-specific integrated circuit (ASIC), which performs switching functions in hardware rather than using the CPU and software.

A

Switches

898
Q

You would like to implement a device to speed up access to your web content. The device should be able to distribute requests between the various web servers using specialized hardware, not just software configurations. In addition, SSL sessions should use the hardware components in the device to create the sessions.

Proxy server
Content switch
Vpn concentrator
Radius server

A

Content switch,
Use a content switch to perform these functions. Switches use specialized hardware modules to perform common tasks. For example, you can have a switch with a special hardware module that’s used for SSL connections. Using the hardware module in a specialized switch is faster than using the CPU or software in another device.

899
Q

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?

Multilayer
Content
Distribution
Layer 3

A

A multilayer switch,

uses specialized hardware called an application-specific integrated circuit (ASIC) to perform switching functions in hardware rather than using the CPU and software. ASIC allows switches to perform the switching function at wire speed.

900
Q

0 - Background
1 - Best effort
2 - Excellent effort
3 - Critical applications
4 - Video (< 100ms latency)
5 - Voice (< 10ms latency)
6 - Internetwork control
7 - Network control

A

True

901
Q

Command that Tells you if your serial interface is up or down

A

Show interface

902
Q

Use this to check the right FQDN is with the correct ip address

A

Nslookup

903
Q

How would you check a vlan setting?

SSH
Packet capture
Port isolation
Trunking

A

Using ssh

904
Q

A user can’t connect to a server, you find no other user can. What do you do next? According to trouble shoot methodology

A

Determine what has changed

905
Q

A user can’t connect to a website, you reproduce the problem, what should you do next according to troubleshooting methodology?

A

Identify the affected areas of the network

906
Q

Displays network connections for TCP

A

Netstat

907
Q

can detect all the channels that are broadcasting in the area and see all the overlaps in your Wireless network. This can give you an idea on how to set up the channels and reduce the interference between access points. There are free versions that are easy to download.

Ofdma
Mimo
SONET
WiFi analyzer

A

Wifi analyzer

908
Q

A cross platform tool that measures speeds across a network over multiple connections. It is an in-depth monitoring tool that looks at timing, buffers, and protocols that deal with TCP, UDP, SCTP with IPv4 and IPv6. also help balance congestion on a busy network. It can remain in the background on a server to monitor the throughput between devices.

A

Iperf

909
Q

A cross platform tool that measures speeds across a network over multiple connections. It is an in-depth monitoring tool that looks at timing, buffers, and protocols that deal with TCP, UDP, SCTP with IPv4 and IPv6.

Port scanner
Iperf
Speed test
Protocol analyzer

A

Port scanner

Use a port scanner to check for open ports on a system or firewall. Compare the list of opened ports with the list of ports allowed by your network design and security policy. Typically, a port is opened when a service starts or is configured on a device. Open ports for unused services expose the server to attacks directed towards that port.

910
Q

You are traveling throughout North America to many metropolitan and rural areas.
Which single form of internet connectivity provides the greatest potential connectivity wherever you travel?

A

Pstn

911
Q

Broadband cable is dependent on service offerings from the regional cable television company, which does not have as great a presence as the telephone company. To use broadband cable, the service must be added to the cable TV package.

A

True

912
Q

Topology where messages travel from one device until they reach the destination device

A

Logical ring

913
Q

Topology with messages broadcast to all devices on the network

A

Physical bus

914
Q

Provides the os a link to the device driver

A

Llc

915
Q

Translates generic network requests into device specific terms

MGRE
Port aggregate
MAC sublayer
Snmp walk

A

MAC sublayer

916
Q

ISCSI and fibre channel SAN’s are not directly connected to a switch.

A

True
Use (San fabric) Have a special switch that clients don’t connect to

917
Q

You are the network administrator for a large hospital. One of your users, Suzie, calls you stating that she is unable to access any network resources. After some initial troubleshooting, you realize that her computer is using the IP address 169.254.0.52.
You’ve confirmed that the network’s physical connection is connected properly. Which of the following should you do next?

A

Renew the ip address

918
Q

TLS Handshake- connection security with encryption

A

False
TLS Record- connection security with encryption
TLS Handshake- provides mutual authentication and choice of encryption

919
Q

Which of the following allows incoming traffic addressed to a specific port to move through the firewall and be transparently forwarded to a specific host on the private network

A

DNAT (port forwarding)

920
Q

IKE uses which of the following functions to negotiate a Security Association (SA

A

Internet Security Association Key Management Protocol (ISAKMP) establishes a framework for the negotiation.
The Diffie-Hellman key exchange generates symmetric keys used for the encryption of the negotiation of the SA

921
Q

Which of the following WAN technologies provides packet switching over high-quality digital lines at speeds greater than 1.544 Mbps?

Pstn
Frame relay
SONET
MAN

A

Frame relay,
networks are packet-switched networks that operate at T1 or T3 speeds. Frame relay achieves faster speeds by using high-quality digital lines, which require less extensive error control than X.25 networks.

922
Q

Which ip address do broadcast messages use?

Last valid
Loopback
Ping
First valid

A

The last valid ip address
First is the network id

923
Q

Virtual NIC’s need appropriate driver and multiple virtual NIC’s can be added to a virtual machine

A

True,
They have MAC addresses also

924
Q

updates filters to block suspicious traffic and performs reverse lookups to identify an intruder

Network based firewall
IDS
Host based firewall
IPS

A

IDS

925
Q

Comparisons to known attack patterns

Anomaly based attack
Signature based attack
Rainbow table
IDS signature

A

IDS signature

926
Q

2 extensions that use MIMO to increase bandwidth

A

LTE and HSPA +

927
Q

Intermediary network between 2G and 3 G

A

Edge

928
Q

4G that delivers high speed internet to large geographic areas

A

WIMAX

929
Q

3G tech that adds additional traffic channels to increase bandwidth

A

CDMA2000

930
Q

Cisco wireless equipment to route frames back and forth between the wireless network and wired LAN

Wireless LAN controller
Light weight access point
Bridge
Beacon interval

A

LWAPP

931
Q

Which of the following routing protocols divides the network into areas with all networks required to have an area 0 (to identify the backbone area)?

A

OSPF
Each autonomous system requires an area 0 that identifies the network backbone. All areas are connected to area 0, either directly or indirectly through another area. Routes between areas must pass through area 0.

932
Q

IDS that alerts trespassers

HIDS
PIDS
Nids
IPS

A

PIDS

933
Q

Which of the following cellular network types provided digital data service, such as text messaging, but did not offer internet

A

2G

934
Q

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned about attacks that have not yet been identified or that do not have prescribed protections. What are these?

A

Anomaly based IPS

935
Q

Unmanaged switches have advanced management and security features

A

False, managed

936
Q

When configuring VLANs on a switch, which type of switch ports are members of all VLANs defined on the switch?

Native vlan
Default vlan
Trunk port
Trunking

A

Trunk port

937
Q

2 switch features used with voip

A

PoE
VLAN

938
Q

Port A and Port B have auto-negotiation enabled. Port A has a speed capacity of 100 Mbps, and Port B has a speed capacity of 1,000 Mbps. At which speed will the ports communicate?

A

100 mbps
When enabled, auto-negotiation selects the highest speed at which both ports are capable. Because Port A has a capacity of 100 Mbps, auto-negotiation will choose 100 Mbps for both ports.

939
Q

Configures how a MAC address table is filled

IPAM
Switch
Port security
Vlan

A

Port security, protects switch from flooding

940
Q

Message encryption and used agents and manager authentication

SNMPv3
AES
CHAP
PAP

A

SNMPv3

941
Q

Humidity in server room is at 60% and temp is 80 degrees. How can you reduce?

A

Add separate A/C unit in the server room

942
Q

By default, a NIC only accepts frames addressed to itself. To enable the packet sniffer to capture frames sent to other devices, configure the NIC in promiscuous mode (sometimes called p-mode). In p-mode, the NIC processes every frame it sees.

A

True

943
Q

Counteract email spoofing with this

A

X headers

944
Q

Identifies devices under the same administrative control

A

Community string

945
Q

This OS system does not use Syslog

A

Windows

946
Q

You have a website that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before performance is negatively impacted

Utilization
RAM
Storage
Load tester

A

Load tester

947
Q

L2TP came from what 2 protocols

A

Layer 2 forwarding and PPTP

948
Q

Hides in a harmless looking software but has a hidden program with admin access to os systems

A

Rootkit,
Trojan horse is a type

949
Q

Where to place ACL’s

A

As close to the destination as possible

950
Q

The lower the number the more light you need for a clear image in lux

A

False, lower number lux the less light is needed for a clear image

951
Q

What Firewall operates at network and transport layers. Filters by both ip address and port number

A

Stateful inspection firewall

952
Q

What firewall protects your laptop from internet based attacks?

A

Host based firewall,

inspects traffic received by a host. Use a host-based firewall to protect your computer from attacks when there is no network-based firewall, such as when you connect to the internet from a public location

953
Q

Firewall that protects your data from internal attacks

A

Network based, place on edge of private network

954
Q

You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services

Dhcp
Port forwarding
ARP Inspection
Port Scanner

A

Port scanner

955
Q

Which of the following components do switches use to optimize network performance by performing switching operations in hardware rather than using the CPU and software?

A

ASIC

956
Q

Netstat-n shows active UDP connections

A

False, TCP
A will show both

957
Q

Locates network cables

A

Tone generator

958
Q

This routing happens when a packet travels on a different outbound path than it travels on the inbound path.

A

Asymmetrical

959
Q

Your computer is sharing information with a remote computer using the TCP/IP protocol. Suddenly, the connection stops working and appears to hang. Which command can you use to check the connection?

A

Netstat

960
Q

You manage a network that uses 1000BaseT Ethernet. You find that one device communicates on the network at only 100 Mbps.Which tool should you use to test the drop cable and connection to the network?

A

A cable certifier
verifies or validates that a cable or an installation meets the requirements for a specific architectural implementation. a specific drop cable meets the specifications for 1000BaseT networking.

961
Q

Can block and detect malicious payloads

Network based firewall
Host based firewall
IPS
HIDS

A

IPS

962
Q

Packet filtering firewalls filter by inspecting contents of network packets

A

False, only by IP address, port and protocol

963
Q

Switches running STP are in the process of exchanging BPDUs and redefining their roles. Which port state are the switches currently in?

A

Listening

964
Q

Vpn that employs IPSec as it’s data encryption

Radius
L2TP
PPTP
Ppp

A

L2TP
Dial up vpn connections

Ppp or pptp use chap or pap for encryption

965
Q

NIDS analyze encrypted traffic

A

False, HIDS monitors traffic coming into host
NIDS analyzes just network traffic

966
Q

What command line would you find all ip address for professormesser.com?

A

Dig or Nslookup

967
Q

Must be an ip address on the local subnet

A

Gateway
(Default gateway 192.168.1.1)

968
Q

Routing protocol thst routers use to learn and share routes

Convergence
BGP
Eigrp
OSPF

A

BGP

969
Q

Each vlan is it’s own broadcast domain

A

True

970
Q

Minimum frame size and the name of a frame lower than that amount

A

64, runt

971
Q

Wireless performance issues look at one of these 3

A

Speed
Throughput
Distance

972
Q

Latency and firmware issues could mean a what issue?

Ip configuration issue
Hardware issue
Wired network controller issue
Routing issue

A

Wired network controller issue

973
Q

Disable legacy speed, check channels to avoid overlap, adjust out out power for less interference and AP conflicts, split network for more AP’s and frequencies helps manage what?

Access points
WAP
Channel utilization
Iperf

A

Channel utilization

974
Q

Wireless signals get weaker the further away from antenna, Attenuation can be measured with this

A

WiFi analyzer

975
Q

Control power out out on AP, use a receive antenna with higher gain and being aware power is lost in antenna cable co-ax are solutions to this

Wireless signal issues
Antenna placement
Channel utilization
Ip configuration

A

Wireless signal issues

976
Q

Access point issue where you don’t connect to the right WiFi

A

Wrong SSID

977
Q

Changing an access point with a legacy device could cause this issue

A

Security issue, same encryption for client and AP (WPA2/3 is most up yo date, prior wep or wpa)

978
Q

Interference, slow througput, access point locations or channels could be an issue with this for wireless

Hardware failure
Incorrect antenna placement
Switch spoofing
Wrong vlan

A

Incorrect antenna placement

979
Q

Do this before blindly troubleshooting

A

Look at the device (switch, router, etc) configuration (ssh, terminal, web console or desktop)

980
Q

Default gate way or static route issue look here

A

Routing table

981
Q

Single device issue could be this

Wrong ip address
Wrong subnet
Interface issue
Ip configuration

A

interface issue,
check physical connectivity, nothing works if this has an issue, check for errors and mismatches

982
Q

Connecting a device to a switch and dhcp address is not in subnet or can’t talk to other devices

Appipa
Wrong default
Wrong subnet
Vlan mismatch

A

Vlan mismatch

983
Q

Every switch interface is configured as one of these 2

A

Access port (each assigned a vlan) or trunk port

984
Q

Plugging into wrong interface is what type of issue

A

Vlan issue

985
Q

Interface issue with Duplex mismatch or hardware bad Nic or driver could be from this

A

Collision

986
Q

Use a packet capture to identify source, see how many are going on at once and separate the network smaller would be solutions to this issue

A

Broadcast storm

987
Q

Potential man in middle attack or local administered MAC address or manufacture error would be this issue and solved by a packet capture

A

MAC spoofing/duplicate

988
Q

Wrong static ip address, multiple dhcp servers overlap, rogue dhcp, 2 addresses fighting for connectivity and blocked by os would be this issue

Hardware failure
Ip configurations
Duplicate ip addresses
Vlan mismatch

A

Duplicate ip addresses

989
Q

Check ip addressing, ping an ip address before static addressing, capture dhcp process, ping ip address and look at mac and arp table to troubleshoot this

Duplicate ip address
Man in the middle
Ip configuration
Hardware issue

A

Duplicate ip address

990
Q

No multicast destination address in switch forwarding table so each multicast is sent to every switch port, consumes bandwidth and resources on remote device

A

Multicast flood

991
Q

Troubleshoots multicast flooding/issues by directing the multicast transmissions

A

IGMP snooping

992
Q

What is when Traffic is coming in one route and leaving another which leads to dropped sessions by a firewall. Trouble shoot this issue with traceroute

A

Asymmetric route

993
Q

Use traceroute and identify each route in the routing table would trouble shoot this

Switching loop
Routing loop
Faulty NIC
Faulty cable

A

Routing loop

994
Q

Check ip address, subnet mask, default and dns, monitor traffic by looking at local broadcast, check devices around by confirming subnetmask and gateway, utilize ping and traceroute by pinging local ip, default and outside address to trouble shoot this

Ip configuration
Duplicate ip
Duplicate mac
Faulty NIC

A

Ip configuration

995
Q

Expired or wrong domain name is what type of issue?

Forward look up
Txt
Cname
Certificate

A

Certificate issue

996
Q

What is the issue if No response, run ping to see if connected, run traceroute to see if you are filtered or you can make to other side, check server and lights

Hardware failure
Ip configuration
Dns issue
Wrong default gateway

A

Hardware failure

997
Q

Protocols and ports applications not working, limited accessibility and trouble shoot by looking at policies and lists or a packet capture to see where traffic is going

A

Incorrect firewall setting

998
Q

Sets policies on what can and can’t be used on a company personal device

A

MDM mobile device manager

999
Q

When forwarding data what is the destination layer 2 address always?

A

Mac address of the default gateway router

1000
Q

Transitions a port immediately to the forwarding state, bypassing STP listening and learning to reduce time for end user device to connect to operational ports

BPDU Guard
BPDU
Spanning tree
PortFast

A

PortFast

1001
Q

Enough processing logic to function autonomously without a wireless controller

Thin AP
Dynamic ap
Fat AP
Stand-alone AP

A

Fat AP

1002
Q

Tool used to pinpoint exact location of any radio interference such as source of jamming

WiFi analyzer
Multimeter
Tone generator
Spectrum analyzer

A

Spectrum analyzer