Udemy NET+ Questions Flashcards
What port numbers does Windows’ SMB use?
445&139
What Port Number does Telnet use?
23
what port number does FTP and SFTP use?
20/21 & 22
What port number does SSH use?
22
What port number is used for TLS/SSL Implicit encryption?
990
What port does NTP use?
123
What is the default port number for LDAP
389
What is the second LDAP port that supports encryption via SSL/TLS?
636
AAA through RADIUS uses what to connect to a server’s LDAP?
Secret Shared Key
What are the seven levels of the OSI model?
Physical layer.
Data link layer.
Network layer.
Transport layer.
Session layer.
Presentation layer.
Application layer
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
De encapsulation
What port number does DNS utilize?
53
What type of frames are commonly used in SANs?
Jumbo Frames
what is 802.11ac’s max speed? Frequency does it use?
3.5gbps 5.0GHZ
What is 802.11ax’s max speed? What frequency does it use?
9.8gbps both 2.4/5ghz
what combines the functionality of a firewall, malware scanner, and other security appliances into one device?
UTM (unified threat management)
What is the max speed for 802.11b?
11mbps
what is the max speed for 802.11g? (what frequency does it use?)
54mbps (2.4ghz)
what is the max speed for 802.11a? (what frequency does it use?)
54mbps(5.0ghz)
what is the ability of a cloud system to dynamically scale resources up or down based on the demand?
Rapid Elasticity
What net topology connects one node to all other nodes directly creating a redundant network?
Mesh topology
What connects all of the other nodes to a central node?
Star topology
What connects every device to exactly two other neighboring devices to form a circle?
Ring topology
What tech prevents users from gaining access to network resources if they can plug their laptops into the network?
NAC (Network Access Control)
What is a common technique used by malicious individuals to perform an on-path attack on a wireless network?
Evil Twin Attack
What attack consists of sitting between the connection of two parties and either observing or manipulating traffic?
Man in the middle attack
What is the maximum transmit speed and frequency of 802.11n?
600mbps, 2.4&5ghz
What port does Syslog use?
UDP port 514
What port does SNMP (Simple Network Management Protocol) use?
161&162
What is Syslog mainly used for?
Analyzing historical data, pulls data only
What is the reason for SNMP’s primary use case?
real time visibility and can push network changes and pull data
What is SNMP for?
Communications between firewall,servers,wireless devices, load balancing, and CCTV cameras
What is Syslog severity level 2
Critical (Critical event)
What is Syslog severity level 0?
Emergency (System Unstable)
What is Syslog severity level 1?
Alerts (Immediate action required)
What is Syslog severity level 3?
Warnings (Warning event)
What is Syslog severity level 5?
Notifications (Unusual event but not error)
What is Syslog severity level 6?
Informational (normal operational message-No Action Required)
What is Syslog severity level 7?
Debugging (user initiated)
What is 802.1x?
Port-based network access control (PNAC)
What technology offers both real-time surveillance of security events and auto evaluation of collected event data?
SiEM- Security information event management
What technology do 802.11n and 802.11ac share?
Mimo(multi input,multi output)
What is the name of a user or computer attempting to connect to an 802.1x network?
The supplicant
What is the international telecommunications standard that permits the addition of high-bandwidth data transfer to an existing cable television (CATV) system?
DOCSIS (Data Over Cable Service Interface Specification)
What Protocol is used for connecting to a pc/server’s desktop from another location?
Remote Desktop Protocol
What ports are used by SMTP and POP3 for unencrypted emails?
25 and 110
What two ports are used by SMTP and POP3 FOR ENCRYPTED EMAILS?
587 and 995
What enables DSL to be able faster than traditional dial up?
Higher frequency usage
What is 802.3af?
PoE (Power over ethernet) original
what is 802.3at
PoE+ (power over ethernet plus), allows up to 30watts for two devices
Implementing 802.3af on a switch means what?
implementing PoE
What is an OTDR?
Optical Time Domain Reflector
What is an OTDR used for?
used for testing cable breaks, performance, and can provide an approximate location of where the cable break is
When a workstation is believed to have a static ARP causing workstation connectivity issues, what should be the next step in the technicians trouble shooting method?
Remove the ARP entry from the User’s workstation
What is ARP Spoofing?
An on path attack that intercepts and reroutes data. also known as ARP poisoning
What is the general term for historical network performance data?
baseline
What would you compare current network traffic to in order to determine if there are any anomalies in network performance?
Baseline
What communication type is used in IPv6 to send a packet to the nearest interface that shares a common address in a routing table?
Any cast
What communication type is used during a live stream video where many people connect to view the same live streamed video?
Multi-cast
What is the ability to administer/manage a network via the LAN?
In-Band Management Network
What provides a secure dedicated alternate access method into an IT network infrastructure to administer connected devices and IT assets without using the corporate LAN?
Out-of-band Management Network
What technology delivers multiple voice calls over a copper wire if you have and ISDN or T-1 connection?
Time-division Multiplexing
What would cause a company’s border router’s net capacity to experience high loads during non working hours for the company’s web server?
DDoS Attack (Distributed Denial of Service)
What dynamic routing protocol supports both ipv4 and VLSM
OSPF(Open shortest path first)
what is OSPF?
Open shortest path first. A link state routing procol based off SPF. Uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. .
What is VLSM?
Variable Length Subnet Mask, the process of subnetting subnets
What is VLSM used for?
allows network administrators to create subnets with different subnet masks to efficiently make use of IP addresses
What is OSPF used for?
it is a IP routing protocol that uses a mathematical algorithm to calculate the most efficient path to direct traffic on IP networks. originates from SPF.
What is VRRP?
Virtual Router Redundnacy protocol
At which layer doe OTM cells operate at?
Data Link Layer
What ports does SIP use?
5060/5061
What is SIP?
Session Initiation Protocol
If a website’s language is changed to another language(Russian or Korean for example) while you’re accessing the home page of a known site which has always been in english, you may be experiencing what type of attack?
On-Path Attack
What is not required in a DHCP Server’s scope to allow hosts onto a LAN segment assigned by dynamic IP addresses in which hosts are able to access the internet and internal company servers?
Reservations
what tool would you use to measure OHMs?
Multimeter
Why would there be no available SSIDs in an area where all other devices are connected to the wifi/network in a private or business setting?
Wireless Routers Broadcasting has been disabled
What is MIB?
Management Information Base
What is MIB used for?
Managing entities in a communication network
What is a Trap
An Admin message sent from network devices to indicate that device connections have stopped or started
What is a verbose trap?
Contains information about the alterts including description, site name, and severity level
What type of trap has a unique identification number (OID) that allows the SNMP manager to distinguish them from each other?
Granular Trap
What layers are used in a three-tiered data center network architecture?
Core layer, access layer, aggregation layer
What would cause your IP address being different online versus locally in your network?
Gateway conducting NAT or PAT
What is PAT?
Port Address translation
What network device is used to separate broadcast domains?
a router
What tool can be used to prevent an attack from modifying the MAC address to IP bindings within the local area network?
Dynamic ARP Inspections
what is DAI?
Dynamic Arp Inspections
Would changes in the network’s test lab require a scheduled maintenance window?
no
would changes made in production devices that could interrupt or cause the device to go offline require a scheduled maintenance window?
yes
What is done to company devices to prevent sensitive data from being compromised when they are being recycled to allow a school to repurpose old laptops/company hardware with storage?
Wiping the device
If a pentester has the ability to read TLS traffic from the webserver due to a software bug, what is most likely the mitigation technique used?
Ensure patches are deployed
If your server has been a victim of a web based attack, which port would be checked to source the attacker’s target?
port 443
Ping requests occur at which layer of the OSI?
Layer 3, network
What is LACP?
Link aggregation control protocol is used to group numerous physical ports to make one high bandwidth path
What type of fire suppression system uses a sprinkler system with water to extinguish a fire but requires both an actuator and the sprinklers to be tripped prior to water being released?
Pre-action system
What type of sprinkler system constantly maintains water within the sprinkler piping without requiring an actuator?
Wet Pipe System
Which of the following is used to identify a variable that may be set or read using SNMP?
OID
What is OID?
Unique Object Identifier, Identifies a variable that can be read or set using SNMP
Is 802.3ad active or passive?
Active, both NICs must be on at the same time
What is the 802.3ad protocol?
Link Aggregation Control Protocol
what is TLS?
Transport layer security
what is SSL?
Secure Sockets Layer
What is ISDN?
Integrated Services Digital Network
What is a Hypervisor?
Also known as a virtual machine monitor or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines.
What protocol will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
Border Gateway Protocol BGP
When restricting a users network traffic to stop them from having public internet access, which network traffic should you disable?
The user’s traffic to network
What requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?
Client Server
What security feature would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port?
Port Security
Which port must be allowed to enable communications through your firewall between the web application and your database server?
1433
A Website needs to be continually accessible to it’s students and reachable 24x7. What networking concept would ensure the site stay online?
High Availability
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Physical Layer
Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?
Wiring diagram
What is RPO?
Recovery Point Objective
What does RPO measure?
a point in time that you would recover data and defines how much data you’re prepared to lose in accordance with the Business continuity plan
What is MTTR?
Mean time to repair. Average time to repair failed hardware
What is MTTF?
The average time before a system or its hardware fails
Which of the following network topologies requires that all nodes have a point-to-point connection with every other node in the network?
Mesh Network