IT Questions and Answers :)

Friday, December 22, 2017

WPA Enterprise is also known as:

WPA Enterprise is also known as:

  • 802.11g
  • 802.11a
  • 802.1X
  • 802.1R 
WPA Enterprise is also known as:

EXPLANATION

WPA Enterprise is more properly known as 802.1X, the IEEE standard that specifies this port-based access control.
Share:

Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

  • Static
  • EIGRP
  • RIP
  • OSPF 
Which of the following would NOT be an ideal route information sharing method in a mixed-brand networked environment?

EXPLANATION

EIGRP is a Cisco proprietary protocol that often isn't supported by all other hardware vendors.
OSPF would be the best alternative if using mixed-brand equipment since it is universally well supported.
Share:

In relation to Network Switches, what is the purpose of the spanning tree algorithm?

In relation to Network Switches, what is the purpose of the spanning tree algorithm?

  • To help ensure that messages will arrive over all possible paths.
  • To provide a path between every LAN segment.
  • To discover a "loop free" topology and provide, as possible, a path between every pair of LAN's
  • To keep routing updates from being transmitted onto the same port on which they were received. 

 
In relation to Network Switches, what is the purpose of the spanning tree algorithm?

EXPLANATION

The spanning tree algorithm is a requirement in meshed transparent bridging. As a transparently bridged frame contains no record of the path it has taken, and contains no mechanism for aging, any bridge loop will result in storms of packets continually circulating around the loop. By providing a loop-free path between any two points in the network, the spanning tree algorithm prevents these storms. A form of this algorithm is also used for Explorer control in source-route bridges.

Share:

Wednesday, December 6, 2017

What is the difference between TACACS+ and RADIUS?

What is the difference between TACACS+ and RADIUS?

  •  TACACS+ encrypts the entire packet and RADIUS does not.
  • TACACS+ uses UDP transport protocol and RADIUS uses TCP.
  • RADIUS is defined by Cisco and TACACS+ is RFC 2865.
  • RADIUS encrypts the entire packet and TACACS+ does not. 
What is the difference between TACACS+ and RADIUS?

 

EXPLANATION


TACACS+ uses Transmission Control Protocol (TCP) port 49 to communicate between the TACACS+ client and the TACACS+ server. An example is a Cisco switch authenticating and authorizing administrative access to the switch’s IOS CLI. The switch is the TACACS+ client, and Cisco Secure ACS is the server.
One of the key differentiators of TACACS+ is its ability to separate authentication, authorization and accounting as separate and independent functions. This is why TACACS+ is so commonly used for device administration, even though RADIUS is still certainly capable of providing device administration AAA.
Device administration can be very interactive in nature, with the need to authenticate once, but authorize many times during a single administrative session in the command-line of a device. A router or switch may need to authorize a user’s activity on a per-command basis. TACACS+ is designed to accommodate that type of authorization need.   As the name describes, TACACS+ was designed for device administration AAA, to authenticate and authorize users into mainframe and Unix terminals, and other terminals or consoles.
TACACS+ communication between the client and server uses different message types depending on the function. In other words, different messages may be used for authentication than are used for authorization and accounting. Another very interesting point to know is that TACACS+ communication will encrypt the entire packet.

SOURCE

http://www.networkworld.com/article/2838882/radius-versus-tacacs.html
Share:

Friday, November 24, 2017

What is the minimum size of the IPv6 packet header?

What is the minimum size of the IPv6 packet header?


  • 40 octets
  • 36 octets
  • 32 octets
  • 48 octets             
What is the minimum size of the IPv6 packet header?

EXPLANATION

The IPv6 packet header has a minimum size of 40 octets. Options are implemented as extensions. This provides the opportunity to extend the protocol in the future without affecting the core packet structure.
RFC 2460; Internet Protocol, Version 6 (IPv6) Specification, S. Deering, R. Hinden (December 1998)
https://en.wikipedia.org/wiki/IPv6
Share:

Thursday, November 23, 2017

Which of the following are two authentic public DNS server addresses?

Which of the following are two authentic public DNS server addresses?

  • 8.8.8.8 & 8.8.4.4
  • 8.8.2.2 & 8.8.4.4
  • 8.8.8.8 & 8.8.2.2
  • 8.8.8.8 & 8.8.8.7 
Which of the following are two authentic public DNS server addresses?

 

EXPLANATION

The two public DNS Server Addresses of 8.8.8.8 and  8.8.4.4 are Googles Public DNS Servers that are free for use.
Share:

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

  • Up to 25.5 W
  • Up to 31.41592 W
  • > 9000 mW
  • 1.21 GW 

 
Power over Ethernet describes any of several standardized systems which pass electric power along with data on twisted pair Ethernet cabling. How much power does the updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus provide?

EXPLANATION

The updated IEEE 802.3at-2009[7] PoE standard also known as PoE+ or PoE plus, provides up to 25.5 W of power.
https://en.wikipedia.org/wiki/Power_over_Ethernet
Share:

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

  • MPLS
  • ICMP
  • PPP
  • LACP 

 
With respect to the OSI Reference model layers, which protocol is referred to as a layer 2.5 protocol?

EXPLANATION

MPLS is a scalable, protocol-independent transport. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular OSI model data link layer (layer 2) technology, such as Asynchronous Transfer Mode (ATM), Frame Relay, Synchronous Optical Networking (SONET) or Ethernet, and eliminate the need for multiple layer-2 networks to satisfy different types of traffic. MPLS belongs to the family of packet-switched networks.
MPLS operates at a layer that is generally considered to lie between traditional definitions of OSI Layer 2 (data link layer) and Layer 3 (network layer), and thus is often referred to as a layer 2.5 protocol.

SOURCE

http://it.toolbox.com/blogs/intruder-detection/mpls-and-the-osi-reference-model-where-does-mpls-fit-in-50920
Share:

Convert 101 from decimal to binary.

Convert 101 from decimal to binary.

  • 1010101
  • 1110111
  • 1011001
  • 1100101

 
Convert 101 from decimal to binary.

EXPLANATION

From right to left, each column represents double the last column starting with the number 1. So the answer: 1100101 represents from right to left: (1x1) + (0x2) + (1x4) + (0x8) + (0x16) + (1x32) + (1x64) = 101.
Share:

What is a WIFI pineapple?

What is a WIFI pineapple?

  • A access point that looks like a pineapple
  • It is a hacking / security testing device.
  • A pineapple with the top cut off
  • A network connected pineapple 
What is a WIFI pineapple?

 

EXPLANATION

The WIFI pineapple is a device that will allow security testers to preform WIFI man-in-the-middle/ rogue AP testing.

SOURCE

https://hakshop.com/products/wifi-pineapple?variant=11303862021
Share:

Which of the following is not a classless routing protocol?

Which of the following is not a classless routing protocol?

  • IGRP
  • OSPF
  • RIPv2
  • EIGRP 

 
Which of the following is not a classless routing protocol?

EXPLANATION

The Interior Gateway Routing Protocol (IGRP) is a Cisco proprietary technology which has been superseded by the Enhanced Interior Gateway Routing Protocol (EIGRP).  Among its enhancements over IGRP is support for Variable Length Subnet Masks (VLSM), which is required for "classless routing".
Open Shortest Path First (OSPF) is a standard supported by most, if not all, router makers; it has always supported classless routing features.
Routing Information Protocol (RIP) version 1 did not include support for VLSM; version 2 added this support.

Share:

Popular Posts