Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Network+ N10-006 Exam Collection

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
/24   show
🗑
/25   show
🗑
show 255.255.255.192 4 networks 62 hosts  
🗑
/27   show
🗑
/28   show
🗑
show 255.255.255.248 32 networks 6 hosts  
🗑
show 255.255.255.252 64 networks 2 hosts  
🗑
/31   show
🗑
10GBaseSR   show
🗑
10GBaseSW   show
🗑
10GBaseLR   show
🗑
10GBaseLW   show
🗑
10GBaseER   show
🗑
show 40km SMF SONET  
🗑
show 10km  
🗑
10GBaseLX4 over multimode   show
🗑
10GBaseCX4   show
🗑
10GBaseT   show
🗑
IEEE 802.3   show
🗑
show Defines 1000BaseT - Gigabit Ethernet over four pairs of wires in CAT5E or better UTP cabling.  
🗑
IEEE 802.3z   show
🗑
1000BaseCX   show
🗑
IEEE 802.3ae   show
🗑
IEEE 802.3an   show
🗑
FTP   show
🗑
show TCP 23  
🗑
SSH   show
🗑
DNS   show
🗑
show UDP 67. 68 (servers use 67, clients 68)  
🗑
TFTP   show
🗑
SMTP   show
🗑
POP3   show
🗑
IMAP4   show
🗑
show TCP 137, 138, 139  
🗑
SMB   show
🗑
SNMP   show
🗑
RDP   show
🗑
show UDP 5004, 5005  
🗑
SIP   show
🗑
H.323   show
🗑
MGCP   show
🗑
show TCP Header  
🗑
Source port, Destination port, Length, Checksum   show
🗑
show IP Header  
🗑
Class A address range and number of hosts   show
🗑
Class B address range and number of hosts   show
🗑
show 192-223 192.0.0.0-223.255.255.255 254 hosts  
🗑
show 224-239 224.0.0.0-239.255.255.255 Multicast  
🗑
Class E   show
🗑
Class A private address range   show
🗑
Class B private address range   show
🗑
Class C private address range   show
🗑
IPv6 address   show
🗑
0:0:0:0:0:0:0:1 ::1   show
🗑
0:0:0:0:0:0:0:0 ::   show
🗑
show Unicast Multicast Anycast  
🗑
show Global unicast Link-local unicast  
🗑
show IPv6 address. Public and routable on the internet.  
🗑
show IPv6 address that's automatically assigned to a system and used only for communicating with other nodes on the link. (meaning network, subnet, LAN) Link local addresses always start with FE80.  
🗑
show Multicast Listener Discovery (MLD)  
🗑
Feature of ICMPv6. Replaces ARP from IPv4 by performing the same function. It's also responsible for finding the router, automatic address assignment and duplicate address detection, to name a few.   show
🗑
4to6   show
🗑
Type of routing protocol that uses distance and direction to find the best route to other routers. This type of protocol uses hop counts to determine metric. Router updates include the entire routing table.   show
🗑
show RIPv1, RIPv2, EIGRP (not on exam)  
🗑
show Link state  
🗑
show OSPF, IS-IS  
🗑
Category of routing protocol that autonomous systems use to communicate with each other.   show
🗑
Category that represents the routing protocols used within an autonomous system.   show
🗑
show RIPv1  
🗑
Old, outdated distance vector protocol. Added support for VLSMs and noncontiguous subnets. Should never be used.   show
🗑
show OSPF  
🗑
Link state alternative to OSPF. Very similar. Designed with IPv6 support from the beginning. Popular with ISPs.   show
🗑
show Route redistribution  
🗑
A number assigned to a routing protocol to allow routers to prefer one protocol over the other.   show
🗑
Routing protocol that can be used as an IGP and EGP   show
🗑
show This standard defines VLANs on an Ethernet network.  
🗑
Hypervisor that runs on top of an existing OS.   show
🗑
show Type 1 Hypervisor. VMware ESX.  
🗑
show PPTP (Point-to-Point Tunneling Protocol)  
🗑
Based on Microsoft's PPTP and Cisco's L2F protocols, this VPN technology combines features of PPTP and L2F. Moved service from Windows server to VPN concentrator. IPSec usually provides security.   show
🗑
This VPN protocol offers an advantage over other technologies because it requires no specific software on the client side. This VPN uses a web browser and SSL to secure the connection.   show
🗑
Most common type of VPN today. Used for site to site and client to site VPN connections. Operates at layer 3 of the OSI model. A major component of this technilogy is Encapsulation Security Payload (ESP) which deals with encryption and authentication.   show
🗑
Each 64Kbps channel in a DS1 signal is a _____>   show
🗑
T1 line speed and number of DS0 channels.   show
🗑
show 672 channels 44.736 Mbps  
🗑
E1 speed and number of DS0 channels.   show
🗑
show 512 channels 34.368 Mbps  
🗑
show 51.85 Mbps  
🗑
The first generation of packet switching technology. It enabled remote devices to communicate with eachother across high-speed digital links without the expense of individual leased lines.   show
🗑
10000000   show
🗑
show 192  
🗑
show 224  
🗑
11110000   show
🗑
show 248  
🗑
show 252  
🗑
show 254  
🗑
show RJ48C  
🗑
show Wavelength Division Multiplexing (WDM) or the newer more popular version Dense WDM (DWDM), which can support up to 150 signals at nearly 7.77 gigabytes per second.  
🗑
Similar to DWDM, this technology also relies on wavelengths of light to carry a fast signal over long distances of fiber. Simpler than DWDM, limiting it's practical distance to 60km.   show
🗑
show Frame Relay. T-carriers have low error rates. Higher level protocols are responsible for error detection and correction. Now being replaced by ATM and MPLS.  
🗑
show Asynchronous Transfer Mode (ATM). Still being used, but on it's way out as it's slowly being replaced with MPLS.  
🗑
Newer technology to replace Frame Relay and ATM. Designed for use with TCP/IP protocol. This technology adds a label that site between the L2 header and L3 information. Layer 3 is always IP, so label sits in front of IP header.   show
🗑
show MPLS  
🗑
show Forwarding Equivalence Class (FEC) (MPLS)  
🗑
show Label switching router (LSR) (MPLS router)  
🗑
An MPLS router that has the job of adding MPLS labels to incoming packets that do not yet have a label.   show
🗑
show Label Distribution Protocol (LDP)  
🗑
Feature of MPLS that functions as a fully functional connection to your network used to connect two customer locations.   show
🗑
show Bit error rate test (BERT)  
🗑
show 'metro-Ethernet'. Ethernet over SMF getting speeds up to 100Gb/s with DWDM capable switches.  
🗑
show Modem  
🗑
Device that takes eight-bit wide digital data and hands it to the modem in one bit wide digital data for conversion to analog.   show
🗑
The current standard for modems.   show
🗑
show Integrated Services DIgital Network (ISDN).  
🗑
show B (bearer) channels. Remember that a B channel is a DS0 channel (64kbps)  
🗑
show D (delta) channel.  
🗑
show Basic rate interface (BRI).  
🗑
show Primary rate interface (PRI)  
🗑
show 18,000 feet  
🗑
DSL that provides equal upload and download speeds of up to 15Mbps.   show
🗑
show Asymmetric DSL (ADSL)  
🗑
show VDSL (Very High Bitrate DSL). Some carriers use fiber to extend the distance (Verizon FiOS, AT&T U-Verse)  
🗑
Device housed at the CO that connects multiple customers to the internet.   show
🗑
show PPPoE (ponit-to-point protocol over Ethernet)  
🗑
show Global System for Mobile (GSM) Original version was a 2G standard.  
🗑
show EDGE (Enhanced Data Rates for GSM Evolution)  
🗑
show Code division multiple access (CDMA). Original CMDA was a 2G technology.  
🗑
show Evolved High-Speed Packet Access (HSPA+)  
🗑
802.16 wireless standard.   show
🗑
show Long Term Evolution (LTE)  
🗑
Citrix Remote terminal standard that defines how terminal information is passed between the server and the client. The basis of Microsoft's original Terminal Services.   show
🗑
show Virtual Network Computing (VNC)  
🗑
Protocol that handles the initiation, setup and delivery of VoIP sessions. There are two protocols, both run on top of RTP.   show
🗑
show Real Time Streaming Protocol (RTSP)  
🗑
show Real Time Streaming Protocol. TCP 554  
🗑
show SONET  
🗑
This WAN technology supports throughput up to 39.8Gbps as defined in the OC-768 standard.   show
🗑
show Business Continuity Plan (BCP)  
🗑
The following are examples of ______________ _____________. A file server, single web server, single printer, edge router.   show
🗑
A tool designed by Microsoft to test individual systems for vulnerabilities.   show
🗑
show Nessus and OpenVAS (free open source version of Nessus)  
🗑
Aircrack-ng   show
🗑
show Metasploit, Arimitage (front end GUI version of Metasploit), Kali Linux.  
🗑
reflective DDoS   show
🗑
Smurf attack   show
🗑
A friendly, or unintentional DoS   show
🗑
PDoS (permanent DoS)   show
🗑
ARP cache poisoning   show
🗑
show Taking advantage of a protocol and using it in ways that it was not designed to be used in order to create a threat.  
🗑
The way (software or methods)and exploit takes advantage of a vulnerability.   show
🗑
New attacks using vulnerabilities that haven't yet been identified (or fixed)   show
🗑
show SLIP (serial line internet protocol)  
🗑
Series of standards developed by the NSA that handles methods of preventing RF emanation with special shielding including wall coverings, window film, etc.   show
🗑
show jamming  
🗑
show Evil twin.  
🗑
show Bluejacking  
🗑
Using weaknesses in the Bluetooth standard to steal information from other Bluetooth devices.   show
🗑
show RC4  
🗑
show Initialization vector (IV)  
🗑
3 WEP flaws that make it an insecure, obsolete protocol   show
🗑
Name two switch hardening techniques   show
🗑
show DHCP snooping  
🗑
show Dynamic ARP inspection (DAI)  
🗑
show Security policy  
🗑
This protocol was designed as an upgrade to SSL.   show
🗑
Authentication and encryption protocol suite that works at the internet/network layer and should be come the dominant authentication and encryption protocol suite as IPv6 continues to roll out.   show
🗑
show IPsec Transport Mode  
🗑
IPsec mode where the entire packet is encrypted and then placed into an IPsec endpoint, where it is encapsulated inside another IP packet.   show
🗑
show SFTP  
🗑
Wireless protocol that works by adding an extra layer of security (TKIP) around the WEP encryption scheme.   show
🗑
Wireless standard that amended 802.11 standard to add much needed security features. Adding 802.1X using EAP and replacing RC4 with AES.   show
🗑
show Password Authentication Protocol (PAP), and Challenge Handshake Authentication Protocol (CHAP)  
🗑
Authentication method included in PPP that simply transmits the username and password over the connection in plaintext.   show
🗑
Safer authentication method included with PPP. Relies on hashes based on a shared secret, usually a password that both ends of the connection know.   show
🗑
show MSCHAP  
🗑
Authentication protocol for TCP/IP networks with many clients all connecting to a single authenticating server. Uses a Key Distribution Center (KDC) with two processes; Authentication Server (AS) and Ticket Granting Service (TGS).   show
🗑
Key Distribution Center (KDC)   show
🗑
show 10 hours  
🗑
A one way mathematical function that is run on a string of binary digits of any length that results in a value of some fixed length (often called a checksum or message digest)   show
🗑
show Secure Hash Algorithm (SHA) includes SHA-1, SHA-2 (which includes SHA-256, SHA-512 variants) and soon to be finalized SHA-3  
🗑
show Extensible Authentication Protocol (EAP)  
🗑
show EAP  
🗑
show TACACS+ (Terminal Access Controller Access Control System Plus)  
🗑
show Security guards and mantraps  
🗑
show UTM (unified threat management)  
🗑
show Virtual Wire firewall  
🗑
show Network Access Control (NAC)  
🗑
Cisco's version of Network Access Control, can dictate that specific criteria must be met before allowing a node to connect with to a secure network. Devices that don't meet requirements can be made to connect to an alternate network or shunted.   show
🗑
show Posture assessment  
🗑
show Persistent agent  
🗑
show Non-persistent or dissolvable agent  
🗑
show Legal hold  
🗑
show Deep Packet Inspection (DPI)  
🗑
List of requirements, Device/type requirements, Environment limitations, Equipment limitations, Compatability requirements, Wired/Wireless considerations, Security considerations   show
🗑
A network of (typically) far flung routers and servers that provide , via QoS and other tools, sufficient bandwidth for VTC.   show
🗑
Old VTC standard that ran over 128kb ISDN. This protocol employed aggressive compression and delivered decent VTC systems all over the world. Not based on IP address and although still some in use they are hard to integrate.   show
🗑
The underlying architecture that allows all QoS to work.   show
🗑
The cornerstone of Differentiated services are two pieces that go into every IP header on every piece of data and make up the Differentiated Services Field: ___________ and _______________.   show
🗑
show DSCP field  
🗑
show ECN (explicit congestion notification)  
🗑
show 00 - Not QoS aware 10 - aware, no congestion 01 - aware, no congestion 11 - QoS aware, congestion encountered  
🗑
show ICS (Industrial control system)  
🗑
show input/output functions (I/O) on the machine, a controller, an interface for the operator  
🗑
show DCS (Distributed control system)  
🗑
System designed for large scale, distributed processes such as power grids, pipelines and railroads.   show
🗑
show RTU (remote terminal unit)  
🗑
In a distributed control system (DCS), what is the control or computer that operators interact with controllers through called?   show
🗑
show Identify the problem. This includes gathering information, questioning users, duplicate problem (if possible), identify symptoms. determine if anything has changed on the network, and approach multiple problems individually.  
🗑
The second step of the troubleshooting process   show
🗑
The third step of the troubleshooting process, after Establishing a theory of probable cause   show
🗑
The fourth step in the troubleshooting process after testing your theory to determine the cause.   show
🗑
The fifth step in the troubleshooting process after Establishing a Plan of Action and Identifying Potential Effects   show
🗑
The sixth step of the troubleshooting process after Implementing a Solution   show
🗑
The last step in the troubleshooting process   show
🗑
show ping -6  
🗑
Command to ping a host in Linux/UNIX using it's IPv6 address   show
🗑
show tracert -6  
🗑
Windows command that combines the features of tracert and ping   show
🗑
This command shows network statistics about a system including information such as listening ports and established connections. Available in every OS.   show
🗑
netstat -a netstat -b netstat -e   show
🗑
show -f displays FQDN for foreign addresses -n shows addresses and ports in numerical format -o shows the owning process ID (PID) associated with each connection  
🗑
netstat -p netstat -r netstat -s   show
🗑
netstat -t netstat   show
🗑
show Nbtstat  
🗑
nbtstat -n   show
🗑
nbtstat -A nbtstat -a   show
🗑
show nbtstat -c lists NBT's cache of remote machine names and their IP addresses nbtstat -n lists LOCAL NetBIOS names  
🗑
show nbtstat -R purges and reloads the remote cache name table  
🗑
This CLI utility provides an interface for diagnosing DNS problems. This command works on all OSes.   show
🗑
Utility found in all OSes, helps diagnose problems with IP to MAC resolution.   show
🗑
arp -a   show
🗑
Remote servers accessible with a web browser that contain common collections of diagnostic tools such as ping and tracert, plus some BGP query tools.   show
🗑
Hardware or software tool that monitors the different protocols running at different layers on the network. A good one will give you application, session, transport, network and data link layer information on every frame going through your network.   show
🗑
Device (hardware or software running on a laptop or mobile device) that looks for an documents all existing wireless networks in the area. Useful for diagnosing wireless network issues and conducting site surveys.   show
🗑
show Line tester  
🗑
show Certifier or Cable certifier  
🗑
Cable tester that can tell you the length of a cable and where a break or short is located (if one exists)   show
🗑
WAP antenna: Omnidirectional   show
🗑
WAP antenna: Unidirectional   show
🗑
WAP antenna: Patch   show
🗑
WAP that you can access directly and configure singularly via its own interface is called a ______________________.   show
🗑
A WAP that can only be configured through a wireless controller   show
🗑
Protocol used by most WAP manufacturers to allow interoperability between APs and controllers of different manufacturers.   show
🗑
Network troubleshooting: Tool used to detect shorts/opens, continuity issues   show
🗑
When a signal is sent down one wire pair in a UTP cable and a device on the sending end detects interference.   show
🗑
Sending signal down one twisted wire pair and detect interference on the opposite end of the cable.   show
🗑
show Split pair - can be diagnosed with many cable testers including TDRs  
🗑
When one end is terminated as a 568A and the other end is accidentally terminated as a 568B   show
🗑
When your networks packets are so large that they must be fragmented to fit into your ISPs packets.   show
🗑
Method of determining the best MTU setting automatically, by sending multiple ICMP packets varying in size from larger to smaller with DF set and waiting until a response is received.   show
🗑
show MTU black hole  
🗑
show Vendor neutral protocol - Link Aggregation Control Protocol (LACP) Cisco has it's own proprietary Port Aggregation Protocol (PAgP)  
🗑
Example of a NIC teaming misconfiguration   show
🗑
show Could be a misconfigured ACL. Check for permit any statement and make sure that no statements follow permit any because they will never be reached.  
🗑
show Split Horizon  
🗑
show Service Level Agreement (SLA)  
🗑
A document that defines an agreement between two parties in situations where a legal contract wouldn't be appropriate. Defines duties the parties commit to perform for each other and a time frame.   show
🗑
show multi-source agreement (MSA)  
🗑
show Statement of work (SOW)  
🗑
show 68 degrees and less than 50%  
🗑
show goodput  
🗑
If an 802.11b device joins an 802.11n traffic drops to ___________ speeds.   show
🗑
802.11n legacy mode   show
🗑
802.11n mixed mode or high throughput mode   show
🗑
802.11n greenfield mode   show
🗑
802.3af   show
🗑
Original PoE supported ______ watts of DC power.   show
🗑
802.3at   show
🗑
show 25.5  
🗑
show 5 GHz  
🗑
This can be used to break up the broadcast domains on very large wireless network using an extended service set.   show
🗑
Cisco's software for monitoring it's routers and switches   show
🗑
show Static NAT (SNAT)  
🗑
show Dynamic NAT  
🗑
show Port address translation (PAT)  
🗑
show eBGP  
🗑
show iBGP  
🗑
Unlike Distance vector and Link state routing protocols, that only store the next hop for a destination, this routing protocol stores the entire path to the destination network and is classified as a path vector protocol.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: douros05
Popular Computers sets