IS 4440
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
Active Directory Domain Services (AD DS)
The Border Gateway Protocol is considered to be a hybrid routing protocol.
True
What is NOT one of the ways in which networks are commonly segmented?
by device manufacturer
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
fail-close
What routing metric affects a path's potential performance due to delay?
latency
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
mean time between failures (MTBF)
Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?
online UPS
What utility is used to verify that TCP/IP installed, bound to the NIC, configured correctly, and communicating with the network?
ping
Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?
router-on-a-stick
What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?
service-level agreement
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?
star topology
An interface that manages traffic from multiple VLANs is known by what term?
trunk or tag port
What occurs when a collision happens on a network?
Each node on the network waits a random amount of time and then resends the transmission.
All that is needed to provide communication between two VLANs is a DHCP relay agent.
False
An unmanaged switch can still support the creation of VLANs, provided there is an interface for configuration.
False
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
False
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?
Framing
What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?
Internet SCSI (iSCSI)
At what layer of the OSI model does the IPsec encryption protocol operate?
Network layer
At what layer of the OSI model do the 802.11 standards vary?
Physical layer
In a software defined network, what is responsible for controlling the flow of data?
SDN controller
What mail protocol is used to send mail messages to a server?
SMTP
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
TCP
What statement regarding main distribution frame or main distribution facilities is accurate?
The MDF is the centralized point of interconnection for an organization's LAN or WAN.
You have been tasked with the creation and design of a network that must support a minimum of 4000 hosts. How many bits do you need for the host portion?
12-May be
By default, what is the MTU size on a typical Ethernet network?
1500 bytes
By default, when using classful addressing, how many bits exist in the host portion of a Class A address?
24
A highly available server is available what percentage of the time?
99.999%
What statement regarding the use of a network attached storage device is accurate?
A NAS can be easily expanded without interrupting service
Which of the following is an example of encapsulation?
The addition of a header to data inherited from the layer above in the OSI model.
In planning for disaster recovery, what is the ultimate goal?
The continuation of business.
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?
The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
Diffraction has what affect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split.
What is by far the most popular DNS server software available?
BIND
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
False
IPv4 and IPv6 use the same packet format.
False
Network segmentation decreases both performance and security on a network.
False
Only Class B and Class C networks can be subnetted.
False
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPsec
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
What is distributed switching?
It is a single distributed vSwitch that can service VMs across multiple hosts.
What is routing protocol convergence time defined as?
It is the time it takes for the protocol to recognize the best path in the event of a network change.
What statement regarding the Server Message Block protocol is accurate?
It is used by Windows-based operating systems to share files.
What federal agency is charged with safety and health in the workplace?
Occupational Safety and Health Administration (OSHA)
Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
True
Equipment data racks most commonly are a standard width of what measurement?
19 inches
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
True
The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6.
True
The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.
True
The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.
True
Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
True
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
VNC is open source, allowing companies to develop their own software based on VNC.
What is the name of the GUI front end that is available for the Nmap utility?
Zenmap
IPv6 addressing does not utilize classful addressing, therefore every IPv6 address is classless.
True
The TCP and UDP protocols both exist at what layer of the OSI model?
Transport
A hexadecimal number is a number written in the base 16 number system.
True
After a problem and its symptoms have been identified, a theory regarding a probable cause should be established.
True
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
captive portal
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
clustering
What component of enterprise level structured cabling serves as the location where an incoming network interface enters a building and connects with the building's backbone cabling?
entrance facility