Study Cards Flashcards Preview

Comptia Net+ > Study Cards > Flashcards

Flashcards in Study Cards Deck (75):
1

The length of time a computer is allowed to use a dynamic Internet Protocol (IP) address provided by a DHCP server is known as the ________.

Lease Time

2

True/False: A Network collision happens when two devices attempt to communicate on the same physical segment at the same time.

True

3

True/False: A Firewall can permit, deny, encrypt, decrypt and proxy all computer traffic that flows through it.

True

4

True/False: Firewalls are not usually a combination of hardware and software.

False

5

Which type of security device or software employs a redirection device known as a honeypot.

IPS (Intrusion Prevention System)

6

Which Type of firewall keeps track of existing connections passing through it?

Stateful

7

If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

Content Filtering

8

What is a firewall’s list of rules, which it uses to block traffic?

Access Control list (ACL)

9

If you want to allow remote access to 500 users, which type of device is recommended?

VPN Concertrator

10

What is a security zone that allows public traffic but is isolated from the private network called?

DMZ

11

Which unsecure protocol uses port 80 by default?

HTTP

12

What is 192.168 in Binary?

1100000.1010100

13

What port number does Secure Shell (SSH) use by default?

22

14

Logging, notification, and shunning are what types of reactions from type of security device?

Passive reactions from an IDS

15

True/False: A demilitarized zone (DMZ) is a network segment that is neither public nor local but halfway between.

True

16

You add a new cable to your network. What document do you update?

Wiring schematics

17

True/False: An intrusion detection system replaces a firewall on your network.

False

18

True/False: An intrusion detection system (IDS) can detect within encrypted traffic.

False

19

An Intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion.

True

21

192.168.10.28/28 is an example of which kind of notation?

CIDR

22

Which terminal emulation program is insecure because it does not encrypt any data including usernames and passwords?

Telnet

23

Which network topology has the most physical connections per host, which means it will have the least collisions?

Mesh

24

In a Class C Address, a network ID is how man bits?

24

25

100BaseTF uses what type of cable medium?

Ethernet over Fiber

26

True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block?

False

27

A UTP cable running 1000Mbps can be a maximum distance of ________.

100 Meters

28

How can you verify that your DMZ is allowing TCP ports through?

Telnet to the ports in question on the DMZ server.

29

True/False: A parabolic is a type of omnidirectional antenna.

False

30

True/False: A dipole is an omnidirectional antenna.

True

32

A network administrator is going to implement a packet filter on a network for Internet connections. What port must be allowed through the firewall for users to connect to secure websites?

443

33

What protocol is used within a ping command?

ICMP

34

True/False: A repeater can be used to cache web pages for future retrieval.

False

35

True/False: A proxy service can be used to cache web pages for future retrieval.

True

36

What device can measure the time a signal goes down and back on a cable?

TDR

37

What device connects a local area network (LAN) to a T1 circuit?

Channel service unit/data service unit (CSU/DSU)

38

A OTDR is used to test what?

Fiber

39

When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?

Converged

40

Which two protocols allow secure access to a VPN?

PPTP and IPSec

41

What tool is used to connect an RJ-45 to a UTP?

Crimped

42

What wire pairs connect to a 66 block from the telecommunication company?

25 pair

43

Implementing policies and procedures that define how corporate information is kept confidential and training on these procedures can help prevent what?

Social engineering

44

At what layer of the Open Systems Interconnect (OSI) model does a router function?

Network, Layer 3

45

Which TCP/IP well-known port number identifies Simple Mail Transfer Protocol (SMTP)?

25

46

Which routing protocol uses a next hop as a metric in deciding how to route traffic?

RIP

47

True/False: 156.144.226.123 is a valid IP Address?

True

48

Which device monitors inbound and outbound network connections in order to identify suspicious activity?

IDS

49

True/False: The Transport Layer converts digital data into electronic signals to be put on a wire?

False

50

Which two commands can you type to see the DNS servers that your computer is using?

ipconfig and nslookup

51

True/False: Internet Protocol Security (IPSec) encrypts data between web browsers and web servers.

False

52

Which device or software can identify and react to an attack by shutting down a port or dropping certain type of packets?

IPS

53

True/False: Using Domain Name Service (DNS) will segment a network.

False

54

True/False: TCP is connection-oriented and UDP is unreliable.

True

55

When configuring a wireless access point, what should you considering when selecting a channel?

Select a channel farthest from that of any other AP in the area.

56

What does SNMP provide?

Automated alerts and reports on network devices.

57

Your boss tells you to block certain ports on your firewall. What documentation do you need to update.

Policies, Procedures, and configurations

58

You need to provide inter-VLAN communications. what device do you need?

A Layer 3 Switch (ROuter)

59

True/False: Antivirus (AV) software will help protect a computer from hackers.

False

60

True/False: Antivirus (AV) software will help protect a computer from Trojan horses.

True

61

A packet-filtering firewall operates at which of the OSI Model?

Transport and Network

62

True/False: A Packet-filtering firewall operates at the Network and Data Link layers of the OSE Model.

False

63

Which networking topology connects computers via a central device?

Star

64

True/False: A Ring networking topology connects computers via a central hub.

False

65

True/False: A cable modem selectively forwards data packets.

False

66

True/False: A bridge can selective forward data packets.

True

67

True/False: A Bridge is a network device that operates at Layer 2 of the OSI model.

True

68

True/False: A switch is a network device that operates at the Layer 2 of the OSI model.

True

69

True/False: A hub and a repeater operate at Layer 2 of the OSI Model.

False

70

True/False: A Hub and a Switch operate at the same layer of the OSI Model.

False

71

True/False: A router and a bridge operate at the same layer of the OSI Model.

False

72

What is 0110001.00011010 in decimal?

99.26

73

A company wants to have intranet. Where would the intranet web server be located in the network?

In the local area network (LAN), usually behind the wire wall to the WAN.

74

True/False: A networking administrator wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.

False

75

True/False: A Hub and a router operate at the same layer of the OSI model.

False

76

HTTPS uses what TCP destination port number?

443

77

True/False: Virtual local area networks (VLANS) create collision domains.

False