IST-220 Chapter 6-12 Reviews
What is the maximum capacity of a T1 line?
1.5 Mbps
How many channels are in an ISDN PRI connection?
23B+D
How large is an ATM cell?
53 bytes
In an ISDN connection, what amount of throughput did a single B channel provide?
64 Kbps
A highly available server is available what percentage of the time?
99.999%
What statement regarding the use of a network attached storage device is accurate?
A NAS can be easily expanded without interrupting server
What feature of Windows Server allows for agentless authentication?
AD
Of all the DSL standards, which is the most commonly in use today?
ADSL
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access control
What software might be installed on a device in order to authenticate it to the network?
Agent
What two types of modulation does DSL use to carry data?
Amplitude Phase modulation
What's the essential difference between an IPS and an IDS?
An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
Application awareness
When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it to in order to determine what has changed?
Baseline
Where does an MPLS label go in a PDU?
Between Layers 2 and 3
What is the primary goal of disaster recovery? (proper term)
Business continuity
What type of adapters are required on servers in an FCoE storage network?
CNA
Which statement regarding the use of cable modems is NOT accurate?
Cable modems only operate at the Physical layer of the OSI model
When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?
Certificate Authority (CA)
What kind of network is the PSTN?
Circuit-switched
Which QoS technique operates at Layer 2 to more efficiently route Ethernet traffic between VLANs?
CoS
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Cold site
What kinds of issues might indicate a misconfigured ACL?
Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others can't
What are the two primary features that give proxy servers an advantage over NAT?
Content filtering File caching
Which ISDN channel carries signaling information?
D channel
What specifications define the standards for cable broadband?
DOCSIS
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
Which fields are modified in IPv4 and IPv6 packets to help prioritize traffic for QoS?
DiffServ for IPv4 Traffic Class for IPv6
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
DirectAccess
Pick two advantages to using virtualization on a network
Efficient use of resources Fault and threat isolation
What kinds of alerts can you program your network monitor to send to IT staff when it detects specific, problematic conditions?
Email text message (SMS) New support ticket
A RAID 5 configuration requires a minimum of two hard disks to operate.
False
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
False
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
False
What causes most firewall failures?
Firewall misconfiguration
What type of network combines fiber with coax?
HFC
When shopping for a new router, what does the MTBF tell you?
How long devices like this one will last on average until the next failure
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
An _____________(use abbreviation) monitors network traffic and alerts (only) about suspicious activity.
IDS
Which tunneling protocol is a component of the IPsec protocol suite?
IKEv2
An ________________ (use abbreviation) can detect suspicious activity and block it from entering the network or the host
IPS
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
Why might you want to install two power supplies in a critical server?
If one power supply fails, the other can take over
Any traffic that is not explicitly permitted in the ACL is denied, which is called the ____________________________.
Implicit deny rule
What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?
Internet SCSI (iSCSI)
At what point is a packet considered to be a giant?
It becomes a giant when it exceeds the medium's maximum packet size
How does a line conditioning UPS protect network equipment?
It filters line noise from incoming power
A differential backup covers what data on a system?
It includes only data that has changed since the last backup
In a public switched telephone network, what portion of the network is known as the local loop?
It is the portion that connects any residence or business to the nearest central office
What protocol is most often used to bond ports between a switch and a busy server?
LACP
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
At what layer of the OSI model do proxy servers operate?
Layer 7
What file must be accessed in order to analyze SNMP logs?
MIB
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
What are two examples of Layer 2 LAN or PAN standards that also function at Layer 1?
NFC Bluetooth
______________ in SONET are analogous to the ________________ of T-carriers.
OC levels, digital signal levels
Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?
OC-3
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?
OpenVPN
Which remote access protocol is used over an Ethernet network?
PPPoE
What are two types of virtual circuits?
PVC and SVC
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
What port do SNMP agents listen on?
Port 161
Only one ___________________ exists on a network using STP.
Root bridge
Which remote file access protocol is an extension of SSH?
SFTP
Which protocol can provide VoIP services over a Metro Ethernet connection?
SIP
What command requests the next record in an SNMP log?
SNMP Get Next
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Speed
What device must be installed on a DSL network to separate incoming voice and data signals?
Splitter
What are two main categories of UPSes?
Standby Online
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
Switchport port-security
Which Transport layer protocol does PPTP use?
TCP
What method does a GSM network use to separate data on a channel?
TDMA
What kind of ticket is held by Kerberos' TGS?
TGT
Why is a BPDU filter needed at the demarc?
The ISP's STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information.
What information is typically included in a Layer 1 frame?
The layer 2 payload
Why do network administrators create domain groups to manage user security privileges?
To simplify the process of granting rights to users
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Traffic shaping
A brownout is a momentary decrease in voltage; also known as a sag.
True
Which type of hypervisor is installed on bare metal?
Type 1
A __________ (use abbreviation) is a security strategy that combines multiple layers of security appliances and technologies into a single safety net.
UTM
How does a vNIC get a MAC address?
Upon creation, each vNIC is automatically assigned a MAC address
Which DSL standard has the fastest speeds immediately outside the CO?
VDSL
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual switch
EAPoL is primarily used with what kind of transmission?
Wireless
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Wireshark
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit http any any
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
clustering
What kind of firewall blocks traffic based on application data contained within the packets?
content-filtering firewall
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
dedicated line, virtual circuit
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
integrity
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
iptables
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
jabber
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
mean time between failures (MTBF)
Which of the following features is common to both an NGFW and traditional firewalls?
packet filtering
Packets that are smaller than a medium's minimum packet size are known by what term below?
runts
What kind of device can monitor a connection at the demarc but cannot interpret data?
smart jack
The T-carrier standards, also called T-CXR standards, utilize what type of multiplexing over two wire pairs to create multiple channels?
time division multiplexing (TDM)