Foundations of Networking Midterm

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?

In an authorization file on the host where the SSH server is.

What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium's maximum packet size.

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium.

What does a statement of work document do?

It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.

What is the Nmap utility used for?

It is a port scanning utility that can identify open ports on a host.

What is distributed switching?

It is a single distributed vSwitch that can service VMs across multiple hosts.

When using RFID, what is an ARPT (Active Reader Passive Tag)?

It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

What statement regarding the Server Message Block protocol is accurate?

It is used by Windows and UNIX-based operating systems to share files.

What is the ARPA domain suffix utilized for?

It is used for reverse DNS queries, and holds PTR records.

What is the purpose of the Layer 2 LLC sublayer?

It is used to handle multiplexing, flow and error control, and reliability.

Why is the telnet utility a poor choice for remote access to a device?

It provides poor authentication and no encryption.

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

Layer 2

At what layer of the OSI model does a network switch normally operate?

Layer 2

HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?

Layer 7

Which of the following statements about fiber-optic cabling is accurate?

Light experiences virtually no resistance when traveling through glass.

The frame header at the Data Link layer includes hardware addresses of the source and destination NICs. What is another name for this address?

MAC (Media Access Control) address

The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?

Material Safety Data Sheet (MSDS)

Which legacy authentication protocol requires mutual authentication?

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

No more than 1 inch of the cable should be exposed.

In general, how much can a twisted-pair's cable be bent before data transmission may be impeded?

No more than four times the diameter of the cable.

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?

OC-48

Which statement does NOT accurately describe characteristics of the OSPF protocol?

OSPF requires very little CPU or memory resources.

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

In the DNS hierarchy, where is information about how to find the top-level domain servers held?

On the DNS root servers.

When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?

Only one root port, which is the bridge's port that is closest to the root bridge, can forward.

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

PPP can support strong encryption, such as AH or ESP.

In the TCP/IP model, what layer is considered so simple that it is ignored entirely?

Physical

At what layer of the OSI model do the 802.11 standards vary?

Physical layer

What statement regarding the Power Over Ethernet standards is inaccurate?

Power over Ethernet requires CAT6 or better copper cable.

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?

Priority Code Point (PCP)

By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?

RADIUS

What statement regarding role-based access control is accurate?

RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.

Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?

RG-6

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling?

RG-6 Coaxial

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

RTS/CTS (Request to Send/Clear to Send)

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?

Remote Desktop Protocol (RDP)

Which encryption standard was originally utilized with WPA's TKIP?

Rivest Cipher 4 (RC4)

In a software defined network, what is responsible for controlling the flow of data?

SDN controller

Which of the following statements correctly describes the SFP+ transceiver?

SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?

SIP

What mail protocol is used to send mail messages to a server?

SMTP

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?

The cable must be a rollover cable.

What does backbone cabling consist of?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.

You are troubleshooting a client's wireless networking issue. Which of the following will prevent the client from connecting to the network?

The client has a wireless profile configured for the "campus" SSID, but the access point is broadcasting the "CAMPUS" SSID.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

How can you determine the manufacturer of a NIC card based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 hypervisor

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the switchport port-security command to enable MAC filtering.

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

VLAN 1001

Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?

VNC is open source, allowing companies to develop their own software based on VNC.

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

What is NOT a potential disadvantage of utilizing virtualization?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?

VoIP PBX (private branch exchange)

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?

VoIP gateway

In Linux, what command can be used for viewing and setting wireless interface parameters?

iwconfig

The combination of a public key and a private key are known by what term below?

key pair

What routing metric affects a path's potential performance due to delay?

latency

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?

link-state protocols

Subtracting an interesting octet value from 256 yields what number?

magic number

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

management frames

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?

master license agreement

What utility is the equivalent to the pathping command on a Linux system?

mtr

What kind of tool can you use to measure voltage on a cable length?

multimeter

The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?

multiple input-multiple output (MIMO)

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

What command will list only current connections, including IP addresses and port numbers?

netstat -n

Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

netstat -s

When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?

port 547

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?

port mirroring

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

principle of least privilege

A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?

probe frame

A change coordinator functions as what type of manager?

project manager

The use of certificate authorities to associate public keys with certain users is known by what term?

public-key infrastructure

What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?

punchdown tool

Telephone connections follow what registered jack standard?

registered jack 11 (RJ-11)

Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase?

request for proposal

Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?

router-on-a-stick

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?

service-level agreement

You are connected to your network's Cisco router, and need to verify the route table. What command should you enter?

show ip route

You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?

show vlan

Signals that can travel in only one direction on a medium are referred to as what type of signal?

simplex

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

sliding-window

What type of device can be used to assess the quality of a wireless signal?

spectrum analyzer

In order to generate a public and private key for use with SSH, what command line utility should you use?

ssh-keygen

If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

star topology

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines?

statistical time division multiplexing

What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?

switched virtual circuit (SVC)

When using RFID, what is an ARPT (Active Reader Passive Tag)?

t is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

tailgating

What tcpdump command can be used to filter out all traffic except SSH traffic?

tcpdump port 22

The T-carrier standards, also called T-CXR standards, utilize what type of multiplexing over two wire pairs to create multiple channels?

time division multiplexing (TDM)

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?

traceroute -I srv1.mycompany.com

When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?

upset failure

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

vertical cross connect

What command can be used to check a domain computer's time source from a Command Prompt window?

w32tm /query /source

Bidirectional transceivers utilize what technology to separate the data in each direction?

wavelength division multiplexing

When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?

white/orange, orange, white/green, blue, white/blue, green, white/brown, brown

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

clustering

What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment?

coarse wavelength division multiplexing

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?

control frames

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

deauthentication attack

Noise that can degrade or distort a signal on a network is measured with what unit?

decibels

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

denial-of-service attack

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?

dig @8.8.8.8 mycompany.com MX

What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?

entrance facility

How often should you require users to change their passwords?

every 60 days

A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?

fiber cleaver

In a fire suppression system, what term is used to describe what is typically a foaming chemical, gas, or water that is sprayed everywhere to put out a fire?

fire suppression agent

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?

flow label

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

geofencing

The Group Policy utility can be opened by typing what name into a Run box?

gpedit.msc

What IPv6 field is similar to the TTL field in IPv4 packets?

hop limit

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

What command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

What is the minimal amount of voltage required to damage an electrical component?

10 volts

When planning horizontal cabling, what is the maximum allowable distance that can be used?

100 meters

What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?

10GBase-T

Which of the following is NOT a range of IP addresses recommended for use in private networks?

127.0.0.0 through 127.255.255.255

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

In the classful addressing scheme, what range of network addresses is considered a Class B?

128.0.x.y to 191.255.x.y

Near-field communication devices send data at what fixed frequency?

13.56 MHz

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

By default, what is the MTU size on a typical Ethernet network?

1500 bytes

If the VLAN tag is present in an Ethernet frame, what is the maximum frame size?

1522 bytes

By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

16

Equipment data racks most commonly are a standard width of what measurement?

19 inches

Which of the following IPv6 addresses represents a global unicast address?

2000::/3

In an 802.11 data frame, what is the maximum amount of data that can be sent?

2312 bytes

802.11ac Wave 2 devices can theoretically support how much maximum throughput?

3.47 Gbps

When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?

3/8 inch

When using DOCSIS 3.0, what is the minimum number of channels that can be used?

4

How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?

40km

In an 802.11 data frame, what is the size of the frame check sequence field?

6 bytes

In an ISDN connection, what amount of throughput did a single B channel provide?

64 Kbps

What is the maximum number of host IP addresses that can exist in a Class B network?

65,534

What is the industry standard angle for an Angle Polished Connector (APC)?

8 degrees

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

8 seconds

Which of the following statements regarding the 802.11ac standard is NOT accurate?

802.11ac access points function more like a hub than a switch.

PoE+ devices are defined by what IEEE standard?

802.3at

The wireless spectrum, as defined by the FCC, spans between which two frequencies?

9 kHz and 300 GHz

Which of the following is NOT a task that a VPN concentrator is responsible for?

A VPN concentrator shuts down established connections with malicious traffic occurs.

What statement accurately describes what a cable bend radius determines?

A cable bend radius is the radius of the maximum arc into which you can loop the cable without impairing data.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious public access point.

Why should you terminate coaxial cable with connectors that are rated for the exact cable type?

A mismatched connector will have different impedance ratings, causing data errors.

Which of the following is not a task handled by a router?

A router forwards broadcasts over the network.

When using IPv6, what would a /64 network likely be assigned to?

A smaller organization or business.

What statement correctly identifies the purpose of a software patch?

A software patch is a correction, improvement, or enhancement to software.

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?

AAAA record

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Active Directory Domain Services (AD DS)

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for?

An IS-IS capable network router.

When creating network diagrams, what icon description typically represents a network router?

An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.

When creating network diagrams, what icon description typically represents a network switch?

An icon that is rectangular, which contains four arrows pointing in opposite directions.

When creating network diagrams, what icon description typically represents a network firewall?

An icon that resembles a brick wall.

What is the most popular web server application?

Apache

Which statement regarding the Border Gateway Protocol (BGP) is accurate?

BGP utilizes TCP for communicating updates.

What is by far the most popular DNS server software available?

BIND

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

BPDU guard

In North America, what ISDN connection type used two B channels and one D channel?

Basic Rate Interface (BRI)

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?

By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

Which statement regarding the use of cable modems is NOT accurate?

Cable modems only operate at the Physical layer of the OSI model.

Which of the following is NOT a best practice when performing cable management?

Cable ties should be pulled tightly to keep cables from moving around in a bundle.

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

Carrier Ethernet Transport

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

What is the minimum category of UTP cable required in order to support Gigabit speeds?

Cat 5e

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?

Citrix Xen

Which of the following virtualization products is an example of a bare-metal hypervisor?

Citrix XenServer

Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?

Class 1

What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in a single line.

What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?

Differentiated Services (DiffServ)

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?

Dynamic Multipoint VPN

Which routing protocol started as a Cisco proprietary protocol and combines some of the features of a link-state protocol with that of distance-vector protocols?

EIGRP

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

EIGRP may not be available on non-Cisco routers.

If a host's IPv6 address contains the network adapter's MAC address within the last 64 bits of the IPv6 address, what standard is being used?

EUI-64

What occurs when a collision happens on a network?

Each node on the network waits a random amount of time and then resends the transmission.

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPsec

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?

Framing

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?

IP address

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?

SNMP

Which of the following Layer 1 WAN technologies is not normally used as last mile service, but rather traverses multiple ISP networks, connecting these networks to the Internet backbone?

SONET (Synchronous Optical Network)

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH supports port forwarding

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH supports port forwarding.

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?

Session Layer

On an ATM network, how is the path that data will take determined?

Switches determine the optimal path between sender and receiver, and then establish the path before transmission.

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?

TIA/EIA-568

You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?

TXT record

What statement regarding main distribution frame or main distribution facilities is accurate?

The MDF is the centralized point of interconnection for an organization's LAN or WAN.

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

What happens when an NMS uses the SNMP walk command?

The NMS uses get requests to move through sequential rows in the MIB database.

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read

In the United States, who is able to activate the Emergency Alert System at the national level?

The President

With a SIP trunk, what is the only limitation on the number of calls that can run at any one time?

The amount of available bandwidth.

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address.

In a coaxial cabling, what does the RG rating measure?

The materials used for shielding and conducting cores.

When viewing a syslog message, what does a level of 0 indicate?

The message is an emergency situation on the system.

What statement accurately reflects what occurs when a message is too large to transport on a network?

The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?

The packet will be divided into smaller packets using fragmentation.

Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?

The packets are coded such that individual calls can be distinguished.

How does the 802.11 data frame indicate how a large packet should be fragmented?

The sequence control field indicates how packets will be subdivided.

Diffraction has what affect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split.

Which statement regarding the use of a bridged mode vNIC is accurate?

The vNIC will its own IP address on the physical LAN.

Which of the following is not one of the disadvantages of peer-to-peer networks?

They centralize user account logins.

How do routers create a broadcast domain boundary?

They do not forward broadcast traffic.

The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?

Trivial FTP (TFTP)

When is it appropriate to utilize the NAT network connection type?

Whenever the VM does not need to be access at a known address by other network nodes.

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Wi-Fi analyzer

What scenario might be ideal for the use of root guard in configuring a switch?

You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.

Healing messages are a feature of what smart home protocol?

Z-Wave

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable use policy document

An RFID label on a box is an example of what type of physical security detection method?

asset tracking tagging

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?

at least 3 feet

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?

basic service set

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?

beacon frame

What is NOT one of the ways in which networks are commonly segmented?

by device manufacturer


Kaugnay na mga set ng pag-aaral

PART 2 CP4D ASSESSMENT TEST, version 2.5, accuracy 74%

View Set

Intro to Nutrition: Chapter 4 Quiz/Quiz 4

View Set

Chapter 27: Management of Patients with Coronary Vascular Disorders

View Set