is 460 practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

Anycast

A(n) ____ address represents any one interface from a group of interfaces, any one of which can accept a transmission

C

In IPv4 addressing, an IP address whose first octet is in the range of 192-223 belongs to a Class ____ network

KVM switch

In order to simplify console access to computers in a rack, what device is typically used to provide a central portal for all devices on the rack?

IP

In the TCP/IP protocol suite, ____ is the core protocol responsible for logical addressing.

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and Web server?

True

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

Noise

One of the most common transmission flaws affecting data signals is ____.

False

Only Class B and Class C networks can be subnetted.

multicast distribution

What is the name for a client-server model with one server and many clients, such as when an application is used to watch a live sports event?

SSTP

What protocol below is a Microsoft proprietary protocol first available in Windows Vista?

0-1023

What range of ports is referred to as the "well-known" range of ports?

logic bomb

What type of virus are dormant until a specific condition is met, such as the changing of a file or a match of the current date?

Syslog

What utility in Linux provides standards for generating, storing, and processing messages about events on a system?

CIFS (Common Internet File System)

What version of SMB can be used across Windows, UNIX, and other operating systems?

ADSL

What xDSL standard is the most popular?

42U

What is the industry standard for rack height in rack units?

622.08 Mbps

What is the maximum amount of throughput provided by an OC-12?

Bot

A ____ is a program that runs automatically, without requiring a person to start or stop it.

True

A hexadecimal number is a number written in the base 16 number system.

AD

A routing protocol's reliability and priority are rated by what measurement?

5060

A server running the SIP protocol listens on what TCP/UDP port for unsecured communications?

A trunk port

A single switch can manage traffic belonging to several VLANs on a single interface, by configuring the interface as what option below?

Network

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

True

Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.

Trojan horse

Fake logon screen on a system will most probably be a result of downloading and installing:

they are resistant to noise such as EMI.

Fiber-optic cable networks can span much longer distances than copper-based networks before requiring repeaters because

4

How many bytes are used for an IPv4 address?

4 data streams

How many data streams are used in 802.11ac Wave 2 devices?

bridge ID (BID)

STP selects the root bridge based on what option below?

Presentation

Select the layer of the OSI model that is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read

Fibre Channel iSCSI

Select the two Transport Layer protocols that are used by SANs (Select 2):

Broadband

Since cable TV and cable Internet can share the same coaxial cable, they are considered to be what type of technology?

DoS attack

Smurf attack is an example of: (Select best answer)

TCP

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

False

The MD5 hashing algorithm is not susceptible to the possibility of hash collisions

File and print services

The first services widely used by networks were:

True

The first step in asset management is to inventory all the components on the network.proprietary source code When performing inventory on software packages, which of the following is not something that should be inventoried?

160 bit

The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and used a hash of what length?

Phishing

The process in which a person attempts to glean access for authentication information by posing as someone who needs that information is known as what option below?

False

The protocol data unit for the Physical layer of the OSI model is payload, or data.

Transport layer

The segment or datagram protocol data unit exists at what layer of the OSI model?

maintenance window

The time period in which a change can be implemented is known as what option below?

10Base2

What Ethernet standard below is also referred to as "thinnet"?

split horizon

What Layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or advertise, that same update on the same interface?

Checksum

What TCP field below allows the receiving node to determine whether a TCP segment is corrupted during transmission?

19 inches and 23 inches

What are the two primary standard widths for rack systems?

It broadcasts communication from one chat room participant to others

What characteristic of the IRC protocol makes it an effective way to spread viruses and worms quickly?

ipconfig /all

What command below can be used to display a complete summary of all network interfaces in a Windows computer?

KVM switch

What device provides a central control portal for all devices on a rack?

Root servers

What devices are the highest authorities in the domain name system hierarchy?

data link connection identifier

When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frames to?

control frames

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

MIMO

Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?

RTU

Which ICS component senses attributes of the physical system and converts analog data to digital data, but cannot control the physical system?

802.11i

Which IEEE standard specifies security mechanisms for wireless networks?

Application

Which OSI model layer initiates the flow of information?

Presentation

Which OSI model layer manages data encryption?

half duplex

Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?

peer-to-peer

Which network model ensures that no computer on the network has more authority than another?

Participating in a company-wide video conference via the Internet

Which of the following applications would be best suited to multicasting?

MT-RJ

Which of the following connectors is the most common for multimode fiber?

host-only mode

Which virtual network type allows VMs to communicate with each other on the same host, but disallows communication with other nodes on the network

TCP port 53 UDP port 53

Which of the following ports are used by DNS?

802.11n

Which of the following wireless standards offers highest connection speeds?

VRRP

Which protocol assigns a virtual IP to a group of routers?

TCP

Which protocol's header would a Layer 4 device read and process?

BGP

Which routing protocol does an exterior router use to collect data to build its routing tables?

TIA/EIA 568 Commercial Building Wiring Standard

Which standard is also known as structured cabling?

SMTP is a connection-based protocol that uses TCP

Which statement actually describes SMTP?

Networks enable multiple users to share resources

Which statement describes an advantage of networks?

Channel bonding Frame aggregation

Which two of the following techniques help to reduce overhead in 802.11n wireless transmission?

CWDM

Which type of multiplexing is defined by wavelength instead of frequency?

Connectionless

Which type of protocol is useful when data must be transferred quickly?

Communications

Which type of service supports e-mail?

DOCSIS 3

Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?

The client/server network can be more easily expanded.

Your colleague, in describing the benefits of a client/server network, mentions that it's more scalable than a peer-to-peer network. What does she mean by this?

UDP

___ is more efficient than TCP for carrying messages that fit within one data packet.

Frame aggregation

____ is an 802.11n network feature allowing the combination of multiple frames into one larger frame.

802.11a

____ is the least popular WLAN standard.

ring topology

In what type of topology is each site connected to two other sites, providing redundancy?

When viewing a movie on the Web

In which of the following situations would it be most desirable to use a connectionless Transport layer protocol?

Top listeners

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

True

PPP can support several types of Network layer protocols that might use the connection

Natas

Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

legal hold

Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

Convergence

Using the same network to deliver multiple types of communications services, such as video, voice, and fax, is known as:

Hypervisor

What is the software that allows you to define VMs and manage resource allocation and sharing among them?

Static route

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Session Layer

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

UTM (Unified Threat Management)

What of the following features does not distinguish an NGFW from traditional firewalls?

Port 161

What port do SNMP agents listen on?

GSM CDMA

What two competing standards exist for cell phone networks?

Authentication Header (AH) Encapsulating Security Payload (ESP)

What two different types of encryption can be used by IPSec during data transfer?

hop limit TTL

What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?

MAC address 2 byte priority field

What two items below make up a Bridge ID?

POP3 IMAP4

What two mail delivery protocols below can be used by a client application to receive e-mail from a server?

PBX private branch exchange

What two terms below are used to describe a telephone switch that connects and manages calls within a private organization?

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer


Conjuntos de estudio relacionados

(Adyen) Self-Test IV Gramm-Leach-Bliley Act [GLBA]

View Set

Chapter 7: Eating Right to Fuel the Body

View Set

BLAW310: Chapter 18 - Environmental Law, Chapter 17 BLAW 310 Chase Edwards

View Set

Real World Proportional Relationships.

View Set

Chapter 10: Uses of Life Insurance

View Set

Final Biology Exam Quiz Questions

View Set