Measure up questions2 Flashcards Preview

Network Plus > Measure up questions2 > Flashcards

Flashcards in Measure up questions2 Deck (27):
1

Which wireless networking security method used AES for data encryption,

Wi-FI Protected Access version 2 (WPA2)

2

A 100BASE-T Ethernet network configured for full-duplex,

Uses one pair for receiving packets and another pair for sending packets

3

What kind of cable would you use on a 1000BAS-TX on your network,

It requires a CAT ^

4

What protocol is a connection oriented protocol that is responsible for sequencing and acknowledging packets,

TCP

5

You need to be able to passively monitor activity in your perimeter network. Alerted at a potential hazard-use what,

A network intrusion detection system (NIDS)

6

A contrator needs a document that shows the location of the network cabling in the building

Wiring diagram

7

Name 2 tools you can use to identify a rogue DHCP server,

IDS and Packet Sniffer--IDS would analyze network traffic patterns

8

What is a difference between CSMA/CD and CSMA/CA,

CSMA/CD resends packets after a packet collision but a CSMA/CA does not

9

What is the role of an Interior Gateway Protocol (IGP) in a network infrastructure,

To exchange routing information within autonomous networks

10

When would you use a stateful firewall to filter traffic

To filter by monitoring connections and allowing valid traffic by connection type

11

Which layer of the OSI model is responsible for frame sequencing and acknowledment

Data Link Layer

12

What happens in a switch during port mirroring,

Packets are forwarded from one port to another for analysis

13

The following ports are open on your perimeter network firewall--22, 23, 443, 992. Greatest security risk,

23--open is a potential risk. Port 23 is used by unsecured telnet

14

Pin order of T568A,

green/white, green; orange/white; blue; white with blue stripe; orange; brown/brown; brown

15

You plan to connect and IDS to a switch port--what feature must the switch support,

Port Mirroring

16

What device simplifies network client configuration

SHCP Server

17

What is the binary representation of the host portion of the IPv4 address 198.24.192/24

10000010

18

What protocol is used to securely send data from a web browser to a web server,

TLS

19

Authentication between client and severs on a local are network--must support Windows versions, Linux and UNIX

Kerberos

20

Primary purpose of a loopback cable,

Troubleshooting

21

You have a wireless network with a single WAP. You are experiencing latency issues with the network--2 ans what is the problem

Signal bounce is occurring and Packet collision is occuring

22

You want to retrieve information about TCP/IP network connections and protocol statistics--what do you use,

Run Netstat

23

What does it mean that a firewall defaults to using implicit deny,

Unsolicited traffic is blocked unless a rule allows the traffic to pass

24

What TCP port is used to secure communications between web clients and web servers

Port 443

25

What category of twisted pair cable should you use when wiring a 10GBaseT Ethernet network,

CAT 6

26

What is the fastest type of Ethernet that can run over CAT 3 cable

10BASE-T

27

What is the primary difference between the 568A and 568B wiring standards,

Pairs 2 and 3 are connected to different pairs