Wrong Answers Flashcards
What is the multicast address range for IPv6
FF00::/8
What are valid FTP commands
Open,
Delete
rename
Copy is NOT a command
True or false:
A COM port is another name for the console port which is used to allow for a host to connect with a routerdirectly
True
What is PPP
Protocol that is used on dedicated lease lines.
it is used for transmitting layer 3 protocols over data links.
It has control protocols that allow for the transfer of multiple L3 protocols at once
What is a salami attack
This occurs when a number of smaller attacks result into a large attack when their impact is combined
What is the minimum length of an Ethernet frame, and what is the name for frames smaller than this minimum?
64 bits is the minimum
Runts are frames smaller than 64 octets
What are the router types in a HSRP group?
Active, virtual, and standby
True or false:
A DSLAM is used to aggregate multiple connections
True:
Digital subscriber line access multiplexer
What service is used to send an email from to a email server and what port is used for this?
SMTP is used for this, and it runs over port 25
What two services is used to grab and download mail from an email server?
IMAP4 and POP3
What is an NIU and furthermore, what is an NID
NIU is an network interface unit and is used by an ISP for remotely testing the lines. It also supports on a digital circuit.
NIUs also provide the ability to perform remote diagnostics
A SmartJack is an example of a NID
What can been enabled on switches that can prevent MAC address Spoofing, MITM attacks, and Arp Cache poisonings? How does it work
DHCP Snooping-
involves creating a list of all legit systems MAC addresses. Traffic from a MAC address not on the list is considered malicious and is blocked at the switch port.
What are the five states of an interface on a switch that has STP enabled.
Blocking - The interface is not forwarding traffic in order to prevent a loop.
Listening - Not forwarding, and in the process of cleaning the MAC table.
Learning - Not forwarding, and adding to the MAC table
Forwarding - interface is fully operational.
Disabled - Admin turned this port off.
What is GRE
Generic Routing Encapsulation -
Creates a tunnel between wo endpoints.
Traffic is encapsulated inside of IP and the endpoints appear to be connected directly.
There is no built in encryption for this protocol
What are the three QOS mechanisms
Best Effort
Integrated Services
Differentiated Services
What does OSPF use as a metric for route selection
Cost
This considers the link speed between routers in the calculations
What is a GBIC and what is it used for?
Gigabit Interface Converter -
allows different connectors to be used to plug into a switch port.
A GBIC is designed to be easy to insert and remove, making it great for Troubleshooting
What technologies are used by a host to generate a IPv6 address for itself using a router provided prefix
Stateful and Stateless auto-configuartion (SLAAC)
DHCPv6
What is used by GSM to allow channel sharing between users?
TDMA - Time Division Multiplexing
Allows user to get a snippet of time to receive their data over a shared line
What is port tagging
Port tagging is made possible by 802.1Q.
This is performed when 802.1Q adds a field to ethernet frames that identify the VLAN that the frame is allowed to travel over.
What are the thee modulation methods used by cellular devices that allow many devices to use the same frequency?
How do they work?
TDMA - Time Division -
Time is divided into slows ant allows many different signals to use the same frequency when it is their time.
FDMA - Frequency Division Multiple access -
enables parallel transmission of signals by assigning each to a band of frequencies
CDMA- Code Division uses the entire spectrum for each call, and assigns a unique code to each spectrum
What type of dynamic routing protocol is RIP and how does it calculate when a host is unreachable
RIP is a distance-Vector protocol.
It has a max hop count of 15, so anything with more than 15 hops is unreachable using this protocol.
What is HSRP used for
It is used for redundant default gateways.
What is a level 7 severity level indicate with a message log
Debugging information for developers
What is a level 6 severity level indicate with a message log
Used for information conditions and it is a normal operation message there requires no action.
What is a level 5 severity level indicate with a message log
used for notice condions and it means that events are unusual, but are not error conditions
What is a level 4 severity level indicate with a message log
Used for warning conditions, and it may indicate that an error will occur if action is not taken soon.
What is a level 3 severity level indicate with a message log
Used for an error condition, and it means that something is preventing normal operations.
What is a level 2 severity level indicate with a message log
Used for a critical condition and it means that there is a failure in the systems primary application and it requires immediate interaction.
What is a level 1 severity level indicate with a message log
used for an alert condition because there is something that needs to be correct immediatley
What is a level 0 severity level indicate with a message log
Used for an emergency and is considered the most sever condition because at this point the system has become unstable.
What is the primary weakness with using WPS?
Brute forcing of the 8 digit pin.
The protocol checks the two halves of the pin individually which reduces the number of combination to guess the password to 1 in 11,000.
This attack can be performed in a matter of minutes.
What are the CompTIA troubleshooting steps in order
Identify the problem
Establish a Theory of probable cause
Test the theory
1. If it does not work, re-establish a new Theory
Establish a plan of action to resolve
the problem and Identify potential
effects
Implement the solution or escalate as necessary
Verify full system functionality, and if possible, implement preventative measures
Document findings, actions, outcomes, and lessons learned
Describe in detail the first step of the troubleshooting process
identify the problem:
- Question Users
- Identify symptoms
- Determined what changed
- Duplicate the problem if possible
- Approach multiple problems individually
Describe in detail the second troubleshooting step
Establish a theory of probable cause:
Question the obvious -
Take a top/down-down/up approach
or
Divide and conquer
Describe in detail the third troubleshooting step
Test the theory,
If the theory is confirmed, move to the next step
If not confirmed reestablish a new theory
What are the 4th 5th 6th and 7th steps in the troubleshooting steps
Establish a plan of action to resolve the problem and identify the potential effects
implement the solution or escalate as needed
Verify system functionality
Document findings actions, outcomes, and lessons learned.
What is the port for MySQL
3306
What is the SQL net port
1521
What is the MS-SQL port number
1433
What is a another name commonly used to describe spine and leaf network archetecture, and why is this?
Top of rack,
This is because each device such as an app server, or db, will sit in a rack with a leaf switch at the top of the rack
This leaf switch will then connect to each and every one of the spine switches on the network.
What are the advantages and disadvantages to spine and leaf archetecture
Its advantageous in the way that it has built in redundancy, simple cabling, and is fast
The issue is that it is expensive to scale
Describe SDN data flows for each plane
Management data flow would be SSH, SNMP, and API calls
Control Plan flows would be updates to dynamic routing protocols and routing tables
Infrastructure or data plane would be network traffic
What are the three layers in 3 tier archetcture
Distrobution
Core
Access
What tool would you use to find resistance, and voltage issues
A Multimeter
What is DAI
Dynamic Arp Inspection -
Used as a security feature that validates arp packets on a network
DAI allows admins to intercept, log, and discard packets that have invalid MAC 2 IP bindings
True or False
A high signal to noise ratio is a good thing
True
A high signal to noise ratio will enable high throughput on a network and will provide faster data rates
What does RFC 1918 provide
It provides the private ip address ranges that cannot be routed out to the internet
10.0.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
What is the APIPA Range
169.254.1.0 169.254.254.255
What is NAT overloading/PAT
WHen internal hosts communicate out of the network, the router keeps a NAT table and uses it to keep track of which ephempral port the host is using.
What are the IP Classes
1-127
128-191
192-223
224-239
240-254
What is the difference between classful subnetting and VLSM
VLSM allows you to make better use of your network space. Classful subnetting is no longer used today because it relies on using only the network bits to decide subnet size
What are the subnetting tricks for compression
Groups of 0s can be shortened
You can drop leading 0s
What is an EUI-64
Used to combine a 64-bit IPV6 prefix with the MAC address to create a 128 self assigned IPv6 address.
How is the EUI -64 address created
You take the MAC address, break it in half, and then add FFFE which will fill in the missing bits from the 48-bit MAC address to create the 64 bit EUI-64 address
True of False:
THe first three groups of the IPv6 Address are provided by IANA< RIR, and ISP.
THe fourth section is the subnet information
True
What is Teredo/Miredo
Teredo is for Windows OSes
Teredo is used for tunnelling IPv6 Traffic over IPV4 network in a Nated fashion which allows for the traffic to pass the router.
This is an end to end tunnel that requries no additional routers