Network+ Guide to Networks, Exam 3 (ch 9-12) study guide, CIT 45
What Is Port Mirroring, and what does it accomplish?
Allows an administrator to configure the switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch. Enables in/outbound traffic from switch ports to be duplicated at the mirrored port
An RFID label on a box is an example of what type of physical security detection method?
Asset tracking tagging
This type of attack prevents legitimate users from accessing normal network resources.
DoS attack (Denial of service)
What type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
DoS attack (Denial of service)
How often should you require users to change their passwords?
Every 60 days
When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
Expedited forwarding
The day after Patch Tuesday
Exploit Wednesday
Enforcing a virtual security perimeter using a client's geographic location is known by what term?
Geofencing
A differential backup covers what data on a system?
It includes data that has changed since the last full backup.
What is the Nmap utility used for?
It is a port scanning utility that can identify open ports on a host.
In a public switched telephone network, what portion of the network is known as the local loop?
It is the portion that connects any residence or business to the nearest central office.
A network TAP serves what purpose on a network?
It provides a mirrored port for monitoring traffic between other ports.
What is it called when a device handles electrical signals improperly, usually resulting from a bad NIC?
Jabber
By default, Active Directory is configured to use this security protocol
Kerberos
This type of attack relies on redirected and captured secure transmissions as they occur.
Man in the middle attack
This utility performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers.
Nessus
Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?
OC-3 (optical carrier 3)
Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?
Online UPS (uninterruptible power supply)
This standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding
PEAP standard (protected extensible authentication protocol)
Packets that are smaller than a medium's minimum packet size.
Runts
Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?
SDSL (symmetric digital subscriber line)
Which Layer 1 WAN technology is used to traverse multiple ISP networks, connecting these networks to the Internet backbone?
SONET (Synchronous Optical Network)
Over a long-distance connection, this is more secure than using passwords.
SSH keys
On a Linux based system, what command can you use to create a hash of a file using SHA-256?
Sha254sum
Which protocol designed to replace STP operates at Layer 3 of the OSI model?
Shortest Path Bridging (SPB)
What type of virtual circuit allows connections to be established when parties need to transmit?
Switched Virtual Circuit (SVC)
How would you configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports?
Use the switchport port-security command to enable MAC filtering.
Most satellites circle the Earth in which level of Orbit?
geosynchronous orbit
What are some advantages of network attached storage devices?
improved efficiency, improved flexibility, centralized storage, simplified management, scalability, high availability, security, low cost, ease of deployment
What does a Stateless Firewall accomplish?
manages each incoming packet as a stand-alone entity, without regard to currently active connections.
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
mean time between failures (MTBF)
If A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, what kind of social engineering tactic is this?
tailgating
At what point is a packet considered to be a giant?
when it exceeds the medium's maximum packet size.
How many channels does a single T1 circuit carry?
24
How many transponders are contained within a typical satellite?
24 to 32
The C-Band utilized by satellites consists of what frequency range?
3.4-6.7 GHz
When using DOCSIS 3.0, what is the minimum number of channels that can be used?
4
What is the maximum throughput of a DS3 connection?
44,736
What is the size of an ATM cell, including the header?
53 bytes
Class of Service utilizes how many levels of priority?
8 levels of priority and modifies the PCP field in an 802.1Q tag.
What IEEE standard includes an encryption key generation and management scheme known as TKIP?
802.11i
A highly available server is available what percentage of the time?
99.99%
A momentary decrease in voltage
Brownout (aka sag)
The grouping of multiple servers so that they appear as a single device to the rest of the Network
Clustering
When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
Comcast was interjecting TCP segments with the RST (reset) field set.
In a cellular network, where does each wireless base station connect to?
a mobile switching center.
What is an Object Identifier?
a unique key for each record in the database, not just in a table
What kind of firewall can block designated types of traffic based on application data contained within packets?
content-filtering firewall
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
acceptable use policy document
What does File Integrity Monitoring do?
alerts the system of any changes made to files that shouldn't change
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
distributed reflection denial-of-service attack (DRDoS)
In planning for disaster recovery, what is the ultimate goal?
ensure business continuity
What is a SIEM (Security Information and Event Management) system utilized for?
evaluate data from security devices and generate alerts.