Random Study Cards Fr. Textbook Flashcards Preview

Networking Exam > Random Study Cards Fr. Textbook > Flashcards

Flashcards in Random Study Cards Fr. Textbook Deck (76):
1

Which of the following commands would you use to find the VLANs for when your switch is the root bridge? (pick2)

A. show spanning-tree
B. show root all
C. show spanning-tree port root VLAN
D. show spanning-tree summary

A. show spanning-tree
D. show spanning-tree summary

2

You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
A. Switch(config)#spanning-tree mode rapid-pvst
B. Switch#spanning-tree mode rapid pvst
C. Switch(config)#spanning-tree mode 802.1w
D. Switch#spanning-tree mode 802.1w

A. Switch(config)#spanning-tree mode rapid-pvst

802.1w is aka the rapid spanning tree protocol

3

Which of the following is a layer 2 protocol used to maintain a loop-free network?
A. VTP
B. STP
C. RIP
D. CDP

B. STP - spanning tree protocol

4

Which of the following modes enable LACP EtherChannel? (pick2)
A. On
B. Active
C. Passive
D. Auto

B. Active
C. Passive

5

TRUE OR FALSE
RSTP speeds the recalculation of the spanning tree when the layer 2 network topology changes

True

6

TRUE OR FALSE
RSTP is an IEEE standard that redefines STP port roles, states, and BPDUs

True

7

TRUE OR FALSE
RSTP is extremely proactive and very quick, and therefore it absolutely needs the 802.1 delay timers

False

8

TRUE OR FALSE
RSTP (802.1w) supersedes 802.1d while remaining proprietary

False

9

TRUE OR FALSE
All of the 802.1d terminology and most parameters have been changed

False

10

TRUE OR FALSE
802.1w is capable of reverting to 802.1d to inter-operate with traditional switches on a per-port basis

True

11

How many bits is the sys-id-ext field in a BPDU?

12 bits

12

In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN?
A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology

D. In an improperly implemented topology.

13

You want to configure LACP. What do you need to make sure all are configured exactly the same on all switch interfaces you are using?

Port speeds, Duplex, VLAN information.

14

Which of the following modes enable PAgP EtherChannel? (Pick 2)
A. On
B. Auto
C. Desirable
D. Prevent

B. Auto
C. Desirable

15

Which are states in 802.1d?
Blocking
Discarding
Listening
Learning
Forwarding
Alternate

Blocking, Listening, Learning, Forwarding

16

Which are roles in STP?
Blocking
Discarding
Root
Non-designated
Forwarding
Designated

Blocking, Root, Non-designated, Forwarding, Designated

17

There are three possible routes for a router to reach a destination network. The first route is from OSPF with a metric of 782. The second route is from RIPv2 with a metric of 4. The third is from EIGRP with a composite metric of 20514560. Which route will be installed by the router in it's routing table?

EIGRP. Only the EIGRP routes will be placed in the routing table because it has the lowest administrative distance (AD), and that is always used before metrics.

18

Which of the following does not describe the process identifier that is used to run OSPF on a router?
A. It is locally significant
B. It is an optional parameter required only if multiple OSPF processes are running on the router
C. It is needed to identify a unique instance of an OSPF database
D. It is globally significant

A. It is locally significant
C. It is needed to identify a unique instance of an OSPF database

19

All of the following must match for two OSPF routers to become neighbors except which?
A. Area ID
B. Router ID
C. Stub area flag
D. Authentication password if using one

B. The Router ID (RID) is an IP address used to identify the router. It shouldn't match.

20

What is the administrative distance of OSPF?

By default, 110

21

A(n) ___________ is an OSPF data packet containing link-state and routing information that is shared among OSPF routers

A. LSA

22

TRUE OR FALSE
We create OSPF in a hierarchical design to decrease routing overhead

True

23

TRUE OR FALSE
We create OSPF in a hierarchical design to speed up convergence and confine network instability to single areas of the network

True

24

If routers in a single area are configured with the same priority value, what value does a router use for the OSPF router ID in the absence of a loopback interface?

The highest IP address of any physical interface

25

TRUE OR FALSE
Maximum hop-count limitation is a scalability issue with single-area OSPF networks

False

26

When would a router's neighbour table show the FULL/DR state?

When all information is synchronized among adjacent neighbours

27

TRUE OR FALSE
When a packet is being compared to an access list, until all lines have been analyzed, the comparison is not over.

False

28

What is the most common attack on a network today?

Denial of Service
It's the easiest to achieve

29

You need to stop DoS attacks in real time and have a log of anyone who has tried to attack your network. What should you do to your network?

Implement Intrusion Detection Services/Intrusion Prevention Services

30

BGP (border gateway protocol) uses which Transport layer protocol and port number?

TCP/179

31

What are some benefits of using a VPN in your internetwork?

Security, cost savings, scalability

32

What two technologies are examples of layer 2 MPLS VPN tech?

VPLS, VPWS
Virtual Private Lan Switch, Virtual Private Wire Service

33

What devices can interfere with the operation of a wireless network because they operate on similar frequencies?

Microwave, cordless phone

34

Which wireless standard allows you to channel-bond to increase bandwidth and uses both the 2.4gHz and 5gHz frequencies?

802.11n

35

How many non-overlapping channels are available with 802.11a?

12

36

What is the maximum data rate for the 802.11a standard?

54Mbps

37

You need to install wireless on multiple floors of a large building and maintenance area. What is your first concern before installing the APs?

Channel overlap

38

What is the maximum data rate for the 802.11b standard?

11Mbps

39

What is the highest encryption that WPA2 can use?

AES-CCMP
Advanced Encryption Standard -
Counter Mode Cipher Block Chaining-Message Authentication Code (CBC-MAC) protocol

40

Which spread-spectrum technology does the 802.11b standard define for operation?

DSSS
Direct Sequence Spread Spectrum

41

How wide are the channels used in 802.11n in order to gain the large bandwidth that the specification provides?

40MHz
802.11n uses two 20MHz wide channels to create a 40MHz wide channel which provides over 100Mbps wireless

42

What tunneling protocol is based on RSA public-key encryption?

SSL

43

What is the minimum number of characters you should use when creating a secure password?

8
min 8 - max 15

44

Which layer of the OSI model does IPSec operate in?

Network (layer 3)

45

To encode or read an encrypted message, what tool is necessary?

Encryption key

46

Which of the following is not a Network Access Control method?
CHAP
802.1x
EAP
ICA

ICA - Independent Computing Architecture is a protocol designed by Citrix Systems to provide communication between servers and clients. ICA is a remote-access method.

47

What is session fixation?

A network attack where the attacker sets the session ID ahead of time by sending a link to the victim with the ID preset

48

Which type of virus impacts files with the filename extensions .com, .exe, and .dll?

File viruses

49

In which type of attack does the attacker scan for networks using a high-powered antenna connected to a wireless laptop?

War driving

50

Monkey B, Michelangelo, Stoned, and Stealth Boot are examples of which type of virus?

Boot sector

51

Which type of virus affects both the boot sector and files on a computer?

Multipartite

52

What is the main difference between a worm and a virus?

A worm can actively replicate itself without user intervention, whereas a virus can be activated and spread only if a user opens an application

53

What kind of attack involves the hacker attempting all combinations of characters for a password to gain access?

A brute-force attack

54

What type of security threat allows an attacker to learn your password through the use of an email or phone call?

Social engineering, or phishing

55

Which type of policy should be implemented to secure important company documents and materials when employees leave their workstation?

A clean-desk policy

56

What type of wireless frame populates the display when someone is scanning for wireless networks?

Beacon

57

What defines the appropriate response to a security event on a network?

Implementing security procedures

58

Which of the following security mechanisms has been compromised?
WEP
802.11i
WPA2 Enterprise
RADIUS

WEP

59

Which type of scanning allows an antivirus program to search for a virus even if there is no definition for it?

Heuristic scan
This will look for suspicious activity

60

What type of files need to be updated in order for your antivirus program to have the latest information about attacks and viruses?

Definition files

61

Firewalls works by allowing only _______ that pass security restrictions to be ________

Firewalls work by allowing only PACKETS that pass security restrictions to be FORWARDED

62

What device can read an entry card from a distance?

Proximity reader

63

What is the main difference between a network-based firewall and a host-based firewall?

A network-based firewall protects a network, not just a single host.

64

IDSs (Intrusion Detection System) can identify attackers by their ________

Signature

65

Which is not a type of ACL?
A. Standard
B. Extended
C. Referred
D. Outbound

C. Standard

66

What is it called when the firewall ignores an attack?

Shunning

67

What is the function of a DMZ?

To create a security zone that allows public traffic but is isolated from the private inside network

68

In which type of test is the testing team provided with limited knowledge of the network systems and devices using publicly available information?

A blind test

69

Changing network configurations, terminating sessions, and deceiving the attacker are actions that can be taken from what type of security device?

Intrusion Prevention System (IPS)

70

_______________ act on behalf of the whole network to completely separate packets from internal hosts and external hosts

Proxies

71

A(n) _______ firewall keeps track of the established connections passing through it.

A stateful firewall

72

A(n) _______________ learns what is "normal" on the network and can react to abnormalities even if they're not part of the signature database.

Intrusion Prevention System (IPS)

73

Which OSI model layers do WAN protocols operate in?

Physical, datalink, network
Layers 1, 2, 3

74

You have a small office/home office environment. What WAN technology would most likely be used?

Cable modem

75

Which cellular WAN technology has the best data rate?

LTE is true 4G and has the best data rates.

76

What does DOCSIS stand for?

Data Over Cable Service Interface Specification