Network+ Extra Revision Flashcards
Gap in Knowledge
What port is SMB?
Server Message Block Port 445 or 139 - Layer 6 and 7 of OSI Layer
What command do you use to figure out to trouble shoot DHCP Snooping?
Show Config
How can you increase the security in a VLAN by adding something in the VLAN gateway?
ACL
Which terms represent the maximum amount of data, as measured in time, that an organization is willing to lose during an outage?
RPO - Recovery point objective (RPO) is defined as the maximum amount of data – as measured by time – that can be lost after a recovery from a disaster, failure, or comparable event before data loss will exceed what is acceptable to an organization.
What is MTTR?
Mean time to repair (MTTR), sometimes referred to as mean time to recovery, is a metric that is used to measure the average time it takes to repair a system or piece of equipment after it has failed. MTTR includes the time from when the failure occurs to when the system or equipment is fully functional again.
Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building?
Wiring Diagram
What is RTO?
Recovery time objective (RTO) often refers to the amount of time that an application, system and process can be down without causing significant damage to the business and the time spent restoring the application and its data to resume normal business operations after a significant incident.
What is MTBF?
MTBF (mean time between failures) is the average time between repairable failures of a technology product. The metric is used to track both the availability and reliability of a product. The higher the time between failure, the more reliable the system.
What is nbstat used for?
nbtstat -r: displays the count of all NetBIOS names resolved by broadcast and querying a WINS server. nbtstat -R: purges and reloads the remote cache name table.
What can you use for a better server availability in the future? Instead of using UPS and replacing the battery?
Add a redundant power supply to the server
Which technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on?
GPS Location and NAC
Which type of network model requires the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network?
Client Server
Explain BGP?
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information between autonomous systems (AS) on the Internet. The protocol is often classified as a path vector protocol but is sometimes also classed as a distance-vector routing protocol.
The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented?
Since he wishes to use a pre-shared key and not require an authentication server, WPA personal is the most secure choice. If WPA2 Personal were an option, it would be more secure, though. WPA2 Enterprise is incorrect since the requirement was for a PSK, whereas WPA2 Enterprise requires a RADIUS authentication server to be used with individual usernames and passwords for each client. MAC filtering does not use a password or preshared key. WEP uses a pre-shared key to secure a wireless network, but WPA uses a stronger encryption standard than WEP.
Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
De-encapsulation
Which type of wireless network utilizes the 2.4 GHz frequency band and reaches speeds of up to 54 Mbps?
802.11b
802.11ax
802.11g
802.11a
802.11ac
802.11n
802.11g
Level 0
Emergency System unstable
Level 1
Alert Correct Immediately
Level 2
Critical - Failure in primary application, requires immediate attention.
Level 3
Error - Preventing Proper Function
Level 4
Warning - Error might occur if action not taken soon
Level 5
Notice - Unusual but no error
Level 6
Information - no action required
Level 7
Debugging