Cist 1401 Final Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?

Hypervisor

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?

Load balancer

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

Separation of duties

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

At what layer of the OSI model do proxy servers operate?

Layer 7

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static route

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

Which IEEE standard determines how VLANs work on a network?

802.1Q

Which of the following is considered a secure protocol?

SSH(Secure Shell)

How many bits of a class A IP address are used for host information?

24 bits

What is the formula for determining the number of possible hosts on a network?

2h - 2 = Z

Which formulas can be used to calculate the magic number? Choose two.

2h, 256 - the interesting octet

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?

8 bits

A routing protocol's reliability and priority are rated by what measurement?

AD(Active Directory)

Which of the following is not one of the AAA services provided by RADIUS and TACACS+?

Administration

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?

Application data

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?

BGP(Border Gateway Protocol)

Which device would allow an attacker to make network clients use an illegitimate default gateway?

DHCP(Dynamic Host Configuration Protocol) server

What specifications define the standards for cable broadband?

DOCSIS(Data Over Cable Service Interface Specification)

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

DRDoS(Distributed Reflection Denial of Service attack) attack

What type of attack relies on spoofing?

Deauth attack

Which assignment technique requires a RADIUS server?

Dynamic VLAN(Virtual Local Area Network) assignment

When a router can't determine a path to a message's destination, where does it send the message?

Gateway of last resort

Which policy ensures messages are discarded when they don't match a specific firewall rule?

Implicit deny

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP(Lightweight directory access protocol)

Which of these cellular technologies offers the fastest speeds?

LTE-A

What information does the switchport port-security command use to restrict access to a switch's interface?

MAC(Media Access Control) address

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

With which network connection type does the VM obtain IP addressing information from its host?

NAT(Network Address Translation) mode

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA(non-disclosure agreement)

Which OSI layer is responsible for directing data from one LAN to another?

Network layer

Which cloud management technique executes a series of tasks in a workflow?

Orchestration

Which cloud service model gives software developers access to multiple platforms for testing code?

PaaS(Platform as a Service)

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.

Pen testing, Red team-blue team exercise

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

What information in a transmitted message might an IDS use to identify network threats?

Signature

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smartjack

What method does a GSM network use to separate data on a channel?

TDMA(Time-division multiple access)

Who is responsible for the security of hardware on which a public cloud runs?

The cloud provider

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Which type of switch connects all devices in a rack to the rest of the network?

ToR(Top of Rack) switch

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?

Virtual switch

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit https any any


Conjuntos de estudio relacionados

Sociology Research Methods Midterm 2

View Set

High Risk OB: Preterm Labor and Birth

View Set

Biology Chapter 19: Genes within populations

View Set

CH 33: Assessment and Management of Patients with Allergic Disorders

View Set

NUR 234 CH 18 personality disorder

View Set

Nursing 115 Comprehensive Study Guide 2

View Set

Chapter 17: Assisting With Grooming

View Set