Network+ Flashcards
(133 cards)
Computers need to know only the IP address of a destination computer in order to communicate
with it across a network.
A. True
B. False
B. False
Explanation: Computers must know both the IP address and MAC address in order to
communicate across a network.
The acronym ARP means \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Address Reservation Protocol B. Abbreviated Routing Protocol C. Addressable Routed Packet D. Address Resolution Protocol
D. Address Resolution Protocol
Explanation: ARP is the Address Resolution Protocol.
ARP is used to find the MAC address of a host when the IP address is known.
A. True
B. False
A. True
Explanation: ARP is used to find the MAC address of a host when the IP address is known.
Another way to say this is that ARP is used to resolve IP Addresses into MAC addresses.
An ARP table (or ARP cache) contains a list of known IP address and MAC address relationships.
A. True
B. False
A. True
Explanation: The ARP cache is a table that is kept on computers which contains all the IP address
and MAC address relationships that the computer has learned about. This way if the computer
needs to communicate with a specific IP address it is able to build a Frame with the associated
MAC address as it communicates out onto the network. Otherwise, the computer must first
send out an ARP request to learn the MAC address which it will then place into the ARP cache.
The term Malware includes viruses, worms, trojan horses, spyware, adware, ransomware and other
types of malicious software written specifically to harm and infect a host system.
A. True
B. False
A. True
Explanation: The term Malware encompasses all malicious software designed to harm and infect
a host system. If a network node becomes infected with any form of Malware it is called a
“compromised system”. Compromised systems can give away the fact that they are compromised
by generating traffic on the network that is abnormal and otherwise unexplainable.
When a server or system is attacked in such a way that it is flooded with traffic and unable to respond
to legitimate requests is referred to as a _______________ attack
A. Session Hijacking
B. Brute Force
C. Main-in-the-middle
D. Denial of Service
D. Denial of Service
Explanation: A Denial of Service (DoS) attack is an attack that overburdens the target with a flood
of traffic/requests until all of its resources are completely tapped out and it becomes unable to
respond to legitimate traffic.
Which of the following is a type of man-in-the-middle attack in which the communicating devices on a
company LAN have their layer 2 frames redirected to the attacker who also resides on the same LAN.
A. VLAN Hopping
B. ARP Poisoning
C. Session Hijacking
D. Smurf Attack
B. ARP Poisoning
Explanation: In an ARP Poisoning attack the attacker must be on the same network as the targets.
This is because the attacker uses forged ARP messages to poison the target computer’s ARP
cache with the MAC address of the attacker. After the ARP cache has bee poisoned all future
communications (layer 2 frames) will be sent to the attacker’s computer instead of to the
intended destination.
Which of the following types of attacks is a type of Denial of Service attack in which spoofed ICMP
messages are sent as an IP directed broadcast to flood a target host with ICMP traffic?
A. VLAN Hopping
B. ARP Poisoning
C. Session Hijacking
D. Smurf Attack
D. Smurf Attack
Explanation: Smurf attacks were a very common type of attack until router manufacturers started
disabling the IP directed broadcast feature on routers by default. With IP directed broadcast
turned on a simple ping message can be sent through a router and it will enter the network as a
broadcast message in which all the hosts who receive the broadcasted ping would reply to it. In
this case the smurfed victim’s IP address is known and is spoofed (forged) into the ping packets
making it seem like the pings came from the victim. This causes all the hosts that received the IP
directed broadcast ping to reply to the ping sending large amounts of ICMP traffic to the victim
all at the same time effectively taking it offline.
End User Awareness training is the worst way for a company to defend against social engineering
attacks.
A. True
B. False
B. False
Explanation: Because people/employees/end users are the targets of social engineering attacks
the best way to defend against them is to make sure users are properly trained in User/Security
Awareness. If users understand the different ways they can be manipulated by social engineering
then they will be more aware of the events when they manifest and much more likely not to fall
for them.
One major vulnerability in networks is the usage of unsecure protocols such as Telnet and SNMPv2.
A. True
B. False
A. True
Explanation: Unsecure protocols like Telnet and SNMPv2 send information in clear text and don’t
require password challenges or message digests. In these cases organizations should be sure to
use the secure versions of these protocols such as SSH and SNMPv3.
It’s okay to have well known ports such as TCP 80 opened up from the outside of a firewall to the inside
of the network.
A. True
B. False
B. False
Explanation: Unnecessary open TCP ports are a huge vulnerability and the network perimeter
devices such as firewalls must be managed meticulously to make sure the network edge is secure
and there are no ports opened in a such a way that it exposes the internal network to the
Internet.
How many bits are in a Byte? A. 32 B. 8 C. 48 D. 12
B. 8
Explanation: There are 8 bits in a Byte.
Select the correct short form of representing the data rate of 1 bit per second A. 1 MB B. 1Bps C. 1 bit D. 1bps
D. 1bps
Explanation: the short form a bits per second is bps. When you see a lowercase “b” is always
means bits. When you see an upper case “B” is always represents Bytes.
Bytes use a lower-case b in the shorthand notation.
A. True
B. False
B. False
Explanation: bits uses the lowercase “b” while Bytes uses the uppercase “B”.
An ordinary Frame payload is how many Bytes in length? A. 1500 B. 9000 C. 1000 D. 500
A. 1500
Explanation: The standard maximum payload of an Ethernet Frame is 1500 Bytes. With
overhead such as the MAC Header, VLAN tag and CRC a standard Frame can exceed 1500 Bytes,
however the actual payload (which contains the data) is still a maximum of1500 Bytes.
Frames are created in the Network Interface Card (NIC).
A. True
B. False
A. True
Explanation: The Network Interface Card is where Frames are assembled before being placed
on the network media and disassembled after being retrieved from the network media.
How many bits are there in 512 Bytes. A. 1024b B. 2048b C. 4096b D. 8192b
C. 4096
Explanation: To find the number of bits in a certain number of Bytes simply multiply the number
of Bytes times eight (512 * 8 = 4096). To perform the reverse is to find the number bytes in a
certain number of bits. In that case simply divide the number of bits by eight (4096 bits / 8 = 512
Bytes)
A unicast is sent from a single sender to multiple receivers.
A. True
B. False
B. False
Explanation: A Unicast is sent from a single sender to a single receiver while a Multicast is sent
from either a single sender or multiple senders to multiple receivers.
What does a MAC Broadcast Address look like in hexadecimal format? A. FF-FF-FF-FF-FF-FF B. EE-EE-EE-EE-EE-EE C. AA-AA-AA-AA-AA-AA D. 00-00-00-00-00-00
A. FF-FF-FF-FF-FF-FF
Explanation: A MAC address destination of all Fs is a message to all hosts which is also known as
a Broadcast. All Fs in the hexadecimal notation of a MAC address is also the equivalent of all 1s
in the 48 bit binary format( 111111111111111111111111-111111111111111111111111)
Routers separate Broadcast Domains.
A. True
B. False
A. True
Explanation: Routers keep broadcast domains separated from each other. One default router
interface (without VLANs) is the equivalent to one broadcast domain or network
By default routers pass Broadcast traffic from one network to another network.
A. True
B. False
B. False
Explanation: Routers do not pass Broadcast traffic by default. If routers did pass normal
Broadcast traffic then that Broadcast traffic would have the potential to spread around the
entire global internet without restriction. We can see how this would be a problem! Broadcast
traffic is intended to stay within a local network which is also know as a Broadcast Domain.
A software company uses a hosted service to build a web application in the cloud. The hosting
provider maintains all the hardware that the web application is built on and the software
company can simply build their web application without worrying about anything else. This is an
example of ___________.
A. IaaS
B. PaaS
C. SaaS
D. Private Cloud
B. PaaS
Explanation: PaaS (Platform as a Service) providers take care of everything that’s needed to
build software in the cloud so that companies can easily build web applications and other
software in the cloud without needing to maintain any of their own servers and hardware.
A company hosts a portion of their network infrastructure in the cloud which it accesses via VPN.
The company is able to move workloads and servers between their on-premise private network
and their network in the cloud creating a Hybrid cloud environment. What type of cloud service is
this referring to?
A. IaaS
B. PaaS
C. SaaS
D. Private Cloud
A. IaaS
Explanation: IaaS (Infrastructure as a Service) providers offer complete network infrastructures
in the cloud where companies can set up their own servers and network storage and only pay
for the resources that are used on a monthly basis.
Any type of software that is hosted in the cloud and accessed as a service via the internet by customers refers to \_\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_. A. Hybrid IaaS B. Private SaaS C. Hybrid Cloud D. Public SaaS
D. Public SaaS
Explanation: Public SaaS (Software as a Service) is a software offering that runs in the public
cloud and is accessed by customers over the Internet. Public SaaS is available to anyone who
wishes to use or pay for the software as a monthly recurring service. Some companies build
Private SaaS within their own private cloud which would be a software applications strictly used
by the internal employees and would not be available to the public or accessible via a public
cloud.