Udemy NET+ Questions Flashcards

1
Q

What port numbers does Windows’ SMB use?

A

445&139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Port Number does Telnet use?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what port number does FTP and SFTP use?

A

20/21 & 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port number does SSH use?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port number is used for TLS/SSL Implicit encryption?

A

990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port does NTP use?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default port number for LDAP

A

389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the second LDAP port that supports encryption via SSL/TLS?

A

636

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AAA through RADIUS uses what to connect to a server’s LDAP?

A

Secret Shared Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the seven levels of the OSI model?

A

Physical layer.
Data link layer.
Network layer.
Transport layer.
Session layer.
Presentation layer.
Application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

A

De encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What port number does DNS utilize?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of frames are commonly used in SANs?

A

Jumbo Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is 802.11ac’s max speed? Frequency does it use?

A

3.5gbps 5.0GHZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is 802.11ax’s max speed? What frequency does it use?

A

9.8gbps both 2.4/5ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what combines the functionality of a firewall, malware scanner, and other security appliances into one device?

A

UTM (unified threat management)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the max speed for 802.11b?

A

11mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is the max speed for 802.11g? (what frequency does it use?)

A

54mbps (2.4ghz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is the max speed for 802.11a? (what frequency does it use?)

A

54mbps(5.0ghz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what is the ability of a cloud system to dynamically scale resources up or down based on the demand?

A

Rapid Elasticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What net topology connects one node to all other nodes directly creating a redundant network?

A

Mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What connects all of the other nodes to a central node?

A

Star topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What connects every device to exactly two other neighboring devices to form a circle?

A

Ring topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What tech prevents users from gaining access to network resources if they can plug their laptops into the network?

A

NAC (Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?

A

Evil Twin Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What attack consists of sitting between the connection of two parties and either observing or manipulating traffic?

A

Man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the maximum transmit speed and frequency of 802.11n?

A

600mbps, 2.4&5ghz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What port does Syslog use?

A

UDP port 514

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port does SNMP (Simple Network Management Protocol) use?

A

161&162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is Syslog mainly used for?

A

Analyzing historical data, pulls data only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the reason for SNMP’s primary use case?

A

real time visibility and can push network changes and pull data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is SNMP for?

A

Communications between firewall,servers,wireless devices, load balancing, and CCTV cameras

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Syslog severity level 2

A

Critical (Critical event)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Syslog severity level 0?

A

Emergency (System Unstable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Syslog severity level 1?

A

Alerts (Immediate action required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Syslog severity level 3?

A

Warnings (Warning event)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Syslog severity level 5?

A

Notifications (Unusual event but not error)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is Syslog severity level 6?

A

Informational (normal operational message-No Action Required)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is Syslog severity level 7?

A

Debugging (user initiated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is 802.1x?

A

Port-based network access control (PNAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What technology offers both real-time surveillance of security events and auto evaluation of collected event data?

A

SiEM- Security information event management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What technology do 802.11n and 802.11ac share?

A

Mimo(multi input,multi output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the name of a user or computer attempting to connect to an 802.1x network?

A

The supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television (CATV) system?

A

DOCSIS (Data Over Cable Service Interface Specification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What Protocol is used for connecting to a pc/server’s desktop from another location?

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What ports are used by SMTP and POP3 for unencrypted emails?

A

25 and 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What two ports are used by SMTP and POP3 FOR ENCRYPTED EMAILS?

A

587 and 995

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What enables DSL to be able faster than traditional dial up?

A

Higher frequency usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is 802.3af?

A

PoE (Power over ethernet) original

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what is 802.3at

A

PoE+ (power over ethernet plus), allows up to 30watts for two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Implementing 802.3af on a switch means what?

A

implementing PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is an OTDR?

A

Optical Time Domain Reflector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is an OTDR used for?

A

used for testing cable breaks, performance, and can provide an approximate location of where the cable break is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

When a workstation is believed to have a static ARP causing workstation connectivity issues, what should be the next step in the technicians trouble shooting method?

A

Remove the ARP entry from the User’s workstation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is ARP Spoofing?

A

An on path attack that intercepts and reroutes data. also known as ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is the general term for historical network performance data?

A

baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What would you compare current network traffic to in order to determine if there are any anomalies in network performance?

A

Baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What communication type is used in IPv6 to send a packet to the nearest interface that shares a common address in a routing table?

A

Any cast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What communication type is used during a live stream video where many people connect to view the same live streamed video?

A

Multi-cast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is the ability to administer/manage a network via the LAN?

A

In-Band Management Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What provides a secure dedicated alternate access method into an IT network infrastructure to administer connected devices and IT assets without using the corporate LAN?

A

Out-of-band Management Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What technology delivers multiple voice calls over a copper wire if you have and ISDN or T-1 connection?

A

Time-division Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What would cause a company’s border router’s net capacity to experience high loads during non working hours for the company’s web server?

A

DDoS Attack (Distributed Denial of Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What dynamic routing protocol supports both ipv4 and VLSM

A

OSPF(Open shortest path first)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

what is OSPF?

A

Open shortest path first. A link state routing procol based off SPF. Uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is VLSM?

A

Variable Length Subnet Mask, the process of subnetting subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is VLSM used for?

A

allows network administrators to create subnets with different subnet masks to efficiently make use of IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is OSPF used for?

A

it is a IP routing protocol that uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. originates from SPF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What is VRRP?

A

Virtual Router Redundnacy protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

At which layer doe OTM cells operate at?

A

Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What ports does SIP use?

A

5060/5061

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is SIP?

A

Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

If a website’s language is changed to another language(Russian or Korean for example) while you’re accessing the home page of a known site which has always been in english, you may be experiencing what type of attack?

A

On-Path Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is not required in a DHCP Server’s scope to allow hosts onto a LAN segment assigned by dynamic IP addresses in which hosts are able to access the internet and internal company servers?

A

Reservations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

what tool would you use to measure OHMs?

A

Multimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Why would there be no available SSIDs in an area where all other devices are connected to the wifi/network in a private or business setting?

A

Wireless Routers Broadcasting has been disabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is MIB?

A

Management Information Base

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is MIB used for?

A

Managing entities in a communication network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is a Trap

A

An Admin message sent from network devices to indicate that device connections have stopped or started

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is a verbose trap?

A

Contains information about the alterts including description, site name, and severity level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What type of trap has a unique identification number (OID) that allows the SNMP manager to distinguish them from each other?

A

Granular Trap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What layers are used in a three-tiered data center network architecture?

A

Core layer, access layer, aggregation layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What would cause your IP address being different online versus locally in your network?

A

Gateway conducting NAT or PAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is PAT?

A

Port Address translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What network device is used to separate broadcast domains?

A

a router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

What tool can be used to prevent an attack from modifying the MAC address to IP bindings within the local area network?

A

Dynamic ARP Inspections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

what is DAI?

A

Dynamic Arp Inspections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Would changes in the network’s test lab require a scheduled maintenance window?

A

no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

would changes made in production devices that could interrupt or cause the device to go offline require a scheduled maintenance window?

A

yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is done to company devices to prevent sensitive data from being compromised when they are being recycled to allow a school to repurpose old laptops/company hardware with storage?

A

Wiping the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

If a pentester has the ability to read TLS traffic from the webserver due to a software bug, what is most likely the mitigation technique used?

A

Ensure patches are deployed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

If your server has been a victim of a web based attack, which port would be checked to source the attacker’s target?

A

port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Ping requests occur at which layer of the OSI?

A

Layer 3, network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is LACP?

A

Link aggregation control protocol is used to group numerous physical ports to make one high bandwidth path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What type of fire suppression system uses a sprinkler system with water to extinguish a fire but requires both an actuator and the sprinklers to be tripped prior to water being released?

A

Pre-action system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

What type of sprinkler system constantly maintains water within the sprinkler piping without requiring an actuator?

A

Wet Pipe System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which of the following is used to identify a variable that may be set or read using SNMP?

A

OID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is OID?

A

Unique Object Identifier, Identifies a variable that can be read or set using SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

Is 802.3ad active or passive?

A

Active, both NICs must be on at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is the 802.3ad protocol?

A

Link Aggregation Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

what is TLS?

A

Transport layer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

what is SSL?

A

Secure Sockets Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

What is ISDN?

A

Integrated Services Digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

What is a Hypervisor?

A

Also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What protocol will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?

A

Border Gateway Protocol BGP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

When restricting a users network traffic to stop them from having public internet access, which network traffic should you disable?

A

The user’s traffic to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?

A

Client Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What security feature would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port?

A

Port Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Which port must be allowed to enable communications through your firewall between the web application and your database server?

A

1433

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

A Website needs to be continually accessible to it’s students and reachable 24x7. What networking concept would ensure the site stay online?

A

High Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

What is the lowest layer (bottom layer) of a bare-metal virtualization environment?

A

Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?

A

Wiring diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What is RPO?

A

Recovery Point Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What does RPO measure?

A

a point in time that you would recover data and defines how much data you’re prepared to lose in accordance with the Business continuity plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is MTTR?

A

Mean time to repair. Average time to repair failed hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

What is MTTF?

A

The average time before a system or its hardware fails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which of the following network topologies requires that all nodes have a point-to-point connection with every other node in the network?

A

Mesh Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which SNMP options should you enable to ensure the data is transferred confidentially?

A

authPriv

117
Q

What piece of hardware is most likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A

Analog Modem

118
Q

The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would BEST meet the client’s requirements?

A

Ring Topology

119
Q

What would you call mutlple star topology networks connected together over a large swath of land?

A

Hybrid topology

120
Q

What should you do if a router’s advertised functions are missing after out of the box installation?

A

Flash the latest firmware to the router

121
Q

The network administrator logs into the admin area of the user’s access point and discovers that multiple unknown devices are connected to it. What is MOST likely the cause of this issue?

A

a WPS attack

122
Q

What is a FQDN?

A

Fully Qualified Domain Name

123
Q

Which of the following components is used to identify a variable that may be set or read using SNMP?

A

OID

124
Q

Which of the following encryption types was used by WPA to better secure wireless networks than WEP?

A

TKIP (temporal key integrity protocol)

125
Q

What is TKIP?

A

Temporal key integrity protocol, designed to provide more secure encryption than the earlier Wired Equivalent Privacy (WEP), without needing to replace existing hardware.

126
Q

What is AES?

A

Advanced Encryption Standard, a symmetric block cipher chosen by the U.S. government to protect classified information. would take trillions of years to brute force a 128bit AES block

127
Q

A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they can access the sites using the web browsers. What is the MOST likely cause of the failed pings?

A

ICMP traffic being blocked by the firewall.

128
Q

What protocol does Ping rely on?

A

ICMP

129
Q

What does ICMP stand for?

A

Internet Control Message Protocol

130
Q

What is Internet Control Message Protocol?

A

used for reporting errors and performing network diagnostics

131
Q

What are Site Surveys in networking?

A

A wireless site survey is a physical survey of the premises where the wireless network will be installed

132
Q

What is a network topology?

A

is the physical and logical arrangement of nodes and connections in a network

133
Q

In a SQL server, what is port 3306 used for?

A

Allowing inbound traffic from all external IP addresses to MySQL

134
Q

What is the best practice for SQL servers to prevent DoS, Buffer Overflow, SQL Injection attacks?

A

Block public access, and port 3306.

135
Q

You opened your web browser and attempted to visit DionTraining.com, but you appear to have been redirected to a malicious website instead. What type of attack is being conducted?

A

DNS Poisoning

136
Q

What is it called when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website?

A

DNS poisoning

137
Q

Ports 1521 is used by what server type?

A

SQLnet

138
Q

Port 1433 is used by what server type?

A

Microsoft SQL

139
Q

Port 3306 is used by what server type?

A

MySQL

140
Q

What port number is RDP use?

A

Port 3389

141
Q

Is ICMP is connectionless or connection based protocol?

A

connection less

142
Q

Which of the following components is used by an agent to send a complete set of key-pair values about a significant event or condition that is occurring in real-time by providing a full list of variables and values for a given device to a manager?

A

Verbose trap

143
Q

What is IDF?

A

Independent Distribution Frame
a remote room or closet connected to the MDF

144
Q

What is MDF?

A

Main Distribution Frame
is the main computer room for servers, hubs, routers, DSL’s, etc. to reside

145
Q

What is CRC?

A

Cyclic Redundancy Check
a technique for detecting common transmission errors

146
Q

What is a T1 line?

A

a twisted copper wire that transfers voice and data from one location to another via digital signals

147
Q

What is HTU?

A

Host Terminal Unit

148
Q

Where would a brand new installed T1 line likely terminate for a business location?

A

Demarcation Point

149
Q

What is POTS?

A

Plain Old Telephone Service

150
Q

What is PBX?

A

Private branch exchange
another name for a privately owned telephone system

151
Q

Where would a ISP terminate their optical network line?

A

Optical Network Terminal
Demarc termination for optical networks

152
Q

What is a patch panel?

A

a device that bridges connections between the swtich and device. generally sits on top or below network switch and is connected to the swtich itself via patch cables.

153
Q

What is a krone block?

A

A European alternative to the 110 block. requires a different type of punch down tool

154
Q

What is a Giant?

A

A giant frame whose size exceeds the maximum transmission unit (MTU).

155
Q

What is a Runt?

A

a frame that is smaller than the minimum frame size for IEEE-802.3 standard frames. Often caused by collisions

156
Q

What is an Encapsulation Error?

A

an error message that says the router has a layer 3 packet to forward but is missing info of the layer 2 header that it needs to be able to forward the packet toward the next hop.

157
Q

What is netstat?

A

Generates displays that show network status and protocol statistics. It is used more for problem determination than for performance measurement. Can be used to determine the amount of traffic on the network to check if network congestion is the issue.

158
Q

What is traceroute?

A

clever command-line tool for tracing the path an IP packet takes across one or many networks.

159
Q

What utilizes a well-written set of carefully developed and tested scripts to orchestrate runbooks and generate consistent server builds across an enterprise?

A

Configuration Management.

160
Q

A network technician used a fusion splicer to repair the cable, but now the connection is experiencing reduce transmission efficiency, slower connection speed, and intermittent downtime. What is the MOST likely reason for these issues?

A

Low optical link light budget.

161
Q

What happens when convergence on a routed network occurs?

A

all routers are aware of the network topology and the optimal route to send a packet.

162
Q

Which of the following network devices is used to separate collision domains?

A

Switches

163
Q

What is HIDS?

A

Host-based Intrusion Detection System

164
Q

What is 802.1q?

A

networking standard that supports virtual local area networking (VLANs) on an IEEE 802.3 Ethernet network.

165
Q

What is 802.1q also known as?

A

Dot1q

166
Q

What is the technology for providing network access to multiple clients simultaneously by sharing a set of circuits, carriers, channels, or frequencies, instead of providing individual circuits or channels for each client.

A

Trunking

167
Q

What is the standard trunking mechanism on Cisco switches?

A

802.1q

168
Q

Describe how DHCP Reservations work

A

The Wi-Fi network is to assign the same IP address to a specific device by its Mac address. Once created it is saved as a reservation for faster connection

169
Q

What port number does IMAP utilize for unencrypted communication?

A

143

170
Q

What port number does IMAP use for encrypted communication?

A

993

171
Q

What provides strong authentication for client/server applications by using secret-key cryptography and authenticates entities (clients and servers) on an open network typically using symmetric encryption and a trusted third party called the Key Distribution Center (KDC)?

A

Kerberos

172
Q

Which of the 802.11 wireless technologies use MU-MIMO on non-overlapping channels to increase the wireless network’s bandwidth?

A

802.11ac

173
Q

What is the term for exploiting a weakness in a user’s wireless headset to compromise their smartphone?

A

Bluejacking

174
Q

Workers in a company branch office must visit an initial web page and click the “I agree” button before being able to surf the web. What is this an example of?

A

Acceptable Use Policy (AUP)

175
Q

According to the OSI model, at which of the following layers is data encapsulated into bits?

A

Layer 4 (Transport)

176
Q

Half of the marketing department is currently unable to access any network resources. A network technician determines that the switch has failed and needs replacement. What is required so that the technician can replace the switch and regain connectivity quickly?

A

Configuration backup

177
Q

What port number does POP3 over SSL utilize?

A

995

178
Q

Dion Training wants to create a DNS record to specify a host and port to use for a new instant messaging service. Which type of DNS record should be created?

A

SRV

179
Q

What ports do HTTPS and RDP utilize?

A

443 & 3389

180
Q

What should be implemented to prevent unauthorized traffic from entering through the firewall?

A

Application-aware firewall

181
Q

What network protocol is used to send email from one server to another server?

A

SMTP

182
Q

What port does SMTP use?

A

25

183
Q

Sahra connects a pair of switches using redundant links. When she checks the link status of the two ports, one of them is not active. She changes the inactive link to another switchport, but the second link still remains inactive. What MOST likely is causing the second link to become disabled?

A

Spanning Tree

184
Q

What technology is not commonly used by a captive portal to perform user redirection?

A

DHCP redirect

185
Q

What type of telecommunication links is used to provide high-speed internet service over a system of coaxial or HFC cables?

A

Cable

186
Q

A new piece of malware attempts to exfiltrate user data by hiding the traffic and sending it over a TLS-encrypted outbound traffic over random ports. What technology would be able to detect and block this type of traffic?

A

Application-aware firewall

187
Q

What type of sites might contain a datacenter with equipment, but it is not configured and doesn’t contain any user or customer data yet?

A

Warm Site

188
Q

You are trying to connect to another server on the network but are unable to ping it. You have determined that the other server is located on the 10.0.0.1/24 network, but your workstation is located on the 192.168.1.1/24 network. Which of the following tools should you use to begin troubleshooting the connection between your workstation and the server?

A

Tracert(Traceroute)

189
Q

What type of agreement is a non-legally binding document used to detail what common actions each party intends to perform?

A

A memorandum of understanding (MOU)

190
Q

You want to ensure that the hypervisor’s various virtual machines can communicate with each other over a network, but you don’t want this network traffic to leave the hypervisor itself. What is the BEST solution to meet these requirements?

A

Install and configure a virtual switch

191
Q

What is LACP’s equivalent, except with fiber optic cable instead of UTP?

A

DWDM (Dense wavelength-division multiplexing )

192
Q

What technology would be used to increase bandwidth over an existing fiber-optic network by combining multiple signals at different wavelengths?

A

DWDM (Dense Wavelength-Division Multiplexing)

193
Q

You have been asked to determine if Ethernet0/0 is currently connected using OSPF or EIGRP on one of the network devices. Which of the following commands should you enter within the command line interface?

A

show route

194
Q

What is likely to occur if twenty ethernet clients are connected to a hub in a local area network?

A

Collisions,Network Congestion,decreased performance

195
Q

Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of the following is the MOST likely cause of the issue?

A

RADIUS

196
Q

A network technician is troubleshooting connectivity problems between switches but suspects the ports are not properly labeled. What option will help to identify the switches connected to each port quickly?

A

Enable a discovery protocol on the network devices

197
Q

A small office has an Internet connection that drops out at least two times per week. It often takes until the next day for the service provider to come out and fix the issue. What should you create with the service provider to reduce this downtime in the future?

A

Surface Level Agreement

198
Q

What can be issued from the command line to find the layer 3 hops to a remote destination?

A

traceroute

199
Q

What two types of antennas must have small physical footprints and be lightweight as it will likely be mounted outside of a building?

A

Directional patch antenna, omnidirectional patch antennas

200
Q

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate.What should the technician install to satisfy this requirement?

A

Add a multilayer switch and create a VLAN

201
Q

A network architect is designing a highly redundant network with a distance vector routing protocol to prevent routing loops. The architect wants to configure the routers to advertise failed routes with the addition of an infinite metric. What should the architect configure to achieve this?

A

Route poisoning

202
Q

What is 6to4 used for?

A

Converts IPv6 to IPv4. It is generally used to directly connect two routers because it normally requires a public IPv4 address. Commonly used for tunneling

203
Q

What is 5Gs data transfer rates?

A

30mbps-1gbps

204
Q

What is port 3306 used for?

A

For making MySQL database connections

205
Q

What does RADIUS stand for?

A

Remote Authentication Dial-In User Service

206
Q

What is (AAA) management?

A

Centralized Authentication, Authorization, and Accounting

207
Q

What network protocol is commonly used for centralized authentication, authorization, and accounting (AAA) management in networks?

A

RADIUS

208
Q

What is 802.1d?

A

Implementation of a spanning tree algorithm

209
Q

What is Port 80?

A

HTTP port

210
Q

At which of the following OSI layer does QoS operate?

A

Layer 3

211
Q

Which of the following commands is used to display the statistics for a given switchport on a Cisco switch?

A

show interface

212
Q

What is split horizon?

A

Prevents routing loops in distance-vector routing protocols

213
Q

what does the MPLS technique stand for?

A

Multiprotocol Label Switching

214
Q

what does mGRE stand for?

A

Multipoint Generic Routing Encapsulation

215
Q

what is SDWAN?

A

Software Defined Wide Area Network

216
Q

What is BEST used to perform a one-time temporary posture assessment in a NAC environment?

A

using a dissolvable agent or temporary agent

217
Q

Which of the following must be combined with a threat to create risk?

A

Vulnerability

218
Q

What are the differences between cold, warm, and hot sites?

A

Cold Site- Recovery sight that does not have hardware and network ready. Requires time to get online, costs the least up front
Warm site- contains some pre-installed IT infrastructur/equipment, but it may not have full redundancy
Hot site- a fully operational facility that mirrors the primary production environment

219
Q

What is port 67&68?

A

Dynamic Host Configuration Protocol (DHCP); also used by Bootstrap Protocol (BOOTP) server;

220
Q

what is port 69?

A

TFTP (Trivial File Transfer Protocol) uses TCP

221
Q

What protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

A

IPsec & TLS/SSL

222
Q

You are working at the demarcation point between your network and the telecommunication service provider’s network. What device serves as the demarcation point between the two networks?

A

Smart Jack

223
Q

What protocol used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network.

A

mGRE(Multipoint Generic Routing Encapsulation)

224
Q

What network device has features like Access Control Lists (ACLs), Quality of Service (QoS), and Virtual Routing and Forwarding (VRF).

A

Multi Layer switch

225
Q

What is Split horizon commonly used in to improve the stability and efficiency of the network?

A

RIP (Routing Information Protocol)

226
Q

What is MLPS used for and what layer of OSI does it reside?

A

Layer 2.5
Used for creating VPNs + tagging packets that routers can reference to increase QoS and Speed

227
Q

You received an incident response report indicating a piece of malware was introduced into the company’s network through a remote workstation connected to the company’s servers over a VPN connection. Which of the following controls should be applied to prevent this type of incident from occurring again?

A

NAC

228
Q

You are setting up uplink ports for multiple switches to communicate with one another. All of the VLANs should communicate from the designated server switch. Which setting should be set on the trunk ports if VLAN 1 is not the management VLAN?

A

Port Tagging

229
Q

What is port tagging?

A

assigns network traffic to specific virtual LANs (VLANs) based on the physical port of a network device, such as a switch port.

230
Q

What size MTU can be used for Jumbo frames?

A

9000

231
Q

What Policy requires that all users, whether inside or outside the organization’s network, be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data?

A

Zero Trust

232
Q

What does iSCSI stand for?

A

Internet Small Computer System Interface

233
Q

What is iSCSI commonly used for?

A

a protocol used to facilitate communication and data transfer between storage devices

234
Q

Which of the following ports are used to provide secure remote connection sessions over the Internet?

A

Port 22

235
Q

What is a common issue with a Ethernet that has been squished or ran over to the point it becomes flattened, but is still connected to the network?

A

Crosstalk

236
Q

What is crosstalk?

A

When 2 or more cables make incorrect contact in the ethernet cable

237
Q

What does MPLS stand for?

A

Multiprotocol Layer Switch

238
Q

The ISP has asked you to place a loopback on the device which connects your T-1 line to their central office. Which device should you connect a loopback adapter to test the connection?

A

Channel Service Unit/Data Service Unit

239
Q

Which of the following protocols is considered an external routing protocol?

A

BGP

240
Q

What component is used to describe the structure of a device subsystem using a hierarchical namespace containing all of the variables that may be set or read using SNMP?

A

MIB

240
Q

What type of site would be used if your organization plans to switch to teleworking and remote operations in the event of a disaster?

A

Cloud Site

241
Q

Which of the following ports should a client use to automatically request an IP address from the server?

A

67

242
Q

Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?

A

Secure Sockets Layer (SSL)

243
Q

What layer within software-defined networking determines how to route a data packet on the network?

A

Control layer

244
Q

Your apartment already has cable TV installed. Which modem technologies should you utilize to get your internet installed in your apartment?

A

DOCSIS Modem

245
Q

Which of the following tools allows you to view and modify the layer 2 to layer 3 address bindings?

A

ARP

246
Q

Which of the following applies to data as it travels from Layer 7 to Layer 1 of the OSI model?

A

Encapsulation

247
Q

What does NIPS stand for?

A

Network Intrusion Prevention System

248
Q

What is a security appliance or software solution designed to monitor network traffic for malicious activity or security policy violations and to take action to block or mitigate such threats in real-time.

A

NIPS (Network Intrusion Prevention System)

249
Q

What is a cname?

A

Canonical Name which associates one domain name to the alias of another

250
Q

What record is used for outgoing (SMTP) and incoming (POP3/IMAP) traffic?

A

MX record

251
Q

The customer requires that everything discussed in the meetings is installed and configured when a network engineer arrives onsite. Which document should the project manager provide the customer?

A

Statement of Work

252
Q

What does WAF stand for?

A

Web Application Firewall

253
Q

A company wants a DNS record to enter DKIM or SPF information into the domain name system to help prevent from spam coming from their domain. What type of DNS record should be created?

A

TXT

254
Q

What are some common use cases for DNS TXT files?

A

Verification and Authentication, DEMARC, DKIM , and SPF

255
Q

What does DEMARC stand for?

A

Domain-based Message Authentication, Reporting, and Conformance

256
Q

what does DKIM stand for?

A

DomainKeys Identified Mail

257
Q

What is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device?

A

NAT (network address translation)

258
Q

What is used in Networking to facilitate communication between multiple sites or endpoints within a VPN?

A

mGRE (multipoint Generic Routing Encapsulation)

259
Q

What allows enterprises to leverage any combination of transport services to securely connect users to applications?

A

SDWANs

260
Q

What is the default Loop back Ip address?

A

127.0.0.1

261
Q

Which of the following communication types cannot be used with IPv6?

A

Broadcast

262
Q

Which cellular technology is compromised of HSPA+ and EV-DO for faster network speed?

A

3g

263
Q

Which of the following wireless characteristic does channel bonding improve?

A

Improves throughput/avg speed

264
Q

Which of the following communication types cannot be used with IPv6?

A

Broadcast

265
Q

Whats the difference between a SC fiber cable and SL fiber cable?

A

mismatch connectors

266
Q

What is a method of attacking the network resources of the VLAN by sending packets to a port not usually accessible from an end system?

A

VLAN Hopping

267
Q

_______ servers allow connections from a _______ Client for sending and receiving files.

A

TFTP, TFTP

268
Q

What would provide the highest level of physical security for the client if they are concerned with the theft of equipment from the datacenter?

A

physical vestibule

269
Q

What is wireshark?

A

a protocol analyzer

270
Q

what management control should be implemented to ensure employees are using encryption to transmit any sensitive information over the network?

A

policies

271
Q

What state is the switchport with the LEAST desirable path placed by the spanning tree protocol when a switch has multiple paths to reach the root bridge?

A

blocking

272
Q

What cable type is allowed to be used for roof/ceiling run by the building code?

A

Plenum cable

273
Q

what tool measure the strength of a fiber connection?

A

Fiber light meter

274
Q

SQLnet uses port ______

A

1521

275
Q

Microsoft SQL uses port______

A

1433

276
Q

MySQL uses ports _______

A

3306

277
Q

What protocol is CONNECTION-LESS and used to ping devices?

A

ICMP

278
Q

Are TCP, SSH, and SSL examples of connection oriented protocols or connectionless oriented protocols?

A

CONNECTION ORIENTED

279
Q

Max is a network technician who just terminated the ends on a new copper cable used between two legacy switches. When he connects the two switches using the cable, they fail to establish a connection. What is MOST likely the issue?`

A

The cable is a straight-through cable

280
Q

Legacy switches rely on what type of cable orientation?

A

cross over cable

281
Q

Which network device operates at Layer 3?

A

Router

282
Q

A wireless networking technician has completed an assessment of a wireless network and documented the detected signal strengths in various locations. Which of the following best describes this document?

A

Site survey report

283
Q

Which of the following layers within software-defined networking focuses on resource requests or information about the network?

A

Application layer

284
Q

Barbara has connected her personal wireless router to a network jack inside her office. The router cannot get a DHCP address even though her corporate laptop can get a DHCP address when connected to the same jack. Barbara checked the router’s configuration to ensure it is set up to obtain a DHCP address. Which of the following is the MOST likely reason that the router is not getting a DHCP address?

A

Only allow listed MAC addresses can connect to the network

285
Q

Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?

A

TACACS+

286
Q

What is the first layer in software defined networking?

A

Infrastructure

287
Q

What layer in software defined networking processes network frames and packets, and handles port forwarding, trunking, encrypting, and NAT?

A

Infrastructure layer(data plane)

288
Q

What layer manages the actions of the data plane, and handles routing tables, session tables, nat tables, and dynamic routing Protocol updates?

A

Control layer

289
Q

What layer configured and manages the device and handles/supports SSH, browser, and API?

A

Application layer

290
Q

What is SSH?

A

Secure shell