Network + Review of Test 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which cable supports the longest runs? 1000baseX 10GbaseFR 10GbaseT

1000Basex - reference for the family of fiber-optic network cables

IMAP - PORT

143

When antenna gain is increased, what happens on the wireless ap?

Antenna gain increases the size of the signal footprint or cell size.

1000BaseT uses what kind of wiring?

Copper Wiring

Port 67/68

DHCP

Port 5060/5061

SIP

work-completion time-tables can be found where?

Statement of work document

A windows server is experiencing problems after it boots, what shold the technician check immediately?

System Logs - it can detail all actions,(crashes, errors, manual inputs, etc)

UTM

Unified threat management is firewall technology that is packaged with many other security services. UTM is a package of firewall, vpn, anti-virus, load-balancing and other security services.

This seldom-seen threat uses commands to a switch to change a Switchport to a trunk link.

VLAN hopping - attempts to abuse vlans within a switch to gather data from VLANs that a host is not authroized to access.

Also known as HomePlug, this IEEE standard governs how multimedia data streams can be run over in-home power wires.

1901-2010 - standardizes how multimedia data is transported throughout a home using the household power wiring.

RTP

5004/5005

What port does SIP Use? 5004/5005 5060/5061 1720 2427

5060/5061 = SIP 5004/5005 = RTP 1720 = H.323 2427 = MGCP

Mantrap is?

A mantrap is a double-gated entry or exit with successive locked doors.

Single point of failure

A single piont of failure may be a server, link, program or something else. Any individual elemnt that fails and results in loss of functionaly of an organizational component constitutes a single point of failure

In which document would you expect to find a privacy/consent-to-monitoring section memorandum of understanding service level agreement acceptable-use policy statement of work

Acceptable-use policy - sets standards for network resource usage and limits memorandum - semi-formal document that defines the degree of vendor support service level - is a formal contract that defines the degree of vendor support statement of work - formal contract that defines the details of vendor support to be performed

What can a network administrator configure to control specific IP addresses and ports access to the internal network? (Select TWO.) IIS Server, ACLS, Port scanner, layer 2 switch, firewall, mac address filtering

Access control lists Firewalls both of these can be configured to allow/restrict specific ports or ip addresses from accessing the network.

Which signaling category allows a single signal to exist on network media.

Baseband - means that only one signal may exist on the media at a given time. broadban - means multiple signals may co-exist on a network medium.

A functioning switch port that does not accept or forward normal frames is in what state?

Blocking - it listens to and processess bridge-port data unites and does not listen to or forward regular traffic. Once bridge-port data units are complete the port returns to normal operation.

Packet Sniffing

Captures Packets to be examined later

Before an Ethernet NIC may transmit data onta a medium, it must check to see if another NIC is transmitting data. What is this checking process called?

Carrier Sense/Carrier Detect

Before leaving for a two-week conference, a network technician upgraded the corporate router. While she was away, users begin to experience slow network performance. Which practice will enable other technicians to quickly restore the network to normal speeds?

Change management - Done correctly, a good change management program will detail each change to the router, as well as how to undo those actions.

what is found in found in change-management documents

Change management Procedures

One of the features of the 802.11n wireless protocol enables the use of multiple simultaneous frequencies in order to increase usable bandwidth. What is the name of this technology? A. 20-MHz channel spacing B. MIMO C. Spatial reuse D. Channel bonding

Channel Bonding Correct Answers: Channel bonding - This feature uses multiple frequencies (typically 2-20 MHz frequencies) bonded together for 40 MHz of bandwidth. Incorrect Answers: MIMO is basically about using multiple antennae and selecting which one has the better performance (transmit/receive). Channel spacing doesn't increase usable bandwidth. Spatial reuse is a feature of some optical ring networks. Spatial reuse is typically seen in optical ring networks.

The IT department wants to filter access to web sites that contain certain words, urls and signatures, which network device can restrict access based on these types of criteria

Content filter - looks at many factors, keywords and digital signatures, or a list of bad urls and blocks traffic based on rules set up by the admin

Elesian sees Theo, the network administrator, walking through the hallway carrying a punch-down tool. Being an assistant network technician, what does Elesian think that Theo is MOST likely connecting?

Correct Answer: A 110-block - 110- and 66-blocks are connected to cables with punch-down tools. Incorrect Answers: A demarc is just the point that identifies where the network becomes the responsibility of the subscriber. A DB-9 is an old serial or video connector. Smart jacks are usually wired with terminal screws or spring push connectors. Take another test

What is the quickest and easiest technology available to keep servers and equipment up and running?

Correct Answer: A battery backup/UPS on each rack or critical node keeps systems up and running in the event of power failure. Incorrect Answers: RAID arrays are great to keep things running but if power goes out, they are not available. A disaster-recovery plan is for dealing with a situation where the system is already down. A business-continuity plan is for dealing with a situation where the system is already down.

Two-factor authentication requires two different types of factors. Which of the following is an example of two-factor authentication? A. Check card and PIN B. PIN and password C. Fingerprint and facial recognition D. Username and password

Correct Answer: Check card and PIN - There are two different factors here; a "what you have" and a "what you know." Incorrect Answers: Username and password are both "what you know." PIN and password are both "what you know." Fingerprint and facial recognition are both "who you are."

A network technician needs to check the configuration of a port on a switch. Which tool is he MOST likely to use to verify the configuration? A. dig command B. nbtstat command C. SNMP monitor D. traceroute command

Correct Answer: SNMP - The simple network messaging protocol is used to, among other things, remotely administer SNMP-enabled devices. Incorrect Answers: Traceroute tells you what routers your packets are passing through on their way to a destination. Nbtstat is only used in NetBIOS/netbeui networks, and dig is a DNS query tool.

UDP port 69 is used by what protocol? A. TFTP B. DHCP C. DNS D. SMB

Correct Answer: TFTP uses UDP port 69. Incorrect Answers: DHCP uses ports 67 and 68. DNS uses port 53. SMB uses port 445.

Network technician Kyle is troubleshooting a connectivity problem with a new data circuit. Kyle confirms that the ST fiber jumper is good. Which of the following is the problem?

Correct Answer: TX/RX reversed - This is easy to do with ST fiber connectors. Incorrect Answers: Interference isn't the problem because it is fiber-optic cable—there is no interference on fiber optics. A bad connector is not the problem because the ST connector is verified good. Cable length is a possibility, but there is a more likely answer.

When digitizing an audio signal, what is sampling size? (Select two.) A. The number of signal events per second B. Bit depth C. The number times per second that sound is sampled D. The number of bits used to describe sound at a given instant

Correct Answers: Bit depth and the number of bits that describe a sound at a given point in time both mean the same thing - they are synonyms for sample size. Incorrect Answers: The number of samples taken over a given time is the sampling rate, not the sampling size. Baud is the term that describes the number of signal events per second.

A company has just three laptops that connect to the wireless network. The organization uses WEP encryption on their wireless network. They have noticed unauthorized connections to their WAP and want to take steps to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO.)

Correct Answers: Change the encryption method to the WPA and enable and configure MAC filtering. - WEP is the least secure wireless encryption standard; WPA and WPA2 are far more secure. MAC filtering identifies specific computers that are allowed or denied access. Incorrect Answers: Limiting the DHCP scope doesn't prevent users with static IP addresses from connecting. CompTIA thinks enabling the SSID is an insecure thing to do. Changing broadcast channel won't help because the laptops will scan all channels in search of the correct SSID. Take another test

Network technician Angelina needs to make and customize some different long and short cables. She then needs to verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO.) A.Loopback plug B.Crimper C.Punch-down tool D.Cable certifier E.Multimeter

Correct Answers: Crimper and cable certifier - A crimper can cut the cable and attach a connector to the end, while a cable certifier can confirm that the cable is in spec. Incorrect Answers: A multimeter can't confirm that the cable lengths are within spec. A punch-down tool is for wiring a 66 or 110 block. Loopback plugs check NIC function. While they may be used

A computer user, Zaphod, is unable to log on to the domain from his desktop computer. A cable certifier is used to check his network cable and it shows a high value of NEXT. Which of the following is most likely the cause?

Crosstalk - next - with near end cross talk, signal from wires at the near end of the cable are being induced onto other wires(s).

This process watches for incoming ip address-assignment requests from unknown MAC addresses?

DHCP Snooping - is a cisco process that rejects DHCP requests from unkown mac addresses

What must you use to permit DHCP requests and responses to pass to different networks separated by a Layer 3 device?

DHCP relay agent - the relay from one network to another separate network will get DHCP to both networks.

What are common reasons for poor or non-working fiber-optic link?

Distance limitations, wavelength mismatch, dirty connectors

VPN Concentrator

Enables multiple vpn sessions to connect with the network

Which term describes the process of preparing data to go onto the network?

Encapsulation - Data is generated at upper layers, then passed down to lower layers, each of which adds a header. The data is encapsulated behind all of the headers

Network technician Raj has tested a theory of probable cause and discovered that the theory was incorrect. Which of the following would be the NEXT step in the troubleshooting process?

Escalate the issue,

RG-6 MTRJ RS-232

F connectors are used on RG-6 coaxial cables which are found in cable television and cable network installations. MTRJ - fiber-optic rs-232 - Serial Port

Which term describes the rate at which usable information bits are delivered from one node to a destination?

Goodput discounts all protocol overhead, ack, and retransmission counting only the useful bits successfully delivered over a given time Throughput includes information, protocol overhead, and other bits that are extraneous to application information. It is measured bi-directionally so it also includes the delay between acknowledgements and next transmissions. Baud rate is the number of signal cycles per second. This term is used with modem connections. Bit rate is the raw number of bits transmitted in a single direction and includes all overhead and non-information bits.

Several switches are being configured by a network technican so they can be remotely managed. Which switch element must be configured to support SSH connections to each of device as well as to retriev various parameters?

IP address and SNMP configurations - to connect to anything, both devices need ip addresses, snmp enables among other things the ability to remotely manage SNMP enabled devices,

ARP

IP-to-MAC associations

Which of the following hardware problems could provent a node from attaching to a switch? A. Incorrect Wi-Fi channel B. Incorrect termination C. Misconfigured DHCP server D. Mismatched standards

Incorrect Termination Mismatched Standards

SNMPv3 provides which of the following the BEST over previous versions of SNMP a. more data types b increased security c simplified management d higher productivity

Increased security - snmp v2 security was considered overly complex and used a party-based security system, smpm v3 is simplified security system and switched to cryptographic system

A network technician needs to remotely manage certain Layer 2 switches, but she is currently unable connect to them. The technician tried to ping the switches, but was unsuccessful. What will MOST likely need to be configured on each switch?

Ip address on the native VLAN interface, IP address on the native vlan interface - in order for managed switches to be remotely maanged (or even pinged) they need an ip address

What technology improves Ethernet data-transmission speed over a network

Jumbo Frames - enables more data to be sent over a network by requiring less overhead and fewer acknowledgements.

Which standard is commonly used to control thin-client wireless access points?

LWAPP - light weight access point protocol

Which device tests the power of fiber-optic light pulses?

Light Meter

When enabled on an Aruba wireless access point, 802.11a-ht and 802.11g-ht is more commonly known as what?

Mixed mode - enables 802.11a stations to connect to the 5ghz circuits of a WAP while 802.11b/g nodes connect to the 2.4ghz section

Network technician Sal must run cabling from one office to a neighboring office by running cables over the light fixtures in the common ceiling that connects them. Which type of cable will best prevent interference from the lights? Coaxial, Cat5/6 Multimode-fiber

Multimode fiber - optic cable is not affected by nearby electromagnetic fields.

Multiplexing

Multiplexing takes multiple data streams and combines them so they can be transported accross a single medium,

User is trying to map a drive to a known NetBIOS share, but is unsuccessful, she pings the server that holds the share and gets a quick response. Which tool should she use to check if NetBIOS is enabled?

NBTstat - this command checks the netbios status and information

What uses port 137-139

NetBIOs

Which IT changes should be documented by the change-management team? A.Replacement of a failed monitor B.Network configuration C.Additions to the network D.Physical-location changee E.User password changes

Network Config Additions to the network physical location changes

Which elements would you expect in a acceptable use-policy?

Network access, illegal use equipment ownership

A technician has been tasked with seting up an IDS security device. Which feature of a switch should be configurd to work with the IDS device?

Port Mirroring - you use mirroring to copy data from other ports to the one hooked up to the ids, this data can be monitored to detect suspecious actions by possible intruders.

Benefit of PoE(802.3at) vs (802.3af)

Power of 25 watts vs 15 watts

Banner grabbing

Probing open ports to gain additional information

A network administrator wants to filter outgoing network requests. Which of the following choices will filter the outbound requests?

Proxy server - proxy server can be set up to filter both incoming and outgoing requests. THis way a company can make sure employees don't go to unapproved web sites

Port 5004/5006

RTP

Which authentication, authorization, and accounting (AAA) technology is most widely used with remote access technology

Radius - is a full service AAA protocol,

Packet Filtering

Restricts Packets based on IP addresses

Content Filter

Restricts access to sites based on words or images that are on that site

What are typical ways of proactively communicating SNMP alerts?

SMS and Email

A technician has been assigned to set up network monitoring for some important network devices. Due to the sensitive nature of the devices, the information must be sent in a secure fashion to the monitoring station. Which protocol will facilitate monitoring and support secure transmission of the data?

SNMP v2

what technology is used to inhibit layer 2 switching loops within a lan?

STP - spanning tree protocol is used to disable a port on a switch when a loop is detected.

Purpose of VPN concentrator?

Secure Network Access - the concentrator is what you connect to when you are away from your network and want to vpn in.

The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?

Senior management and IT management should identify critcal assets and critical nodes

Good Ground provides protection against which threats?

Short circuits, static electro-static discharge

Which technology is an authentication solution that uses TCP and also provides AAA?

TACACS+ uses tcp to perform its AAA functions RADIUS uses UDP to perform AAA and RAS only provides authentication. Kerberos doesn't provide authorization.

Two characteristics of logging and analysis utilities?

They can present results in a graphical format, The can analyze utilization of network capacity, storage use, cpu load and other parameters

A company's network consists of a primary switch at one end of the office building and a secondary switch at the other end of the building. These switches are networked together. The office experiences a brownout only affecting the half of the building connected to the secondary switch. When power is restored, users connected to the secondary switch report no network or Internet connectivity. Which of the following should be verified on the secondary switch to resolve this issue?

Verify that the switch has power.

A heatmag is generated by which device? Coverage calculator? wireless survey tool thermograph

Wireless survey tools detect and may document the source, frequency and strengthy of radio signals including wireless access points and transmissions that may interfere with wireless communication. Thermographs documents temperatures,

Critical node

a specific type of critical asset that is unique to the IT environment. (Servers, routers, mission critical workstations, printers)

Proxy server

acts as an intermediary for user requests and responses from the internet

A network administrator, is having intermittently lost connections with a local Linux server. She decides to check the IP address on the server to see if it conflicts with any other IP addresses on the network. Which of the following commands should Lisa use?

ifconfig - linux/unix command to display and change the network interface config. traceroute - displays route paths and transit delays tracert - windows command that shows all network hops between 2 networks ipconfig windows cmnd to display ip config info

stateful inspection

is a completion inspection of a packet from its source through to its destination to confirm an authenticate conversation

Critical assett

is a resource within an organization without which the organization cannot function. It can also be a single point of failure but not all single points of failure are critical assets.

Network technician John Watson, needs to check if the domain name resolution system is functioning properly. Which of the following software tools would he use to accomplish this? (Select TWO).

nslookup - a simple utility for checking DNS names against ip addresses dig is a feature-rich dns-to-ip testing and troubleshooting utility

route

shows destination networks

tracert

shows router hops and times between source and destination networks.

Which of the following is an example of a firewall that checks all incominfing traffic, then decides if the traffic should be allowed through or dumped? Packet sniffing, packet filtering, content filter, stateful inspection

stateful inspection - is a comple inspection of a packet from its source through to its destination to confirm an authentice conversation.

What must be done at the ends of a thin-net segment in order for 10Base2 to function?

terminate resistors must be installed

SMB PORT

udp/tcp 445


Kaugnay na mga set ng pag-aaral

The 7 Organelles and their functions.

View Set

Assessment skin, has, and nails in Sherpath

View Set