Network+ N10-006 Exam Collection
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
/24 | show 🗑
|
||||
/25 | show 🗑
|
||||
show | 255.255.255.192
4 networks
62 hosts
🗑
|
||||
/27 | show 🗑
|
||||
/28 | show 🗑
|
||||
show | 255.255.255.248
32 networks
6 hosts
🗑
|
||||
show | 255.255.255.252
64 networks
2 hosts
🗑
|
||||
/31 | show 🗑
|
||||
10GBaseSR | show 🗑
|
||||
10GBaseSW | show 🗑
|
||||
10GBaseLR | show 🗑
|
||||
10GBaseLW | show 🗑
|
||||
10GBaseER | show 🗑
|
||||
show | 40km
SMF
SONET
🗑
|
||||
show | 10km
🗑
|
||||
10GBaseLX4 over multimode | show 🗑
|
||||
10GBaseCX4 | show 🗑
|
||||
10GBaseT | show 🗑
|
||||
IEEE 802.3 | show 🗑
|
||||
show | Defines 1000BaseT - Gigabit Ethernet over four pairs of wires in CAT5E or better UTP cabling.
🗑
|
||||
IEEE 802.3z | show 🗑
|
||||
1000BaseCX | show 🗑
|
||||
IEEE 802.3ae | show 🗑
|
||||
IEEE 802.3an | show 🗑
|
||||
FTP | show 🗑
|
||||
show | TCP 23
🗑
|
||||
SSH | show 🗑
|
||||
DNS | show 🗑
|
||||
show | UDP 67. 68 (servers use 67, clients 68)
🗑
|
||||
TFTP | show 🗑
|
||||
SMTP | show 🗑
|
||||
POP3 | show 🗑
|
||||
IMAP4 | show 🗑
|
||||
show | TCP 137, 138, 139
🗑
|
||||
SMB | show 🗑
|
||||
SNMP | show 🗑
|
||||
RDP | show 🗑
|
||||
show | UDP 5004, 5005
🗑
|
||||
SIP | show 🗑
|
||||
H.323 | show 🗑
|
||||
MGCP | show 🗑
|
||||
show | TCP Header
🗑
|
||||
Source port, Destination port, Length, Checksum | show 🗑
|
||||
show | IP Header
🗑
|
||||
Class A address range and number of hosts | show 🗑
|
||||
Class B address range and number of hosts | show 🗑
|
||||
show | 192-223
192.0.0.0-223.255.255.255
254 hosts
🗑
|
||||
show | 224-239
224.0.0.0-239.255.255.255
Multicast
🗑
|
||||
Class E | show 🗑
|
||||
Class A private address range | show 🗑
|
||||
Class B private address range | show 🗑
|
||||
Class C private address range | show 🗑
|
||||
IPv6 address | show 🗑
|
||||
0:0:0:0:0:0:0:1 ::1 | show 🗑
|
||||
0:0:0:0:0:0:0:0 :: | show 🗑
|
||||
show | Unicast
Multicast
Anycast
🗑
|
||||
show | Global unicast
Link-local unicast
🗑
|
||||
show | IPv6 address. Public and routable on the internet.
🗑
|
||||
show | IPv6 address that's automatically assigned to a system and used only for communicating with other nodes on the link. (meaning network, subnet, LAN) Link local addresses always start with FE80.
🗑
|
||||
show | Multicast Listener Discovery (MLD)
🗑
|
||||
Feature of ICMPv6. Replaces ARP from IPv4 by performing the same function. It's also responsible for finding the router, automatic address assignment and duplicate address detection, to name a few. | show 🗑
|
||||
4to6 | show 🗑
|
||||
Type of routing protocol that uses distance and direction to find the best route to other routers. This type of protocol uses hop counts to determine metric. Router updates include the entire routing table. | show 🗑
|
||||
show | RIPv1, RIPv2, EIGRP (not on exam)
🗑
|
||||
show | Link state
🗑
|
||||
show | OSPF, IS-IS
🗑
|
||||
Category of routing protocol that autonomous systems use to communicate with each other. | show 🗑
|
||||
Category that represents the routing protocols used within an autonomous system. | show 🗑
|
||||
show | RIPv1
🗑
|
||||
Old, outdated distance vector protocol. Added support for VLSMs and noncontiguous subnets. Should never be used. | show 🗑
|
||||
show | OSPF
🗑
|
||||
Link state alternative to OSPF. Very similar. Designed with IPv6 support from the beginning. Popular with ISPs. | show 🗑
|
||||
show | Route redistribution
🗑
|
||||
A number assigned to a routing protocol to allow routers to prefer one protocol over the other. | show 🗑
|
||||
Routing protocol that can be used as an IGP and EGP | show 🗑
|
||||
show | This standard defines VLANs on an Ethernet network.
🗑
|
||||
Hypervisor that runs on top of an existing OS. | show 🗑
|
||||
show | Type 1 Hypervisor. VMware ESX.
🗑
|
||||
show | PPTP (Point-to-Point Tunneling Protocol)
🗑
|
||||
Based on Microsoft's PPTP and Cisco's L2F protocols, this VPN technology combines features of PPTP and L2F. Moved service from Windows server to VPN concentrator. IPSec usually provides security. | show 🗑
|
||||
This VPN protocol offers an advantage over other technologies because it requires no specific software on the client side. This VPN uses a web browser and SSL to secure the connection. | show 🗑
|
||||
Most common type of VPN today. Used for site to site and client to site VPN connections. Operates at layer 3 of the OSI model. A major component of this technilogy is Encapsulation Security Payload (ESP) which deals with encryption and authentication. | show 🗑
|
||||
Each 64Kbps channel in a DS1 signal is a _____> | show 🗑
|
||||
T1 line speed and number of DS0 channels. | show 🗑
|
||||
show | 672 channels
44.736 Mbps
🗑
|
||||
E1 speed and number of DS0 channels. | show 🗑
|
||||
show | 512 channels
34.368 Mbps
🗑
|
||||
show | 51.85 Mbps
🗑
|
||||
The first generation of packet switching technology. It enabled remote devices to communicate with eachother across high-speed digital links without the expense of individual leased lines. | show 🗑
|
||||
10000000 | show 🗑
|
||||
show | 192
🗑
|
||||
show | 224
🗑
|
||||
11110000 | show 🗑
|
||||
show | 248
🗑
|
||||
show | 252
🗑
|
||||
show | 254
🗑
|
||||
show | RJ48C
🗑
|
||||
show | Wavelength Division Multiplexing (WDM) or the newer more popular version Dense WDM (DWDM), which can support up to 150 signals at nearly 7.77 gigabytes per second.
🗑
|
||||
Similar to DWDM, this technology also relies on wavelengths of light to carry a fast signal over long distances of fiber. Simpler than DWDM, limiting it's practical distance to 60km. | show 🗑
|
||||
show | Frame Relay. T-carriers have low error rates. Higher level protocols are responsible for error detection and correction. Now being replaced by ATM and MPLS.
🗑
|
||||
show | Asynchronous Transfer Mode (ATM). Still being used, but on it's way out as it's slowly being replaced with MPLS.
🗑
|
||||
Newer technology to replace Frame Relay and ATM. Designed for use with TCP/IP protocol. This technology adds a label that site between the L2 header and L3 information. Layer 3 is always IP, so label sits in front of IP header. | show 🗑
|
||||
show | MPLS
🗑
|
||||
show | Forwarding Equivalence Class (FEC) (MPLS)
🗑
|
||||
show | Label switching router (LSR) (MPLS router)
🗑
|
||||
An MPLS router that has the job of adding MPLS labels to incoming packets that do not yet have a label. | show 🗑
|
||||
show | Label Distribution Protocol (LDP)
🗑
|
||||
Feature of MPLS that functions as a fully functional connection to your network used to connect two customer locations. | show 🗑
|
||||
show | Bit error rate test (BERT)
🗑
|
||||
show | 'metro-Ethernet'. Ethernet over SMF getting speeds up to 100Gb/s with DWDM capable switches.
🗑
|
||||
show | Modem
🗑
|
||||
Device that takes eight-bit wide digital data and hands it to the modem in one bit wide digital data for conversion to analog. | show 🗑
|
||||
The current standard for modems. | show 🗑
|
||||
show | Integrated Services DIgital Network (ISDN).
🗑
|
||||
show | B (bearer) channels. Remember that a B channel is a DS0 channel (64kbps)
🗑
|
||||
show | D (delta) channel.
🗑
|
||||
show | Basic rate interface (BRI).
🗑
|
||||
show | Primary rate interface (PRI)
🗑
|
||||
show | 18,000 feet
🗑
|
||||
DSL that provides equal upload and download speeds of up to 15Mbps. | show 🗑
|
||||
show | Asymmetric DSL (ADSL)
🗑
|
||||
show | VDSL (Very High Bitrate DSL). Some carriers use fiber to extend the distance (Verizon FiOS, AT&T U-Verse)
🗑
|
||||
Device housed at the CO that connects multiple customers to the internet. | show 🗑
|
||||
show | PPPoE (ponit-to-point protocol over Ethernet)
🗑
|
||||
show | Global System for Mobile (GSM) Original version was a 2G standard.
🗑
|
||||
show | EDGE (Enhanced Data Rates for GSM Evolution)
🗑
|
||||
show | Code division multiple access (CDMA). Original CMDA was a 2G technology.
🗑
|
||||
show | Evolved High-Speed Packet Access (HSPA+)
🗑
|
||||
802.16 wireless standard. | show 🗑
|
||||
show | Long Term Evolution (LTE)
🗑
|
||||
Citrix Remote terminal standard that defines how terminal information is passed between the server and the client. The basis of Microsoft's original Terminal Services. | show 🗑
|
||||
show | Virtual Network Computing (VNC)
🗑
|
||||
Protocol that handles the initiation, setup and delivery of VoIP sessions. There are two protocols, both run on top of RTP. | show 🗑
|
||||
show | Real Time Streaming Protocol (RTSP)
🗑
|
||||
show | Real Time Streaming Protocol. TCP 554
🗑
|
||||
show | SONET
🗑
|
||||
This WAN technology supports throughput up to 39.8Gbps as defined in the OC-768 standard. | show 🗑
|
||||
show | Business Continuity Plan (BCP)
🗑
|
||||
The following are examples of ______________ _____________. A file server, single web server, single printer, edge router. | show 🗑
|
||||
A tool designed by Microsoft to test individual systems for vulnerabilities. | show 🗑
|
||||
show | Nessus and OpenVAS (free open source version of Nessus)
🗑
|
||||
Aircrack-ng | show 🗑
|
||||
show | Metasploit, Arimitage (front end GUI version of Metasploit), Kali Linux.
🗑
|
||||
reflective DDoS | show 🗑
|
||||
Smurf attack | show 🗑
|
||||
A friendly, or unintentional DoS | show 🗑
|
||||
PDoS (permanent DoS) | show 🗑
|
||||
ARP cache poisoning | show 🗑
|
||||
show | Taking advantage of a protocol and using it in ways that it was not designed to be used in order to create a threat.
🗑
|
||||
The way (software or methods)and exploit takes advantage of a vulnerability. | show 🗑
|
||||
New attacks using vulnerabilities that haven't yet been identified (or fixed) | show 🗑
|
||||
show | SLIP (serial line internet protocol)
🗑
|
||||
Series of standards developed by the NSA that handles methods of preventing RF emanation with special shielding including wall coverings, window film, etc. | show 🗑
|
||||
show | jamming
🗑
|
||||
show | Evil twin.
🗑
|
||||
show | Bluejacking
🗑
|
||||
Using weaknesses in the Bluetooth standard to steal information from other Bluetooth devices. | show 🗑
|
||||
show | RC4
🗑
|
||||
show | Initialization vector (IV)
🗑
|
||||
3 WEP flaws that make it an insecure, obsolete protocol | show 🗑
|
||||
Name two switch hardening techniques | show 🗑
|
||||
show | DHCP snooping
🗑
|
||||
show | Dynamic ARP inspection (DAI)
🗑
|
||||
show | Security policy
🗑
|
||||
This protocol was designed as an upgrade to SSL. | show 🗑
|
||||
Authentication and encryption protocol suite that works at the internet/network layer and should be come the dominant authentication and encryption protocol suite as IPv6 continues to roll out. | show 🗑
|
||||
show | IPsec Transport Mode
🗑
|
||||
IPsec mode where the entire packet is encrypted and then placed into an IPsec endpoint, where it is encapsulated inside another IP packet. | show 🗑
|
||||
show | SFTP
🗑
|
||||
Wireless protocol that works by adding an extra layer of security (TKIP) around the WEP encryption scheme. | show 🗑
|
||||
Wireless standard that amended 802.11 standard to add much needed security features. Adding 802.1X using EAP and replacing RC4 with AES. | show 🗑
|
||||
show | Password Authentication Protocol (PAP), and Challenge Handshake Authentication Protocol (CHAP)
🗑
|
||||
Authentication method included in PPP that simply transmits the username and password over the connection in plaintext. | show 🗑
|
||||
Safer authentication method included with PPP. Relies on hashes based on a shared secret, usually a password that both ends of the connection know. | show 🗑
|
||||
show | MSCHAP
🗑
|
||||
Authentication protocol for TCP/IP networks with many clients all connecting to a single authenticating server. Uses a Key Distribution Center (KDC) with two processes; Authentication Server (AS) and Ticket Granting Service (TGS). | show 🗑
|
||||
Key Distribution Center (KDC) | show 🗑
|
||||
show | 10 hours
🗑
|
||||
A one way mathematical function that is run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest) | show 🗑
|
||||
show | Secure Hash Algorithm (SHA) includes SHA-1, SHA-2 (which includes SHA-256, SHA-512 variants) and soon to be finalized SHA-3
🗑
|
||||
show | Extensible Authentication Protocol (EAP)
🗑
|
||||
show | EAP
🗑
|
||||
show | TACACS+ (Terminal Access Controller Access Control System Plus)
🗑
|
||||
show | Security guards and mantraps
🗑
|
||||
show | UTM (unified threat management)
🗑
|
||||
show | Virtual Wire firewall
🗑
|
||||
show | Network Access Control (NAC)
🗑
|
||||
Cisco's version of Network Access Control, can dictate that specific criteria must be met before allowing a node to connect with to a secure network. Devices that don't meet requirements can be made to connect to an alternate network or shunted. | show 🗑
|
||||
show | Posture assessment
🗑
|
||||
show | Persistent agent
🗑
|
||||
show | Non-persistent or dissolvable agent
🗑
|
||||
show | Legal hold
🗑
|
||||
show | Deep Packet Inspection (DPI)
🗑
|
||||
List of requirements, Device/type requirements, Environment limitations, Equipment limitations, Compatability requirements, Wired/Wireless considerations, Security considerations | show 🗑
|
||||
A network of (typically) far flung routers and servers that provide , via QoS and other tools, sufficient bandwidth for VTC. | show 🗑
|
||||
Old VTC standard that ran over 128kb ISDN. This protocol employed aggressive compression and delivered decent VTC systems all over the world. Not based on IP address and although still some in use they are hard to integrate. | show 🗑
|
||||
The underlying architecture that allows all QoS to work. | show 🗑
|
||||
The cornerstone of Differentiated services are two pieces that go into every IP header on every piece of data and make up the Differentiated Services Field: ___________ and _______________. | show 🗑
|
||||
show | DSCP field
🗑
|
||||
show | ECN (explicit congestion notification)
🗑
|
||||
show | 00 - Not QoS aware
10 - aware, no congestion
01 - aware, no congestion
11 - QoS aware, congestion encountered
🗑
|
||||
show | ICS (Industrial control system)
🗑
|
||||
show | input/output functions (I/O) on the machine, a controller, an interface for the operator
🗑
|
||||
show | DCS (Distributed control system)
🗑
|
||||
System designed for large scale, distributed processes such as power grids, pipelines and railroads. | show 🗑
|
||||
show | RTU (remote terminal unit)
🗑
|
||||
In a distributed control system (DCS), what is the control or computer that operators interact with controllers through called? | show 🗑
|
||||
show | Identify the problem. This includes gathering information, questioning users, duplicate problem (if possible), identify symptoms. determine if anything has changed on the network, and approach multiple problems individually.
🗑
|
||||
The second step of the troubleshooting process | show 🗑
|
||||
The third step of the troubleshooting process, after Establishing a theory of probable cause | show 🗑
|
||||
The fourth step in the troubleshooting process after testing your theory to determine the cause. | show 🗑
|
||||
The fifth step in the troubleshooting process after Establishing a Plan of Action and Identifying Potential Effects | show 🗑
|
||||
The sixth step of the troubleshooting process after Implementing a Solution | show 🗑
|
||||
The last step in the troubleshooting process | show 🗑
|
||||
show | ping -6
🗑
|
||||
Command to ping a host in Linux/UNIX using it's IPv6 address | show 🗑
|
||||
show | tracert -6
🗑
|
||||
Windows command that combines the features of tracert and ping | show 🗑
|
||||
This command shows network statistics about a system including information such as listening ports and established connections. Available in every OS. | show 🗑
|
||||
netstat -a netstat -b netstat -e | show 🗑
|
||||
show | -f displays FQDN for foreign addresses
-n shows addresses and ports in numerical format
-o shows the owning process ID (PID) associated with each connection
🗑
|
||||
netstat -p netstat -r netstat -s | show 🗑
|
||||
netstat -t netstat | show 🗑
|
||||
show | Nbtstat
🗑
|
||||
nbtstat -n | show 🗑
|
||||
nbtstat -A nbtstat -a | show 🗑
|
||||
show | nbtstat -c lists NBT's cache of remote machine names and their IP addresses
nbtstat -n lists LOCAL NetBIOS names
🗑
|
||||
show | nbtstat -R purges and reloads the remote cache name table
🗑
|
||||
This CLI utility provides an interface for diagnosing DNS problems. This command works on all OSes. | show 🗑
|
||||
Utility found in all OSes, helps diagnose problems with IP to MAC resolution. | show 🗑
|
||||
arp -a | show 🗑
|
||||
Remote servers accessible with a web browser that contain common collections of diagnostic tools such as ping and tracert, plus some BGP query tools. | show 🗑
|
||||
Hardware or software tool that monitors the different protocols running at different layers on the network. A good one will give you application, session, transport, network and data link layer information on every frame going through your network. | show 🗑
|
||||
Device (hardware or software running on a laptop or mobile device) that looks for an documents all existing wireless networks in the area. Useful for diagnosing wireless network issues and conducting site surveys. | show 🗑
|
||||
show | Line tester
🗑
|
||||
show | Certifier or Cable certifier
🗑
|
||||
Cable tester that can tell you the length of a cable and where a break or short is located (if one exists) | show 🗑
|
||||
WAP antenna: Omnidirectional | show 🗑
|
||||
WAP antenna: Unidirectional | show 🗑
|
||||
WAP antenna: Patch | show 🗑
|
||||
WAP that you can access directly and configure singularly via its own interface is called a ______________________. | show 🗑
|
||||
A WAP that can only be configured through a wireless controller | show 🗑
|
||||
Protocol used by most WAP manufacturers to allow interoperability between APs and controllers of different manufacturers. | show 🗑
|
||||
Network troubleshooting: Tool used to detect shorts/opens, continuity issues | show 🗑
|
||||
When a signal is sent down one wire pair in a UTP cable and a device on the sending end detects interference. | show 🗑
|
||||
Sending signal down one twisted wire pair and detect interference on the opposite end of the cable. | show 🗑
|
||||
show | Split pair - can be diagnosed with many cable testers including TDRs
🗑
|
||||
When one end is terminated as a 568A and the other end is accidentally terminated as a 568B | show 🗑
|
||||
When your networks packets are so large that they must be fragmented to fit into your ISPs packets. | show 🗑
|
||||
Method of determining the best MTU setting automatically, by sending multiple ICMP packets varying in size from larger to smaller with DF set and waiting until a response is received. | show 🗑
|
||||
show | MTU black hole
🗑
|
||||
show | Vendor neutral protocol - Link Aggregation Control Protocol (LACP) Cisco has it's own proprietary Port Aggregation Protocol (PAgP)
🗑
|
||||
Example of a NIC teaming misconfiguration | show 🗑
|
||||
show | Could be a misconfigured ACL. Check for permit any statement and make sure that no statements follow permit any because they will never be reached.
🗑
|
||||
show | Split Horizon
🗑
|
||||
show | Service Level Agreement (SLA)
🗑
|
||||
A document that defines an agreement between two parties in situations where a legal contract wouldn't be appropriate. Defines duties the parties commit to perform for each other and a time frame. | show 🗑
|
||||
show | multi-source agreement (MSA)
🗑
|
||||
show | Statement of work (SOW)
🗑
|
||||
show | 68 degrees and less than 50%
🗑
|
||||
show | goodput
🗑
|
||||
If an 802.11b device joins an 802.11n traffic drops to ___________ speeds. | show 🗑
|
||||
802.11n legacy mode | show 🗑
|
||||
802.11n mixed mode or high throughput mode | show 🗑
|
||||
802.11n greenfield mode | show 🗑
|
||||
802.3af | show 🗑
|
||||
Original PoE supported ______ watts of DC power. | show 🗑
|
||||
802.3at | show 🗑
|
||||
show | 25.5
🗑
|
||||
show | 5 GHz
🗑
|
||||
This can be used to break up the broadcast domains on very large wireless network using an extended service set. | show 🗑
|
||||
Cisco's software for monitoring it's routers and switches | show 🗑
|
||||
show | Static NAT (SNAT)
🗑
|
||||
show | Dynamic NAT
🗑
|
||||
show | Port address translation (PAT)
🗑
|
||||
show | eBGP
🗑
|
||||
show | iBGP
🗑
|
||||
Unlike Distance vector and Link state routing protocols, that only store the next hop for a destination, this routing protocol stores the entire path to the destination network and is classified as a path vector protocol. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
douros05
Popular Computers sets