Security
Network Architecture
Concepts
Operations
Troubleshooting
100

The system that detects network intrusion attempts and controls access to the network for the intruders.

What is IPS (Intrusion Prevention System)?

100

The wireless communications mode that enables wireless devices to communicate directly with each other.

What is ad hoc?
100

A document that is regularly updated to show who is in possession of an organization's loaned hardware.

What is an asset management document?

100

What are the two most important environmental factors for a datacenter? 

What is humidity?

What is temperature?

100

The first step in any troubleshooting problem.

What is establishing a theory of probable cause?

200

In PKI, this is the entity that signs a certificate.

What is the issuer?

200

The type of cable needed to connect a notebook computer to the console port on the router.

What is a rollover cable?

200

An organization's VLANs operate across several switches, and all the users on a VLAN have this in common.

What is broadcast domain?

200

The frequency band used in an 802.11a network.

What is 5 GHz?

200

The primary purpose of a VPN concentrator.

What is terminating VPN tunnels?

300

Implementing an independent network within your private LAN, you can limit the groups and users have to the independent with this type of network.

What is a VLAN (virtual local area network)?

300

A process that can translate internal network IP addresses to external ones.

What is NAT (Network address translation)?

300

This wireless standard provides the shortest range and the most non-overlapping channels to prevent interference.

What is 802.11a?

300

In preventative maintenance, this allows you to schedule the replacement of a component at a convenient time rather than waiting for it to fail at an inopportune time. 

What is MTBF (Mean time between failures)?

300

Documenting the minimum level of security for all network devices will provide this.

What are standards?

400

The well-known port that can be blocked to prevent users on the internet from using HTTP to connect to computers on an organization's network.

What is port 80?

400

This topology uses various connections to increase redundancy. 

What is mesh topology?

400

An attack that involves the use of multiple computers with the purpose of denying legitimate access to a critical server.

What is a DDoS (Distributed Denial-of-service) attack?
400

Your PC is receiving an IP address that is not part of the DHCP scope, and can no longer access network resources; name the type of address being assigned.

What is APIPA (Automatic Private IP Addressing)?

400

Two of these devices can could interference with an 802.11b 2.4-GHz WLAN. Identify them.

- Microwave Ovens 

- Cordless phones

- Electrical wiring 

- Cable TV cabling 

What is a microwave oven?

What is a cordless phone?

500

The command used to configure a firewall and filter packets on a Linux system.

What is iptables?

500

The tool used to secure a CAT5e cable to a 110 block.

What is a punch down tool?

500

A router that is not correctly routing packets based on IP addresses operates under this layer of the OSI model.

What is the network layer?

500

A network using the Open Shortest Path First (OSPF) routing protocol uses this metric for optimal path calculation.

What is cost?
500

The name of the issue that describes the latency experienced from workstations with 1Gb NICs (Network Interface Card) that are connected to 100Mb ports on the switch.

What is a speed and duplex mismatch?