Udemy NET+ Questions Flashcards

(293 cards)

1
Q

What port numbers does Windows’ SMB use?

A

445&139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Port Number does Telnet use?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what port number does FTP and SFTP use?

A

20/21 & 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port number does SSH use?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port number is used for TLS/SSL Implicit encryption?

A

990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does NTP use?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default port number for LDAP

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the second LDAP port that supports encryption via SSL/TLS?

A

636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA through RADIUS uses what to connect to a server’s LDAP?

A

Secret Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the seven levels of the OSI model?

A

Physical layer.
Data link layer.
Network layer.
Transport layer.
Session layer.
Presentation layer.
Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

A

De encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port number does DNS utilize?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of frames are commonly used in SANs?

A

Jumbo Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is 802.11ac’s max speed? Frequency does it use?

A

3.5gbps 5.0GHZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is 802.11ax’s max speed? What frequency does it use?

A

9.8gbps both 2.4/5ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what combines the functionality of a firewall, malware scanner, and other security appliances into one device?

A

UTM (unified threat management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the max speed for 802.11b?

A

11mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the max speed for 802.11g? (what frequency does it use?)

A

54mbps (2.4ghz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the max speed for 802.11a? (what frequency does it use?)

A

54mbps(5.0ghz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the ability of a cloud system to dynamically scale resources up or down based on the demand?

A

Rapid Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What net topology connects one node to all other nodes directly creating a redundant network?

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What connects all of the other nodes to a central node?

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What connects every device to exactly two other neighboring devices to form a circle?

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What tech prevents users from gaining access to network resources if they can plug their laptops into the network?

A

NAC (Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?
Evil Twin Attack
26
What attack consists of sitting between the connection of two parties and either observing or manipulating traffic?
Man in the middle attack
27
What is the maximum transmit speed and frequency of 802.11n?
600mbps, 2.4&5ghz
28
What port does Syslog use?
UDP port 514
29
What port does SNMP (Simple Network Management Protocol) use?
161&162
30
What is Syslog mainly used for?
Analyzing historical data, pulls data only
31
What is the reason for SNMP's primary use case?
real time visibility and can push network changes and pull data
32
What is SNMP for?
Communications between firewall,servers,wireless devices, load balancing, and CCTV cameras
33
What is Syslog severity level 2
Critical (Critical event)
33
What is Syslog severity level 0?
Emergency (System Unstable)
33
What is Syslog severity level 1?
Alerts (Immediate action required)
34
What is Syslog severity level 3?
Warnings (Warning event)
35
What is Syslog severity level 5?
Notifications (Unusual event but not error)
36
What is Syslog severity level 6?
Informational (normal operational message-No Action Required)
37
What is Syslog severity level 7?
Debugging (user initiated)
38
What is 802.1x?
Port-based network access control (PNAC)
39
What technology offers both real-time surveillance of security events and auto evaluation of collected event data?
SiEM- Security information event management
40
What technology do 802.11n and 802.11ac share?
Mimo(multi input,multi output)
41
What is the name of a user or computer attempting to connect to an 802.1x network?
The supplicant
42
What is the international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television (CATV) system?
DOCSIS (Data Over Cable Service Interface Specification)
43
What Protocol is used for connecting to a pc/server's desktop from another location?
Remote Desktop Protocol
44
What ports are used by SMTP and POP3 for unencrypted emails?
25 and 110
45
What two ports are used by SMTP and POP3 FOR ENCRYPTED EMAILS?
587 and 995
46
What enables DSL to be able faster than traditional dial up?
Higher frequency usage
47
What is 802.3af?
PoE (Power over ethernet) original
48
what is 802.3at
PoE+ (power over ethernet plus), allows up to 30watts for two devices
49
Implementing 802.3af on a switch means what?
implementing PoE
50
What is an OTDR?
Optical Time Domain Reflector
51
What is an OTDR used for?
used for testing cable breaks, performance, and can provide an approximate location of where the cable break is
52
When a workstation is believed to have a static ARP causing workstation connectivity issues, what should be the next step in the technicians trouble shooting method?
Remove the ARP entry from the User's workstation
53
What is ARP Spoofing?
An on path attack that intercepts and reroutes data. also known as ARP poisoning
54
What is the general term for historical network performance data?
baseline
55
What would you compare current network traffic to in order to determine if there are any anomalies in network performance?
Baseline
56
What communication type is used in IPv6 to send a packet to the nearest interface that shares a common address in a routing table?
Any cast
57
What communication type is used during a live stream video where many people connect to view the same live streamed video?
Multi-cast
58
What is the ability to administer/manage a network via the LAN?
In-Band Management Network
59
What provides a secure dedicated alternate access method into an IT network infrastructure to administer connected devices and IT assets without using the corporate LAN?
Out-of-band Management Network
60
What technology delivers multiple voice calls over a copper wire if you have and ISDN or T-1 connection?
Time-division Multiplexing
61
What would cause a company's border router's net capacity to experience high loads during non working hours for the company's web server?
DDoS Attack (Distributed Denial of Service)
62
What dynamic routing protocol supports both ipv4 and VLSM
OSPF(Open shortest path first)
63
what is OSPF?
Open shortest path first. A link state routing procol based off SPF. Uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. .
64
What is VLSM?
Variable Length Subnet Mask, the process of subnetting subnets
65
What is VLSM used for?
allows network administrators to create subnets with different subnet masks to efficiently make use of IP addresses
66
What is OSPF used for?
it is a IP routing protocol that uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. originates from SPF.
67
What is VRRP?
Virtual Router Redundnacy protocol
68
At which layer doe OTM cells operate at?
Data Link Layer
69
What ports does SIP use?
5060/5061
70
What is SIP?
Session Initiation Protocol
71
If a website's language is changed to another language(Russian or Korean for example) while you're accessing the home page of a known site which has always been in english, you may be experiencing what type of attack?
On-Path Attack
72
What is not required in a DHCP Server's scope to allow hosts onto a LAN segment assigned by dynamic IP addresses in which hosts are able to access the internet and internal company servers?
Reservations
73
what tool would you use to measure OHMs?
Multimeter
74
Why would there be no available SSIDs in an area where all other devices are connected to the wifi/network in a private or business setting?
Wireless Routers Broadcasting has been disabled
75
What is MIB?
Management Information Base
76
What is MIB used for?
Managing entities in a communication network
77
What is a Trap
An Admin message sent from network devices to indicate that device connections have stopped or started
78
What is a verbose trap?
Contains information about the alterts including description, site name, and severity level
79
What type of trap has a unique identification number (OID) that allows the SNMP manager to distinguish them from each other?
Granular Trap
80
What layers are used in a three-tiered data center network architecture?
Core layer, access layer, aggregation layer
81
What would cause your IP address being different online versus locally in your network?
Gateway conducting NAT or PAT
82
What is PAT?
Port Address translation
83
What network device is used to separate broadcast domains?
a router
84
What tool can be used to prevent an attack from modifying the MAC address to IP bindings within the local area network?
Dynamic ARP Inspections
85
what is DAI?
Dynamic Arp Inspections
86
Would changes in the network's test lab require a scheduled maintenance window?
no
87
would changes made in production devices that could interrupt or cause the device to go offline require a scheduled maintenance window?
yes
88
What is done to company devices to prevent sensitive data from being compromised when they are being recycled to allow a school to repurpose old laptops/company hardware with storage?
Wiping the device
89
If a pentester has the ability to read TLS traffic from the webserver due to a software bug, what is most likely the mitigation technique used?
Ensure patches are deployed
90
If your server has been a victim of a web based attack, which port would be checked to source the attacker's target?
port 443
91
Ping requests occur at which layer of the OSI?
Layer 3, network
92
What is LACP?
Link aggregation control protocol is used to group numerous physical ports to make one high bandwidth path
93
What type of fire suppression system uses a sprinkler system with water to extinguish a fire but requires both an actuator and the sprinklers to be tripped prior to water being released?
Pre-action system
94
What type of sprinkler system constantly maintains water within the sprinkler piping without requiring an actuator?
Wet Pipe System
95
Which of the following is used to identify a variable that may be set or read using SNMP?
OID
96
What is OID?
Unique Object Identifier, Identifies a variable that can be read or set using SNMP
97
Is 802.3ad active or passive?
Active, both NICs must be on at the same time
98
What is the 802.3ad protocol?
Link Aggregation Control Protocol
99
what is TLS?
Transport layer security
100
what is SSL?
Secure Sockets Layer
101
What is ISDN?
Integrated Services Digital Network
102
What is a Hypervisor?
Also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.
103
What protocol will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
Border Gateway Protocol BGP
104
When restricting a users network traffic to stop them from having public internet access, which network traffic should you disable?
The user's traffic to network
105
What requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?
Client Server
106
What security feature would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port?
Port Security
107
Which port must be allowed to enable communications through your firewall between the web application and your database server?
1433
108
A Website needs to be continually accessible to it's students and reachable 24x7. What networking concept would ensure the site stay online?
High Availability
109
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Physical Layer
110
Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?
Wiring diagram
111
What is RPO?
Recovery Point Objective
112
What does RPO measure?
a point in time that you would recover data and defines how much data you're prepared to lose in accordance with the Business continuity plan
113
What is MTTR?
Mean time to repair. Average time to repair failed hardware
114
What is MTTF?
The average time before a system or its hardware fails
115
Which of the following network topologies requires that all nodes have a point-to-point connection with every other node in the network?
Mesh Network
116
Which SNMP options should you enable to ensure the data is transferred confidentially?
authPriv
117
What piece of hardware is most likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
Analog Modem
118
The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client's requirements?
Ring Topology
119
What would you call mutlple star topology networks connected together over a large swath of land?
Hybrid topology
120
What should you do if a router's advertised functions are missing after out of the box installation?
Flash the latest firmware to the router
121
The network administrator logs into the admin area of the user's access point and discovers that multiple unknown devices are connected to it. What is MOST likely the cause of this issue?
a WPS attack
122
What is a FQDN?
Fully Qualified Domain Name
123
Which of the following components is used to identify a variable that may be set or read using SNMP?
OID
124
Which of the following encryption types was used by WPA to better secure wireless networks than WEP?
TKIP (temporal key integrity protocol)
125
What is TKIP?
Temporal key integrity protocol, designed to provide more secure encryption than the earlier Wired Equivalent Privacy (WEP), without needing to replace existing hardware.
126
What is AES?
Advanced Encryption Standard, a symmetric block cipher chosen by the U.S. government to protect classified information. would take trillions of years to brute force a 128bit AES block
127
A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they can access the sites using the web browsers. What is the MOST likely cause of the failed pings?
ICMP traffic being blocked by the firewall.
128
What protocol does Ping rely on?
ICMP
129
What does ICMP stand for?
Internet Control Message Protocol
130
What is Internet Control Message Protocol?
used for reporting errors and performing network diagnostics
131
What are Site Surveys in networking?
A wireless site survey is a physical survey of the premises where the wireless network will be installed
132
What is a network topology?
is the physical and logical arrangement of nodes and connections in a network
133
In a SQL server, what is port 3306 used for?
Allowing inbound traffic from all external IP addresses to MySQL
134
What is the best practice for SQL servers to prevent DoS, Buffer Overflow, SQL Injection attacks?
Block public access, and port 3306.
135
You opened your web browser and attempted to visit DionTraining.com, but you appear to have been redirected to a malicious website instead. What type of attack is being conducted?
DNS Poisoning
136
What is it called when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website?
DNS poisoning
137
Ports 1521 is used by what server type?
SQLnet
138
Port 1433 is used by what server type?
Microsoft SQL
139
Port 3306 is used by what server type?
MySQL
140
What port number is RDP use?
Port 3389
141
Is ICMP is connectionless or connection based protocol?
connection less
142
Which of the following components is used by an agent to send a complete set of key-pair values about a significant event or condition that is occurring in real-time by providing a full list of variables and values for a given device to a manager?
Verbose trap
143
What is IDF?
Independent Distribution Frame a remote room or closet connected to the MDF
144
What is MDF?
Main Distribution Frame is the main computer room for servers, hubs, routers, DSL's, etc. to reside
145
What is CRC?
Cyclic Redundancy Check a technique for detecting common transmission errors
146
What is a T1 line?
a twisted copper wire that transfers voice and data from one location to another via digital signals
147
What is HTU?
Host Terminal Unit
148
Where would a brand new installed T1 line likely terminate for a business location?
Demarcation Point
149
What is POTS?
Plain Old Telephone Service
150
What is PBX?
Private branch exchange another name for a privately owned telephone system
151
Where would a ISP terminate their optical network line?
Optical Network Terminal Demarc termination for optical networks
152
What is a patch panel?
a device that bridges connections between the swtich and device. generally sits on top or below network switch and is connected to the swtich itself via patch cables.
153
What is a krone block?
A European alternative to the 110 block. requires a different type of punch down tool
154
What is a Giant?
A giant frame whose size exceeds the maximum transmission unit (MTU).
155
What is a Runt?
a frame that is smaller than the minimum frame size for IEEE-802.3 standard frames. Often caused by collisions
156
What is an Encapsulation Error?
an error message that says the router has a layer 3 packet to forward but is missing info of the layer 2 header that it needs to be able to forward the packet toward the next hop.
157
What is netstat?
Generates displays that show network status and protocol statistics. It is used more for problem determination than for performance measurement. Can be used to determine the amount of traffic on the network to check if network congestion is the issue.
158
What is traceroute?
clever command-line tool for tracing the path an IP packet takes across one or many networks.
159
What utilizes a well-written set of carefully developed and tested scripts to orchestrate runbooks and generate consistent server builds across an enterprise?
Configuration Management.
160
A network technician used a fusion splicer to repair the cable, but now the connection is experiencing reduce transmission efficiency, slower connection speed, and intermittent downtime. What is the MOST likely reason for these issues?
Low optical link light budget.
161
What happens when convergence on a routed network occurs?
all routers are aware of the network topology and the optimal route to send a packet.
162
Which of the following network devices is used to separate collision domains?
Switches
163
What is HIDS?
Host-based Intrusion Detection System
164
What is 802.1q?
networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network.
165
What is 802.1q also known as?
Dot1q
166
What is the technology for providing network access to multiple clients simultaneously by sharing a set of circuits, carriers, channels, or frequencies, instead of providing individual circuits or channels for each client.
Trunking
167
What is the standard trunking mechanism on Cisco switches?
802.1q
168
Describe how DHCP Reservations work
The Wi-Fi network is to assign the same IP address to a specific device by its Mac address. Once created it is saved as a reservation for faster connection
169
What port number does IMAP utilize for unencrypted communication?
143
170
What port number does IMAP use for encrypted communication?
993
171
What provides strong authentication for client/server applications by using secret-key cryptography and authenticates entities (clients and servers) on an open network typically using symmetric encryption and a trusted third party called the Key Distribution Center (KDC)?
Kerberos
172
Which of the 802.11 wireless technologies use MU-MIMO on non-overlapping channels to increase the wireless network's bandwidth?
802.11ac
173
What is the term for exploiting a weakness in a user's wireless headset to compromise their smartphone?
Bluejacking
174
Workers in a company branch office must visit an initial web page and click the "I agree" button before being able to surf the web. What is this an example of?
Acceptable Use Policy (AUP)
175
According to the OSI model, at which of the following layers is data encapsulated into bits?
Layer 4 (Transport)
176
Half of the marketing department is currently unable to access any network resources. A network technician determines that the switch has failed and needs replacement. What is required so that the technician can replace the switch and regain connectivity quickly?
Configuration backup
177
What port number does POP3 over SSL utilize?
995
178
Dion Training wants to create a DNS record to specify a host and port to use for a new instant messaging service. Which type of DNS record should be created?
SRV
179
What ports do HTTPS and RDP utilize?
443 & 3389
180
What should be implemented to prevent unauthorized traffic from entering through the firewall?
Application-aware firewall
181
What network protocol is used to send email from one server to another server?
SMTP
182
What port does SMTP use?
25
183
Sahra connects a pair of switches using redundant links. When she checks the link status of the two ports, one of them is not active. She changes the inactive link to another switchport, but the second link still remains inactive. What MOST likely is causing the second link to become disabled?
Spanning Tree
184
What technology is not commonly used by a captive portal to perform user redirection?
DHCP redirect
185
What type of telecommunication links is used to provide high-speed internet service over a system of coaxial or HFC cables?
Cable
186
A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?
Application-aware firewall
187
What type of sites might contain a datacenter with equipment, but it is not configured and doesn't contain any user or customer data yet?
Warm Site
188
You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?
Tracert(Traceroute)
189
What type of agreement is a non-legally binding document used to detail what common actions each party intends to perform?
A memorandum of understanding (MOU)
190
You want to ensure that the hypervisor's various virtual machines can communicate with each other over a network, but you don't want this network traffic to leave the hypervisor itself. What is the BEST solution to meet these requirements?
Install and configure a virtual switch
191
What is LACP's equivalent, except with fiber optic cable instead of UTP?
DWDM (Dense wavelength-division multiplexing )
192
What technology would be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?
DWDM (Dense Wavelength-Division Multiplexing)
193
You have been asked to determine if Ethernet0/0 is currently connected using OSPF or EIGRP on one of the network devices. Which of the following commands should you enter within the command line interface?
show route
194
What is likely to occur if twenty ethernet clients are connected to a hub in a local area network?
Collisions,Network Congestion,decreased performance
195
Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?
RADIUS
196
A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to identify the switches connected to each port quickly?
Enable a discovery protocol on the network devices
197
A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?
Surface Level Agreement
198
What can be issued from the command line to find the layer 3 hops to a remote destination?
traceroute
199
What two types of antennas must have small physical footprints and be lightweight as it will likely be mounted outside of a building?
Directional patch antenna, omnidirectional patch antennas
200
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate.What should the technician install to satisfy this requirement?
Add a multilayer switch and create a VLAN
201
A network architect is designing a highly redundant network with a distance vector routing protocol to prevent routing loops. The architect wants to configure the routers to advertise failed routes with the addition of an infinite metric. What should the architect configure to achieve this?
Route poisoning
202
What is 6to4 used for?
Converts IPv6 to IPv4. It is generally used to directly connect two routers because it normally requires a public IPv4 address. Commonly used for tunneling
203
What is 5Gs data transfer rates?
30mbps-1gbps
204
What is port 3306 used for?
For making MySQL database connections
205
What does RADIUS stand for?
Remote Authentication Dial-In User Service
206
What is (AAA) management?
Centralized Authentication, Authorization, and Accounting
207
What network protocol is commonly used for centralized authentication, authorization, and accounting (AAA) management in networks?
RADIUS
208
What is 802.1d?
Implementation of a spanning tree algorithm
209
What is Port 80?
HTTP port
210
At which of the following OSI layer does QoS operate?
Layer 3
211
Which of the following commands is used to display the statistics for a given switchport on a Cisco switch?
show interface
212
What is split horizon?
Prevents routing loops in distance-vector routing protocols
213
what does the MPLS technique stand for?
Multiprotocol Label Switching
214
what does mGRE stand for?
Multipoint Generic Routing Encapsulation
215
what is SDWAN?
Software Defined Wide Area Network
216
What is BEST used to perform a one-time temporary posture assessment in a NAC environment?
using a dissolvable agent or temporary agent
217
Which of the following must be combined with a threat to create risk?
Vulnerability
218
What are the differences between cold, warm, and hot sites?
Cold Site- Recovery sight that does not have hardware and network ready. Requires time to get online, costs the least up front Warm site- contains some pre-installed IT infrastructur/equipment, but it may not have full redundancy Hot site- a fully operational facility that mirrors the primary production environment
219
What is port 67&68?
Dynamic Host Configuration Protocol (DHCP); also used by Bootstrap Protocol (BOOTP) server;
220
what is port 69?
TFTP (Trivial File Transfer Protocol) uses TCP
221
What protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?
IPsec & TLS/SSL
222
You are working at the demarcation point between your network and the telecommunication service provider's network. What device serves as the demarcation point between the two networks?
Smart Jack
223
What protocol used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network.
mGRE(Multipoint Generic Routing Encapsulation)
224
What network device has features like Access Control Lists (ACLs), Quality of Service (QoS), and Virtual Routing and Forwarding (VRF).
Multi Layer switch
225
What is Split horizon commonly used in to improve the stability and efficiency of the network?
RIP (Routing Information Protocol)
226
What is MLPS used for and what layer of OSI does it reside?
Layer 2.5 Used for creating VPNs + tagging packets that routers can reference to increase QoS and Speed
227
You received an incident response report indicating a piece of malware was introduced into the company’s network through a remote workstation connected to the company’s servers over a VPN connection. Which of the following controls should be applied to prevent this type of incident from occurring again?
NAC
228
You are setting up uplink ports for multiple switches to communicate with one another. All of the VLANs should communicate from the designated server switch. Which setting should be set on the trunk ports if VLAN 1 is not the management VLAN?
Port Tagging
229
What is port tagging?
assigns network traffic to specific virtual LANs (VLANs) based on the physical port of a network device, such as a switch port.
230
What size MTU can be used for Jumbo frames?
9000
231
What Policy requires that all users, whether inside or outside the organization’s network, be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data?
Zero Trust
232
What does iSCSI stand for?
Internet Small Computer System Interface
233
What is iSCSI commonly used for?
a protocol used to facilitate communication and data transfer between storage devices
234
Which of the following ports are used to provide secure remote connection sessions over the Internet?
Port 22
235
What is a common issue with a Ethernet that has been squished or ran over to the point it becomes flattened, but is still connected to the network?
Crosstalk
236
What is crosstalk?
When 2 or more cables make incorrect contact in the ethernet cable
237
What does MPLS stand for?
Multiprotocol Layer Switch
238
The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which device should you connect a loopback adapter to test the connection?
Channel Service Unit/Data Service Unit
239
Which of the following protocols is considered an external routing protocol?
BGP
240
What component is used to describe the structure of a device subsystem using a hierarchical namespace containing all of the variables that may be set or read using SNMP?
MIB
240
What type of site would be used if your organization plans to switch to teleworking and remote operations in the event of a disaster?
Cloud Site
241
Which of the following ports should a client use to automatically request an IP address from the server?
67
242
Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?
Secure Sockets Layer (SSL)
243
What layer within software-defined networking determines how to route a data packet on the network?
Control layer
244
Your apartment already has cable TV installed. Which modem technologies should you utilize to get your internet installed in your apartment?
DOCSIS Modem
245
Which of the following tools allows you to view and modify the layer 2 to layer 3 address bindings?
ARP
246
Which of the following applies to data as it travels from Layer 7 to Layer 1 of the OSI model?
Encapsulation
247
What does NIPS stand for?
Network Intrusion Prevention System
248
What is a security appliance or software solution designed to monitor network traffic for malicious activity or security policy violations and to take action to block or mitigate such threats in real-time.
NIPS (Network Intrusion Prevention System)
249
What is a cname?
Canonical Name which associates one domain name to the alias of another
250
What record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic?
MX record
251
The customer requires that everything discussed in the meetings is installed and configured when a network engineer arrives onsite. Which document should the project manager provide the customer?
Statement of Work
252
What does WAF stand for?
Web Application Firewall
253
A company wants a DNS record to enter DKIM or SPF information into the domain name system to help prevent from spam coming from their domain. What type of DNS record should be created?
TXT
254
What are some common use cases for DNS TXT files?
Verification and Authentication, DEMARC, DKIM , and SPF
255
What does DEMARC stand for?
Domain-based Message Authentication, Reporting, and Conformance
256
what does DKIM stand for?
DomainKeys Identified Mail
257
What is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device?
NAT (network address translation)
258
What is used in Networking to facilitate communication between multiple sites or endpoints within a VPN?
mGRE (multipoint Generic Routing Encapsulation)
259
What allows enterprises to leverage any combination of transport services to securely connect users to applications?
SDWANs
260
What is the default Loop back Ip address?
127.0.0.1
261
Which of the following communication types cannot be used with IPv6?
Broadcast
262
Which cellular technology is compromised of HSPA+ and EV-DO for faster network speed?
3g
263
Which of the following wireless characteristic does channel bonding improve?
Improves throughput/avg speed
264
Which of the following communication types cannot be used with IPv6?
Broadcast
265
Whats the difference between a SC fiber cable and SL fiber cable?
mismatch connectors
266
What is a method of attacking the network resources of the VLAN by sending packets to a port not usually accessible from an end system?
VLAN Hopping
267
_______ servers allow connections from a _______ Client for sending and receiving files.
TFTP, TFTP
268
What would provide the highest level of physical security for the client if they are concerned with the theft of equipment from the datacenter?
physical vestibule
269
What is wireshark?
a protocol analyzer
270
what management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network?
policies
271
What state is the switchport with the LEAST desirable path placed by the spanning tree protocol when a switch has multiple paths to reach the root bridge?
blocking
272
What cable type is allowed to be used for roof/ceiling run by the building code?
Plenum cable
273
what tool measure the strength of a fiber connection?
Fiber light meter
274
SQLnet uses port ______
1521
275
Microsoft SQL uses port______
1433
276
MySQL uses ports _______
3306
277
What protocol is CONNECTION-LESS and used to ping devices?
ICMP
278
Are TCP, SSH, and SSL examples of connection oriented protocols or connectionless oriented protocols?
CONNECTION ORIENTED
279
Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?`
The cable is a straight-through cable
280
Legacy switches rely on what type of cable orientation?
cross over cable
281
Which network device operates at Layer 3?
Router
282
A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?
Site survey report
283
Which of the following layers within software-defined networking focuses on resource requests or information about the network?
Application layer
284
Barbara has connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router's configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?
Only allow listed MAC addresses can connect to the network
285
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
TACACS+
286
What is the first layer in software defined networking?
Infrastructure
287
What layer in software defined networking processes network frames and packets, and handles port forwarding, trunking, encrypting, and NAT?
Infrastructure layer(data plane)
288
What layer manages the actions of the data plane, and handles routing tables, session tables, nat tables, and dynamic routing Protocol updates?
Control layer
289
What layer configured and manages the device and handles/supports SSH, browser, and API?
Application layer
290
What is SSH?
Secure shell