IS 4440

¡Supera tus tareas y exámenes ahora con Quizwiz!

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

The Border Gateway Protocol is considered to be a hybrid routing protocol.

True

What is NOT one of the ways in which networks are commonly segmented?

by device manufacturer

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?

fail-close

What routing metric affects a path's potential performance due to delay?

latency

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

mean time between failures (MTBF)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

online UPS

What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?

ping

Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?

router-on-a-stick

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?

service-level agreement

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

star topology

An interface that manages traffic from multiple VLANs is known by what term?

trunk or tag port

What occurs when a collision happens on a network?

Each node on the network waits a random amount of time and then resends the transmission.

All that is needed to provide communication between two VLANs is a DHCP relay agent.

False

An unmanaged switch can still support the creation of VLANs, provided there is an interface for configuration.

False

ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.

False

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

Internet SCSI (iSCSI)

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

At what layer of the OSI model do the 802.11 standards vary?

Physical layer

In a software defined network, what is responsible for controlling the flow of data?

SDN controller

What mail protocol is used to send mail messages to a server?

SMTP

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

What statement regarding main distribution frame or main distribution facilities is accurate?

The MDF is the centralized point of interconnection for an organization's LAN or WAN.

You have been tasked with the creation and design of a network that must support a minimum of 4000 hosts. How many bits do you need for the host portion?

12-May be

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

24

A highly available server is available what percentage of the time?

99.999%

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service

Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

In planning for disaster recovery, what is the ultimate goal?

The continuation of business.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split.

What is by far the most popular DNS server software available?

BIND

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

False

IPv4 and IPv6 use the same packet format.

False

Network segmentation decreases both performance and security on a network.

False

Only Class B and Class C networks can be subnetted.

False

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPsec

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

What is distributed switching?

It is a single distributed vSwitch that can service VMs across multiple hosts.

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows-based operating systems to share files.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

True

Equipment data racks most commonly are a standard width of what measurement?

19 inches

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

True

The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

True

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

VNC is open source, allowing companies to develop their own software based on VNC.

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

IPv6 addressing does not utilize classful addressing, therefore every IPv6 address is classless.

True

The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

A hexadecimal number is a number written in the base 16 number system.

True

After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.

True

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

clustering

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?

entrance facility


Conjuntos de estudio relacionados

Chapter 2 : Family-Centered Community-Based Care

View Set

Chapter 7: Communicating In Social And Professional Relationships

View Set

Processes of cell division, differentiation, and specialization

View Set

Excel Lesson 11 Securing & Sharing Workbooks review

View Set

MKTG Ch. 11: Developing & Managing Products

View Set

Intermediate Micro Economics Chapter 2 #1

View Set