Test #1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What 802.11 Wi-Fi networking technologies should you choose if you need 5 GHz frequencies?

802.11a, 802.11n, and 802.11ac

Which Wifi frequency is the best option for HD video streaming?

802.11ac

Which wi-fi frequency is backwards compatible with another?

802.11g devices are backwards compatible with 802.11b devices

What is PRI ISDN also sometimes referred to as?

23B+D ISDN --because it provides 23 64-Kbps B channels & a 64-Kbps D channel for a total transfer rate of 1.544 Mbps

Port number for MGCP?

2427/2727

What is BRI ISDN also sometimes referred to as?

2B+D ISDN -- because BRI ISDN provides two B channels and one D channel

What is Ant+ used for?

A wireless tech that works with wearable devices, such as heart rate monitors and pedometers.

What security feature should you add to VLAN to make it secure?

Add an ACL - Always make sure to configure the appropriate ACL for your VLANs and switches

What does a gateway do?

Allows two computers with no protocols in common to communicate. These are placed where two different types of computers meet.

What protocol is categorized as an EGP?

BGP. EGP is used between autonomous networks. BGP uses an algorithm to determine the quickest route between networks. When a company needs to implement highly available data centers, BGP allows a company to continue to maintain an internet presence at all data center sites in the event that a WAN circuit at one site goes down.

You need to support an online meeting application that primarily transports streaming video packets. Occasional dropped packets are less important than minimizing latency. Which of the following transport layer protocols should you deploy?

Because dropping occasional packets is less important than reducing latency end-to-end, datagram TLS is the best option.

What is BPDU?

Bridge Protocol Data Unit guard works with STP and PortFast. When a switch receives a BPDU, the BPDU guard disables the port on which PortFast has been configured. It prevents looping.

What facets are a part of the physical network diagram?

Cable lengths and types, server names, IP addresses, server role, network equipment locations, and network users

What technology implements packet tagging in a LAN?

Class of Service (CoS) implements packet tagging in a LAN. It tags the different types of traffic, such as video streaming or VoIP. The tag is a value between 0 and 8, with 0 being the highest priority.

What frequency is 802.11ac frequency, distance and speed?

Communicates at 5 GHz frequency. The channels may be 20, 40, 80, or 160 MHz wide. Data rates depend on channel width: a 20 MHz channel supports data rates up to 346.8 Mbps, 40 MHz supports up to 800 Mbps, 80 MHz supports up to 1733 Mbps, and 160 MHz support 3466 Mbps. With additional antennas and eight spatial streams, 802.11ac tops out at double that final number, or 6.93 Gbps

What is a passive hub?

Connects devices in a star topology, but does not provide signal regeneration

What is Diffserv?

Differentiated services (Diffserv) uses the CoS classifications for identification and subsequently utilizes the QoS parameters to differentiate traffic. It is the term used for the end-to-end QoS model.

You connect a home computer to a BRI ISDN line. The Bandwidth On Demand Interoperability Group (BONDING) protocol is used to combine the channels. What is the max data transfer rate of the B channels?

Each B channel in a Basic Rate Interface (BRI) Integrated Services Digital Network (ISDN) connection can provide a max data transfer rate of 64 Kbps. A BRI ISDN line provides a total of two bearer (B) channels, which can be combined by the bonding protocol to provide a total maximum data transfer rate of 128 Kbps.

What is Tunnel mode regarding IPSec?

Encapsulates a packet within another packet

What is ESP?

Encapsulating security protocol (ESP) encrypts IPSec packets

What metric would help you determine the reliability of a network segment?

Error rate. A segment with a high error rate would be less reliable than a segment with a low error rate. The error rate is usually a percentage.

What does a kernel proxy firewall do?

Examines every layer of the packet, including the data payload.

What is an active hub?

Has circuitry that allows signal regeneration

What type of protocol is OSPF?

link state

What is infiniband?

network link between host and peripheral using RDMA to access the data directly

What is XTACACS?

The second generation and separates the authentication, authorization, and auditing processes.

List some facets that IPAM can allow a network administrator to manage:

-IP address availability - how many unassigned IP addresses exists -Subnet identification, subnet size, and which subnet is associated with which segment -Static/dynamic status for each subnet address Default routers that the various network devices use. -IP address host name -IP address and associated hardware

You need to assign a virtual IP address to an Internet server. What are valid reasons for doing so?

-To permit multiple servers to share the same address -To permit the same address to access multiple domain names -To eliminate host dependencies on specific, individual network interfaces

What are relevant to network segmentation when using switches?

-VLANs -Tagging and untagging ports

What speeds do T1 connections and Primary Rate Interface (PRI) ISDN connections provide?

1.544 Mbps.

What is the class A private IP range?

10.0.0.0 - 10.255.255.255

Port number for NTP?

123

Port number for IMAP?

143

Port number for SNMP?

161

What is the class B private IP range?

172.16.0.0 - 172.31.255.255

Port number for H.323?

1720

What is the class C private IP range?

192.168.0.0 - 192.168.255.255

What frequency is 802.11n frequency, distance and speed?

2.4 GHz and 5 GHz frequency in channels 20 or 40 MHz wide. At 20 MHz, data rates go up to 288.8 Mbps; at 40 MHz those data rates go as high as 600 mbps

What frequency is 802.11g frequency, distance and speed?

2.4 GHz frequency in channels 20 MHz wide. Distance of 38m (125 ft) at data rates of up to 54 mbps.

What frequency is 802.11b frequency, distance and speed?

2.4 GHz frequency in channels 22 MHz wide. Distance of 35m (115 ft) at data rates of up to 11 mbps.

Port number for RDP?

3389

Port number for LDAP?

389

What is the transfer speeds for a T3 connection?

44.736 Mbps

Port number for SMB?

445

Port number for RTP?

5004/5005

Port number for SIP?

5060/5061

Port number for LDAPS?

636

What wireless network standard uses channel bonding and what is it?

802.11n and increases the throughput

What is the advantage of using 802.1x security over 802.11 WEP security?

802.1x security generates dynamic encryption keys

What is TACACS?

A CISCO implementation of RADIUS. It was the first generation and combines the authentication and auditing process.

What is netstat?

A TCP/IP utility that you can use to determine the computer's inbound and outbound TCP/IP connections. It displays current connections and their listening ports.

What type of protocol is EIGRP?

A balanced hybrid routing protocol, also referred to as an advanced distance protocol

What is the difference between drivers and firmware?

A driver allows the hardware to communicate with an OS. Firmware is the software that allows the hardware device to operate.

Your company has implemented a firewall that only examines the packet header information. Of which type of firewall is this an example?

A packet-filtering firewall

What is DHCP snooping?

A security feature configured on switches that acts like a firewall between untrusted hosts and trusted DHCP servers. This also prevents an unauthorized DHCP server from issuing IP addresses clients. The unauthorized or rogue DHCP server is often used in MITM attacks. A trusted server is identified on a specific switch port by configuring the DHCP Snooping Trust State.

What is ARP inspection?

A security feature on switches that validate ARP packets in a network. It determines the packet validity by performing an IP-to-MAC address binding inspection stored in a trusted data based before forwarding the packet to the appropriate destination. All ARP packets with invalid IP-to-MAC address bindings that fail the inspection will be dropped.

What is NAT?

A service that translates one or more global IP address to local IP addresses. This mapping is done through the NAT router. For example, if a request is sent from the internal network to a destination outside the company, that request will be mapped to the global IP address and then sent outside the company's network.

If a routing table contained multiple routes for the same destination, which route will the router use to reach the destination network?

A static route will be preferred because it has the lowest administrative distance.

What is frame tagging?

A technique that adds a small header to the frame as it is passed between devices in order to maintain the original VLAN broadcast domain. In normal Ethernet, there is no tagging. Tagging is implemented only when trunking VLANs between devices is involved. If you only have one switch, an untagged VLAN is just fine. If you have two or more switches and you want all of the VLANs to talk with each other, they will all need the same tag.

You want to trace a signal form one end of a 100BaseT UTP cable to the other. Which tool will help you input a test signal that can be traced through the cable?

A toner generator. Allows you to input a signal on one end of a cable and probe the other endo f the cable for connectivity.

What is the tcpdump command used for?

Allows you to analyze wired or wireless network traffic on a Linux system. For example, to examine POP3 traffic on the wired NIC, you would use this command: sudo tcpdump -I eth0 -nn -v port 110

What occurs in a NIC teaming misconfiguration?

Also known as load balancing and failover (LBFO), NIC teaming allows multiple NICs in the same computer to be placed into a team for bandwidth aggregation and traffic failover to prevent connectivity loss in the event of a network component failure.

What is a DHCP exclusion?

An IP address that is in the configured DHCP scope that should not be assigned. Often IP addresses are excluded from a DHCP scope because the address is configured statically at a device. This is also known as IP exclusions.

What is port forwarding/port mapping?

An application of NAT, redirects a request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. Port forwarding allows remote computers to connect to a specific computer or service within a private network

How do you prevent WPA/WEP/WPS attacks?

Any attacks against wireless protocols can usually be prevented by using a higher level of encryption or incorporating RADIUS authentication.

How is packet drop measurable?

Can be measured with the ping utility. If you add "-n 100" at the end of the ping command, you will end up with a report that tells you the percentage of packet loss.

You should complete the following steps to protect against war-driving attacks:

Change the default SSID, disable SSID broadcast, and configure the network to use authenticated access only.

What is a CSU/DSU?

Channel service unit/digital service unit (CSU/DSU) Is a device typically required by leased lines, such as T1 lines, to terminate their media connection to your LAN. These are placed where the leased line meets your local network

What are the non-overlapping channels for 802.11g?

Channels 1, 5, 9, and 13 but in the US the 3 additional non-overlapping channels are included: 1, 6, and 11

What are the non-overlapping channels for 802.11b?

Channels 1, 6, 11, 14

Which bands does 802.11n and 802.11ac use?

Channels 36-48 (80 MHz: 5.170-5.250 GHz) and 149-161 (80 MHz: 5.735-5.815 GHz) for indoor and outdoor WiFi use.

What can stop a MITM attack?

DHCP snooping prevents an unauthorized DHCP server from issuing IP addresses to clients. Mutual certificate authentication via TLS.

What metric does IGRP use to determine network path?

Delay and bandwidth

What is DNAT?

Destination NAT transparently changes the destination IP address of an end route packet and performs the inverse function for any replies. SNAT is a counterpoint to DNAT.

Which RADIUS implementation was created to deal with VOIP and wireless services?

Diameter - it was created to address new technologies that RADIUS was not designed to handle. RADIUS servers provide AAA, the servers may also be referred to as a AAA server.

What is Flood Guard?

Establishes the max number of MAC addresses that can be seen by an interface. The switch monitors the traffic on the interface. If the network gets flooded with MAC addresses, the flood monitor can intervene by disabling ports and filtering out traffic.

What does an application-level proxy firewall do?

Examines the entire packet

What is EAP?

Extensible Authentication Protocol includes communications between a supplicant (a client device requesting access to a wireless network), an authenticator (often a WAP), and an authentication server. The authentication server can be a Remote Authentication Dial In User Service (RADIUS) server.

What is FCoE?

Fiber Channel over Ethernet deploys fiber channel frames in ethernet networks. By encapsulating the frames, fiber channel can utilize 10Gb ethernet. FCoE is more expensive than iSCSI

Your company is researching different wireless antennas. Antennas that you research are high-gain antennas. Which statement describes a property of high-gain antennas?

High-gain antennas provide a small vertical beamwidth.

Which metric is used by RIPv2 to determine the network path?

Hop count

An administrator would like to integrate DNS and DHCP so that each is aware of changes in the other. What would be the best method for him to do this?

IP Address Management (IPAM) allows integration of DNS and DHCP so that each is aware of the changes in the other. IPAM allows for the discovery of servers associated with an IP address infrastructure responsibility on the network and the ability to manage those servers from a central point.

What are the troubleshooting steps according to CompTIA?

Identify the problem Establish a theory of probably cause Test the theory to determine cause Establish a plan of action to resolve the problem and identify potential effects Implement the solution or escalate as necessary Verify full system functionality and if applicable implement preventive measures Document findings, actions, and outcomes

You need to display the current IP configuration of a Windows 7 computer. Which command should you use?

Ipconfig (ifconfig for linux)

You want to configure a firewall and filter packets on a Linux system. Which command would you use?

Iptables. Filtering can be performed using packet type, packet source/destination, or target

What is z-wave used for?

It is a wireless technology that is widely used in home automation, such as smart lights, locks, and thermostats. It creates a wireless mesh network with a primary controller. Each device communicates with its nearest neighbor, much like routers communicate with each other.

What layer does a NGFW work?

Layer 7, application layer. It includes traditional firewall functionality with an application layer firewall. It enforces policies at the port, protocol, and application levels. An application-layer firewall would perform a more intensive examination of the traffic instead of just allowing traffic on a given port.

What is LACP?

Link Aggregation Control Protocol (LACP), also referred to as 802.3ad. LACP support automatic link configuration and prevents an individual link from becoming a single point of failure. With this protocol, traffic is forwarded to a different link if a link fails. LACP allows network administrators to configure two or more links to pass traffic as if they were one physical link.

What is a reverse zone?

Lists the records by IP address and then providing the FQDN.

What layers of the OSI model does a multi-layer switch operate?

MAC - L2, IP - L3, Protocol - L3, and port number - L4

What is the difference between a managed switch and unmanaged switch?

Managed switches give you more control over your traffic and offer advanced features to control that traffic. An unmanaged switch simply allows ethernet devices to communicate with one another - they are typically shipped with a fixed configuration and do not allow any changes to this configuration.

What is a PTR?

Maps an IP address to a host name

What is a CNAME?

Maps an additional host name to an existing host record

What is an MSDS?

Material Safety Data Sheet - used to understand which chemicals technicians will come in to contact with and any safety issues regarding those chemicals.

MU-MIMO permits what?

Multiple devices to send/receive wireless data simultaneously. This decreases the wait time when seeking wireless communications. Regular MIMO is more properly designated as SU-MIMO, where SU stands for single user. It supports multiple inputs and outputs, but can only service a single device at a time.

What is a MAU?

Multistation Access Unit operates at layer1 and is a network connection concentrator used on token ring networks. It is similar to a hub, which is a network connection concentrator used on Token Ring networks.

You have replaced all of the routers on your network with switches. You then device to turn off CSMA/CD. What happens next?

Network devices will now operate in full-duplex mode. If CSMA/CD was still on then it would be in half-duplex mode.

What is an mismatched MTU/MTU black hole?

Occurs when communication over some routes fails due to an intermediate network segment with a max packet size smaller than the max packet size of the communicating hosts. Specifically, the black-hole router does not send an appropriate ICMP response to this condition, or if a firewall on the path drops such a response.

What is a security implications if your company uses a public cloud deployment?

Other tenants can gain physical access to the resources that store your company's data

What is traffic shaping?

Overall mechanism that encompasses CoS, QoS, and differentiated services. It does not directly implement packet tagging

What is a DHCP relay agent?

Permits DHCP clients and servers to be placed on separate networks. DHCP messages are IP broadcast to all computers on the subnetwork. But if your organization has multiple subnets, things can get a bit complex because DHCP broadcast messages do not cross router boundaries.

OSI layers matching components, protocols, and technologies.

Physical - Network cable Data link - FDDI Network - IPSec Transport - TCP Session - RPC Presentation - MIME Application - DHCP

568A cable specification

Pin 1 - Green/White Pin 2 - Green Pin 3 - Orange/White Pin 4 - Blue Pin 5 - Blue/White Pin 6 - Orange Pin 7 - Brown/White Pin 8 - Brown For this, I think A = Alien, and imagine an alien planet: Around the blue lake, there is orange (like the surface of Mars).Thus 3&6 are orange. The sunset above is green because of an alien atmosphere. Thus 1&2 are green. Finally, for the order of the two within each color pair, I remember that: Stripes over solids Except that blue is the opposite

568B cable specification

Pin 1 - Orange/White Pin 2 - Orange Pin 3 - Green/White Pin 4 - Blue Pin 5 - Blue/White Pin 6 - Green Pin 7 - Brown/White Pin 8 - Brown I remember this by envisioning a scene: I imagine a blue lake surrounded by green grass. Thus blue is in the middle (4&5) surrounded by green (3&6) Above that is an orange sunset (1&2) Below that is the brown dirt underground (7&8) Finally, for the order of the two within each color pair, I remember that: Stripes over solids Except that blue is the opposite

You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colors across both specifications?

Pins 4, 5, 7, & 8

What the FTP ports and which does what?

Port 20 is used for data transmissions. Port 21 is used to control information. If you block 21, then FTP control information cannot be transferred to the network.

A customer has asked you to deploy a solution based on port numbers that allows multiple computers to share a single IP address. Which addressing technology should you deploy?

Port Address Translation (PAT) provides port address translation. This is based on the port numbers. When using PAT, you are able to share a single public IP address among multiple computers on the same network.

You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port. Which switch feature should you use?

Port mirroring - it copies the traffic from a single port to a different or mirror port, but prevents bidirectional traffic on the port. It allows you to view all of the traffic for a single VLAN, no matter the switch where the traffic originates.

What does an IPSec tunnel mode with the AH (authentication header) protocol do?

Produces an encapsulated packet that is digitally signed. AH digitally signs a packet for authentication purpose.

What is Root Guard?

Protects the integrity of the root bridge in a spanning-tree environment. Root guard ensure that the switch you designate as the root bridge remains in that role until changed by an administrator. It is the same thing as a BDPU guard, which prevents looping.

What is a VOIP Gateway?

Provides the interface between an IP network and the Public Switched Telephone Network (PSTN). As an example, for inbound calls, the VOIP gateway would convert telephony traffic into packets for routing over an IP network.

What is QoS?

QoS uses the CoS tag to determine which traffic gets priority. QoS allows the network to provide increased levels of service based on the type of traffic. QoS can provide dedicated bandwidth, and control jitter. QoS operates at layer 3. QoS uses the CoS, but QoS does not implement the tags.

Which feature provides varying levels of network bandwidth based on the traffic type?

Quality of Service (QoS) provides varying levels of network bandwidth based on the traffic type. Each traffic type has its own queue. Each traffic type queue is given its own priority. Traffic types with a higher priority are preferred over lower priority traffic types.

What are the routing protocols and their distances?

RIP - 120, OSPF - 110, BGP - 20, and Static - 1

What are the distance vector protocols?

RIPv1 and 2, and IGRP

What are the distance-vector protocols?

Routing Information Protocol (RIP) and Enhanced Interior Gateway Routing Protocol (EIGRP)

What are the Interior Gateway Protocols?

Routing Information Protocol (RIP), Enhanced Interior Gateway Routing Protocol (EIGRP), Intermediate System to Intermediate System (IS-IS), and Open Shortest Path First (OSPF).

What does the transport layer (layer 4) do?

Segments and reassembles data into a data stream and provides reliable and unreliable end-to-end data transmission. TCP, UDP, NetBIOS operate here.

What facets are a part of the logical network diagram?

Server roles, domain architecture, protocols used, and trust relationships

What were the two insecure methods of authentication under WEP?

Shared authentication and open authentication. Under shared key authentication (SKA), all of the clients used the same key, making the key vulnerable to being cracked.

What does the session layer (layer 5) do?

Starts, maintains, and stops sessions between applications on different network devices. For example, if some host needs a password verification for access and if credentials are provided then for that session password verification does not happen again. SMB, NetBEUI operate here.

What is the difference between static, dynamic, and default routes?

Static routes are configured manually by the admin. Dynamic routes are discovered by the devices through the messages that they send out. Default routes are the routes on a computer that define the packet forwarding rule to use when no specific route can be determined for a given destination address.

How many non-overlapping channels are supported by 802.11a?

Supports 23 non-overlapping/non-interfering channels that can be used in a single area. Each utilizes a RF bandwidth of 20 MHz in Orthogonal Frequency Division Multiplexing (OFDM) modulation. This 20-MHz channel is split into 52 channels with 300-KHz smaller sub-carriers, out of which 48 are used for data transmission. The 8 non-overlapping channels can be used in a single area or cell to provide the cell a total bandwidth up to 532 Mbps.

You need to determine the length of a network cable. Which device should you use?

TDR - it sends an electric pulse through a cable and measures the time required for the pulse to return. The TDR can then use this information to calculate the length of the cable.

What is TEMPEST/RF emanation?

Tempest studied the susceptibility of some devices to emit electro magnetic radiation (EMR) in a manner that can be used to reconstruct intelligible data. Radio frequency information can be captured in a similar manner. You should use shielding to protect against these vulnerabilities

Recently, you have noticed that segments of data are arriving at their destination with errors. You need to examine the appropriate OSI layer for the reliable delivery of segments without error. Which OSI layer is responsible for this?

The Transport layer is responsible for the reliable delivery of segments without error. This means that the Transport layer is not only responsible for making sure that segments of data are delivered, but also for ensuring that segments of data arrive without error.

What is the advantage of using wireless bridges over E1/T1 leased lines?

The advantage of wireless bridges over E1/T1 lines is that wireless bridges support higher bandwidth than E1/T1 lines, and E1/T1 lines tend to be more expensive in the long term.

What is a forward zone?

The forward lookup zone provides the association between devices on a domain and their corresponding IP address. As an example, it would contain a record that says mypc.mydomain.com has IP address 192.168.5.1. If another machine on the network needed the IP address for mypc.mydomain.com, it would query the forward lookup zone on the DNS server, find the record for mypc.mydomain.com, and retrieve the IP address.

You are troubleshooting a network connectivity problem on a Windows 7 computer, and you need to view the MAC address for the NIC installed in the computer. Which command should you use?

The ipconfig /all command.

What is displayed when using the nbtstat -n command?

The local name table screen is displayed

What is layer 3 responsible for and what facets reside there?

The network layer is responsible for logical network addressing and routing. Protocols such as IPX, NetBEUI, and IP operate here.

What is displayed when using the netstat -r command?

The route table is displayed

What is bluejacking?

The sending of unsolicited messages over bluetooth or bluetooth-enabled devices. Turning off bluetooth when not in use is the best protection against this

What is TACACS+?

The third generation and provide all the features of XTACACS along with extended two-factor user authentication. TACACS+ adheres to AAA via a centralized database and can service multiple routers and switches. TACACS+ also allows challenge/response and password encryption.

What is bluesnarfing?

The unauthorized access of information from a wireless device through a bluetooth connection. Turn bluetooth off.

What do packet-filtering firewalls do?

They are based on ACLs. They are application independent and operate at the Network layer. Only looks at a data packet to obtain the source and destination addresses and the protocol and port used. This information is then compared to the configured packet-filtering rules to decide if the packet will be dropped or forwarded to it destination.

What is a switching loop?

This network problem occurs when there is more than one Layer 2 path between two endpoints. The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port. Because the layer 2 header does not support a TTL value, if a frame is sent into a looped topology, you can loop forever. You can implement STP to prevent this looping.

What occurs with bad/missing routes?

This problem will cause routers to incorrectly forward packets. If bad routes are configured, the bad routes should either be reconfigured or deleted. Missing routes should be added. This is more of a problem on statically configured routers.

What is the speed of a V.90 analog modem?

This technology is often referred to as dial-up access and in theory it can provide a max data transfer rate of 56 Kbps.

What is trunking?

Trunking (802.1q) allows different switches to support the same VLAN using frame-tagging. For example, when two ports on Switch A are connected to on port on Switch B, trunking has been implemented. Frame tags will be used to route the communication appropriately.

Port number for TFTP?

UDP 69

You would like to provide secure, remote access between the company's three internet-connected sites and their windows client, servers, and domain controllers. What option would provide adequate security and cost the least overall?

Use IPSec to secure RDP over the internet with connection security rules and associations because it uses only Microsoft-supplied protocols and services

You install a second NIC in your Linux computer. Then, you log on to the computer as root. You want to configure the new NIC with the IP address 192.168.0.1 and the subnet mask 255.255.255.0. Which command should you issue at a command prompt to configure the NIC?

Use ifconfig eth1 192.168.0.1 netmask 255.255.255.255.0 up

What does a media converter do?

Used to connect the network between locations if they are using different types of media (i.e., one is using CAT 6 and the other is using fiber). These are placed where two different types of media meet.

A BRI ISDN line provides a single delta (D) channel, what does it do and what speed does it operate at?

Used to transfer connection control data and operates at a data transfer rate of 16 Kbps.

What is EAP-TLS?

Uses PKI certificates to authenticate the supplicant (client) and server

What is the authentication method for EAP-PEAP?

Uses digital certificate, username, and static password or one-time passwords for authentication

What is the authentication method for EAP-TLS?

Uses digital certificates for authentication

What is the authentication method for EAP-LEAP?

Uses username and static password for authentication

What does a stateful firewall do?

Usually examines all layers of the packet to compile all of the information for the state table

What should you implement to isolate two of the devices that are located on a SAN fabric containing eight devices?

Virtual SAN (vSAN) -- it is a collection of ports from a set of connected Fiber Channel switches that form a virtual fabric. You can partition ports within a single switch into multiple VSANs, despite sharing hardware resources.

What is a VoIP PBX?

VoIP Private Branch Exchange (VoIP PBX) allows a company to use a single public-facing telephone number while having individual "extensions" for employees in a VOIP phone system. A VOIP PBX could be considered analogous to NAT on a router.

What does the tracert command do?

When used with various switches and variables, it can be used to determine the route a packet takes through a TCP/IP network

Where is infrared used for?

Works for line-of-site and are often used in TV's, physical intrusion detectors, and motion-detecting systems.

What does arp -a command show?

You can view the ARP cache for the computer, which displays the IP address and its corresponding MAC address for all entries in the cache.

How do you resolve a mismatched MTU/MTU black hole?

You first need to locate the black hold using the ping command. Once the black hole is found, you should configure one of two possible solutions: Configure the black-hole routers to send ICMP type 3 code 4 messages Set the MTU of the black-hole router interface to be the largest size that the black-hole router can handle

You need to deploy wireless access points in a college environment. You want to deploy a solution that will provide the shortest range and the most non-overlapping channels to prevent interference. Which wireless standard should you deploy?

You should deploy the 802.11a wireless standard. This standard provides the most non-overlapping channels (eight) and the shortest range (30 m in an open environment, 10 m in a building). The 30-meter (m) distance limitation is an important consideration when implementing this wireless network. This standard is the best to use in a campus environment where multiple wireless access points may be deployed near each other.

What provides a communication framework for data transfer in a SAN while minimizing costs?

iSCSI


Kaugnay na mga set ng pag-aaral

Chapter 22: Long Run Economic Growth: Sources and Policies

View Set

Stress prevention quiz 10,11,12,13--pretest and postests, reading

View Set

Chapter 19: The Industrial Revolution and Nineteenth-Century Society

View Set

43, collocation- study and learning 3

View Set

apush: ch 23-the 1920s: coping with change

View Set