quizes networking
CCMP
Which protocol replaced TKIP for WPA2?
TCP
Which protocol's header would a layer 4 device read and process?
ToR switch
Which type of switch connects all devices in a rack to the rest of the network?
Wireshark
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server?
Offers access to multiple OSs in VMs
What is one advantage offered by VDI over RDS and VNC?
1500 bytes
What is the Internet standard MTU?
cat 6a
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?
2h - 2 = Z
What is the formula for determining the number of possible hosts on a network?
port 161
What port do SNMP agents listen on?
Gateway of last resort
When a router can't determine a path to a message's destination, where does it send the message?
Load Balancer
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?
Voice gateway
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?
DHCP server
Which device would allow an attacker to make network clients use an illegitimate default gateway?
Integrity
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
MT-RJ
Which fiber connector contains two strands of fiber in each ferrule?
To increase the number of networking devices on a network
Which of the following is not a good reason to segment a network?
administration
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Z-wave
Which of the following wireless technologies does not use the 2.4 GHz band?
cat 5e, cat 6a, cat 7
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
LTE-A
Which of these cellular technologies offers the fastest speeds?
SFTP
Which remote file access protocol is an extension of SSH?
Cold site
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
white/green
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
Network documentation is easier to manage.
What do well-chosen subnets accomplish?
Checksum
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
DiffServ
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
MAC address
What information does the switchport port-security command use to restrict access to a switch's interface?
Signature
What information in a transmitted message might an IDS use to identify network threats?
Layer 3
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
static route
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
TDMA
What method does a GSM network use to separate data on a channel?
Hypervisor
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?
DOCSIS
What specifications define the standards for cable broadband?
Deauth Attack
What type of attack relies on spoofing?
rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
HTTPS
In the client-server model, what is the primary secure protocol used for communication between a browser and web server?
fail-open
In the event of a fire, the most appropriate failure policy is a _______ policy.
Logic Bomb
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
the fourth one
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
Audit log
Which log type is used to prove who did what and when?
Red team-blue team exercise and Pen testing
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Implicit deny
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Seperation of Duties
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Patch cable
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Trunk
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
SNMP Get Next
What command requests the next record in an SNMP log?
255
What decimal number corresponds to the binary number 11111111 (eight ones)?
LDAP
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
AD
A routing protocol's reliability and priority are rated by what measurement?
NDA
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
802.11ax
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
Dynamic Vlan assignment
Which assignment technique requires a RADIUS server?
Insider threat
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Star
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
EF
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?
8 bits
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?
smartjack
What kind of device can monitor a connection at the demarc but cannot interpret data?
Default gateway
What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?
BGP
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?
Bandwidth
Which transmission characteristic is never fully achieved?
SSL and TLS
Which two encryption protocols might be used to provide secure transmissions for email services?
ICMP and ARP
Which two protocols manage neighbor discovery processes on IPv4 networks?
DRDoS
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
Evil Twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
SQL
You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?
Smart locker
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
arp -a
You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?
Zenmap, Command Prompt, PowerShell
You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.
Posture assesment
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Virtual Switch
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?
How long devices like this one will last on average until the next failure
When shopping for a new router, what does the MTBF tell you?
ipconfig /release
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
Orchestration
Which cloud management technique executes a series of tasks in a workflow?
STDM (statistical time division multiplexing
Which kind of multiplexing assigns slots to nodes according to priority and need?
access-list acl_2 permit https any
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Ngnix
Which of the following applications could be used to run a website from a server?
Switches, KVM switch, Routers
Which of the following devices are you likely to find in the MDF?
2^h and 256 - the interesr octet
Which formulas can be used to calculate the magic number?
Application data
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Speed
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
RDP
Which of the following is an application layer protocol?
SSH
Which of the following is considered a secure protocol?
hostname
Which of these commands has no parameters in Windows?
IR
Which one of the following wireless transmission types requires a clear LOS to function?
the OUI
Which part of a MAC address is unique to each manufacturer?
Tone locater
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Rogue AP
You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?
MX record
The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server
Passive twin axial cable
Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?
PaaS
Which cloud service model gives software developers access to multiple platforms for testing code?
Encryption
Which function of WPA/WPA2 security ensures data cannot be read in transit?
NEXT
Which kind of crosstalk occurs between wire pairs near the source of the signal?
Fiber type mismatch
What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Rack ears
If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?
Online UPS
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
FE80::/64
When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?
peer-to-peer
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?
Network Layer
At which OSI layer does IP operate?
24 bits
How many bits of a class A IP address are used for host information?
Phishing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
RSSI
As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?
Identify the problem
As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?
Layer 7
At what layer of the OSI model do proxy servers operate?
All devices on your local network
Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?
CSMA/CA
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
Primary DNS server
Which DNS server offers the most current resolution to a DNS query?
802.1Q
Which IEEE standard determines how VLANs work on a network?
Networking layer
Which OSI layer is responsible for directing data from one LAN to another?
Selective repeat sliding window
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?
The cloud provider
Who is responsible for the security of hardware on which a public cloud runs?
Traffic shaping
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?