Switching
Routing
Protocols
Cyber Security
CompTIA A+
100
Define a switch

Device that forwards ethernet frames and connects devices on a LAN

100

Define a router

Device that forwards IP packets and connects different LANS together

100
What is SSH?

A protocol for encrypted remote access and file sharing

100
_ is used to authenticate a person using two or more ways

Multi-factor authentication

100

_ is the system that translates domain names to IP addresses? 

DNS
200

What is the difference between a layer 2 and layer 3 switch?

IP routing on L3 switches

200

A _ is used to store information about routes to a certain network

Routing table
200

What is Telnet? 

The same as SSH, but less secure because it is not encrypted.
200
Passwords should be stored by

Hashing the password and adding a little salt to the hash

200
What are the troubleshooting theory steps?
  • Identify the problem and define it well
  • Collect relevant information and analyze it
  • Establish a theory of probable cause and test it
  • Establish a plan of action and implement the solution
  • Verify full system functionality and implement preventive measures
  • Document findings, actions and outcomes
300

What is a VLAN?

Virtual local area network used to segment a LAN

300

What is a default gateway?

The way out of a network. Typically it is the IP address of the router on a network.
300

_ is used to combine multiple physical links into one logical link allowing the full bandwith of the network cables to be used.

EtherChannel

300

The most important thing in cyber security is ... 

To always be ethical and have a moral compass

300

Which of the following is NOT a type of firewall?

  • a. Circuit-level gateways
  •  b. Next-gen Firewalls
  •  c. 4G Firewalls
  •  d. Software Firewalls
  •  e. Hardware Firewalls
  •  f. Packet-filtering Firewalls

400

What will this command do? 

crypto key gen rsa

Create keys for encrypted remote access to the switch using SSH
400

1 10ms 6ms 7ms 10.1.191.254

This is the first line of output to what command?

Tracert 

400

You are handling a very angry, difficult and abusive customer. As a technical support staff how would you go about it?

Remain calm and not make situations personal
500

What is the command to save the running-config file?

copy running-configuration startup-configuration

500

Your IP address on your router is 1.1.1.1

Create a static route to 50.50.50.50 /24

Route

50.50.50.0 Network

255.255.255.0 SM

1.1.1.1 Next Hop

500

What is the protocol used to prevent network loops?

Spanning-Tree

500

What is a RAT?

Remote access trojan 

500

You are required to build a solution that will allow guests at your company’s headquarters to access the Internet via WiFi. Access to internal corporate network is prohibited.

However, the guest are required to sign off on the acceptable use policy before accessing the Internet. Which of the following can meet the stated requirements?

Install a captive portal