Study Guide for Network+ Test #3 [Chapter 9-12] – Flashcards

Unlock all answers in this set

Unlock answers
question
When is bus topology WAN the best option to use in an organization?
answer
when used only for a few sites and the capability to use dedicated circuits.
question
What is a cipher lock and where is best used?
answer
Cipher locks (one brand name is Cypher Lock) are physical or electronic locks requiring a code to open the door. Best used for
question
Do most Linux desktop operating systems provide GUI applications to easily view system logs?
answer
yes
question
Do T-1 cables follow the same wiring scheme as LAN patch cables?
answer
yes
question
In virtualization do problems in one guest system affect another guest system?
answer
Yes, if a host machine fails, all its guest machine will fail, too.
question
What is the first step in asset management?
answer
The first step in asset management is to inventory all the components on the network, which include nodes or hardware devices on the network and software
question
Are VLANs considered a Layer 2 solution for segmenting a network?
answer
yes
question
Which Class of network can be subnetted?
answer
Class A,B,C networks can all be subnetted
question
What are the advantages of network segmentation?
answer
Network segmentation separates the parts of a network that have access to sensitive information from parts that are more vulnerable to compromise.
question
What are packet runts, giants, jabbers and ghosts?
answer
-Ghosts -Jabber -Runts -Giants
question
What are external-band management system?
answer
in-band management systems = telnet and ssh; they use the existing network and its protocols to interface with the switch.
question
What is a historian?
answer
which is a centralized database of collected an analyzed data and control activities. This data is often analyzed to recognize trends in the physical system
question
What is a trunk port used for?
answer
is the interface on a switch that is capable of amanging traffic among multiple VLANs. its a trunk is a link between 2 switches' trunk ports.
question
What is PCI DSS?
answer
PCI DSS (Payment Card Industry Data Security Standard) - Security standards created by the PCI Security Standards Council to protect credit card data and transactions, require network segmentation as part of their security controls.
question
What is ambient data?
answer
Hidden data on a computer, suh as deleted files and file fragments, as well as information about who has accessed that data and when
question
What should first be done when a destructive program is destroying evidence?
answer
if a destructive program is running that might be destroying evidence, the fastest and safest solution is to unplug the power cord from the back of the machine (Not just from the wall)
question
Know steps of a response policy?
answer
1. Determine if escalation is necessary 2. Secure the Area 3. Document the Scene 4. Monitor Evidence and data collection 5. Protect the chain of custody 6. Monitor transport of data and equipment 7. Create a report
question
What port number do SNMP agents receive requests?
answer
port 161
question
What is a patch?
answer
update or a fix
question
What device allows communications between VLANs for exchange of data?
answer
Router or layer 3 switch
question
How many channels exist in a T1 connection?
answer
24 Channels
question
What are the differences between cold, warm and hot sites?
answer
* Cold site - a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected * warm site - a place where the computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured updated, or connected * Hot site - a place where the computers, devise, and connectivity necessary to rebuild a network exist, and all are appropriately configured updated, ad connected to match your networks current state
question
What is biorecognition access?
answer
Biorecognition access - physical security solution in which a device scans an individuals unique physical characteristics.
question
What the requirements to use a softphone?
answer
* An IP telephony client, such as Skype or Counter Patch * The ability to communicate with a digtial telephone switch, such as that provided by the Skype or CounterPath services * A microphone and speaker, or a headset * For video calls, a web cam
question
What are advantages of leasing a frame relay circuit?
answer
you only pay for only the amount of bandwidth required and is less expensive than some other wan technologies depending on your location and its network availability
question
What is a routing prefix in an IPv6 address?
answer
the network prefix
question
What topology connects each site to two other sites for redundancy?
answer
Ring Topology
question
What is a media gateway controller?
answer
MGC (Media gateway controller) - or call agent, a computer that manages multiple media gateway it facilitates the echange of call signaling information between these gateway when used for call switching its called a softswtich
question
What are the advantages of using virtualization?
answer
* Efficient use of resources * Cost and energy savings * Fault and threat isolation * Simple backups, recovery, and replication
question
What is out-of-band management?
answer
out of bound management - can provide onsite infrastructure access when the network is down , or ocmplete remote access in cases of connectivity failures on the network, such as via a cellular signals.
question
What is a legal hold?
answer
court order to hold a computer
question
In VoIP, what is a unicast transmission?
answer
a single node issues a stream of data to one other node. streaming video services and nearly all issued over a public network such as the internet are examples of unicast transmissions
question
When should you use host-only mode used in a virtual network?
answer
Host - only mode is appropriate for test networks or if you simply need to install a different operating system on your workstation to use a program that is incompatible with your hosts operating system.
question
Which xDSL standard is the most popular?
answer
ADSL
question
When should you use bridged mode in a virtual network?
answer
for virtual servers to reach out to other default gateways and to communicate with other vlans
question
What is a degausser used for?
answer
degausser - a magnetic hard drive eraser pg 621
question
What are DMZ used for?
answer
used for added security and guest network
question
How do you prevent VLAN hopping attacks?
answer
VLAN hopping can be prevented by disabling auto trunking and moving the native VLAN to an unused VLAN, meaning that untagged traffic would essentially run into a dead-end.
question
What are RJ-48 used for?
answer
RJ-48 terminates t1 traffic being carried by copper cabeling
question
What is a maintenance window?
answer
Maintecance window - the time period in which a change will be implemented pg614
question
What is a network tap and packet sniffer used for?
answer
network tap or packet sniffer - device usually has thee ports; 2 ports to send and receive all traffic and third port that mirrors the traffic,, sending it to a computer running monitoring software in promiscuous mode pg444
question
What two layers of the OSI model are LAN and WAN protocols differ?
answer
lans and wans may differ at layers 1 and 2
question
What is backleveling and downgrading?
answer
Rollback - aka backleveling or downgrading, is the process of reverting to a previous version of software after attempting to patch or upgrade it
question
What is a traffic and packet shaping?
answer
traffic shaping aka packet shaping - manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment
question
What two competing standards exist for cell phone networks?
answer
* GSM(Global System for Mobile Communications) - an open standared that suses digital communication of data that is separated by timeslots on a channel, and is accepted and used worldwide * CDMA (Code Division multiple Access) - differs from GSM in that it spreads a signal over a wider bandwidth so that multiple users occupy the same channel, a technology called spread-spectrum
question
What are IP PBX and digital PBX used for?
answer
* IP PBX - can connect with traditional PSTN lines and data networks * Digital PBX - analog and can connect to a voice-data gateway
question
Ghosts
answer
electrical signals on the wire.... no data
question
Jabber
answer
a device that handles electrical signals improperly , usually affecting the rest of the network.
question
Runts
answer
packets that are smaller than the mediums minimum packet size.
question
Giants
answer
packets that exceed the mediums maximum packet size.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New