General Flashcards

(44 cards)

1
Q

What is used to support jumbo frames?

A

Have to increase the MTU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which remote technology should be sued as a desktop sharing system?

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which authentication protocol option requires a client certificate on each wireless client?

A

EAP-TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the default encryption protocol for WPA2?

A

CCMP-AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What will ensure continued availability without interruption if AC line power is lost?

A

UPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What should be done to avoid a bottleneck in a network with big file transfers?

A

Trunks with port agression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an example of multi-factor authentication?

A

Facial recognition and PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What should be used to see if traffic is being encrypted?

A

Packet analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most common attack used to compromise user passwords?

A

Brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 7 steps in the troubleshooting methodology?

A
Identify
Establish
Test Theory
Plan
Implement 
Verify and preventative measures 
Document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol provides time synchronisation over the internet?

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

At what layer does the SMTP protocol operate?

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At what layer does the ICMP protocol operate at?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What should be used to open a remote command session to run command-line commands?

A

SSH (secure shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What card does a test laptop have?

A

Single-band wireless card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What features does a public cloud have?

A

Subscribed features, access is driven by an agreement with little control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of vulnerability does not show on a vulnerability scan?

A

Zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a MAN?

A

Network that spans a city, with high speed communication

19
Q

What is the advantage of a DMVPN?

A

Scalable and secure

20
Q

Which protocol is open and vendor-neutral for accessing and maintaining directory services?

21
Q

What is the last step in the troubleshooting methodology?

22
Q

What is fiber attenuation?

23
Q

What is a duplex?

A

Identifies bidirectional communication system?

24
Q

Where is cabling and equipment documented in detail?

A

MDF documentation

25
What are the two main differences between hubs and switches?
Hubs operate at layer 1, switches at layer 2 | Hubs don't understand MAC addresses
26
What is a bottleneck?
Flow of data is impaired or stopped
27
What is SNMP?
Used to monitor and manage network devices
28
What is IPS?
System that blocks a network attack
29
What is a NGFW?
Firewall that classifies traffic and applies policies
30
What is a RADIUS server?
Device that authenticates VPN users
31
What does a port scanner do?
Can PING, see open ports, and see services running on ports
32
How does a firewall filter and at what layer?
Filters by port number. Layer 4
33
What does a router do and at what layer?
Routes traffic between IP addresses, and connect network types. Layer 3
34
What does a hub do and at what layer?
Send to every port (it's repeated). Layer 1
35
What does a switch do and at what layer?
Sends to specific destination. Layer 2
36
How does an IDS/IPS identify vulns?
Signature, anomaly, behaviour, heuristics
37
What software is used for IDS/IPS?
Snort
38
What are packet shapers?
Control bandwidth usage and data rates
39
What do VPN's do?
Encrypt data transferring over a public network
40
What does PtP protocol provide?
Error detection but no encryption
41
Explain SSL VPN
Uses SSL protocol for client to site communication
42
Where does IPSec operate?
Security for Layer 3 (encrypts and authenticates every packet)
43
What does traffic shaping do?
Buffers excess traffic
44
What does traffic policing (throttling) do?
Drop excess packets