Extra Questions Flashcards

(24 cards)

1
Q

What is VTP?

A

The VLAN Trunk Protocol (VTP) is used to share VLAn information to all switches in a network. The VLAN can be configured on a VTP server for centralized config and management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can cause signal degradation?

A

Overcrowded channels, Interference, hardware damage or environmental factors.
NOTE: signal degradation is not equal to signal strength, its about the quality and integrity of the signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should an IDS/IPS alway be on the inside and the firewall on the outside?

A

The firewall can easily filter out the majority of bad traffic an IDS/IPS could be overwhelmed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the DNS server types: Recursive DNS server, Authoritative DNS server, Primary DNS server, Secondary DNS server

A

Recursive DNS server: Is the first server that usually gets user requests, its a server like the google DNS. If it doesnt know an IP it goes up to the authoritative, TLD or root server)
Authoritative DNS server: Holds definitive DNS records so the recursive server can request them in case it doesnt know an IP
Primary DNS server: The main authoritative server where the records are created.
Secondary DNS server: A backup of the primary server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is LACP? What is the IEEE standard?

A

The Link Aggregation Control Protocol (LACP) provides a method to control the bonding of several physical ports to form a single logical channel. The LACP is defined in the 802.3ad standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is LLDP?

A

The Link Layer Discovery Protocol (LLDP) is a vendor-neutral link layer protocol used by network devices for advertising their identity, capabilities, and neighbors like NDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between SSID & ESSID?

A

SSID is the name of a network with a single access point and ESSID is the ESSID is the name that describes all access points that are combined to a single network using the ESS configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the small difference between Tailgaiting and Piggybacking?

A

With tailgaiting the authorized person is not aware of the unauthorized person following him.

With piggybacking the authorized person is aware of the unauthorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the WiFi standard that incorporates mechanisms for dynamic frequency selection and transmit power control to make it suitable for environments where radar interference and interference with medical equipment is a concern?
What frequency band does it use?

A

802.11h and it uses 5GHz Band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an access control vestibule or mantrap?

A

Its a device that allows only a single person to enter when authenticated preventing tailgaiting and piggybacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the key difference between server and switch racks?

A

Switches and routers require better airflow management, while server racks are made for more dense configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a stub zone in DNS?

A

Stub zones contain only the necessary information to identify the authoritative DNS servers of a zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 3 technologies used by a captive portal to perform user redirection?

A

HTTP Redirect
ICMP Redirect
DNS Redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is FCoE?

A

Fiber Channel over Ethernet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DR and BCP?

A

DR (Disaster Recovery) & BCP (Business Continuity Planning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the command to purge the cached netbios name table used to resolve host names in a Windows-based network=

17
Q

What does Zero-trust require? (3 things)

A

All the time users, in- and outside need to be:
1. Authenticated
2. Authorized
3. Continuosly validated

18
Q

What is acceptable use policy (AUP)?

A

AUP sets guidelines as to how a system, network or website should be used

19
Q

How to hide your internal IP when connecting to a WAN/internet?

A

By using NAT.

20
Q

What is an OTDR/TDR?

A

An optical time domain reflectometer is used to find breaks in fiber cables, it allows to measure where the break is by sending a light pulse and measuring the time it needs.

A TDR is the same for copper cables.

21
Q

What is the metric used by OSPF/ISIS and what is the metric used by RIP?

A

OSPF/ISIS use Cost.

RIP uses Hop Count

22
Q

What is AP Isolation?

A

Access Point Isolation prevents mobile devices in a wireless network to communicate with each other.

23
Q

What is Beamforming?

A

Beamforming focuses wireless signals in specific directions to improve signal strength

24
Q

What to do if you want to block a specific URL but not the whole domain?

A

Instead of using an ACL entry, use the browsers group policy blocklist