Network Implementations - Objective 2 Flashcards

Networking devices, routing, Ethernet switching, wireless

1
Q

802.3ad

A

Link Aggregation

Combines multiple physical connections into a single logical one to minimize congestion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

802.3af max wattage

A

15.4 watts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.3at max wattage

A

25.5 watts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.1d

A

Spanning tree protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.1q

A

VLAN trunking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do IPSs & IDSs recognize attacks?

A

Through signatures & anomalies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Content Engine/Caching Engine

A

Dedicated appliance that performs the caching functions of a proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where is a Content Engine/Caching Engine highly beneficial?

A

A remote branch office with a slow WAN link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a content switch also known as?

A

A load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ICS

A

Industrial Control System

Describes the different types of control systems & associated instrumentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCADA

A

Supervisory control, and data acquisition

Acquires and transmits data from different systems to central panel for monitoring and control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The 2 routing loop prevention methods

A
  • Split horizon
  • Poison reverse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Number of non-overlapping 20 MHz channels in the 5 GHz band

A

24 channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two protocols associated with WPA

A

TKIP & RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Two protocols associated with WPA2

A

CCMP & AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geofencing

A

Uses GPS or RFID to define real-world boundaries where barriers can be active or passive

17
Q

How to crack WEP

A

Capture enough initialization vectors (IV)

[using something like Aircrack-ng]

18
Q

Type of vector used by WPA

A

TKIP

19
Q

CSMA/CA is used in what kind of network?

A

Wireless network

20
Q

CSMA/CD is used in what kind of network?

A

Wired network

21
Q

Type of encryption used by WPA

A

RC4 (Rivest Cipher 4)

22
Q

WPA2 integrity checking protocol

A

CCMP
(Counter mode cipher block chaining message authentication code protocol)

23
Q

WPA2 encryption protocol

A

AES
(Advanced Encryption Security)

24
Q
A