Part 4

¡Supera tus tareas y exámenes ahora con Quizwiz!

When using SNMP with TLS, what port do agents receive requests on? a. 161 b. 162 c. 10161 d. 10162

10161

How many transponders are contained within a typical satellite? a. 8 to 16 b. 16 to 24 c. 24 to 32 d. 32 to 48

24 to 32

In ACL statements, using the "any" keyword is equivalent to using a wildcard ma.. a. 0.0.0.0 b. 255.255.255.255 c. 255.255.0.0 d. 0.0.255.255

255.255.255.255

When using DOCSIS 3.0, what is the minimum number of channels that can b... a. 1 b. 2 c. 4 d. 16

4

What is the maximum throughput of a DS3 connection? a. 1.544 Mbps b. 3.152 Mbps c. 44.736 Mbps d. 274.176 Mbps

44.736 Mbps

What is the size of an ATM cell, including the header? a. 48 bytes b. 53 bytes c. 64 bytes d. 84 bytes

53 bytes

A fractional T1's bandwidth can be leased by multiples of what data rate? a. 28 Kbps b. 32 Kbps c. 48 Kbps d. 64 Kbps

64 Kbps

In an ISDN connection, what amount of throughput did a single B channel.... a. 32 Kbps b. 48 Kbps c. 64 Kbps d. 96 Kbps

64 Kbps

If you wish to maintain a "4 nines" availability rating, what is the maximum.. a. .4 seconds b. 8 seconds c. 1 minute, 26 seconds d. 14 minutes, 23 seconds

8 seconds

What IEEE standard includes an encryption key generation and management... a. 802.11i b. 802.11h c. 802.1X d. 802.11j

802.11i

A highly available server is available what percentage of the time?​ a. 90% b. 99% c. 99.99% d. 99.999%

99.999%

Of all the DSL standards, which is the most commonly in use today? a. ADSL b. VDSL c. SDSL d. G.Lite

ADSL

When using Spanning Tree Protocol, what is the first step in selecting paths through... a. STP must first select the root bridge, or master bridge. b. STP examines the possible paths between all other bridges. c. STP disables links that are not part of a shortest path. d. STP begins to block BPDUs on non-designated ports.

STP must first select the root bridge, or master bridge.

When using satellite services for your WAN connection, what statement is a... a. Satellite downlink rates range from 50 to 100 Mbps. b. Satellite services suffer more latency and jitter issues. c. Satellite services are only available for fixed location clients. d. Satellite uplink rates range from 5 to 10 Mbps.

Satellite services suffer more latency and jitter issues.

Which of the following is an example of proxy server software? a. Squid b. BIND c. Snort d. Apache

Squid

In North America, what ISDN connection type used two B channels and one D... a. Basic Rate Interface (BRI) b. Primary Rate Interface (PRI) c. Bearer Rate Interface (BRI) d. Dedicated Rate Interface (DRI)

Basic Rate Interface (BRI)

The DTE or endpoint device for a leased line is known as which device below? a. CSU/DSU b. cable modem c. DSL modem d. ISDN modem

CSU/DSU

Which statement regarding the use of cable modems is NOT accurate? a. Modems that utilize the DOCSIS 3.0 or 3.1 standard are backward compatib... b. DOCSIS 3.1 allows for full duplex speeds up to 10 Gbps. c. Cable modems only operate at the Physical layer of the OSI model. d. Cable broadband provides a dedicated and continuous connection.

Cable modems only operate at the Physical layer of the OSI model.

Which of the following statements describes a RAID 0 configuration? a. In a RAID 0, data is striped across multiple disks to improve per... b. In a RAID 0, data is mirrored on multiple disks to provide fault t... c. In a RAID 0, data is striped across three or more drives, with pari... d. In a RAID 0, four or more disks are used to mirror data within each.. disks.

In a RAID 0, data is striped across multiple disks to improve per...

How does a line conditioning UPS protect network equipment? a. It protects against electrical surges. b. It shields equipment from lightning damage. c. It reduces fluctuations in incoming voltage. d. It filters line noise from incoming power.

It filters line noise from incoming power.

A differential backup covers what data on a system? a. It includes all data every time it is performed. b. It includes only data that has changed since the last backup. c. It includes data that has changed since the last full backup. d. It includes data that has changed since the last incremental backup.

It includes data that has changed since the last full backup.

Which SONET OC level is a popular choice for large businesses, and is equ... a. OC-1 b. OC-3 c. OC-12 d. OC-24

OC-3

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?​ a. OC-3 b. OC-12 c. OC-48 d. OC-96

OC-48

Which type of DSI technology has equal download and upload speeds maxing out at... a. ADSL2+ b. VDSL c. HDSL d. SDSL

SDSL

With a SIP trunk, what is the only limitation on the number of calls that can run at any... a. the maximum number of channels available on the transmission medium. b. The total number of time division slots allocated to the SIP client organization.. c. The total number of SIP bearer channels provisioned on the SIP switch. d. The amount of available bandwidth.

The amount of available bandwidth.

You have been asked by your superior to configure all the Cisco network switches to allow... ports. How is this accomplished? a. Use the switchport port-security command to enable MAC filtering. b. Use the mac-limit command to prevent more than one MAC from being accepted... c. Use the allow-mac command to filter by MAC address. d. Use the secure port mac-address command to limit the port to leaned addresses..

Use the switchport port-security command to enable MAC filtering.

What aspect of AAA is responsible for determining what a user can and cannot... a. authentication b. authorization c. accounting d. accessibility

authorization

The grouping of multiple servers so that they appear as a single device to.... a. load balancing b. clustering c. link aggregating d. server overloading

clustering

Enforcing a virtual security perimeter using a client's geographic location is known b... a. geohashing b. geofencing c. geolocating d. geolocking

geofencing

The Group Policy utility can be opened by typing what name into a Ru.... a. secpol.msc b. gpedit.msc c. grouppol.msc d. grppol.msc

gpedit.msc

A snapshot is most similar to which type of backup scheme? a. incremental backup b. differential backup c. full backup d. versioned backup

incremental backup

Which type of backup scheme only covers data that has changed since the last backup? a. full backup b. incremental backup c. differential backup d. snapshot backup

incremental backup

On a Linux system, which command allows you to modify settings used by the build... a. ipf b. modfire c. iptables d. netwall

iptables

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?​ a. ghost b. jabber c. talker d. blabber

jabber

What term is used to describe the average amount of time that will pass for a device... a. estimated time to failure (ETTF) b. product cycle lifetime (PCL) c. maximum time available (MTA) d. mean time between failures (MTBF)

mean time between failures (MTBF)

Once a device has failed, what metric measures the average amount of time to repair? a. mean time to repair (MTTR) b. mean time to restore (MTTR) c. mean field replacement time (MFRT) d. mean restoration time (MRT)

mean time to repair (MTTR)

Which type of uninterruptible power supply uses AC power to continuously charge its battery... the battery? a. standby UPS b. online UPS c. line conditioning UPS d. surge UPS

online UPS

Which of the following terms is used to describe the configuration of a port to c.. other end of the port? a. port supertrunking b. port mirroring c. port shadowing d. port lurking

port mirroring

Packets that are smaller than a medium's minimum packet size are known by what term below? a. jabbers b. giants c. ghosts d. runts

runts

What type of virtual circuit allows connections to be established when parties... complete? a. permanent virtual circuit (PVC) b. switched virtual circuit (SVC) c. dynamic virtual circuit (DVC) d. looping virtual circuit (LVC)

switched virtual circuit (SVC)

The Global System for Mobile Communications (GSM) utilizes what technology to crea... a. frequency division multiplexing (FDM) b. wavelength division multiplexing (WDM) c. dense wavelength division multiplexing (DWDM) d. time division multiple access (TDMA)

time division multiple access (TDMA)

You are attempting to determine how available your Linux systems are, and need to... you use? a. uptime b. show runtime c. lastboot d. display stats

uptime

What is a data-link connection identifier (DLCI) utilized for? a. It is used by routers to determine which circuit to forward a frame to in a frame... b. It is used by routers to establish a packet-switched path to the destination... c. It is used by ATM switches to determine how to create a switched virtual... d. It is a locally significant ID used to send connectionless information.

It is used by routers to determine which circuit to forward a frame to in a frame...

A network TAP serves what purpose on a network? a. It provides a mirrored port for monitoring traffic between other ports. b. It provides wireless monitoring capabilities, as well as spectrum analysis.. c. It monitors network throughput at a specific point in the network. d. It serves as a miniature firewall that can be placed in front of any connect...

It provides a mirrored port for monitoring traffic between other ports.

The Wired Equivalent Privacy standard had what significant disadvantage? a. It did not allow the use of a password for access to the network. b. It provided no encryption for traffic sent over the air. c. It used a shared encryption key for all clients, and the key might never... d. It only encrypted the initial connection authentication, but did not encry...

It used a shared encryption key for all clients, and the key might never...

By far the most popular AAA service, what open-source service runs in the A... a. Google Authenticator b. RADIUS c. TACACS+ d. Kerberos

RADIUS

What statement regarding role-based access control is accurate? a. RBAC allows a network administrator to base privileges and permission.. roles or jobs. b. RBAC allows users to decide for themselves who has access to that user... c. RBAC organizes resources into hierarchical classifications, such as "con.. d. RBAC is the most restrictive method of access control.

RBAC allows a network administrator to base privileges and permission.. roles or jobs.

What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W st... milliseconds? a. Transparent Interconnection of Lots of Links (TRILL) b. Shortest Path Bridging (SPB) c. Rapid Spanning Tree Protocol (RSTP) d. Multiple Spanning Tree Protocol (MSTP)

Rapid Spanning Tree Protocol (RSTP)

In Open System Authentication, how does authentication occur? a. The client sends a pre-shared key along with the access point's SSID. b. The client requests an encrypted tunnel, after which, the client's MAC se.... c. The access point forces the client to authenticate via a captive portal, after.... d. The client "authenticates" using only the SSID name. In other words, no re....

The client "authenticates" using only the SSID name. In other words, no re....

In planning for disaster recovery what is the ultimate goal? a. The preservation of critical data. b. The continuation of business. c. The management of damage. d. The protection of infrastructure.

The continuation of business.


Conjuntos de estudio relacionados

Exploraciones (2nd edition) Capítulo 6

View Set

Week 2: Data visualization (Pandas, Matplotlib, seaborn) (mlcourse.ai)

View Set

Electronic Medical Records Mid Term

View Set

Unit 6 (World War 1 & The Treaty of Versailles)

View Set

English Discoveries - First Discoveries - About me

View Set

Service and Support Applications (12%) - Admin

View Set