Net+ Misc 2 Flashcards

1
Q

To ensure your username / passwords are secure in remote VPN connections, this is present:

A

KERBEROS;

A network authentication protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How would you ensure new systems are protected against electronic snooping of Radio Frequency

A

Setup TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What protocol applies to Ethernet networks and allows multiple devices on a network?

A

CSMA/CD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an SFP module for Fiber Optics?

A

LC connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an SFP ?

A

Small Form-factor Pluggable (optical transceiver module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a PDU?

A

Protocol Data Unit;

Describes data as it moves from one layer to another in OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What PDU is used with connectionless protocols?

A

Datagrams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol uses label switching routers to forward traffic?

A

MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What supports long distance fast running WiFi?

A

WiMax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The last line of an ACL firewall is what?

A

Implicit Deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you secure your wireless network using WPA2-AES, what is the encryption method?

A

CCMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CCMP

A

Encryption protocol;
Part of the 802.11i standard for wireless LANs;
Encryption mechanism that replaced TKIP,
Security standard used with WPA2 wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol allows switches to share VLAN information?

A

VTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

If you have prolonged contact with a thermal compound, what should you consult?

A

MSDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When you need to ensure your server is monitored and you are warned of strange traffic

A

HIDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What would you use to stop / block broadcasts?

A

Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

To monitor a T1, you should implement a loopback on what?

A

Channel Service Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Channel Service Unit

A

Device that translates incoming and outgoing data allowing network to work over the T1 line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A survey of a wireless network and its signal strength:

A

Heat Map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Identify the main routing protocols?

A

RIP: Routing Information Protocol
OSPF: Open Short Path First
EIGRP: Enhanced Interior Gateway Routing Protocol
BGP: Border Gateway Routing Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RIP

A

Routing Information Protocol;
Distance Vector (routing protocol);
Interior (routing protocol) limits # of hops in path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OSPF

A

Open Shortest Path First;
Interior (routing protocol);
Link State (routing protocol) …fiber or coax);

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

EIGRP

A

Enhanced Interior Gateway Routing Protocol
Common Hybrid routing protocol;
Distance Vector (routing protocol)
Link State (routing protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

BGP

A

Border Gateway Protocol;
Exterior (routing protocol);
Path Vector (routing protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What helps prevent ROUTING loops?
Split Horizon
26
What protocol is used by switches to ensure switch routing loops do not occur?
802.1d | STP
27
How do you limit broadcast traffic and allow internal segments to communicate with each other?
Use a Layer 3 switch to create a VLAN
28
What setup allows switches to share VLAN information?
VTP: VLAN Trunking Protocol 802.1q Trunking
29
What port would provide access to certain VOIP applications?
5060
30
How would a tech securely manage several remote network devices?
SNMPv3
31
What ports are used to provide secure sessions via the web by default?
22 | 443
32
A tech successfully pings the default gateway and DNS servers but cannot ping a website URL even though it can ping the website IP addr. How is this resolved?
Enable port 53 on the firewall
33
If setting up DHCP on a LAN, what options should be configured in DHCP scope to allow hosts on LAN using dynamic IP addresses to access the internet and internal locations?
Default gateway; Subnet mask DNS server
34
On a Linux workstation, how does a tech verify IP address settings?
run ifconfig
35
What must be configured on each network device if a tech will setup a monitoring tool?
SNMPv3
36
What technology must be supported to convert external IP addresses to internal ones
NAT... Network Address Translation
37
Identify and alert users to suspicious activity:
IDS: Intrusion Detection System
38
Identify, alert and take action to stop suspicious activity:
IPS: Intrusion Prevention System
39
Implement what to secure and protect a server?
HIDS / HIPS: | Host Intrusion Detection & Prevention
40
Implement what to secure and protect the network?
NIDS / NIPS: | Network Intrusion Detection & Prevention
41
When using Tracert to troubleshoot a website, and you receive a "Request Timed Out" error, what should be configured to allow using Tracert on external websites, but not allow outsiders to use it on your internal site?
Configure Firewall to allow echo reply in and echo request out
42
What uses and RJ-11 connector to connect a computer to an ISP using a POTS line?
MODEM
43
If you don't have fiber or satellite connections, what connections are available?
DSL or Cable
44
What internet technology allows you to combine 24 signals using multiplexing technology onto one line?
T1
45
What leased internet technology can get you a set of 2.048 megabits over 32 channels?
E-1
46
What device will help provide data on a CSU/DSU to verify communications are working when troubleshooting a T1 connection?
Loopback plug - to CSU-DSU
47
CSU/DSU
Channel Service Unit/Data Service Unit; | Device that converts digital data frames and allows communications between a LAN and a WAN
48
Proxy Server
Middle man between clients and the internet; | Content filtering & Web caching
49
What server filters traffic between a WAN and LAN
Proxy Server
50
VOIP over PSTN(dial up) need what?
UC (VOIP) Gateway
51
VOIP is a form of what?
UC: | Unified Communications
52
Softphone
UC app that enables VOIP telephone calling
53
NAS
Network Attached Storage device
54
For a disaster recovery plan, what allows network devices to be replaced?
Archives / Backups
55
What class fire extinguisher is needed for computer systems?
Class C; | Fires involving energized electrical wiring or equip
56
iSCSI
Internet Small Computer Systems Interface; | Standard for linking data storage facilities
57
A tech connects a NAS device to an Ethernet network. What will be used to encapsulate the frames?
iSCSI
58
What WAN technology is associated with high latency?
Satellite
59
DDoS
Distributed Denial of Svc; | Flood a site with requests (Smurf/Zombie attack)
60
DNS poisoning
Alter DNS host (name) records
61
ARP poisoning
Sending fake MAC addresses to switch
62
ARP
Address Resolution Protocol; | Protocol translates network layer addresses into link layer addresses
63
What will secure traffic between a web browser and a website?
SSL
64
Attacker steals / alters data between two systems
Man in the Middle Attack
65
A NIC that transmits frames, operates at what layer
Layer 1 & 2
66
Cabling works at what layer?
Layer 2: Data Link
67
What layer and protocol would you open an application?
Layer 7, Application; | Example: access Web browser or email
68
What layer and protocol ensures there is a connection to the destination?
Layer 5, Session; | Example: PING (using ICMP) to test connection
69
What layer would SSL or SSH operate?
Layer 6, Presentation; | Example: HTTPS encrypted web page; encrypted command line (SSH)
70
What layer are IP addresses added to packet (envelopes)
Layer 3 Network; | Routers use IP addr to find dest
71
What layer does TCP or UDP cut data into packets (envelopes)
Layer 4 Transport layer
72
When you hear someone's email is running slow, What is done first in the troubleshooting process?
Gather information
73
What is the last step taken in troubleshooting process?
Document findings
74
In troubleshooting process, what is done when a problem is discovered?
Establish a theory of probable cause
75
If your PC has IP addr 169.254.1.1, what port might be blocked?
67
76
If you need to discover the MAC addr for a device with a particular IP addr, what is used?
ARP | Address Resolution Protocol
77
What protocol allows switches to share VLAN information?
VTP | VLAN Trunking Protocol
78
What would be used to stop/block broadcasts?
Layer 3 switch
79
If you secure your wireless network using WPA2-AES, what encryption protocol is used?
CCMP
80
To monitor a T1, you should implement a loopback on what?
Channel Service Unit
81
What is the port # used by SNMP; the protocol used to help manage network devices
161
82
Two switches need to share VLAN information, what should be applied?
802.1q & VTP
83
If you want to stop looping between switches, what is used?
802.1d STP
84
To incorporate authentication for your WPA2-PSK network, use what?
WPA2 Enterprise
85
If users in building C are authenticating to wireless SSID in building A, do what to resolve the issue?
Reduce the transmission power
86
An attack that involves flooding a switch with fake frames to redirect traffic, would be what?
ARP poisoning
87
``` Network Topologies: LAN WAN MAN PAN CAN ```
LAN WAN: ex. connecting companies across long distances MAN: Metropolitan Area Network; ex. connect two college satellite campuses located across town; PAN: Personal Area Net... supports bluetooth, ... CAN: Campus Area Network; network that spans several buildings within walking distance of each other
88
What two wires do not change in a Cat 5e UTP
4 & 5 (Blue) | 7 & 8 (Brown)
89
What would be used to ensure users authenticate to a network?
802.1x, RADIUS or WPA2 Enterprise
90
What server is used to authenticate remote wireless users?
802.1x or RADIUS
91
AAA Protocol (Authentication, Authorization, Accounting), used by Microsoft RADIUS; Linux... incorporates what?
TACACS+
92
What are two authentication methods used by AAA authentication?
RADIUS and TACACS+
93
Route command
Used to display and manipulate a local routing table
94
NSLOOKUP command
Name Server Lookup; Used to query the Domain Name System (DNS) to obtain an IP addr for a given host name or conversely obtain host name for a given IP addr
95
Netstat command
List open connections and ports on your computer
96
Routing table
Stored routing information about directly connected and remote networks; Contains next hop associations
97
DOCSIS
Data Over Cable Service; | Standard allowing high bandwidth data transfer to CATV system
98
If firewall is configured to allow only ports 21, 110 and 25, but users cannot access URLs, what should be done
Allow ports 80 and 53
99
What protocol is used to encapsulate network layer protocols (like multicast) and is used as a tunnel protocol for remote connections?
GRE
100
NICs work at layer 2 and help encapsulate packets into this PDU (Protocol Data Unit) type
Frames
101
PDU
Protocol Data Unit; Describes data as it moves from one layer to another; Synonymous with the term packet
102
NICs work at layer 2, what else uses MAC addresses to forward data at layer 2?
Switch
103
ESS
Extended Service Set | Wireless networks that have multiple access points
104
What is the term for Ad Hoc mode (no access points) wireless networks
IBSS; Independent Basic Service Set Peer to Peer mode
105
What network device allows UC devices to connect to each other through phone lines (PSTN)?
UC Gateway
106
What is used to send a digital signal over analog PSTN
UC Gateway; | Converts digital signals to analog
107
PSTN
Public Switched Telephone Network; | Also known as POTS... Plain Old Telephone Service
108
A CSU/DSU device will connect what?
A T1 line to a network router
109
CSU / DSU
Channel Service Unit / Data Service Unit; | Device that converts digital data frame on LAN to a frame appropriate for WAN & vice versa
110
Port Scanner
Device used to identify active services on a network
111
What is used to do a one time posture assessment of the network?
Non Persistent Agent
112
SIEM
Security Information and Event Management
113
What could be used to analyze network security logs?
SIEM
114
What features are most important when implementing new switch to support VOIP phones and wireless access points?
PoE and QoS
115
What will need to be enabled if access points are configured in an environment with wireless standards 802.11b and 802.11n, and need to communicate?
Wireless Mixed Mode
116
To reduce interference with other nearby wireless networks, what should be configured on the target wireless access point?
alternate wireless channel
117
UDP
User Data Protocol; | Connectionless protocol;