is 460 practice
Anycast
A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission
C
In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____ network
KVM switch
In order to simplify console access to computers in a rack, what device is typically used to provide a central portal for all devices on the rack?
IP
In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and Web server?
True
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
Noise
One of the most common transmission flaws affecting data signals is ____.
False
Only Class B and Class C networks can be subnetted.
multicast distribution
What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?
SSTP
What protocol below is a Microsoft proprietary protocol first available in Windows Vista?
0-1023
What range of ports is referred to as the "well-known" range of ports?
logic bomb
What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?
Syslog
What utility in Linux provides standards for generating, storing, and processing messages about events on a system?
CIFS (Common Internet File System)
What version of SMB can be used across Windows, UNIX, and other operating systems?
ADSL
What xDSL standard is the most popular?
42U
What is the industry standard for rack height in rack units?
622.08 Mbps
What is the maximum amount of throughput provided by an OC-12?
Bot
A ____ is a program that runs automatically, without requiring a person to start or stop it.
True
A hexadecimal number is a number written in the base 16 number system.
AD
A routing protocol's reliability and priority are rated by what measurement?
5060
A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?
A trunk port
A single switch can manage traffic belonging to several VLANs on a single interface, by configuring the interface as what option below?
Network
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
True
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
Trojan horse
Fake logon screen on a system will most probably be a result of downloading and installing:
they are resistant to noise such as EMI.
Fiber-optic cable networks can span much longer distances than copper-based networks before requiring repeaters because
4
How many bytes are used for an IPv4 address?
4 data streams
How many data streams are used in 802.11ac Wave 2 devices?
bridge ID (BID)
STP selects the root bridge based on what option below?
Presentation
Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read
Fibre Channel iSCSI
Select the two Transport Layer protocols that are used by SANs (Select 2):
Broadband
Since cable TV and cable Internet can share the same coaxial cable, they are considered to be what type of technology?
DoS attack
Smurf attack is an example of: (Select best answer)
TCP
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
False
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions
File and print services
The first services widely used by networks were:
True
The first step in asset management is to inventory all the components on the network.proprietary source code When performing inventory on software packages, which of the following is not something that should be inventoried?
160 bit
The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?
Phishing
The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?
False
The protocol data unit for the Physical layer of the OSI model is payload, or data.
Transport layer
The segment or datagram protocol data unit exists at what layer of the OSI model?
maintenance window
The time period in which a change can be implemented is known as what option below?
10Base2
What Ethernet standard below is also referred to as "thinnet"?
split horizon
What Layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface?
Checksum
What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission?
19 inches and 23 inches
What are the two primary standard widths for rack systems?
It broadcasts communication from one chat room participant to others
What characteristic of the IRC protocol makes it an effective way to spread viruses and worms quickly?
ipconfig /all
What command below can be used to display a complete summary of all network interfaces in a Windows computer?
KVM switch
What device provides a central control portal for all devices on a rack?
Root servers
What devices are the highest authorities in the domain name system hierarchy?
data link connection identifier
When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frames to?
control frames
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
MIMO
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?
RTU
Which ICS component senses attributes of the physical system and converts analog data to digital data, but cannot control the physical system?
802.11i
Which IEEE standard specifies security mechanisms for wireless networks?
Application
Which OSI model layer initiates the flow of information?
Presentation
Which OSI model layer manages data encryption?
half duplex
Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?
peer-to-peer
Which network model ensures that no computer on the network has more authority than another?
Participating in a company-wide video conference via the Internet
Which of the following applications would be best suited to multicasting?
MT-RJ
Which of the following connectors is the most common for multimode fiber?
host-only mode
Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network
TCP port 53 UDP port 53
Which of the following ports are used by DNS?
802.11n
Which of the following wireless standards offers highest connection speeds?
VRRP
Which protocol assigns a virtual IP to a group of routers?
TCP
Which protocol's header would a Layer 4 device read and process?
BGP
Which routing protocol does an exterior router use to collect data to build its routing tables?
TIA/EIA 568 Commercial Building Wiring Standard
Which standard is also known as structured cabling?
SMTP is a connection-based protocol that uses TCP
Which statement actually describes SMTP?
Networks enable multiple users to share resources
Which statement describes an advantage of networks?
Channel bonding Frame aggregation
Which two of the following techniques help to reduce overhead in 802.11n wireless transmission?
CWDM
Which type of multiplexing is defined by wavelength instead of frequency?
Connectionless
Which type of protocol is useful when data must be transferred quickly?
Communications
Which type of service supports e-mail?
DOCSIS 3
Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?
The client/server network can be more easily expanded.
Your colleague, in describing the benefits of a client/server network, mentions that it's more scalable than a peer-to-peer network. What does she mean by this?
UDP
___ is more efficient than TCP for carrying messages that fit within one data packet.
Frame aggregation
____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.
802.11a
____ is the least popular WLAN standard.
ring topology
In what type of topology is each site connected to two other sites, providing redundancy?
When viewing a movie on the Web
In which of the following situations would it be most desirable to use a connectionless Transport layer protocol?
Top listeners
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
True
PPP can support several types of Network layer protocols that might use the connection
Natas
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
legal hold
Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?
Convergence
Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:
Hypervisor
What is the software that allows you to define VMs and manage resource allocation and sharing among them?
Static route
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Session Layer
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
UTM (Unified Threat Management)
What of the following features does not distinguish an NGFW from traditional firewalls?
Port 161
What port do SNMP agents listen on?
GSM CDMA
What two competing standards exist for cell phone networks?
Authentication Header (AH) Encapsulating Security Payload (ESP)
What two different types of encryption can be used by IPSec during data transfer?
hop limit TTL
What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?
MAC address 2 byte priority field
What two items below make up a Bridge ID?
POP3 IMAP4
What two mail delivery protocols below can be used by a client application to receive e-mail from a server?
PBX private branch exchange
What two terms below are used to describe a telephone switch that connects and manages calls within a private organization?
True
Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer