ITN 101 FINAL EXAM
Peer-to-peer model
A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?
Star topology
A network consists of seven computers and a network printer all connected directly to one switch. Which network topology does this network use?
Client-server model
In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?
Private key
In public key encryption, which key is used to decrypt the message?
HTTP
In the client-server model, what is the primary protocol used for communication between a browser and Web server?
Community cloud
Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a ________
2^h-2 = Z
What is the formula for determining the number of possible hosts on a network?
Softphone
What kind of phone is a Skype app?
Buffer overflow
What kind of vulnerability is exploited by a ping of death?
Port number
What number does a host use to identify the application involved in a transmission?
UTM (Unified threat management)
What of the following features does not distinguish an NGFW from traditional firewalls?
MLP
What protocol is used to bond multiple T-1s?
Agent
What software might be installed on a device in order to authenticate it to the network?
MPLS
Which QoS technique operates at the OSI layer "2.5"?
RTP
Which Session layer protocol is a streaming live video teleconference likely to use on the network?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
Coaxial
Which of the following cabling types is not recognized by the TIA/EIA for horizontal wiring?
Access control
Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?
SSL & TLS
Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications?
SSL and TLS
Which two protocols are available to create secure transmissions for the HTTP sessions?
DRDoS (distributed reflector DoS) attack
Which type of DoS attack orchestrates an attack using uninfected computers?
HIPAA
What federal organization sets strict standards to protect privacy of patient records?
Blue-snarfing
A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred?
Ad hoc
A student has completed his part of a group research paper, and needs to share it with a classmate. He sees the classmate as they're crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?
NFC (near-field communication)
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
Layer 1 (physical layer) & layer 2 (data link layer)
In which layer(s) of the OSI model do NIC (network interface card)'s operate?
Frequency
To exchange information, two antennas must be tuned to the same_________.
802.16
What IEEE committee established WiMAX technologies?
255
What decimal number corresponds to the binary number 11111111?
Amplifier, repeater
What device can boost an analog signal? A digital signal?
Surge protector
What device protects computer equipment from a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?
Rack-monitoring system
What device provides a central control portal for all devices on a rack?
Port forwarding
What feature must be configured on a router to redirect traffic from an insecure port to a secure one?
Active directory
What feature of Windows Server allows for agentless authentication?
Checksum
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Inverter
What generator component converts DC power from the generator to AC power that the electrical infrastructure in a data center can use?
Framing
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?
Cat 6a
What is the earliest-pair cabling standard that meets the minimum requirements for 10Gbase-T transmissions?
Layer 3 (network later)
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3 (network layer)
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Active directory
What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?
Hypervisor
What is the software that allows you to define VMs and manage resource allocation and sharing among them?
Header
What is the very beginning of an Ethernet frame called?
Coaxial cable, coaxial cable, F-connector
What kind of cable uses BNC connectors? F-connectors? Which connector is likely to be used by cable TV?
Smart jack
What kind of device can monitor a connection at the demarc but cannot interpret data?
Patch panel
What kind of networking device on today's racks does nothing to the data transmitted on a line other than pass it along through the connection?
Static route
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Ticket granting services
What kind of ticket is held by Kerberos' TGS?
Boot sector viruses
What kind of virus runs in place of the computer's normal system files?
Throttling
What method do ISPs use to purposely slow down bandwidth utilization by customers?
Server mirroring
What process ensures that exact duplicates of servers are available if needed in the event of a disaster?
Direct Access
What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?
Remote desktop services
What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network?
DMZ
What should you place between the corporate network and the ICS network?
DOCSIS
What specification defined the standards for broadband cable?
Ethernet over power line
What technology allows a user to access the Internet through the wiring of a home?
Default gateway
What type of device does a computer turn to first when attempting to make contact with a host on another network?
Always on remote connections
What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?
Gateway of last resort
When a router can't determine a path to a message's destination, where does it send the message?
Simplex, simplex, half-duplex
When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses___________ transmissions, the receive pair in the cable uses ___________ transmissions, and the twisted-pair in the cable uses ___________transmissions.
ping
When messages to a remote Web server are being lost for no apparent reason and you suspect the problem might be a path MTU black hole, which TCP/IP utility can you use to diagnose the problem?
Certificate authority
When surfing online you get some strange data on an apparently secure web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?
FE80::/10
When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures itself?
802.11n
Which 802.11 standard can be used in both the 2.4-GHz and 5-GHz bands?
Class 1
Which Bluetooth class has the highest power output?
CSMA / CA (Carrier Sense Multiple Access with Collision Avoidance)
Which Carrier Sense technology is used on wireless networks to reduce collisions?
RTU
Which ICS component senses attributes of the physical system and converts analog data to digital data, but cannot control the physical system?
Network layer (layer 3)
Which OSI layer is responsible for directing data from one LAN to another?
Mesh topology
Which WAN topology always sends data directly from its origin to its destination?
Remote desktop
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
MOU
Which business document fills the gap between an informal handshake and the legally binding signatures on contracts?
Cat 5e and higher
Which categories of twisted-pair cable can support Gigabit Ethernet?
Telnet
Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?
PaaS
Which cloud computing service model gives software developers access to multiple operating systems for testing?
Statistical multiplexing
Which kind of multiplexing assigns slots to nodes according to priority and need?
Active card
Which of the following cards specifically contains an internal lithium battery?
Ethernet
Which of the following is not an example of a broadband transmission?
Wi-Fi
Which one of the following wireless transmission types does NOT require a clear LOS to function
The OUI
Which part of a mac address is unique to each manufacturer?
Probe
Which part of a toner and probe kit emits a tone when it detects electrical activity on wire pair?
Trunk port
Which port on a switch manages traffic for multiple VLANs?
VRRP
Which protocol assigns a virtual IP to a group of routers?
TCP
Which protocol's header would a Layer 4 (transport) device read and process?
MTU
Which server controls the physical system in an ICS network?
NEXT
Which type of cross-talk occurs between wire pairs near the source of a signal?
Hot site
Which type of disaster recovery site is the most expensive?
Analog
Which type of transmission is measured by baud rate?
Evil twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Rogue access point
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
MLA
Your company has developed a Web site that includes a small program that collects real-time data on mortgage rates in specific geographic areas, and uses that information to calculate mortgage payment amounts based on the user's inputted data. The program was written by an independent software developer, who has granted your company a license to incorporate the program into your Web site for your customers' use. Which document was used?
Inform technical staff and users to the problem and what to expect
Your team is in the process of implementing what you thought would be a relatively minor update to the NOS. You've hit a small but time-consuming snag, and it's now obvious that the update won't be completed until about an hour after your maintenance window passes. What should you do immediately?
OC levels, digital signal levels
______________ in SONET are analogous to the ________________ of T-carriers.
To reduce the number of routing table entries by combining several entries
Which of the following is not a good reason to subnet a network?
Port 161
What do SNMP agents listen on?
syslog
What utility in Linux provides standards for generating, storing, and processing messages about events on a system?
CIFS (Common internet file system)
What version of SMB can be used across Windows, UNIX, and other operating systems?
Virtual switch
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Jamming
What wireless attack might a potential hacker execute with a specially configured transmitter?
POP3
Which email protocol allows an email client to download email messages to the local computer?
IMAP4
Which email protocol allows an email client to read mail stored on the mail server?
PPPoE
Which remote access protocol is used over an Ethernet network?
BGP
Which routing protocol does an exterior router use to collect data to build its routing tables?
SMTP is a connection based protocol uses TCP
Which statement describes SMTP?
TCP, UDP
Which transport layer protocol does PPTP use? Which transport layer protocol does L2TP use?
L2TP
Which tunneling protocol is accepted and used by multiple vendors?
Ethernet 2 frame
Which type of Ethernet frames do today's networks use?
Port number
Which type of address is used at the Transport layer to identify the receiving application?
DHCP relay agents
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need?
Wirless
EAPoL is primarily used with what kind of transmission?
128 bits
How many bits does an IPv6 address contain?
24 bits
How many bits of a Class A IP address are used for host information?
IP config/release
If you are connected to a network that uses DHCP, and you need to terminate your windows workstation DHCP lease, which command would you use?
Conversational voice, streaming live audio and voice, and streaming stored audio and voice
List three types of services a network might support that are considered part of unified communications or convergence.
Top listeners
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Power redundancy
Providing a backup power source is called?
Application layer (layer 7)
RTP and RTCP operate at which layer of the OSI model?
All devices on your local network
Suppose you send data to 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device are you transmitting?
IPsec and SSL
What are the two primary encryption techniques used by VPN's today?
128 bits
What is the minimum acceptable key size for today's security standards?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
You have just brought online a new secondary DNS server and notice your monitoring software report a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
SIP
You're trying to choose a signaling protocol for your company's network because you're about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?
Traffic policing
Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?
Authentication, encryption hashing
_______ is used for confidentiality while ______ is used for integrity and authentication.
Root servers
What computers are the highest authorities in the DOMAN Name System hierarchy?
AD
A routing protocol's reliability and priority are rated by what measurement?
Dedicated line, virtual circut
An organization can lease a private, _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
Dropped, implicit deny
Any traffic that is not explicitly permitted in the ACL is _______, which is called the ______.
Web server
Apache is a popular example of what type of networking software?
Layer 7 (application layer)
At what layer of the OSI model do proxy servers operate?
Network layer (layer 3)
At which OSI layer does IP operate?
in-band management
Telnet and SSH are called __________________ systems because they use the existing network and its protocols to interface with the switch.
18U & 42U
What are the two primary standard widths for rack systems?
snmpgetnext
What command retrieves the next record un an SNMP (simple network management protocol) log?
Brute force attack
A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?