COMPTIA NETWORK+

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What port does Simple Network Management Protocol(SNMP) use?

Port 161

Port number for SMTP?

Port 25

Port number for LDAP

Port 389

Port number for Kerberos

Port 88

What is IF-config?

ifconfig is used in unix-like operating systems like Linux. Provides the same function as ip-config in windows. Used to view/change the configuration of network interfaces on your system.

LS

list directory in Linux

mkdir

make directory in linux

Which cable type is the least susceptible to interference of signal capture?

Fiber-Optic uses light pulses rather than electrical signals, which makes it impossible to intercept the signal without interrupting it, and thus, being detected.

In what OSI layer does network topologies, such as ring, bus, and mesh topologies exist?

-Layer 1. PHYSICAL LAYER

CIDR /12 Available IP Addresses

1,048,576

Class A public IP range

1-126

Class A Private Range

10.0.0.0 - 10.255.255.255

Class A private address

10.0.0.0 - 10.255.255.255

CIDR /22 Available IP Addresses

1024

Category 6A (augmented)

10GBASE-T, 100 meters and data rates up to 10 Gbps.

loopback address

127.0.0.1

CIDR /25 Available IP Addresses

128

Class B Public IP Range

128-191

CIDR /15 Available IP Addresses

131,072

CIDR /28 Available IP Addresses

16

CIDR /18 Available IP Addresses

16,384

Port number for SNMP?

161

APIPA address

169.254.x.x

Class B private address

172.16.0.0 - 172.31.255.255

Class C Public IP Range

192-223

Class C private address

192.168.0.0 - 192.168.255.255

CIDR /11 Available IP Addresses

2,097,152

CIDR /21 Available IP Addresses

2048

How many channels does T1 have?

24 channels

What port number does SMTP use?

25

CIDR /24 Available IP Addresses

256

CIDR /14 Available IP Addresses

262,144

CIDR /27 Available IP Addresses

32

CIDR /17 Available IP Addresses

32,768

What port number does RDP use?

3389

CIDR /30 Available IP Addresses

4

CIDR /20 Available IP Addresses

4096

CIDR /23 Available IP Addresses

512

CIDR /13 Available IP Addresses

524,288

568A and 568B cable specification.

568A Pin 1-Green/white Pin 2-Green Pin 3-Orange/white Pin 4-Blue Pin 5-Blue/White Pin 6-Orange Pin 7-Brown/White Pin 8-Brown 568B Pin 1-Orange/White Pin 2-Orange Pin 3-Green/White Pin 4-Blue Pin 5-Blue/White Pin 6-Green Pin 7-Brown/White Pin 8-Brown

CIDR /26 Available IP Addresses

64

CIDR /16 Available IP Addresses

65,536

CIDR /29 Available IP Addresses

8

CIDR /19 Available IP Addresses

8192

What is a demilitarized zone?

A demilitarized zone (DMZ) is a network segment placed between an internal network and a public network, such as the internet. A DMZ is a secure server that adds an additional layer of security to a network and acts as a buffer between a local area network (LAN) and a less secure network which is the Internet.

What is a loopback cable used for?

A loopback cable is used to test the network function of the NIC by allowing it to send and receive network communication with itself.

What is a Network-Based Intrusion Detection System(NIDS)?

A network-based intrusion detection system (NIDS) is used to monitor and analyze network traffic to protect a system from network-based threats. A NIDS reads all inbound packets and searches for any suspicious patterns. When threats are discovered, based on its severity, the system can take action such as notifying administrators, or barring the source IP address from accessing the network. NIDS can provide you with reliable real time information when monitoring the network without taking up consumption of many resources.

What is a patch panel?

A patch panel is essentially an array of ports on one panel. Each port connects, via a patch cable, to another port located elsewhere in your building. The patch panel connects to the switch. The ability to label individual cable runs in a patch panel creates a cleaner and more organized way of identifying signal flow, and troubleshooting technical problems becomes an easier chore. Patch panels are also referred to as patch bays, jack fields, or patch fields, and are the core foundational flow of collecting data and directing it where it needs to be.

What does a Physical Network diagram consist of?

A physical network diagram includes cable lengths and types, server names, IP addresses, server roles, network equipment locations, and the number of network users.

What is a port scanner used for?

A port scanner refers to a software application program that scans a server for open ports. It enables auditors and network administrators to examine network security while attackers and hackers use it to identify open ports for exploiting and/or running malicious services on a host computer or server. Port scanners are primarily used by network security administrators to scan and monitor network ports on a system, server or IT environment.

What are Unified Threat Management(UTM) typically used for?

A unified threat management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features. UTM devices are often packaged as network security appliances that can help protect networks against combined security threats, including malware and attacks that simultaneously target separate parts of the network.

Which feature provides varying levels of network bandwidth based on the traffic type?

A. Fault Tolerance B. Traffic Shaping C. QoS D. Load Balancing Definition: Quality of Service (QoS) is a feature of routers and switches which prioritizes traffic so that more important traffic can pass first. The result is a performance improvement for critical network traffic. QoS equipment is useful with VoIP phones or in LANs with high volumes of local traffic.

Which topology is typically seen in a WAN environment where fault tolerance is a major concern and why?

A. Star B. Ring C. Bus D. Mesh -Because in a MESH topology, every device has a dedicated connection to every other device using a series of point-to-point connections. In the case of a WAN, a MESH topology connects each individual network to each other network in an intranetwork. This type is very expensive because of its redundant links(network failures), but it provides a high level of fault tolerance.

When Routing Information Protocol(RIP), Open Shortest Path First(OSPF), Border Gateway Protocol(BGP), and static routing is enabled on a router, which route will the router use to reach the destination network?

A. The route inserted by OSPF B. The route inserted by BGP C. The route inserted by RIP D. The route configured as a static route

What option is a method for providing physical security for a network?

A. The use of security badges B. The use of passwords C. The use of message digests D. The use of public keys

Which social engineering attack is typically considered the most dangerous?

A. Trojan Horse B. Dumpster Diving C. Social Engineering D. Physical Penetration Targeted hacker enters the organization and gains access to the computer system, or plugs up their laptop and gets into the organization's internal network.

To automatically propagate VLAN information to all switches on a LAN, what should you use?

A. VTP B. Link Aggregation C. STP D. 802.1q You should use VLAN Trunking Protocol(VTP), which is also known as 802.1q. VTP configuration will prevent the VLAN information from having to be manually configured on all of the switches. VTP allows two switches to share VLAN information.

What protocol is used to find the hardware address of a local device?

ARP

What is ad hoc mode?

Ad Hoc mode allows wireless computers to configured much more quickly than infrastructure mode. Ad Hoc wireless computers all participate in the same network. This means that the ad hoc wireless computers can access each other, but CANNOT access network resources on a LAN, WAN, or the internet. Cheaper and easier to set up, configure, and can provide better performance than infrastructure mode, but it is difficult to manage an ad hoc wireless network.

What is defined in an Acceptable Use Policy(AUP)?

An ACCEPTABLE USE POLICY(AUP) defines how users are allowed to employ company hardware. ex. Are employees allowed to store personal files on company owned computers?

What is an LC connector?

An LC is a type of fiber optic cable. They are HALF the size of other fiber-optic connectors, which make them great for use in small spaces like wiring closets.

Why should you review baselines periodically?

Baselines is an important tool in identifying abnormal behavior. Network traffic may change over a period of time. What "normal" traffic should be from what you observed over a previous time, can be compared to see if any spikes occur that might indicate abnormal behavior.

cd (Linux)

Change the working directory to a specified directory-Linux

172.16.0.0 - 172.31.255.255

Class B private address range

192.168.0.0 - 192.168.255.255

Class C Private IP Address Range

Near-End Crosstalk (NEXT)

Crosstalk at the same end of a cable from which the signal is being generated. Interference measured at the transmitting end.

Far-End Crosstalk (FEXT)

Crosstalk on the opposite end of a cable from the signal's source. Interference measured away from the transmitter.

What is Encapsulating Security Payload(ESP)?

ESP can be used with IPsec to encrypt IPsec packets. ESP works in tunnel mode and transport mode. ESP protects the packet's information using encryption.

What is Linux ifconfig

Equivalent to Windows ipconfig

What is the difference between a Denial of Service(DoS) and Distributed Denial of Service(DDoS)?

In DoS, a particular port or service is targeted by a single system. DoS is an attack on a computer system or network that causes loss of service to users. A DDoS the same process is accomplished, but with multiple computers that are referred to as botnets.

What is IPsec? And what is it used for?

Internet protocol security (IPsec) is a set of protocols that provides security for Internet Protocol. To encrypt application layer data. To provide security for routers sending routing data across the public internet. To provide authentication without encryption, like to authenticate that the data originates from a known sender. To protect network data by setting up circuits using IPsec tunneling in which all data is being sent between the two endpoints is encrypted, as with a Virtual Private Network(VPN) connection. IPsec is not a single protocol; rather, it's a complete suite of protocols and standards that work together to help ensure the confidentiality, integrity, and authentication of internet data packets flowing through a VPN tunnel.

What is the function of (Network Address Translation) NAT?

It enables private IP networks that use unregistered IP addresses to connect to the Internet. NAT operates on a route. Connects two networks together, and translates the private (not globally unique) addresses in the internal network into legal addresses, before packets are forwarded to another network.

What does it mean when it says a cable is rated "Plenum"?

It means it will not produce toxic gas when it burns.

Assign the OSI layer: A delivery truck has severed a cable in the warehouse.

Layer 1 Physical Layer

Assign the OSI layer: A switch is configured to segment traffic by VLAN

Layer 2 Data layer

Assign the OSI layer: The file server IP addresses is 192.168.33.2

Layer 3 Network layer.

Assign the OSI layer : A protocol analyzer captures tcp/443 traffic

Layer 4 Transport layer

In what OSI layer does DHCP reside?

Layer 7. Application Layer

Why is Logging important?

Logging is the process of collecting information that is used for monitoring and auditing process. Logging helps the administrator to detect vulnerable points in a network, specify changes that can enhance the system's security, log suspicious activity from a specific user or system, and identify a security breach.

Do routers use Spanning Tree Protocol(STP)?

NO. Switches and Bridges use it to prevent loops in a network when more than one path can be used.

what is nat

Network Address Translation (NAT) allows the private IP addresses defined in RFC 1918 to be used in a private network while still being able to communicate with the Internet.

What is NTP?

Network Time Protocol(NTP), a protocol for synchronizing time on computers. NTP enables the synchronization of computer clocks distributed across the network by ensuring accurate local timekeeping with reference to some particular time on the Internet. NTP communicates between clients and servers using the User Datagram Protocol on port No.123.

Is E1 and E3 used in the US?

No, they are used in Europe.

What is Port Address Translation (PAT)?

Port address translation (PAT) is a function that allows multiple users within a private network to make use of a minimal number of IP addresses. Its basic function is to share a single IP public address between multiple clients who need to use the Internet publicly. It is an extension of network address translation (NAT).

What is power over ethernet(PoE)?

Power over Ethernet (PoE) is a technology for wired Ethernet local area networks (LANs) that allows the electrical current necessary for the operation of each device to be carried by the data cables rather than by power cords. Allows a network switch to provide power to network-attached devices including video surveillance cameras, IP phones, and wireless access points(WAPs), through the wall jack that delivers a ethernet connection.

What is a protocol analyzer?

Protocol analyzers are the indispensable tools that your IT staff deploys on the network when it's not behaving properly. Network Analyzers, also known as Packet Sniffers. A Network Analyzer allows users to capture network packets as they flow within the enterprise network or Internet. Engineers usually make use of Network Analyzers to help uncover, diagnose and fix network problems, but they are also used by hackers to obtain access to sensitive information and user data.

What is an HTTP proxy server?

Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet.

Why might you want to have a redundant circuit in a event that a network segment is unavailable?

Redundant circuits or network redundancy can provide a back-up route if a NIC, cable, router, or switch fail. You can create a redundant circuit by installing a additional NIC in a computer and connecting the second NIC to a different port or another switch. Typically, network redundancy is achieved through the addition of alternate network paths, which are implemented through redundant standby routers and switches. When the primary path is unavailable, the alternate path can be instantly deployed to ensure minimal downtime and continuity of network services.

What does RIP stand for?

Routing Information Protocol RIP versions 1 and 2 both use HOP count as the primary metric to determine the most desirable network path. Using RIP, the hop count is limited to 15 hops. Any router beyond this number of hops is marked unreachable. DISTANCE VECTOR PROTOCOL.

A network administrator needs to make some configuration changes to an organization's core switches. Which of these protocols would MOST likely be used during this configuration change?

SSH(Secure Shell) tcp/22 is the encrypted console communication. TCP/23 looks and acts the same as Telnet.

Which type of internet connection has the highest latency?

Satellite Connection.

Port number for SMB

Server Message Block port 445

What does the "netstat" command do?

The "netstat" command shows you current connections using the TCP protocol. Netstat can be a helpful forensic tool when trying to determine what PROTOCOLS current TCP/IP and network connections are active on a computer and involved in networked communications.

What is Maximum Transmission Unit(MTU)?

The MTU is a setting that determines the largest packet size that can be transmitted through your system. These packets are measured in octets, or eight-bit bytes. The Transmission Control Protocol(TCP) determines the maximum packet transmission size based on your MTU settings. The MTU settings can be configured through your router's advanced configurations.

How is Crosstalk abbreviated?

XT

Which type of Virtual Local Area Network(VLAN) should you implement so that the switches are able to isolate 2 different traffic types?

You should implement a Protocol-based VLAN. With protocol-based VLAN membership, computers are assigned to VLANs by using the protocol that is in use and the Layer 3 address. For example, this method enables an Internetwork Packet Exchange (IPX) network or a particular Internet Protocol (IP) subnet to have its own VLAN.

If you implement 802.1q, what are you implementing?

You would be implementing VLAN trunking. VLAN trunking allows traffic from all VLAN to cross a single cable across two switches. It allows different switches to support the same VLAN using FRAME-TAGGING.

The link light on a NIC is constantly on instead of flickering, what can you conclude from this observation?

You would conclude the computer is causing a Broadcast Storm. A broadcast or data storm is excessive transmission of broadcast traffic in a network. This happens when a broadcast across a network results in even more responses, and each response results in still more responses, in a snowball effect. If network traffic reaches near 100% of the available bandwidth, all network traffic can be blocked. Broadcast storms are often caused by a defective network adapter or defective cabling, where the card or cable floods the network with packets.

What does the command nbtstat used for? And what is NETBIOS

nbtstat is a Windows-only command that can help solve problems with NetBIOS name resolution. In short, NetBIOS provides communication services on local networks. It uses a software protocol called NetBIOS Frames (NBF) that allows applications and computers on a local area network (LAN) to communicate with network hardware and to transmit data across the network.

What is phishing?

when a user receives an e-mail request that appears to be from a legitimate company in an attempt to trick the user into giving up personal information.


Ensembles d'études connexes

MAN4720 (Strategic Management) Exam 1- Chapters, 1, 2, & 3

View Set

Carbon Cycle Crossword- everything imp.

View Set

Leadership Test #1 (Ch 1-6 10th Edition + Kahoot)

View Set

Windows Chapter 5 Knowledge Check

View Set

Chapter 37: Assessment and Management of Patients With Allergic Disorders

View Set