Chapter 7 thru Chapter 12_Computer Network Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Layer 7

At what layer of the OSI model do proxy servers operate?

24 bits

How many bits of a Class A IP address are used for host information?

2B+D

How many channels are in an ISDN PRI connection?

Logic bomb

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

top listener

One of your coworkers downloaded several, very large video files for a special project she's working in for a new client. When you run your network monitor later this afternoon, what list will your coworker;s computer likely show up on?

SNMP Get Next

What command requests the next record in an SNMP log?

AD (Active Directory)

What feature of Windows Server allows for agentless authentication?

virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

How long devices like this one will last on average until the next failure

When shopping for a new router, what does the MTBF tell you?

802.1Q

Which IEEE standard determines how VLANs work on a network?

Application Awareness

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

PaaS (Platform as a Service)

Which cloud computing services model gives software developers access to multiple operating systems for testing?

switchport port-security

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

integrity

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

The fourth one

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

access-list acl_2 permit http any any

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

Wireshark

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

posture assessment

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

Traffic shaping

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

OC levels, digital signal levels

______________ in SONET are analogous to the ________________ of T-carriers.

Phishing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?

NDA

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

Port 161

What port do SNMP agents listen on?

DirectAccess

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

Hypervisor

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer

Agent

What software might be installed on a device in order to authentication it to the network?

DOCSIS (Data Over Cable Service Interface Specification)

What specifications define the standards for cable broadband?

Between Layer 2 and 3

Where does an MPLS label go in a PDU?

VDSL

Which DSL standard has the fastest speeds immediately outside the CO?

application-aware firewall

Which of the following features is common to both an NGFW and traditional firewalls?

Speed

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

SSH (Secure Shell)

Which of the following is considered a secure protocol?

To increase the number of networking devices on a network

Which of the following is not a good reason to segment a network?

Access Control

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

deauthentication attack

Which of these attacks is a form of Wi-Fi DoS attack?

SFTP (Secure File Transfer Protocol)

Which remote file access protocol is an extension of SSH?

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite?

DRDoS (distributed reflector DoS) attack

Which type of DoS attack orchestrates an attack using uninfected computers?

Cold site

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement.

DHCP relay agent

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need?

TDMA (Time Division Multiple Access)

What method does a GSM network use to separate data on a channel?

Insider Threat

A former employee discovers six months after he starts work at a new company that his account credentials still give friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

LDAP (Lightweight Directory Access Protocol)

Active Directory and 390 Directory Server are both compatible with which directory access protocol?

Dedicated line, virtual circuit

An organization can lease a private, _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.

DNS poisoning

A spoofed DNS record spreads to other DNS servers. What is this attack called?

DiffServ (Differentiated Service)

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

2h-2=Z

What is the formula for determining the number of possible hosts on a network?

Layer3

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Penetration Testing

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Smart jack

What kind of device can monitor a connection at the demarc but cannot interpret data?

Content-filtering firewall

What kind of firewall blocks traffic based on application data contained with the packets?

circuit-switched

What kind of network is the PSTN?

trunk

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Online UPS

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

PPPoE (Point-to-Point Protocol over Ethernet)

Which remote access protocol is used over an Ethernet network?


Ensembles d'études connexes

Florida 2 15 Taxes, Retirement, and other Insurance Concepts

View Set

Depression and Suicidal Thoughts/Behaviors and Practice Q's

View Set

Legal and Social Environment - Finance Exam 1

View Set

Chapter 23 - The United States and The Cold War

View Set

Fundamentals Chapter 35 (Nutrition)

View Set

Security Program and Policies Ch 6

View Set

Externalities and market failure

View Set