Network Security and Configuration Quiz
49 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which software tool would BEST assist a technician in finding all the devices connected within a network?

  • Packet sniffer
  • Performance monitor
  • Configuration manager
  • Network scanner (correct)

A technician should configure DHCP snooping to prevent unintended connections on a network switch.

False (B)

What standard 802.11 frequency range should a technician consider for a high-density wireless network to maximize channels?

5 GHz

To track and document various types of known vulnerabilities, one would typically use a __________.

<p>vulnerability management tool</p> Signup and view all the answers

Match the network security configurations with their correct purposes:

<p>DHCP snooping = Validates IP address assignments Geofencing = Restricts access based on geographic location Port security = Prevents unauthorized device connections Secure SNMP = Secures network management protocols</p> Signup and view all the answers

What is the best configuration method to limit connections for a switch located in a public area?

<p>Implementing port security (D)</p> Signup and view all the answers

The 2.4 GHz frequency range supports a higher number of channels compared to the 5 GHz frequency range.

<p>False (B)</p> Signup and view all the answers

What is a common approach to mitigating RF interference in a wireless network?

<p>Using different channels within the same frequency band</p> Signup and view all the answers

Which document would BEST support the management team in ensuring unnecessary modifications to the corporate network are not permitted?

<p>Change Management Policy (B)</p> Signup and view all the answers

East-West traffic in a datacenter typically involves traffic between servers within the same network segment.

<p>True (A)</p> Signup and view all the answers

What should a technician check if a network switch stops responding when the logging level is set to debugging?

<p>CPU utilization</p> Signup and view all the answers

A technician is deploying a wireless network with 30 WAPs broadcasting the same SSID. This deployment is BEST described as a __________ network.

<p>flat</p> Signup and view all the answers

Match the following types of network traffic with their descriptions:

<p>East-West = Traffic between servers within the same datacenter North-South = Traffic between networks and the internet Broadcast = Traffic sent to all devices in a network segment Unicast = Traffic sent to a specific device</p> Signup and view all the answers

Which of the following is MOST likely to generate significant East-West traffic in a datacenter?

<p>Database replication (D)</p> Signup and view all the answers

Debugging logging levels always improve the performance of network devices.

<p>False (B)</p> Signup and view all the answers

What term refers to the presence of multiple Access Points broadcasting the same SSID in a wireless network?

<p>SSID overlapping</p> Signup and view all the answers

Which subnet mask option is the most voted?

<p>255.255.254.0 (C)</p> Signup and view all the answers

A CNAME record is used to redirect clients to a corporate organization page.

<p>True (A)</p> Signup and view all the answers

What would be the BEST way to improve video conferencing performance?

<p>Quality of service</p> Signup and view all the answers

The LAST rule that should be applied in a firewall is called an implicit _______.

<p>deny</p> Signup and view all the answers

What type of DNS record should be created for redirecting a company's address?

<p>CNAME (B)</p> Signup and view all the answers

Port security should be the last rule implemented in a firewall configuration.

<p>False (B)</p> Signup and view all the answers

What is the purpose of packet shaping?

<p>To manage network traffic and ensure efficient bandwidth usage.</p> Signup and view all the answers

Match the following networking terms with their functions:

<p>Quality of Service = Prioritizes network traffic CNAME = Domain redirection Implicit Deny = Blocks all non-allowed traffic Packet Shaping = Manages bandwidth usage</p> Signup and view all the answers

Which of the following IP addresses falls within the subnet range of 10.1.2.0?

<p>10.1.2.10 (A), 10.1.2.25 (B), 10.1.2.31 (C)</p> Signup and view all the answers

The SOA record is primarily used for managing email servers.

<p>False (B)</p> Signup and view all the answers

What does TTL stand for in DNS records?

<p>Time to Live</p> Signup and view all the answers

The __ standard is used in wireless networks for managing multiple simultaneous client access.

<p>CSMA/CA</p> Signup and view all the answers

Match the following DNS record types with their purposes:

<p>A = Maps a domain name to an IP address MX = Routes emails to the correct mail servers TXT = Provides human-readable text information about a domain SOA = Indicates the authoritative information about a domain</p> Signup and view all the answers

Which of the following options would help a technician keep track of equipment changes?

<p>Asset tags (C)</p> Signup and view all the answers

A network administrator should choose CSMA/CD for a wireless network.

<p>False (B)</p> Signup and view all the answers

What is a common type of cyberattack that encrypts user data requiring backups for recovery?

<p>Ransomware</p> Signup and view all the answers

Which method will a network administrator MOST likely use to ensure smooth video delivery?

<p>Jumbo frames (B)</p> Signup and view all the answers

Traffic shaping is used to reduce overhead and increase efficiency on a SAN.

<p>False (B)</p> Signup and view all the answers

What should be implemented to stop a rogue access point without physical removal?

<p>Port security</p> Signup and view all the answers

A large frame size in networking is referred to as _______.

<p>jumbo frames</p> Signup and view all the answers

Which option can be configured to reduce overhead on a SAN?

<p>Jumbo frames (D)</p> Signup and view all the answers

A network topology where all Internet-bound traffic exits through a main datacenter is considered a centralized topology.

<p>True (A)</p> Signup and view all the answers

What is the primary purpose of port security in a network?

<p>To restrict unauthorized access to the network</p> Signup and view all the answers

Match the following network security measures with their primary functions:

<p>Port security = Restricts unauthorized devices from accessing the network Traffic shaping = Manages data transmission rates Jumbo frames = Reduces overhead by increasing frame size Wireless client isolation = Prevents client devices from communicating with each other on the network</p> Signup and view all the answers

Which network topology is often characterized as the most voted option?

<p>Hub-and-spoke (B)</p> Signup and view all the answers

Using tcpdump is the best tool for conducting a cloud security assessment.

<p>False (B)</p> Signup and view all the answers

What is the most appropriate tool to assess a cloud server's security by identifying exposed protocols?

<p>nmap</p> Signup and view all the answers

The LAN interface configuration for NAT with PAT would best be suited with the address _____

<p>172.23.0.0/16</p> Signup and view all the answers

What is the primary purpose of the value assigned to a packet in a network?

<p>To ensure it does not traverse indefinitely (C)</p> Signup and view all the answers

Match the following IP address ranges with their respective CIDR notation:

<p>172.15.0.0 = /18 172.18.0.0 = /10 172.23.0.0 = /16 172.28.0.0 = /8</p> Signup and view all the answers

An IP scanner is the best option for analyzing the WAN network addressing of a cloud server.

<p>False (B)</p> Signup and view all the answers

Which of the following options is NOT suitable for the LAN interface in NAT with PAT?

<p>172.15.0.0/18 (B)</p> Signup and view all the answers

Signup and view all the answers

Flashcards

Network Discovery Tool

A software tool used to identify all devices connected to a network.

5 GHz 802.11 Frequency Range

The standard 802.11 frequency range with the most available channels to minimize interference in a high-density wireless network.

Port Security

A security feature on network switches that restricts access to specific ports by limiting the number of MAC addresses allowed to connect.

Vulnerability Database

A database that stores information about known vulnerabilities, helping security professionals track and manage risks.

Signup and view all the flashcards

SNMP (Simple Network Management Protocol)

A network protocol that enables communication between a network management system and network devices.

Signup and view all the flashcards

Geofencing

A process of limiting access to a network based on geographical location.

Signup and view all the flashcards

DHCP Snooping

A security feature on network switches that ensures only legitimate DHCP servers can provide IP addresses to clients.

Signup and view all the flashcards

Switch Configuration for Unintended Connections

The ability to configure a network switch to block unauthorized connections, typically used in publicly accessible areas.

Signup and view all the flashcards

What does TTL stand for in DNS records and how does it impact website access?

The Time To Live (TTL) value in a DNS record determines how long a DNS resolver should cache the record before it needs to be refreshed from the authoritative DNS server.

Signup and view all the flashcards

What does an MX record specify?

An MX record (Mail Exchanger record) is a type of DNS record that specifies the mail server responsible for handling email for a particular domain.

Signup and view all the flashcards

Which type of DNS record is used to store arbitrary text information?

A TXT record (Text record) is a type of DNS record that allows you to store arbitrary text information associated with a domain.

Signup and view all the flashcards

What does a SOA record provide information about?

A SOA record (Start of Authority record) is a type of DNS record that provides information about the authoritative DNS server for a zone.

Signup and view all the flashcards

Which media access control protocol is used in wireless networks to avoid collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a media access control protocol used in wireless networks. It allows multiple devices to share the same wireless channel without causing collisions by using carrier sensing and backoff mechanisms.

Signup and view all the flashcards

What is the purpose of asset tags?

Asset tags are unique identifiers attached to physical assets, such as computers, servers, and network devices. They help track the location, ownership, and maintenance history of the assets.

Signup and view all the flashcards

Change Management Policy

A configuration document used to enforce network infrastructure modifications and track changes.

Signup and view all the flashcards

East-West Traffic

East-West traffic within a data center occurs primarily between servers, virtual machines, or services located on the same physical network. Think of it as communication between devices within the same building or campus.

Signup and view all the flashcards

Network Switch Logging Levels

A network switch can be configured to log events at different verbosity levels. Debugging logs typically capture detailed information that can strain device resources.

Signup and view all the flashcards

What is a wireless network with multiple Access Point (APs) with same SSID called?

Deploying multiple wireless access points (WAPs) with the same network name (SSID) is a common approach to create a seamless wireless network. It lets devices automatically connect without manually selecting an access point.

Signup and view all the flashcards

Version Control

The process that ensures software updates are applied in a controlled manner and keeps track of changes made to the network.

Signup and view all the flashcards

North-South Traffic

This type of network traffic travels between different locations or segments of a network, such as between data centers or between buildings.

Signup and view all the flashcards

Network Throughput

A metric that measures the amount of data being processed by a network device, indicating its capacity and efficiency.

Signup and view all the flashcards

Resource Exhaustion

When a network device experiences intermittent problems, they may be caused by resource exhaustion. This often happens when the device is trying to process excessive data or perform many operations simultaneously.

Signup and view all the flashcards

CNAME Record

A type of DNS record that provides an alias for a hostname, mapping it to another hostname. It can be used to redirect clients to a different website or server when a company is acquired.

Signup and view all the flashcards

Quality of Service (QoS)

A feature that prioritizes specific network traffic, ensuring high-quality service for applications like video conferencing.

Signup and view all the flashcards

Port Mirroring

A technique used to replicate network traffic to a separate device for analysis and troubleshooting.

Signup and view all the flashcards

Implicit Deny Rule

A firewall rule that blocks any traffic not explicitly allowed by preceding rules. It's typically the last rule in a firewall configuration.

Signup and view all the flashcards

Packet Shaping

A technique for shaping network traffic to prioritize specific applications or users, often used to improve video conferencing quality.

Signup and view all the flashcards

Link Aggregation

A method of combining multiple physical network interfaces into a single logical interface, increasing bandwidth and fault tolerance.

Signup and view all the flashcards

Jumbo Frames

A technique that allows network devices to use larger Ethernet frames (up to 9000 bytes) for more efficient data transfer. This is especially beneficial for applications like video streaming that require large amounts of data.

Signup and view all the flashcards

Star Topology

A type of network topology where all devices are connected to a central hub or switch. This allows for easy communication between devices but can become a bottleneck if there is heavy traffic.

Signup and view all the flashcards

Traffic Shaping

The process of limiting the bandwidth available to specific network protocols or applications, preventing them from consuming all of the network's capacity.

Signup and view all the flashcards

Wireless Access Point (WAP)

A network device that amplifies and forwards wireless signals, extending the range of a wireless network.

Signup and view all the flashcards

Hub-and-spoke topology

A network topology where devices connect to a central hub, which then forwards data to other devices. Think of a wheel with spokes radiating outwards.

Signup and view all the flashcards

Mesh topology

A network topology where devices connect directly to each other, creating multiple paths for data to travel. Think of a mesh of interconnected nodes.

Signup and view all the flashcards

Switch-based network

A network topology where devices connect to a central switch, which then forwards data to other devices based on MAC addresses. It's often used in LAN environments.

Signup and view all the flashcards

Security assessment

A security assessment technique that aims to identify and analyze potential vulnerabilities and weaknesses in a network or system. It helps assess security risk levels and provides recommendations for improvement.

Signup and view all the flashcards

PAT (Port Address Translation)

A network address translation technique that allows multiple devices on a private network to share a single public IP address. It conserves public IP address space and enhances security.

Signup and view all the flashcards

ICMP scan

A type of network scan that uses the ICMP protocol to identify active hosts on a network. It can be used to map a network and find devices.

Signup and view all the flashcards

Port Scanner

A tool used to identify open ports on a network host. It can help identify services running on a host and assess potential vulnerabilities.

Signup and view all the flashcards

Study Notes

N10-008 Exam Questions - Study Notes

  • WiFi Performance Improvement: A systems administrator needs to improve Wi-Fi performance in a dense office building. With a mix of 2.4 GHz and 5 GHz devices, selecting 802.11ax is the best option for latest standard.

  • MAC Spoofing Detection: Internet Control Message Protocol (ICMP), Reverse Address Resolution Protocol (RARP), Dynamic Host Configuration Protocol (DHCP), and Internet Message Access Protocol (IMAP) are protocols used in networking. Reverse Address Resolution Protocol (ARP) is best for detecting MAC spoofing attacks.

  • Jitter Troubleshooting: A technician troubleshooting high jitter on a wireless network, with variations in latency using ping, should utilize a spectrum analyzer.

  • Wireless Connectivity Issues: Wireless users reporting intermittent internet connectivity with web authentication requiring reconnection, the cause is likely a session timeout configuration on the captive portal's settings.

  • Network Attacks: Tailgating is a security attack that involves physically following someone through a secured location. A network administrator prevented this security attack by stopping the unknown person and directing the person to security.

  • Wireless Network Setup: A wireless network setup simulation involves configuring three Access Points (APs) and one switch. The SSIDs should be "CorpNet" using the key "S3cr3t!". The wireless signals shouldn't interfere, the subnet should support a maximum of 30 connected devices, and the APs should only support TKIP clients at maximum speed for efficient setup.

  • CRC Errors: CRC errors during network communication indicates a problem on the Layer 2 of the OSI model which is often related to cabling.

  • VM Performance Issues: A sudden increase in 100 VM users caused performance issues. Metrics like CPU usage and memory will provide an accurate analysis of the underlying performance issues.

  • DHCP Exhaustion: When DHCP scope is exhausted, the administrator should reduce the lease time to avoid creating a new DHCP pool.

  • IPv6 and MAC Addresses: The switch feature MOST likely used to assist in scripting to log IPv6 and MAC addresses on a network segment is Neighbor Discovery Protocol (NDP).

  • DNS Records: A CNAME record in DNS acts as an alias for another record.

  • Network Connectivity: Troubleshooting internet connectivity issues in a new building that's connected to the LAN via fiber optic cable, the administrator should correct the DNS server entries in the DHCP scope to resolve the internet access issue.

  • Fiber Optic Cable Issues: A fiber optic cable connection problem was most likely caused by reversed TX/RX (transmit/receive) connections.

  • Finding Network Devices: Using the MAC table on a network switch is the BEST way for a technician to locate a device's network port.

  • Server Redundancy: Network Interface Card (NIC) teaming provides redundancy on a file server to ensure continued connection to the LAN in case of a port failure on a switch.

  • Content Delivery Networks: Content Delivery Networks (CDNs) are a technology that help optimize speeds and reduce latency for global content distribution.

  • Network Troubleshooting First Steps: Asking users about the specific changes made to the network is the recommended FIRST step in troubleshooting a network issue.

  • Cable Crossover: Using MDIX on the switch can resolve the cable crossover issue with vendor certified cables.

  • Network Monitoring Tool: IP scanner is the best network tool for finding devices on a network.

  • Wireless Network Channel Configuration: The technician should use 5GHz for configuring high density wireless networks to help reduce interference. A 5GHz network will allow for more channels to be used.

  • Network Switch Configuration: Configuring DHCP snooping on a switch in a public location can help prevent unintended network connections.

  • Vulnerability Tracking Tools: Common Vulnerabilities and Exposures (CVE) is used to track various types of known vulnerabilities.

  • Password Policies Two-factor authentication and complex passwords are recommended policies to mitigate brute-force password attacks.

  • Network Bandwidth Increase Using Multipathing, NIC teaming, Load Balancing, or Clustering on the server is best way to increase server bandwidth. This is achieved by connecting two network cables on the switch stack and ensuring correct configuration on the switch interfaces.

  • Network Device Configuration Commands: Validating network settings on a Linux device to match the 192.168.0.0/20 network block can be accomplished by using the 'ifconfig' or 'ip' command to get a detailed network configuration.

  • Biggest MTU for an Ethernet Frame: The biggest MTU for a standard Ethernet frame is 1500.

  • Command Line Networking Tools: The command-line tool 'netstat' shows the status of network connections and processes.

  • Troubleshooting Network Errors: Checking for errors on a network can include verifying the cable (by replacing cables), the switch (by verifying its functions), and the device (by confirming it is properly configured).

  • Network Troubleshooting: Using a bottom-up approach will help in efficiently troubleshooting network issues which starts from basic connectivity checks to more complex issues, such as checking for a rogue DHCP server or a misconfigured subnet mask.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on network security configurations, wireless standards, and best practices for device management. This quiz covers essential concepts for technicians in the field, including DHCP snooping and RF interference mitigation strategies.

More Like This

Wireless Networking &amp; Security Quiz
10 questions
Network Management and Security
10 questions
Networking Chapter 7: Connecting Devices
29 questions
Use Quizgecko on...
Browser
Browser