Network+ 10-009 exam objectives

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/225

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

226 Terms

1
New cards

What are the first three steps in the troubleshooting methodology?

Identify the problem, Gather information, Question users.

2
New cards

What is the purpose of duplicating the problem in the troubleshooting process?

To confirm the issue being faced.

3
New cards

What should you consider when establishing a theory of probable cause?

Question the obvious and consider multiple approaches.

4
New cards

What does the 'top-to-bottom' approach in troubleshooting refer to?

Analyzing from application layer down to the physical layer in the OSI model.

5
New cards

What is the next step if the theory of probable cause is confirmed?

Determine next steps to resolve the problem.

6
New cards

What does 'document findings' entail in the troubleshooting process?

Recording outcomes, actions taken, and any lessons learned throughout troubleshooting.

7
New cards

What is one common cable issue that may be encountered?

Incorrect cable type, such as using single mode instead of multimode.

8
New cards

What is signal degradation in the context of network issues?

Loss of signal quality due to factors like crosstalk, interference, or attenuation.

9
New cards

What are the effects of improper termination in network cabling?

Can lead to network connectivity issues or data loss.

10
New cards

What can increasing interface counters indicate?

Potential issues such as CRC errors, runts, giants, or drops.

11
New cards

What does it mean if a port is marked as 'error disabled'?

The port has been disabled due to an error condition.

12
New cards

What is Power over Ethernet (PoE)?

A technology allowing Ethernet cables to deliver power to connected devices.

13
New cards

What troubleshooting issue could arise from a power budget exceeded in PoE?

Powering issues or malfunctioning devices due to insufficient power.

14
New cards

How do network loops impact a network?

They can cause broadcast storms and network slowdowns.

15
New cards

What role does the root bridge play in Spanning Tree Protocol (STP)?

It serves as the primary reference point for the network topology.

16
New cards

What problems can incorrect VLAN assignments cause?

Disruption of traffic flow and communication between devices.

17
New cards

What does 'address pool exhaustion' mean?

Running out of available IP addresses in a DHCP scope.

18
New cards

What is a common indicator of packet loss?

Reduced application performance and potential timeouts.

19
New cards

What does jitter refer to in network performance?

Variation in packet delay which can affect voice and video quality.

20
New cards

What can cause wireless signal degradation?

Interference, channel overlap, or physical obstructions.

21
New cards

What are two types of tools used in troubleshooting network issues?

Software tools (e.g., protocol analyzers) and hardware tools (e.g., cable testers).

22
New cards

What is the purpose of a protocol analyzer?

To analyze network traffic and identify issues at the protocol level.

23
New cards

How can you verify a network's connectivity using command line tools?

Using commands like ping, traceroute, or nslookup.

24
New cards

What is the function of a Wi-Fi analyzer?

To assess wireless network performance and identify issues.

25
New cards

What does 'latency' measure in a network?

The delay before a transfer of data begins following an instruction.

26
New cards

What does 'throughput capacity' refer to?

The maximum amount of data that can be transferred over a network in a given time.

27
New cards

What command would you use to see the MAC address table on a device?

show mac-address-table.

28
New cards

What does 'subnet mask' determine in an IP address?

Defines the network portion and host portion of the IP address.

29
New cards

In terms of bandwidth, what does 'bottlenecking' mean?

A point in the network where the data flow is severely limited.

30
New cards

What can cause a client to disassociate from a wireless network?

Interference, signal loss, or user-initiated action.

31
New cards

What does a signal strength mismatch in transceivers signify?

Potential connectivity issues due to incompatible devices.

32
New cards

What is the main purpose of a cable tester?

To check the integrity and performance of network cabling.

33
New cards

What does 'administratively down' mean for a network interface?

The interface is manually disabled by an administrator.

34
New cards

Why is it important to establish a plan of action during troubleshooting?

To provide a structured approach to resolving the identified issues.

35
New cards

What is required to confirm if symptoms are replicated during troubleshooting?

Duplicate the problem if possible.

36
New cards

What should be done if the troubleshooting theory is not confirmed?

Establish a new theory or escalate the issue.

37
New cards

What does it mean if an IP address is duplicated in a network?

Two devices are configured with the same IP, leading to conflicts.

38
New cards

What is the function of 'show interface' command on a networking device?

To display the status and configuration of network interfaces.

39
New cards

What does a router's 'routing table' contain?

All the routes known to the router and their associated metrics.

40
New cards

How can 'congestion/contention' affect network performance?

It can lead to slowed performance and increased latency.

41
New cards

What is 'dig' used for in troubleshooting?

To query DNS information.

42
New cards

What troubleshooting might be necessary for insufficient wireless coverage?

Evaluating access point placement and possible interference.

43
New cards

What does the term 'channel overlap' refer to in wireless networking?

When multiple access points use the same frequency channels.

44
New cards

What is one potential effect of improper cabling on a network?

Signal degradation leading to connectivity issues.

45
New cards

What is an acceptable way to test the network speed?

Using a speed tester.

46
New cards

How do you identify the root cause of network performance issues?

By analyzing performance metrics and network traffic patterns.

47
New cards

What might 'transposed transmitter and receiver' indicate?

Cabling issues where TX and RX lines are incorrectly connected.

48
New cards

What does the 'ACL' acronym stand for in network troubleshooting?

Access Control List.

49
New cards

Why document the troubleshooting process?

To ensure learning and to maintain a record for future reference.

50
New cards

What are the two types of encryption mentioned in network security?

Data in transit and Data at rest.

51
New cards

What is the role of Public Key Infrastructure (PKI)?

It manages digital certificates and public-key encryption.

52
New cards

What does IAM stand for in network security?

Identity and Access Management.

53
New cards

What is multifactor authentication (MFA)?

A security mechanism that requires two or more verification factors.

54
New cards

What is Remote Authentication Dial-in User Service (RADIUS)?

A networking protocol that provides centralized Authentication, Authorization, and Accounting.

55
New cards

What does LDAP stand for?

Lightweight Directory Access Protocol.

56
New cards

What is the purpose of Security Assertion Markup Language (SAML)?

To enable Single Sign-On (SSO) across different domains.

57
New cards

What is role-based access control (RBAC)?

A method of regulating access to computer or network resources based on the roles of individual users.

58
New cards

Define geofencing in network security.

A security feature that creates virtual boundaries to allow or restrict access based on geographic location.

59
New cards

What type of security does physical security encompass?

Security measures like cameras and locks.

60
New cards

What is a honeypot?

A security resource whose value lies in being probed, attacked, or compromised.

61
New cards

What does CIA triad stand for in security terminology?

Confidentiality, Integrity, and Availability.

62
New cards

What is the purpose of the Payment Card Industry Data Security Standards (PCI DSS)?

To set requirements for organizations that handle cardholder information.

63
New cards

What is Data locality?

Regulatory requirement for data to remain within a specific geographic boundary.

64
New cards

What is a common impact of a Denial-of-Service (DoS) attack?

Service disruption that causes users to be unable to access the network.

65
New cards

What is VLAN hopping?

An attack that allows an attacker to access traffic on a VLAN that they are not authorized to access.

66
New cards

What is Address Resolution Protocol (ARP) poisoning?

A technique used to send false ARP messages over a local area network.

67
New cards

What does DNS poisoning do?

Corrupts the cache of a DNS server to direct users to malicious sites.

68
New cards

What is an evil twin attack?

A rogue Wi-Fi access point that mimics a legitimate one to steal personal information.

69
New cards

What is shoulder surfing?

Gaining information such as passwords by observing someone while they enter it.

70
New cards

What is the role of device hardening?

To secure a device by reducing its surface of vulnerability.

71
New cards

What does NAC stand for?

Network Access Control.

72
New cards

What does port security do in networking?

Controls the access to a port by restricting which devices can connect.

73
New cards

What is MAC filtering?

A security method used to allow or deny network access based on MAC addresses.

74
New cards

What is an Access Control List (ACL)?

A set of rules that controls network traffic and defines which users or systems are granted access.

75
New cards

What does URL filtering do?

Blocks access to specific web addresses as a security measure.

76
New cards

What is the difference between trusted and untrusted zones in a network?

Trusted zones have more security measures in place compared to untrusted zones.

77
New cards

Define screened subnet.

A network segment that is placed between an internal network and an external network to enhance security.

78
New cards

What is social engineering in terms of network security?

Manipulating individuals into divulging confidential information.

79
New cards

What is phishing?

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.

80
New cards

Explain dumpster diving.

Searching through physical waste to find confidential information.

81
New cards

What is tailgating in the context of security?

Gaining unauthorized access to a restricted area by following someone with authorized access.

82
New cards

What are the potential consequences of a malware infection?

Data breaches, financial loss, and damage to reputation.

83
New cards

What is time-based authentication?

An authentication method that is time-sensitive, often requiring access at specific times.

84
New cards

What is the purpose of least privilege in access control?

To ensure that users have the minimum level of access necessary.

85
New cards

What can be a consequence of rogue devices in a network?

Unauthorized access and potential data breaches.

86
New cards

What is a honeynet?

A network of honeypots used to lure attackers to observe their techniques.

87
New cards

What does BYOD stand for?

Bring Your Own Device.

88
New cards

Describe the purpose of key management in network security.

To manage cryptographic keys for secure communications and data protection.

89
New cards

What is content filtering?

A method to prevent access to unwanted or harmful content on the internet.

90
New cards

What is a distributed denial-of-service (DDoS) attack?

An attack using multiple compromised systems to flood a target with traffic.

91
New cards

What are some examples of deception technologies?

Honeypots and honeynets designed to trap intruders.

92
New cards

What is the significance of audits in network security?

To assess compliance with regulations and identify security vulnerabilities.

93
New cards

What is physical device hardening?

Measures taken to secure physical devices from tampering or unauthorized access.

94
New cards

What is a malware type?

Software designed to disrupt, damage, or gain unauthorized access to systems.

95
New cards

What is the purpose of documentation in network operations?

To create physical and logical diagrams, including rack diagrams, cable maps, and network diagrams.

96
New cards

What are the layers included in network diagrams?

Layer 1, Layer 2, and Layer 3.

97
New cards

What does asset inventory include?

It includes hardware, software, licensing, and warranty support.

98
New cards

What is IP address management (IPAM)?

It is the administration of DNS and DHCP, including the planning and management of IP address space.

99
New cards

What is a service-level agreement (SLA)?

A contract that defines the service provider's expected level of service.

100
New cards

What does life-cycle management cover?

It covers processes like end-of-life (EOL), end-of-support (EOS), and software management.