Net+ Misc 1 Flashcards

1
Q

A router interface references what?

A

Default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you configure client to access network beyond the router?

A

Use IP address of default gateway;
Most net admins give it lowest host addr in network… 1;
Example: SP4 gateway is 10.0.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use what kind of network cable to connect two switches requiring a link capable of 10 GB.

A

Fiber Optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What cable types support the furthest distance when connecting to various MDFs?

A

Singlemode fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What connector type is used in terminating singlemode fiber cable ?

A

LC… (used for longer runs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type connector is used in terminating multimode fiber cables/

A

ST (short running)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What standards apply to adding devices using multimode (short running) fiber?

A

1000Base-SR &

10GBase-SR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a single mode fiber is not providing network connectivity to another remote site, what can you use to test the cable

A

OTDR…. Optical Time-Domain Reflectometer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What tool would a network tech use to troubleshoot a span of single mode fiber cable?

A

Sptectrum analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What would be used to connect a singlemode fiber cable to a CAT6 connection

A

Media converter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type media converter is used to connect a multimode connection to existing CAT5e

A

Fiber to Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What would increase bandwidth over fiber optic by combining multiple signals at different wavelenghts?

A

DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What layer do you find routers?

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What layer do you find switches/

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What layer do you find hubs and cabling?

A

Layer 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens to data as it travels from layer 7 to layer 1 (Application to Presentation)?

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Routers, which use IP addresses to forward data, fall into this layer of the OSI model. If you have an APIPA 169.254.1.1, you would be troubleshooting at this layer?

A

Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switches use MAC addresses to forward data and are used to create VLANs reside in this layer of the OSI model. If you have a NIC issue, this is the layer you troubleshoot.

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What device can perform routing functions, support multicast signals and can create VLANs?

A

Layer 3 Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What type of firewall can detect new weird transmissions being sent out of random ports?

A

Stateful packet inspection firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Your router should be able to hold and recognize 4 TB’s of data/programs; but for some reason it only can access 3-TB’s. What should you do?

A

Firmware update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A spectrum analyzer would be used to measure a span of singlemode fiber optic cables; but what would be used to identify the location of a break in a single singlemode fiber cable?

A

OTDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You setup computers in a large industrial setting with lots of running equipment so you want to measure the ‘USABLE’ bandwidth being sent between devices. What are you measuring?

A

GoodPut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a specialized piece of hardware designed to encrypt and decrypt user traffic?

A

VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

You want to implement a firewall, and patch management and group policies and you wish to perform a function to verify the security you have in place. You should do a:

A

Perform a penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which two concepts are about avoiding loops in a switch?

A

802.1d Spanning Tree protocol … Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What attack utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop?

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You are told all the companies virtual servers will be hosted internally, but if there is a problem all server images can be found and restored from the cloud using VPN’s?

A

IaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What will allow the company to maintain an Internet presence even in the event that a WAN circuit at one of their sites goes down?

A

BGP - Border Gateway Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A tech is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network. What should the tech check FIRST?

A

WAP placement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. Which of the following could be implemented to redirect any attackers on the network?

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What helps prevent routing loops?

A

Split Horizon… at router in layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What should you add (BEST CHOICE) to a business continuity plan in case of a catastrophc event in order to protect the business?

A

Hot sites or cold sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A company has seen an increase in ransomware. What should be implemented to reduce the occurrences?

A

Web content filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What integrity security tool can help ensure a message arrives intact with the highest level of security?

A

IPSEC (Internet Protocol Security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What can you add to a network management tool to help control and use SNMP (Simple Network Mgt Protocol)?

A

MIB (Mgt Information Base)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

DNS is used to help users find the IP addresses for computers and/or websites. If DNS is working but one particular user is having trouble because when they try to go to a specific site they end up somewhere else, then the problem is with the:

A

Local Hosts file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How many usable hosts/pc’s can you have with 192.168.1.1, 255.255.255.0 (/24)?

A

254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

If you are using 802.11n but you are not getting full speeds, then you should add:

A

MIMO

Multiple Input Multiple Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Making decisions based on your examination of a mobile devices security settings and other software settings is know as a:

A

Posture assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following is a UC application?

A

Softphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Name a hybrid routing protocol

A

EIGRP…

Enhance Interior Gateway Routing Protocol

43
Q

A tech is concerned about security and is asked to set up a network management protocol which will allow them to access switches and/or routers to get information. What is the protocol?

A

SNMP

Simple Network Mgt Protocol

44
Q

How do you block Ping echo requests?

A

Block ICMP.

Internet Control Message Protocol..

45
Q

Name servers that can manage authentication

A

RADIUS & TACACS

46
Q

If a switch is not sharing VLAN information with another switch, you should consider it might be:

A

An 802.1q setting

47
Q

802.1q standard

A

Networking standard that supports VLANs

48
Q

What protocol is used to encapsulate other network layer protocols such as multicast and IPX over WAN connections?

A

GRE

Generic Routing Encapsulation protocol

49
Q

If you know a data transmission is failing due to frame errors; then you are concerned with what layer?

A

Layer 2, Data-Link layer

50
Q

You are told to create a network for testing remote devices. What should you implement?

A

Quarrantine

51
Q

You are told to monitor the network to look for users that are trying to access inappropriate websites; so you should use a:

A

Packet sniffer

52
Q

After running a point-to-point fiber link between two routers, the interfaces on both will not com up even though you confirm there is power and that cables are working. What is wrong?

A

There is a wavelength mismatch

53
Q

Name servers that can manage authentication?

A

RADIUS

TACACS

54
Q

If you need to limit broadcast traffic and allow different network segments to communicate, the best option would be:

A

Add layer-3 switch and create VLAN

55
Q

What protocol uses label-switching routers (and label-edge routers) for forward traffic?

A

MPLS… Multiprotocol Label Switching

56
Q

Which is a HYBRID routing protocol?

A

EIGRP… Enhanced Interior Gateway Routing Protocol

57
Q

A company wants to make sure that users are required to authenticate prior to being allowed on the network. What standard accomplishes this?

A

802.1x… access control standard

58
Q

Which of the following is a SFP (Small Form-Factor Pluggable) module, often used to connect Singlemode fiber optic cabling?

A

LC

59
Q

You are told to block PING echo requests; so you should block:

A

ICMP… Internet Control Message Protocol

60
Q

Your 802.11n wireless network is performing about half-speed. What can help 802.11n wireless networks increase/improve speed?

A

MIMO

61
Q

Which antenna is small (small footprint) and can be installed quickly/easily on the outside wall?

A

Patch antenna

62
Q

If you are dealing with the concepts of two VLANed switches that are connected together and need to share VLAN information, then you must TRUNK them together. What concepts apply to TRUNKING?

A

802.1q….. VLAN standard for carrying traffic on multipl VLANs on a single trunking interface

VTP….. VLAN Trunking Protocol

63
Q

What will allow the company to maintain an Internet presence even in the event that a WAN circuit at one of their sites goes down?

A

BGP… Border Gateway Protocol

64
Q

The concept that your router has learned the route to all connected networks is:

A

Convergence

65
Q

What network management protocol will allow you to access switches and/or routers to get information?

A

SNMP… Simple Network Management Protocol

66
Q

What is a specialized piece of hardware designed to encrypt and decrypt user traffic?

A

VPN concentrator

67
Q

NIPS

A

Network Intrusion Prevention System

68
Q

NIDS

A

Network Intrusion Detection System

69
Q

Spanning Tree Protocol prevents loops at what layer?

A

Layer 2… switch

70
Q

Split horizon prevents loops what layer?

A

layer 3… router

71
Q

Examing devices to make a decision on whether that device should be allowed into your network or allowed access to your network is a:

A

Posture assessment

72
Q

A spectrum analyzer would be used to measure a span of singlemode fiber optic cables; but what would be used to identify the location of a break in a single singlemode fiber cable?

A

OTDR… Optical Time Domain Reflectometer

73
Q

If you notice too much interference at 2.4 GHz, you should change to:

A

802.11a and ac

74
Q

What integrity security tool can help ensure a message arrives intact with the highest level of security?

A

IPSEC

75
Q

If you are concerned about your email and web server, concerned the traffic coming in might threaten your internal network, you should setup this:

A

DMZ

76
Q

Which of the following is a UC application?

Unified Communications

A

SOFTPHONE….. an app tha enables VoIP telephone calling

77
Q

If a switch is not sharing VLAN information with another switch, you should consider it might be:

A

An 802.1q setting

78
Q

How many usable hosts/pc’s can you have with 192.168.1.1, 255.255.255.0 (/24)?

A

254

79
Q

To define HOW much bandwidth can be used by a protocol on your network is describing the concept of:

A

Traffic Shaping

80
Q

What is used to test a span of single-mode fiber cable

A

SPECTRUM ANALYZER:

81
Q

If your users are having accessibility problems reaching devices on the cloud, what monitoring tool should you use to locate possible outages?

A

Network Analyzer

82
Q

If you want to do an IP-based video conference call on your VoIP, then use:

A

Codec and SIP

83
Q

A SAN (Storage Area Network) is used to store backup data for large enterprises to store massive blocks of data. What would be used to backup a Server database (file) that takes up a couple of terabytes of storage space?

A

NAS

84
Q

You are told all the company’s virtual servers will be hosted internally, but if there are problems, all server images can be found and restored from the cloud using VPN’s? What is this referred to as?

A

Public IaaS

85
Q

IaaS:

A

Infrastructure as a Service: Hardware needed from cloud (such as Servers and Storage); Applications/OS will be local

86
Q

PaaS:

A

Platform as a Service: Only App’s are local; all else run on cloud

87
Q

SaaS

A

Software as a Service: Software, OS & Servers run on cloud

88
Q

Private vs Public data center

A

Private: Your own virtualized data Center /
Public: Available to anyone

89
Q

If you see a request that an MX record be created in your DNS, then what MOST likely was recently installed requiring this record?

A

Mail (Email) Server

90
Q

Network segmentation (BREAKING NETWORK INTO DIFFERENT SEGMENTS) provides which of the following benefits?

A

Security (through isolation)

91
Q

While in the main conference room your wireless is strong; but at your desk the signal keeps dropping. What is MOST likely the issue?

A

Bounce

92
Q

Wireless uses CSMA/CA (Collission Avoidance). Wired networks (Ethernet networks that uses cabling like CAT5e/6) use:

A

CSMA/CD

93
Q

What device would use CSMA/CA through RTS (Req To Send) protocol?

A

802.11 Access Point… 802.11ap

94
Q

Data traveling from Layer 1 (Physical) to Layer 7 (Application) is doing this:

A

De-encapsulation

95
Q

Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as:

A

ASN… Autonomous system number

96
Q

When troubleshooting a T1, you can use this to verify communications are reaching the CSU/DSU at the end of a T1?

A

Loopback plug

97
Q

A network where people can go to access the internet without disrupting the intranet (internal network) of your office would be a:

A

Guest network

98
Q

TROUBLESHOOTING: After adding a new wireless printer a user says he CAN print but can’t reach the internet; even though everyone else can reach the internet; but they CANNOT print to this new printer. What is most likely the issue?

A

The printer was installed in ad-hoc mode

99
Q

TROUBLESHOOTING: If you are warned certain network segments are reporting poor performance; what main issue should you consider first?

A

Packet bottlenecks

100
Q

TROUBLESHOOTING: You setup a Proxy Server. You then replace your DNS server and now customers are having issues accessing public websits. What will FIX this issue?

A

Update DNS server with the proxy server information

101
Q

TROUBLESHOOTING: Your company has two kiosks withing close proximity to multiple other businesses; so the owner is worried about people accessig the internet through the kiosks. What can be implemented so only the employees of your organization are the only ones that can get wireless internet?

A

MAC Filtering

102
Q

TROUBLESHOOTING: Users are trying to authenticate to a specific SSID but are unable to. Where will the issue MOST likely reside?

A

RADIUS server…

Remote Authentication Dial-In User Service

103
Q

The IP address of the router interface that a switch connects to is referred to as what?

A

Default Gateway