Network+ Guide to Networks, Exam 3 (ch 9-12) study guide, CIT 45

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What Is Port Mirroring, and what does it accomplish?

Allows an administrator to configure the switch to copy traffic that occurs on some or all ports to a designated monitoring port on the switch. Enables in/outbound traffic from switch ports to be duplicated at the mirrored port

An RFID label on a box is an example of what type of physical security detection method?

Asset tracking tagging

This type of attack prevents legitimate users from accessing normal network resources.

DoS attack (Denial of service)

What type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

DoS attack (Denial of service)

How often should you require users to change their passwords?

Every 60 days

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

Expedited forwarding

The day after Patch Tuesday

Exploit Wednesday

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

Geofencing

A differential backup covers what data on a system?

It includes data that has changed since the last full backup.

What is the Nmap utility used for?

It is a port scanning utility that can identify open ports on a host.

In a public switched telephone network, what portion of the network is known as the local loop?

It is the portion that connects any residence or business to the nearest central office.

A network TAP serves what purpose on a network?

It provides a mirrored port for monitoring traffic between other ports.

What is it called when a device handles electrical signals improperly, usually resulting from a bad NIC?

Jabber

By default, Active Directory is configured to use this security protocol

Kerberos

This type of attack relies on redirected and captured secure transmissions as they occur.

Man in the middle attack

This utility performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers.

Nessus

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?

OC-3 (optical carrier 3)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

Online UPS (uninterruptible power supply)

This standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding

PEAP standard (protected extensible authentication protocol)

Packets that are smaller than a medium's minimum packet size.

Runts

Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?

SDSL (symmetric digital subscriber line)

Which Layer 1 WAN technology is used to traverse multiple ISP networks, connecting these networks to the Internet backbone?

SONET (Synchronous Optical Network)

Over a long-distance connection, this is more secure than using passwords.

SSH keys

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

Sha254sum

Which protocol designed to replace STP operates at Layer 3 of the OSI model?

Shortest Path Bridging (SPB)

What type of virtual circuit allows connections to be established when parties need to transmit?

Switched Virtual Circuit (SVC)

How would you configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports?

Use the switchport port-security command to enable MAC filtering.

Most satellites circle the Earth in which level of Orbit?

geosynchronous orbit

What are some advantages of network attached storage devices?

improved efficiency, improved flexibility, centralized storage, simplified management, scalability, high availability, security, low cost, ease of deployment

What does a Stateless Firewall accomplish?

manages each incoming packet as a stand-alone entity, without regard to currently active connections.

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

mean time between failures (MTBF)

If A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, what kind of social engineering tactic is this?

tailgating

At what point is a packet considered to be a giant?

when it exceeds the medium's maximum packet size.

How many channels does a single T1 circuit carry?

24

How many transponders are contained within a typical satellite?

24 to 32

The C-Band utilized by satellites consists of what frequency range?

3.4-6.7 GHz

When using DOCSIS 3.0, what is the minimum number of channels that can be used?

4

What is the maximum throughput of a DS3 connection?

44,736

What is the size of an ATM cell, including the header?

53 bytes

Class of Service utilizes how many levels of priority?

8 levels of priority and modifies the PCP field in an 802.1Q tag.

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

802.11i

A highly available server is available what percentage of the time?

99.99%

A momentary decrease in voltage

Brownout (aka sag)

The grouping of multiple servers so that they appear as a single device to the rest of the Network

Clustering

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast was interjecting TCP segments with the RST (reset) field set.

In a cellular network, where does each wireless base station connect to?

a mobile switching center.

What is an Object Identifier?

a unique key for each record in the database, not just in a table

What kind of firewall can block designated types of traffic based on application data contained within packets?

content-filtering firewall

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable use policy document

What does File Integrity Monitoring do?

alerts the system of any changes made to files that shouldn't change

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

distributed reflection denial-of-service attack (DRDoS)

In planning for disaster recovery, what is the ultimate goal?

ensure business continuity

What is a SIEM (Security Information and Event Management) system utilized for?

evaluate data from security devices and generate alerts.


Kaugnay na mga set ng pag-aaral

NURS 204 - Exam 2 - Chapters 14, 15, 16

View Set

Chapter 6 - Nursing Care of Mother and Infant During Labor and Birth

View Set

Digital Marketing 4650: Google Ads

View Set

Extra: Wie - wat - waar - waarom (Cristhian)

View Set

Chapter 10 and 19- microeconomics

View Set

World Geography A Unit 5: Europe

View Set