Udemy Tests Flashcards
A workstation is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can communicate with the VLAN gateway and access websites on the Internet. What might cause this issue?
The port is configured as a trunk port (802.1q) instead of an access port. Therefore the workstation is unable to contact the DHCP server.
Network traffic is not re routed automatically if an interruption occurs.
Static routing. New routes must be entered manually.
Which of the following technologies combines the functionality of a firewall, malware scanner, and other security appliances into one device?
UTM (Unified Threat Management) Appliance
An additional network segment is urgently needed for QA testing on the external network. A software release could be impacted if this change is not immediate. The request comes directly from management and was just approved through the emergency change management process. Which of the following should the technician do?
Make the change, document the requester, and document all network changes.
What allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps?
MIMO (Multiple-Input / Multiple-Output) and MU-MIMO (Multi User). MIMO uses multiple antennas for transmission and reception, resulting in a higher speed than 802.11a and 802.11g networks.
This happens to data as it travels from Layer 1 to Layer 7
De-encapsulation
What is a Split DNS?
Split DNS is an implementation in which two DNS servers are used for external and internal networks. This provides a security and privacy mechanism in which internal users use the internal DNS and untrusted, external users use the external DNS. There are two sets of DNS information, and the results are given based on the source address of the requester.
Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?
802.11g utilizes the 2.4GHz frequency and can reach up to 54 Mbps
Which type of wireless network utilizes the 5GHz frequency band and reaches speeds of up to 54 Mbps?
802.11a utilizes the 5GHz band and cbs reach up to 54 Mbps
Which type of wireless network utilizes the 2.4GHz frequency and reaches speeds of up to 11 Mbps?
802.11b utilizes the 2.4GHz frequency band and can reach speeds up to 11Mbps
Which type of wireless network utilizes both 5 GHz and 2.4 GHz frequency band and reaches speeds of up to 600 Mbps (5GHz) or 108 Mbps (2.4GHz). This standard also introduced MIMO.
802.11n can use both 5 GHz and 2.4 GHz.
Which type of wireless network utilizes the 5 GHz frequency band and reaches speeds of up to 3.5 Gbps?
802.11ac (Wi-Fi 5)
Which type of wireless network utilizes both the 5GHz and 2.4 GHz frequency band and reaches speeds of up to 9.6 Gbps?
802.11ax (Wi-Fi 6)
You are configuring a network to utilize SNMPv3 to send information from your network devices back to an SNMP manager. What option should you enable to ensure the data is transferred confidentially?
authPriv - Ensures all data is sent with authentication and privacy
When connecting two nearby buildings, what type of antenna should you use?
Parabolic Antenna
The time delay between when a packet was sent and received
Latency
What is RSSI
Received Signal Strength Indacator
What command is used to create, view, or modify manual entries in the network routing tables of a computer or server.
Route
Michael, a system administrator, is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. What command should he enter on his workstation to resolve this connectivity issue?
nbtstat -r
This command purges and reloads the cached name table from the LMHOST file on their Windows workstation.
What is a Yagi Antenna used for
Directional transmission over long distances
What might cause signal attenuation?
Obstructions blocking the line-of-sight of antennas.
What are the troubleshooting steps
- Identify the problem
- Establish a theory
- Test the theory
- Establish a plan of action
- Implement the solution
- Verify full system functionality
- Document findings and actions
What should you use to protect IoT devices
- WPA2 security with a strong password
- Create a separate VLAN for IoT devices to segregate them from your normal network.
Which of the following must be added to a VLAN’s gateway to improve the security of the VLAN?
Access Control List
What ports does SMB use and what is it used for?
- TCP 445 and TCP 139
- Network file sharing protocol that runs on top of the NetBIOS architecture
Your company wants to create highly available datacenters. Which of the following will allow the company to continue maintaining an Internet presence at all sites if the WAN connection at their own site goes down?
BGP (Border Gateway Protocol)
- Distance Vector
- If a WAN link goes down, BGP will route the traffic through another WAN link
What is the size of a Jumbo Frame and when should they be used?
- Larger than 1500
- The should only be used when you have a dedicated network or VLAN, and you can configure jumbo frames on all of the equipment.
What is AAA
- AAA stands for Authentication, Authorization, and Accounting.
- RADIUS
A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What might cause this issue.
- Shared Secret Key mismatch
- RADIUS uses a shared key for encrypting communication. If the keys don’t match, login issues will happen
What port does SQL Server use?
TCP 1433
What port does MySQL use?
TCP port 3306
What port does SQL Net use?
TCP Port 1521
You just started work as a network technician at Dion Training. You have been asked to check if DHCP snooping has been enabled on one of the network devices. What command should you enter within the command line interface?
show config
- show config shows the devices current configuration.
Elizabeth was replacing a client’s security device that protects their screened subnet. The client has an application that allows external users to access the application remotely. After replacing the devices, the external users cannot connect remotely to the application anymore. What was likely misconfigured and is now causing a problem?
The Firewall
- If the firewall ruleset was not configured to allow external users to access the application remotely, the default condition is to “deny by default”.
What is the lowest layer (bottom layer) of a bare-metal virtualization environment?
Physical Hardware
- A “Bare Metal” approach does not have a host OS.
When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?
eDiscovery
What is Port Security / Sticky MAC
Port security is a security solution where the switch remembers the MAC address of a device connected to it and prevents other devices from using that port.
Dion Training is trying to connect two geographically dispersed offices using a VPN connection. You have been asked to configure their networks to allow VPN traffic into the network. What device should you configure FIRST?
The Firewall
- The firewall is installed at the network boundary, therefore it should be configured first to allow the VPN connection and functionally create a single intranet.
A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
- Deploy the patch in a lab environment to quickly conduct testing
- Get approval for an emergency change
- Immediately implement the patch in the production environment
What ports does SIP use
Port 5060/5061
A disgruntled employee executes an on-path attack on the company’s network. Layer 2 traffic destined for the gateway is now being redirected to the employee’s computer. What type of attack is this an example of?
ARP Spoofing / Poisoning
- ARP is used to identify IP to MAC address bindings.
What is the purpose of DNS?
DNS servers translate FQDN (Fully Qualified Domain Name) to IP addresses.
What is the protocol where ports open for network access only after a user has been authenticated by the organization.
802.1x
What ports does SNMP use
Port 161/162
IEEE Spec. that defines VLANS
802.1q
FQDN vs Hostname
- Your hostname is the name of your computer
- Your FQDN is your hostname + your domain
ex: Mymail.somecollege.edu - DNS servers translate FQDNs to IP
2.4 GHz Channels selection for the least amount of interference between 3 access points (Non overlapping frequencies)
1 , 6 , 11
What are the components of a Three Tier Network Architecture
- Core
- Network Backbone
- Distribution
- Provides boundary definition by implementing access lists / filters to define the policies of the network
- Access
- This is where all endpoint devices will connect to each other
In band VS out of band management
In Band refers to managing the network through itself
Out of Band is a method of remotely controlling and managing critical IT assets and network equipment using a secure connection through a secondary interface that is physically separate from the primary network connection.
A user’s smartphone is displaying text in other languages in their web browser when accessing the company’s main website. Which of the following is the MOST likely cause of the issue?
An On Path Attack (Man in the Middle)
- The server sees that the IP address is coming from Russia, so it will utilize Russian language in the text.
Your network relies on the use of ATM cells. At which layer of the OSI model do ATM cells operate?
Layer 2 Data Link
What is 802.3af?
PoE
What is 802.3at?
PoE+