1101 Exam Part 6 Flashcards
(24 cards)
Your company has two office buildings that are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?
Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut or broken by the construction workers. This can be verified using a Time-Domain Reflectometer to determine exactly where in the cable the break has occurred. Once the location is identified, the cable can be repaired or spliced to return it to normal operations.
How would you identify a cable break?
Use a Time-Domain Reflectometer
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. What should the technician check FIRST during troubleshooting?
For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building’s construction doesn’t cause interference with the wireless signals. To determine if adequate coverage and signal strength is being received in the building, you can conduct a wireless site survey.
What is bandwidth saturation?
Bandwidth saturation is a phenomenon that occurs when all of a circuit’s available bandwidth in a given direction is being utilized by a large upload or download which can result in high latency and performance issues.
What is measured service?
Measured service is a term that IT professionals apply to cloud computing that references services where the cloud provider measures or monitors the provision of services for various reasons, including billing, effective use of resources, or overall predictive planning.
Which sequence of events properly identifies the steps of a laser printer’s imaging process?
Processing, charging, exposing, developing, transferring, fusing, and cleaning
How many volts of electrical charge are applied to the drum of a laser printer?
To ensure the positively charged toner is attracted to the laser printer’s negatively charged drum during printing, a uniform negative charge of approximately 600 volts is applied to print the image on the paper.
Optical Disk Storage: BD-R, DVD-R, CD-RW
A Blu-ray disc can store up to 25 GB for a single-layer disc or 50 GB for a dual-layer disc. A CD can store up to 700 MB. A DVD can store 4.7 GB for a single-layer disc or 8.5 GB for a dual-layer disc.
What is RG-6 cabling?
RG-6 cabling is recommended for your Cable TV, satellite, TV antennas, or broadband internet.
What is a DHCP reservation?
DHCP reservations allow the DHCP server to pre-set an IP address to a specific client based on its MAC address. This ensures that the client will always get the same IP address from the DHCP server when it connects to the network. DHCP reservations are usually used with servers or printers on your internal network and are rarely used with end-user or client devices.
What is a public IP address?
If an address is not an APIPA address (169.254.x.x), a private IP address (10.x.x.x, 172.16-31.x.x, or 192.168.x.x), or a localhost IP (127.0.0.1), then it is considered a public IP address.
You just heard of a new ransomware attack that has been rapidly spreading across the internet that takes advantage of a vulnerability in the Windows SMB protocol. To protect your network until Microsoft releases a security update, you want to block the port for SMB at your firewall to prevent becoming a victim of this attack. Which of the following ports should you add to your blocklist?
Server Message Block (SMB) uses ports 139 and 445, and is a network file sharing protocol that runs on top of the NetBIOS architecture in Windows environments. When the WannaCry ransomware was spreading rapidly across the internet, you could help protect your organization’s network by blocking ports 139 and 445 at your firewall to prevent your machines from getting infected over the internet.
A user is complaining about slow data speeds when they are at home in a large apartment building. The user uses Wi-Fi when they get home, and the device works fine on other wireless networks they connect to. Which of the following actions should the user take to increase their data speeds?
Slow data speeds can be caused by too much interference or a weak signal. Try changing the channel on Wi-Fi routers to less-used channels or boost the signal being transmitted, and the performance should increase. Alternatively, if the cellular signal is too low, you can install a signal booster or microcell in the home or office.
What is MAC filtering?
In computer networking, MAC address filtering is a network access control method whereby the MAC address assigned to each network interface controller is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that they would like to access the network.
While giving a network some additional protection, MAC filtering can be circumvented by using a packet analyzer to find a valid MAC and then using MAC spoofing to access the network using that address. MAC address filtering can be considered as security through obscurity because the effectiveness is based on “the secrecy of the implementation or its components”.
What is traffic shaping?
Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users. Traffic shaping is used to optimize or guarantee performance, improve latency, or increase usable bandwidth for some kinds of packets by delaying other kinds.
What is load balancing?
Load balancing refers to the process of distributing a set of tasks over a set of resources to make their overall processing more efficient. Load balancing can optimize the response time and avoid unevenly overloading some compute nodes while other compute nodes are left idle.
Which storage type utilizes a NAND chipset mounted directly onto the motherboard instead of a mechanical spinning drive to store data?
NVMe (Non-Volatile Memory Express) is a storage controller mounted on the motherboard. It utilizes a NAND chipset and connects via the motherboard’s PCIe bus for increased speed. NVMe allows much higher transfer rates than SATA/AHCI. A solid-state drive (SSD) is a personal computer storage device that stores data in non-volatile special memory instead of on disks or tape. While SSDs also avoid spinning drives, they cannot be mounted directly onto the motherboard.
What is NAT?
Network address translation (NAT) is a network service provided by a router or proxy server to map private local addresses to one or more publicly accessible IP addresses. NAT can use static mappings but is commonly implemented as network port address translation (PAT) or NAT overloading, where a few public IP addresses are mapped to multiple LAN hosts using port allocations.
What is AFP and what port does it use?
The Apple File Protocol (AFP) is the native file and printer sharing protocol for Mac computers. It supports many unique Mac attributes that are not supported by other protocols and operates over port 548.
Which type of internet connection is terminated at a local switching center and requires a different media type between the switching center and the end customer?
DSL, a technology used to transmit multimedia traffic at high-bit rates over twisted-pair copper wire (over ordinary telephone lines). This allows the telecommunications company to connect a user’s home to the local switching center using normal telephone lines, then connect that local switching center (using a DSLAM to multiplex the connections) to the central office over a single high-speed cable (such as a fiber connection).
What is an AAA server?
An authentication, authorization, and accounting (AAA) server is a server used to identify (authenticate), approve (authorize), and keep track of (account for) users and their actions. AAA servers can also be classified based on the protocol they use, such as a RADIUS server or TACACS+ server.
What is a RADIUS server?
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for users who connect and use a network service.
What is a TACACS server?
Terminal Access Controller Access-Control System refers to a family of related protocols handling remote authentication and related services for network access control through a centralized server. TACACS+ includes a mechanism that can be used to obfuscate the body of each packet, while leaving the header clear-text. Moreover, it provides granular control in the form of command-by-command authorization.
What are the three differences between RADIUS and TACACS+
TACACS+ only uses TCP, but RADIUS can use both TCP and UDP.
TACACS+ can operate in both IP-filtering and MD-5 mode
TACACS+ is used only for administrator access to networking equipment, while RADIUS is most often used for end-user authentication.