Term
Card # 1
Both an SSL VPN and VPN use 1 to 2 and 3 data. |
|
Definition
Both an SSL VPN and VPN use tunneling to encapsulate and encrypt data. |
|
|
Term
Card # 2
Gateways connect incompatible systems by 1, and then 2, and finally 3. |
|
Definition
Gateways connect incompatible systems by taking an incoming packet, stripping off the lower-level encapsulation of the original protocol, and re-encapsulating the packet with a new protocol. |
|
|
Term
Card # 3
What Standard describes power over ethernet |
|
Definition
|
|
Term
Card # 4
A Straight through cable is also known as a |
|
Definition
|
|
Term
Card # 5
MPLS is a 1 of 2 that uses 3 on any combination of 4 and 5 6 |
|
Definition
MPLS is a framework of networking functions that uses labels on any combination of layer 2 and layer 3 headers |
|
|
Term
Card # 6
In MPLS the routers does what as opposed to doing what |
|
Definition
In MPLS, the router reads the label and forwards the packet to its neighbor as opposed to performing a network address lookup in its routing table. |
|
|
Term
Card # 7
MPLS can travel over 1, 2, or 3 which are each at layer ? of the osi models, the labels created by MPLS are read and rewritten at layer ? |
|
Definition
MPLS can travel over PPP, ATM or Frame Relay which are each at layer 2 of the OSI model, the labels created by MPLS are read and rewritten at layer 3. |
|
|
Term
Card # 8
The ? DNS record type maps an IP address to the host name for the purpose of reverse lookup. |
|
Definition
The PTR DNS record type maps an IP address to the host name for the purpose of reverse lookup. |
|
|
Term
Card # 9
The ? DNS record type maps multiple canonical names (aliases) to an A record. |
|
Definition
The CNAME DNS record type maps multiple canonical names (aliases) to an A record. |
|
|
Term
Card # 10
The ? DNS record maps a host name to its IP address using a 128-bit IPv6 address. |
|
Definition
The AAAA DNS record maps a host name to its IP address using a 128-bit IPv6 address. |
|
|
Term
Card # 11
The ? DNS record maps a domain name to an email server list. |
|
Definition
The MX DNS record maps a domain name to an email server list. |
|
|
Term
Card # 12
a computer system monitor tool used to collect and show operating system storage input and output statistics. |
|
Definition
|
|
Term
Card # 13
five interior gateway protocols are |
|
Definition
RIP, OSPF, EIGRP, IS-IS, IGRP |
|
|
Term
Card # 14
? IS THE PROTOCOL WINDOWS SYSTEMS USE TO BROWSE OTHER SYSTEMS AND SHARED RESOURCES |
|
Definition
|
|
Term
Card # 15
Ethernet based LANs using thick cable for inter-connection is referred as ?.While ethernet systems using thinner coaxial cable is referred as ?. |
|
Definition
Ethernet based LANs using thick cable for inter-connection is referred as Thicknet.While ethernet systems using thinner coaxial cable is referred as Thinnet. |
|
|
Term
Card # 16
The AUI (attachment unit interface) is the 1 between a 2 and an 3. I think it is only used for 4 |
|
Definition
The AUI (attachment unit interface) is the 15-pin physical connector interface between a computer's network interface card (NIC) and an Ethernet cable. I think it's only used with coax |
|
|
Term
Card # 17
A multimeter, also known as a 1, is an 2 that takes 3 such as 4, 5 or 6.. |
|
Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance. |
|
|
Term
|
Definition
A standard for securing networks by implementing EAP as the authentication protocol over either a wired or wireless Ethernet LAN, rather than the more traditional implementation of EAP over PPP. |
|
|
Term
|
Definition
An IEEE standard used to address the need for MAC-sub-layer addressing in bridges. |
|
|
Term
|
Definition
An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media. |
|
|
Term
Card # 21
802.3af standard |
|
Definition
An IEEE standard used to describe Power over Ethernet (PoE) technology. |
|
|
Term
Card # 22
Also known as 1, network diagrams provide 2 and 3 for 4. |
|
Definition
Also known as network maps, network diagrams provide location and routing information for network devices. |
|
|
Term
Card # 23
Cut-through switching is an operating mode in which the switch does what? |
|
Definition
Cut-through switching is an operating mode in which the switch forwards a data packet as soon as it receives it, without performing any error checking or packet processing. |
|
|
Term
Card # 24
A multilayer switch operates at Layers ? and ? of the OSI model. 3 are sometimes considered to be another type of multilayer switch, but the term “multilayer switch” generally refers to switches that do what? |
|
Definition
A multilayer switch operates at Layers 2 and 3 of the OSI model. Content switches are sometimes considered to be another type of multilayer switch, but the term “multilayer switch” generally refers to switches that perform only limited routing functions at Layers 2 and 3. |
|
|
Term
Card # 25
what is the definition of a wirelss tester? What is another name for it? |
|
Definition
A wireless tester, or a WiFi analyzer, is a Wi-Fi spectrum analyzer used to detect devices and points of interference, as well as analyze and troubleshoot network issues on a WLAN or other wireless networks. Like network analyzers, wireless testers give an overview of the health of a WLAN in one central location, enabling technicians to troubleshoot problems efficiently. |
|
|
Term
Card # 26
Site to Site vpn definition and characteristics |
|
Definition
a VPN connection model is implemented such that each node on the network is connected to a remote network that may be separated by public or other unsecured networks |
|
|
Term
Card # 27
the route print command is used to do what? |
|
Definition
Display the routing table entries |
|
|
Term
Card # 28
the route add command is used to do what? |
|
Definition
|
|
Term
Card # 29
the route delete command is used to do what? |
|
Definition
|
|
Term
Card # 30
the route change command is used to do what? |
|
Definition
|
|
Term
Card # 31
the route -p command is used to do what? |
|
Definition
make the specified route persistent across reboots, when used in conjunction with the add command |
|
|
Term
Card # 32
the route -f command is used to do what? |
|
Definition
clear a routing table of all entries |
|
|
Term
Card # 33
Frame Relay is a |
|
Definition
Wide Area Network (WAN) protocol that allows transmission of data over a shared network medium and bandwidth using virtual circuits. |
|
|
Term
Card # 34
Multiprotocol Label Switching (MPLS) is a |
|
Definition
framework of networking functions that uses labels on any combination of Layer 2 and Layer 3 headers. |
|
|
Term
Card # 35
Asynchronous Transfer Mode (ATM) is a |
|
Definition
cell-switching network technology. Unlike frame relay, it can guarantee QoS for a particular virtual channel |
|
|
Term
Card # 36
definition of attenuation |
|
Definition
Attenuation is a general term that refers to any reduction in the strength of a signal. Attenuation occurs with any type of signal, whether digital or analog. Sometimes called loss, attenuation is a natural consequence of signal transmission over long distances. |
|
|
Term
Card # 37
TACACS+ is considered more secure and more scalable than RADIUS because it |
|
Definition
accepts login requests and authenticates the access credentials of the user. |
|
|
Term
Card # 38
A persistent agent is a |
|
Definition
piece of software that installs on the client device, and can respond continuously to queries from the NAC about the device’s health. It stays on the device until uninstalled. |
|
|
Term
Card # 39
A non-persistent agent, also known as a ?, is one that |
|
Definition
A non-persistent agent, also known as a dissolvable agent, is one that is installed on demand and then removed after it is used. The agent installs, responds to NAC queries to check the health of the device, authenticates the device, and then disappears when the session is over. |
|
|
Term
Card # 40
what are the seven stages of the network+ troubleshooting model |
|
Definition
1. Identify the problem.
2. Establish a theory of probable cause.
This stage includes:
3. Test the theory to determine the cause.
4. Establish a plan of action to resolve the problem, while identifying the potential effects of your plan.
5. Implement the solution, or escalate the issue.
6. Verify full system functionality and, if applicable, implement preventative measures.
7. Document your findings, actions, and the outcomes. |
|
|
Term
Card # 41
what are the substeps of step #1 in the network+ troubleshooting model |
|
Definition
1. Identify the problem.
This stage includes:
Gathering information
Duplicating the problem, if possible
Questioning users to gain experiential information Identifying the symptoms
Determining if anything has changed
Approaching multiple problems individually |
|
|
Term
Card # 42
what are the two substeps in step #2 in the network+ troubleshoointg model |
|
Definition
Questioning the obvious
Considering multiple approaches, such as examining the OSI model from top to bottom and bottom to top and dividing and conquering |
|
|
Term
Card # 43
what are the two substeps in step #3 in the network+ troubleshoointg model |
|
Definition
a. When the theory is confirmed, determine the next steps to resolve the problem.
b. If the theory is not confirmed, establish a new theory or escalate the issue |
|
|
Term
Card # 44
A multimeter, also known as a 1, is an electronic measuring instrument that takes 3 such as 4, 5, & 6, |
|
Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance. |
|
|
Term
Card # 45
A protocol analyzer, aka as a 1, can examine packets from protocols that operate in which four layers? |
|
Definition
1 - network analyzer, Physical, Data Link, Network, and Transport layers of the OSI model. |
|
|
Term
Card # 46
The split horizon method is where |
|
Definition
a router does not include any routes to the router from which it discovered its own location in its broadcasts. |
|
|
Term
Card # 47
568C defines the standards for 1. It recognizes 2 as a 3. It also defines the 4 for both 5 & 6. In addition, it specifies the7. |
|
Definition
568C defines the standards for commercial building cabling. It recognizes CAT6a as a media type. It also defines the minimum bend radius for both shielded and unshielded twisted pair cables. In addition, it specifies the maximum untwist value for CAT6a cable termination. |
|
|
Term
Card # 48
blank is fast ethernet. |
|
Definition
100Base-TX is Fast Ethernet |
|
|
Term
Card # 49
what is meant by contention based medium. |
|
Definition
Contention-based medium means that bandwidth is impacted by the number of nodes within the group. If a lot of people are using the Internet at the same time, speed is usually affected |
|
|
Term
Card # 50
A biconic connector is a |
|
Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings. |
|
|
Term
Card # 51
A subminiature (SMA) connector is similar to a 1 connector and is typically used where ? |
|
Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector. |
|
|
Term
Card # 52
A VPN concentrator is a device that 1 to 2. VPN concentrators are usually 3 or 4. They offer 5, 6 & 7. |
|
Definition
VPN concentrator is a device that
1 - incorporates advanced encryption and authentication methods to
2 - handle a large number of VPN tunnels.
VPN concentrators are usually
3 - specifically geared towards secure remote access or
4 - site-to-site VPNs.
They offer 5 - high performance, 6 - high availability, and 7 - very good scalability. |
|
|
Term
Card # 53
Access VPNs are used to 1 to 2 through 3 such as 4 , 5, or 6. |
|
Definition
Access VPNs are used to (1) provide tunneling services to (2) individual users through (3) common subscriber lines such as (4) cable, (5) dial-up, or (6) ISDN. |
|
|
Term
Card # 54
Extranet VPNs connect ?????? that ?????? for ??????. |
|
Definition
Extranet VPNs connect networks that belong to different companies for the purposes of sharing resources. |
|
|
Term
Card # 55
TACACS is capable of providing process-wide encryption for ??????, not just ??????. TACACS uses ?????? instead of ?????? and supports ??????. |
|
Definition
TACACS is capable of providing process-wide encryption for authentication, not just password encryption. TACACS uses TCP instead of UDP and supports multiple protocols. |
|
|
Term
Card # 56
Network controller: definition |
|
Definition
A Network Controller is a hardware component that helps connect a computer to a network. In other words it's a NIC. |
|
|
Term
Card # 57
Terminal Access Controller Access Control System (TACACS) and TACACS Plus (TACACS+) are (1) that provide (2) and (3) for (4). |
|
Definition
Terminal Access Controller Access Control System (TACACS) and TACACS Plus (TACACS+) are authentication protocols that provide centralized authentication and authorization services for remote users. |
|
|
Term
Card # 58 What functionality does a Remote Access Service (RAS) server provide?
Traffic metering and Quality of Service (QoS) services
Stateful packet inspection services
Standardized and centralized authentication services
Client virtual private network (VPN) connection and traffic routing services |
|
Definition
the correct answer is Client virtual private network (VPN) connection and traffic routing services.
A RAS server is a combination dial-up and VPN server that can accept multiple client connections. It can also terminate client VPN tunnels and route client traffic into the private network. |
|
|
Term
Card # 59
TACACS+, which is (closed/open) standard, uses TCP port 1 and also supports 2.
TACACS+ is considered 3 & 4 than RADIUS because it 5 & 6.
TACACS+ is not compatible with TACACS because it uses an 7. |
|
Definition
TACACS+, which is open standard, uses TCP port 49 and also supports multifactor authentication.
TACACS+ is considered more secure and more scalable than RADIUS because it accepts login requests and authenticates the access credentials of the user.
TACACS+ is not compatible with TACACS because it uses an advanced version of the TACACS algorithm. |
|
|
Term
Card # 60
A RAS server is a combination (1) and (2) that can (3). It can also (4) and (5) into (6). |
|
Definition
A RAS server is a combination (1) dial-up and (2) VPN server that can that can (3) accept multiple client connections. It can also (4) terminate client VPN tunnels and (5) route client traffic into (6) the private network. |
|
|
Term
Card # 61
Cut-through switching definition |
|
Definition
an operating mode in which the switch forwards a data packet as soon as it receives it, without performing any error checking or packet processing. |
|
|
Term
Card # 62
Content switches are capable of (1) by (2), and understand (3) and (4). |
|
Definition
Content switches are (1) capable of making intelligent decisions about data by (2) analyzing data packets in real time, and understand (3) the criticality and (4) type of the request. |
|
|
Term
Card # 63
A multilayer switch operates at (1) of (2). Content switches are sometimes considered to be another type of (3), but the term (4) generally refers to switches that perform only (5) at (6). |
|
Definition
A multilayer switch operates at (1) Layers 2 and 3 of (2) the OSI model. Content switches are sometimes considered to be another type of (3) multilayer switch, but the term (4) “multilayer switch” generally refers to switches that perform only (5) limited routing functions at (6) Layers 2 and 3. |
|
|
Term
Card # 64
A managed switch is simply a switch that can be (1), and does not relate specifically to a switch that (2). |
|
Definition
A managed switch is simply a switch that can be configured by the user, and does not relate specifically to a switch that operates at Layers 4 through 7. |
|
|
Term
Card # 65
IPSec in 1 is often used with 2. IPSec uses 3 or 4 to provide 5. |
|
Definition
IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP). IPSec uses DES or 3DES encryption to provide data confidentiality. |
|
|
Term
Card # 66
What is the MPPE encryption method? |
|
Definition
A method of encrypting data transferred across Point-to-Point Protocol (PPP)-based dial-up connections or Point-to-Point Tunneling Protocol (PPTP) virtual private network (VPN) connections. |
|
|
Term
Card # 67
3 characteristics of the MPPE encryption method. It is often used with ??? It requires the use of ??? or ??? It uses ??? for ??? |
|
Definition
It is often used with Point-to-Point Tunneling Protocol (PPTP). It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2. It uses Extensible Authentication Protocol (EAP) remote authentication. |
|
|
Term
Card # 68
In most VPNs, data encryption is accomplished by either ??? or ???. |
|
Definition
|
|
Term
Card # 69
Which type of router is designed to collect data from end-user locations and redistribute them to an enterprise location such as a company's headquarters? Dual-band routers Access routers Distribution routers Core routers |
|
Definition
|
|
Term
Card # 70
Distribution routers (1) from (2) and (3). Their capabilities are (4) those of regular access routers. |
|
Definition
Distribution routers (1) collect data from (2) multiple access routers and (3) redistribute them to an enterprise location. Their capabilities are (4) greater than those of regular access routers. |
|
|
Term
Card # 71
Access routers are (1) that are (2). |
|
Definition
Access routers are (1) common inexpensive routers that are (2) generally located at customer sites. |
|
|
Term
Card # 72
Core routers are (1) that are located at (2). They connect multiple (3) located (4). |
|
Definition
Core routers are (1) powerful routers that are located at (2) the center of network backbones. They connect multiple (3) distribution routers located (4) in different buildings. |
|
|
Term
Card # 73 Which type of virtual private network (VPN) connection model is implemented such that each node on the network is connected to a remote network that may be separated by public or other unsecured networks?
Host-to-host
Client-to-site
Host-to-site
Site-to-site |
|
Definition
|
|
Term
Card # 74
In store-and-forward switching, the switch (1) and (2). This is the (3) type of switching mode, since the switch must (4). |
|
Definition
In store-and-forward switching, the switch (1) and (2). This is the (3) type of switching mode, since the switch must (4). |
|
|
Term
Card # 75
A ??? would be useful for managing credentials and authenticating users. |
|
Definition
|
|
Term
Card # 76
A domain controller would be useful for |
|
Definition
managing credentials and authenticating users. |
|
|
Term
Card # 77
An IDS monitors the (1) for (2) and (3). The goal is to (4). |
|
Definition
An IDS monitors the (1) security infrastructure for (2) signs of attacks in progress and (3) automates the intrusion detection process. The goal is to (4) alert administrators to possible security threats. |
|
|
Term
Card # 78
The Citrix ICA protocol is a (1) used by (2) and (3) as an add-on to (4). |
|
Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services. |
|
|
Term
Card # 79
Current X Window systems are based on the (1) and normally used on (2) to (3). |
|
Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications. |
|
|
Term
Card # 80 What is the term used for a website that becomes unavailable due to a sudden increase in popularity resulting from, for example, a hot news story?
Accidental Distributed Denial of Service (DDoS)
Network Time Protocol (NTP) vandalism
Unintentional Denial of Service (DoS)
Advanced Persistent Denial of Service (DoS) |
|
Definition
An unintentional DoS is one that is the result of a sudden, unexpected, non-malicious traffic spike that effectively mimics an intentional DoS attack. A Friendly DOS attack is a situation where a website ends up denied because of a sudden enormous spike in popularity. This can happen when an extremely popular website posts a prominent link to a second, less well-prepared site, for example, as part of a news story. |
|
|
Term
Card # 81
An attack is the |
|
Definition
the act of exploiting vulnerability on a system, a service, or a network. |
|
|
Term
|
Definition
a potential cause of an incident that may result in harm to systems and the organization. |
|
|
Term
Card # 83
What does the third stage of the CompTIA Network+ Troubleshooting model require you to do? |
|
Definition
It requires you to test your theories. |
|
|
Term
Card # 84
What does the third stage of the CompTIA Network+ Troubleshooting model state |
|
Definition
The third stage states: Test the theory to determine the cause. By testing your theory, you confirm it, revise it, or escalate the issue. |
|
|
Term
Card # 85
Why is SNMP an unsecure protocol? |
|
Definition
SNMP is an unsecure protocol because its authentication is passed in cleartext. |
|
|
Term
Card # 86
What are the fifth, sixth, and seventh stages of the CompTIA Network+ Troubleshooting model? |
|
Definition
Implement, verify, document The fifth, sixth, and seventh stages, in order, are: implement, verify, document |
|
|
Term
Card # 87
At which layer of the TCP/IP protocol stack does IP filtering operate? |
|
Definition
Layer 2 IP filtering operates mainly at Layer 2 of the TCP/IP protocol stack and is generally performed by a screening router, although other network devices can also perform IP filtering. |
|
|
Term
Card # 88
Which method hardens the security on the network to allow only clients with specific IP or Media Access Control (MAC) addresses to have access to the network? |
|
Definition
Dynamic Host Configuration Protocol (DHCP) snooping DHCP snooping uses information from the DHCP server to track the physical location of hosts, ensure that hosts only use the IP addresses assigned to them, and ensure that only authorized DHCP servers are accessible. |
|
|
Term
Card # 89
Enterprise mode Wi-Fi Protected Access II (WPA2) uses what authentication type and a unique encryption key for every client when they log on to the network? |
|
Definition
|
|
Term
Card # 90
802.1x definition |
|
Definition
A standard for securing networks by implementing EAP as the authentication protocol over either a wired or wireless Ethernet LAN, rather than the more traditional implementation of EAP over PPP. |
|
|
Term
Card # 91
802.2 definition |
|
Definition
An IEEE standard used to address the need for MAC-sub-layer addressing in bridges. |
|
|
Term
Card # 92
802.3 definition |
|
Definition
An IEEE standard used to standardize Ethernet and expand it to include a wide range of cable media. |
|
|
Term
Card # 93
802.3af definition |
|
Definition
An IEEE standard used to describe Power over Ethernet (PoE) technology. |
|
|
Term
Card # 94
Identify the second step in the basic forensic process. |
|
Definition
The second step is to secure the area to preserve the scene of the incident. |
|
|
Term
Card # 95
In a (1) connection model, each node on the network is connected to a remote network, which may be separated by public or other unsecured networks. (1) VPNs may be either open or closed. |
|
Definition
In a site-to-site connection model, each node on the network is connected to a remote network, which may be separated by public or other unsecured networks. Site-to-site VPNs may be either open or closed. |
|
|
Term
Card # 96
What is the definition of an ad hoc network. |
|
Definition
An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. |
|
|
Term
Card # 97
how is the flow of messages coordinated in an ad hoc network |
|
Definition
Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other |
|
|
Term
Card # 98
the pathping command provides information about what two things? |
|
Definition
latency and packet loss on a network and it very likely provides other useful services and information too |
|
|
Term
Card # 99
What is the value of pathping for network troubleshooting? |
|
Definition
It can isolate a router or subnet with latency issues. The pathping command’s value is in its capability of identifying routers or subnets with latency problems by displaying packet loss data. |
|
|
Term
Card # 100
Which device would you use to determine whether a cable meets specific International organization for Standardization (ISO) or Telecommunications Industry Association (TIA) standards? |
|
Definition
Certification Tester . You would use a certification tester to check the cable for adherence to ISO or TIA standards. |
|
|
Term
Card # 101
How can you prevent banner grabbing to increase your overall security? |
|
Definition
Configure services to drop banner requests. |
|
|
Term
Card # 102
banner grabbing is one of the easiest ways to do what |
|
Definition
fingerprint an OS or an application/service |
|
|
Term
Card # 103
To troubleshoot Terminal Access Controller Access Control System (TACACS) sessions, which utility should you turn to for assistance? |
|
Definition
|
|
Term
Card # 104
Identify a quick test for Domain Name System (DNS) connectivity. |
|
Definition
Perform an nslookup using a system’s or a site’s name. Perform an nslookup using a site’s name or system’s name. If you get a positive response, then DNS is working. If you receive an error, but are successful using the IP address, you have a DNS server problem. |
|
|
Term
Card # 105
If you think that you have interface errors on a router, which command would you use to check for errors that are currently occurring on the interface? |
|
Definition
|
|
Term
Card # 106
The router command show interface will |
|
Definition
show you what’s going on at the time you issue the command and allow you to check for errors that are currently occurring on the interface |
|
|
Term
Card # 107
What protocol enables multiple routers on a LAN to work together sharing a single virtual IP address? |
|
Definition
Virtual Router Redundancy Protocol (VRRP) A virtual router is a software-based routing framework that enables the host computer to act as a hardware router over a LAN. The VRRP advertises a virtual router as the default gateway, which is backed by a group of physical routers that provide redundancy in case one fails. This helps you increase the availability of your networks. |
|
|
Term
Card # 108
the count-to-infinity problem. |
|
Definition
The core of the count-to-infinity problem is that if A tells B that it has a path somewhere, there is no way for B to know if the path has B as a part of it. To see the problem clearly, imagine a subnet connected like A–B–C–D–E–F, and let the metric between the routers be "number of jumps". Now suppose that A is taken offline. In the vector-update-process B notices that the route to A, which was distance 1, is down – B does not receive the vector update from A. The problem is, B also gets an update from C, and C is still not aware of the fact that A is down – so it tells B that A is only two jumps from C (C to B to A), which is false. Since B doesn't know that the path from C to A is through itself (B), it updates its table with the new value "B to A = 2 + 1". Later on, B forwards the update to C and due to the fact that A is reachable through B (From C point of view), C decides to update its table to "C to A = 3 + 1". This slowly propagates through the network until it reaches infinity |
|
|
Term
Card # 109 Identify another workaround method for the count-to-infinity problem.
Seed routing
Routing Information Protocol (RIP)
Poison reverse
Reverse split horizon |
|
Definition
|
|
Term
Card # 110
In poison reverse what happens |
|
Definition
routers using poison reverse broadcast routes back to the router from which they calculated their location. Instead of giving a true hop count, to discourage use of the route, the router broadcasts a hop count of 16 as a warning not to use the value specified and as an intimation that the route was learned from router 1 |
|
|
Term
Card # 111
? is a widely deployed wireless router for home use because of its coverage and its compatibility with most devices. |
|
Definition
802.11b/g is a widely deployed wireless router for home use because of its coverage and its compatibility with most devices. |
|
|
Term
Card # 112
568C defines the standards for 1. |
|
Definition
commercial building cabling |
|
|
Term
Card # 113
568c recognizes 1 as a 2 |
|
Definition
568c recognizes CAT6a as a media type |
|
|
Term
Card # 114
568c defines the minimum 1 for both 2 and 3 4 |
|
Definition
568c also defines the minimum bend radius for both shielded and unshielded twisted pair cables. |
|
|
Term
Card # 115
568c defines the maximum 1 for 2 3 |
|
Definition
In addition 568c, it specifies the maximum untwist value for CAT6a cable termination. |
|
|
Term
Card # 116
What is the correct wiring scheme for the current T568B wiring standard? |
|
Definition
White orange, orange, white green, blue, white blue, green, white brown, brown |
|
|
Term
Card # 117
Which technology designations is considered to be Fast Ethernet? |
|
Definition
|
|
Term
Card # 118
If you’re looking for an inexpensive Wi-Fi coverage solution at good data rate speeds, which Institute of Electrical and Electronics Engineers (IEEE) standard device should you seriously consider? |
|
Definition
|
|
Term
Card # 119
? features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more. |
|
Definition
802.11n features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more. |
|
|
Term
Card # 120
802.11n features good coverage within 1 meters, compatibility with 2 & 3 devices, and transmission speeds of 4 or more. |
|
Definition
802.11n features good coverage within 70 meters, compatibility with 5 GHz and 2.4 GHz devices, and transmission speeds of 150 Mbps or more. |
|
|
Term
Card # 121
You scan the network for a wireless access point until you locate one. Which Open Systems Interconnection (OSI) layer is a Wi-Fi part of? |
|
Definition
|
|
Term
Card # 122
A coworker asks you for the port number for MySQL. You tell them it is 3306. Which Open Systems Interconnection (OSI) layer did you discuss with your coworker? |
|
Definition
Layer 5 Layer 5 is the Session layer and Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are both a part of this layer. This layer is also referred to as the port layer. |
|
|
Term
Card # 123
Layer 5 is the 1 layer but is also reffered to as the 2 layer |
|
Definition
Layer 5 is the Session layer. This layer is also referred to as the port layer. |
|
|
Term
Card # 124
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) ports are both a part of the ? layer |
|
Definition
|
|
Term
Card # 125
NICs are a part of what layer |
|
Definition
The data link layer, layer 2. |
|
|
Term
Card # 126
What are the five characteristics of an analog signal? |
|
Definition
amplitude, cycle, frequency, phase, and wavelength. |
|
|
Term
Card # 127
Modulation is a form of what and what is the definition of that which modulation is a part? |
|
Definition
Modulation is a form of multiplexing, which is a controlled media access method where a central device combines signals from multiple nodes and transmits the combined signal across a medium. |
|
|
Term
Card # 128
what is the definition of multiplexing |
|
Definition
a controlled media access method where a central device combines signals from multiple nodes and transmits the combined signal across a medium. |
|
|
Term
Card # 129
what layer are firewalls a part of and what is the name of that layer |
|
Definition
Layer 4 is the Transport layer and firewalls are part of this layer. |
|
|
Term
Card # 130
Which Open Systems Interconnection (OSI) layer is email connected to? |
|
Definition
email protocols operate at layer 7, the Application layer. |
|
|
Term
Card # 131
A network Policy may also include specific information about 1 and 2, such as the use of 3, 4, 5, 6, 7, 8, & 9 |
|
Definition
A network Policy may also include specific information about 1 security and 2 network functions, such as the use of 3-removable drives and other detachable media, 4-instant messaging, 5-wireless devices, 6-the Internet, 7-backup storage, 8-network monitoring procedures, and 9-vendor agreements. |
|
|
Term
Card # 132
What is the proper definition of change management |
|
Definition
A systematic way of approving and executing change to ensure maximum security, stability, and availability of information technology services. |
|
|
Term
Card # 133
Port forwarding (also referred to as port ?) enables a ? |
|
Definition
permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN. |
|
|
Term
Card # 134
PAT is a subset of 1 that does what? |
|
Definition
subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports. |
|
|
Term
Card # 135
Which type of Domain Name System (DNS) record maps an IP address to the host name for the purpose of reverse lookup? |
|
Definition
|
|
Term
Card # 136
The PTR DNS record type does what? |
|
Definition
maps an IP address to the host name for the purpose of reverse lookup. |
|
|
Term
Card # 137
The CNAME DNS record type does what? |
|
Definition
maps multiple canonical names (aliases) to an A record. |
|
|
Term
Card # 138
The AAAA DNS record type does what? |
|
Definition
maps a host name to its IP address using a 128-bit IPv6 address. |
|
|
Term
Card # 139
The MX DNS record type does what? |
|
Definition
maps a domain name to an email server list. |
|
|
Term
|
Definition
A port is a number that represents a process running on a network. Both clients and servers use port numbers to identify themselves. |
|
|
Term
Card # 141
A protocol is an 3 |
|
Definition
A protocol is an agreed-upon format of data transmission between two devices. |
|
|
Term
Card # 142
A socket is a 2 |
|
Definition
A socket is a port that is in use. |
|
|
Term
Card # 143
frame Relay is a Wide Area Network (WAN) protocol that allows |
|
Definition
transmission of data over a shared network medium and bandwidth using virtual circuits. |
|
|
Term
Card # 144
Multiprotocol Label Switching (MPLS) is a |
|
Definition
framework of networking functions that uses labels on any combination of Layer 2 and Layer 3 headers. |
|
|
Term
Card # 145
Asynchronous Transfer Mode (ATM) is a 1. Unlike frame relay, it can 2. |
|
Definition
1 - cell-switching network technology. 2 - guarantee QoS for a particular virtual channel. |
|
|
Term
Card # 146
What does the Optical Carrier x (OCx) standard specify? |
|
Definition
The bandwidth for fiber optic transmissions. |
|
|
Term
Card # 147
The OCx standard specifies the bandwidth for ?. |
|
Definition
fiber optic transmissions. |
|
|
Term
Card # 148
OCx specifications correspond to |
|
Definition
the data rates of Synchronous Optical Network (SONET). |
|
|
Term
Card # 149
A single OC channel corresponds to a data rate of |
|
Definition
51.84 Mbps. As more channels are added, the throughput increases in proportion. |
|
|
Term
Card # 150
In MPLS, what does the router do |
|
Definition
In MPLS, the router reads the label (that exsists on any combination of layer 2 and/or 3 headers) and forwards the packet to its neighbor as opposed to performing a network address lookup in its routing table. |
|
|
Term
Card # 151
MPLS can travel over 1, 2 or 3, which are each at what layer of the OSI model. However, the labels created by MPLS are read and rewritten at Layer ?. |
|
Definition
MPLS can travel over PPP, Frame Relay, or ATM, which are each at Layer 2 of the OSI model. The labels created by MPLS are read and rewritten at Layer 3. |
|
|
Term
Card # 152
Frame relay offers 3 advantages. What are they? It's 2 disadvantages prevent it from doing what? |
|
Definition
Frame relay delivers increased performance with reduced network complexity and offers a pay-as-you-go structure. However, the bursty nature of traffic in a Frame Relay cloud, along with the use of variable-length frames, makes it difficult to provide QoS. |
|
|
Term
Card # 153
Which type of fiber optic connector has a straight, ceramic center pin and bayonet lug lockdown, and is used to connect multimode fibers? |
|
Definition
Straight Tip (ST) connector |
|
|
Term
Card # 154
ST connectors have a 1 and 2. They are often used in 3 |
|
Definition
straight, ceramic center pin and bayonet lug lockdown. They are often used in network patch panels. |
|
|
Term
Card # 155
? has a straight, ceramic center pin and bayonet lug lockdown. They are often used in network patch panels. |
|
Definition
Straight Tip (ST) connector |
|
|
Term
Card # 156
An SC uses 1 that 2, and is used with 3. |
|
Definition
An SC uses box-shaped connectors that snap into a Receptacle, and is used with a singlemode fiber. |
|
|
Term
Card # 157
? box-shaped connectors that snap into a Receptacle, and is used with a singlemode fiber. |
|
Definition
|
|
Term
Card # 158
An LC uses an 1 and can be used to 2. |
|
Definition
An LC uses an RJ-45–type latching and can be used to transition installations from twisted pair copper cabling to fiber. |
|
|
Term
Card # 159
An 1 uses an RJ-45–type latching and can be used to transition installations from twisted pair copper cabling to fiber. |
|
Definition
|
|
Term
Card # 160
An FC uses a 1 for more 2 than 3 or 4 connectors. |
|
Definition
An FC uses a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors. |
|
|
Term
Card # 161
? uses a heavy duty ferrule in the center for more mechanical stability than SMA or ST connectors. |
|
Definition
|
|
Term
Card # 162 Which statement is the most accurate description of a Mechanical Transfer Registered Jack (MT-RJ) fiber optic connector?
It features a tubular structure made of ceramic or metal that supports the fiber.
It is typically used where environmental factors necessitate a waterproof connection.
It is a compact snap-to-lock connector used with multimode fiber.
It is a screw-on type connector with a tapered sleeve that is fixed against guided rings. |
|
Definition
It is a compact snap-to-lock connector used with multimode fiber. |
|
|
Term
Card # 163
MT-RJ, also known as 1, is a 2 used with 3. It is similar in size to an 4 connector. |
|
Definition
MT-RJ, also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector. |
|
|
Term
Card # 164
? also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector. |
|
Definition
MT-RJ, also known as Fiber Jack, is a compact snap-to-lock connector used with multimode fiber. It is similar in size to an RJ-45 connector. |
|
|
Term
Card # 165
A biconic connector is a 1 connector with a 2 that is 3. |
|
Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings. |
|
|
Term
Card # 166
A ? is a screw-on type connector with a tapered sleeve that is fixed against guided rings. |
|
Definition
A biconic connector is a screw-on type connector with a tapered sleeve that is fixed against guided rings. |
|
|
Term
Card # 167
A subminiature (SMA) connector is similar to a 1 and is typically used where 2 necessitate a 3, unlike a 4. |
|
Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector. |
|
|
Term
Card # 168
A ? is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector. |
|
Definition
A subminiature (SMA) connector is similar to a Straight Tip (ST) connector and is typically used where water or other environmental factors necessitate a waterproof connection, unlike a bayonet-style connector. |
|
|
Term
Card # 169
A Ferrule Connector (FC) is a 1 made of 2 or 3 that supports 4. |
|
Definition
A Ferrule Connector (FC) is a tubular structure made of ceramic or metal that supports the fiber. |
|
|
Term
Card # 170
A ? is a tubular structure made of ceramic or metal that supports the fiber. |
|
Definition
A Ferrule Connector (FC) is a tubular structure made of ceramic or metal that supports the fiber. |
|
|
Term
Card # 171
A distribution frame is a device that 1 and 2 with 3. |
|
Definition
A distribution frame is a device that terminates cables and enables connections with other devices. |
|
|
Term
Card # 172
A ? is a device that terminates cables and enables connections with other devices. |
|
Definition
A distribution frame is a device that terminates cables and enables connections with other devices. |
|
|
Term
Card # 173
A punch down tool is used to do what |
|
Definition
connect cable wires directly to a patch panel or punch down block. |
|
|
Term
Card # 174
A circuit tester is an electrical instrument that allows you to |
|
Definition
determine whether or not current is passing through the circuit. |
|
|
Term
Card # 175
A butt set, also known as a 1, is a special type of 2 used by 3 when 4. |
|
Definition
A butt set, also known as a lineman's test set, is a special type of telephone handset used by telecom technicians when installing and testing local lines. |
|
|
Term
Card # 176
In a collision domain, |
|
Definition
nodes contend for access to the same physical medium. |
|
|
Term
Card # 177
A broadcast domain is a |
|
Definition
network segment on which broadcasts occur. |
|
|
Term
Card # 178
A subnet is a 1 of a 2, created by an 3 to improve 4 or provide 5. |
|
Definition
logical subset of a larger network, created by an administrator to improve network performance or to provide security. |
|
|
Term
Card # 179 Which protocols would allow you to implement distance-vector routing?
Open Shortest Path First (OSPF)
Routing Information Protocol version 2 (RIPv2)
Border Gateway Protocol (BGP)
Intermediate System to Intermediate System (IS-IS) |
|
Definition
Routing Information Protocol version 2 (RIPv2)
RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops.
OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network.
BGP is considered a hybrid routing protocol that uses both distance-vector and link state routing methods. |
|
|
Term
Card # 180
1 and 2 are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops. |
|
Definition
RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops. |
|
|
Term
Card # 181
BGP is considered a 1 that uses both 2 and 3 |
|
Definition
BGP is considered a hybrid routing protocol that uses both distance-vector and link state routing methods. |
|
|
Term
Card # 182
RIPv2 and IGRP are both 1 that 2 and 3 |
|
Definition
RIPv2 and IGRP are both distance-vector routing protocols that calculate the direction and distance between any two points and route packets based on their calculation of the fewest number of hops. |
|
|
Term
Card # 183
OSPF and IS-IS are both 1 that attempt to 2 with more 3 about the 4 |
|
Definition
OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network. |
|
|
Term
Card # 184
1 & 2 are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network. |
|
Definition
OSPF and IS-IS are both link state routing protocols that attempt to build and maintain a more complex route database with more information about the network. |
|
|
Term
Card # 185
In the host-to-site VPN connection model also, there are (1)—(2) and (3). In the case of an (2), the path between the (4) and the (5) is (6). In the case of a (3), the path between the (4) & (5) is (7). |
|
Definition
In the host-to-site VPN connection model also, there are two types of networks—open and closed. In the case of an open VPN, the path between the end node and the IPSec gateway is not secured. In the case of a closed VPN, the path between the end node and the IPSec gateway is secured. |
|
|
Term
Card # 186
In the ? model also, there are two types of networks—open and closed. In the case of an open VPN, the path between the end node and the IPSec gateway is not secured. In the case of a closed VPN, the path between the end node and the IPSec gateway is secured. |
|
Definition
host to site vpn connection model |
|
|
Term
Card # 187
In the host-to-host VPN connection model, rather than (1), a (2) makes a (3) to another (2). This can be used either internally or on the Internet. Where this is most common is when one (4) needs a (3) to another (4). Typically the tunneling protocol for host-to-host VPNs is (6). |
|
Definition
Host-to-host: In the host-to-host VPN connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for host-to-host VPNs is IPSEC. |
|
|
Term
Card # 188
In the ? connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for ? VPNs is IPSEC. |
|
Definition
Host-to-host: In the host-to-host VPN connection model, rather than connecting to another network, a single computer makes a secure connection to another single computer. This can be used either internally or on the Internet. Where this is most common is when one server needs a secure connection to another server. Typically the tunneling protocol for host-to-host VPNs is IPSEC. |
|
|
Term
Card # 189
??? is a remote-access authentication method that sends client IDs and passwords as cleartext. It is typically used when a remote client connects to a non-Windows PPP server that does not support password encryption. |
|
Definition
|
|
Term
Card # 190
PAP is a remote-access authentication method that ?. It is typically used when ?. |
|
Definition
PAP is a remote-access authentication method that sends client IDs and passwords as cleartext. It is typically used when a remote client connects to a non-Windows PPP server that does not support password encryption. |
|
|
Term
Card # 191
PAP is a (1) that sends (2) as (3). It is typically used when a (4) connects to a (5) that (6). |
|
Definition
PAP is a (1) remote-access authentication method that sends (2) client IDs and passwords as (3) cleartext. It is typically used when a (4) remote client connects to a (5) non-Windows PPP server that (6) does not support password encryption. |
|
|
Term
Card # 192
The ??? addresses this problem of PAP sending client IDs and passwords via cleartext by using a combination of (1) and a (2) in which the (3) is (4). |
|
Definition
The CHAP addresses this problem by using a combination of Message Digest 5 (MD5) hashing and a challenge-response mechanism in which the password is encrypted |
|
|
Term
Card # 193
MS-CHAP is a Microsoft extension of CHAP that is specifically designed for |
|
Definition
authenticating remote Windows workstations. |
|
|
Term
Card # 194
Both (1) and (2) are tunneling protocols that increase traffic security through data encryption. |
|
Definition
|
|
Term
Card # 195
The HyperText Transfer Protocol (HTTP) is a network protocol that works on the (1) layer (Layer ?) of the OSI model and the (2) layer of the TCP/IP model to provide web services. HTTP uses port 80 for communicating with web clients and servers and runs on the (3) protocol. |
|
Definition
The HyperText Transfer Protocol (HTTP) is a network protocol that works on the Application layer (Layer 7) of the OSI model and the Application layer of the TCP/IP model to provide web services. HTTP uses port 80 for communicating with web clients and servers and runs on TCP. |
|
|
Term
Card # 196
Which of the following is not a type of certifier? A Local Area Network (LAN) tester A network cable certifier A qualification tester A line tester |
|
Definition
A line tester A line tester is not a certifier. A line tester only tests for end-to-end connectivity, but not transmission quality. |
|
|
Term
Card # 197
When using a protocol analyzer, which OSI model layer can you NOT gather information from? Data Link, Transport, Physical, Application |
|
Definition
Application. A protocol analyzer, or a network analyzer, is diagnostic software that can examine and display data packets that are being transmitted over a network. It can examine packets from protocols that operate in the Physical, Data Link, Network, and Transport layers of the OSI model. |
|
|
Term
Card # 198
The pathping command’s value is in its capability to do what? |
|
Definition
identify routers or subnets with latency problems by displaying packet loss data. |
|
|
Term
Card # 199
The toner probe emits a tone when it 1. It’s used to 1 & 2 3, 4 & 5 on a network. |
|
Definition
The toner probe emits a tone when it detects a signal in a pair of wires. It’s used to trace and locate voice, audio, and video signals on a network. |
|
|
Term
Card # 200
A Looking Glass site is a 1
A looking glass site accesses a 2 and 3 allowing a view of the 4.
Looking Glasses sites are used for 5 |
|
Definition
A Looking Glass site is a web server that allows external users to get a look at routing and network behavior as it originates from the remote network.
A looking glass site accesses a remote router and performs commands allowing a view of the IP and BGP route tables.
Looking Glasses sites are used for verifying routing between providers, and for verifying that routes are propagating correctly across the Internet. |
|
|
Term
Card # 201 A split pair is among the most difficult to diagnose of wiring errors. What should you look for when testing a cable?
Over-reported bandwidth readings
Loopback
Impedance
Excessive cross-talk |
|
Definition
Excessive cross-talk.
Having the tester look for excessive crosstalk usually detects a split pair. You have to use a certifier device to detect a split pair because a simple line tester isn’t sufficient for the job. |
|
|
Term
Card # 202
You have to use a 1 to detect a split pair because a simple 2 isn’t sufficient for the job. |
|
Definition
You have to use a certifier device to detect a split pair because a simple line tester isn’t sufficient for the job. |
|
|
Term
Card # 203 What is the primary function of a Gigabit interface converters (GBICs) or an small form factor pluggable (SFP)?
To comply with the new 802.x standard.
To act as a primary network interface for new cabling schemas.
To increase the wavelengths used for device connection to avoid interference.
To convert electrical signals into optical signals and vice versa. |
|
Definition
To convert electrical signals into optical signals and vice versa.
The primary function of a GBIC or an SFP is to convert electrical signals into optical signals and vice versa. |
|
|
Term
Card # 204 What is the identifying symptom of attenuation?
Complete loss of signal
Slow responses from the network
High latency
Intermittent connectivity issues |
|
Definition
Slow responses from the network |
|
|
Term
Card # 205
Attenuation occurs when there is a 1, which results in 2 |
|
Definition
Attenuation occurs when there is a degradation of signal strength, which results in slow responses from the network. |
|
|
Term
Card # 206
? occurs when there is a degradation of signal strength, which results in slow responses from the network. |
|
Definition
Attenuation occurs when there is a degradation of signal strength, which results in slow responses from the network. |
|
|
Term
Card # 207 If you need to upgrade your network to gigabit speeds but do not want to replace a lot of different components, which hardware solution could you use?
Gigabit interface converters (GBICs)
ThinNet transceivers
ThickNet transceivers
Attachment Unit Interfaces (AUIs) |
|
Definition
Gigabit interface converters (GBICs) The GBIC is used as an interface for high-speed networking and to upgrade the network, without needing to replace all components in the motherboards. |
|
|
Term
Card # 208
A wavelength mismatch can occur when |
|
Definition
The provisioned value for wavelength does not match the supported wavelength. |
|
|
Term
Card # 209
Which one of the following is considered to be a competing Voice over IP (VoIP) protocol with the H.323 suite?
Media Gateway Control Protocol (MGCP)
H.248
Real-Time Transport Protocol (RTP)
Session Initiation Protocol (SIP) |
|
Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323. |
|
|
Term
Card # 210
? was developed by Cisco as an alternative to H.323. |
|
Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323. |
|
|
Term
Card # 211
Media Gateway Control Protocol (MGCP) was developed by 1 as an alternative to 2. |
|
Definition
Media Gateway Control Protocol (MGCP) MGCP was developed by Cisco as an alternative to H.323. |
|
|
Term
Card # 212
Which protocol is analogous to Post Office Protocol (POP) |
|
Definition
Internet Message Access Protocol (IMAP) IMAP is analogous to POP in that they are both used to transfer email from an email server. |
|
|
Term
Card # 213
IMAP is analogous to 1 in that they are both used to 2. |
|
Definition
IMAP is analogous to POP in that they are both used to transfer email from an email server. |
|
|
Term
Card # 214
What is the major advantage of Internet Message Access Protocol (IMAP) over Post Office Protocol (POP)? |
|
Definition
IMAP can be left on a server, making it easier to access them from multiple computers or devices. IMAP has the advantage of being able to retain messages on the email server, making it easier to use multiple devices that keep email in sync with each other. |
|
|
Term
Card # 215
If you want Windows systems to browse freely across different network segments, you have to allow which protocol through your internal firewall? |
|
Definition
Server Message Block (SMB) . SMB is the protocol Windows systems use to browse other systems and shared resources. |
|
|
Term
Card # 216
? is the protocol Windows systems use to browse other systems and shared resources. |
|
Definition
Server Message Block (SMB). SMB is the protocol Windows systems use to browse other systems and shared resources. |
|
|
Term
Card # 217
SMB is the protocol Windows systems use to ? |
|
Definition
SMB is the protocol Windows systems use to browse other systems and shared resources. |
|
|
Term
Card # 218
Windows systems use which protocol to locate and connect to other Windows servers and services on a network? |
|
Definition
Network Basic Input/Output System (NetBIOS) |
|
|
Term
Card # 219
In a TCP/IP network, NetBIOS clients, such as Windows systems, use NetBIOS over TCP/IP to 1, and then 2 TO 3 such as 4 AND 5 |
|
Definition
In a TCP/IP network, NetBIOS clients, such as Windows systems, use NetBIOS over TCP/IP to connect to servers, and then issue SMB commands to complete tasks such as accessing shared files and printers. |
|
|
Term
Card # 220
Which of the following is a characteristic of the IP Security (IPSec) encryption method, as opposed to Microsoft Point-to-Point Encryption (MPPE)?
It is often used with Point-to-Point Tunneling Protocol (PPTP).
It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2.
It uses Data Encryption Standard (DES) or Triple DES (3DES) encryption.
It uses Extensible Authentication Protocol (EAP) remote authentication. |
|
Definition
It uses Data Encryption Standard (DES) or Triple DES (3DES) encryption.
IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP).
IPSec uses DES or 3DES encryption to provide data confidentiality.
The remaining features listed are characteristics of the MPPE encryption method. |
|
|
Term
Card # 221
What are 3 features of MPPE |
|
Definition
It is often used with Point-to-Point Tunneling Protocol (PPTP). It requires the use of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) or MS-CHAPv2. It uses Extensible Authentication Protocol (EAP) remote authentication. |
|
|
Term
Card # 222
IPSec in 1 is often used with 2. IPSec uses 3 or 4 encryption to provide data confidentiality. |
|
Definition
IPSec in Tunnel mode is often used with Layer Two Tunneling Protocol (L2TP). IPSec uses DES or 3DES encryption to provide data confidentiality. |
|
|
Term
Card # 223
VNC is a 1. A VNC viewer on a 2 can 3. |
|
Definition
VNC is a platform-independent desktop sharing system. A VNC viewer on a Linux system can connect to a VNC server on a Microsoft system and vice-versa. |
|
|
Term
Card # 224
RDP is used specifically for ?. |
|
Definition
RDP is used specifically for Microsoft's Remote Desktop system. |
|
|
Term
Card # 225
The Citrix ICA protocol is a 1 used by 2 and 3 software as an 4. |
|
Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services. |
|
|
Term
Card # 226
Current X Window systems are1 and 2 to 3 |
|
Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications |
|
|
Term
Card # 227
1 is a platform-independent desktop sharing system.
A 2 viewer on a Linux system can connect to a 3 on a Microsoft system and vice-versa. |
|
Definition
VNC is a platform-independent desktop sharing system. A VNC viewer on a Linux system can connect to a VNC server on a Microsoft system and vice-versa. |
|
|
Term
Card # 228
? is used specifically for Microsoft's Remote Desktop system. |
|
Definition
RDP is used specifically for Microsoft's Remote Desktop system. |
|
|
Term
Card # 229
? is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services. |
|
Definition
The Citrix ICA protocol is a remote terminal protocol used by Citrix WinFrame and Citrix Presentation Server software as an add-on to Microsoft Terminal Services. |
|
|
Term
Card # 230
? are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications |
|
Definition
Current X Window systems are based on the X11 protocol and normally used on UNIX- and Linux-based systems to display local applications |
|
|
Term
Card # 231
Port forwarding (also referred to as 1) enables a 2 that 3 to a 4 and 5 on a 6 |
|
Definition
Port forwarding (also referred to as port mapping) enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN. |
|
|
Term
Card # 232
NAT does 1 from 2 |
|
Definition
NAT conceals internal addressing schemes from external networks. |
|
|
Term
Card # 233
PAT is a 1 that 2 to a 3 using 4 |
|
Definition
PAT is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports |
|
|
Term
Card # 234
? enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN. |
|
Definition
Port forwarding (also referred to as port mapping) enables a permanent translation entry that maps a protocol port on a gateway to an IP address and protocol port on a private LAN. |
|
|
Term
Card # 235
? conceals internal addressing schemes from external networks. |
|
Definition
NAT conceals internal addressing schemes from external networks. |
|
|
Term
Card # 236
? is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports |
|
Definition
PAT is a subset of dynamic NAT functionality that maps either one or more unregistered addresses to a single registered address using multiple ports |
|
|
Term
Card # 237
Which device would you use to check the cable’s integrity before rebuilding it? |
|
Definition
|
|
Term
Card # 238
A cable certifier will 1 your 2 for 3 and tell you if it is 4 or 5 |
|
Definition
A cable certifier will test your cable for functionality and tell you if it is a straight-through or a crossover. |
|
|
Term
Card # 239
A multimeter, also known as a 1, is an 2 that 3 such as 4, 5 and 6 |
|
Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance. |
|
|
Term
Card # 240
A ? will test your cable for functionality and tell you if it is a straight-through or a crossover. |
|
Definition
A cable certifier will test your cable for functionality and tell you if it is a straight-through or a crossover. |
|
|
Term
Card # 241
A ?, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance. |
|
Definition
A multimeter, also known as a volt/ohm meter, is an electronic measuring instrument that takes electrical measurements such as voltage, current, and resistance. |
|
|
Term
Card # 242
what is A replacement for Spanning Tree Protocol (STP) that simplifies the creation and configuration of networks |
|
Definition
|
|
Term
Card # 243
Shortest Path Bridging is a 1 for 2 that 3 and 4 |
|
Definition
Shortest Path Bridging is a replacement for Spanning Tree Protocol (STP) that simplifies the creation and configuration of networks |
|
|
Term
Card # 244
? is a hybrid routing protocol used to establish routing between ISPs. |
|
Definition
Border Gateway Protocol (BGP) is a hybrid routing protocol used to establish routing between ISPs. |
|
|
Term
Card # 245
Border Gateway Protocol (BGP) is a 1 used to 2 between 3 |
|
Definition
Border Gateway Protocol (BGP) is a hybrid routing protocol used to establish routing between ISPs. |
|
|
Term
Card # 246
Interior Gateway Routing Protocol (IGRP) is an improvement over 1 that is designed to be 2 within an 3. |
|
Definition
Interior Gateway Routing Protocol (IGRP) is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system. |
|
|
Term
Card # 247
? is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system. |
|
Definition
Interior Gateway Routing Protocol (IGRP) is an improvement over RIP that is designed to be deployed on interior routers within an autonomous system. |
|
|
Term
Card # 248
SPB combines an 1 with a 2 running between 3. |
|
Definition
SPB combines an Ethernet data path with an IS-IS link state control protocol running between Shortest Path bridges. |
|
|
Term
Card # 249
1 combines an Ethernet data path with an IS-IS link state control protocol running between 1. |
|
Definition
SPB combines an Ethernet data path with an IS-IS link state control protocol running between Shortest Path bridges. |
|
|
Term
Card # 250
Enhanced Interior Gateway Routing Protocol (EIGRP) is a 1 by 2 that supports 3 and 4 5 . |
|
Definition
Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary routing protocol by Cisco that supports classful and classless subnet masks. |
|
|
Term
Card # 251
? is a proprietary routing protocol by Cisco that supports classful and classless subnet masks. |
|
Definition
Enhanced Interior Gateway Routing Protocol (EIGRP) is a proprietary routing protocol by Cisco that supports classful and classless subnet masks. |
|
|
Term
Card # 252
What command would you use in Windows Server 2012 R2 to clear a static routing table of all entries? |
|
Definition
route-f. The route-f command would clear a static routing table of all entries. |
|
|
Term
Card # 253
What process is used on packet-switched networks to automatically calculate route costs and routing table entries? |
|
Definition
|
|
Term
Card # 254
A friend of yours tells you about a new website that he wants you to see. Which Open Systems Interconnection (OSI) layer are they asking you to examine? |
|
Definition
Layer 7 . Layer 7 is the Application layer and HTTP operates on this layer. |
|
|
Term
Card # 255
Layer ? is the blank layer and HTTP operates on this layer. |
|
Definition
Layer 7 is the Application layer and HTTP operates on this layer. |
|
|
Term
Card # 256
? is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI. |
|
Definition
SONET is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI. |
|
|
Term
Card # 257
? is the European version of standard for synchronous data transport over a fiber optic cable |
|
Definition
SDH is the European version of standard for synchronous data transport over a fiber optic cable |
|
|
Term
Card # 258
? is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs). |
|
Definition
802.11 is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs). |
|
|
Term
Card # 259
? is a set of networking technologies and media access methods specified for LANs. |
|
Definition
Ethernet is a set of networking technologies and media access methods specified for LANs. |
|
|
Term
Card # 260
SONET is the 1. It is the U.S. version of the standard published by ANSI. |
|
Definition
SONET is the standard for synchronous data transport over a fiber optic cable. It is the U.S. version of the standard published by ANSI. |
|
|
Term
Card # 261
SDH is the European version of standard for 1 over a 2 |
|
Definition
SDH is the European version of standard for synchronous data transport over a fiber optic cable |
|
|
Term
Card # 262
802.11 is a standard that describes 1 and 2 3 for 4 |
|
Definition
802.11 is a standard that describes Layer 1 and Layer 2 specifications for wireless local area networks (LANs). |
|
|
Term
Card # 263
Ethernet is a set of 1 and 2 specified for 3. |
|
Definition
Ethernet is a set of networking technologies and media access methods specified for LANs. |
|
|
Term
Card # 264
What are Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP) all examples of? |
|
Definition
Interior Gateway Protocols |
|
|
Term
Card # 265
IGPs are protocols that are responsible for 1 between 2 within a 3. |
|
Definition
IGPs are protocols that are responsible for exchanging routing information between gateways within an Autonomous System. |
|
|
Term
Card # 266
Examples of Interior Gateway Protocols include 1, 2, 3, 4 & 5. |
|
Definition
Examples of IGPs include RIP, OSPF, EIGRP, IS-IS, and IGRP. |
|
|
Term
Card # 267
What process is used on packet-switched networks to automatically calculate route costs and routing table entries? |
|
Definition
|
|
Term
Card # 268
? is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count |
|
Definition
Distance vector routing is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count |
|
|
Term
Card # 269
Distance vector routing is a simple routing protocol used in 1 that utilizes 2 to decide the best packet forwarding path. Distance is typically represented by the 3. |
|
Definition
Distance vector routing is a simple routing protocol used in packet-switched networks that utilizes distance to decide the best packet forwarding path. Distance is typically represented by the hop count |
|
|
Term
Card # 270
To set up a simple, logfile-based device monitoring system on your network, what would you use? |
|
Definition
|
|
Term
Card # 271
? is a simple, easy to set up logfile-based monitoring system that collects data from many types of devices via the syslog agent that is already present on most operating systems and networked devices. |
|
Definition
Syslog is a simple, easy to set up logfile-based monitoring system that collects data from many types of devices via the syslog agent that is already present on most operating systems and networked devices. |
|
|
Term
Card # 272
What information should you include in your network diagrams? |
|
Definition
Location and routing information for network devices. Also known as network maps, network diagrams provide location and routing information for network devices. |
|
|
Term
Card # 273
Also known as 1, network diagrams provide 2 and 3 for 4 |
|
Definition
Also known as network maps, network diagrams provide location and routing information for network devices. |
|
|
Term
Card # 274
What are two essential logical network diagram components. |
|
Definition
Routing topology and node trust relationships |
|
|
Term
Card # 275
Logical Network Diagrams contain at least 5 things. What are they? |
|
Definition
Logical network diagrams contain routing topology and node trust relationships. Additionally, they contain node IP addresses, device FQDNs, and application types. |
|
|
Term
Card # 276
what is the definition of port mirroring |
|
Definition
Port mirroring is a method of copying and sending network packets transmitted as input from a port to another port of a monitoring computer/switch/device. It is a network monitoring technique implemented on network switches and similar devices. |
|
|
Term
Card # 277
What is the IEEE standard designation for the Spanning Tree Protocol |
|
Definition
|
|
Term
Card # 278
802.1d is the IEEE standard designation for what |
|
Definition
|
|
Term
Card # 279
Managed switches allow administrators to create ??? within the network. |
|
Definition
Managed switches allow administrators to create VLANs within the network. |
|
|
Term
Card # 280
Port mirroring is useful as a 1 when you need to 2 going to a 3 with minimal impact on the network performance. |
|
Definition
Port mirroring is useful as a diagnostic tool when you need to monitor all traffic going to a particular port or node with minimal impact on the network performance. |
|
|
Term
Card # 281
The ? standard describes PoE. |
|
Definition
The 802.3af standard describes PoE. |
|
|
Term
Card # 282
The 802.3af standard describes ? |
|
Definition
The 802.3af standard describes PoE. |
|
|
Term
Card # 283
Power over Ethernet (PoE) technology enables networks to deliver 1 & 2 over 3, with up to 4 of 5 power supplied to each powered device and with 6 being assured due to power dissipation during delivery? |
|
Definition
Power over Ethernet (PoE) technology enables networks to deliver electrical power and standard data over Ethernet cabling, with up to 15.4 W of DC power supplied to each powered device and with 12.95 W being assured due to power dissipation during delivery? |
|
|
Term
Card # 284
How do network devices figure out which VLAN specific frames belong to? |
|
Definition
The IEEE 802.1q trunk link protocol addresses this issue. |
|
|
Term
Card # 285
The ? addresses this issue of how network devices figure out which VLAN specific frames belong to |
|
Definition
The IEEE 802.1q trunk link protocol addresses this issue of how network devices figure out which VLAN specific frames belong to |
|
|
Term
Card # 286
1 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 2, 3, 4, 5, & 6 versions to provide wireless connectivity in the home, office and some commercial establishments. |
|
Definition
802.11 is a set of IEEE standards that govern wireless networking transmission methods. They are commonly used today in their 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac versions to provide wireless connectivity in the home, office and some commercial establishments. |
|
|
Term
Card # 287
802.11 IEEE standards govern what? |
|
Definition
wireless networking transmission methods |
|
|
Term
Card # 288
802.1q inserts a 1 in the 2 identifying the 3 for that 4. |
|
Definition
802.1q inserts a special tag in the Ethernet header identifying the VLAN for that frame. The switch at the other end of the trunk link will read that tag and forward the frame to the appropriate VLAN. |
|
|
Term
Card # 289
Firewalls are part of the ? Layer |
|
Definition
|
|
Term
Card # 290
What is the most common in-band remote-management hardware device? |
|
Definition
|
|
Term
Card # 291
Unlike out-of-band connection, in-band connection is available only when ? |
|
Definition
Unlike out-of-band connection, in-band connection is available only when the server is initialized and functioning properly. |
|
|
Term
Card # 292
In-band connection relies on 1 to 2. |
|
Definition
In-band connection relies on operating-system network drivers to establish computer connections. |
|
|
Term
Card # 293
The most common in-band remote-management hardware device is the 1. 2 and 3 are also classified as 1. |
|
Definition
The most common in-band remote-management hardware device is the network adapter. YES, I know card # 305 said the most common in-band remote management hard device was the network switch. No I don't know which one is correct. If you see this quesiton on the test, I guess you will just have to flip a coin between those two answers |
|
|
Term
Card # 294
1 & 2 are also classified as network adapters. |
|
Definition
Analog modems and Integrated Services Digital Network (ISDN) adapters are also classified as network adapters. |
|
|
Term
Card # 295
Network administrators typically use out of band management when ? |
|
Definition
standard connectivity isn’t available. |
|
|
Term
Card # 296
Network administrators typically use ? when standard connectivity isn’t available. |
|
Definition
Network administrators typically use out of band management when standard connectivity isn’t available. |
|
|
Term
Card # 297
Trunking is also known as 1, 2, 3, & 4 among other names. |
|
Definition
Trunking is also known as link aggregation, port teaming, EtherChannel, and NIC bonding, among other names. |
|
|
Term
Card # 298
Why is an Network Time Protocol (NTP) amplified Distributed Denial of Service (DDoS) attack the most effective against a target? |
|
Definition
It generates a huge amount of traffic against a target |
|
|
Term
Card # 299
IP filtering operates mainly at Layer ? of the TCP/IP protocol stack and is generally performed by a ?, although ? can also perform IP filtering. |
|
Definition
IP filtering operates mainly at Layer 2 of the TCP/IP protocol stack and is generally performed by a screening router, although other network devices can also perform IP filtering. |
|
|
Term
A collision domain occurs on a 1 where the transmission of a 2 is heard by 3. |
|
Definition
This occurs on a logical bus, where the transmission of a single node is heard by all nodes. A collision can happen in this type of situation. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Site to Site VPNs are most commone where one 1 needs a secure connection to another 1.
Typically the tunneling protocol for Site to site VPNs is 2. |
|
Definition
Where this is most common is when one server needs a secure connection to another server.
Typically the tunneling protocol for ? VPNs is IPSEC. |
|
|
Term
You have to use a 1 to detect a split pair because a 2 isn't sufficient for the job |
|
Definition
You have to use a certifier device to detect a split pair because a simple line tester isn't sufficient for the job |
|
|