Final Exam Study Guide Flashcards

1
Q

What is the popular protocol for today’s VPNs?

A

PPTP, L2TP, SSL.TLS, OpenVPN, IPsec VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Where do static VLANs assign VLANS to?

A

Ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most common method used to configure a LAN-capable switch?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What layer of the OSI model does a content switch work?

A

Layer 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does an IDS do?

A

Inspects packets, looking for active intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What client is needed to access IPv6 content on the internet?

A

Global unicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is NAT needed with IPv6?

A

No, router advertisements are used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is required to receive an IPv6 address automatically?

A

Multicast address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What kind of DNS records do IPv6 addresses use?

A

AAAA record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What service do tunnel brokers provide?

A

Create an actual tunnel to offer a custom-made endpoint client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device do you use to connect to a T1 line?

A

RJ-48C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SONET used for?

A

Long-distance, high-speed, fiber-optic transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol do cable modems use?

A

DOCSIS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What device provides the fastest throughput?

A

DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SIP stand for?

A

Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which technology enables the use of a WAP without directly connecting the WAP to an AC power outlet?

A

PoE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where should the WAP be placed to achieve maximum Wi-Fi coverage?

A

Center of a room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is known as a Basic Service Set in infrastructure mode?

A

A single WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the most secure method of wireless encryption?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What consumer electronics cause interference with 802.11n wireless networks?

A

Mobile phone

21
Q

What are the advantages of a virtual machine over a physical machine?

A

Power saving, hardware consolidation, system recovery, system duplication, and research

22
Q

What needs to be upgraded on a host machine to enable running more virtual machines simultaneously?

23
Q

What feature lets you save a VM’s state so you can quickly restore to that point?

24
Q

What enables 2 VMs hosted on the same physical machine to communicate without leaving the machine itself?

A

hypervisor

25
If you don't own a server, what can you do to quickly create a new server to run a new service?
public cloud
26
What cellular WAN technology introduced the SIM card?
GSM
27
In order to pair to another Bluetooth device, the device must be set to what?
discovery or discoverable mode
28
A thermostat that you can control with an app on your smartphone, is an example of what?
IoT
29
What network technology does a TV remote use?
IR
30
How can you reduce your vulnerability to an open SSID?
Running HTTPS
31
What is a unique server function?
Network authentication
32
What standard is used by most NAS devices to enable them to connect easily to almost any network?
CIFS
33
Adding a generator to a server room is an example of what?
Power redundancy
34
What is the centerpiece of an ICS?
ICS server
35
What must be completed during and after change to the IT infrastructure?
Document changes
36
What is the job of a first responder?
Deciding whether an incident should be addressed, ignored, or escalated; evaluate scope and cause; preventing further disruption; resolving cause; restoring order to affected systems; and identifying ways to prevent a recurrence.
37
What is succession planning?
Identifying people who can take over certain positions in case the people holding those critical positions are incapacitated or lost in an incident.
38
When working inside equipment, what should you do?
Properly connect an anti-ESD wrist strap
39
The placement of a rack should optimize what?
Optimize the airflow
40
A hacker who sends an email but replaces the return email with a fake one is called what?
Spoofing
41
What is an attack where someone tries to hack a password using every possible password permutation?
Brute force
42
What kind of attack occurs when a user's machine is locked to a screen telling the person they must call a number to gain access.
Ransomware
43
A compromised computer with malware to support a botnet is a what?
DDoS
44
What is Wireshark?
Protocol analyzer
45
Where does a packet sniffer store collected information?
Capture file
46
What tools allows you to compare network performance with a baselined network performance?
Graphing program
47
What tool allows you to capture and analyze traffic between two workstations?
Performance monitor
48
Know the troubleshooting steps
Establish a theory of probable cause, Test the theory to determine cause, Establish a plan of action and identify potential effects, Implement the solution or escalate as necessary, verify full system functionality and implement preventative measures, and Document findings, actions, and outcomes
49
Know what you should be doing during Problem Isolation.
Identify problem by gathering information, duplicate problem, question users, and identify symptoms. Determine in anything has changed the network. Approach multiple problems individually.