370 456,789
Which of the following is NOT a good reason to segment a network?
To increase the number of networking devices on a network
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Trunk
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual switch
Which remote file access protocol is an extension of SSH?
Which remote file access protocol is an extension of SSH?
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
evil twin
A routing protocol's reliability and priority are rated by what measurement?
AD
Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?
ANT+
Which routing protocol does an exterior router use to collect data to build its routing tables?
BGP
Which transmission characteristic is never fully achieved?
Bandwidth
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Bluejacking
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
Cat 6a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
Which Bluetooth class has the highest power output?
Class 1
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisoning
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
When a router can't determine a path to a message's destination, where does it send the message?
Default gateway
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
Leading up to the year 2020, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2020. What type of threat was this?
Logic bomb
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
At which OSI layer does IP operate?
Network Layer
What do well-chosen subnets accomplish?
Network documentation is easier to manage.
Which OSI layer is responsible for directing data from one LAN to another?
Network layer
Which remote access protocol is used over an Ethernet network?
PPoE
What cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?
Phishing
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
Posture assessment
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Rouge AP
Which of the following is considered a secure protocol?
SSH
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Static route
What is the Internet standard MTU?
1,500
How many bits of a Class A IP address are used for host information?
24
NAT mode
2n - 2 = Z
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
8
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
Which IEEE standard determines how VLANs work on a network?
802.1Q
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHHS
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat