Wrong Answers Flashcards
What is the multicast address range for IPv6
FF00::/8
What are valid FTP commands
Open,
Delete
rename
Copy is NOT a command
True or false:
A COM port is another name for the console port which is used to allow for a host to connect with a routerdirectly
True
What is PPP
Protocol that is used on dedicated lease lines.
it is used for transmitting layer 3 protocols over data links.
It has control protocols that allow for the transfer of multiple L3 protocols at once
What is a salami attack
This occurs when a number of smaller attacks result into a large attack when their impact is combined
What is the minimum length of an Ethernet frame, and what is the name for frames smaller than this minimum?
64 bits is the minimum
Runts are frames smaller than 64 octets
What are the router types in a HSRP group?
Active, virtual, and standby
True or false:
A DSLAM is used to aggregate multiple connections
True:
Digital subscriber line access multiplexer
What service is used to send an email from to a email server and what port is used for this?
SMTP is used for this, and it runs over port 25
What two services is used to grab and download mail from an email server?
IMAP4 and POP3
What is an NIU and furthermore, what is an NID
NIU is an network interface unit and is used by an ISP for remotely testing the lines. It also supports on a digital circuit.
NIUs also provide the ability to perform remote diagnostics
A SmartJack is an example of a NID
What can been enabled on switches that can prevent MAC address Spoofing, MITM attacks, and Arp Cache poisonings? How does it work
DHCP Snooping-
involves creating a list of all legit systems MAC addresses. Traffic from a MAC address not on the list is considered malicious and is blocked at the switch port.
What are the five states of an interface on a switch that has STP enabled.
Blocking - The interface is not forwarding traffic in order to prevent a loop.
Listening - Not forwarding, and in the process of cleaning the MAC table.
Learning - Not forwarding, and adding to the MAC table
Forwarding - interface is fully operational.
Disabled - Admin turned this port off.
What is GRE
Generic Routing Encapsulation -
Creates a tunnel between wo endpoints.
Traffic is encapsulated inside of IP and the endpoints appear to be connected directly.
There is no built in encryption for this protocol
What are the three QOS mechanisms
Best Effort
Integrated Services
Differentiated Services
What does OSPF use as a metric for route selection
Cost
This considers the link speed between routers in the calculations
What is a GBIC and what is it used for?
Gigabit Interface Converter -
allows different connectors to be used to plug into a switch port.
A GBIC is designed to be easy to insert and remove, making it great for Troubleshooting
What technologies are used by a host to generate a IPv6 address for itself using a router provided prefix
Stateful and Stateless auto-configuartion (SLAAC)
DHCPv6
What is used by GSM to allow channel sharing between users?
TDMA - Time Division Multiplexing
Allows user to get a snippet of time to receive their data over a shared line
What is port tagging
Port tagging is made possible by 802.1Q.
This is performed when 802.1Q adds a field to ethernet frames that identify the VLAN that the frame is allowed to travel over.
What are the thee modulation methods used by cellular devices that allow many devices to use the same frequency?
How do they work?
TDMA - Time Division -
Time is divided into slows ant allows many different signals to use the same frequency when it is their time.
FDMA - Frequency Division Multiple access -
enables parallel transmission of signals by assigning each to a band of frequencies
CDMA- Code Division uses the entire spectrum for each call, and assigns a unique code to each spectrum
What type of dynamic routing protocol is RIP and how does it calculate when a host is unreachable
RIP is a distance-Vector protocol.
It has a max hop count of 15, so anything with more than 15 hops is unreachable using this protocol.