Network+ N10-008 Practice Exam 1 by Jason Dion on Udemy

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Physical hardware ------------------------------------------ Bare metal environment = is a type of virtualization environment in which the virtualization hypervisor is directly installed and executed from the hardware. It eliminates the need for a host operating system by directly interfacing with the underlying hardware to accomplish virtual machine specific processes. A bare metal environment may also be called a tier-1 environment

What is the lowest layer (bottom layer) of a bare-metal virtualization environment? - Hypervisor - Host operating system - Physical hardware - Guest operating system

Port security

11. You are working as a network admin and are worried about the possibility of an insider threat. You want to enable a security feature that would remember the Layer 2 address first connected to a particular switch port to prevent someone from unplugging a workstation from the switch port and connecting their laptop to that same switch port. Which of the following security features would BEST accomplish this goal? Port security NAC (network access control) 802.1x ACL 9 (access control list)

Ring

12. You are trying to select the best network topology for a new network based on the following requirements: The design must include redundancy using a minimum of two cables to create the network. The network should not be prone to congestion, therefore each device must wait for its turn to communicate on the network by passing around a token. Which of the following topologies would best meet the clients requirements? Ring Bus Mesh Star

A successful WPS attack has occurred ---------------------------- Wi-Fi Protected Setup (WPS) allows users to configure a wireless network without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering short personal id number (PIN). WPS is fairly easy to hack and unknown devices can then connect to your network without permission. ARP poisoning/Spoofing consists of abusing the weaknesses in ARP to corrupt the MAC-to-IP mappings of other devices in the network. This would not affect the # of devices connected to the access point, though, only the switching of their traffic once they connect. Botnet is a collection of internet-connected devices infected by malware that allows hackers to control them.

13. A home user reports to a network tech that the internet is slow when they attempt to use their smartphone or laptop with their wifi network. The network admin logs into the admin area of the users access points and discovers that multiple unknown devices are connected to it. What is most likely the cause of this issue. The user is experiencing ARP poisoning The user is connected to a botnet A successful WPS attack has occurred

802.11g --------------------------------------------- 802.11a • One of the original 802.11 wireless standards - October 1999 • Operates in the 5 GHz range • 54 megabits per second (Mbit/s) • Smaller range than 802.11b - Higher frequency is absorbed by objects in the way - Many rules-of-thumb calculate 1/3rd the range of 802.11b or 802.11g • Not commonly seen today 802.11b • Also an original 802.11 standard - October 1999 • Operates in the 2.4 GHz range • 11 megabits per second (Mbit/s) • Better range than 802.11a - Less absorption problems • More frequency conflict - Baby monitors, cordless phones, microwave ovens, Bluetooth • Not commonly seen today 802.11g • An "upgrade" to 802.11b - June 2003 • Operates in the 2.4 GHz range • 54 megabits per second (Mbit/s) - Same as 802.11a • Backwards-compatible with 802.11b • Same 2.4 GHz frequency conflict problems as 802.11b ----------------------------------------------------------- 802.11n (Wi-Fi 4) • The update to 802.11g, 802.11b, and 802.11a - October 2009 • Operates at 5 GHz and/or 2.4 GHz - 40 MHz channel widths • 600 megabits per second (Mbit/s) - 40 MHz mode and 4 antennas • 802.11n uses MIMO - Multiple-input multiple-output - Multiple transmit and receive antennas ----------------------------------------------------------- 802.11ac (Wi-Fi 5) • Approved in January 2014 - Significant improvements over 802.11n • Operates in the 5 GHz band - Less crowded, more frequencies (up to 160 MHz channel bandwidth) • Increased channel bonding - Larger bandwidth usage • Denser signaling modulation - Faster data transfers • Eight MU-MIMO streams - Twice as many streams as 802.11n - Nearly 7 gigabits per second -------------------------------------------------------- 802.11ax (Wi-Fi 6) • Approved in February 2021 - The successor to 802.11ac/Wi-Fi 5 • Operates at 5 GHz and/or 2.4 GHz - 20, 40, 80, and 160 MHz channel widths • 1,201 megabits per second per channel - A relatively small increase in throughput - Eight bi-directional MU-MIMO streams • Orthogonal frequency-division multiple access (OFDMA) - Works similar to cellular communication - Improves high-density installations

15. A client has asked you to provide their local office with the best solution for a wireless network based on their requirements. The client has stated that their users will need a wireless network that provides a maximum of 54 Mbps of bandwidth and operates in the 2.4 GHz frequency band. Which of the following wireless network types should you install to meet their needs? 802.11g 802.11b 802.11a 802.11ac

A notice of a legal hold -------------------------------------- enables the parties to inspect books, documents, and other physical records in the possession of the other. A legal hold = process that an organization used to preserve all forms of relevant info when litigation is reasonably anticipated. The process of discovery = formal process of exchanging info between the parties about the witnesses and evidence they will present at trial

47. An offsite tape backup discovery facility is involved with a forensic investigation. The facility has been told they cannot recycle their outdated tapes until the conclusion of the investigation. Which of the following is the most likely reason for this? - A notice of a legal hold - A data transport request - The process of discovery - A chain of custody breach

WPA Personal = This mode is appropriate for most home networks. When a password is set on a wireless router or an access point (AP), it must be entered by users when connecting to the Wi-Fi network. -------------------------------- WPA2 Enterprise would need an authentication server? WEP: Wired Equivalent Privacy security protocol provided security for wireless enterprises by encrypting data so that it was protected during transmission between endpoints. WEP used secret keys to encrypt data moving between the AP and receiving stations. Unfortunately, a decade ago, researchers discovered a flaw in WEP that allowed packet eavesdropping to recover the encryption key. Once developed into an exploit, software running on any off-the-shelf laptop could crack WEP in a matter of minutes. Inevitably, WEP was replaced in 2003 by the Wi-Fi Protected Access (WPA) security protocol and security certification program. MAC filtering allows you to block traffic coming from certain known machines or devices.

17. The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server. What encryption type should be implemented? WPA2 Enterprise MAC filtering WEP WPA Personal

Flash the latest firmware for her router ---------------------------------------------- Routers can be updated by conducting a firmware flash. This is similar to upgrading or patching your computers operating system or even updating a device driver. By flashing the firmware, it can provide the ability to communicate with a newer device and remove known software vulnerabilities from the device.

18. Lynne is a home user who would like to share music throughout the computers in her house using an external USB hard drive connected to a router that she purchased over a year ago. The manufacturer states that the router can recognize drives up to 4TB in size, but she cannot get her 3TB hard drive to show up on the network. Which of the following should Lynne do to solve this issue? - Flash the latest firmware for her router - Download a new music player on her computers - Load the latest hardware drivers for her USB drive - Install the latest OS on her computers

Port forwarding

19. A network tech must allow HTTP traffic from the internet over port 80 to an internal server running HTTP over port 81. Which of the following is this an example of? - Static NAT - Port forwarding - Dynamic NAT - Dynamic DNS

route ------------------------------------ Jumpbox = A hardened server/machine that provides access to other hosts/ for segregating administrator access. A jump box is simply a system, usually a single operating system, that is connected to two networks. The first of these networks is the common network and the second is the sensitive security zone. ----------------------------------

20. Rick is configuring a Windows computer to act as a jumpbox on his network. He implements static routing to control the networks and systems the jumpbox communicates with. Which of the following commands did he use to configure this on the Windows machine? - route - tracert - nslookup - ip

Deploy the patch in a lab environment to quickly conduct testing, get approval for an emergency change, and then immediately install it in the production environment

22. A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime? - Deploy the patch in a lab environment to quickly conduct testing, get approval for an emergency change, and then immediately install it in the production environment - Configure endpoints to automatically download and install the patches - Test the patch in a lab environment and then install it in the production network during the next scheduled maintenance - Download and install all patches in the production network during the next scheduled maintenance period

Rapid elasticity ----------------------------- Resource pooling = Cloud computing services to multiple customers that are hosted on shared physical resources and dynamically allocated to meet customer demand. Rapid elasticity = computing resources can be rapidly provisioned, increased, or decreased to meet changing user demand Metered Services = This is a pay-as-you-go model. You pay for the services as you use them. A number of cell phone companies use this model. Measured Service = When a cloud computing vendor offers services that are metered for billing purposes or to ensure transparency between vendors and customers.

23. What type of services can allow you to get more storage and more resources added to the cloud as fast as possible? - Measured services - Resource pooling - Rapid elasticity - Metered services

Modulation -------------------------------- Orthogonal Frequency Division Multiplexing (OFDM) = is a form of modulation that provides some significant advantages for data links. QAM (quadrature amplitude modulation)? QAM (quadrature amplitude modulation) is a method of combining two amplitude modulation (AM) signals into a single channel. Quadrature Phase Shift Keying (QPSK) is a form of Phase Shift Keying in which two bits are modulated at once, selecting one of four possible carrier phase shifts (0, 90, 180, or 270 degrees) Modulation = The process by which data/information is converted into electrical/digital signals for transferring that signal over a medium

24. Which type of wireless technology are OFDM, QAM, and QPSK examples of? - Frequency - RF interference - Modulation - Spectrum

Analyze packet captures ---------------------------------------------------- packet captures contain every packet that is sent and received by the network. By using a program like Wireshark to analyze the packet captures, you can see what kind of info and metadata is contained within the packets. By conducting this type of packet analysis, an attacker (or cyber security analyst) can determine if the software versions are being sent as part of the packets and their associated metadata. Metadata means "data about data". Metadata is defined as the data providing information about one or more aspects of the data; it is used to summarize basic information about data that can make tracking and working with specific data easier. Software versioning is the process of numbering different releases of a particular software program for both internal use and release designation. It allows programmers to know when changes have been made and track changes enforced in the software. At the same time, it enables potential customers to be acquainted with new releases and recognize the updated versions.

39. A sys admin wants to verify that external IP addresses cannot collect software versioning from servers on the network. Which of the following should the sys admin do to confirm the network is protected? - Analyze packet captures - Use Nmap to query known ports - Review the ID3 logs on the network - Utilize netstat to locate active connections

Assign the interface 802.1q tag to its own VLAN --------------------------- FDX is Full Duplex 1000Base-t is Gigabit Ethernet The WAN interface (eth 1/1) is currently untagged and is being assigned to the default VLAN (VLAN1). If there are numerous devices in the default VLAN, the VLAN may be overloaded or oversubscribed leading to a reduction in the network performance. To solve this issue, you would assign the WAN Interface to a VLAN with less traffic or to its own VLAN. By adding an 802.1q tag (VLAN tag) to the interface, you can assign it to its own individual VLAN and eliminate potential overloading or over-subscription issues. The interface is already set to full duplex (fdx) The configuration shows the interface is already using GigabitEthernet Physical layeris working properly and a link is established, as shown by the output "GigabitEthernet 1/1 is up",

25. An admin has configured a new 250 Mbps WAN circuit, but bandwidth speed test shows poor performance when downloading larger files. The download initially reaches close to 250 Mbps but begins to drop and show spikes in the download speeds over time. The admin checks the interface on the router and sees the following: DIONRTR01# show interface eth 1/1 GigabitEthernet 1/1 is up, line is up Hardware is GigabitEthernet, address is 000F.33CC.F13A Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx Member of L2 VLAN 1, port is untagged, port state is forwarding. Which of the following actions should be taken to improve the network performance for this WAN connection? 1. Replace eth1/1 with a 1000Base-T transceiver 2. Shutdown and then re-enable this interface 3. Configure the interface to use full-duplex 4. Assign the interface 802.1q tag to its own VLAN

192.168.0.120 --------------------------------------- Work: Memorize magic # subnetting /29: - Magic number is 8 - 123/8 = 15.375 - 15 x 8 = 120 orrr 32 total bits - 29 = 3 - 2^0 = 1 - 2^1 = 2 - 2^2 = 4 - 1x2x4 = 8 - 123/8 = 15.375 - 15x8 = 120

26. What is the network ID associated with the host located at 192.168.0.123/29? 192.168.0.64 192.168.0.112 192.168.0.120 192.168.0.96

GPS location geo-ip -------------------------------------- Geo IP = refers to the method of locating a computer terminal's geographic location by identifying that terminal's IP address.

28. Which of the following technologies could be used to ensure that users who log in to a network are physically in the same building as the network they are attempting to authenticate on? (SELECT TWO) - GPS location -NAC - Port security - Geo-IP

Add a redundant power supply to the server -------------------------------------------- In the world of power supplies a redundant system is simply an electrical system that has been designed to feature two or more of the same power supply.

32. The UPS that provides backup power to your server is malfunctioning because its internal battery has died. To replace the battery, you must shut down the server, unplug it from the UPS, and unplug the UPS from its power source (the wall outlet). You perform these actions but think that there has to be a better way to increase the servers availability in the future. Which of the following recommendations would best increase the servers availability based on your experience with this UPS battery replacement? - Replace the UPS with a generator - Install a surge protector instead - Install a second UPS in the rack - Add a redundant power supply to the server

Downgrade the server and defer the new feature testing

35. A network admin updated an internet server to evaluate some new features in the current release. W week after the update, the internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet. Which of the following should the admin do to mitigate this risk? - Utilize WAF to restrict malicious activity to the Internet server - Downgrade the server and defer the new feature testing - Enable the host-based firewall on the Internet server - Enable HIPS to protect the server until the patch is released

RPO ---------------------- • Recovery time objective (RTO) - Get up and running quickly - Get back to a particular service level -max tolerable time to restore an organization's information system following a disaster, • Recovery point objective (RPO) - How much data loss is acceptable? - Bring the system back online; how far back does data go? • Mean time to repair (MTTR) - Time required to fix the issue • Mean time between failures (MTBF) - Predict the time between outages

36. Which of the following terms represents the maximum amount of data, as measured in time, that an organization is willing to lose during an outage? MTTR MTBF RTO RPO

Session Hijacking ? ----------------------------------------------------------- ARP spoofing = More commonly known as ARP poisoning, is a Man in the Middle (MitM) attack. This involves the MAC address of the data being faked, allowing attackers to intercept communication between network devices. On-path Attack = Formerly known as man in the middle where the attacker redirects the victims traffic without there knowledge. Session Hijacking = attack consists of the exploitation of the web session control mechanism, which is normally managed for a session token Amplified DNS attacks = Distributed Denial of Service (DDoS) attack in which the attacker exploits vulnerabilities in domain name system (DNS) servers to turn initially small queries into much larger payloads, which are used to bring down the victim's servers.

38. What is a common technique used by malicious individuals to perform an on-path attack on a wireless network? - Session hijacking - ARP spoofing - Amplified DNS attacks

802.11ac -------------------------------- - 802.11a > 5GHz - 802.11b > 2.4GHz - 802.11g > 2.4 GHz - 802.11n > 5 GHz / 2.4 GHz - 802.11ac > 5 GHz - 802.11ax > 5 GHz / 2.4 GHz

45. Your company is currently using a 5GHz wireless sec. system, so your boss has asked you to install a 2.4 GHz wireless network to use for the companys computer network to prevent interference. Which of the following can not be installed to provide a 2.4 GHz wireless network? - 802.11b - 802.11n - 802.11ac - 802.11g

Network diagrams

48. Jason is a network manager leading a project to deploy a SAN. He is working with the vendor's support tech to set up and configure the SAN on the enterprise network. To begin SAN I/O optimization, what should Jason provide to the vendor support tech? - Baseline documents - Access to the data center - Network diagrams - Asset management document

BGP ------------------------------ - If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available. BGP is a standardized exterior gateway protocol designed to exchange routing and reachability info between autonomous systems (AS) on the internet. Often classified as a path vector protocol but is sometimes also classed as a distance vector routing protocol. OSPF is a link-state routing protocol. Its an IGP, therefore it will not help to be able to reroute the organization's WAN connections. The VRRP is a computer networking protocol that provides for automatic assignment of available internet Protocol routers to participating hosts. VRRP is used for your internal clients and will not affect the routing of traffic between WANs or AS. VRRP (Virtual Router Redundancy Protocol) = is an open standard protocol, which is used to provide redundancy in a network. It is a network layer protocol (protocol number-112). The number of routers (group members) in a group acts as a virtual logical router which will be the default gateway of all the local hosts. If one router goes down, one of the other group members can take place for responsibility for forwarding the traffic. Border Gateway Protocol (BGP) = is the routing protocol for the Internet. Much like the post office processing mail, BGP picks the most efficient routes for delivering Internet traffic. Load balancer = is the process of distributing traffic among multiple servers to improve a service or application's performance and reliability.

52. Your company wants to create highly available datacenters. Which of the following will allow the company to continue maintaining an internet presence at all sites if the WAN connection at their site goes down? - Load balancer - VRRP - OSPF - BGP

De-encapsulation

54. Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model? De-encapsulation Tagging Encapsulation Tunneling

C:\windows\system32> nbtstat -R ---------------------------------- Since this is a Windows based network, the client is likely attempting to connect to the servers using NetBIOS. NetBIOS stores a local cached name table in the LMHOSTS file on each client. If the entry in the client file is pointing to the wrong IP, this could cause the connectivity issues described. Therefore, the system admin should enter the "nbstat -R" command to purge and reload the cached name table from the LMHOST file on their Windows workstation. The nslookup command is used to query the domain name system (DNS) to obtain info about hosts addresses, mail exchanges, nameservers, and related info. The nslookup command has an interactive and non-interactive mode The ipconfig command is used in Window's devices to display the current TCP/IP network configuration and refresh the DHCP and DNS settings on a given host. The route command is used to create, view, or modify manual entries in the network routing tables of a computer or server.

56. A system admin is troubleshooting an issue remotely accessing a new Windows server on the local area network using its hostname. He cannot remotely access the new server, but he can access another Windows server using its hostname on the same subnet. Which of the following command should he enter on his workstation to resolve this connectivity? C:\windows\system32> ns lookup C:\windows\system32> ipconfig /flushdns C:\windows\system32> route print C:\windows\system32> nbtstat -R

---------------------------------- Split horizon is a method used by distance vector protocols to prevent network routing loops. The basic principle is simple: Never send routing information back in the direction from which it was received.

58. A technician just completed a new external website and set up an access control list in the firewall. After some testing, only users outside the internal network can access the site. The website responds to a ping from the internal network and resolves the proper public access. What can the tech do to fix this issue while causing internal users to route to the website using its internal IP address? Configure the firewall to support dynamic NAT Implement a split-horizon or split-view DNS Place the server in a screened subnet or DMZ Adjust the ACL on the firewalls internal interface

-The switchport is configured for 802.1q trunking ------------------------------------- IF the switchport is configured for 802.1q trunking instead of as an access host port, the workstation will be unable to reach the DHCP server through the port and will fall back using an APIPA address. APIPA is not configured on the VLAN's switch, it is configured by defualt on a client and server devices, such as the workstation in this scenario. Most likely cause is the switchport was configured as a trunking port instead of an access port.

6. A workstation is connected to the network and receives an APIPA address but cannot reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet can communicate with the VLAN gateway and access websites on the internet. Which of the following is most likely the source of this connectivity problem? -The workstations NIC has a bad SFP module -APIPA has been misconfigured on the VLANs switch -The switchport is configured for 802.1q trunking -. The workstations 's OS updates have not been installed

Fiber to ethernet

60. You have been asked to install a media converter that connects a newly installed SMF to the existing Cat 6a infrastructure. Which type of media converter should you use? Fiber to ethernet Fiber to coaxial' Coaxial to fiber Coaxial to ethernet

Analog modem

61. Which of the following is most likely to use an RJ-11 to connect to a computer to an ISP using a POTS line? Analog modem Access point DOCSIS modem Multilayer switch

Firewall

7. Dion Training is trying to connect two geographically dispersed offices using a VPN connection. You have been asked to configure their networks to allow VPN traffic into the network. Which device should you configure first? Modem Switch Router Firewall

Physical network diagram ------------------ Physical network diagrams show all the physical assets inside buildings, floors, and rooms. Whether the devices are inside a telecom room, data center room, or office space rooms, think of it as though you are seeing a bird's eye view of your floor. With these diagrams, you can visualize how everything is connected — from ports of a device, cables going to and from ports, the racks/cabinets, and the equipment inside the rack, such as patch panels and servers, and all of the cabling inside the racks too. A logical network diagram describes how information flows through a network. Logical diagrams typically show subnets (including VLAN IDs, masks, and addresses), routers, firewalls, and its routing protocols. A wireless site survey is a physical survey of the premises where the wireless network will be installed. A site survey report helps visualize the wireless network coverage areas and data rates. A wiring diagram is a simplified conventional pictorial representation of an electrical circuit. It shows the components of the circuit as simplified shapes, and the power and signal connections between the devices.

70. Which of the following types of network documentation would provide a drawing of the network cabling imposed over the floorplan for an office building? Logical network diagram Site survey report Physical network diagram Wiring diagram

WEP (Wired Equivalent Privacy)

73. WEP (Wired Equivalent Privacy) is the oldest and most common Wi-Fi security protocol A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.

They are commonly used on a SAN

76. What is true concerning jumbo frames? They are commonly used with NAS Their MTU size is less than 1500 They are commonly used with DHCP They are commonly used on a SAN

Shared secret key is mismatched ------------------------------ - AAA refers to Authentication, Authorization and Accounting. - RADIUS, or Remote Authentication Dial-In User Service, is a network protocol that is commonly used to authenticate and authorize users attempting to connect to embedded routers, modem servers, software, and wireless apps Group Policy is a feature of Windows that facilitates a wide variety of advanced settings that network administrators can use to control the working environment of users and computer accounts in Active Directory. It essentially provides a centralized place for administrators to manage and configure operating systems, applications, and users' settings.

77. A tech has finished configuring AAA on a network device. However, the tech cannot log into the device with LDAP creds but can with a local user account. What is most likely the reason for this problem? Shared secret key is mismatched IDS is blocking RADIUS Username is misspelled in the device configuration file Group policy has not propagated to the device

MIMO -------------------------- Lightweight Access Point Protocol (LWAPP) is the name of a protocol that can control multiple Wi-Fi wireless access points at once. This can reduce the amount of time spent on configuring, monitoring or troubleshooting a large network

78. ... Which of the following technologies allows an 802.11n or 802.11ac network to achieve a speed greater than 54 Mbps? WPA2 PoE MIMO LWAPP

show config --------------------------- Show config = used on a Cisco networking device to display the device's current configuration. This would show whether or not the DHCP snooping was enabled on this device. Show interface = ... displays the statistics for a given network interface Show route = displays the current state of the routing table for a given network device Show diagnostic = displays details about the hardware and software on each node in a networked device

8. You just started work as a network technician. You have been asked to check if the DHCP snooping has been enabled on one of the network devices. Which of the following commands should you enter within the command line interface? show interface show config show diagnostic show route

3 ------------------ Level 0 is most severe and level 7 is least severe Level 0 - emergency /severe condition Level 3 - error condition Level 7 - debugging and useful info

80. Which of the following levels would an error condition generate? 1 5 3 7

UTM --------------------------- Unified threat management (UTM) refers to when multiple security features or services are combined into a single device within your network. Using UTM, your network's users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more.

83. Which of the following technologies combines the functionality of a firewall, malware scanner,. and other sec. appliances into one device? IDS IPS UTM Syslog

Private ---------------------------------- Teredo tunneling: - relates to IPv6

88. Andy is preparing to configure a company's network. He has installed a firewall to segment his network into an internal network, a DMZ or screen subnet, and an external network. No hosts on the internal network should be directly accessible by their IP address from the internet, but they should be able to reach remote networks if they have been assigned an IP address within the network. Which of the following IP addressing solutions work for this particular network configuration? APIPA Private Classless Teredo tunneling

Client-server

89. Which of the following type of network models requires the use of specializes the use of specialized computers that utilize networking operating systems to provide services to other networked devices that request services from them over an enterprise network? Client-server Point-to-point Peer-to-peer Hub-and-spoke

Deny all traffic from eth2 to eth0

9. A tech is configuring a computer lab for the students. The computers need to be able to communicate with each other on the internal network, but students using the computers should not be able to access the internet. The current network architecture is segmented using a triple-homed firewall to create the following zones: ZONE INTERAFE, INTERFACE, IP ADDRESS: PUBLIC, eth0, 66.13.24.16/30 INSTRUCTORS, eth1, 172.16.1.1/24 STUDENTS, eth2, 192.168.1.1/24 What rule on the firewall should the tech configure to prevent students from accessing the internet? Deny all traffic from eth2 to eth1 Deny all traffic from eth0 to eth2 Deny all traffic from eth1 to eth0 Deny all traffic from eth2 to eth0

Hypervisor

A _________, also known as a virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). A _______allows one host computer to support multiple guest VMs by virtually sharing its resources, such as memory and processing.

Jumpbox

A hardened server that provides access to other hosts. A _____ can provide remote access to the LAN and even to the devices on a LAN. It then acts as a mini gateway on the LAN and allows you to access the LAN and then 'jump' via SSH or other services to other connected devices on that LAN. When set up and configured, it's a secure entry point that gives authorized users access and ultimately can get the primary gateway diagnosed and working again. Allows access to endpoints on remote LAN when you are located on a local LAN. Jumpbox features can be embedded into expensive network appliances like VPNs and routers. Or they can be on an inexpensive Raspberry Pi, OpenWRT router like a GL iNet Mango, or other micro board. Either way, they provide valuable endpoint access options when you need the feature.

Uninterruptible Power Supply (UPS)

A is a device that allows a computer to keep running for at least a short time when incoming power is interrupted.

ipconfig /release I ipconfig /renew

A network technician determines that two dynamically assigned workstations have duplicate IP addresses. What command should the tech use to correct this issue? - ipconfig /all - ipconfig /release I ipconfig /renew - ipconfig /dhcp - ipconfig /renew

BGP (Border Gateway Protocol)

Border Gateway Protocol (BGP) is the routing protocol for the Internet. Much like the post office processing mail, BGP picks the most efficient routes for delivering Internet traffic.

Extensible Authentication Protocol (EAP)

EAP is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection. EAP authentication is initiated by the server (authenticator), whereas many other authentication protocols are initiated by the client (peer). The EAP authentication exchange proceeds as follows: 1) The authenticator (the server) sends a Request to authenticate the peer (the client). 2) The peer sends a Response packet in reply to a valid Request. 3) The authenticator sends an additional Request packet, and the peer replies with a Response. The sequence of Requests and Responses continues as long as needed. EAP is a 'lock step' protocol, so that other than the initial Request, a new Request cannot be sent prior to receiving a valid Response. 4) The conversation continues until the authenticator cannot authenticate the peer (unacceptable Responses to one or more Requests), in which case the authenticator implementation MUST transmit an EAP Failure (Code 4). Alternatively, the authentication conversation can continue until the authenticator determines that successful authentication has occurred, in which case the authenticator MUST transmit an EAP Success (Code 3).

CSMA/CD

Short for carrier sense multiple access with collision detection. It is the method for multiple hosts to communicate on an Ethernet.

DHCP snooping

Switch process that monitors DHCP traffic, filtering out DHCP messages from untrusted sources. Typically used to block attacks that use a rogue DHCP server.

WPA2

WPA2 (Wi-Fi Protected Access 2) is the second generation of the Wi-Fi Protected Access wireless security protocol. Like its predecessor, WPA2 was designed to secure and protect Wi-Fi networks. WPA2 ensures that data sent or received over your wireless network is encrypted, and only people with your network password have access to it. A benefit of the WPA2 system was that it introduced the Advanced Encryption System (AES) to replace the more vulnerable TKIP system used in the original WPA protocol. Used by the US government to protect classified data, AES provides strong encryption. Unfortunately, like it's predecessor, WPA2-enabled access points (usually routers) are vulnerable to attacks through WEP. To eliminate this attack vector, disable WEP and, if possible, make sure your router's firmware doesn't rely on WEP.

7 ?

Which of the following levels would a debugging condition generate? - 6 - 1 - 0 - 7

DMZ (demilitarized zone)

____ is a perimeter network that protects and adds an extra layer of security to an organization's internal local-area network from untrusted traffic. A ___ network provides a buffer between the internet and an organization's private network. The ____ is isolated by a security gateway, such as a firewall, that filters traffic between the _____ and a LAN. The default _____ server is protected by another security gateway that filters traffic coming in from external networks.

Point-to-Point Protocol (PPP)

_____ is a TCP/IP protocol that is used to connect one computer system to another.

UTM (Unified Threat Management)

_____ refers to when multiple security features or services are combined into a single device within your network. Using _____, your network's users are protected with several different features, including antivirus, content filtering, email and web filtering, anti-spam, and more.

Ediscovery (electronic discovery)

refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry


Ensembles d'études connexes

Computer Science 306: Computer Architecture Ch. 9

View Set

CH1: binary system and hexadecimal

View Set

Combo with Last but not least and 1 other

View Set