A+
Ethernet over power can sometimes be used as an alternative to which networking implementation?
Wi-Fi
Which RAID level will result in data loss with the failure of only a single drive?
0
Repeaters and extenders operate at which layer of the OSI?
1
Which frequency does 802.11a operate?
5Ghz
DHCP Service Ports
67 and 68
Remote Assistance Port
3389
Minimum VRAM on graphics adapter for CAD/CAM?
128MB for 1360x768 true-color
What is a differation between 2.4Ghz and the 5ghz freq. bands?
2.4 Ghz is generally able to carry farther than 5ghz
Which port is used by SSH by default
22
Over which port would an outgoing email be sent?
25
Which cell service generation first introduced mobile internet access and features such as video calling?
3G
TCP Ports
49152, 65535
What is the max bandwidth of 802.11g?
54Mbps
What describes the process of devices such as WAPs reporting their usage and status information to a cloud-based management point?
Backhaul
Which hard drive attribute is not reported by SMART tech?
Fragmentation
A client request for a service over a particular port that creates a temporary rule to allow that port to remain open for return traffic is known as what process in a firewall?
Port triggering
Which devices would be best categorized as IoT devices?
Security System, Thermostat
ZigBee, Z-Wave, and RFID are low-power wireless technologies that transport data on ___ networks.
SmartHome
LDAP port number
TCP/UDP 389
The 2.4Ghz band is divided into how many channels when using Bluetooth devices?
79
Virtual Router
A virtual router is a networking device that routes data packets between network segments. Similar to how a VM is created, a virtual router exists entirely in software and functions to provide the same routing services as its physical counterpart. Virtual routers route traffic between network segments regardless of whether these are virtual or physical.
You need to encrypt and digitally sign the E-mails. Which of the following should you use?
S/MIME. Secure/Multipurpose Internet mail Extensions is used to encrypt and digitally sign E-mail.
Dig Command
The dig command as part of the reconnaissance process was successful because of two key reasons. The first reason is that the firewall is allowing TCP port 53. It is used for zone transfers and therefore it should be blocked.
hot-swappable
The feature of a component that allows it to be installed or removed without disrupting operations. (USB, SATA, FireWire) NOT IDE.
DNS port number
UDP/TCP 53
line-of-sight transmission
Wireless, not cable
Which channels are typically considered good candidates for a WI-fi device operating at 2.4ghz?
1,6,11
Requests originating from port 548 come from what system?
A Mac Client
Which application uses port 3389 by default?
A RDP Remote Desktop Connection
A patch-panel can best be thought of in which manner?
A centralized termination point for extensions of network cables.
Which option would you be asking for if the request was sent over port 53?
A name to IP address mapping.
Which application would be best suited to using NFC?
A payment System
Remote Desktop Protocol (RDP) and Remote Assistance Port
By default, port 3389 is used by the Remote Desktop Protocol (RDP) for Microsoft Remote Desktop and Remote Assistance.
Requests over port 445 could be described as using what protocols?
CIFS, SMB
Created a hypervisor server and created multiple VMs on it; the VMs are only to communicate with each other.
Create a virtual switch and connect the virtual machines to it.
A web-page requested over port 443, which prefix?
HTTPS
Difference between Hub and Bridge
Hubs come in Active and Passive varieties, Bridges do not. Hubs operate a Layer 1 of the OSI Model, bridges operate a Layer 2 Hubs send incoming data out over all other ports, bridges do not
802.11n offered improvements over earlier Wi-Fi implementations by primarily adding which features?
Increased signal intensity. More antennas.
What is a common connection issue with 802.11b that is not as prevalent with 802.11a?
Interferance
A SOHOs network router that includes ports for switching is known as what device?
Layer 3 Switch
What reasons can result in the 'Operating System Not found" error?
Missing Active Partition, Missing Master Boot Record (MBR)
Traffic originating over ports 161 and 162 would indicate what type of operation?
Monitoring a network device
On a Printer, if you do not set the paper guide to the correct paper size, what is most likely to happen?
The printed paper will come out creased.
Which characteristics of a cable modem distinguish it from other modems?
They are always on. They use cable TV lines.
Which characteristics of a switch can be advantageous to network deployment?
They improve network performance by regulating the flow of traffic. They increase network performance by reducing collisions.
What are some characteristics of routers?
They isolate networks from each other and do not forward broadcast packets. They connect multiple networks together. They operate at Layer 2 of the OSI Model
Which scenario would best equate to a full-duplex transmission?
Two people arguing with each other
You need to build an audio and video editing system. You need to be able to connect a digital keyboard to the system. Which two ports can be used?
USB/MIDI
What are valid reasons to choose 802.11n/ac over 802.11g?
Use of 5ghz frequencies incur less interference. Provdes larger channel bandwidths per user.
Which options are components of the SLP protocol?
User agents, Service Agents
Jitter
a QoS component described as resulting from variation of delays in a packet stream
SD cards can be formatted with which filesystems on a Mac?
exFAT, HFS Plus, APFS
You need to configure a new Cisco Router. You need to ensure that you properly connect teh router with the laptop and configure it. How?
use a DB-9 to RJ-45 to connect/configure. Routers cannot be configured with USB. and a new router will not have IP configs so you cant use telnet/ssh.
Capability introduced by 802.11ac?
using dual band signalling
Virtual Network Interface Card (NIC)
An entity that is created in software that allows a Virtual Machine (VM) to access the Ethernet network. It is configured just like its physical counterpart with an IP address, default gateway but exists entirely within the software. It is bridged with a physical NIC which places its frames on the wired network with a MAC address that is unique to the virtual NIC.
What should be replaced if the toner is not getting bonded to the paper in a laser printer?
Fuser (Bond=fuse)
Characteristics of IP addresses
It has two sections indicating the host address, and the network address. It is a logical address that can be changed.
The NetBIOS protocol would be best suited to which type of request?
Searching for a File on FileServer1
SSID
Service Set Identifier; Access point configuration setting aka 'network name'
End-user devices such as smart phones and tablets will typically connect to a SOHO network in which manner?
Wi-Fi
Which devices would most likely require PoE?
A security camera. A WiFi access point.
Which statements best describe the characteristics of the TCP protocol?
It's reliable, It uses acknowledgements
Your printer does not have a duplexer installed. However, when printing a document, you choose to print with duplex settings. What will be the outcome when you print the document?
The document will first print the odd number of pages and then the even number
Honeypot
A security tool used to lure attackers away from the actual network components. Also called a decoy or sacrificial lamb.
You need to install a performance intensive application on a laptop. you have been advised to use a laptop with a SSD instead of a HDD, what could be the reason?
SSD provides high performance and is more reliable.
What is the best option for resolution for an external monitor with dead pixels?
Replace the monitor
Wireless encryption method, better than no security, but not particularly secure.
WEP
What are disadvantages of cable modem service that were not an issue with DSL service?
Cable modem users may have been on the same LAN, DSL users were not. Cable modems used shared bandwidth and did not always offer the speeds advertised.
Configuring a NIC to receive an IP address automatically informs the system to use which network service?
DHCP
You want to perform passive reconnaissance in your organization and test out the security controls. You want to perform a passive DNS assessment and want to know the details of the organization's DNS servers. Which method would help you achieve your goal?
Execute a WHOIS query. WHOIS is a passive method where the target is not involved and the information is retrieved without connecting with the target. When you run a WHOIS query, the target domain is not interacted with. If the domain information is publicly available, then you will be able to retrieve the information including the DNS server names.