N10-007 1-21
What is a typical cost of a network cable installation?
$50 - 150 per drop
Which switch is used with the Windows netstat utility to show name of a running program?
-b
Which switch is used with the Windows netstat utility to show the process ID?
-o
DNS domains that are not on the Internet should use the top-level name __________.
.local
Which term is an original top-level domain name?
.mil
Which ipconfig command switch would a technician use to display detailed information (such as DNS servers and MAC addresses)?
/all
When performing a binary XOR (eXclusive OR) function with a cleartext value of 0 and a key value of 0, what is the result?
0
When performing a binary XOR (eXclusive OR) function with a cleartext value of 1 and a key value of 1, what is the result?
0
What is the range of decimal values in each of the four groups of an IPv4 address?
0 to 255
What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?
0.0.0.0
Which value of the ECN field is the default, indicating "not QoS aware"?
00
Which address notation is the IPv6 loopback address?
0000:0000:0000:0000:0000:0000:0000:0001
Ethernet reserves the address __________ for IPv4 multicast frame destination addresses
01-00-5E-xx-xx-xx
RFID devices generally communicate within __________.
1 meter
Which of the channels defined by the 802.11 standard may be used by a WAP using the 2.4-GHz band in the United States?
1 through 11
How long is the start frame delimiter?
1-byte
Which of the following could be a valid Autonomous System Number (ASN)?
1.33457
What is the data transfer speed for DS1?
1.544 Mbps
What is the size of a U, the equipment rack unit of measure, used for specifying height?
1.75 inches
Which value of the ECN field indicates "QoS aware, no congestion"?
10
What was the maximum speed at which 10BaseT Ethernet networks communicate?
10 Mbps
When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?
10 Mbps sending and receiving
What is the maximum cable length on a segment of a 1000BaseT network?
100 meters
What was the maximum distance between a hub and a node on a 10BaseT network?
100 meters
Of all the Gigabit Ethernet IEEE standards detailed in the chapter, which one maintains a signal over the greatest distance?
1000BaseLX
What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?
1000BaseLX
Which version of Gigabit Ethernet is published under the 802.3ab standard?
1000BaseT
The __________ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BaseSX and 1000BaseLX.
1000BaseX
What User Datagram Protocol (UDP) ports does SNMP use for secure communication?
10162 and 10161
In 100BaseT, what is the maximum number of nodes per hub/switch?
1024
What is the maximum number of nodes that could be attached to a 10BaseT segment or hub?
1024
Which standard specified multimode cabling?
10BaseFL
Which Ethernet cabling standard defines an Ethernet network that uses CAT 3 or better UTP cabling, operating at 10 Mbps?
10BaseT
Which version of Ethernet was introduced in 1990?
10BaseT
Which 10 GbE standard features a multimode fiber type?
10GBaseSR
Which value of the ECN field indicates "QoS aware, congestion encountered"?
11
How long is a MAC address?
12 hexadecimal characters
How many binary digits are in in an IPv6 address?
128
What bandwidth does ISDN offer?
128 Kbps
How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?
13
Which wavelength is used by 1000BaseLX fiber-optic cabling?
1300 nm
How many channels were defined by the 802.11 standard?
14
Which port is used to receive e-mail messages from e-mail servers (IMAP4)?
143
What is the maximum number of hops allowed by RIP?
15
Frames in most wired networks hold at most __________.
1500 bytes of data
What is the range of transfer speed for ATM?
155.52 to 622.08 Mbps and beyond
What User Datagram Protocol (UDP) ports does SNMP use for unsecure communication?
161 and 162
On which port does the NMS receives/listen?
162
Evolved High-Speed Packet Access (HSPA+) provided theoretical speeds up to __________, although most HSPA+ implementations rarely exceeded 10 Mbps.
168 Mbps
Which TCP/IP port does the H.323 video presentation protocol use?
1720
What is the maximum distance between a user's demarc and the central office for all versions of DSL?
18,000 feet
Which address notation is an example of an IPv6 address?
2001:0000:0000:3210:0800:200C:00CF:1234
The IPv6 address, 2001:0000:0000:3210:0800:200C:00CF:1234, can be shortened to __________.
2001:0:0:3210:800:200C:CF:1234
Which IP address is valid for an individual host expressed in dotted decimal notation?
215.233.32.91
Which address range does multicast use in IPv4?
224.0.0.0/4
How many channels are in a DS1 frame?
24
Which TCP/IP ports does MGCP use?
2427 and 2727
Including the separating periods, what is the maximum number of characters allowed by the DNS naming convention?
255
Which subnet mask is an example of classless subnetting?
255.255.240.0
Which formula would you use to arrive at the number of hosts on a subnet?
2x - 2, where x represents the number of zeroes in the subnet mask
What was the original maximum data transfer rate of the first Ethernet developed by Xerox?
3 Mbps
LTE networks feature speeds of up to __________ download.
300 Mbps
How many binary digits are in an IPv4 address?
32
How long is a subnet mask?
32 bits
The Ethernet address __________ is used on Ethernet frames that encapsulate IPv6 multicast packets.
33-33-xx-xx-xx-xx
What is the approximate total bandwidth of an E3 line?
34 Mbps
One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE), offered data speeds up to __________.
384 Kbps
Which key sizes does WEP use?
40 bits and 104 bits
The nodes that connect in an IBSS randomly generate a __________ string of numbers that looks and functions just like a MAC address.
48-bit
Which TCP/IP ports does the Real-time Transport Protocol (RTP) use for VoIP systems?
5004 and 5005
Which TCP/IP ports does the Session Initiation Protocol (SIP) use for VoIP systems?
5060 and 5061
What is the low end speed of the SONET Optical Carrier specification (OC-1)?
51.8 Mbps
What UDP port do DNS servers primarily use?
53
What is the size of an ATM fixed-length cell?
53 bytes
What is the minimum size of an Ethernet frame?
64 bytes
How many layers does the OSI model contain?
7
LTE networks feature speeds of __________ upload.
75 Mbps
Which port do HTTP Web servers use?
80
If you're one of those folks who uses a lot of data on your smartphone, it's generally a good idea to use __________ when available to avoid cellular WAN data use charges
802.11
Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is backward-compatible with an earlier, popular Wi-Fi standard?
802.11g
Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?
802.11n
What wavelength is used on 10GBaseSW fiber-optic cabling?
850 nm
What wavelength is used on a 10GBaseSR network?
850 nm
Almost all multimode fiber cables transmit __________ wavelengths.
850-nm
Which port does the Kerberos authentication protocol use?
88
Which connector is currently used in wired networks?
8P8C
What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?
90 meters
Jumbo frames are usually __________ bytes long—though technically, anything over 1500 counts—and they reduce the total number of frames moving through the network.
9000
Which device is an example of a serious enterprise WAP?
A Cisco Aironet device
What are you trying to discover when you test a cable for continuity?
A broken wire
What happens when frames are transmitted on the network from two different devices at the same time, corrupting each other's signals?
A collision occurs.
Which item is part of a wall outlet?
A female jack
In the newer Bluetooth 4.0 version, what is required during the pairing process?
A four-digit personal identification number (PIN)
In order for a VLAN to get its name, what is typically appended to the word "VLAN"?
A number
What are the three essential ingredients for a successful implementation of a basic structured cabling network?
A telecommunications room, horizontal cabling, and a work area
What is the result of running "Add a VPN connection" in Settings in the Control Panel on the Windows client side of a PPTP VPN connection?
A virtual NIC is created.
All IPv6 addresses have a record type of __________.
AAAA
What type of conversion process occurs with power converters?
AC to DC
Which document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work?
Acceptable use policy
Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?
Active Directory
Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?
Activity light
Which industrial control system (ICS) device makes changes that modify a characteristic such as temperature?
Actuator
Which wireless network mode operates by allowing two or more devices to communicate directly without any other intermediary hardware?
Ad hoc
Almost all TCP/IP applications have moved to __________ for symmetric cryptography.
Advanced Encryption Standard (AES)
When in doubt about symmetric encryption algorithms which algorithm should you always select?
Advanced Encryption Standard (AES)
Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?
Adware
Which term refers to physically separating your network from every other network?
Air gap
Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks?
Aircrack-ng
Which term refers to a cipher's underlying mathematical formula?
Algorithm
Which statement about subnet masks is true?
All machines on the same network have the same subnet mask
What is the function of the multicast address FF02::1?
All nodes address
Which statement is true of an IPv6 prefix?
An IPv6 prefix is a maximum of 64 bits.
Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?
Asymmetric-key
Which term is refers to any encryption that uses different keys for encryption and decryption?
Asymmetric-key encryption
Which term defines what an authenticated person can do with data?
Authorization
Which test should a network administrator run on a CSU/DSU to test a WAN connection and verify the T-carrier connection from end to end?
BERT
Which protocol is a path vector routing protocol?
BGP
Which deployment model requires tight controls and separation of employee personal data from corporate data?
BYOD
Which deployment model uses employees' existing mobile devices for use by the corporation?
BYOD
Which routing metric refers to the ability of a connection to handle more data than others?
Bandwidth
Which term is synonymous with traffic shaping?
Bandwidth shaping
What type of unit is formed by a single WAP servicing a given area?
Basic Service Set (BSS)
Which term defines the most basic infrastructure mode network - a BSS of one WAP and one or more wireless nodes?
Basic Service Set Identifier (BSSID)
Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.
BlueBorne
Which protocol is used on the Internet for communication between Autonomous Systems?
Border Gateway Protocol (BGP-4)
Which term refers to a software connection that passes traffic from the real NIC to a virtual one?
Bridge
Which method of sending a packet allows every computer on the LAN to hear the message?
Broadcast
Which first generation network topology used a single cable that connected all the computers in a line?
Bus
The specification for 100BaseTX (100BaseT) calls for UTP cabling using __________ or better rated cabling.
CAT 5
What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?
CAT 5e
Which category (CAT) of UTP cabling is the fastest?
CAT 6
Which category rating uses a bandwidth of 250 MHz to accommodate 10000 Mbps?
CAT 6
Which device provides termination at each end of a T1 connection?
CSU/DSU
Which tool helps a technician make unshielded twisted pair (UTP) cables?
Cable stripper
Which tool can be used to notify a technician of a continuity problem or if a wire map is not correct?
Cable tester
Which DNS server is used to talk to other DNS servers to resolve IP addresses for DNS clients?
Cache-only DNS server
What are the three dominant mobile network technologies?
Cellular WANs, 802.11, and Bluetooth
Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?
Certificate
Which tool tests a cable to ensure that it can handle its rated amount of capacity?
Certifier
Which term describes a portion of the available spectrum available for Wi-Fi network communication?
Channel
Which term refers to the result of running cleartext through a cipher algorithm using a key?
Ciphertext
Which company is leading the cutting edge of the unified communication (UC) field?
Cisco
Which hypervisor serves as the foundation for massive cloud offerings by Amazon, IBM, and RackSpace?
Citrix XenServer
If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
Class B
A particular multicast called an IGMP group is assigned an address in which class range?
Class D range
Which statement best describes a Class E address ID?
Class E is considered to be experimental.
Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?
Classless Inter-Domain Routing (CIDR)
Which term is another word for plaintext?
Cleartext
Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?
Coaxial
Which secondary location will generally take more than a few days to bring online?
Cold
Which organization is the biggest player in the certificate authority market?
Comodo
What is the primary use of coaxial cable in networking today?
Connecting a cable modem to an Internet Service Provider (ISP)
Which term refers to another name for a session?
Connection
Which industrial control system (ICS) device knows enough to manage a process?
Controller
Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?
DDoS
Which term does CompTIA use in place of a relay agent?
DHCP relay
On the Windows client side of a PPTP VPN connection, where does a client get an IP address from after it creates a virtual NIC?
DHCP server
Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.
DS0
What is the most basic data chunk you get in the telephone world?
DS0
Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a single 8-bit DS0 data sample?
DS1
Which algorithm is the oldest of the TCP/IP symmetric-key algorithms?
Data Encryption Standard (DES)
What OSI model layer supports PPTP?
Data Link
Which layer of the OSI model adds source and destination MAC addresses to frames?
Data Link
Which layer of the OSI model is the only layer divided into two sublayers?
Data Link
Which unit is used to measure signal loss in networking?
Decibel (dB)
Using the ping command, which message is displayed if your computer has no route to the address listed?
Destination host unreachable
Within a Windows OS, which tool can you use to verify that Windows recognizes a NIC and is ready to use it?
Device Manager
Which 802.11 collision avoidance method is currently implemented?
Distributed Coordination Function (DCF)
A deauthentication (deauth) attack is a form of __________ attack.
DoS
Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?
Dynamic NAT
Which term refers to ports in the 49152 to 65535 range?
Dynamic port
What is another name for electronic discovery?
E-discovery
What is the European counterpart to a T1 line?
E1
Which hypervisor is considered to be the industry leader?
ESXi
How many pins does an RJ-45 connector have?
Eight
Within the Differentiated Services (DiffServ) architecture, how many classes of service (CoS) are there?
Eight
Which condition specifically applies to UTP cabling?
Electromagnetic interference
Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it; however, the person receiving the data can descramble it.
Encryption
Which term refers to session information stored in RAM by a computer on one side of a session?
Endpoint
Which term describes the status of a port that is part of an active working endpoint pair?
Established port
Which technology was the final 3G data standard?
Evolved High-Speed Packet Access (HSPA+)
What type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?
Extended Service Set (ESS)
The protocol used by Autonomous Systems to communicate with each other is generically called a(n) __________.
Exterior Gateway Protocol (EGP)
What is the universal MAC address for broadcast?
FF-FF-FF-FF-FF-FF
Which of the following is a broadcast MAC address?
FF-FF-FF-FF-FF-FF
Which multicast reserved address is designed to reach solicited-node addresses?
FF02::1:FFXX:XXXX
Which multicast addresses will only reach routers?
FF02::2
Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet available?
Fast Ethernet
What type of patch adds new functionality to a system?
Feature changes/updates
What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?
Fiber-optic
What kind of cabling did the 10BaseFL standard specify?
Fiber-optic
Which type of cable is uses a two-number designator consisting of core and cladding measurements?
Fiber-optic
Which type of cable works best for long-distance transmissions?
Fiber-optic
Which technology refers to an infrastructure that can be utilized to support a SAN?
Fibre Channel over Ethernet (FCoE)
Without the preamble, how many basic pieces of information does an Ethernet frame contain?
Five
On an authoritative DNS server, which storage areas hold the IP addresses and FQDNs for the computers in a domain?
Forward lookup zones
Which zone files are the most important part of any DNS server?
Forward lookup zones
What is the norm today for the number of pairs in UTP cabling?
Four
What characteristic does spread-spectrum transmission change for each user?
Frequency
Which technology is used by multiplexers to separate individual voice calls by keeping every call in its own unique frequency range?
Frequency division multiplexing (FDM)
What are the most common symptoms of malware on a compromised system?
General sluggishness and random crashes
What does the letter "G' stand for in the 2G, 3G and 4G technologies?
Generation
The snmpwalk utility tells the SNMP manager to perform a series of __________ commands.
Get
Which core function is sent when an SNMP manager wants to query an agent?
Get
Which technology introduced the handy subscriber identity module (SIM) card that is now ubiquitous in smartphones?
Global System for Mobile Communications (GSM)
What type of IPv6 address do you need to get on the Internet?
Global unicast address
Which protocol is the underlying protocol used by the World Wide Web?
HTTP
Which protocol uses TCP as its transport layer protocol?
HTTP
Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?
Hash
__________ problems manifest themselves as intermittent problems.
Heat and power
Which vendor was one of the earliest PaaS providers?
Heroku
What term best describes the way the DNS name space is organized?
Hierarchical
Which term refers to the passage of a packet through a router?
Hop
Which term describes the cabling that goes more or less horizontally from a work area to the telecommunications room?
Horizontal cabling run
In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?
Host.domain.root
Which secondary location is a complete duplicate of the primary site?
Hot
What is the meaning of the term "capacitance"?
How long it takes a wire to get a full charge
Which hypervisor comes with Microsoft Server and Windows 10?
Hyper-V
Which organization has the authority to create new top-level domain names?
ICANN
Which protocol does the ping application use?
ICMP
Which protocol is best for simple, connectionless applications that never need more than a single packet?
ICMP
In a modern DCS, each of the local controllers connects (eventually) to a centralized controller—called the __________—where global changes can be managed.
ICS server
Which trunk standard enables you to connect switches from different manufacturers?
IEEE 802.1Q
Which standard includes secure authentication using a RADIUS server and password encryption using EAP?
IEEE 802.1X
Which standard pushed support for multimedia messaging system (MMS) (so you can send cat pictures in your text messages) and IP-based telephony?
IMT-2000
A managed switch needs a(n) __________ to enable configuration on Layer 3.
IP address
What unique numeric identifier is assigned to each device on the network by the IP protocol in the OSI model's Network layer?
IP address
Which tool does Cisco implement to enable DHCP relay?
IP helper
Which protocol suite does L2TP use for all of its security needs?
IPsec
Which statement describes an ISDN PRI?
ISDN PRI is a full T1 line, carrying 23 B channels.
Which standards organization is named for the Greek word for "equal"?
ISO
An incident is an event in which the integrity of a(n) __________ is compromised.
IT infrastructure
What statement describes the advantage of fault tolerance?
If one cable break, all of the other computers can still communicate.
What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?
Independent Basic Service Set (IBSS)
Which cloud service model is used by Amazon Web Services (AWS)?
Infrastructure as a Service (IaaS)
Which companies were involved in the 1979 introduction of the DIX Ethernet standard?
Intel and Digital Equipment Corporation (DEC)
Which column in a routing table tells the router which of its ports to use?
Interface
Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?
Interframe gap
The network or networks within an AS communicate with protocols as well; these are called generically __________.
Interior Gateway Protocol (IGP)
Before plugging in RJ 45 cables, what should you determine to save a lot of time and effort once the system installation starts?
Internal IP addressing scheme
Which organization assigns Autonomous System Numbers (ASNs)?
Internet Assigned Numbers Authority (IANA)
IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations
Internet Corporations for Assigned Names and Numbers (ICANNs)
What is an advantage of fiber-optic cabling over Unshielded Twisted Pair (UTP)?
It has a longer maximum distance.
Which of the following statements best describes the preamble of an Ethernet frame?
It includes a 7-byte series of alternating ones and zeroes followed by a 1-byte Start Frame.
Which statement best describes the importance of virtualization?
It increases flexibility as the scale of an operation increases.
Which statement best describes Logical Link Control (LLC)?
It is a sublayer of the Data Link layer.
Which statement describes an IP address?
It is a unique dotted decimal number assigned to every network device.
What statement describes a function of a NIC?
It uses the CRC to verify the data within each frame.
How does the receiving station on a network use the CRC to verify that it received accurate data?
It uses the same divisor as the sending station to find the same remainder.
Which statement applies to a PCIe NIC?
It usually come in either one-lane (×1) or two-lane (×2) varieties.
Which hypervisor is closely integrated with Linux's kernel?
KVM
Which authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?
Kerberos
Which proprietary Cisco protocol was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP)?
L2F
The "R" in the standard 10GBaseSR stands for which type of signaling?
LAN
What is the most common connector used in a 1000BaseSX network?
LC
Which layer of the OSI model is associated with moving data between computers?
Layer 1
The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.
Layer 3
What OSI model layer supports content switches?
Layer 7
What does the acronym LED stand for?
Light Emitting Diode
Which term is another name for an optical power meter?
Light meter
Which term represents the condition of whether a wireless device is connected?
Link state
Which address does a computer running IPv6 gives itself when it first boots up?
Link-local
Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?
Load balancing
Which technology is marketed as and now generally accepted as a true 4G technology?
Long Term Evolution (LTE)
Which term describes a method that enables an administrator to limit access to a network based on the physical addresses of wireless NICs?
MAC address filtering
VLANs based on __________ are called dynamic VLANs, although they are never used these days.
MAC addresses
Which authentication method is the most common authentication method for dial-up connections?
MS-CHAPv2
Which routing metric determines the largest frame a particular technology can handle?
MTU
Which type of attack involves the attacker tapping into communications between two systems?
Man in the middle
What is the meaning of the "10" in 10BaseT?
Maximum speed of 10 Mbps
Which document defines the duties parties commit to perform for each other and a time frame for the commitment?
Memorandum of understanding (MOU)
Which tool is considered to be the go-to tool for vulnerability testing?
Metasploit
Which device converts an analog signal to digital and a digital signal to analog?
Modulator-demodulator
Which term refers to a technology that serves as a replacement for Frame Relay and ATM switching?
Multi-Protocol Label Switching (MPLS)
Which method of sending a packet allows a single computer to send a packet to a group of interested computers?
Multicast
Which address is a set of reserved addresses designed to go only to certain systems?
Multicast address
What type of fiber-optic cabling and connectors does a 100BaseFX network use?
Multimode with ST or SC connectors
Which device takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire?
Multiplexer
Which of the following is true of the names in a flat name space?
Names must be unique.
Which protocol makes the IPv6 automation magic work?
Neighbor Discovery Protocol (NDP)
Which two tools dominate the vulnerability testing arena?
Nessus and OpenVAS
Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches?
NetFlow
Which command is universally known as the "show me the endpoint" utility?
Netstat
At which layer of the OSI model do routers work?
Network
Routers function at which layer of the OSI model?
Network
To what layer of the OSI model does the TCP/IP model's Internet layer roughly correspond?
Network
Which layer of the OSI model assembles the data it receives into pieces called packets?
Network
Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?
Network
__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.
Network access control (NAC)
__________ is a type of dedicated file server used in many networks.
Network attached storage (NAS)
Which term describes a practical application of a topology and other critical technologies that provides a method to get data from one computer to another on a network?
Network technology
Which tool is a port scanner?
Nmap
Which spread-spectrum broadcasting method is the latest method?
OFDM
Which tool can be used to notify a technician where a cable break is occurring on a fiber cable?
OTDR
What is the only important measure of coax cabling?
Ohm rating
Which term refers to a relative measure of the resistance (or more precisely, characteristic impedance) on a cable?
Ohm rating
What network component is built into most motherboards today?
Onboard NIC
Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?
Open port
If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?
Optical time domain reflectometer (OTDR)
When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?
Overlapping signals
Most PCs today have two types of expansion slots: PCI and __________.
PCIe
Which tools are tunneling protocols?
PPTP and L2TP
Which phone line has a baud rate of 2,400 and uses an RJ-11 connector?
PSTN
Which connection type is limited to point-to-point topology and uses a 25-pin female DB type?
Parallel
In the DNS naming convention, what character(s) separate(s) a domain name from its subdomains?
Period (.)
What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?
Persistent agent
Which type of attack is a form of social engineering?
Phishing
Which layer of the OSI model defines a method of moving radio waves?
Physical
Which pins on an RJ-45 connector are used to receive data?
Pins 3 and 6
Which cloud service provider gives programmers all the tools they need to deploy, administer, and maintain a Web application?
Platform as a Service
What is another name for dynamic NAT? Destination port
Pooled NAT
Which form of NAT typically handles the one-to-many connections?
Port Address Translation (PAT)
Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?
Port forwarding
Which advantage of virtualization provides substantial reduction in dollars spent and electricity used?
Power savings
Which device is an example of a peripheral device?
Printer
Which term defines a number used by the operating system to track all the running programs?
Process ID (PID)
Which utility is categorized in the CompTIA Network+ exam as a hardware tool?
Protocol analyzer
Which tool can be used to access a Cisco router remotely from a Windows system?
PuTTY
Which tool puts UTP wires into 66- and 110-blocks?
Punchdown tool
Which standard offers authentication, authorization, and accounting?
RADIUS
Which term describes a technology that spreads data across multiple drives?
RAID
Which term refers to the most common limiting factor in a host's ability to run virtual machine?
RAM
Which vector routing protocol is the oldest?
RIP
Which routing protocol does not support Variable-Length Subnet Masking (VLSM)?
RIPv1
What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?
RIPv2
Which protocol is a distance vector routing protocol?
RIPv2
Which entity passes out IPv6 prefixes?
RIRs
What type of connector is used by all UTP Ethernet NICs?
RJ-45
Which type of port has a number in the 1024 to 49151 range?
Registered port
Which statement is an accurate comparison between repeaters and bridges?
Repeaters retransmit all packets, while bridges filter and forward traffic based on the MAC addresses of the computers on the network.
Which core function is sent by the agent after the SNMP manager queries an agent with a GetRequest or GetNextRequest?
Response
What enables a system to determine an FQDN by knowing the IP address?
Reverse lookup zones
Which term refers to the administrative account native to Linux?
Root
Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?
Rootkit
What device splits a large network into subnets?
Router
Which statement describes a capability of routers?
Routers allow network connections across data lines that do not use Ethernet.
Which terms refer to versions of DSL service?
SDSL and ADSL
Unified communication leans heavily on ___________ for transmission.
SIP and RTP
Microsoft has used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.
SMB
Which underlying protocol enables network monitoring tools to work?
SNMP
Which record type defines the primary name server in charge of the forward lookup zone?
SOA
Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions, before the IEEE developed the 10 GbE Ethernet standards?
SONET
The "W" in the standard 10GBaseSW stands for which type of signaling?
SONET/WAN
A wireless hotspot is a feature that enables a device to share its cellular WAN connection by setting up a(n) __________ via its own 802.11 wireless.
SSID
What are the two most common types of SSL VPNs?
SSL portal VPNs and SSL tunnel VPNs
In which type of VPN does the client browser run an active control, such as Java?
SSL tunnel
Which zone is created on other DNS servers to act as backups to the primary zone?
Secondary
Which cryptographic hash comes in several versions?
Secure Hash Algorithm (SHA)
Which written document defines how an organization will protect its IT infrastructure?
Security policy
Who is responsible for the process of determining critical assets?
Senior management
Which industrial control system (ICS) device monitors characteristics like temperature?
Sensor
What cabling predates both networking and the personal computer?
Serial
When you install an ISDN terminal adapter (TA), what special number provided by the telephone company must be configured along with the other ISDN telephone number you want to call?
Service Profile ID (SPID)
Which term did Wi-Fi people create to use as another level of naming to describe a standard name applied to the BSS or IBSS to help the connection happen?
Service Set Identifier (SSID)
An NMS can tell an agent to make changes to the information it queries and sends, called variables, through a __________ protocol data unit (PDU).
Set
Which term represents a measurement of how well a wireless device is connecting to other devices?
Signal strength
What type of fiber-optic cable is used in a 1000BaseLX network?
Single-mode fiber
What type of fiber-optic cable uses lasers to send signals?
Single-mode fiber (SMF)
Which switch and network equipment modular transceivers have replaced gigabit interface converters (GBICs) as the modular connector of choice?
Small form-factor pluggable (SFP)
How do many small networks avoid using a full-blown file server?
Small networks take advantage of network attached storage (NAS).
Which term refers to a technology that is great for doing risky (or even not-so-risky) maintenance with a safety net?
Snapshot
Which characters are not permitted in a DNS domain or host name?
Spaces
__________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range.
Spread-spectrum
Which term refers to a function of any program that sends information about your system or your actions over the Internet?
Spyware
Which first generation network topology provided fault tolerance?
Star
A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?
Stateful
A(n) __________ DHCPv6 server relies on router advertisements to give some information to individual hosts, making small changes to what the router advertisements would normally show, such as the address of the DNS server.
Stateless
Which document defines the services and products the vendor agrees to supply and the time frames in which to supply them?
Statement of work (SOW)
__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.
Static NAT
Which characteristic applies to stranded core cabling?
Stranded core wire is actually a bundle of tiny wire strands.
What is the cornerstone of subnetting?
Subnet mask
Which protocol is by far the most common type of session on a typical TCP/IP network?
TCP
Which protocol is connection-oriented?
TCP
What is the de facto protocol suite of the Internet?
TCP/IP
What network protocol do Apple systems use today?
TCP/IP
Which tool can be used to notify a technician where a cable break is occurring on a copper cable?
TDR
What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?
TEMPEST
What file transfer protocol uses UDP port 69?
TFTP
Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?
TFTP
The __________ standard covers proper labeling and documentation of cabling, patch panels, and wall outlets
TIA/EIA 606
Who is often a supporter of first responders to a security incident and should follow good forensic practices?
Technician
What distance can a signal travel on a fiber-optic cable?
Tens of kilometers
Which standard offers authentication, authorization, and accounting?
Terminal Access Control Access Control System Plus (TACACS+)
What information is kept in the cached lookups folder for a DNS server?
The IP addresses already resolved
What information is included in the data portion of an Ethernet frame on an IP network?
The IP addresses of both systems
Which two parts are included in a MAC address?
The Organizationally Unique Identifier and the device ID of the NIC
How are incoming frames handled by a switch?
The frames are sent only to the interface associated with the destination MAC address.
UTP category ratings are based on what criteria?
The highest frequency the cable can handle
Which item is part of a fully qualified domain name (FQDN)?
The host name
What is a shared attribute of all members of the Ethernet family of networking technologies?
The network access method
What item do most professional cable installers use to quote the price for an installation?
The number of drops
Where does the CRC originate in a network frame?
The sending NIC attaches it.
In a specification such as 10BaseT, what does the word "base" identify?
The signal type
Which statement describes a weakness in WEP that allows it to be easily cracked?
The size of the encryption key
Which statement is true about DNS root servers?
They delegate name resolution to other DNS servers.
Which statement is true regarding standard equipment racks?
They provide safe, stable platforms for all the different hardware components.
Which term refers to any form of potential attack against your network?
Threat
Which tool is falls into the category of a third-party software tool?
Throughput tester
What is the purpose of a crimper?
To connect a RJ-45 connector to the cable
What is another name for a timestamped service ticket?
Token
Which tool has only one job: to help a technician locate a particular cable?
Tone generator
Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?
Transparent, server, and client
An agent can solicit information from an NMS with the __________ protocol data unit (PDU).
Trap
Which type of malware looks or pretends to do one thing while, at the same time, doing something evil?
Trojan
Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?
Trunk port
What is the only way to ensure Bluetooth security in a high-security environment?
Turn it off
How many pairs of wires in a cable did a 10BaseT device actually use?
Two
How many copper wires are used by a T1 line?
Two pairs
Which type of hypervisor relies on an underlying operating system?
Type-2
Which device takes 8-bit-wide digital data, converts it into 1-bit-wide digital data, and then hands it to a modem for conversion to analog?
UART
Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?
UDP
Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?
UDP
What type of address is a link-local address?
Unicast
Which method of sending a packet allows one computer to send a message directly to another user?
Unicast
Which type of cabling does the 10BaseT standard specify?
Unshielded Twisted Pair (UTP)
Which cable type suffers from electromagnetic interference (EMI)?
Unshielded twisted pair (UTP)
What is the current modem standard now on the market?
V.92
Which process allows you to assign ports to VLANs after you create the VLANs?
VLAN assignment
Which program is an example of bare-metal virtualization software?
VMware ESXi
Which tool is an example of a Type 1 hypervisor?
VMware ESXi
What hardware component was the first type of popular virtual machine seen in the PC world?
Virtual desktop
Which type of network enables you to segment a physical network into multiple discreet networks without adding additional hardware?
Virtual local area network (VLAN)
Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?
Virtual private network (VPN)
Which term refers to taking the hardware of the host system and segmenting it into individual virtual machines?
Virtualization
Which secondary location lacks current data and may not have functioning Internet/network links?
Warm
What function uses port 80?
Web server
What name is given to the port numbers in the range of 0 to 1023?
Well-known port numbers
Which individual will examine an infrastructure to find existing vulnerabilities and, instead of hurting the infrastructure, report findings so that an administrator can further harden the network?
White hat hacker
Which data encryption standard is outdated and should never be used?
Wired Equivalent Privacy (WEP)
Which program is an example of a powerful and free protocol analyzer?
Wireshark
Which type of malware replicates exclusively through networks?
Worm
Which term refers to the first generation of packet-switching technology?
X.25
Which term refers to a single computer under the control of an operator?
Zombie
In comparing the DNS name space to a computer's file system, a domain is like __________.
a folder
Community clouds are run by __________.
a group of organizations with similar goals or needs
A port will drop a packet for one of two reasons: __________.
an error or a discard
In IPv6, __________ is commonly used with DNS.
anycast
One of the benefits of using a SAN is that, by just reading and writing at the block level, it __________.
avoids the performance costs of implementing its own file system
A first responder's main way to secure an area is __________.
being physically present at the scene
Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.
biometric devices
Most switches enable you to use multiple NICs for a single machine, a process called __________ or link aggregation.
bonding
Which filtering term does Wireshark use when creating a file that only shows DHCP packets?
bootp
Pretty much any attempt to guess the contents of some kind of data field that isn't obvious (or is hidden) is considered a(n) __________ attack.
brute force
If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.
business continuity
A packet sniffer is a program that queries a network interface and collects packets in a file called a __________ file.
capture
What entry is made at the command prompt in UNIX/Linux to display DNS server information?
cat /etc/resolv.conf
Time-division multiple access (TDMA) enabled multiple users to share the same __________ more or less at the same time.
channel
IP cameras and __________ are specific implementations of video monitoring.
closed-circuit televisions
Both near-end crosstalk (NEXT) and far-end crosstalk (FEXT) are measured in __________.
decibels
On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet's __________.
destination IP addresses
When talking about QoS for medianets, an administrator needs to develop the concept of __________.
differentiated Services (DiffServ)
Which command, while not available on Windows, can be used on macOS/UNIX/Linux systems to diagnose DNS problems?
dig
If an incident can no longer be contained, causing significant damage or danger to the immediate infrastructure, it is covered under __________.
disaster recovery
If an incident is so vast that the incident response team cannot stop, contain, or remediate it, __________ comes into play.
disaster recovery
A __________ is when a port intentionally drops a well-formed frame.
discard
Bluetooth devices are not visible unless they are manually set to __________ mode.
discoverable
The vast majority of network rollouts in offices use a base of 1000BaseT connections, or __________, as you'll hear them called.
drops
In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.
duplex
An SNMP system has up to __________ core functions (depending on the version of SNMP).
eight
An oscilloscope is a powerful tool that enables a technician to see __________.
electrical pulses
A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.
ephemeral port number
A __________ cable that uses LEDs is known as multimode fiber (MMF).
fiber-optic
A Class C network block uses the __________ octets to define only the network ID.
first three
The older __________ connector left a little gap between the connection points due to imperfections in the glass.
flat-surface connector
In NetFlow, single flows are stored in a __________.
flow cache
All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs.
frame type
A __________ VPN deals with a specific single connection between two machines using VPN software or hardware.
host-to-host
A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network, is commonly called a(n) __________ connection.
host-to-site
The first and last bastion of defense for an entire infrastructure's security is at the individual __________.
hosts
Both Z-Wave and Zigbee use a mesh networking topology to facilitate communication in homes, yet both also have __________ that act as the network interconnect.
hubs
A supervisory control and data acquisition (SCADA) system is a subset of the __________.
industrial control system (ICS)
Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.
integrity
If you want to know how hard your network is working, use a(n) __________.
interface monitor
A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating __________.
interference
Which Linux command can be used to view IP settings?
ip
Which command can be used on a Windows computer to view the IP settings?
ipconfig
ARP poisoning is a common method for __________ attacks.
man in the middle
The SNMP manager requests and processes information from the __________ devices.
managed
Cat ratings are officially rated in __________, indicating the highest frequency the cable can handle.
megahertz (MHz)
In the case of a switch, it is typical for packet sniffers to connect to an interface using a __________ port.
mirrored
Which command is a dynamic (keeps running) equivalent to traceroute?
mtr
The VLAN designation for a trunk port is its __________VLAN.
native
When an IPv6 computer joins a network, it sends out multicast __________ packets searching for other computers on its broadcast domain.
neighbor solicitation
Software defined networking (SDN) cuts the control plane of individual devices out of the picture and lets an all-knowing program called a __________ controller dictate how both physical and virtual network components move traffic through the network.
network
The __________ defines who may access the network, how they may access the network, and what they can access.
network access policy
Which command would a technician use to diagnose DNS problems on a Windows computer?
nslookup
One of the first techniques that malicious users try is to probe hosts to identify any __________ ports.
open
The __________ watches some kind of monitor—the interface—and intervenes if necessary.
operator
A protocol analyzer tool is often referred to as a __________ analyzer.
packet
In NetFlow, a single flow is a flow of __________ from one specific place to another.
packets
NFC tags are __________.
passive
Microsoft has a utility called __________ that combines the functions of ping and tracert and adds some additional functions.
pathping
Virtual servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) providers, often at rates measured in __________ per hour.
pennies
Every Fully Qualified Domain Name (FQDN) will always have a(n) __________ on the end to signify the root.
period (.)
When a router has more than one route to the same network, the responsibility for assigning a different metric for each route lies with the __________.
person in charge of that router
Connected Bluetooth devices create a __________.
personal area network (PAN)
A MAC address is also known as a(n) __________ address.
physical
Which utility uses Internet Message Control Protocol (ICMP) packets to query by IP or by name?
ping
Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can be made between two computers?
ping and traceroute
Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.
ping of death
Interface monitors track the quantity and utilization of traffic through a physical __________ or ports on a single device.
port
Cisco uses what it calls __________ as one of its tools to implement network admission control.
posture assessment
Packet sniffers need to capture all the packets they can so it is typical for them to connect to an interface in __________ mode.
promiscuous
Which type of backups are really just redundant servers?
real-time
Installing backup power in case of electrical failure is a form of __________.
redundancy
If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.
request timed out
Training users to recognize social-engineering tactics assists in __________.
risk management
Which utility enables you to display and edit the local system's routing table?
route
Instead of NAT and private network IDs, IPv6 relies on __________.
router advertisements
A __________only comes into play if a computer hasn't heard from the router recently and demands a router advertisement.
router solicitation
The secret to dealing with failures is to avoid a __________.
single point of failure
Managed devices run specialized __________ called agents.
software
Code-division multiple access (CDMA) came out not long after GSM, and used a __________form of transmission.
spread-spectrum
Which command used in Linux is faster and more powerful than netstat?
ss
The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.
switch
A __________ is an example of something to monitor.
temperature
In a Basic Service Set Identifier (BSSID) infrastructure mode network, the BSSID is the same as __________ for the WAP.
the MAC address
Which software tool is built into operating systems?
traceroute
Which utility can be used to diagnose where a problem lies when you have problems reaching a remote system?
traceroute
Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.
unique
Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?
vSphere Client
The technology behind bridging NICs is a __________, which is just software that does the same Layer 2 switching a hardware switch does, including features like VLANs.
virtual switch
The different colors of the laser signals feature different __________.
wavelengths
When testing for continuity using a multimeter set it to Ohms; if you have a connection you will see a(n) __________ reading.
zero Ohms