Net+ Misc 2 Flashcards

1
Q

To ensure your username / passwords are secure in remote VPN connections, this is present:

A

KERBEROS;

A network authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How would you ensure new systems are protected against electronic snooping of Radio Frequency

A

Setup TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol applies to Ethernet networks and allows multiple devices on a network?

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an SFP module for Fiber Optics?

A

LC connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an SFP ?

A

Small Form-factor Pluggable (optical transceiver module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a PDU?

A

Protocol Data Unit;

Describes data as it moves from one layer to another in OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What PDU is used with connectionless protocols?

A

Datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol uses label switching routers to forward traffic?

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What supports long distance fast running WiFi?

A

WiMax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The last line of an ACL firewall is what?

A

Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you secure your wireless network using WPA2-AES, what is the encryption method?

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP

A

Encryption protocol;
Part of the 802.11i standard for wireless LANs;
Encryption mechanism that replaced TKIP,
Security standard used with WPA2 wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol allows switches to share VLAN information?

A

VTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you have prolonged contact with a thermal compound, what should you consult?

A

MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you need to ensure your server is monitored and you are warned of strange traffic

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would you use to stop / block broadcasts?

A

Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To monitor a T1, you should implement a loopback on what?

A

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Channel Service Unit

A

Device that translates incoming and outgoing data allowing network to work over the T1 line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A survey of a wireless network and its signal strength:

A

Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identify the main routing protocols?

A

RIP: Routing Information Protocol
OSPF: Open Short Path First
EIGRP: Enhanced Interior Gateway Routing Protocol
BGP: Border Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIP

A

Routing Information Protocol;
Distance Vector (routing protocol);
Interior (routing protocol) limits # of hops in path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSPF

A

Open Shortest Path First;
Interior (routing protocol);
Link State (routing protocol) …fiber or coax);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol
Common Hybrid routing protocol;
Distance Vector (routing protocol)
Link State (routing protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol;
Exterior (routing protocol);
Path Vector (routing protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What helps prevent ROUTING loops?

A

Split Horizon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What protocol is used by switches to ensure switch routing loops do not occur?

A

802.1d

STP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How do you limit broadcast traffic and allow internal segments to communicate with each other?

A

Use a Layer 3 switch to create a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What setup allows switches to share VLAN information?

A

VTP: VLAN Trunking Protocol
802.1q
Trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port would provide access to certain VOIP applications?

A

5060

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How would a tech securely manage several remote network devices?

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What ports are used to provide secure sessions via the web by default?

A

22

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A tech successfully pings the default gateway and DNS servers but cannot ping a website URL even though it can ping the website IP addr. How is this resolved?

A

Enable port 53 on the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

If setting up DHCP on a LAN, what options should be configured in DHCP scope to allow hosts on LAN using dynamic IP addresses to access the internet and internal locations?

A

Default gateway;
Subnet mask
DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

On a Linux workstation, how does a tech verify IP address settings?

A

run ifconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What must be configured on each network device if a tech will setup a monitoring tool?

A

SNMPv3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What technology must be supported to convert external IP addresses to internal ones

A

NAT… Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Identify and alert users to suspicious activity:

A

IDS: Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Identify, alert and take action to stop suspicious activity:

A

IPS: Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Implement what to secure and protect a server?

A

HIDS / HIPS:

Host Intrusion Detection & Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Implement what to secure and protect the network?

A

NIDS / NIPS:

Network Intrusion Detection & Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When using Tracert to troubleshoot a website, and you receive a “Request Timed Out” error, what should be configured to allow using Tracert on external websites, but not allow outsiders to use it on your internal site?

A

Configure Firewall to allow echo reply in and echo request out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What uses and RJ-11 connector to connect a computer to an ISP using a POTS line?

A

MODEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

If you don’t have fiber or satellite connections, what connections are available?

A

DSL or Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What internet technology allows you to combine 24 signals using multiplexing technology onto one line?

A

T1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What leased internet technology can get you a set of 2.048 megabits over 32 channels?

A

E-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What device will help provide data on a CSU/DSU to verify communications are working when troubleshooting a T1 connection?

A

Loopback plug - to CSU-DSU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

CSU/DSU

A

Channel Service Unit/Data Service Unit;

Device that converts digital data frames and allows communications between a LAN and a WAN

48
Q

Proxy Server

A

Middle man between clients and the internet;

Content filtering & Web caching

49
Q

What server filters traffic between a WAN and LAN

A

Proxy Server

50
Q

VOIP over PSTN(dial up) need what?

A

UC (VOIP) Gateway

51
Q

VOIP is a form of what?

A

UC:

Unified Communications

52
Q

Softphone

A

UC app that enables VOIP telephone calling

53
Q

NAS

A

Network Attached Storage device

54
Q

For a disaster recovery plan, what allows network devices to be replaced?

A

Archives / Backups

55
Q

What class fire extinguisher is needed for computer systems?

A

Class C;

Fires involving energized electrical wiring or equip

56
Q

iSCSI

A

Internet Small Computer Systems Interface;

Standard for linking data storage facilities

57
Q

A tech connects a NAS device to an Ethernet network. What will be used to encapsulate the frames?

A

iSCSI

58
Q

What WAN technology is associated with high latency?

A

Satellite

59
Q

DDoS

A

Distributed Denial of Svc;

Flood a site with requests (Smurf/Zombie attack)

60
Q

DNS poisoning

A

Alter DNS host (name) records

61
Q

ARP poisoning

A

Sending fake MAC addresses to switch

62
Q

ARP

A

Address Resolution Protocol;

Protocol translates network layer addresses into link layer addresses

63
Q

What will secure traffic between a web browser and a website?

A

SSL

64
Q

Attacker steals / alters data between two systems

A

Man in the Middle Attack

65
Q

A NIC that transmits frames, operates at what layer

A

Layer 1 & 2

66
Q

Cabling works at what layer?

A

Layer 2: Data Link

67
Q

What layer and protocol would you open an application?

A

Layer 7, Application;

Example: access Web browser or email

68
Q

What layer and protocol ensures there is a connection to the destination?

A

Layer 5, Session;

Example: PING (using ICMP) to test connection

69
Q

What layer would SSL or SSH operate?

A

Layer 6, Presentation;

Example: HTTPS encrypted web page; encrypted command line (SSH)

70
Q

What layer are IP addresses added to packet (envelopes)

A

Layer 3 Network;

Routers use IP addr to find dest

71
Q

What layer does TCP or UDP cut data into packets (envelopes)

A

Layer 4 Transport layer

72
Q

When you hear someone’s email is running slow, What is done first in the troubleshooting process?

A

Gather information

73
Q

What is the last step taken in troubleshooting process?

A

Document findings

74
Q

In troubleshooting process, what is done when a problem is discovered?

A

Establish a theory of probable cause

75
Q

If your PC has IP addr 169.254.1.1, what port might be blocked?

A

67

76
Q

If you need to discover the MAC addr for a device with a particular IP addr, what is used?

A

ARP

Address Resolution Protocol

77
Q

What protocol allows switches to share VLAN information?

A

VTP

VLAN Trunking Protocol

78
Q

What would be used to stop/block broadcasts?

A

Layer 3 switch

79
Q

If you secure your wireless network using WPA2-AES, what encryption protocol is used?

A

CCMP

80
Q

To monitor a T1, you should implement a loopback on what?

A

Channel Service Unit

81
Q

What is the port # used by SNMP; the protocol used to help manage network devices

A

161

82
Q

Two switches need to share VLAN information, what should be applied?

A

802.1q & VTP

83
Q

If you want to stop looping between switches, what is used?

A

802.1d STP

84
Q

To incorporate authentication for your WPA2-PSK network, use what?

A

WPA2 Enterprise

85
Q

If users in building C are authenticating to wireless SSID in building A, do what to resolve the issue?

A

Reduce the transmission power

86
Q

An attack that involves flooding a switch with fake frames to redirect traffic, would be what?

A

ARP poisoning

87
Q
Network Topologies:
LAN
WAN
MAN
PAN
CAN
A

LAN

WAN: ex. connecting companies across long distances

MAN: Metropolitan Area Network; ex. connect two college satellite campuses located across town;

PAN: Personal Area Net… supports bluetooth, …

CAN: Campus Area Network; network that spans several buildings within walking distance of each other

88
Q

What two wires do not change in a Cat 5e UTP

A

4 & 5 (Blue)

7 & 8 (Brown)

89
Q

What would be used to ensure users authenticate to a network?

A

802.1x, RADIUS or WPA2 Enterprise

90
Q

What server is used to authenticate remote wireless users?

A

802.1x or RADIUS

91
Q

AAA Protocol (Authentication, Authorization, Accounting), used by Microsoft RADIUS; Linux… incorporates what?

A

TACACS+

92
Q

What are two authentication methods used by AAA authentication?

A

RADIUS and TACACS+

93
Q

Route command

A

Used to display and manipulate a local routing table

94
Q

NSLOOKUP command

A

Name Server Lookup;
Used to query the Domain Name System (DNS) to obtain an IP addr for a given host name or conversely obtain host name for a given IP addr

95
Q

Netstat command

A

List open connections and ports on your computer

96
Q

Routing table

A

Stored routing information about directly connected and remote networks;
Contains next hop associations

97
Q

DOCSIS

A

Data Over Cable Service;

Standard allowing high bandwidth data transfer to CATV system

98
Q

If firewall is configured to allow only ports 21, 110 and 25, but users cannot access URLs, what should be done

A

Allow ports 80 and 53

99
Q

What protocol is used to encapsulate network layer protocols (like multicast) and is used as a tunnel protocol for remote connections?

A

GRE

100
Q

NICs work at layer 2 and help encapsulate packets into this PDU (Protocol Data Unit) type

A

Frames

101
Q

PDU

A

Protocol Data Unit;
Describes data as it moves from one layer to another;
Synonymous with the term packet

102
Q

NICs work at layer 2, what else uses MAC addresses to forward data at layer 2?

A

Switch

103
Q

ESS

A

Extended Service Set

Wireless networks that have multiple access points

104
Q

What is the term for Ad Hoc mode (no access points) wireless networks

A

IBSS;
Independent Basic Service Set
Peer to Peer mode

105
Q

What network device allows UC devices to connect to each other through phone lines (PSTN)?

A

UC Gateway

106
Q

What is used to send a digital signal over analog PSTN

A

UC Gateway;

Converts digital signals to analog

107
Q

PSTN

A

Public Switched Telephone Network;

Also known as POTS… Plain Old Telephone Service

108
Q

A CSU/DSU device will connect what?

A

A T1 line to a network router

109
Q

CSU / DSU

A

Channel Service Unit / Data Service Unit;

Device that converts digital data frame on LAN to a frame appropriate for WAN & vice versa

110
Q

Port Scanner

A

Device used to identify active services on a network

111
Q

What is used to do a one time posture assessment of the network?

A

Non Persistent Agent

112
Q

SIEM

A

Security Information and Event Management

113
Q

What could be used to analyze network security logs?

A

SIEM

114
Q

What features are most important when implementing new switch to support VOIP phones and wireless access points?

A

PoE and QoS

115
Q

What will need to be enabled if access points are configured in an environment with wireless standards 802.11b and 802.11n, and need to communicate?

A

Wireless Mixed Mode

116
Q

To reduce interference with other nearby wireless networks, what should be configured on the target wireless access point?

A

alternate wireless channel

117
Q

UDP

A

User Data Protocol;

Connectionless protocol;