Net+ Misc 3 Flashcards

1
Q

IBSS

A

Ad Hoc mode Wireless network with no access points;

Independent Basic Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If data transmissions are failing due to frame errors, what layer is this?

A

Layer 2, Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company wants to ensure users are required to authenticate prior to being allowed on the network involves what standard?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If users are having accessibility problems reaching devices on the cloud, what monitoring tool should you use to locate possible outages?

A

Network Analyzer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a specialized piece of hardware designed to encrypt and decrypt user traffic?

A

VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A tech needs to identify active services that should be DISABLED on the network. What can help do this?

A

Port Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NIC’S work at Layer-2 and help encapsulate packets into this PDU type?

A

Frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Setup what to get all devices to send system level information to a centralized server for admin review?

A

SYSLOG server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Layer-4, TCP breaks data into SEGMENTS (UDP breaks into Datagrams). What does Layer 3 break your PDU’s (Packet Distribution Units) into?

A

Packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company plan established to resume normal system operations following a disruption in business would be described as what?

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After a breach, the tech decides the company needs to analyze its security logs. What should be used to analyze the security logs/information to help make a decision?

A

SIEM;

Security Information and Event Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What command did you run if you now see Active Connections including the Protocol being used (like TCP), the Local IP Addresss, Port number being used in active connections and the PID?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The Internet is not working. After using a toner to test your cable you get a STATIC SOUND. What is most likely issue?

A

Cross wires

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you have 172.16.1.1 with 255.255.0.0 with /12 and you are told you need 30 rooms/subnets. What should you be?

A

/13

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A CROSSOVER map would be 12345678 as compared to the other end which is:

A

1 2 3 4 5 6 7 8
………..|…|……|…|……………
3 6 1 4 5 2 7 8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If you know a data transmission is failing due to frame errors; then you are worried about:

A

Layer 2, Data-Link layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

NetBIOS uses what port?

A

Port 137

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which provides 256-512 encryption bytes of integrity hashing protection?

A

SHA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You are running OC3 into an IDF but the SFP does not have a plug. What Media Converter do you need?

A

Singlemode to Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Combining two devices (links) like two 1000-Mbps switchs to get higher speeds is:

A

LACP

Link Aggregate Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SIP uses what port?

A

Port 5060

22
Q

If you PING with ICMP what layer are you working at?

A

Layer 3

23
Q

ST, SC, LC and MTRJ are Fiber-optic connectors. Which of the following is a SFP (Small Form-Factor Pluggable) module, often used to connect Singlemode fiber optic cabling?

A

LC

24
Q

SIP uses what port?

A

Port 5060

25
Q

Which is best to secure one-end to another (end-to-end encryption)?

A

IPSEC

26
Q

What is the difference between a PAN and a WLAN?

A

WLAN uses Wifi to get more data/range; PAN uses Bluetooth for less data/range

27
Q

What type of equipment should be used for telecommunications and have an open design?

A

2/4 Post Rack

28
Q

You have 172.16.0.0 /12. But you need 30 rooms/subnets. What must your CIDR subnet mask be?

A

/13 ??????????????

29
Q

ICMP and TTL is implemented as a part of the IP layer. What layer does ICMP work at?

A

Network layer

30
Q

If an attack goes after your switches by loading them with fake-frames; at what layer does the attack occur?

A

DATA-LINK (LAYER 2)

31
Q

What port is used for NETBIOS?

A

137 / 138

32
Q

What port is used for DHCP?

A

67 / 68

33
Q

What port is used for SNMP?

A

161

34
Q

What port is used for TFTP?

A

69

35
Q

To check when an interface goes offline, what would you enable on your network device?

A

SNMP TRAP

36
Q

Even with STP two switches seem to be overloaded with loop issues & traffic. You should now try;

A

RSTP / 802.1w

37
Q

Which routing protocol utilizes the DUAL algorithm (multiple protocols) for determining best path?

A

EIGRP

38
Q

What will SECURE one ENDPOINT to ANOTHER ENDPOINT?

A

IPSEC

39
Q

You have only one switch capable of 1000-Mbps but you need to reach 10-Gbps. When two or more links need to pass traffic as if they were one physical link, which would be used to satisfy requirement?

A

LACP

40
Q

A tech is troubleshooting a problem and they establish a plan of action to resolve it. What is next step?

A

Implement solution

41
Q

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?

A

Posture assessment

42
Q

What is difference between CDMA cell phone and GSM cell phone?

A

A. GSM uses SIM Cards; CDMA doesn’t

43
Q

If you have a Crossover cable, with two switches connected together directly, then your wiremap is 1 to:

A

1 to 3

44
Q

You have TV’s that support High-Data transfer located 10-meters from AP.
You have printers with low bandwidth that are 20-meters on the opposite side of a wall from AP.
Select ‘3’ below to make this work properly

A

Set TV’s to 5 GHz
Set Printers to 2.4 GHz
Set Router/AP to Dual-Band

45
Q

How do you measure the times a signal in a communications channel changes its State?

A

Baud rate

46
Q

If a WAP keeps sporadically dropping connections and it is surrounded by multiple AP’s, and you are told to ensure seamlessly easy operations for users and ensure they have access to similar resources, then do what?

A

Match SSID’s between AP’s

Set on altering channels between AP’s

47
Q

A tech notices a spike in bandwidth due to packet overhead. Which two below can assist? (Select 2)

A

Configure switches to use jumbo frames

Update backbone to 10-Gbps

48
Q

Least intrusive way to resolve hostname to IP?

A

TRACERT

49
Q

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, what should security ensure are up-to-date & enforced for all?(Select TWO)

A

Memorandum of understanding;

Acceptable use Policy

50
Q

A firewall ACL is configured as follows:

  1. Deny Any Trust to Any DMZ eq to TCP port 22
  2. Allow 10.200.0.0/16 to Any DMZ eq to Any
  3. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
  4. Deny Any Trust to Any DMZ eq to Any

A TECH notices that users in the 10.200.0.0/16 network are unable to SSH into servers. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL which way would meet the company’s objectives?

A

11, 10, 12, 13