Wrong Answers Flashcards

1
Q

What is the multicast address range for IPv6

A

FF00::/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are valid FTP commands

A

Open,
Delete
rename

Copy is NOT a command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or false:

A COM port is another name for the console port which is used to allow for a host to connect with a routerdirectly

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PPP

A

Protocol that is used on dedicated lease lines.

it is used for transmitting layer 3 protocols over data links.

It has control protocols that allow for the transfer of multiple L3 protocols at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a salami attack

A

This occurs when a number of smaller attacks result into a large attack when their impact is combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the minimum length of an Ethernet frame, and what is the name for frames smaller than this minimum?

A

64 bits is the minimum

Runts are frames smaller than 64 octets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the router types in a HSRP group?

A

Active, virtual, and standby

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false:

A DSLAM is used to aggregate multiple connections

A

True:

Digital subscriber line access multiplexer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What service is used to send an email from to a email server and what port is used for this?

A

SMTP is used for this, and it runs over port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What two services is used to grab and download mail from an email server?

A

IMAP4 and POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an NIU and furthermore, what is an NID

A

NIU is an network interface unit and is used by an ISP for remotely testing the lines. It also supports on a digital circuit.

NIUs also provide the ability to perform remote diagnostics

A SmartJack is an example of a NID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can been enabled on switches that can prevent MAC address Spoofing, MITM attacks, and Arp Cache poisonings? How does it work

A

DHCP Snooping-

involves creating a list of all legit systems MAC addresses. Traffic from a MAC address not on the list is considered malicious and is blocked at the switch port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the five states of an interface on a switch that has STP enabled.

A

Blocking - The interface is not forwarding traffic in order to prevent a loop.

Listening - Not forwarding, and in the process of cleaning the MAC table.

Learning - Not forwarding, and adding to the MAC table

Forwarding - interface is fully operational.

Disabled - Admin turned this port off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is GRE

A

Generic Routing Encapsulation -

Creates a tunnel between wo endpoints.

Traffic is encapsulated inside of IP and the endpoints appear to be connected directly.

There is no built in encryption for this protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three QOS mechanisms

A

Best Effort
Integrated Services
Differentiated Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does OSPF use as a metric for route selection

A

Cost

This considers the link speed between routers in the calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a GBIC and what is it used for?

A

Gigabit Interface Converter -
allows different connectors to be used to plug into a switch port.

A GBIC is designed to be easy to insert and remove, making it great for Troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What technologies are used by a host to generate a IPv6 address for itself using a router provided prefix

A

Stateful and Stateless auto-configuartion (SLAAC)

DHCPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is used by GSM to allow channel sharing between users?

A

TDMA - Time Division Multiplexing

Allows user to get a snippet of time to receive their data over a shared line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is port tagging

A

Port tagging is made possible by 802.1Q.

This is performed when 802.1Q adds a field to ethernet frames that identify the VLAN that the frame is allowed to travel over.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the thee modulation methods used by cellular devices that allow many devices to use the same frequency?

How do they work?

A

TDMA - Time Division -

Time is divided into slows ant allows many different signals to use the same frequency when it is their time.

FDMA - Frequency Division Multiple access -

enables parallel transmission of signals by assigning each to a band of frequencies

CDMA- Code Division uses the entire spectrum for each call, and assigns a unique code to each spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What type of dynamic routing protocol is RIP and how does it calculate when a host is unreachable

A

RIP is a distance-Vector protocol.

It has a max hop count of 15, so anything with more than 15 hops is unreachable using this protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is HSRP used for

A

It is used for redundant default gateways.

24
Q

What is a level 7 severity level indicate with a message log

A

Debugging information for developers

25
Q

What is a level 6 severity level indicate with a message log

A

Used for information conditions and it is a normal operation message there requires no action.

26
Q

What is a level 5 severity level indicate with a message log

A

used for notice condions and it means that events are unusual, but are not error conditions

27
Q

What is a level 4 severity level indicate with a message log

A

Used for warning conditions, and it may indicate that an error will occur if action is not taken soon.

28
Q

What is a level 3 severity level indicate with a message log

A

Used for an error condition, and it means that something is preventing normal operations.

29
Q

What is a level 2 severity level indicate with a message log

A

Used for a critical condition and it means that there is a failure in the systems primary application and it requires immediate interaction.

30
Q

What is a level 1 severity level indicate with a message log

A

used for an alert condition because there is something that needs to be correct immediatley

31
Q

What is a level 0 severity level indicate with a message log

A

Used for an emergency and is considered the most sever condition because at this point the system has become unstable.

32
Q

What is the primary weakness with using WPS?

A

Brute forcing of the 8 digit pin.

The protocol checks the two halves of the pin individually which reduces the number of combination to guess the password to 1 in 11,000.

This attack can be performed in a matter of minutes.

33
Q

What are the CompTIA troubleshooting steps in order

A

Identify the problem

Establish a Theory of probable cause

Test the theory
1. If it does not work, re-establish a new Theory

Establish a plan of action to resolve
the problem and Identify potential
effects

Implement the solution or escalate as necessary

Verify full system functionality, and if possible, implement preventative measures

Document findings, actions, outcomes, and lessons learned

34
Q

Describe in detail the first step of the troubleshooting process

A

identify the problem:

  1. Question Users
  2. Identify symptoms
  3. Determined what changed
  4. Duplicate the problem if possible
  5. Approach multiple problems individually
35
Q

Describe in detail the second troubleshooting step

A

Establish a theory of probable cause:

Question the obvious -

Take a top/down-down/up approach
or
Divide and conquer

36
Q

Describe in detail the third troubleshooting step

A

Test the theory,

If the theory is confirmed, move to the next step

If not confirmed reestablish a new theory

37
Q

What are the 4th 5th 6th and 7th steps in the troubleshooting steps

A

Establish a plan of action to resolve the problem and identify the potential effects

implement the solution or escalate as needed

Verify system functionality

Document findings actions, outcomes, and lessons learned.

38
Q

What is the port for MySQL

A

3306

39
Q

What is the SQL net port

A

1521

40
Q

What is the MS-SQL port number

A

1433

41
Q

What is a another name commonly used to describe spine and leaf network archetecture, and why is this?

A

Top of rack,

This is because each device such as an app server, or db, will sit in a rack with a leaf switch at the top of the rack

This leaf switch will then connect to each and every one of the spine switches on the network.

42
Q

What are the advantages and disadvantages to spine and leaf archetecture

A

Its advantageous in the way that it has built in redundancy, simple cabling, and is fast

The issue is that it is expensive to scale

43
Q

Describe SDN data flows for each plane

A

Management data flow would be SSH, SNMP, and API calls

Control Plan flows would be updates to dynamic routing protocols and routing tables

Infrastructure or data plane would be network traffic

44
Q

What are the three layers in 3 tier archetcture

A

Distrobution
Core
Access

45
Q

What tool would you use to find resistance, and voltage issues

A

A Multimeter

46
Q

What is DAI

A

Dynamic Arp Inspection -

Used as a security feature that validates arp packets on a network

DAI allows admins to intercept, log, and discard packets that have invalid MAC 2 IP bindings

47
Q

True or False

A high signal to noise ratio is a good thing

A

True

A high signal to noise ratio will enable high throughput on a network and will provide faster data rates

48
Q

What does RFC 1918 provide

A

It provides the private ip address ranges that cannot be routed out to the internet

10.0.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255

192.168.0.0-192.168.255.255

49
Q

What is the APIPA Range

A

169.254.1.0 169.254.254.255

50
Q

What is NAT overloading/PAT

A

WHen internal hosts communicate out of the network, the router keeps a NAT table and uses it to keep track of which ephempral port the host is using.

51
Q

What are the IP Classes

A

1-127
128-191
192-223
224-239
240-254

52
Q

What is the difference between classful subnetting and VLSM

A

VLSM allows you to make better use of your network space. Classful subnetting is no longer used today because it relies on using only the network bits to decide subnet size

53
Q

What are the subnetting tricks for compression

A

Groups of 0s can be shortened

You can drop leading 0s

54
Q

What is an EUI-64

A

Used to combine a 64-bit IPV6 prefix with the MAC address to create a 128 self assigned IPv6 address.

55
Q

How is the EUI -64 address created

A

You take the MAC address, break it in half, and then add FFFE which will fill in the missing bits from the 48-bit MAC address to create the 64 bit EUI-64 address

56
Q

True of False:

THe first three groups of the IPv6 Address are provided by IANA< RIR, and ISP.

THe fourth section is the subnet information

A

True

57
Q

What is Teredo/Miredo

A

Teredo is for Windows OSes

Teredo is used for tunnelling IPv6 Traffic over IPV4 network in a Nated fashion which allows for the traffic to pass the router.
This is an end to end tunnel that requries no additional routers