We don't
Need no stinking
categories today
it's the
Final Countdown
100

You need to copy the traffic from a single port to a different port, but prevent bidirectional traffic on the port, so you use this feature of a managed switch

What is port mirroring?

100

This feature provides varying levels of network bandwidth based on the traffic type, usually associated with VOIP

What is QoS?

100

This technology provides centralized remote user authentication, authorization, and accounting, and also supports 802.1x port-based authentication

What is RADIUS?

100

You need to check for open circuits and short circuits on your network by using this diagnostic tool

What is a cable tester?

100

Your company has decided to implement either a 1000Base-LX or 1000-Base-SX network because they got a great deal on this kind of cable

What is fiber optic?

200

You need to perform some administrative maintenance on a Cisco router. You decide to connect your notebook computer to the console port on the router. You will use this kind of cable to make the connection to the console port (console cable is a correct answer but there is another name)

What is a Rollover cable?

200

You have several computers in your network that are located behind a firewall. The computers are unable to obtain a dynamic IP address from the DHCP server. You suspect that the firewall is configured to block the DHCP traffic. This single port must be open to allow this traffic.

What is Port 67?

200

This attack involves impersonating the identity of another host to gain access to privileged resources that are typically restricted

What is spoofing?

200

As a network administrator, you decide to replace a hub on your network with an active hub, which operates at this layer of the OSI model

What is layer 1? All network hubs are physical layer devices only

200

This entity is a neutral third party that retains encryption keys safely in case they need to be retrieved after a large data loss

What is a key escrow service?

300

While performing routine network maintenance, you discover that one device on your network is operating in half-duplex mode. All the other devices on your network operate in full-duplex mode. This is the effect of this mismatch between the devices.

What is slower communication?

300

You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped. This is the command you should use to accomplish this task in the most efficient manner.

What is traceroute?

300

A user is complaining that she cannot log on to the network server. This is the first thing you should check for when determining the scope of the issue.

What is do other people have network or are they having the same issue?

300

This is the process of identifying IoT and other devices that are not part of the core infrastructure so that hackers cannot use them to compromise an organization’s core network

What is Edge Discovery?

300

You have been tasked with establishing a standard operating procedure to mitigate the risk that can occur when a user customizes OS settings.  This mitigation technique would include establishing, deploying and then maintaining a standard configuration, such as an image

What is Configuration Enforcement?

400

You are nearing the completion of a project that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, now you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. You should do this first to attempt to remedy this.

What is delete the HOSTS file on each workstation?

400

You have several servers to which you would like access to be possible only from a designated administrative workstation. This is the name of the server that sits on the perimeter of your network that makes this possible.

What is a Jump Box?

400

This implementation of RADIUS includes methods for dealing with VoIP and wireless devices

What is Diameter?

400

This DNS record type includes SPF and DKIM records

What is TXT?

400

You are using the ipconfig tool to troubleshoot a problem with a wireless host. The results are shown below:

Adapter address: 00-10-4B-DE-F5-D8
IP address: 192.168.1.40
Subnet mask: 255.255.255.0
Default gateway: 0.0.0.0

You can access services on the local network from the host, but you cannot access the Internet. This is the most likely problem in this situation with the information at hand

What is a missing default gateway?

500

Explain API

This concept makes the deployment of automation and the programmability of networks possible, it's used to communicate between programs, Application Programming Interface

500

Explain an SDN

Software Defined Networking, a physical or virtual network that is defined by scripts and software, not physical hardware, including defining it's topology

500

Explain CDN

Content delivery network, replicates mostly streaming content to be close to where users access it from, responsible for local delivery of globally synchronized data

500

Explain Network Deception Technologies

What are honeynets, honeypots, honeyfiles, honeytokens, fake data and networks that are meant to look real to an outside attacker so that their behaviors can be logged and learned from as they attempt to attack your false targets.

500

Explain VLANs

Tags packets with the virtual network they belong to, segments networks logically independent of the physical topology

M
e
n
u