Net+ part 2
The number of useful bits delivered from sender to receiver within a specified amount of time.
Goodput
What is the advantage of SU/MU MIMO?
Both of these technologies allowed for a faster rate of data transmission
This occurs when there are so many broadcast messages on a network that they approach or exceed the network bandwidth.
Broadcast storm
This attack affects broadcast traffic that renders the normal network communications impossible
Broadcast storms
What type of cable do you use to connect two switches through their uplink ports or to connect two switches through regular ports
Crossover cable
This type of IDS detection looks for patterns in network traffic and compares them to known signatures.
Signature-based detection
This method is used to send IPv4 traffic through an IPv6 network by encapsulating IPv4 packets within IPv6 packets
4to6
This method is used to send IPv6 traffic through an IPv4 network
6to4
This 802.11 standard operates at 5Ghz frequency with 54 Mbps throughput with a length of 100 feet
802.11a
This 802.11 standard can operate at both 2.4 and 5 Ghz frequencies with 6.8 Gbps throughput
802.11ae
Which wireless standard introduced MUMIMO
802.11ae
This 802.11 standard is the newest one to-date (2023) with a 1.2 Gbps per stream
802.11ax
This 802.11 standard operates at 2.4 Ghz frequency with 11 Mbps throughput, a downgrade from the previously released standard, but can travel 50 feet further (150 feet)
802.11b
This 802.11 standard is an update to the 2.4 Ghz frequency and trasmits data at 54 Mpbs
802.11g
This 802.11 standard is known as the breakthrough in wireless standards, with 600 Mbps throughput and a 300 feet range.
802.11n
Which wireless standard introduced SUMIMO
802.11n
Which wireless standard introduced channel bonding?
802.11n
What do hosts on a private network share when using NAT?
A physical IP address
Are you more likely to use a UTM on a start up or a major company?
A start up company because of convenience. cheaper prices and still providing good service
What is another word for UTM?
All-in-one appliances
This type of IDS detection first defines a baseline of normal network traffic and then monitors it. It looks for anything that falls outside that baseline
Anonamly-based detection
This tool verifies that the cable can carry a signal from one end to the other and that all wires are in their correct positions
Cable tester
This tool verifies or validates that a cable or an installation meets the requirements for a specific architectural implementation
Certifier
This wireless technology method utilizes non-overlapping channels, putting them together to increase data rates
Channel bonding
You want to create a loopback plug using a single RJ45 connector. How should you connect the wires in the connector?
Connect pin 1 to pin 3 and pin 2 to pin 6.
You want to create a rollover cable using a single RJ45 connector. How shouldyou connect the wires in the connector?
Connect pin 1 to pin 8 and pin 2 to pin 7.
You want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectors?
Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.
This type of cable uses the T568A standard on one end and the T568B standard on the other end
Crossover cable
During the name resolution process, where does the computer look if there is no match in the HOSTS file?
DNS Server
What causes a broadcast storm?
DOS attacks or switching loops
Specifies the number of clients that can utilize the wireless network.
Device density
Why are SNMPv1 and v2 insecure?
Didn't use passwords Used a community name for authentcation Used cleartext
This type of antenna focuses its radiation pattern in a very specific direction
Directional antenna
True or false Nslookup is a linux command used to perform manual DNS lookups
False It's a windows command used to perform manual DNS lookups
True or false SDSL (Symmetric Digital Subscriber Line) requires a splitter
False SDSL, unlike ADSL, does not include voice traffic on its line, meaning it does not require a splitter
True or false Network-based IDS can scan the contents of encrypted traffic as it flows on your network
False Since the packets are encrypted this is to ensure only the recipient can read them. You would need a host-based IDS in order to scan contents of encrypted traffic
True or false The wider the beam is with a directional antenna, the longer the range can be
False The narrower the beam is, the longer the range is capable of being
True or false 802.11g is backwards compatible with 802.11a
False This is because 802.11g operates at a different frequency that 802.11a (which operates at 5Ghz)
True or false You can use the "userdel" utility to lock a user account
False This utility would delete the user account, there is no option for locking it
True or false Connecting each pin to the same pin on the other end creates a crossover cable
False This would create a straight through cable
This organization is responsible for allocating IP addresses used on the internet.
IANA (Internet Assigned Numbers Authority)
What company developed the 802.11 standards?
IEEE
This organization is responsible for networking standards for technologies such as Ethernet and wireless networking.
IEEE (Institute of Electrical and Electronical Engineers)
This organization is responsible for setting standards on the internet. For example, it has defined the standards for NAT as well as other protocols.
IETF (Internet Engineering Task Force)
This protocol provides IPv6 communication over a private IPv4 network
ISATAP
What can you do to mitigate a broadcast storm?
Implement Spanning Tree Protocol Implement built-in storm protection Use VLANS for segmentation
Where is the first place a computer looks at during the name resolution process?
In the HOSTS file
Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN.
LWAPP
Defines and organizes perameters that agents monitor and manage on their devices. The SNMP manager uses this to determine what data to gather from the agents. Each variable has a unique variable (OID)
MIB (Management information Base)
This wireless technology method utilizes beam forming, allowing data to be sent to multiple devices in seperate data streams at the same time
MUMIMO (Multi-user MIMO)
This tool measures a device's electrical properties, including voltage, amps, and resistance
Multimeter
This type of antenna radiates and absorbs signals in all directions of the antenna
Omnidirectional antenna
This occurs when a cut in the wire prevents the original signal from reaching the end of the wire. The signal completely stops.
Open circuit
Filtering through log information with a software in hopes of finding a specific piece of data (similar to filtering but more advanced)
Parsing
PPTP
Point-to-point tunneling protocol, one of the first VPN protocols and is no longer secure
Provides copies of packets from a selected port for monitoring and analysis
Port mirroring
What does an all-in-one appliance do for your network?
Recudes need to manage multiple security devices
A protocol that eliminates looping in network traffic.
Roaming
What type of cable do you use to connect a workstation to a switch's or routers console port
Rollover cable
This protocol is desgined to help monitor network devices and provide alarms for when something goes wrong (manage complex networks)
SNMP
Software applications that are installed on hardware that you want to monitor (such as servers or switches) Monitors and reports events that happen to the SNMP manager
SNMP Agent
Responsible for collecting data from network hosts (aggregates info & displays an overview of the current status of the network)
SNMP Manager
This wireless technology method uses additional antennas added onto a router, allowing data to be sent to multiple devices in seperate data streams
SUMIMO (Single-User MIMO)
What is a disadvantage of SUMIMO?
SUMIMO can only trasnfer data to each device one at a time, increases latency
This type of attack is an attack where a small amount of information, data, or valuables are taken over a period of time. The result is to construct or obtain data or property of great value
Salami
This occurs when electrical signals take a path other than the intended path. Can be caused by worn wire jackets, crushed wires that touch each other, or a pierced wire that touches metal.
Short circuits
This attack spoofs the source address in ICMP packets and sends the ICMP packets to an amplification network (bounce site). The bounce site responds to the victim's site with thousands of messages that he or she did not send
Smurf
What type of cable do you use to connect the uplink port on one switch to a regular port on another switch
Straight-through cable
This term describes multiple smaller subnets are combined into a single larger subnet. Performed by taking the default subnet mask and making it smaller
Supernetting
What process is descrbied below? The default subnet mask uses 24 bits (255.255.255.0). The mask is altered to use only 23 bits (255.255.254.0) in order to combine multiple subnets together
Supernetting
This tool uses two devices to trace the end of a wire from a known endpoint onto the termination point in the wiring closet
Toner probe
This tunneling method establishes a tunnel between individual IPv6 hosts so that they can communicate through a private or public IPv4 network
Toredo tunneling
After you've configured your SNMP agent with thresholds, if those thresholds are exceeded this type of message will be sent to the SNMP manager. Goes over port 162
Traps
True or false An omnidirectional antenna disperses its waves in a 360 degree circle from the antenna
True
True or false By creating a VLAN, you create multiple broadcast domains
True
True or false Dig is a linux command used to perform manual DNS lookups
True
True or false When a host using a VLAN sends a packet and goes through a switch, then a second switch to reach the destination, the second switch removes the VLAN ID before forwarding it to the destination
True
True or false When you connect pin 1 to pin 3 and pin 2 to pin 6 you are creating a cross over cable
True
True or false You can use the "passwd" utility to lock a user account
True
True or false 802.11g is backwards compatible with 802.11b
True This is because 802.11g is an upgrade to the 2.4 Ghz frequency, which is what 802.11b utilizes
What time standard does NTP follow?
UTC
UTM
Unified Threat Management
Automatically partitions a single broadcast domain into multiple VLANs.
VLAN pooling
This device establishes remote access VPNS
VPN Concentrator
What is the wiring order for the T568A standard?
White/green, green, white/orange, blue, white/blue, orange, white/brown, brown
What is the wiring order for the T568B standard?
White/orange, orange, white/green, blue, white/blue, green, white/brown, brown
Connects two wired networks over a Wi-Fi network.
Wireless bridge