Tydzien Przed Net+ Flashcards

1
Q

Adjacent

A

Przylegajacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following answers refers to a traffic monitoring device placed between two points in a network infrastructure?
Tap
Repeater
Active hub
Transceiver

A

Tap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following answers refers to a specialized tool used for evening out wire ends?
Cable crimper
Needle-nose pliers
Wire stripper
Snips

A

Snips

wire stripper to sciagacz izolacji

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following answers refers to a software tool used for measuring the maximum achievable bandwidth on IP networks?
pcap
OpenVAS
iperf
pfSense

A

iperf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A Cisco-designed IP traffic collection method is called:
iperf
pcap
NetFlow
TACACS+

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following answers refers to an internal network server used for delivering software upgrades to network devices?
TFTP server
C2 server
Proxy server
Jump server

A

TFTP server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of a Windows command-line utility that can be used to display TCP/IP configuration settings?
ifconfig
nslookup
ipconfig
netstat

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to an ipconfig command parameter used for displaying the full TCP/IP configuration information for all adapters?
-a
/?
/all
/-a

A

/all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following network topologies is most commonly used in contemporary Ethernet LANs?
Bus topology
Star topology
Ring topology
Mesh topology

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

p2p a clinet-server?
kwestia działania,
centralizacji
niezawodności
bezpieczeństwa

A

p2p bardziej niezawodne, ale mniej bezpieczne, zdecentralizowane. Kazdy z kazdym gada, każdy kazdemu może coś wysłać itp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of limited-range computer network used for data transmission among various types of personal devices is referred to as:
PAN
LAN
SAN
MAN

A

PAN
personal area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refers to an IPv6 link-local address?
2002::/16
FE80::/10
2001::/32
::1/128

A

FE80::/10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of a solution that increases the efficiency of IP address space management by allowing network administrators to divide networks into subnets of different sizes?
DNAT
VLSM
MPLS
VLAN

A

VLSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A reverse DNS lookup zone is used for finding an IP address associated with a given domain name.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A forward DNS lookup zone returns a domain name for a given IP address.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of DNS query that returns either a valid address or a referral to another DNS server that may hold relevant information to the name resolution process is known as recursive query.
True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following answers refer to the layers that can be found in the three-tiered datacenter network architecture model? (Select 3 answers)
Core layer
Distribution/aggregation layer
Application layer
Infrastructure layer
Access/edge layer

A

Core layer
Distribution/aggregation layer
Infrastructure layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the answers listed below refers to a technology designed to simplify network infrastructure management?
SAN
SDN
SSP
SEH

A

SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following answers refer to the characteristics of the spine-and-leaf datacenter network architecture model? (Select 2 answers)
Star topology
Two-tier architecture
Full mesh topology
Three-tier architecture
Single-tier architecture

A

Two-tier architecture
Full mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

FCoE, Fibre Channel, and iSCSI are connection types used in:
SAN
VLAN
NAS
SDN

A

SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following answers refer to the 2G/3G mobile telecommunications standards? (Select 2 answers)
CDMA
NFC
CWDM
GSM
CSMA

A

CDMA
GSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:
Phishing
Backdoor access
Privilege escalation
Shoulder surfing

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following answers refers to a specialized tool used for evening out wire ends?
Cable crimper
Needle-nose pliers
Wire stripper
Snips

A

Snips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following answers refers to a software tool used for measuring the maximum achievable bandwidth on IP networks?
pcap
OpenVAS
iperf
pfSense

A

iperf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Which of the following answers refers to an internal network server used for delivering software upgrades to network devices? TFTP server C2 server Proxy server Jump server
TFTP server c2 server to do botnetów jump server to do łaczenia dwoch dmz albo czegos z dmz
26
Which of the following answers refer(s) to the characteristic features of MPLS? (Select all that apply) Encrypted network traffic Used for connecting devices on a WAN Packets may be sent over different network paths (routing decisions based on each router's routing table entries) Unencrypted network traffic Enables sending packets over a single, faster network path (routing decisions based on labels) Used for connecting devices on a LAN Enables delivery of various data packet types over the same network link
Used for connecting devices on a WAN Unencrypted network traffic Enables sending packets over a single, faster network path (routing decisions based on labels) Enables delivery of various data packet types over the same network link
27
Which of the following solutions replaces network hardware with virtual machines? NFV Hypervisor VM Replication Media converter
NFV
28
Which of the following terms refer to the characteristic features of DSL? (Select 3 answers) Leased lines Copper cabling Telephone lines Fiber-optic cabling Last mile solutions WAN links
Copper cabling Telephone lines Last mile solutions
29
What is the most common type of a DSL Internet access? VDSL ADSL SDSL UDSL
ADSL
30
The use of cable modems for Internet access within a standard cable television infrastructure is commonly referred to as: Dial-up Cable broadband Frame relay Ethernet
Cable broadband
31
Which of the following answers can be used to describe leased-line connections? (Select 3 answers) Contended service Typically used for premium residential Internet access Last mile solutions Dedicated, point-to-point, always-on connections Typically used by businesses and organizations WAN links
Dedicated, point-to-point, always-on connections Typically used by businesses and organizations WAN links
32
Which of the answers listed below refer(s) to UTP cabling? (Select all that apply) Twisted-pair copper cabling Used in Ethernet networks and telephone systems Low cost and ease of installation Takes advantage of additional protective cover reducing signal interference from outside sources Coaxial cabling Not surrounded by any shielding that would provide protection against interference from outside sources Fiber-optic cabling In Ethernet networks, installed with RJ45 connector type
Twisted-pair copper cabling Used in Ethernet networks and telephone systems Low cost and ease of installation Not surrounded by any shielding that would provide protection against interference from outside sources In Ethernet networks, installed with RJ45 connector type
33
Shielded Twisted-Pair (STP) cabling reduces what kind of interference? (Select 2 answers) Jitter Signal attenuation Crosstalk EMI Signal latency
Crosstalk EMI
34
In cloud computing, the practice of grouping together computing resources and making them available for shared access for multiple consumers is referred to as: Broad network access Measured service On-demand self-service Resource pooling
Resource pooling
35
Which of the terms listed below refers to a cloud computing feature that allows consumers to control the volume and type of utilized computing resources? Measured service On-demand self-service Broad network access Rapid elasticity
On-demand self-service
36
Which of the answers listed below apply to DSL modems? (Select 3 answers) Dedicated bandwidth Cabling that carries TV signals Shared bandwidth Twisted-pair copper cabling Telephone lines Coaxial cabling
Dedicated bandwidth Twisted-pair copper cabling Telephone lines
37
Which type of network documentation would be of help in determining the physical location of a network server? Network diagram IDF documentation Rack diagram MDF documentation
Rack diagram
38
A document established between two or more parties to define their respective responsibilities and expectations in accomplishing a particular goal or mission is known as: SLA MOU SOW MSA
MOU
39
An agreement between a service provider and users defining the nature, availability, quality, and scope of the service to be provided is known as: SOW MSA SLA MOU
SLA
40
In SNMP, each node in a MIB is uniquely identified by a(n): DSU OID PII OUI
OID oui to organization unit identifier, czyli bardziej ldap
41
Which of the following answers refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of a graphical user interface? VTP VRF VTC VNC
VNC
42
Which of the following answers refers to a shared secret authentication method used in WPA, WPA2, and EAP? PSK 802.1X SAE TKIP
PSK -pre shared key tkip to protokół szyfrowania czy costam koło tego, ale nie ten shared secret
43
Which of the acronyms listed below refers to a set of rules that specify which users or system processes are granted access to objects as well as what operations are allowed on a given object? CRL NAT BCP ACL
ACL - access control list
44
Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers) netstat -p route print netstat -a print route netstat -r
netstat -r route print
45
Which of the following command-line commands in MS Windows are used to display the contents of a routing table? (Select 2 answers) netstat -p route print netstat -a print route netstat -r
route print netstat -r
46
Which netstat parameter allows to display the names of applications and executable file components that are accessing the network? -a -n -b -p
-b
47
An estimated measurement of the power level that a wireless client device is receiving from an Access Point (AP), or router is referred to as: ESS RSSI SNR EIRP
RSSI
48
The term "Asymmetric routing" refers to a preferred network configuration in which packets are sent and received via different network paths. True False
False What is Asymmetric Routing? In Asymmetric routing, a packet traverses from a source to a destination in one path and takes a different path when it returns to the source moze chodzi o to prefered?
49
What is the fastest way for validating a digital certificate? CRL OCSP CSR OSPF
OCSP
50
You must decide whether to purchase 110 blocks or 66 blocks for the wiring in a new building. Which statement is NOT an advantage of a 110 block over a 66 block? A 110 block supports higher frequencies. A 110 block does not use a punch-down tool. A 110 block requires less space. A 110 block supports both telephone and data networks.
A 110 block does not use a punch-down tool.
51
You are the network administrator for an organization whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation? MTU Delay Cost Hop count
Cost
52
You need to implement an independent network within your private LAN. Only users in the Research and Development department should be able to access the independent network. The solution must be hardware based. Which type of network should you deploy? a virtual private network (VPN) a demilitarized zone (DMZ) an extranet a virtual local area network (VLAN)
a virtual local area network (VLAN)
53
Which of the following controls can be used as a deterrent, an authentication method, or documentation? Badges Video surveillance Key fob Biometrics
Video surveillance
54
You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. Which type of cable should you use? crossover cable patch cable rollover cable straight-through cable
rollover cable jego sie uzywa do tego własnie byku
55
You want to configure a firewall and filter packets on a Linux system. Which command would you use? iptables tcpdump nslookup ifconfi
iptables
56
You have implemented a new 802.11b 2.4-GHz WLAN. Which of the following devices can cause interference with this network? (Choose all that apply.) microwave ovens cordless phones electrical wiring cable TV cabling
microwave ovens cordless phones
57
Port SMTP i SMTP TLS
25 i 587
58
DNS 53 63 68 80
53 63 nic 67 i 68 - dhcp 80 to wiadomka
59
TFTP 53 443 445 69
69
60
DHCP dwa porty
67/68
61
POP3 995 123 110 636
110 123- ntp 995- pop3 po sslu 636 ldaps
62
NTP 587 993 123 80
123 993 - imap po sslu 587 - smtp tls
63
IMAP port
143
64
SNMP [wybierz dwa] 143 145 161 163 162
161/162
65
LDAP 3389 389 3889 315
389
66
SMB port
445
67
Syslog 445 514 443 993
514 993- imap po sslu
68
LDAPS port
636
69
IMAP po sslu 995 czy 993
993
70
POP3 po sslu 995 czy 993
995
71
SQL Server 3389 993 1433 1521
1433 993 po imap po sslu 1521sqlnet
72
MySQL 3306 3389 123 1521
3306 1521 - sqlnet 123- ntp
73
SIP (session initiation protocol)
5060/5061
74
Which of the answers listed below refer to the RJ11 connector? (Select 2 answers) Used with telephone cabling Twisted-pair copper cabling connector Used with Ethernet network cabling Fiber-optic cabling connector Coaxial cabling connector
Used with telephone cabling Twisted-pair copper cabling connector
75
Automatic routing table update is a feature of: Static routing Route redistribution Dynamic routing Route aggregation
Dynamic routing
76
Which of the following backup facilities does not require physical infrastructure? Cold site Warm site Hot site Cloud site
Cloud site
77
Which of the following wireless technologies enables identification and tracking of tags attached to objects? WTLS GPS RFID NFC
RFID
78
A type of identification badge that can be held within a certain distance of the reader to authenticate the holder is called: ID badge Smart card Security token RFID badge
RFID badge
79
Which of the terms listed below refers to a method for permanent and irreversible removal of data stored on a memory device? Sanitization High-level formatting Recycle Bin (system utility) Partitioning
Sanitization
80
Which specific actions are not be performed in the first step of the troubleshooting process? (Select 2 answers) Gathering information Establishing a plan of action to resolve the problem Questioning users Identifying symptoms Determining recent changes Establishing a theory of probable cause Duplicating the problem
Establishing a plan of action to resolve the problem Establishing a theory of probable cause
81
In the troubleshooting methodology, the process of establishing a theory of probable problem cause does not involve: Top-to-bottom OSI layer approach ( Your answer) Applying multiple approaches to the problem Verifying the most common issues (Questioning the obvious) Bottom-to-top OSI layer approach Asking for assistance (Escalating)
Asking for assistance (Escalating)
82
Once the theory of probable cause of the problem has been established, the next troubleshooting step should involve: Verifying full system functionality Testing the theory to determine the problem cause ( Missed) Implementing the solution Establishing a plan of action to resolve the problem
Testing the theory to determine the problem cause
83
Which step of the troubleshooting process involves establishing a plan of action to resolve the problem? First step Second step Third step Fourth step
Fourth step
84
According to the troubleshooting methodology, verification of full system functionality and implementation of applicable preventive measures should be performed as the: Next step after documenting findings, actions, and outcomes First step of the troubleshooting process Next step after implementing the solution Last step of the troubleshooting process
Next step after implementing the solution
85
The last step of the troubleshooting process should come as the next consecutive step after: (Select 2 answers) Implementing the solution Verifying full system functionality Identifying potential effects of the implemented solution Documenting findings, actions, outcomes, and conclusions Implementing preventive measures
Implementing preventive measures Verifying full system functionality
86
The last step of the troubleshooting process should involve: Implementing preventive measures Documenting findings, actions, outcomes, and conclusions Implementing the solution Verifying full system functionality Identifying potential effects of the implemented solution
Documenting findings, actions, outcomes, and conclusions
87
93. A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when. They are near the antenna. Which of the following is MOST likely the cause? The wireless signal is being refracted by the warehouse's windows The antenna's power level was set too high and is overlapping An omnidirectional antenna was used instead of a unidirectional antenna The wireless access points are using channels from the 5GHz spectrum
The wireless signal is being refracted by the warehouse's windows
88
A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations. The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times: Which of the following is MOST likely causing the issue? Attenuation Latencywrong VLAN mismatch Jitter
Attenuation
89
14. Within the realm of network security, Zero Trust: prevents attackers from moving laterally through a system allows a server to communicate with outside networks without a firewall. block malicious software that is too new to be found in virus definitions stops infected files from being downloaded via websites
block malicious software that is too new to be found in virus definitions
90
35. Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times . Which of the following steps will MOST likely determine the cause of the issue? Verify the session time-out configuration on the captive portal settings Check for encryption protocol mismatch on the client’s wireless settings Confirm that a valid passphrase is being used during the web authentication Investigate for a client’s disassociation caused by an evil twin AP
Verify the session time-out configuration on the captive portal settings
91
6. A store owner would like to have secure wireless access available for both business equipment and patron use . Which of the following features should be configured to allow different wireless access through the same equipment? MIMO TKIP LTE SSID
SSID
92
56. A network administrator is installing a wireless network at a client’s office . Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access? CDMA CSMA/CD CSMA/CA GSM
CDMA
93
74. A network administrator needs to query the NSs for a remote application . Which of the following commands would BEST help the administrator accomplish this task? dig arp show interface hostname
dig
94
75. A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully . Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully? Ensure an implicit permit rule is enabled Configure the log settings on the firewalls to the central syslog server Update the firewalls with current firmware and software Use the same complex passwords on all firewalls
Update the firewalls with current firmware and softwarecorrect
95
88. A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: - Device - LC/LC patch cable - Patch panel - Cross-connect fiber cable - Patch panel - LC/LC patch cable - Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed . Which of the following is the MOST likely cause of the issue? TX/RX is reversed An incorrect cable was used The device failed during installation Attenuation is occurring
TX/RX is reversed
96
G
B