Tydzien Przed Net+ Flashcards

1
Q

Adjacent

A

Przylegajacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to a traffic monitoring device placed between two points in a network infrastructure?
Tap
Repeater
Active hub
Transceiver

A

Tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a specialized tool used for evening out wire ends?
Cable crimper
Needle-nose pliers
Wire stripper
Snips

A

Snips

wire stripper to sciagacz izolacji

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a software tool used for measuring the maximum achievable bandwidth on IP networks?
pcap
OpenVAS
iperf
pfSense

A

iperf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Cisco-designed IP traffic collection method is called:
iperf
pcap
NetFlow
TACACS+

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
TFTP server
C2 server
Proxy server
Jump server

A

TFTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
nslookup
ipconfig
netstat

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
-a
/?
/all
/-a

A

/all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following network topologies is most commonly used in contemporary Ethernet LANs?
Bus topology
Star topology
Ring topology
Mesh topology

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

p2p a clinet-server?
kwestia działania,
centralizacji
niezawodności
bezpieczeństwa

A

p2p bardziej niezawodne, ale mniej bezpieczne, zdecentralizowane. Kazdy z kazdym gada, każdy kazdemu może coś wysłać itp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of limited-range computer network used for data transmission among various types of personal devices is referred to as:
PAN
LAN
SAN
MAN

A

PAN
personal area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to an IPv6 link-local address?
2002::/16
FE80::/10
2001::/32
::1/128

A

FE80::/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
DNAT
VLSM
MPLS
VLAN

A

VLSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A reverse DNS lookup zone is used for finding an IP address associated with a given domain name.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A forward DNS lookup zone returns a domain name for a given IP address.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of DNS query that returns either a valid address or a referral to another DNS server that may hold relevant information to the name resolution process is known as recursive query.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following answers refer to the layers that can be found in the three-tiered datacenter network architecture model? (Select 3 answers)
Core layer
Distribution/aggregation layer
Application layer
Infrastructure layer
Access/edge layer

A

Core layer
Distribution/aggregation layer
Infrastructure layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
SAN
SDN
SSP
SEH

A

SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following answers refer to the characteristics of the spine-and-leaf datacenter network architecture model? (Select 2 answers)
Star topology
Two-tier architecture
Full mesh topology
Three-tier architecture
Single-tier architecture

A

Two-tier architecture
Full mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FCoE, Fibre Channel, and iSCSI are connection types used in:
SAN
VLAN
NAS
SDN

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
CDMA
NFC
CWDM
GSM
CSMA

A

CDMA
GSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
Backdoor access
Privilege escalation
Shoulder surfing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following answers refers to a specialized tool used for evening out wire ends?
Cable crimper
Needle-nose pliers
Wire stripper
Snips

A

Snips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following answers refers to a software tool used for measuring the maximum achievable bandwidth on IP networks?
pcap
OpenVAS
iperf
pfSense

A

iperf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
TFTP server
C2 server
Proxy server
Jump server

A

TFTP server

c2 server to do botnetów
jump server to do łaczenia dwoch dmz albo czegos z dmz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following answers refer(s) to the characteristic features of MPLS? (Select all that apply)
Encrypted network traffic
Used for connecting devices on a WAN
Packets may be sent over different network paths (routing decisions based on each router’s routing table entries)
Unencrypted network traffic
Enables sending packets over a single, faster network path (routing decisions based on labels)
Used for connecting devices on a LAN
Enables delivery of various data packet types over the same network link

A

Used for connecting devices on a WAN
Unencrypted network traffic
Enables sending packets over a single, faster network path (routing decisions based on labels)
Enables delivery of various data packet types over the same network link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following solutions replaces network hardware with virtual machines?
NFV
Hypervisor
VM Replication
Media converter

A

NFV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following terms refer to the characteristic features of DSL? (Select 3 answers)
Leased lines
Copper cabling
Telephone lines
Fiber-optic cabling
Last mile solutions
WAN links

A

Copper cabling
Telephone lines
Last mile solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the most common type of a DSL Internet access?
VDSL
ADSL
SDSL
UDSL

A

ADSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The use of cable modems for Internet access within a standard cable television infrastructure is commonly referred to as:
Dial-up
Cable broadband
Frame relay
Ethernet

A

Cable broadband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following answers can be used to describe leased-line connections? (Select 3 answers)
Contended service
Typically used for premium residential Internet access
Last mile solutions
Dedicated, point-to-point, always-on connections
Typically used by businesses and organizations
WAN links

A

Dedicated, point-to-point, always-on connections
Typically used by businesses and organizations
WAN links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the answers listed below refer(s) to UTP cabling? (Select all that apply)
Twisted-pair copper cabling
Used in Ethernet networks and telephone systems
Low cost and ease of installation
Takes advantage of additional protective cover reducing signal interference from outside sources
Coaxial cabling
Not surrounded by any shielding that would provide protection against interference from outside sources
Fiber-optic cabling
In Ethernet networks, installed with RJ45 connector type

A

Twisted-pair copper cabling
Used in Ethernet networks and telephone systems
Low cost and ease of installation
Not surrounded by any shielding that would provide protection against interference from outside sources
In Ethernet networks, installed with RJ45 connector type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers)
Jitter
Signal attenuation
Crosstalk
EMI
Signal latency

A

Crosstalk
EMI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as:
Broad network access
Measured service
On-demand self-service
Resource pooling

A

Resource pooling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which of the terms listed below refers to a cloud computing feature that allows consumers to control the volume and type of utilized computing resources?
Measured service
On-demand self-service
Broad network access
Rapid elasticity

A

On-demand self-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the answers listed below apply to DSL modems? (Select 3 answers)
Dedicated bandwidth
Cabling that carries TV signals
Shared bandwidth
Twisted-pair copper cabling
Telephone lines
Coaxial cabling

A

Dedicated bandwidth
Twisted-pair copper cabling
Telephone lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which type of network documentation would be of help in determining the physical location of a network server?
Network diagram
IDF documentation
Rack diagram
MDF documentation

A

Rack diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is known as:
SLA
MOU
SOW
MSA

A

MOU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as:
SOW
MSA
SLA
MOU

A

SLA

40
Q

In SNMP, each node in a MIB is uniquely identified by a(n):
DSU
OID
PII
OUI

A

OID

oui to organization unit identifier, czyli bardziej ldap

41
Q

Which of the following answers refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of a graphical user interface?
VTP
VRF
VTC
VNC

A

VNC

42
Q

Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP?
PSK
802.1X
SAE
TKIP

A

PSK -pre shared key

tkip to protokół szyfrowania czy costam koło tego, ale nie ten shared secret

43
Q

Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object?
CRL
NAT
BCP
ACL

A

ACL - access control list

44
Q

Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers)
netstat -p
route print
netstat -a
print route
netstat -r

A

netstat -r
route print

45
Q

Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers)
netstat -p
route print
netstat -a
print route
netstat -r

A

route print
netstat -r

46
Q

Which netstat parameter allows to display the names of applications and executable file components that are accessing the network?
-a
-n
-b
-p

A

-b

47
Q

An estimated measurement of the power level that a wireless client device is receiving from an Access Point (AP), or router is referred to as:
ESS
RSSI
SNR
EIRP

A

RSSI

48
Q

The term “Asymmetric routing” refers to a preferred network configuration in which packets are sent and received via different network paths.
True
False

A

False

What is Asymmetric Routing? In Asymmetric routing, a packet traverses from a source to a destination in one path and takes a different path when it returns to the source
moze chodzi o to prefered?

49
Q

What is the fastest way for validating a digital certificate?
CRL
OCSP
CSR
OSPF

A

OCSP

50
Q

You must decide whether to purchase 110 blocks or 66 blocks for the wiring in a new building. Which statement is NOT an advantage of a 110 block over a 66 block?
A 110 block supports higher frequencies.
A 110 block does not use a punch-down tool.
A 110 block requires less space.
A 110 block supports both telephone and data networks.

A

A 110 block does not use a punch-down tool.

51
Q

You are the network administrator for an organization whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation?
MTU
Delay
Cost
Hop count

A

Cost

52
Q

You need to implement an independent network within your private LAN. Only users in the Research and Development department should be able to access the independent network. The solution must be hardware based. Which type of network should you deploy?
a virtual private network (VPN)
a demilitarized zone (DMZ)
an extranet
a virtual local area network (VLAN)

A

a virtual local area network (VLAN)

53
Q

Which of the following controls can be used as a deterrent, an authentication method, or documentation?
Badges
Video surveillance
Key fob
Biometrics

A

Video surveillance

54
Q

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use?
crossover cable
patch cable
rollover cable
straight-through cable

A

rollover cable

jego sie uzywa do tego własnie byku

55
Q

You want to configure a firewall and filter packets on a Linux system. Which command would you use?
iptables
tcpdump
nslookup
ifconfi

A

iptables

56
Q

You have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? (Choose all that apply.)
microwave ovens
cordless phones
electrical wiring
cable TV cabling

A

microwave ovens
cordless phones

57
Q

Port SMTP i SMTP TLS

A

25 i 587

58
Q

DNS
53
63
68
80

A

53

63 nic
67 i 68 - dhcp
80 to wiadomka

59
Q

TFTP
53
443
445
69

A

69

60
Q

DHCP dwa porty

A

67/68

61
Q

POP3
995
123
110
636

A

110

123- ntp
995- pop3 po sslu
636 ldaps

62
Q

NTP
587
993
123
80

A

123

993 - imap po sslu
587 - smtp tls

63
Q

IMAP port

A

143

64
Q

SNMP [wybierz dwa]
143
145
161
163
162

A

161/162

65
Q

LDAP
3389
389
3889
315

A

389

66
Q

SMB port

A

445

67
Q

Syslog
445
514
443
993

A

514

993- imap po sslu

68
Q

LDAPS port

A

636

69
Q

IMAP po sslu
995 czy 993

A

993

70
Q

POP3 po sslu
995 czy 993

A

995

71
Q

SQL Server
3389
993
1433
1521

A

1433

993 po imap po sslu
1521sqlnet

72
Q

MySQL
3306
3389
123
1521

A

3306

1521 - sqlnet
123- ntp

73
Q

SIP (session initiation protocol)

A

5060/5061

74
Q

Which of the answers listed below refer to the RJ11 connector? (Select 2 answers)
Used with telephone cabling
Twisted-pair copper cabling connector
Used with Ethernet network cabling
Fiber-optic cabling connector
Coaxial cabling connector

A

Used with telephone cabling
Twisted-pair copper cabling connector

75
Q

Automatic routing table update is a feature of:
Static routing
Route redistribution
Dynamic routing
Route aggregation

A

Dynamic routing

76
Q

Which of the following backup facilities does not require physical infrastructure?
Cold site
Warm site
Hot site
Cloud site

A

Cloud site

77
Q

Which of the following wireless technologies enables identification and tracking of tags attached to objects?
WTLS
GPS
RFID
NFC

A

RFID

78
Q

A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called:
ID badge
Smart card
Security token
RFID badge

A

RFID badge

79
Q

Which of the terms listed below refers to a method for permanent and irreversible removal of data stored on a memory device?
Sanitization
High-level formatting
Recycle Bin (system utility)
Partitioning

A

Sanitization

80
Q

Which specific actions are not be performed in the first step of the troubleshooting process? (Select 2 answers)
Gathering information
Establishing a plan of action to resolve the problem
Questioning users
Identifying symptoms
Determining recent changes
Establishing a theory of probable cause
Duplicating the problem

A

Establishing a plan of action to resolve the problem
Establishing a theory of probable cause

81
Q

In the troubleshooting methodology, the process of establishing a theory of probable problem cause does not involve:
Top-to-bottom OSI layer approach ( Your answer)
Applying multiple approaches to the problem
Verifying the most common issues (Questioning the obvious)
Bottom-to-top OSI layer approach
Asking for assistance (Escalating)

A

Asking for assistance (Escalating)

82
Q

Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve:
Verifying full system functionality
Testing the theory to determine the problem cause ( Missed)
Implementing the solution
Establishing a plan of action to resolve the problem

A

Testing the theory to determine the problem cause

83
Q

Which step of the troubleshooting process involves establishing a plan of action to resolve the problem?
First step
Second step
Third step
Fourth step

A

Fourth step

84
Q

According to the troubleshooting methodology, verification of full system functionality and implementation of applicable preventive measures should be performed as the:
Next step after documenting findings, actions, and outcomes
First step of the troubleshooting process
Next step after implementing the solution
Last step of the troubleshooting process

A

Next step after implementing the solution

85
Q

The last step of the troubleshooting process should come as the next consecutive step after: (Select 2 answers)
Implementing the solution
Verifying full system functionality
Identifying potential effects of the implemented solution
Documenting findings, actions, outcomes, and conclusions
Implementing preventive measures

A

Implementing preventive measures
Verifying full system functionality

86
Q

The last step of the troubleshooting process should involve:
Implementing preventive measures
Documenting findings, actions, outcomes, and conclusions
Implementing the solution
Verifying full system functionality
Identifying potential effects of the implemented solution

A

Documenting findings, actions, outcomes, and conclusions

87
Q
  1. A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when. They are near the antenna.

Which of the following is MOST likely the cause?
The wireless signal is being refracted by the warehouse’s windows
The antenna’s power level was set too high and is overlapping
An omnidirectional antenna was used instead of a unidirectional antenna
The wireless access points are using channels from the 5GHz spectrum

A

The wireless signal is being refracted by the warehouse’s windows

88
Q

A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations. The manufacturer says the system will work if ping times are less than 50ms.

The company has recorded the following ping times:

Which of the following is MOST likely causing the issue?

Attenuation
Latencywrong
VLAN mismatch
Jitter

A

Attenuation

89
Q
  1. Within the realm of network security, Zero Trust:
    prevents attackers from moving laterally through a system

allows a server to communicate with outside networks without a firewall.

block malicious software that is too new to be found in virus definitions

stops infected files from being downloaded via websites

A

block malicious software that is too new to be found in virus definitions

90
Q
  1. Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times .

Which of the following steps will MOST likely determine the cause of the issue?
Verify the session time-out configuration on the captive portal settings
Check for encryption protocol mismatch on the client’s wireless settings
Confirm that a valid passphrase is being used during the web authentication
Investigate for a client’s disassociation caused by an evil twin AP

A

Verify the session time-out configuration on the captive portal settings

91
Q
  1. A store owner would like to have secure wireless access available for both business equipment and patron use .

Which of the following features should be configured to allow different wireless access through the same equipment?
MIMO
TKIP
LTE
SSID

A

SSID

92
Q
  1. A network administrator is installing a wireless network at a client’s office .

Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?
CDMA
CSMA/CD
CSMA/CA
GSM

A

CDMA

93
Q
  1. A network administrator needs to query the NSs for a remote application .

Which of the following commands would BEST help the administrator accomplish this task?
dig
arp
show interface
hostname

A

dig

94
Q
  1. A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully .

Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
Ensure an implicit permit rule is enabled
Configure the log settings on the firewalls to the central syslog server
Update the firewalls with current firmware and software
Use the same complex passwords on all firewalls

A

Update the firewalls with current firmware and softwarecorrect

95
Q
  1. A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection.

The chain of connections is in the following order:

  • Device
  • LC/LC patch cable
  • Patch panel
  • Cross-connect fiber cable
  • Patch panel
  • LC/LC patch cable
  • Switch

The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed .

Which of the following is the MOST likely cause of the issue?
TX/RX is reversed
An incorrect cable was used
The device failed during installation
Attenuation is occurring

A

TX/RX is reversed

96
Q

G

A

B