A+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Ethernet over power can sometimes be used as an alternative to which networking implementation?

Wi-Fi

Which RAID level will result in data loss with the failure of only a single drive?

0

Repeaters and extenders operate at which layer of the OSI?

1

Which frequency does 802.11a operate?

5Ghz

DHCP Service Ports

67 and 68

Remote Assistance Port

3389

Minimum VRAM on graphics adapter for CAD/CAM?

128MB for 1360x768 true-color

What is a differation between 2.4Ghz and the 5ghz freq. bands?

2.4 Ghz is generally able to carry farther than 5ghz

Which port is used by SSH by default

22

Over which port would an outgoing email be sent?

25

Which cell service generation first introduced mobile internet access and features such as video calling?

3G

TCP Ports

49152, 65535

What is the max bandwidth of 802.11g?

54Mbps

What describes the process of devices such as WAPs reporting their usage and status information to a cloud-based management point?

Backhaul

Which hard drive attribute is not reported by SMART tech?

Fragmentation

A client request for a service over a particular port that creates a temporary rule to allow that port to remain open for return traffic is known as what process in a firewall?

Port triggering

Which devices would be best categorized as IoT devices?

Security System, Thermostat

ZigBee, Z-Wave, and RFID are low-power wireless technologies that transport data on ___ networks.

SmartHome

LDAP port number

TCP/UDP 389

The 2.4Ghz band is divided into how many channels when using Bluetooth devices?

79

Virtual Router

A virtual router is a networking device that routes data packets between network segments. Similar to how a VM is created, a virtual router exists entirely in software and functions to provide the same routing services as its physical counterpart. Virtual routers route traffic between network segments regardless of whether these are virtual or physical.

You need to encrypt and digitally sign the E-mails. Which of the following should you use?

S/MIME. Secure/Multipurpose Internet mail Extensions is used to encrypt and digitally sign E-mail.

Dig Command

The dig command as part of the reconnaissance process was successful because of two key reasons. The first reason is that the firewall is allowing TCP port 53. It is used for zone transfers and therefore it should be blocked.

hot-swappable

The feature of a component that allows it to be installed or removed without disrupting operations. (USB, SATA, FireWire) NOT IDE.

DNS port number

UDP/TCP 53

line-of-sight transmission

Wireless, not cable

Which channels are typically considered good candidates for a WI-fi device operating at 2.4ghz?

1,6,11

Requests originating from port 548 come from what system?

A Mac Client

Which application uses port 3389 by default?

A RDP Remote Desktop Connection

A patch-panel can best be thought of in which manner?

A centralized termination point for extensions of network cables.

Which option would you be asking for if the request was sent over port 53?

A name to IP address mapping.

Which application would be best suited to using NFC?

A payment System

Remote Desktop Protocol (RDP) and Remote Assistance Port

By default, port 3389 is used by the Remote Desktop Protocol (RDP) for Microsoft Remote Desktop and Remote Assistance.

Requests over port 445 could be described as using what protocols?

CIFS, SMB

Created a hypervisor server and created multiple VMs on it; the VMs are only to communicate with each other.

Create a virtual switch and connect the virtual machines to it.

A web-page requested over port 443, which prefix?

HTTPS

Difference between Hub and Bridge

Hubs come in Active and Passive varieties, Bridges do not. Hubs operate a Layer 1 of the OSI Model, bridges operate a Layer 2 Hubs send incoming data out over all other ports, bridges do not

802.11n offered improvements over earlier Wi-Fi implementations by primarily adding which features?

Increased signal intensity. More antennas.

What is a common connection issue with 802.11b that is not as prevalent with 802.11a?

Interferance

A SOHOs network router that includes ports for switching is known as what device?

Layer 3 Switch

What reasons can result in the 'Operating System Not found" error?

Missing Active Partition, Missing Master Boot Record (MBR)

Traffic originating over ports 161 and 162 would indicate what type of operation?

Monitoring a network device

On a Printer, if you do not set the paper guide to the correct paper size, what is most likely to happen?

The printed paper will come out creased.

Which characteristics of a cable modem distinguish it from other modems?

They are always on. They use cable TV lines.

Which characteristics of a switch can be advantageous to network deployment?

They improve network performance by regulating the flow of traffic. They increase network performance by reducing collisions.

What are some characteristics of routers?

They isolate networks from each other and do not forward broadcast packets. They connect multiple networks together. They operate at Layer 2 of the OSI Model

Which scenario would best equate to a full-duplex transmission?

Two people arguing with each other

You need to build an audio and video editing system. You need to be able to connect a digital keyboard to the system. Which two ports can be used?

USB/MIDI

What are valid reasons to choose 802.11n/ac over 802.11g?

Use of 5ghz frequencies incur less interference. Provdes larger channel bandwidths per user.

Which options are components of the SLP protocol?

User agents, Service Agents

Jitter

a QoS component described as resulting from variation of delays in a packet stream

SD cards can be formatted with which filesystems on a Mac?

exFAT, HFS Plus, APFS

You need to configure a new Cisco Router. You need to ensure that you properly connect teh router with the laptop and configure it. How?

use a DB-9 to RJ-45 to connect/configure. Routers cannot be configured with USB. and a new router will not have IP configs so you cant use telnet/ssh.

Capability introduced by 802.11ac?

using dual band signalling

Virtual Network Interface Card (NIC)

An entity that is created in software that allows a Virtual Machine (VM) to access the Ethernet network. It is configured just like its physical counterpart with an IP address, default gateway but exists entirely within the software. It is bridged with a physical NIC which places its frames on the wired network with a MAC address that is unique to the virtual NIC.

What should be replaced if the toner is not getting bonded to the paper in a laser printer?

Fuser (Bond=fuse)

Characteristics of IP addresses

It has two sections indicating the host address, and the network address. It is a logical address that can be changed.

The NetBIOS protocol would be best suited to which type of request?

Searching for a File on FileServer1

SSID

Service Set Identifier; Access point configuration setting aka 'network name'

End-user devices such as smart phones and tablets will typically connect to a SOHO network in which manner?

Wi-Fi

Which devices would most likely require PoE?

A security camera. A WiFi access point.

Which statements best describe the characteristics of the TCP protocol?

It's reliable, It uses acknowledgements

Your printer does not have a duplexer installed. However, when printing a document, you choose to print with duplex settings. What will be the outcome when you print the document?

The document will first print the odd number of pages and then the even number

Honeypot

A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb.

You need to install a performance intensive application on a laptop. you have been advised to use a laptop with a SSD instead of a HDD, what could be the reason?

SSD provides high performance and is more reliable.

What is the best option for resolution for an external monitor with dead pixels?

Replace the monitor

Wireless encryption method, better than no security, but not particularly secure.

WEP

What are disadvantages of cable modem service that were not an issue with DSL service?

Cable modem users may have been on the same LAN, DSL users were not. Cable modems used shared bandwidth and did not always offer the speeds advertised.

Configuring a NIC to receive an IP address automatically informs the system to use which network service?

DHCP

You want to perform passive reconnaissance in your organization and test out the security controls. You want to perform a passive DNS assessment and want to know the details of the organization's DNS servers. Which method would help you achieve your goal?

Execute a WHOIS query. WHOIS is a passive method where the target is not involved and the information is retrieved without connecting with the target. When you run a WHOIS query, the target domain is not interacted with. If the domain information is publicly available, then you will be able to retrieve the information including the DNS server names.


Ensembles d'études connexes

Chapter 6- Relationships and Guidance

View Set

BAH - Chapter 35 & 36 Musculoskeletal

View Set

Canada: Geography and Where People Live and Trade

View Set

HESI Live Review Workbook for NCLEX-RN Exam

View Set

Chapter 52: Nursing Care of the Child with a Cognitive or Mental Health Disorder

View Set