Net+ part 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The number of useful bits delivered from sender to receiver within a specified amount of time.

Goodput

What is the advantage of SU/MU MIMO?

Both of these technologies allowed for a faster rate of data transmission

This occurs when there are so many broadcast messages on a network that they approach or exceed the network bandwidth.

Broadcast storm

This attack affects broadcast traffic that renders the normal network communications impossible

Broadcast storms

What type of cable do you use to connect two switches through their uplink ports or to connect two switches through regular ports

Crossover cable

This type of IDS detection looks for patterns in network traffic and compares them to known signatures.

Signature-based detection

This method is used to send IPv4 traffic through an IPv6 network by encapsulating IPv4 packets within IPv6 packets

4to6

This method is used to send IPv6 traffic through an IPv4 network

6to4

This 802.11 standard operates at 5Ghz frequency with 54 Mbps throughput with a length of 100 feet

802.11a

This 802.11 standard can operate at both 2.4 and 5 Ghz frequencies with 6.8 Gbps throughput

802.11ae

Which wireless standard introduced MUMIMO

802.11ae

This 802.11 standard is the newest one to-date (2023) with a 1.2 Gbps per stream

802.11ax

This 802.11 standard operates at 2.4 Ghz frequency with 11 Mbps throughput, a downgrade from the previously released standard, but can travel 50 feet further (150 feet)

802.11b

This 802.11 standard is an update to the 2.4 Ghz frequency and trasmits data at 54 Mpbs

802.11g

This 802.11 standard is known as the breakthrough in wireless standards, with 600 Mbps throughput and a 300 feet range.

802.11n

Which wireless standard introduced SUMIMO

802.11n

Which wireless standard introduced channel bonding?

802.11n

What do hosts on a private network share when using NAT?

A physical IP address

Are you more likely to use a UTM on a start up or a major company?

A start up company because of convenience. cheaper prices and still providing good service

What is another word for UTM?

All-in-one appliances

This type of IDS detection first defines a baseline of normal network traffic and then monitors it. It looks for anything that falls outside that baseline

Anonamly-based detection

This tool verifies that the cable can carry a signal from one end to the other and that all wires are in their correct positions

Cable tester

This tool verifies or validates that a cable or an installation meets the requirements for a specific architectural implementation

Certifier

This wireless technology method utilizes non-overlapping channels, putting them together to increase data rates

Channel bonding

You want to create a loopback plug using a single RJ45 connector. How should you connect the wires in the connector?

Connect pin 1 to pin 3 and pin 2 to pin 6.

You want to create a rollover cable using a single RJ45 connector. How shouldyou connect the wires in the connector?

Connect pin 1 to pin 8 and pin 2 to pin 7.

You want to create a rollover cable that has an RJ45 connector on both ends. How should you connect the wires within the connectors?

Connect pin 1 to pin 8, pin 2 to pin 7, pin 3 to pin 6, and pin 4 to pin 5.

This type of cable uses the T568A standard on one end and the T568B standard on the other end

Crossover cable

During the name resolution process, where does the computer look if there is no match in the HOSTS file?

DNS Server

What causes a broadcast storm?

DOS attacks or switching loops

Specifies the number of clients that can utilize the wireless network.

Device density

Why are SNMPv1 and v2 insecure?

Didn't use passwords Used a community name for authentcation Used cleartext

This type of antenna focuses its radiation pattern in a very specific direction

Directional antenna

True or false Nslookup is a linux command used to perform manual DNS lookups

False It's a windows command used to perform manual DNS lookups

True or false SDSL (Symmetric Digital Subscriber Line) requires a splitter

False SDSL, unlike ADSL, does not include voice traffic on its line, meaning it does not require a splitter

True or false Network-based IDS can scan the contents of encrypted traffic as it flows on your network

False Since the packets are encrypted this is to ensure only the recipient can read them. You would need a host-based IDS in order to scan contents of encrypted traffic

True or false The wider the beam is with a directional antenna, the longer the range can be

False The narrower the beam is, the longer the range is capable of being

True or false 802.11g is backwards compatible with 802.11a

False This is because 802.11g operates at a different frequency that 802.11a (which operates at 5Ghz)

True or false You can use the "userdel" utility to lock a user account

False This utility would delete the user account, there is no option for locking it

True or false Connecting each pin to the same pin on the other end creates a crossover cable

False This would create a straight through cable

This organization is responsible for allocating IP addresses used on the internet.

IANA (Internet Assigned Numbers Authority)

What company developed the 802.11 standards?

IEEE

This organization is responsible for networking standards for technologies such as Ethernet and wireless networking.

IEEE (Institute of Electrical and Electronical Engineers)

This organization is responsible for setting standards on the internet. For example, it has defined the standards for NAT as well as other protocols.

IETF (Internet Engineering Task Force)

This protocol provides IPv6 communication over a private IPv4 network

ISATAP

What can you do to mitigate a broadcast storm?

Implement Spanning Tree Protocol Implement built-in storm protection Use VLANS for segmentation

Where is the first place a computer looks at during the name resolution process?

In the HOSTS file

Used by Cisco wireless equipment to route frames back and forth between the wireless network and the wired LAN.

LWAPP

Defines and organizes perameters that agents monitor and manage on their devices. The SNMP manager uses this to determine what data to gather from the agents. Each variable has a unique variable (OID)

MIB (Management information Base)

This wireless technology method utilizes beam forming, allowing data to be sent to multiple devices in seperate data streams at the same time

MUMIMO (Multi-user MIMO)

This tool measures a device's electrical properties, including voltage, amps, and resistance

Multimeter

This type of antenna radiates and absorbs signals in all directions of the antenna

Omnidirectional antenna

This occurs when a cut in the wire prevents the original signal from reaching the end of the wire. The signal completely stops.

Open circuit

Filtering through log information with a software in hopes of finding a specific piece of data (similar to filtering but more advanced)

Parsing

PPTP

Point-to-point tunneling protocol, one of the first VPN protocols and is no longer secure

Provides copies of packets from a selected port for monitoring and analysis

Port mirroring

What does an all-in-one appliance do for your network?

Recudes need to manage multiple security devices

A protocol that eliminates looping in network traffic.

Roaming

What type of cable do you use to connect a workstation to a switch's or routers console port

Rollover cable

This protocol is desgined to help monitor network devices and provide alarms for when something goes wrong (manage complex networks)

SNMP

Software applications that are installed on hardware that you want to monitor (such as servers or switches) Monitors and reports events that happen to the SNMP manager

SNMP Agent

Responsible for collecting data from network hosts (aggregates info & displays an overview of the current status of the network)

SNMP Manager

This wireless technology method uses additional antennas added onto a router, allowing data to be sent to multiple devices in seperate data streams

SUMIMO (Single-User MIMO)

What is a disadvantage of SUMIMO?

SUMIMO can only trasnfer data to each device one at a time, increases latency

This type of attack is an attack where a small amount of information, data, or valuables are taken over a period of time. The result is to construct or obtain data or property of great value

Salami

This occurs when electrical signals take a path other than the intended path. Can be caused by worn wire jackets, crushed wires that touch each other, or a pierced wire that touches metal.

Short circuits

This attack spoofs the source address in ICMP packets and sends the ICMP packets to an amplification network (bounce site). The bounce site responds to the victim's site with thousands of messages that he or she did not send

Smurf

What type of cable do you use to connect the uplink port on one switch to a regular port on another switch

Straight-through cable

This term describes multiple smaller subnets are combined into a single larger subnet. Performed by taking the default subnet mask and making it smaller

Supernetting

What process is descrbied below? The default subnet mask uses 24 bits (255.255.255.0). The mask is altered to use only 23 bits (255.255.254.0) in order to combine multiple subnets together

Supernetting

This tool uses two devices to trace the end of a wire from a known endpoint onto the termination point in the wiring closet

Toner probe

This tunneling method establishes a tunnel between individual IPv6 hosts so that they can communicate through a private or public IPv4 network

Toredo tunneling

After you've configured your SNMP agent with thresholds, if those thresholds are exceeded this type of message will be sent to the SNMP manager. Goes over port 162

Traps

True or false An omnidirectional antenna disperses its waves in a 360 degree circle from the antenna

True

True or false By creating a VLAN, you create multiple broadcast domains

True

True or false Dig is a linux command used to perform manual DNS lookups

True

True or false When a host using a VLAN sends a packet and goes through a switch, then a second switch to reach the destination, the second switch removes the VLAN ID before forwarding it to the destination

True

True or false When you connect pin 1 to pin 3 and pin 2 to pin 6 you are creating a cross over cable

True

True or false You can use the "passwd" utility to lock a user account

True

True or false 802.11g is backwards compatible with 802.11b

True This is because 802.11g is an upgrade to the 2.4 Ghz frequency, which is what 802.11b utilizes

What time standard does NTP follow?

UTC

UTM

Unified Threat Management

Automatically partitions a single broadcast domain into multiple VLANs.

VLAN pooling

This device establishes remote access VPNS

VPN Concentrator

What is the wiring order for the T568A standard?

White/green, green, white/orange, blue, white/blue, orange, white/brown, brown

What is the wiring order for the T568B standard?

White/orange, orange, white/green, blue, white/blue, green, white/brown, brown

Connects two wired networks over a Wi-Fi network.

Wireless bridge


Ensembles d'études connexes

oceanography chapter 4 mastering questions

View Set

Year 11 Economics Demand - Luxury and Inferior Goods

View Set

AP Psychology - Chapter 2 - I think

View Set

Medical Review: Part 2 Questions

View Set