Shared Flashcard Set

Details

Net+ Practice
Practice Questions
606
Computer Networking
Intermediate
12/03/2017

Additional Computer Networking Flashcards

 


 

Cards

Term
best way to optimize servers regarding RAM?
Definition
Load balancing
Term
3g networks
Definition
2Mbps
Term
command represents multiple gets for reading information from multiple devices
Definition
walk
Term
A user is reporting that the network connection icon occasionally flashes a yellow exclamation point and then the user temporarily cannot connect to any network resources. What should the technician check first?
Definition
Cable
Term
connectors collect dust and static and thus have problems with performance, what is this condition known as?
Definition
dirty connectors
Term
What is true about VLAN tagging?
Definition
it should be used if trunking is taking place
Term
How does sampling affect overall performance of the network?
Definition
it will make it slower
Term
Which Ethernet network uses BNC connectors?
Definition
10Base2
Term
How many hexadecimal numbers are contained in an IPv6 address?
Definition
32
Term
In a speed and duplex mismatch, at least one of the ends of the connection probably does not have its NIC set to which setting?
Definition
Autonegotiation
Term
A junior network administrator is learning about DoS attacks. The administrator stages an NTP attack. The only problem is the administrator thought he/she was on the testing network but this was done in production. What type of DoS attack is this?
Definition
Unintentional
Term
Which type of authentication is known for single-sign on?
Definition
Kerberos
Term
What site helps with steps to recover after a computer has been compromised?
Definition
www.cert.org
Term
What is a protocol wireless LAN controllers use to manage multiple access points in a wireless network?
Definition
LWAPP
Term
Which command-line tool is used to see which TCP ports on a system are either in use or waiting to be used?
Definition
netstat -p TCP
Term
What is the release of secure information to an untrusted environment known as?
Definition
Data breach
Term
Which network storage type offers speeds up to 10 Gbps for data storage?
Definition
Fibre Channel
Term
If a network includes video teleconferencing as a type of data, what type of network architecture can help the video teleconferencing coexist well with other data types?
Definition
Medianet
Term
In addition to monitoring racks for access, what should also be monitored?
Definition
Environmental conditions
Term
A user wants to make sure his/her wireless hotspot only allows devices the user chooses. What is the best way to accomplish this?
Definition
Use MAC filtering
Term
What technology prevents a router from advertising a route back to the router from which it was just learned?
Definition
Split horizon
Term
When a firewall is referred to as one that performs UTM, what can it perform besides firewall duties? Choose all that apply.
Definition
Load balancing
Content filtering
Intrusion prevention
Term
Which component of QoS is a parameter used to differentiate types of payloads being transmitted?
Definition
COS
Class of Service (COS) is used to differentiate the types of payloads being transmitted. It is used in both voice and data.
Term
What protocol must be enabled in order to enable multicast group memberships?
Definition
Internet Group Management Protocol (IGMP) enables multicast group memberships.
Term
What type of attack involves a TCP attack in which packets are never acknowledged?
Definition
A SYN flood sends packets but never sends final acknowledgement, leaving too many sessions open for legitimate traffic to come through.
Term
What is the easiest way to avoid device saturation in a wireless network?
Definition
Add access points
Term
What is the encryption level when using PAP for authentication?
Definition
No encryption
Password Authentication Protocol (PAP) has no encryption, so a username and password are sent in clear text.
Term
What is the speed standard for an Edge network?
Definition
384 Kbps
Term
What is the biggest type of vulnerability to firmware and/or an operating system as a result of not patching firmware and/or an operating system?
Definition
Security
A lack of patching firmware and/or operating systems can lead to significant security vulnerabilities. Any security patch should be tested and applied as soon as possible.
Term
Which type of crosstalk measures EMI at the same end of the cable as the interfering transmitter?
Definition
NEXT
Near-end cross talk (NEXT) is crosstalk where the interference level is measured at the same end of the interfering transmitter.
Term
Several users are connected to an 802.11n wireless network. They all use 802.11n adapters and the wireless network is in an open-cubicle type building with no microwaves nearby. Several users are complaining about slow speeds. What is the most likely cause of this issue?
Definition
The users with slower speeds are further away from the access point than others
Term
Lync Server and Unified Communications Manager are examples of which type of servers?
Definition
Lync Server and Unified Communications Manager are examples of Unified Communication (UC) servers.
Term
Which document looks at policies and procedures for forensics analysis in a company?
Definition
Forensics report
Term
A field engineer has a laptop and is out in the field. There is no available Internet access in the building but the engineer's phone has Internet access. What can the engineer set up in order to access the Internet on the laptop through the phone?
Definition
Hotspot
Term
What devices on home networks often contain firewall capabilities? Choose all that apply.
Definition
Router
Wireless access point
Term
When a system is compromised due to an attack, what aspects are known to possibly be compromised? Choose all that apply.
Definition
Integrity
Availability
Confidentiality
Term
Which ports are used for MGCP? Choose all that apply.
Definition
2427
2727
Term
Which tool is used to filter web content?
Definition
Proxy server
Term
Which routing protocol uses the SPF algorithm to find the lowest cost path to a network destination but does not distribute topology information to other routers?
Definition
IS-IS is a routing protocol which uses the SPF algorithm to find the lowest cost path to a network destination but does not distribute topology information to other routers.
Term
What type of users have no access to network resources yet attack a network?
Definition
Users that do not have access to network resources are known as untrusted resources.
Term
What network policy should be implemented before personal cell phones are allowed on a corporate network?
Definition
BYOD
Term
Which tool is used to measure voltage, current, and resistance for an electrical object?
Definition
Multimeter
Term
What is a snapshot of a current configuration that could be used to roll back an update?
Definition
A baseline is a snapshot of a current performance or configuration.
Term
Who should handle the approval process in change requests?
Definition
The committee that handles change requests should be the entity that approves the requests. This could be one person in a small business.
Term
To best harden a desktop, users connected to a domain should not have which kind of permissions on their machines?
Definition
To harden a desktop, users should not be local administrators on their machines. This will prevent them from performing administrative functions a domain administrator should be doing.
Term
What type of control system has a hierarchy of controllers connected through communication networks?
Definition
A distributed control system (DCS) is a control system in which control elements are distributed throughout the system.
Term
What types of HVACs condition a server room for humidity levels?
Definition
Energy Recovery Ventilators (ERVs) condition for humidity.
Term
Which type of tool is best used for monitoring ports on routers and switches?
Definition
An interface monitoring tool best monitors physical ports and NICs for errors, utilization, packet drops, resets, and speed/duplex problems.
Term
A network administrator wants to make sure that the company email server is the only mechanism for relaying outgoing mail. Which port should be blocked on the company firewall for every device except the email server?
Definition
Port 25 should be blocked as that is the port of Simple Mail Transfer Protocol (SMTP), an outgoing email protocol.
Term
What is a concern of virtual NICs that rarely, if ever, exists with physical NICs?
Definition
Virtual NICs could have the same MAC address if they come from different host machines and then join a network.
Term
Which IP address is a multicast address?
Definition
Class D addresses start with a number between 224 and 239.
Term
What is a device that helps direct traffic in a single network segment?
Definition
A switch controls traffic within a network segment.
Term
A network administrator wants to make sure the email server is the only machine on the network that can run SMTP. What can the administrator run on other network machines to make sure SMTP is not enabled?
Definition
To ensure SMTP is not enabled on network machines, port 25 needs to be closed. A port scanner can determine open and closed ports on a machine.
Term
Which network system operates with many of its devices remotely controlling equipment?
Definition
Supervisory Control and Data Acquisition (SCADA) networks are networks on which equipment is often remotely controlled.
Term
Which ports are used for SIP? Choose all that apply.
Definition
SIP uses ports 5060 and 5061.
Term
What is the main purpose of a virtual firewall?
Definition
Control packets through packet filtering and monitoring
Term
A firewall application running on a desktop is an example of which kind of firewall?
Definition
A firewall running on a desktop is an example of a host-based firewall.
Term
Which operating system updates are considered to be the most critical of updates?
Definition
Security updates are considered to be the most critical of updates for operating systems.
Term
What types of servers read data from and then control remote equipment?
Definition
Industrial Control Systems (ICS) host servers that read data from remote equipment and then control equipment.
Term
Which is true about blocking and forwarding in switch configuration?
Definition
To avoid redundant switch links, blocking can be turned on to accept BPDU messages but not forward them to other switches.
Term
A technician needs to measure device density in a wireless network in an industrial building. What is the technician specifically checking for?
Definition
The number of devices within an area is also known as device density.
Term
What could, without an emergency, cause temperatures in server racks to be either too high or too low?
Definition
Improper air flow (including due to leaving the door open to the server closet) is a big cause of improper temperatures for a server rack.
Term
Which type of fire extinguisher rating should be used for electrical fires?
Definition
A fire extinguisher with a C rating should be used on electrical fires.
Term
What class is used for an IP address of 75.76.77.68?
Definition
This is an example of a class A IP address.
Term
Which connector often connects a computer to an external modem?
Definition
A DB-9 connector is often used to connect a computer to an external modem.
Term
To make sure all incoming ICMP data packets are blocked, which is the best tool to use?
Definition
A firewall blocks ports and/or protocols, so it should be used to block ICMP data packets.
Term
Which term describes purposely obstructing or interfering with a signal in order to prevent devices from communicating with access points?
Definition
Purposely obstructing or interfering with a signal in order to prevent devices from communicating with access points is known as jamming.
Term
Which allows for equal cost paths, faster convergence, and an effective use of the mesh topology?
Definition
Shortest Path Bridging (SPB) allows for multiple equal cost paths which leads to faster convergence. It also better uses mesh topolgies for increased bandwidth.
Term
A junior technician is saying that Android tablets all have different locations for wireless settings and connections. This is due to the Android operating system being what type of operating system?
Definition
open
Term
Which wireless standard is compatible with all of the previous 802.11 wireless standards?
Definition
802.11n runs on both the 2.4 GHz and 5 GHz bands so it is backward compatible with all of its previous standards.
Term
A network administrator needs to set up address translation on a web server that both the internal network and external clients need to reach. What is the best form of address translation to set up?
Definition
A Static NAT (SNAT) should be configured so that the web server address is always the same both internally and externally.
Term
A route print table has been generated for a machine with an IP address of 10.3.4.5 and a default gateway of 10.3.4.1. What is the default routing destination in this scenario?
Definition
The default routing destination in most routing tables is 0.0.0.0 as it accounts for all unknown destinations.
Term
What is true about TACACS+ and RADIUS?
Definition
TACACS+ encrypts an entire authentication packet while RADIUS encrypts just the password
Term
What is the transmission rate for an OC3 connection?
Definition
Each OC level is 51.84 Mbps. So OC3 is 51.84 x 3 = 155.52 Mbps.
Term
What is a transformer used to extend a signal from a demarcation point known as?
Definition
Copper line driver or repeater
Term
Which is an attack that steals session information from a user and uses it to make the recipient think the original session with the original user is still open?
Definition
In session hijacking, session information is stolen and then the attacker acts like the original user still has the session going.
Term
Which type of alert is well-suited for non-urgent issues discovered when monitoring networks?
Definition
For non-urgent issues, email alerts will usually suffice when a network is being monitored.
Term
What does route redistribution do with routers?
Definition
Route redistribution takes a route on one protocol and advertises it on another protocol.
Term
What is true about the difference between MIMO and MU-MIMO?
Definition
Multi-user Multiple Input Multiple Output (MU-MIMO) directs signals to multiple addresses, thus giving it switch-like capabilities, something MIMO does not possess.
Term
What is the role of power inverters in power management?
Definition
Power inverters step power up in a network.
Term
As part of a change request, what does a rollback process describe?
Definition
A rollback process explains how any changes will be changed back to the original network configuration if needed.
Term
A network administrator has determined that performance is being compromised on a server due to an outdated antivirus program. The administrator has notified the users that the server will be down for 15 minutes while the server reboots from installing a new program. What troubleshooting theory step is next?
Definition
Implement the solution
Term
What is the main purpose of a server rail rack?
Definition
The main purpose of a server rail rack is to hold servers in the rack.
Term
What are the two main parts that make up IPsec?
Definition
Authentication Header (AH) makes up the authentication part of IPsec while Encapsulating Security Payload (ESP) makes up the encryption part of IPsec.
Term
A network attack in which an attacker sends a UDP request to a server managing time and then gets a response containing multiple responses is what type of attack?
Definition
An NTP attack sends a small request but can receive an answer up to 600 times longer than the request. This attacks a server managing time on a network.
Term
Which fiber-optic connector has a threaded body?
Definition
An FC connector has a threaded body and is often used in places where vibration occurs.
Term
Which wireless topology involves connecting two access points, thus basically replacing the need for a cable?
Definition
A wireless connection between two access points is known as a point-to-point connection.
Term
A UPS can be utilized to prevent a server from rebooting in case of a brief power reduction. What is this power reduction known as?
Definition
A sag is a short-term voltage drop and can cause a server to reboot.
Term
What is the first job of a UPS in a network environment?
Definition
Uninterruptible power supply (UPS) devices keep power running for a short time in case of a power outage.
Term
A machine logs into the network without incident. Nine days later, it attempts to log in again. This time a message appears indicating a duplicate IP address exists on the network. What is the most likely cause of the error?
Definition
A DHCP lease typically expires after eight days. If the machine logs in after that, it will try to obtain an IP address. If that address is taken by a machine with a static IP address, the most likely problem is that the DHCP scope has one or more addresses used by machines with a static IP address.
Term
What is the type of network that is a private network but a few public members are invited?
Definition
An extranet consists of a private network (intranet) with a few connections to targeted entities outside of the network.
Term
Which wireless concept involves getting multiple interfaces to be set up as a single entity?
Definition
In VLAN pooling, clients are randomly assigned a VLAN that is part of a cluster of VLANs sharing the same SSID. This allows for load balancing for an SSID.
Term
What can cause a ricochet effect in fiber-optic transmissions?
Definition
A ricochet effect occurs when light has to adjust to a different micron diameter in a fiber-optic cable connection. Using a 50-micron cable in a 62.5-micron transceiver is an example of this. This can cause reduced throughput.
Term
What type of site can allow a user to view routing information from a server's perspective?
Definition
A looking glass site allows users to view routing information from a server's perpective.
Term
A small business has a 24-port switch. The business owner wants to make sure only computers that are internal to the businesses are allowed onto the network. What would be the best way to enforce this?
Definition
For a switch with a small number of users, MAC address filtering ensures that only the MAC addresses specified will be allowed through the switch.
Term
When purchasing items for a network, a procurement requirements sheet states that these items can only be purchased from a small set of approved vendors. What is this an example of?
Definition
This is an example of equipment limitations.
Term
What type of transmission uses TDM?
Definition
Baseband uses TDM to send multiple signals on a single cable.
Term
Which device can amplify a wireless signal?
Definition
A repeater can help mitigate signal loss as it amplifies a signal from a wireless access point. This also helps increase the distance a client device can be from a wireless access point.
Term
An 802.11n wireless network has a speed standard of 600 Mbps. The actual average speed has been consistently measuring at 300 Mbps. What is this known as?
Definition
The actual average speed of a wireless network is known as goodput (good throughput).
Term
A small business wants a DNS entry so it can be accessed remotely by name. However, the business does not have a static IP address. What type of DNS entry can be set up to satisfy the business need?
Definition
A dynamic DNS changes as a company's IP address changes. So this would satisfy the business need.
Term
What is TLS a successor to?
Definition
Given that SSL is used for client/server applications, TLS is a successor to SSL.
Term
What are users who use the most bandwidth each month to receive data known as?
Definition
Top listeners are users who receive the most data.
Term
What is evaluated during a posture assessment on a system? Choose all that apply.
Definition
Settings
Applications
Term
A network administrator has used MIMO to set up a wireless network. Recently, the performance of the network is about half of what it once was. What is the most likely issue here?
Definition
Multiple Input Multiple Output (MIMO) uses multiple antennas. If performance starts to suffer, it is usually due to one of the antennas failing.
Term
Of the following obstructions, which one typically causes the most interference in a wireless network?
Definition
A fountain of water will typically cause a higher level of interference than walls, people, or windows.
Term
Generally, a SYSLOG error level of 0 in a UNIX/Linux environment means what type of severity?
Definition
In most SYSLOGs in UNIX/Linux, the lower the number, the worse the problem. A level 0 problem indicates an emergency alert in that the system is currently unusable.
Term
Which DSL type involves differing upload and download speeds?
Definition
Asynchronous DSL (ADSL) involves differing upload and download speeds.
Term
What is the biggest reason for redundancy in network devices?
Definition
Redundancy is best used to protect against a single point of failure.
Term
A user regularly uses the corporate wireless network. The user is gone for a month, during which time the company changed ISPs. Now, the user cannot get on the wireless network. What is the most likely reason?
Definition
A new wireless network usually means a new Service Set Identifier (SSID). The user probably is trying to connect to the old network.
Term
Which switch port security feature, when set up, will drop data packets from invalid IP-to-MAC address bindings?
Definition
ARP inspection, when enabled, will drop packets with invalid IP-to-MAC address bindings.
Term
Which device is best suited for terminating private connection tunnels?
Definition
A VPN concentrator can terminate VPN tunnels and encrypt data over a VPN connection.
Term
Which SNMP version supports encryption?
Definition
SNMPv3 supports encryption.
Term
What is often perceived as the biggest threat to network security?
Definition
Disgruntled employees often make for the biggest threat to network security. There is no true preventive measure for this.
Term
Which is a piece of equipment that helps connect computers with hubs and switches?
Definition
Patch panels help connect the ports computers connect to with hubs and switches.
Term
Which connectionless protocol operates on layer 4 of the OSI model?
Definition
The User Datagram Protocol (UDP) is a connectionless protocol that operates on layer 4 of the OSI model.
Term
What is a vulnerability in VoIP?
Definition
Because VoIP uses the same line as data, it is vulnerable to attack just like data is vulnerable to attack.
Term
If a split pair is unintentional, what is a likely problem with the cable? Choose all that apply.
Definition
Open
Short
Term
A technician is running 10GBase-SR cable in place of twisted-pair cable. The cable speeds are below standard for a connection from the west side of a building to the east side of a building. What is the most likely problem the 10GBase-SR cable is having?
Definition
The distance limitation of 10GBase-SR is actually less (26-82 meters) than that of twisted pair cable (typically 100 meters). This is the most likely problem with the network setup.
Term
What does the ht stand for in the 802.11a-ht networks?
Definition
The 802.11a-ht standard is 802.11a with a higher throughput connection type.
Term
Which part of switches carries information between two devices with more than one VLAN?
Definition
Trunking is a point-to-point link that carries information on all VLANs on a switch.
Term
A 200m fiber-optic connection using multi-mode fiber needs to be set up between two business locations. The fastest possible connection is needed. Which standard can be used here?
Definition
10GBase-SW can extend to 300 meters and 100Base-FX can extend to 2km. Both exceed the needed distance but 10GBase-SW is faster so it should be used.
Term
Which VPN protocol is most used with HTTPS traffic?
Definition
Secure Sockets Layer (SSL) works in conjunction with HTTPS data.
Term
When first setting up a network, users are granted access to one specific folder on one specific network drive. All other access has to be approved by management. This is an example of which concept?
Definition
Implicit Deny simply means that by default, access is denied. This is a best practice for managing permissions in networks.
Term
Which standard uses Ethernet over HDMI?
Definition
Ethernet over HDMI uses the IEEE 1905.1-2013 standard.
Term
The protection of computer centers and network closets, key fobs, keypads, cipher locks, and biometrics are all examples of what?
Definition
Key fobs, keypads, cipher locks, and biometrics can all be used as door access controls.
Term
If a default gateway is unreachable, what will a user not be able to do?
Definition
Without a reachable default gateway, users cannot connect to any place outside of the local network.
Term
What is used to assign addresses dynamically in IPv6?
Definition
DHCPv6 (also known as DHCP6) is used to dynamically assign IPv6 addresses.
Term
Which category of twisted-pair cable is needed for 10GBase-T?
Definition
6a
Term
Which of the following update types is considered to be the least critical of updates?
Definition
A feature update usually enhances a software application or device but does not normally fix problems with the software application or device.
Term
Which component of QoS classifies and manages network traffic?
Definition
Differentiated Services Code Point (DSCP) specifies a mechanism for classifying and managing network traffic and providing QoS.
Term
Which protocol supported dial-up networking in older versions of Windows?
Definition
Point-to-Point Tunneling Protocol (PPTP) supported dial-up networking in older versions of Microsoft Windows.
Term
An access point for a wireless network has a setting for WPA2-AES. A client trying to connect to this access point uses WPA. As a result, the client cannot connect to the network. What is incorrect on the client machine?
Definition
WPA2-AES and WPA are encryption types. Encryption types need to be the same on both an access point and a client in order for the two to connect on a wireless network.
Term
Which type of attack involves using oversized ICMP packets to crash IP devices?
Definition
An attack involving using oversized ICMP packets to crash IP devices is a Ping of Death.
Term
When collecting evidence in a security event, what is the most important part of documentation?
Definition
The most important part of documentation in a security incident is to document who saw or touched the evidence and when.
Term
In a network, what can be set up for remote users to access network files faster, especially if the files do not change often?
Definition
Caching can be set up on a network to keep copies of files closer to remote users, thus reducing network traffic and increasing performance.
Term
What is the distance limitation for 10Base-2 coaxial cable?
Definition
10Base-2 coaxial cable has a distance limitation of 185 meters.
Term
What is the process by which an SNMP manager retrieves information from an SNMP-managed device known as?
Definition
A retrieved message in SNMP is known as a get.
Term
What is the process of hacking a network to see header information on data and obtain the MAC address and OUI of a system known as?
Definition
Banner grabbing is the process in which a hacker gains MAC address and Organizationally Unique Identifer (OUI) information on a MAC address.
Term
What is the maximum speed available when using a dial-up, analog modem?
Definition
56 Kbps is the maximum speed a dial-up connection using Plain Old Telephone Service (POTS) will get.
Term
Which network type is best suited for centralized management of usernames, passwords, storage, and backup and restore?
Definition
A client/server is best for large networks as it has a centralized model for usernames, passwords, storage, and backup and restore.
Term
Which policy type describes acceptable use of network resources?
Definition
Acceptable use policies govern proper use of network resources.
Term
How many connections are in a full mesh network with nine devices?
Definition
Using the formula of n(n-1)/2 where n=9, there are 9 x (9-1) /2 or 72/2 or 36 connections.
Term
What type of tool is used to find open ports on a system?
Definition
A port scanner scans for open ports on a system.
Term
Which type of wireless network involves a direct connection between two devices?
Definition
An ad hoc wireless network involves a direct connection between two devices (like laptops).
Term
On what standard is WiMAX based?
Definition
WiMAX is based on the 802.16 standard, the standard for metropolitan area networks.
Term
Why should vulnerability patches be installed as soon as possible?
Definition
Vulnerability patches fix potential security issues.
Term
Which type of service provides machine-to-machine interaction over a network?
Definition
The service that provides machine-to-machine interaction and data retrieval is a web service.
Term
A network with coaxial cabling needs to connect to a fiber-optic network. Which device is used for connecting these two networks?
Definition
A media converter can connect a coaxial cable network with a fiber-optic cable network.
Term
Typically, single-mode fiber-optic cables will have which advantages over multimode fiber-optic cables? Choose all that apply.
Definition
Single-mode fiber uses a direct beam of light to transmit data. This allows for higher speeds and longer distances.
signal strength
Term
Which routing protocol supports autonomous system numbers?
Definition
Border Gateway Protocol (BGP) routes autonomous systems and thus it supports autonomous system numbers.
Term
Which protocol allows a default router address to be configured in case a primary router fails?
Definition
Hot Standby Router Protocol (HSRP) is a Cisco-proprietary protocol that allows for a configuration of a default router address should a primary router fail.
Term
A firewall set up on a server operating system is known as what brand of firewall?
Definition
Firewalls can be either be hardware or software-based. A firewall set up within a server operating system is software-based.
Term
What type of device controls machinery such as factories, amusement rides, and light fixtures?
Definition
A programmable logic controller (PLC) controls machinery, specifically electromechanical processes.
Term
A data packet has a destination of 255.255.255.255. Where is it going on the network?
Definition
255.255.255.255 is a broadcast address meaning ""go to everyone on the network.""
Term
What is the maximum distance for Ethernet cable over power lines?
Definition
Ethernet cable over power lines can carry a signal up to 100 meters.
Term
What is the process in which data needs to be kept for evidence even long after an incident takes place known as?
Definition
A legal hold dictates requirements for keeping all aspects of forensics analysis for any security incident.
Term
What does SNMPv3 support that SNMPv2 does not?
Definition
SNMPv3 has better security than SNMPv2 in that SNMPv3 supports encryption and authentication.
Term
What is one potential problem with logging all application events verbosely?
Definition
The more verbose the logging, the larger a log file is and/or the more log files are generated. Though generating more log files is not a problem in itself, the resulting storage on a hard disk can be an issue.
Term
When troubleshooting end-to-end connectivity, what is the first step?
Definition
When troubleshooting end-to-end connectivity, the first step is to identify what a user can and cannot connect to. This falls under the first step in troubleshooting, identifying the problem.
Term
What formula comprises signal-to-noise ratio in wireless networks?
Definition
The signal-to-noise formula is the difference between the noise floor in decibels and the decibels of received signals. If, for example, a signal is at -70 db and the noise is -90 db, the signal-to-noise ratio is 20 db.
Term
What should a URL start with if a website requires the user to log in?
Definition
For any e-commerce transaction over the web, a URL should start with HTTPS.
Term
A junior network administrator asks a senior network administrator about wardriving. How would the senior network administrator respond?
Definition
Wardriving is the act of driving around looking for open wireless access points.
Term
On what ports does NetBIOS operate? Choose all that apply.
Definition
NetBIOS operates on ports 137, 138, and 139.
Term
A user has a static IP address set and can log in to the network but cannot reach most of the network servers by name. What is most likely incorrect in the user's NIC settings?
Definition
Anytime someone can reach machines but not by name, the DNS settings on the machine should be checked as chances are the DNS server address is incorrect.
Term
How is a virtual-wire firewall different from a routed firewall?
Definition
it does not need an ip address
Term
Which business document type is often legally equivalent to a contract?
Definition
A statement of work (SOW) encompasses the what, how, and when of a project or contract.
Term
What type of testing exploits weaknesses in network security?
Definition
Penetration testing tries to exploit weaknesses in network security.
Term
A user is trying to connect via Remote Desktop but is unsuccessful. If this is a port issue, what port should the network administrator be looking at to see if it is blocked?
Definition
3389
Term
Which protocol is not considered secure for logging into UNIX systems?
Definition
Telnet is not considered secure for logging into UNIX systems.
Term
If a switch needs to send and receive data at the same time, what duplex mode needs to be on?
Definition
Full-duplex setting is needed on a switch if it is to send and receive data at the same time.
Term
A user calls the help desk and says that when accessing an internal website, the user is being redirected to a site that is asking for personal information. This is most likely what type of attack?
Definition
Though phishing is taking place, the attack itself is most likely a DNS attack in that the website most likely has the wrong IP address listed.
Term
In a building, two wireless access points that are fairly close to each other are having signal disruptions. One access point is using channel 1 and the other is using channel 4. What would be the easiest remedy to try?
Definition
This is a case of overlapping channels. The wireless access point on channel 4 should be moved to channel 6.
Term
What type of Ethernet is represented in 100Base-T?
Definition
Fast Ethernet is represented by 100 MB speeds (and 100Base-T).
Term
What tool is primarily used to perform wireless analysis of signals?
Definition
A Wi-Fi analyzer performs analysis of wireless signals once a site surveryor has generated a heat map of a wireless network.
Term
Which is the best first step in avoiding user risk in network security?
Definition
User awareness and training is the best first step toward avoiding user risk in security.
Term
A user is complaining that a screen in a remote application is taking a long time to react to a keyboard press or a mouse click. What routing measurement numbers would be most likely higher than average here?
Definition
Latency is measured as the time it takes to get from the source (the remote application) to the destination (the user).
Term
As a data packet is traveling down through the OSI model, what is taking place when encapsulation is taking place? Choose all that apply.
Definition
Header and trailer information are being added to a packet as it travels through the OSI model.
Term
What type of network analysis tool is best used to monitor incoming ping attempts?
Definition
A protocol analyzer can show traffic for many different protocols, including for ICMP, the protocol used for pings.
Term
A twisted-pair cable was used to connect two computers directly. Now, the cable is plugged from a computer into a wall port instead of another computer. The computer in question has no network connectivity. The wall port has been verified that it is working. What is the most likely cause of the problem?
Definition
Because two computers were connected, a crossover cable was most likely used. A straight-through cable is needed here.
Term
A network administrator runs netstat and notices that many more ports are open than usual. What is most likely misconfigured?
Definition
A firewall implementation controls port and program traffic. So if it is turned off, the chances are many ports that should not be open will be open.
Term
Which is true about CSMA/CD and CSMA/CA?
Definition
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) is more prevalent on wired (802.3) networks while Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is more prevalent on wireless (802.11) networks.
Term
In addition to bandwidth utilization, what other utilization is important to monitor for wireless networks?
Definition
Wireless channels should also have an eye kept on them, since performance suffers when they are overutilized.
Term
What is a major vulnerability for transferring data through wireless networks?
Definition
Unencrypted channels can cause vulnerabilities when transferring data via wireless networks.
Term
In a small office network, users are complaining that they have different passwords they have to use to access different servers. What is the most likely cause of this?
Definition
Given that this is a small office, the likelihood that this is a client/server network is small. This is most likely a peer-to-peer network.
Term
What is a formal agreement between companies also known as?
Definition
A Memorandum of Understanding (MOU) is a formal agreement between two companies.
Term
Which type of server can cache content and also act as a content filter?
Definition
A proxy server acts on behalf of a client machine. It can also cache content and filter content.
Term
What type of door access control involves entering a code on the lock in order to access a room?
Definition
A lock that requires a key code in order to gain entry is known as a cipher lock. It is also known as a keypad lock.
Term
How many 64Kbps channels are used for a full T3 line?
Definition
T3 can use up to 672 64Kbps channels for data transmission.
Term
What is the main purpose of a cable tray in wiring a network?
Definition
The main purpose of cable trays is to make cables easier to access and thus easier to reconfigure.
Term
Which protocol sends a username and password in clear text?
Definition
Password Authentication Protocol (PAP) sends usernames and passwords in clear text.
Term
What hardware piece sits at the demarcation point in a network?
Definition
A smart jack can test, amplify signals, protect against surges, and include a remote alarm.
Term
What is the most likely cause of a broadcast storm within a network segment?
Definition
The most likely cause of a broadcast storm within (not between) a network segment is a switching loop.
Term
A network administrator is trying to make sure a signal for a wireless access point is not transmitted outside of a building. What setting on the access point can be adjusted to accomplish this?
Definition
Setting the power levels on a wireless access point controls signal strength. The higher the power, the better the strength. Thus, one can lower the power to lower the signal strength over distance.
Term
Part of a network diagram should display how data flows through the network. What kind of topology is this?
Definition
Any diagram that shows how data flows through the network is showing a logical topology.
Term
How many UPS devices are needed if all of the switches in a network are using PoE?
Definition
With Power over Ethernet (PoE), everything is centralized. So a single UPS can keep all of the switches up and running.
Term
What is the most important reason for keeping legacy systems on a separate network segment?
Definition
The biggest reason for keeping legacy systems segmented is that legacy systems often run out of support, causing network vulnerabilities.
Term
Which is the most common cause of packet discards on a switch or router, given that there are no major problems with the switch or router?
Definition
An overloaded queue on the CPU of a switch or router is the most common cause of packet discards.
Term
A technician is attempting to make sure that each NIC in a two-NIC setup on a server has its own MAC address. Yet, the server is only showing one NIC, no matter which NIC a cable is plugged into. What type of NIC redundancy mode is currently configured?
Definition
When two NICs are configured with the same MAC address, an Active-Passive configuration is being used. The technician is trying to get to an Active-Active configuration.
Term
When going to purchase equipment, the procurement department informs a network administrator that for the customer service department all screens must conform to Energy Star standards. What is this an example of?
Definition
This is a case of device types/requirements as there are no compatibility issues here nor are there limitations defined.
Term
Which authentication method does EAP not support?
Definition
Fingerprint recognition
Term
A help desk associate has reset a user's password. What should the help desk person do as a final step in resolving this issue?
Definition
Once the actual troubleshooting is complete and the problem is solved, the final step is to document the findings, actions, and outcomes.
Term
What is the extra characteristic of a multilayer switch?
Definition
A multilayer switch has routing capabilities.
Term
Which is the process of sending unsolicited messages over a Bluetooth connection?
Definition
Bluejacking is the act of taking over a Bluetooth device and using it to send unsolicited messages.
Term
In DHCP, what is the time an IP address is assigned to a device known as?
Definition
The time a DHCP address is assigned to a device is a lease.
Term
A company server provides applications users within a company can use. The software streams to users' computers rather than needing to be installed. What is this an example of?
Definition
This is an example of software as a service (SaaS) in a private cloud.
Term
Which device allows one to gain entry into a wireless network?
Definition
A router routes networks. An access point is a point of entry to a network.
Term
Which command prompt command is used to display a routing table?
Definition
The route print command displays a routing table.
Term
What is the biggest difference between stateful and stateless firewalls?
Definition
Stateful firewalls examine packets at the application layer while a stateless firewall only acts based on source or destination address and/or port number for a packet. Stateful firewalls can also examine individual packets.
Term
A technician has just verified that a CAT6 cable is transmitting at a speed of 800 Mbps. What tool did the technician use to get these results?
Definition
A cable certifier is used to test cable speed and performance.
Term
A network guide states that each port should have a label containing the floor number, a dash, and then a port number corresponding to a cubicle area number hanging from a ceiling. What is this an example of?
Definition
A consistent way to name ports, devices, and servers is known as a naming convention.
Term
What project is geared toward reducing electronic noise from devices that could leak confidential information?
Definition
TEMPEST is a project that has a goal of reducing electronic noise from devices that can leak information through RF emanation.
Term
What is the best way to reduce vulnerabilities in network services?
Definition
Turning off services that are not needed is the best way to reduce vulnerabilities in network services.
Term
If an SFP transceiver is plugged into port 20 on a switch, what happens to the port?
Definition
Plugging a Small Form-factor Pluggable (SFP) into a switch port disables Ethernet for that port.
Term
Which represents the largest packet size for a router to transfer?
Definition
A Maximum Transmission Unit (MTU) represents the largest packet size a router can transfer. Bandwidth represents the largest packet size for data transfer over the Internet.
Term
How many bits are contained in an IPv4 address?
Definition
32
Term
What type of access control is most commonly found on edge devices on a network?
Definition
Edge devices such as routers and firewalls will most likely use rule-based access control as this allows for restricting certain types of data from entering the network.
Term
One part of a change request is to indicate how the change will take place. What is this known as?
Definition
The ""how"" part of a change request is the configuration procedures part.
Term
What type of firewall detects applications, users, and devices?
Definition
Firewalls that can detect applications, users, and devices are known as context-aware firewalls.
Term
How many devices can fit on a network with a network address of 10.1.1.0/23?
Definition
A /23 network can have 510 devices (512 addresses - network address - broadcast address).
Term
Which is the native VLAN trunking protocol for Cisco?
Definition
VLAN Trunking Protocol (VTP) is a proprietary Cisco protocol used to support VLANs.
Term
In a two-post rack, where are the servers attached to the rack system?
Definition
In a two-post rack, the servers are attached to the rack once on each side.
Term
Which port is used for RTP?
Definition
Real-time Transport Protocol (RTP) uses ports 5004 and 5005.
Term
A business has five main applications. One is subject to HIPAA requirements. What is the best way to secure the overall network?
Definition
Any application that has security requirements that are quite different from other business applications should at least be a candidate for being hosted on its own subnet.
Term
What will an IP address utilization document most likely contain?
Definition
An IP address utilization document will usually at least contain IP addresses for every device statically assigned an IP address on the network.
Term
A junior administrator realized during troubleshooting a network connection that a faulty cable was the cause. The junior administrator has replaced the cable. What should the junior administrator do next?
Definition
After implementing the solution, the next troubleshooting step is to verify full functionality and if applicable implement preventative measures. The junior administrator should make sure replacing the cable fixed the problem.
Term
What is a wireless access point that acts like a legitimate provider but is not?
Definition
An evil twin is a rogue access point that intercepts legitimate information.
Term
For a network problem, a theory of probable cause has been established. What is the next step in troubleshooting?
Definition
Once a theory of probable cause has been established, it needs to be tested.
Term
What are the main components of 802.1X? Choose all that apply.
Definition
802.1X has three main components: a supplicant, an authenticator, and an authentication server.
Term
What is the process by which a machine has to meet certain operating system and virus protection standards before being allowed full access to network resources?
Definition
Remediation is the process in which devices are screened for minimum operating system and virus protection requirements before they are granted full access to a network.
Term
Besides a security guard, what else should be used to monitor a mantrap?
Definition
In addition to a security guard, some type of video monitoring (IP cameras or closed-caption TV) should be used to see who is in a mantrap.
Term
Which WAN technology uses short path labels rather than long network addresses to direct data from node to node?
Definition
Multiprotocol Label Switching (MPLS) uses short path labels to identify virtual links between nodes.
Term
Which is a best practice when installing racks?
Definition
When installing racks, follow the instructions in the manual from the manufacturer.
Term
Which authentication method is considered the best one for SOHO networks?
Definition
WPA2-Personal is far more secure than any WEP method and does not require an authentication server to connect to a network.
Term
What type of tools monitor systems in SCADA networks to make sure all of the remote-control devices have the proper voltage to perform their tasks?
Definition
Power monitoring tools can help an administrator make sure energy levels are where they need to be so that a network can perform optimally.
Term
A junior administrator notices a lot of services are running that do not need to be running. What should happen to these services?
Definition
For services not running, they should be disabled. This way, they can be enabled when needed.
Term
Which are software-based in virtual networks? Choose all that apply.
Definition
NICs
Routers
Switches
Term
Which best describes a situation in which a cable is cut, thus causing the cable not to make a full circuit?
Definition
An open occurs when a cable is cut and then cannot make a full circuit.
Term
Which type of device will warn an administrator about a possible intrusion on a workstation?
Definition
A host-based intrusion detection system (HIDS) would warn an administrator about a possible intrusion on a workstation.
Term
Why would a GRE tunnel need to be used with an IPsec tunnel for transmitting data packets?
Definition
IPsec only supports unicast packets. A GRE tunnel supports mulitcast packets.
Term
Which method of tracking network performance typically provides the most visual-looking reports?
Definition
For a visually-oriented report tracking network performance, graphs usually offer the most visual-looking report.
Term
A printer was working but now it is not. A help desk technician cannot ping the printer. What would be the most obvious thing to check?
Definition
When establishing a theory of probable cause, the first test should be the obvious (like if a device is on or plugged in).
Term
Which are protocols that operate on layer 5 of the OSI model? Choose all that apply.
Definition
NFS
SMB
NetBIOS
Term
Which are types of malware that will typically degrade network performance? Choose all that apply.
Definition
Viruses, worms, and Trojan horses are types of malware that will degrade network performance.
Term
Which network topology has devices connected through a central hub or switch?
Definition
In a star topology, devices connect through a central hub or switch.
Term
What effects do concrete walls have on wireless networks?
Definition
A cause of interference
Term
A network administrator needs to see how many hops it takes to reach www.learnkey.com. Which of the following will the administrator run?
Definition
If the number of hops just needs to be known, tracert is the best command to use.
Term
What is the biggest vulnerability in a legacy system?
Definition
Legacy systems eventually have an end-of-life for support. At this point, no more vulnerability patches are made. This can make a legacy system very susceptible to attacks.
Term
Which tool is used in a situation where there is a single input fiber and multiple output fibers?
Definition
A fiber coupler is used in a situation with a single input fiber and several output fibers.
Term
What do wireless survey tools generate to show quality of wireless network coverage?
Definition
To show quality of wireless network coverage, a wireless survey tool can generate a heat map. This map can be regenerated as one moves around a building with a device that is connected to the wireless network.
Term
Which of the following is a dial-up modem?
Definition
Analog modem
Term
A user attempts to connect to the corporate network from a home machine. The remote access server discovers that the home machine's antivirus software is not up to date. What type of network can the remote access server connect the home machine to until it updates its antivirus software?
Definition
Using Network Access Control (NAC), a quarantine network can isolate machines that do not meet software requirements until the proper updates are made.
Term
Which command-line tool is best suited to determine where packets are dropping as they are going from source to destination?
Definition
The best command-line tool for showing a percentage of dropped packets is the pathping tool.
Term
What is the maximum outdoor distance for the 802.11ac standard?
Definition
802.11ac wireless networks can generate a signal for up to 250 meters outdoors.
Term
A flood of ping requests have come into the network, causing the regular network functionality to slow down, and, in some cases, stop. What is this best described as?
Definition
This is a typical case of a traffic spike.
Term
A box outside a business contains telephone wiring and an indicator of where the telephone company's responsibility for a phone line ends and the business' responsibility begins. What is this point called?
Definition
The point in which a business' responsibility for a phone line begins and the telephone company's responsibility ends is a demarcation point.
Term
What current addressing deficiency is EUI-64 addressing?
Definition
EUI-64 is addressing a lack of EUI-48 addresses, the current addresses used for MAC addresses.
Term
Which service provides for call control and communication gateways?
Definition
Call control and communication gateways are part of unified voice services.
Term
An Internet Service Provider allows its customers up to 250 GB of bandwidth each month, after which time their connection speed is cut in half. What is this an example of?
Definition
A fair access policy sets up utilization limits, which are limits for accessing or storing data.
Term
What does a misconfiguration on a RADIUS server most affect in regard to who can authenticate to a network?
Definition
If a RADIUS server is misconfigured, it will most affect remote users trying to log into the network.
Term
When trying to identify a problem while troubleshooting, a user is saying that Error 5000 keeps coming up on the screen. What are asking coworkers if they have seen similar problems and researching the error message examples of?
Definition
Asking coworkers, researching, and looking at a system log are all examples of gathering information.
Term
Which protocol is used for remote monitoring of traffic?
Definition
Remote Switched Port Analyzer (RSPAN) is used to monitor port traffic remotely through mirroring one port to a port on another switch.
Term
What does an LC connector resemble?
Definition
Just like an RJ-45 connector, an LC connector has a flange on top, helping to secure it in place.
Term
What are common uses of ACLs? Choose all that apply.
Definition
Websites, IP addresses, and resources are all subject to an access control list (ACL).
Term
A technician wants to know what else to label besides patch panels so that an accurate network diagram can be built. What should the technician label in this case?
Definition
Ports are another part of computers connecting to hubs, switches, and routers, so they should be labeled as well.
Term
In a wireless network connected to an ISP, many of the users on the network are downloading and streaming large files. What effect can this cause on the wireless network?
Definition
Bandwidth saturation occurs when many users are downloading or streaming large files at once. The best solution for this problem is to purchase more bandwidth or throttle the users.
Term
Which devices allows entrance to a building based on seeing an ID card or badge?
Definition
A proximity reader reads badges and allows or denies access to an area based on the badge. A key fob uses a changing PIN code to authenticate to an area.
Term
A UPS generating power in the case of an outage is what type of fail system?
Definition
A UPS is supposed to continue working in case of a system failure. This is an example of a fail open.
Term
A user calls the help desk and is complaining that the network speed on the machine has been very slow in the past few days. What is the best question to ask the user?
Definition
The question should be one to find out information, not accuse the user of doing something.
Term
What determines an antenna's signal strength in a wireless network?
Definition
An antenna's gain value determines its strength.
Term
Who is the governing body for high-speed data over cable TV?
Definition
The Data Over Cable Service Interface Specification (DOCSIS) international standard is what governs high-speed data over cable TV.
Term
Which is NOT a network traffic protection piece of IPsec?
Definition
Authentication
Term
Which is not a method of multifactor authentication?
Definition
Who you know is not an authentication factor.
Term
If a node is unreachable, what will the hop count return as?
Definition
An unreachable destination will return a hop count of infinity.
Term
Which type of DNS record is needed to resolve an IP address with a mail server?
Definition
An MX record is a record that resolves an IP address to a mail server.
Term
An electrical outlet that is typically orange signifies a dedicated ground. What is the purpose of a dedicated ground?
Definition
A dedicated ground prevents a spike sent from a device from affecting any other device.
Term
All of the devices in a wireless network are 802.11n-compatible devices. Yet, speed tests show that speeds never exceed 54 Mbps. What should a technician check first to see what is causing the slow speed?
Definition
The first place the technician should look is the standard setting of the access point. If it is set to 802.11g, for example, that would cause any device using that access point to have a speed of 54 Mbps or less.
Term
What are virtual IP addresses assigned to for high availability in routing?
Definition
Virtual IP addresses are assigned to applications. This allows a server with one logical IP address to host multiple applications and virtual appliances.
Term
When assigning an IP address to a switch, what else must be assigned?
Definition
When assigning an IP address to a switch, a subnet mask also needs to be assigned.
Term
What type of business document is an agreement between multiple manufacturers to make products compatible across vendors?
Definition
A multi-source agreement (MSA) is an agreement between multiple manufacturers. The purpose is to make something compatible for multiple vendors.
Term
Which is a collection of computers that contain malicious software that can be controlled remotely?
Definition
A botnet is a collection of zombies.
Term
What tool is used to attach a twisted-pair network cable to connectors within a patch panel?
Definition
A punch down tool is used to attach the twisted-pair network cable to patch panel connectors.
Term
A technician is trying to connect a new media device to a wireless network. Every other device in the office can connect to the network. The technician has verified that the SSID and password are correct. What is the most likely cause of the problem?
Definition
Since all of the other devices can connect to the wireless network, the most likely cause of the inability to connect is that the MAC address of the media device has not been added to MAC filtering list.
Term
If a 192.168.4.0/24 and 192.168.5.0/24 are aggregated, what is the resulting supernet?
Definition
In aggregating these two subnets, the first 23 numbers are the same so it is a /23 network. And because the 22nd number matches, the third octet ends in a 4. So, the network is a 192.168.4.0/23 network.
Term
In an 8 a.m. to 5 p.m., Monday to Friday business, what time of day is best to run an antivirus software check on a network?
Definition
Antivirus software tends to use a lot of CPU to run a virus check. So it should be scheduled during off-business hours.
Term
What is the equivalent of attenuation called for fiber-optic cables?
Definition
Chromatic dispersion occurs in fiber-optic cables when the signal begins to weaken.
Term
Which protocol operates on layer 7 of the OSI model?
Definition
HTTP operates on the application layer (layer 7) of the OSI model.
Term
What is common to both analog and digital techniques for sending/receiving data? Choose all that apply.
Definition
Mutliplexing
De-multiplexing
Term
What is the top speed of a T1 line?
Definition
T1 lines can transmit at a speed of 1.544 Mbps.
Term
Which tool is best suited for stopping a coordinated attack on a network?
Definition
An Intrusion Prevention System (IPS) can actually stop traffic that could be part of a coordinated attack.
Term
What is data that must be protected in case of disaster known as?
Definition
A data set and/or software that needs to be protected against disaster is known as a critical asset.
Term
What are advantages to using Kerberos for authentication? Choose all that apply.
Definition
Kerberos uses encryption, works across platforms, and provides secure authentication over the Internet.
Term
A network administrator needs to connect multiple offices in multiple cities. Which type of network is this?
Definition
This type of network is a WAN (wide area network).
Term
A junior network administrator replaced the current wireless access point with an 802.11ac wireless access point. Now, users with older laptops say they cannot connect to the wireless access point even though the SSID and password are the same. What is the most likely cause of the problem?
Definition
The most likely cause of this problem is that users with old devices have 802.11g wireless adapters, which run on the 2.4 GHz frequency. 802.11n runs both 2.4 GHz and 5 GHz, but 802.11ac only runs on 5 GHz, which would cause the 802.11g users to not be compatible with the new access point. So what probably happened here is that an 802.11n access point was replaced with an 802.11ac access point.
Term
What type of network authentication provides for port-based authentication?
Definition
802.1X is a standard that uses port authentication.
Term
Which routing protocol provides virtual routers and also automatically assigns routers to hosts?
Definition
The Virtual Router Redundancy Protocol (VRRP) uses virtual routers for default gateways. This way, if a physical router fails, another takes over without any change in configuration.
Term
A tech support firm agrees to make sure their cloud services are up and running 99.999% of the time. What is this type of agreement known as?
Definition
A service level agreement (SLA) outlines expected availability and performance of a service.
Term
What happens when a collision occurs between two data packets in a TCP/IP network?
Definition
When two packets collide, each waits a random amount of time before retrying the transmission.
Term
What is the main purpose of a wireless analyzer in network monitoring?
Definition
The main purpose of a wireless analyzer is to help discover vulnerabilities in a wireless network.
Term
What is the role of LWAPP in wireless networks?
Definition
The purpose of Lightweight Access Point Protocol (LWAPP) is to configure, monitor, and troubleshoot multiple access points at once.
Term
Which operates on Layer 1 of the OSI model?
Definition
Ethernet works on Layer 1 (the physical layer) of the OSI model.
Term
What role does SIEM have in network monitoring?
Definition
A Security Information and Event Management (SIEM) tool provides for real-time security alert analysis. These tools also help an administrator to stop security problems from happening.
Term
What is true about thin and thick wireless access points?
Definition
Thick wireless access points have their own authentication and configuration settings, while thin wireless access points rely on a central device for authentication and configuration.
Term
What items are poisoned in an ARP cache poisoning attack? Choose all that apply.
Definition
In an ARP cache poisoning attack, the attacker's MAC address takes over a legitimate IP address so that traffic is sent to the attacker's machine.
Term
Which type of malware requires a host program to spread itself?
Definition
virus
Term
Which type of device/service can stop an employee from reaching a gaming website?
Definition
A content filter is the tool used to block access to websites and similar content.
Term
A network administrator needs to stop employees from being able to visit social networking sites. What is this action known as?
Definition
Blocking completely stops a connection.
Term
Which is true about a unidirectional antenna when compared to an omnidirectional antenna? Choose all that apply.
Definition
A unidirectional antenna will have a greater range
A unidirectional antenna will have a more targeted signal path
Term
A wireless access point added to a network without permission is known as what type of access point?
Definition
A rogue access point is a wireless access point added to a network without the network administrator's knowledge or permission. Sometimes a user just wants to improve access. Sometimes a user wants to do malicious activity.
Term
A crossover cable is connected from a computer to a console port. The connection is not working. Why?
Definition
To plug a computer into a console port, a rollover cable is needed.
Term
Which wireless standard supports MU-MIMO?
Definition
802.11ac supports Multi-user Multiple Input Multiple Output (MU-MIMO) antennas. This allows for an access point to send multiple frames to multiple clients at the same time.
Term
On which port does HTTPS operate?
Definition
443
Term
A business wants to upgrade its wireless access points. What would be the best first step to perform the upgrade?
Definition
New equipment should always be tested in a nonproduction environment before they are brought into a production environment.
Term
Which type of tool is best suited to monitor networks for utilization problems and packet drops?
Definition
Interface monitoring tools monitor specific interface problems, including problems with errors, utilization, discards, packet drops, resets, and speed/duplex problems.
Term
What type of testing will help locate security weaknesses in a network?
Definition
Vulnerability scanning locates weaknesses in a network but does not exploit them.
Term
Which tool would a technician use to locate the opposite end of a cable?
Definition
A toner probe is used to locate the other end of a network cable. Sometimes, two people are needed for this, especially if the cable is long.
Term
What security device is best suited for making sure only one person enters a building at a time?
Definition
A mantrap should be set up when only one person should enter a building at a time. The mantrap traps an intruder between the entrance and another door.
Term
A workstation runs slowly when a CPU is overutilized. What is the difference between that characteristic and that of a server when a server CPU is overutilized?
Definition
If a server's CPU starts to become overutilized, it will affect any network services counting on that CPU.
Term
Which is true about encryption protocols used in WPA and WPA2?
Definition
WPA uses TKIP while WPA2 uses AES
Term
Which temperatures are considered to be too high for a server room? Choose all that apply.
Definition
For a server room, anything above 72 degrees is considered to be warm for a server room.
Term
Which fiber-optic connector commonly connects two fibers?
Definition
An MT-RJ fiber-optic connector is commonly used to connect two fibers.
Term
What is the main purpose of baselines in network performance?
Definition
A baseline is an occasional snapshot of network performance and should be used as a comparison point toward future performance statistics.
Term
Besides physical security, what can be used to secure data during transport?
Definition
If data is being transmitted electronically, the data needs to be encrypted.
Term
If switches are managed locally, what type of band management is being used?
Definition
Local monitoring of switches is done via in-band management.
Term
What is the distance between identical points in adjacent cycles of a waveform signal on a wire known as?
Definition
The distance between identical points in adjacent cycles of a waveform signal is a wavelength.
Term
What is the Windows service used for Windows clients to access Windows servers remotely?
Definition
Routing and Remote Access Service (RRAS) needs to be enabled in order for Windows clients to reach Windows servers remotely.
Term
Which ipconfig command will show a MAC address for a NIC?
Definition
ipconfig /all will show the IP address, MAC address, DHCP server, and DNS server for a machine.
Term
Which statement is not true about a load balancer?
Definition
Removing a server from a load balancing setup does not make a load balancer fail.
Term
For OSPF, what is cost based on?
Definition
OSPF is a link-state protocol. For link-state protocols, cost is determined based on link speed.
Term
Which cable type is typically light blue and has the wiring colors for pins reversed from one end of the cable to the other?
Definition
The cable with the wiring colors reversed for pins from one end to the other is a rollover cable.
Term
What is the role of a first responder?
Definition
The role of a first responder is to see if a potential security incident is indeed an incident.
Term
Which ISDN interface can transmit data at speeds up to 128K?
Definition
Basic Rate Interface (BRI) carries speeds of up to 128K. Primary Rate Interface (PRI) carries speeds of up to 1.544 Mbps.
Term
What is the biggest benefit with using jumbo frames for Ethernet?
Definition
Jumbo frames mean fewer frames which in turn means fewer packets and a less processor-intensive data transfer.
Term
Which are types of mesh topologies? Choose all that apply.
Definition
A mesh can either be a full mesh (where every device is connected to every other device) or a partial mesh (where some devices are connected to some other devices).
Term
What type of network is a Metro-Ethernet network?
Definition
A Metro-Ethernet network is one form of a metropolitan area network (MAN).
Term
Which type of attack spoofs UDP packets to a network's broadcast address?
Definition
This type of attack is known as a fraggle attack.
Term
Which PAN involves pairing devices before they can communicate with each other?
Definition
Bluetooth networks involve pairing two devices before they can communicate with each other.
Term
What should be the first setting changed on a wireless router after it is installed?
Definition
Wireless routers come with a default username and password. This information is almost always easily attainable at the router manufacturer's website. The default password should be changed as soon as possible.
Term
Which is true about the difference between broadcast domains and collision domains?
Definition
Collision domains contain connected physical nodes while broadcast domains consist of logical nodes.
Term
A user is complaining about having to enter a password every time he/she accesses a wireless connection that connects to the wired network. What should be suggested to the user to solve the problem?
Definition
The best possible solution is to change a setting to make the connection automatic. Checking the Connect Automatically box will make the connection automatic.
Term
What is the maximum signal range of 10GBase-ER?
Definition
10GBase-ER has a maximum range of 40 km.
Term
Which is a better alternative to Telnet given that it is more secure than Telnet?
Definition
Secure Shell (SSH) has the encryption Telnet does not, thus making it more secure than Telnet.
Term
What part of a network needs to be accessible to both inside and outside sources in the network?
Definition
A demilitarized zone (DMZ) is an area of a network that is also known as a perimeter network. Both inside and outside sources access it. This area must be accessed through a firewall as it does not directly connect to the internal or external network.
Term
Which are considerations for device placement in a network? Choose all that apply.
Definition
Safety
Airflow
Electrical access
Term
Which type of IP address translation provides for multiple devices to map to the same IP address?
Definition
Port Address Translation (PAT) allows for a single IP address to be mapped to multiple devices through using multiple ports.
Term
Which part of layer 2 of the OSI model is responsible for error correcting and flow-control?
Definition
The Logical Link Control (LLC) layer is responsible for error correcting and flow-control.
Term
What is the act of using a fingerprint, face recognition, or retina scanner to authenticate to an area of a building known as?
Definition
A fingerprint, face recognition, and retina scanner are all examples of biometrics.
Term
The computer manufacturer a company buys its servers from has an asset tag on every server. This is an example of what kind of labeling?
Definition
An asset tag is an example of a system label.
Term
Before a cable can be prepared for a connector attachment, what tool needs to first be used?
Definition
The cable needs to first be cut, so a snip needs to be used.
Term
Which are legitimate loopback addresses? Choose all that apply.
Definition
::1
127.0.0.1
Term
When looking at a network performance report, a network administrator notices a NIC is only transmitting data in one direction at a time. What setting is most likely on that NIC?
Definition
If a NIC is not receiving data at the same time it is sending data, the NIC is most likely set to half-duplex.
Term
A salesperson has access to all of the sales folders on a network. One day, the salesperson calls and informs the help desk the sales folders are no longer available, but the HR folders are. What most likely happened here?
Definition
The most likely cause here is that the salesperson got moved to the HR VLAN, probably on the switch itself.
Term
Which is considered the best way to secure a wireless network?
Definition
The best way to secure a wireless network is to not broadcast the Service Set Identifier (SSID). This way, only those who know the SSID should get into the network.
Term
Which is the setting that limits the disk space a user may use on a network drive?
Definition
Quotas are size limits for disk space.
Term
Which of the following are types of firewalls? Choose all that apply.
Definition
Packet-filtering, Session layer, and Application layer are all valid firewall types.
Term
Which organization is behind the MSDS?
Definition
The Environmental Protection Agency (EPA) is the standard bearer for material safety data sheets (MSDSs).
Term
When should a network diagram be updated with any physical location changes to a network?
Definition
As with other network changes, a network diagram should be updated right after a change takes place.
Term
A network administrator wants to make sure that no one can use RDP to remote into desktops from outside of the company. What tool should the administrator use to close the port so that it cannot be used?
Definition
Firewalls are the main port management tools in a network. So, a firewall setting will close port 3389 so that no one uses it on the network.
Term
In which network address translation type is a private IP address mapped to a public IP address that is part of a pool of public IP addresses?
Definition
This is an example of Dynamic Network Address Translation (DNAT).
Term
Which command-line tool will display the NetBIOS name and MAC address of a machine named ss-vmm?
Definition
nbtstat -a ss-wmm

nbtstat -a displays a NetBIOS name and MAC address based on a machine name. nbtstat -A displays a NetBIOS name and MAC address based on an IP address.
Term
An interface on a switch is showing gradually higher levels of utilization. A junior administrator suspects a broadcast storm. What is the first step that should be taken to correct the problem?
Definition
The first step should be to reset the interface. This will at least temporarily stop the flow of traffic on the interface.
Term
What is a very important characteristic for a test network that will test server updates?
Definition
A testing lab, whether physical or virtual, should be completely isolated from a production network.
Term
On which layer does SONET operate on the OSI model?
Definition
SONET uses fiber-optic cabling and thus it operates on layer 1 (the physical layer) of the OSI model.
Term
A network administrator needs to purchase a DSL modem as that is the method of Internet connectivity sold to the company the administrator works for. What is this an example of?
Definition
The fact that it needs to be a DSL modem and not a cable modem (for example) signifies that this is a compatibility requirement.
Term
What type of modem are F-connectors used on?
Definition
F-connectors are used for cable modems and cable television connections.
Term
A technician needs to make sure the correct patch cables are ordered for a fiber-optic network. What should the technician find out about the current cabling to make sure the patch cables are completely compatible with the current network?
Definition
Micron size is the most important compatibility trait for fiber-optic cabling in a network.
Term
A network administrator has secured an area after a security incident. What should the network administrator immediately start doing?
Definition
Immediately, someone should start documenting the scene, especially before any of the evidence is touched.
Term
Which is true about virtual routers in virtual networks?
Definition
Virtual routers are software-based, not hardware-based.
Term
A corporate WAN has two offices. A DHCP server is set up at the main office. The remote office is set up on a different subnet. In order for its machines to reach the DHCP server in the main office, what needs to be set up?
Definition
For this to work, a DHCP relay agent needs to be set up but it cannot be done on the DHCP server itself.
Term
What specifically needs to be taken into consideration when maneuvering fiber-optic cable through walls and ceilings and around light fixtures?
Definition
Unlike twisted-pair cable, fiber-optic cable cannot be bent in any way necessary to fit in a tight space. A cable's bend radius limitation needs to be taken into consideration.
Term
Which appliances, when placed near a wireless access point, will cause RF interference and thus degrade the signal coming from the access point? Choose all that apply.
Definition
Microwaves, Bluetooth devices, and some cordless phones operate on the same frequency as wireless access points. Therefore, they should be kept away from wireless access points.
Term
What is the decimal equivalent of 11000100?
Definition
196
Term
Which of the following protocols are interior gateway protocols? Choose all that apply.
Definition
IS-IS
RIPv2
OSPF
Term
A corporation wants to allow visitors to access the Internet but without accessing any corporate resources. What is the best way to accomplish this?
Definition
A guest network does not perform any rememdiation on machines. It also keeps users away from a regular corporate network.
Term
Which tool is used to attach a connector to the end of a twisted-pair cable?
Definition
cable crimper
Term
What does a site survey generate to show a coverage area for a wireless network?
Definition
A site survey will show a heat map. A heat map is a coverage area for a wireless network.
Term
Which wireless network topology involves the use of multiple wireless access points for redundancy?
Definition
A wireless mesh involves redundant connections through multiple wireless access points.
Term
Which type of wireless network involves a central access point connecting multiple wired networks?
Definition
A wireless access point that connects multiple wired networks is a point-to-multipoint network.
Term
Which protocol generally has the lowest administrative distance?
Definition
OSPF has 110, IS-IS 115, RIP 120, and EGP 140 for administrative distances.
Term
On which port does DNS operate?
Definition
53
Term
A wireless network accessible by anyone within city limits is an example of which type of network?
Definition
A metropolitan area network (MAN) is one that generally falls within city limits.
Term
What are separated during de-multiplexing?
Definition
With de-multiplexing, the streams being shared over a medium (such as analog and digital frames) are separated.
Term
Users have been able to reach an internal web server using the address http://webserver1 or http://sharepoint. Now, they can only access the server using the address http://webserver1. What is the most likely cause?
Definition
A CNAME (alias) record for SharePoint pointing to webserver1 being deleted is the most likely cause of this problem.
Term
A technician opens the electrical box containing all of the power switches in a building but has no idea which ones to turn on to try to restore power. What kind of labeling is needed so that the technician does not have that problem again?
Definition
So that the technician can identify which switches to turn back on should that be needed, circuit labeling is needed.
Term
Which is an example of bad wiring for twisted-pair cables that can cause performance issues?
Definition
Placing the cables near fluorescent light could cause electromagentic interference (EMI).
Term
Which cellular network method increased speeds over 3G without having to deploy new radio interfaces?
Definition
Evolved High-Speed Packet Access (HSPA+) improved upon 3G networks without having to deploy new radio interfaces.
Term
Which is the most likely routing protocol to be used in ISPs?
Definition
Intermediate System-to-Intermediate System (IS-IS) is a link-state protocol that distributes topology information to other routers in the network.
Term
In far-end crosstalk, where is interference between two pairs of cable measured?
Definition
In far-end cross talk, interference is measured at the opposite end of the interfering transmitter.
Term
A wireless access point is running 802.11n at 2.4 GHz. A device with an 802.11ac wireless adapter cannot connect to the wireless access point. Other devices on the network can connect to the access point without fail. What should a technician check first for troubleshooting?
Definition
Often, a wireless access point running 802.11n will not have the 5 GHz band turned on. This will cause devices with 802.11ac adapters to not be able to connect to the wireless access point as 802.11ac runs on the 5 GHz band.
Term
A user is spending a lot of time downloading nonbusiness files in the workplace. A network administrator cannot cut that person off from the Internet but can slow down the user's bandwidth. What is this called?
Definition
Throttling a user's bandwidth involves reducing the user's available bandwidth.
Term
Which wireless standards operate on the 5 GHz frequency? Choose all that apply.
Definition
802.11a and 802.11ac run on the 5 GHz frequency. 802.11n operates on both the 2.4 GHz and 5 GHz frequencies.
Term
What advantage does RIPv2 have over RIP?
Definition
RIPv2 still supports 12 hops (like RIP) but includes support for router authentication, thus making it more secure than RIP.
Term
What does a 110 block better protect against than a 66 block?
Definition
A 110 block protects against crosstalk in a much better fashion than that of a 66 block.
Term
A wireless network test shows that channels 1 and 6 are oversaturated. What channel should the wireless network be set to in this case?
Definition
The three non-overlapping channels for wireless networks in North America are 1, 6, and 11.
Term
Which form of NAT allows for multiple LAN systems to translate to a single IP address?
Definition
Port Address Translation (PAT) uses port numbers to allow multiple LAN devices to translate to a single (usually public) IP address.
Term
Which is used to prevent a router from advertising a route back to the router from which it was learned?
Definition
Split horizons use prevention of advertisting routes to avoid routing loops.
Term
Which network device has no ability to properly route traffic?
Definition
A hub is basically a signal booster. It does not route traffic from one device to the other.
Term
A group of non-profit organizations share users and storage in a collaborative application. What is this an example of?
Definition
The groups have control over users and storage, so this is a case of community infrastructure as a service (IaaS).
Term
Which is the most likely factor that contributes to a weak signal strength for a client?
Definition
Distance from a wireless access point is the most influential variable when it comes to signal strength for a client connecting to a wireless network.
Term
A user calls the help desk reporting that the network cable (a twisted-pair cable) keeps unplugging from the back of the machine. What is the most likely problem?
Definition
In this situation, it is most likely the RJ-45 connector itself. If the flange breaks, the connector will not stay in the network card plug very snugly.
Term
When setting up a network, you want to make sure the network can hold up to 300 users and that speeds must reach or exceed 500 kbps. What is this an example of?
Definition
This is an example of a list of requirements.
Term
Which type of antenna is used for coverage in all directions from the antenna?
Definition
An omnidirectional antenna disperses waves in 360-degree patterns. This antenna disperses in all directions and because of that is good for short, medium-strength signals.
Term
Which network topology needs a secondary method of data transfer set up to ensure fault tolerance?
Definition
In a ring topology, a secondary ring needs to be set up. The reason is that if the primary ring fails, the entire ring is down.
Term
What is the most common cause of interfaces resetting on a switch or router?
Definition
For many devices, if an interface cannot transmit packets due perhaps to a faulty cable, or faulty hardware, it will reset itself.
Term
What is the top speed for an E3 data transmission?
Definition
E3 has a top transmission rate of 34.368 Mbps.
Term
A technician is in a small office, trying to figure out how to remove a cable running all the way across a room, connecting a computer with no wireless adapter to a wireless router. What device can the technician add to the network to then be able to remove the cable?
Definition
A wireless bridge extends a wireless network. Thus, the technician should connect the computer to a wireless bridge and then connect the bridge to the wireless router.
Term
Which WAN technology is a newer version of X.25?
Definition
Frame Relay is a newer version of X.25. It is faster and can be implemented on multiple types of lines.
Term
What part of the MAC address does a MAC address lookup table look up?
Definition
A MAC address lookup table looks up the Organizationally Unique Identifier (OUI) of the MAC address.
Term
Which WAN technology is usually associated with cable television networks?
Definition
Coarse wavelength division multiplexing (CWDM) is commonly used with cable television networks.
Term
A server needs to have both an IP address of 10.1.2.3 and an IP address of 74.25.52.25 as registered with an Internet provider. What needs to be enabled either on the server or on the router for this to work?
Definition
Network Address Translation (NAT) would solve this need as it would create a one-to-one mapping of a private and public IP address.
Term
A junior network administrator does not like the efficiency of the wireless network in his area. So, unannounced, he brings a wireless router from home and connects it to the wireless network. What kind of access point has been added?
Definition
An unauthorized wireless access point added to a network is a rogue access point.
Term
What does a warchalking symbol contain?
Definition
A warchalking symbol has an SSID and an indicator as to whether the network is open or not.
Term
Which type(s) of switching do ATM networks use?
Definition
ATM uses fixed cells, so it is a connection switching network.
Term
In case of an emergency, what should be posted and known so that people know where the emergency exits are?
Definition
The document that contains the information of the building is known as the building layout.
Term
In which server racks are servers attached to racks in multiple locations? Choose all that apply.
Definition
The two-post racks and four-post racks are racks in which servers are attached in multiple locations.
Term
Which type of coaxial cable is most commonly used for network connections from cable TV providers?
Definition
RG-6 is the most common cable used by cable companies to connect homes to a distribution network.
Term
A user notices a unicast and a multicast option for a software pushing application. The user wants to know the difference between the two. How should this be explained?
Definition
A unicast is a one-to-one connection and a multicast is a one-to-many connection for messages.
Term
How is TTLS different from TLS?
Definition
TTLS provides tunneled transport layer security in that it provides for actual identity of a client in client authentication while in TLS the client remains anonymous.
Term
Two users are having an instant message conversation. One user gets up and forgets to lock the machine. A disgruntled employee sits down and keeps the conversation going, obtaining confidential information during the conversation. What type of attack is this?
Definition
Stepping in between a sender and receiver is known as a man-in-the-middle attack.
Term
Users who have access to the network and then decide to become malicious users are known as what type of users?
Definition
A user who has access to network resources is known as a trusted user.
Term
Which is a popular example of a network controller?
Definition
A domain controller is a repository of user accounts and passwords and thus serves the role of a network controller.
Term
A network administrator has determined that a security incident has taken place. Upon further review, law enforcement needs to be contacted. What is bringing other parties into the case known as?
Definition
Escalation takes place when another party needs to be brought in to work on a security incident.
Term
Which would best describe a VPN?
Definition
A VPN is a virtual private network. It is a private network using public means.
Term
Which features does SLIP not have when compared to PPP? Choose all that apply.
Definition
Serial Line Interface Protocol (SLIP) does not have error detection, a multilink interface, or encryption of usernames and passwords.
Term
What can be set on a route to prevent it from being used?
Definition
Route poisoning sets the hop count on a route to a high number to effectively stop the route from being used.
Term
A small company uses drive services with their free webmail to share to clients. The drives can be shared to anyone. What is this an example of?
Definition
The company does not have complete control over the storage aspect of this but the data can be shared with anyone. Thus, this is public platform as a service (PaaS).
Term
In troubleshooting a network connectivity issue, a theory as to the cause of the problem has been confirmed. Before establishing a plan of action to resolve the problem, what should be done?
Definition
Before a plan of action can be established, the steps needed for that plan need to be determined.
Term
Which are primary goals of network security? Choose all that apply.
Definition
Confidentiality, integrity, and availability are all aspects of network security.
Term
What is the time between requesting information while browsing the web on a satellite connection and the time it takes for the information to return known as?
Definition
latency
Term
Under most circumstances, what is the best thing for a network administrator to do if a network service is under a zero day attack?
Definition
In a zero day attack, the attack takes place before a patch is released to combat the attack. So a network administrator may need to turn off the affected service.
Term
What device is needed for a signal using UTP cable to avoid attenuation?
Definition
A repeater can boost a data signal when it suffers from attenuation.
Term
What is a database of information about an object (or objects) that SNMP manages known as?
Definition
A Management Information Base (MIB) stores information about interfaces and details of a device.
Term
Which is true about baseband and broadband?
Definition
Baseband signals are over a single medium while broadband uses multiple channels.
Term
What should be used to connect two twisted-pair Ethernet cables back-to-back?
Definition
A UTP coupler is a small device that connects UTP cables back-to-back.
Term
Which is considered the weakest when it comes to security for wireless authentication?
Definition
Wired Equivalent Privacy (WEP), especially WEP-Open, is considered the least secure authentication method because it is completely open, meaning no password is needed to connect to the wireless network.
Term
What is a single system that is used to capture information on would-be attackers?
Definition
A machine that traps attackers and captures attack information is a honeypot. A group of connected honeypots make up a honeynet.
Term
A document that contains the name and serial number of a machine is known as what type of document?
Definition
A document that contains detailed information about each machine is an asset management document.
Term
Which is not a legitimate IPv6 address?
A - 2001::34da:38f2:1
B - 2001:34da:38f2::1
C - 2001::34da:38f2::1
D - 2001::34da:38f2:0001
Definition
An IPv6 address can only have one :: to replace a set of zeros.
Term
What is the octal equivalent of the decimal number 20?
Definition
Octal is a base 8 number. Thus, 20 divided by 8 is 2 with a remainder of 4. That is the number 24.
Term
A network administrator needs to add a route for a server at 10.1.3.4 for a /24 subnet to a default gateway of 10.1.3.1. What is the correct command used for this?
Definition
The route add command needs to have the network address of the destination, the mask, and the gateway entered, in that order. So the command looks like this: route add 10.1.3.0 mask 255.255.255.0 10.1.3.1.
Term
Which type of IP address is best suited for a network printer?
Definition
static
Term
Which protocol, when blocked, helps to mitigate the chances of a Ping of Death attack?
Definition
Blocking ICMP stops pings and attacks associated with pings.
Term
What device is needed to translate LAN data into WAN data and vice versa?
Definition
A Channel Service Unit/Data Service Unit (CSU/DSU) is needed to translate LAN and WAN data formats.
Term
A network design team is looking at the best place in a restaurant to install a server rack. Taking environmental considerations into this, what is the best place for the server rack to be?
Definition
Temperature and humidity are two major concerns for server placement. Servers, then, should be placed near fairly cool and fairly dry areas (but not so dry that a lot of electrostatic discharge takes place).
Term
In a business environment, what is the best way to not lose Internet connectivity?
Definition
Redundancy is the key to not losing Internet connectivity. Therefore, the best way to not lose Internet connectivity is to have a backup connection.
Term
How many classes of IPv4 addresses are available for assignment to devices on a private network?
Definition
3
Class A, B, and C IP addresses can be
assigned to devices
Term
A junior administrator is tasked to set up packet flow monitoring. The junior administrator needs to know what type of tool should be used for this job. What type of tool should the junior administrator use?
Definition
A packet sniffer captures a sample of packet traffic and saves it for later analysis. This can help one monitor how packets are flowing through a network.
Term
In addition to increasing performance through workload distribution, what is often a side benefit of load balancing?
Definition
Load balancing can provide high availability for a network through redundancy.
Term
A user calls the help desk saying that it sees two access points with the same name when trying to connect to a wireless network. The user has not seen two access points before. What could the second wireless access point be? Choose all that apply.
Definition
An unexplainable second wireless access point with the same name is likely either an evil twin or a rogue access point.
Term
If a default gateway is incorrectly set on a machine, what will happen?
Definition
A default gateway routes traffic. Without a correct default gateway, a machine will not see anything outside of its subnet.
Term
An antivirus program that is installed on each workstation is known as what type of antimalware program?
Definition
This is an example of host-based antimalware.
Term
Which is the process of gaining unauthorized access to a Bluetooth connection and then viewing, copying, or deleting data?
Definition
This process of gaining unauthorized access to a Bluetooth connection and then using it to gain information and/or launch an attack is known as bluesnarfing.
Term
Which is a protocol used in UC?
Definition
Extensible Messaging and Presence Protocol (XMPP) is a protocol used to make it possible for UC clients to communicate with UC servers.
Term
What is the reason usernames and passwords for switches do not provide the same security as AAA?
Definition
AAA can use multiple sources for authorization, including Active Directory.
Term
Which protocol is a connection-oriented protocol?
Definition
TCP is a connection-oriented protocol in that it waits for acknowledgement of all data packets.
Term
Which would be the most likely level of alert that would warrant receiving messages via SMS?
Definition
Short Message Service (SMS) is the considered the best alert method for alerts that are critical/urgent in nature.
Term
In the order of troubleshooting a network problem, a technician was unable to confirm a theory. The technician can establish a new theory or do what?
Definition
If a theory is not confirmed, the next step of the troubleshooting theory is to either establish a new theory or escalate the problem.
Term
Which type of multiplexing is used by broadband transmissions?
Definition
Frequency Division Multiplexing (FDM) creates multiple channels to accommodate broadband media traffic sending and receiving at the same time.
Term
Which storage area network type uses LUNs?
Definition
Internet Small Computer System Interface (iSCSI) sends SCSI commands through IP and uses Logical Unit Numbers (LUNs) as unique identifiers for devices.
Term
What is the time allowed for a system to be nonfunctional while changes to the network are taking place?
Definition
Authorized downtime is the amount of time granted for any outage during a change in the network.
Term
In emergency alert systems, which extinguisher system requires a sealed environment to operate?
Definition
A gas-based system is used when a water-based system can cause major damage to equipment. It needs a sealed environment to operate.
Term
On which ports does DHCP operate? Choose all that apply.
Definition
DHCP operates on ports 67 and 68.
Term
What should a technician wear in order to avoid ESD while working on hardware?
Definition
To avoid electrostatic discharge, wear an antistatic wrist strap when working on hardware.
Term
What is the role of power converters in power management?
Definition
Power converters are used to step voltage down.
Term
A technician indicates to you that a connection between a computer and a switch worked with a straight-through cable but after plugging in a different switch, the connection no longer works. What type of port does the switch not have?
Definition
The second switch is most likely lacking an Auto MDI-X port.
Term
Which is the best type of authority figure to use an access list to control who is allowed in a building?
Definition
A security guard is the best resource for identifying, through an access list, who should be allowed in a building.
Term
What is the primary purpose of a default gateway?
Definition
The default gateway is usually a router but could be a server.
Term
What is the distance limitation with 100Base-FX?
Definition
A 100Base-FX signal can travel up to 2 km.
Term
A home office needs its gaming device connected to a wireless network as the owner wants to be able to use the fitness app on the gaming device. What information is needed in order to connect this device to the wireless network? Choose all that apply.
Definition
The SSID and password are needed in order to connect this gaming device to the wireless network.
Term
On which port does TFTP operate?
Definition
TFTP operates on port 69.
Term
A network diagram that shows all of the cabling, the cabling types, and distances is known as what diagram?
Definition
A wiring schematic document shows all of the devices and cabling aspects of a network.
Term
What is the maximum bandwidth of an 802.11a wireless network?
Definition
802.11a works on the 5 GHz band at a top speed of 54 Mbps.
Term
What type of update is most commonly associated with enhancing device functionality?
Definition
A driver update is most common for fixing hardware operating issues.
Term
Which part of a change request indicates the level to which change will affect users?
Definition
The level of change in change management is known as potential impact.
Term
Which characteristic best describes a LAN for a single business?
Definition
A LAN is a local area network. The best description matches that of a network in a single building.
Term
Which is not part of AAA configuration for switch management?
Definition
AAA involves authentication, accounting, and authorization for access control.
Term
What is true about circuit switching and packet switching?
Definition
Circuit switching uses a dedicated physical link between the sending and receiving devices. Packet switching uses either a virtual circuit or the packets can take different paths from source to destination.
Term
Which is true about 802.11g when compared to 802.11a and 802.11b?
Definition
802.11g has the same band as 802.11b (2.4 GHz) and is faster than 802.11b (54 Mbps vs. 11 Mbps).
Term
Which type of device can temporarily shut off a port if it suspects a network attack?
Definition
A Network Intrusion Prevention System (NIPS) can take action to disrupt a potential network attack.
Term
A single-mode fiber-optic cable was plugged into a multimode interface, thus causing a link to go down in a fiber-optic network. What is this condition called?
Definition
This is an example of a fiber-type mismatch. This mismatch will cause a link to either stop working or at the very least, have significant performance issues.
Term
A network administrator wants to make sure workstations have a set IP address without having to resort to static addressing. What part of DHCP will make this happen?
Definition
Setting a reservation in DHCP will force a MAC address to use the same IP address every time the machine logs into the network.
Term
Which tool is best used for testing for opens and shorts?
Definition
A cable tester can test for opens, shorts, and many other cable problems.
Term
Which is true about baud rates and bit rates?
Definition
Baud rates use Hz while bit rates are measured in bits per second.
Term
System manuals, support manuals, and instructional books are examples of what type of documentation?
Definition
System manual, support manuals, and instructional books are examples of vendor documentation.
Term
What type of multiplexing uses up to 32 wavelengths on a single fiber?
Definition
The type of multiplexing that uses up to 32 wavelengths on a single fiber is dense wavelength-division multiplexing (DWDM).
Term
A user calls the help desk stating that he/she cannot get on the Internet. What troubleshooting step should the help desk agent do first?
Definition
In this and all other troubleshooting situations, the first troubleshooting step is to identify the problem.
Term
How does a bottleneck differ from overutilization in networks?
Definition
Bottlenecks are generally caused by a single source, such as a slow processor or slower-performing hard disk.
Term
What should always be updated when a device added to a network causes significant change to the network?
Definition
Any time a significant addition is made to a network, the network documentation should be updated right away.
Term
A user logs into a college campus computer. None of the information is saved when the user logs out. What type of agent is running on the computer?
Definition
Nonpersistent agents ensure that no data or changes to a system are saved once a user logs off a session.
Term
What is the biggest advantage of running antimalware software from the cloud versus running antimalware software from a local server?
Definition
The advantage of cloud-based antimalware software is that it tends to use less CPU on the system running it.
Term
A network group should be able to read and write to a folder but the group can only read the folder. What needs to be adjusted?
Definition
The folder's access control list (ACL) needs to be adjusted to reflect the needs of the network group.
Term
Which factors contribute to signal loss due to connector problems in fiber cables? Choose all that apply.
Definition
For fiber cable connectors, improper alignment, and core diameter differences are main factors that contribute to signal loss.
Term
Why is it important to do a configuration backup before applying an update?
Definition
Updates should be able to be rolled back if needed. For this, a configuration backup is essential before applying any updates.
Term
What would lean a network administrator toward a NAS rather than a SAN?
Definition
Network-attached storage is easier to use and costs fewer dollars than that of a Storage Area Network (SAN).
Term
Which type of DoS attack requires changing network configurations to mitigate and end the attack?
Definition
This is an example of a permanent DoS attack because configuration changes have to be made to end the attack.
Term
Which is true about virtual switches?
Definition
Virtual switches can control private and public networks with virtual machines.
Term
Besides IP, what is typically used to run video conferencing?
Definition
Besides IP, video conferencing can run over ISDN.
Term
A network has a server farm for each application. Right now, they share one ACL. What should a network administrator do to make the two farms easier to secure?
Definition
The smaller a network segment is, the easier it is to secure. Given that these are two separate server farms, each should have its own access control list (ACL).
Term
An executive vice-president cannot get an email message to send. Meanwhile, multiple customer service agents report that they cannot log into their service application. What would be the best way to approach this situation?
Definition
CompTIA's troubleshooting theory states that when faced with multiple problems, one should work on one problem at a time.
Term
Which port number is typically used for addressing control for calls, multimedia, and bandwidth for video conferencing?
Definition
The standard is called H.323 and it uses port 1720.
Term
A junior administrator needs to locate a DNS server for a local network. Which command will the junior administrator run to locate the server?
Definition
ipconfig will work if ipconfig /all is run. To run just a single command to locate a DNS server, the nslookup command needs to be run.
Term
What needs to be known before a change request can even be considered?
Definition
When submitting a change request, a reason for the change needs to be known. Otherwise, why change anything?
Term
In which type of policy do users acknowledge that their network activity is being tracked?
Definition
A consent to monitoring policy is a policy in which users acknowledge and consent to being tracked.
Term
Which command is used to display an ARP table?
Definition
arp -a is used to display entries from an arp table.
Term
What should be taken into consideration when placing servers in a server room? Choose all that apply.
Definition
Safety, air flow, and electrical access should all be taken into consideration when placing servers in a a server room.
Term
What is the top speed for an E1 data transmission?
Definition
E1 has a top transmission rate of 2.048 Mbps, slightly faster than a T1.
Term
Who is the person whose duty is to see if a security incident is indeed an incident?
Definition
A first responder's duty in case of a security incident is to see if the incident is indeed a security incident.
Term
What tool is usually used to check telephone wiring in a network?
Definition
A line tester is used for any device that has a media line to test. This can include telephone wiring, Ethernet lines, and fiber lines.
Term
Which is true about on-boarding and off-boarding a mobile device?
Definition
Getting a mobile device ready for network connectivity is on-boarding while removing company-owned resources from a mobile device is off-boarding.
Term
What constitutes a back door attack in networking?
Definition
A back door attack is an attack in which an attacker bypasses standard security checks.
Term
What should be built into any power circuit in a network?
Definition
Fault tolerance should be built into any power circuit in a network.
Term
A junior network administrator needs an explanation of a DHCP scope. Which would be the best explanation?
Definition
A scope is a range of IP addresses determined by a network administrator.
Term
After upgrading cabling in a network from CAT5e to CAT6 and moving a patch panel 100 feet, several users are complaining that their network connections are slow and intermittent. What is the most likely cause?
Definition
The most likely problem here is that moving the patch panel 100 feet caused it to be over 328 feet away from the other end of several cables connected to it. With new cable being cut and used, the distance limitation of a CAT6 cable (328 feet) was probably overlooked.
Term
A user needs to transfer a file to a business partner, but the file is too large for email. What is a good alternative to email for transferring files?
Definition
File Transfer Protocol (FTP) is often used to transfer files between businesses.
Term
A technician has gone around a building and labeled every port. So that a path from a computer to the router can easily be traced, what else should be labeled?
Definition
A cable from a port to a hub, switch, or router often goes through a patch panel, so these should be labeled as well as ports.
Term
Which Linux command will show an IP address for a machine?
Definition
ifconfig is the Linux equivalent of ipconfig in Windows.
Term
What is the role of a riser in cable placement in networks?
Definition
A riser is a column that runs from the top of the building to the bottom. It holds both electrical and network cable. It is installed to help keep network cable away from electromagnetic interference (EMI).
Term
What is a PAN in which two smartphones touch each other to share data?
Definition
Near-field communications (NFC) is the technology in which two smartphones can touch each other and exchange data.
Term
In an instant messaging application, the status indicator represents which part of Real-Time Services?
Definition
A presence indicates being connected to a medium and having some way of real-time updating (like a status symbol).
Term
How does a DDoS attack differ from a DoS attack?
Definition
A Distributed Denial of Service (DDoS) attack uses multiple computers to carry out a DoS.
Term
Which part of a building layout shows ways to get out of a building should a fire start?
Definition
A fire escape plan shows where people should go in case a fire starts.
Term
Which type of coaxial cable has a characteristic impedance of 75 ohms and is usually used for composite video?
Definition
RG-59 is usually used for composite video and has a characteristic impedance of 75 ohms.
Term
After identifying a problem when troubleshooting, what is the next troubleshooting step?
Definition
Once a problem is identified, the next step is to establish a theory of probable cause.
Term
What does PPP use to provide encryption?
Definition
PPP uses Challenge Handshake Authentication Protocol (CHAP) to provide authentication.
Term
What, when added to a window, can impede a wireless signal?
Definition
Adding film to windows can hamper the signal in a wireless network.
Term
What is the main wiring closet in a building known as?
Definition
MDF
Term
Where can a technician go to easily measure the speed of an Internet connection?
Definition
A speed test site tests the speed of an Internet connection.
Term
What would cause flooding if STP fails?
Definition
If a PC broadcasts to a port on both switches and STP is not working, the broadcast turns into a loop which then turns into a flood.
Term
A technician is trying to diagnose a fiber-optic connection that is not working. The cable and interface are both multimode. The distance is short and there are no bends in the cable. What else could be wrong, assuming everything is plugged in properly?
Definition
In addition to cables, connectors, and fiber types matching in a fiber-optic network segment, the wavelength must also match.
Term
What is the act of throttling bandwidth on the basis of applications known as?
Definition
Packet shaping is used to control bandwidth based on application type and thus reduce latency for important applications.
Term
What is the best way to avoid interface errors when changing configuration on a NIC?
Definition
Any configuration changes in a network should always be documented, especially since in many instances these changes cannot be undone easily.
Term
Which type of wireless network allows for clients to roam different areas of the physical space of the wireless network?
Definition
An Extended Service Set (ESS) uses multiple access points and multiple Basic Service Sets (BSS) with like settings so that a user can roam a building and still be connected.
Term
When setting up a DMZ, where should a firewall be placed in relation to the DMZ?
Definition
When setting up a firewall for a DMZ, the firewall needs to be placed between the DMZ and the internal network.
Term
Which type of DNS server is one of about 13 worldwide and can resolve just about any public IP address with a name?
Definition
A server that has a table large enough to resolve any public IP address is a root server.
Term
Twenty users are in one building in a LAN; ten are in sales and the other 10 in administrative positions. Their job duties and permission needs to the network differ greatly between the two groups. What is the best way to set two networks up, one for each group?
Definition
We could create subnets for each group, but the easiest way to do this is two create two VLANs on a switch.
Term
Which is true about native VLANs and default VLANs?
Definition
Native VLANs are untagged. A network using VLANs must have one VLAN.
Term
Which type of backup is done to back up data that has been changed since the last backup?
Definition
An incremental backup backs up anything that has changed since the last backup, regardless of whether the previous backup was full or differential in nature.
Term
Who/what are the top talkers in a network?
Definition
Top talkers in a network are users who transmit the most data.
Term
What can a malicious user use to eavesdrop on unencrypted traffic on a network?
Definition
A packet sniffer can eavesdrop on unencrypted traffic on a network. For reading and decoding the traffic, a protocol analyzer should be used.
Term
Compared to single-mode fiber-optic cable ranges, what do distances for multimode fiber-optic cables tend to be?
Definition
Because multimode fiber uses multiple light beams, signal distances tend to be shorter.
Term
A department has moved to a new building. Upon attempting to connect machines to the network, many users in many areas of the building are unable to connect to the network. A supervisor sends a team member to each area to check on ports. What troubleshooting method is this?
Definition
With multiple people going to multiple locations, the divide and conquer method is being used.
Term
On which layer of the OSI model are GIFs and MPEGs handled?
Definition
GIFs, text files, MPEGs, and other common data formats are converted on the presentation layer (layer 6) of the OSI model.
Term
An SNMP agent communicates the occurrence of network events to an SNMP manager. What is the message it communicates called?
Definition
The message an agent sends to an SNMP manager is known as a trap.
Term
What is the overall purpose of port bonding?
Definition
Port bonding involves the use of multiple ports to increase performance.
Term
Which is the switch security feature that limits connectivity to its network to a specific list of IP addresses?
Definition
DHCP snooping uses a whitelist to determine which IP addresses are allowed into the network. DHCP snooping also makes sure only authorized servers give out IP addresses.
Term
Which Ethernet cable standards have maximum data rates of 10 Gbps? Choose all that apply.
Definition
CAT6 introduced the 10 Gbps standard for speed. This carried over into the CAT6a standard.
Term
Which is the process of logging who has evidence, who has seen evidence, and where the evidence has been?
Definition
A chain of custody shows who has evidence, who has seen evidence, and where evidence has been. It is an absolute must in order to keep evidence admissible in a court of law.
Term
A financial company is developing an application using a public cloud but will share the data with an application it has in its private cloud. What is this an example of?
Definition
This is an example of a hybrid with a developed application. Thus, it is a hybrid platform as a service (PaaS).
Term
A technician has informed a network administrator that a remote office cannot be pinged. All other remote offices can be pinged. What is the mostly likely piece of faulty hardware in the remote office?
Definition
The most likely piece of hardware to fail if a place cannot be pinged is the router as it is what connects one network to another.
Term
Given that ARP tables can cause harm if in the wrong hands, what command should be run occasionally to flush an ARP table?
Definition
To avoid an attacker obtaining a huge ARP table and thus seeing a lot of MAC addresses, the arp -d * command should occasionally be run to flush the ARP table.
Term
What is the purpose of the loopback feature in a smart jack?
Definition
A loopback in a smart jack allows for testing, specifically remote testing so a technician can run tests remotely.
Term
What is the maximum signal distance for 10GBase-SR over multi-mode fiber?
Definition
10GBase-SR has a maximum distance range of 82 m. It always uses multi-mode fiber, which carries for a much shorter distance than that of single-mode fiber.
Term
What would be an effective way to avoid an open network for a SOHO wireless network?
Definition
Disabling the SSID will not stop devices from joining the network. MAC filtering is a better method for controlling which devices join a SOHO wireless network.
Term
Which protocol is often used with VTC over IP networks?
Definition
Session Information Protocol (SIP) is often used for VTC over IP networks.
Term
Blocking all attempts to relay traffic through SMTP is an example of which type of filtering?
Definition
SMTP uses port 25. If the port is blocked, SMTP traffic cannot go out.
Term
What is needed in a network to temporarily replace a power circuit that has become unstable?
Definition
Power redundancy provides for handling a situation to where a circuit becomes unstable.
Term
A laptop has an 802.11g wireless adapter. The wireless access point it connects to is an 802.11n dual channel wireless access point. What is the maximum speed the laptop can expect for a connection?
Definition
When two devices are connected, the slower speed on equipment is the top speed the connection will have. 802.11g is 54 Mpbs, so that is the speed of the connection.
Term
Which connector is typically used on the end of an STP cable?
Definition
An RJ-48C connector is used on the end of an STP cable.
Term
Which type of attack keeps guessing passwords until the correct one is discovered?
Definition
A brute force attack is one in which an attacker just keeps guessing passwords until the correct one is found.
Term
A user needs to access a particular machine in a network from a remote location. A network administrator configures a router to map a port number to the specific machine. What is this is an example of?
Definition
For a remote machine to reach a router and have the router route to a specific internal machine, port forwarding needs to be configured.
Term
Which is an attack that uses a VLAN to gain access to resources on other VLANs?
Definition
VLAN hopping is an attack on a VLAN in which an attacker gains access to other VLANs and the resources on those VLANs.
Term
What is the maximum recommended number of connections to a SOHO router?
Definition
For most small office, home office (SOHO) routers, 10 or fewer connections is ideal.
Term
What is true about UPC and APC in fiber-optic cables?
Definition
Ultra Physical Contact (UPC) is flat while Angled Physical Contact (APC) is angled.
Term
What is the main purpose of a cable certifier?
Definition
A cable certifier can measure speed and performance of a cable. This is a great way to test to see if an implementation will perform adequately.
Term
What is the implementation of policies, controls, and procedures to recover from a disaster called?
Definition
A business continuity plan (BCP) manages the policies, controls, and procedures needed for disaster recovery.
Term
A router needs to be set up to only allow traffic from a specific, highly secure Intranet. Which would be the best type of filtering to use?
Definition
The router should be set up to only allow traffic from the IP address of the intranet site.
Term
What is the hexadecimal equivalent of the decimal number, 200?
Definition
Thinking in terms of 16 (hexadecimal), 200 divided by 16 is 12 with a remainder of 8. 12 in hexadecimal numbering is C. Thus, C8 is the hexadecimal equivalent.
Term
A user needs POP3 configured for incoming email. In the email setup, which port will be entered for POP3?
Definition
110
Term
A power reduction has taken place and has lasted several hours, during which time a network administrator has had to power down several devices to avoid further power issues. What has taken place?
Definition
A brownout is a voltage drop that lasts minutes or even hours. A sag is a voltage drop that is very short-term in nature.
Term
What is one way to avoid a name resolution problem with a DNS?
Definition
Having DHCP always define the address for each host is one way to avoid a name resolution problem with a DNS.
Term
Which fiber-optic connector uses a bayonet type of lock?
Definition
An ST connector uses a bayonet type of lock.
Term
Which device transmits data from a master supervisory system to connected objects?
Definition
A device that transmits data from a supervisory system to connected objects and does not need host computers to run is a Remote Terminal Unit.
Term
A network technician has determined a switch is faulty and needs to be replaced. What troubleshooting step should the technician do next?
Definition
Once a theory is confirmed, a plan of action to resolve the problem needs to be made. If users are going to be affected temporarily, they need to be told of that.
Term
What would most likely be found on an internal operating procedures, policies, or standards document?
Definition
A procurement policy is very likely to be found on an internal document.
Term
What methods can be used to defend a network against packet analyzers? Choose all that apply.
Definition
There are two main methods to protect a network against packet analyzers. First, using switches instead of hubs will result in fewer packets being transmitted. Second, encrypting sensitive data will work to ensure someone with a packet analyzer cannot read the data in those packets.
Term
What is the process of attacking a wireless network for weak encryption known as?
Definition
Cracking is the act of attacking a weak implementation of a wireless network.
Term
A junior network technician, in response to a network analyzer indicating a huge saturation of access points on channel 6, changes the channel of a wireless access point to channel 11. Now, no one can connect to the wireless access point. What problem has been caused here?
Definition
In order for wireless devices to connect, they must be on the same channel.
Term
What type of request is sent to a broadcast address during a smurf attack?
Definition
Ping is used for a smurf attack as pings are sent to a network broadcast address.
Term
Which of the following updates would be considered a major update?
Definition
The general rule for updates is this: the lower the amount of numbers, the more major the update. So, 3.0.0 would be considered major while 3.1.1.1 is considered minor.
Term
Which fiber-optic connector uses a push-pull connector?
Definition
An SC fiber-optic connector uses a push-pull connector.
Term
What is the main method for a denial of service (DoS) attack?
Definition
The main method of a Denial of Service attack is to overload the network with traffic so all of its bandwidth is compromised.
Term
Besides the front door and data-confidential areas, what is considered the most important room to protect in a building?
Definition
A network closet should have extra protection. Some type of door access control should be set up on any door leading to a computer center or network closet.
Term
A junior network administrator needs a definition for a critical node. What would the best definition be?
Definition
A device that will cause a loss of business function if it fails is known as a critical node.
Term
Which policy addresses the use of personal USB drives on corporate machines?
Definition
An acceptable use policy outlines how users are to use company systems and resources.
Term
What is the transmission speed for OC12?
Definition
Each OC level is 51.84 Mbps. So OC3 is 51.84 x 12 = 622.08 Mbps.
Term
Who should be notified of a change request?
Definition
A committee that handles change requests should be notified of all change requests.
Term
What causes a short in a network cable?
Definition
A short happens when data attempts to travel on wires other than the ones intended.
Term
Which is a one-way hash that can be used with an encryption protocol?
Definition
Secure hash algorithm (SHA) is a one-way hash that can be used with an encryption protocol.
Term
Which type of attack involves a user being called and asked for his/her username and password?
Definition
A user being called and being asked for username/password information is an example of social engineering.
Term
Which type of wireless network uses access points to connect devices to a wired network?
Definition
Infrastructure wireless networks use access points to connect devices to a wired network.
Term
What should be clearly marked in a building layout so that staff can vacate the building quickly in case of a severe incident?
Definition
Emergency exits should always be clearly marked on the doors and in the building layout.
Term
Which is true about BGP?
Definition
BGP works between Internet hosts so it is an exterior gateway protocol. It is not pure distance-vector nor link-state, so it is a hybrid protocol.
Term
A business need exists for a business to make sure they can be up and running at a moment's notice in case of a disaster. What type of site needs to be set up?
Definition
A hot site needs to be set up if a business needs to be back up and running as soon as possible should a disaster occur.
Term
Which is true about Teredo and Miredo?
Definition
Miredo allows full IPv6 connectivity to systems that are totally based on IPv4 and Teredo gives full IPv6 connectivity to IPv6-based hosts that lack direct connection to an IPv6 network.
Term
What type of cable can be tested with a light meter?
Definition
A light meter has a source at one end and a meter on the other end to measure light loss. This is one way to test a fiber-optic cable.
Term
How many pairs of wires are used in an RJ-45 connector?
Definition
RJ-45 connectors have eight pins so four pairs of wires are needed.
Term
Which type of wireless authentication needs an authentication server in order to connect to a network?
Definition
WPA2-Enterprise needs an authentication server (usually a RADIUS server) in order to connect to a network.
Term
What is the main goal of a free-standing rack?
Definition
A free-standing rack is one that does not need to be mounted to a wall to support servers on it.
Term
What does MS-CHAP use for a hashing algorithm?
Definition
Microsoft Challenge Handshake Authenication Protocol (MS-CHAP) uses MD5 for a hashing algorithm.
Term
A user can reach a website but cannot ping the website. The website has probably blocked which protocol?
Definition
Internet Control Message Protocol (ICMP) is used for pings.
Term
When diagramming a SCADA network for an industrial warehouse that is 100,000 square feet in size, what is the most important consideration for placement of any network equipment involving connectivity?
Definition
Distance is the most important consideration in that many network connectivity pieces have a limited distance range. This is espcially important in large warehouses.
Term
Which PAN type carries signals over very short distances through a beam of light?
Definition
IR (Infrared) signals use a beam of light to transmit data.
Term
Which is the best definition of a black hole?
Definition
A black hole occurs when a sender sends a packet with a Do Not Fragment flag and the packet is larger than the Maximum Transmission Unit (MTU) on the receiving router. The sender never gets a message that the data was received.
Term
What is the benefit of 802.11g-ht over 802.11g?
Definition
An 802.11g-ht wireless network will have higher throughput than will an 802.11g network.
Term
Why would a MAC address be needed for an IP address?
Definition
In order for a DHCP reservation to be made, a MAC address for the device needing the reservation needs to be known.
Term
Which is true about managed and unmanaged switches?
Definition
Unmanaged switches have no configuration capabilities while managed switch configuration capability depends on the switch (how new and how powerful, for example).
Term
What tool is used to find a break in a fiber-optic cable?
Definition
An optical time domain refelctometer (OTDR) is needed to find a break in a fiber-optic cable.
Supporting users have an ad free experience!