CIST1401 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A subnet of 255.255.248.0 can be represented by what CIDR notation? /18 /21 /29 /20

/21

What is the minimal amount of voltage required to damage an electrical component? 5 volts 1500 volts 10 volts 100 volts

10 volts

You have been tasked with the creation and design of a network that must support a minimum of 5000 hosts. Which network accomplishes this goal? 10.3.0.0/19 192.168.0.0/20 10.90.0.0/22 172.20.50.0/23

10.3.0.0/19 /19 = 8190 /20 = 4094

When planning horizontal cabling, what is the maximum allowable distance that can be used? a) 300 meters b) ? c) ? d) 100 meters (1/10 km)

100 meters (1/10 km)

When using SNMP with TLS, what port do agents receive requests on? 162 10161 161 10162

10161

Which of the following is NOT a range of IP addresses recommended for use in private networks? 172.16.0.0 thru 172.31.255.255 127.0.0.0 thru 127.255.255.255 10.0.0.0 thru 10.255.255.255 192.168.0.0 through 192.168.255.255

127.0.0.0 thru 127.255.255.255

Which of the following IP addresses would be a loopback IP address? 192.168.1.1 169.254.0.1 224.0.0.1 127.0.0.1

127.0.0.1 loopback IP address: reserved IP addr 127.0.0.1-127.255.255.254 >used to verify TCP/IP is configured correctly on a computer where it can talk to and hear itself on loopback interface

In the classful addressing scheme, what range of network addresses is considered a Class B? 1.x.y.z to 126.x.y.z 192.0.0.x to 223.255.255.x 224.x.y.z to 255.x.y.z 128.0.x.y to 191.255.x.y

128.0.x.y to 191.255.x.y 1.x.y.z to 126.x.y.z --> Class A 128.0.x.y to 191.255.x.y --> Class B 192.0.0.x to 223.255.255.x Class C

The 1000Base-LX utilizes light with what wavelength? 1550 nanometers 1200 nanometers 1300 nanometers 850 nanometers

1300 nanometers

Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host? 172.16.2.0 172.16.1.0 172.0.0.0 172.16.0.0

172.16.0.0 255.255.254.0 is /23

By default, when using classful addressing, how many bits exist in the host portion of a Class A address? 8 32 16 24

24

Multiplexing enables a single T1 circuit to carry how many channels? 24 64 1 12

24

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet? 255.255.224.0 255.255.192.0 255.255.248.0 255.255.128.0

255.255.224.0 Minimum of 6 --> /17 = 2 subnets /18 = 4 /19 = 8 --> 255.255.224 /20 = 16 2^h - 2 = z h = bits remaining in host z = num hosts avail in each subnet

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value? 0.0.0.0 255.255.255.255 0.0.255.255 255.255.0.0

255.255.255.255

The wireless spectrum, as defined by the FCC, spans between which two frequencies? 125 kHz and 150 GHz 3 kHz and 500 GHz 9 kHz and 300 GHz 3 MHz and 300 GHz

9 kHz and 300 GHz

What is NOT a variable that an network access control list can filter traffic with? The Network layer protocol used for the packet. The Transport layer protocol used for the packet. The operating system used by the source or destination device. The source or destination TCP/UDP port number in the packet.

The operating system used by the source or destination device.

What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network? The packet will be dropped silently, requiring the communicating application try again. The protocol will send an ICMP message to the destination, requesting a larger packet size be allowed. The protocol will notify a network router capable of receiving the packet, and a new path will be used to the destination. The packet will be divided into smaller packets using fragmentation.

The packet will be divided into smaller packets using fragmentation.

In the United States, who is able to activate the Emergency Alert System at the national level? The Federal Bureau of Investigation The President Any U.S. state or territory Local law enforcement

The president

Which statement regarding the use of a bridged mode vNIC is accurate? The vNIC will utilize the host PC's IP address. The vNIC will be assigned a NAT-ed IP address. The vNIC will only be able to communicate across the bridge to the host PC. The vNIC will its own IP address on the physical LAN.

The vNIC will its own IP address on the physical LAN.

A hexadecimal number is a number written in the base 16 number system. True or false?

True

A wavelength mismatch occurs when transmissions are optimized for one type of cable but sent over a different type of cable. True or False

True

By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos. True or false?

True

Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered. True or False

True

Digital certificates are issued, maintained, and validated by an organization called a certificate authority (CA). True or false?

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission. True or false?

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets. True or false?

True

In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses? A record PTR record AAAA record TXT record

AAAA record A Records name to address for hosts PTR records used for reverse lookups (provides host name when you know IP addr) TXT records are only freeform text.

In a public switched telephone network, lines are terminated at the central office. True or false?

True

In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch. True or false?

True

Multimode fiber contains a core that is larger than a single mode fiber core. True or false?

True

Network segmentation at Layer 2 of the OSI model is accomplished using VLANs. True or False

True

Over a long-distance connection, using SSH keys is more secure than using passwords. True or false?

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console. True or false

True

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack. True or false?

True

The cost of upgrading infrastructure has been a major factor in the slow adoption of IPv6. True or false?

True

The day after Patch Tuesday is informally dubbed Exploit Wednesday. True or false

True

The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks. True or false?

True

The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively. True or false?

True

The process of designing, implementing, and maintaining an entire network is called the system life cycle. True or false?

True

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed. True or false?

True

The word "synchronous" as used in the name of Synchronous Optical Network means that data being transmitted and received by nodes must conform to a timing scheme. True or false

True

User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders. True or false?

True AAA --> Authorization

The storm-control command is a type of flood guard that is available on most major network switch vendor platforms. True or false

True "Big 3" vendors use command: "storm control" (w/o hyphen for Huawei)

Latency on data networks is based on a calculation of a packet's round trip time (RTT). True or false?

True "Network can be segmented... physical via LAN (Layer 1) logic via VLAN (layer 2) subnet (layer 3)

A drop ceiling could be used by an intruder to gain access to a secured room. True or false?

True Drop ceilings = suspended ceiling Those liftable ceiling tiles, i think...

What is by far the most popular DNS server software available? Oracle Resolver BIND Dnsmasq Microsoft DNS

BIND BIND runs on Linus, Unix, and Windows (usually incl. in most Linux/Unix distributions)

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs? BPDU drop BPDU guard root guard BPDU filter

BPDU guard root guard --> prevent switches (beyond config'd port) from becoming root bridge BDPU filter --> disable STP on specific ports

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean? The router serving the network will have a redundant spare. Two different IPv4 address spaces will exist on the same network segment. The network will exist on two separate segments, separated by a proxy. Both IPv4 and IPv6 protocols will be used on the network.

Both IPv4 and IPv6 protocols will be used on the network.

Which of the following virtualization products is an example of a bare-metal hypervisor? Citrix XenServer Linux KVM VMware Player VirtualBox

Citrix XenServer

What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels? Dynamic SmartVPN Auto Switched VPN Service Dynamic Multipoint VPN Symmetric VPN Autodial

Dynamic Multipoint VPN DMVPN

A native VLAN mismatch occurs when two access ports that are connected to each other are both tagging traffic with different VLAN IDs. True or false?

False

A serial cable with an RJ-45 connector is capable of being used through an RJ-45 Ethernet port. True or false

False

Different types of organizations have similar levels of network security risks. True or False

False

IPv4 and IPv6 use the same packet format.​ True or false?

False

It is ideal to use the same password for multiple different applications, provided the password is complex enough. True or false

False

NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded. True or False

False

Only Class B and Class C networks can be subnetted. True or false?

False

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year. True or false

False 99.99% = 4m, 22s/mo or 52m/yr 99.999% = 26s / mo or 5.5m/yr

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch. True or false?

False ??? I still don't know why

DSL services require many subscribers to share the same local line, causing potential security concerns. True or false?

False Cable Broadband = Many subscribers to local line + potential security concerns

The original version of the Secure Hash Algorithm was developed by MIT. True or false?

False Developed by NSA SHA = most commonly used hashing algorithm

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80. True or false?

False HTTP = port 80 HTTPS = port 443

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network. True or false

False LANs connect connect nodes, workstations, small devices, etc. in small area on single network. WANs = network traversing significant distance; connects LANs

The LLC sublayer is primarily concerned with managing MAC addresses in message frames. True or False

False LLC sublayer primarily concerned with multiplexing flow control + error reliability

RG-59 is more expensive than RG-6, but has better resistance to attenuation. True or false?

False RG59: *short connections (monitors in a bldg) *less expensive *greater attenuation RG-6 *long-dist connections (broadband, satellite) more common

The Spanning Tree Protocol operates at the Network layer of the OSI model. True or false?

False STP --> prevents traffic loops Operates at the Data Link layer

What is a defining characteristic of a bus topology based network? Devices are daisy-chained together in a single line. Devices are directly attached to a network router, which forwards data to intended destinations. Devices are connected to two adjacent devices, and communication priority is granted by a token. Devices are connected directly to a centralized networking device, known as a network switch.

Devices are daisy-chained together in a single line.

Which of the following suggestions can help prevent VLAN hopping attacks on a network? Disable auto trunking and move native VLANs to unused VLANs. Install a router to process the untagged traffic on the VLAN. Use MAC address filtering. Install an additional switch to isolate traffic.

Disable auto trunking and move native VLANs to unused VLANs.

The Link Aggregation Control Protocol was initially defined by what IEEE standard? IEEE 802.3af IEEE 802.1cd IEEE 802.3bd IEEE 802.3ad

IEEE 802.3af Keyword is INITIALLY... Current = 802.1ax

What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node? IP address autonomous system address port address MAC address

IP address

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission? TLS SSL L2TP IPsec

IPsec Re-establishment of a connection --> minimizes interference TCP/ICP transmission --> operates in 2 modes: 1) Transport mode (connects 2 hosts) 2) Tunnel mode (runs on routers in context of VPNs)

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost? Fibre Channel (FC) Internet SCSI (iSCSI) Fibre Channel over Ethernet (FCoE) InfiniBand (IB)

Internet SCSI (iSCSI)

What does the Common Address Redundancy Protocol do? It allows multiple devices to share the same fully qualified domain name. It allows multiple devices to share hardware resources. It allows a pool of computers or interfaces to share the same MAC address. It allows a pool of computers or interfaces to share the same IP address.

It allows a pool of computers or interfaces to share the same IP address. CARP --> AKA group redundancy -one device gets to act as master

At what point is a packet considered to be a giant? It becomes a giant only when fragmented pieces are reassembled and the packet size is too large. It becomes a giant when it exceeds the medium's maximum packet size. It becomes a giant when it exceeds 1500 bytes. It becomes a giant once a VLAN tag is added.

It becomes a giant when it exceeds the medium's maximum packet size.

How does refraction affect the propagation of a wireless transmission? It causes the signal to be returned back towards the source of the origin. It causes the signal to be absorbed by the refracting material. It splits the signal into secondary waves that continue in the direction in which they split. It distorts the signal as it travels into and through a different transmission medium.

It distorts the signal as it travels into and through a different transmission medium.

A differential backup covers what data on a system? It includes only data that has changed since the last backup. It includes data that has changed since the last full backup. It includes data that has changed since the last incremental backup. It includes all data every time it is performed.

It includes data that has changed since the last full backup. since last backup = incremental

What is distributed switching? It is a single physical switch that is partitioned in software to perform as multiple switches It is a single distributed vSwitch that can service VMs across multiple hosts. It is multiple switches that provide redundancy switching for all switches in the group. It is when multiple physical switches are configured to act as a single switch hosts.

It is a single distributed vSwitch that can service VMs across multiple hosts.

When using Kerberos, what is the purpose of a ticket? It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated. It is a key used by the client to gain access to services that are protected by the key on the network. It is the name for a Kerberos client or user. It is the event that is generated when auditing a resource and unauthorized access is attempted.

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop. True or false

True EAP = Extensible Authentication Server -RADIUS server used in coop w/ an auth server -3 main entities: *supplicant (a device) *authenticator (network device initiates auth process; e.g. wireless AP) *auth server

Although MPLS can operate over Ethernet frames, it is more often used with other Layer 2 protocols, like those designed for WANs. True or false?

True MPLS = Multiprotocol Label Switching *combines elements of both circuit-switching and packet-switching *enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag. True or False

True PCP = Priority Code Point Ranges 0 - 7

PPP can support several types of Network layer protocols that might use the connection. True or False?

True PPP = data link layer PPP frames encapsulate network layer

A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist. True or false?

True TDR --> issue signal, measure signal reflection. --> bad connectors, crimps, beds(?), short circuits, cable mismatches, etc.

An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet. True or false

True Two address fields = destination address and source address

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol. True or false?

True VNC --> Gui based remote virtual computing Slower than RDP Open source

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard. True or false?

True WPAN - rarely exceeds 10m, few ????

A master service agreement (MSA) is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements. True or false?

True.

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF). True or False?

True.

The Border Gateway Protocol is considered to be a hybrid routing protocol. True or false?

True. BGP = "Protocol of the Internet" =Only routing protocol that connects to EGP ="hybrid routing protocol" is per CompTIA Network+ exam

In general, a Layer 3 or Layer 4 switch is still optimized for fast Layer 2 data handling. True or false?

True. Layers 2,3, and 4 switches are ALL optimized for faster Layer 2 data handling. Layers 3 and 4 switches $$$ > Layer 2 Layer 4 switches operates anywhere between layer 4-7

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD. True or false?

True. TLD = "Top Level Domain" (e.g. '.com') Root servers = DNS server; authority on how to contact TLD.

VMware Player and Linux KVM are both examples of what type of hypervisor? Type 2 hypervisor bare-metal hypervisor Type 1 hypervisor barebones hypervisor

Type 2 hypervisor Barebones hypervisors aren't a thing

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols? interior gateway protocols distance vector protocols border gateway protocols link-state protocols

Link-State protocols Interior gateway protocols --> type, not algorithm. Used by core/edge routers.

Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers? L0phtcrack Nmap Nessus Metasploit

Nessus

At what layer of the OSI model does the IPsec encryption protocol operate? Application layer Network layer Transport layer Physical layer

Network layer IPsec encryption protocol defines rules for encryption, authorization, and key management for TCP/IP transmission

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s? OC-12 OC-1 OC-3 OC-24

OC-3 OC-12: Used by ISPs for WAN connections; large enterprises. 3 OC-1 lines in single stream. OC-1: base rate (51.84 Mbps throughput) OC-24: used primarily by ISPs and large enterprises

What federal agency is charged with safety and health in the workplace? Hazardous Materials and Safety Management (HMSM) Occupational Safety and Health Administration (OSHA) Office Safety and Standards Department (OSSD) Workplace Safety and Hazard Administration (WSHA)

OSHA

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)? Priority Code Point (PCP) Tag Protocol Identifier (TPID) CRC checksum EtherType

Priority Code Point (PCP) CoS = Only techniques on Layer 2; Ethernet frames -METHOD of implementing QoS PCP --> addr'd to specific VLAN; set 0 to 7 (indicates to switch lvl of priority msg should be given)

What is NOT a TIA/EIA recognized cabling type that can be used for horizontal cabling? fiber-optic RG-6 Coaxial unshielded twisted pair (UTP) shielded twisted pair (STP)

RG-6 Coaxial

What mail protocol is used to send mail messages to a server?​ HTTPS IMAP 4 SMTP POP3

SMTP or Simple Mail Transfer Protocol (moves messages from one server to another) IMAP 4 --> mail retrieval protocol. Stores msgs on a mail server. POP3 --> mail retreival protocol. Mail is DL'd to client, then deleted from server.

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention? HTTP SNMP POP3 SMTP

SNMP (Simple Network Management Protocol)

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer? master service agreement service-level agreement memorandum of understanding statement of work

Service-level agreement

What aspect of AAA is responsible for determining what a user can and cannot do with network resources? authorization accounting accessibility authentication

authorization

In IEEE terminology, a group of stations that share an access point are said to be part of which of the following? modified service set basic service set extended service set generic service set

basic service set Group of stations = nodes Identifer = BSSID

Where are MPLS labels placed within a frame? at the end of the layer 2 trailer between the layer 2 header and the layer 3 header between the data payload and the layer 2 trailer between the layer 3 header and the data payload

between the layer 2 header and the layer 3 header MPLS = Can handle various types of payloads; type of switching that enables multiple types of Layer 3 protocols to travel over any one of several connection-oriented Layer 2 protocols - aka SHIM or layer 2.5

What multiplexing technology lowers cost by spacing frequency bands wider apart to allow for cheaper transceiver equipment? coarse wavelength division multiplexing spaced wavelength division multiplexing dense wavelength division multiplexing statistical time division multiplexing

coarse wavelength division multiplexing

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream? assured forwarding scaled forwarding prioritized forwarding expedited forwarding

expedited forwarding DiffServ = technique that addresses QoS issues by prioritizing all traffic at Layer 3

An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system? fail-dynamic fail-close fail-open fail-tolerant

fail-close

The Data Link Layer utilizes what name for its protocol data unit (PDU)? data frame bit packet

frame frame = entire data link message (header + payload + trailer)+

The Group Policy utility can be opened by typing what name into a Run box? secpol.msc grppol.msc grouppol.msc gpedit.msc

gpedit.msc

What IPv6 field is similar to the TTL field in IPv4 packets? next header flow label hop limit distance vector

hop limit

Which type of backup scheme only covers data that has changed since the last backup? snapshot backup differential backup full backup incremental backup

incremental backup

A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem? ipconfig /flushdns ipconfig /renew ipconfig /refresh ipconfig /release

ipconfig /flushdns other commands... ipconfig /renew --> leases new IP addr (often same 1 you just released) ipconfig /release --> releases IP addr when dynamic IP addr being used...effectively disables the computer's communication w/ the network until new one assigned

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall? modfire ipf netwall iptables

iptables

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c? multicast address anycast address global address link local address

link local address Multicast --> FF00::/8 Global Link --> 2000::/3 local link --> FE80::/64

You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size? subscriber connector (SC) local connector (LC) Mechanical Transfer-Registered Jack (MTRJ) straight tip (ST)

local connector (LC) SMF (single mode fiber): LC = 1.25mm SC, ST = 2.5mm

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? management frames data frames extended frames control frames

management frames

Which command will produce statistics about each message transmitted by a host, separated according to protocol type? ipconfig -s ipstat -a netstat -s netstat -an

netstat -s

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery? surge UPS online UPS line conditioning UPS standby UPS

online UPS Online UPS --> server never needs to switch from outlet to UPS, therefore uninterruptible Line conditioning UPS --> Filter for UPS. Guards against line noise. Standby UPS --> Continuous voltage to a device by switching virtually instantly to the battery when it detects power loss from outlet. Device may have shut off in that second. aka offline UPS

What term is used to describe a space that is rented at a data center facility by a service provider? central service point (CSP) point of presence (PoP) locally exchanged data point (ledp) service location (SL)

point of presence (PoP) Data center --> colocation facility

Which of the following terms is used to describe the onfiguration of a port to copy all traffic passing through the switch to the device at the other end of the port? port supertrunking port shadowing port mirroring port lurking

port mirroring port mirroring: all traffic sent to any port on a switch can be sent to a mirrored port

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use? display stats lastboot show runtime uptime

uptime

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs? vertical cross connect diagonal cabling patch cable horizontal cross connect

vertical cross connect (think the wiring that goes vertically up/down) patch cabling --> cables short, connector on both ends

What text editor can be used on Linux to view and edit the contents of a configuration file? vim edit Microsoft Word Notepad

vim

What type of device can be used to assess the quality of a wireless signal? Wi-Fi analyzer frequency hopper spectrum analyzer channel scanner

spectrum analyzer

Utilizing time slots that are adjusted according to priority and need is an example of what type of multiplexing on copper lines? wavelength division multiplexing time division multiplexing frequency division multiplexing statistical time division multiplexing

statistical time division multiplexing

What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete? looping virtual circuit (LVC) switched virtual circuit (SVC) permanent virtual circuit (PVC) dynamic virtual circuit (DVC)

switched virtual circuit (SVC) PVC: connections established before data. needs to be transmitted and are maintained after the transmission is complete.

Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to host srv1.mycompany.com traceroute -I srv1.mycompany.com traceroute -w srv1.mycompany.com traceroute -o ICMP srv1.mycompany.com traceroute -i srv1.mycompany.com

traceroute -I srv1.mycompany.com (capital i)

The C-Band utilized by satellites consists of what frequency range? 1.5 - 2.7 GHz 3.4 - 6.7 GHz 2.7 - 3.5 GHz 12 - 18 GHz

3.4 - 6.7 GHz

802.11ac Wave 2 devices can theoretically support how much maximum throughput? 600 Mbps 1.3 Gbps 3.47 Gbps 6.93 Gbps

3.47 Gbps 600Mbps = 802.11n 1.3Gbps = Wave 1 6.93Gbps = Wave 3

When terminating an Ethernet cable, about how far should the cable sheath extend into the plug? 3/8 inch 1/2 inch 1/5 inch 4/5 inch

3/8 inch

What is the maximum throughput of a DS3 connection? 44.736 Mbps 274.176 Mbps 1.544 Mbps 3.152 Mbps

44.736 Mbps

A fractional T1's bandwidth can be leased multiples of what data rate? 64 Kbps 28 Kbps 32 Kbps 48 Kbps

64 Kbps 1 T1 = 24 channels = 1.544 Mbps 1/24 T1 = 1 channel = .064 Mbps

What is the industry standard angle for an Angle Polished Connector (APC)? 16 degrees 14 degrees 12 degrees 8 degrees

8 degrees

What IEEE standard includes an encryption key generation and management scheme known as TKIP? 802.1X 802.11j 802.11i 802.11h

802.11i

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information? 802.1d 802.1c 802.1V 802.1Q

802.1Q "dot 1Q"

When troubleshooting wireless issues, what statement is accurate? Access point power levels should always be configured to output as much power as possible . Access points that use overlapping channels can cause interference with each other if they are too close. Simultaneous wired and wireless network connections do not affect the ability to communicate on the network. A WPA key can be used to associate with a WEP configured access point.

Access points that use overlapping channels can cause interference with each other if they are too close.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service? Windows Named Resource Services (WN RS) Active Directory Federated Users (AD FU) Automated Directory Network Services (AD NS) Active Directory Domain Services (AD DS)

Active Directory Domain Services (AD DS)

Originally codified by ISO, what does the "intermediate system" in IS-IS (Intermediate System to Intermediate System) stand for? An IS-IS capable network router. An entire network consisting of various network devices. The administrative boundaries of an organization. The autonomous systems used by an organization.

An IS-IS capable network router. IS-IS = link-state protocol; best-path algorithm similar to OSPF. Easy to adapt to IPv6 (unlike OSPF)

When creating network diagrams, what icon description typically represents a network router? An icon that resembles a brick wall. An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. An icon that is rectangular, which contains four arrows pointing in opposite directions. An icon that is rectangular in shape, with squiggly lines on the front.

An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward. A = a firewall C = a switch

What is the most popular web server application? Apache NGINX Microsoft Internet Information Services Lighttpd

Apache

In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting? a) at least 3 feet b) at least 12 feet c) at least 6 feet d) at least 3 inches

At least 3 feet 6 feet = "pretty much a different floor"

Which statement regarding the use of cable modems is NOT accurate? Cable broadband provides a dedicated and continuous connection. Cable modems only operate at the Physical layer of the OSI model. DOCSIS 3.1 allows for full duplex speeds up to 10 Gbps. Modems that utilize the DOCSIS 3.0 or 3.1 standard are backward compatible with older DOCSIS networks.

Cable modems only operate at the Physical layer of the OSI model. Cable broadband operates at the Physical *AND* Data Link

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions? Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) Carrier Sense Single Access with Collision Adaptation (CSSA/CA) Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate? EIGRP will increase CPU utilization on core routers. Increased traffic will result from the switch to EIGRP. EIGRP may not be available on non-Cisco routers. Convergence time will be increased with EIGRP.

EIGRP may not be available on non-Cisco routers. OSPF = Open Shortest Path First EIGRP = Enhanced Interior Gateway Routing Protocol; distance vector protocol combining features of link-state ... AKA Hybrid protocol >fast convergence >less CPU intensive (vs OSPF) >low overhead >easy to configure (vs OSPF)

What occurs when a collision happens on a network? The collision will create an error in the network switch, but otherwise, no issues will occur as a result. Each node on the network waits a random amount of time and then resends the transmission. The collision goes undetected, and data transmission continues. Each node on the network stops transmitting, until manually told to reconnect and transmit.

Each node on the network waits a random amount of time and then resends the transmission.

When utilizing Kerberos, an access granting ticket is the same as a key. True or False?

False TIcket = temporary set of credentrials that a client uses to prove to other servers that its identity has been validated --> access to a network service Key = belong to user/server; initially validates the user's/server's identity to each other during authentication to create a session Key = use CC to pay for entrance to carnival example

A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor. True or false?

False This describes a Type 1 Hypervisor. Type 2 = hosted hypervisor *installs OS as an application *not as powerful or secure

An unmanaged switch can still support the creation of VLANs, provided there is an interface for configuration. True or false?

False Unmanaged: *no IP addr assign *no VLAN support *cheap Managed: *Assigned IP addr *ports partitioned info (??? can't read)

DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range. True or false?

False Voice signals travel over telephone lines [...] 300 to 3300 Hz frequency range **DSL and voice signals share the same line! Unused/inaudible frequencies left over available to carry data

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP. True or false?

False WEP --> WPA --> WPA2

F5 Networks set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices. True or false?

False. Cisco set the standard.

DNS follows a centralized database model, allowing for easier management of DNS records. True or false?

False. DNS follows Distributed DB model, a centralized DB model, allowing for easier management of DNS records. Distributed DB model --> prevents catastrophic failure

The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission. True or false?

False. FTP uses TCP, while TFTP utilizes UDP. TFTP = trivial FTP

CDMA (Code Division Multiple Access) is an open standard that is accepted and used worldwide. True or false

False. GSM (Global System for Mobile Communication) --> uses TDMA, SIM cards; accepted + used world wide CDMA spreads a signal over a wider bandwidth; it WAS more popular.

An IPv6 address consists of 128 bits that are written as 10 hexadecimal numbers separated by colons. True or false?

False. IPv6 addresses consist of 128 bits, but they are written as 8 blocks of hexadecimal numbers separated by colons.

The Data Link layer attaches a trailer to the end of a packet, and does not include a header. True or false?

False. It DOES attach a trailer to the end of a packet, but it DOES INCLUDE a header

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas. True or false?

False. Plenum areas = above ceiling tile. PVC *IS* flame retardant, but not good for inhalation when heated. "Plenum rated cable ... produces less smoke than coated with PVC"

Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm. True or false?

False. RIP is an IGP/Distance vector ... oldest(?? what did I write) routing protocol algorithm

The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol. True or false?

False. UDP is considered to be a connectionless, or best-effort delivery protocol.

TCP uses a four-step process called the four-way handshake to establish a TCP connection. True or false?

False. 3-step process called the three-way handshake. SYN SYN/ACK ACK

In order to achieve 1000Base-T over CAT5e cable, 2 pairs of copper are needed. True or False

False. 4 pairs of copper are needed

A 66 block is more suitable for data connections than the older 110 block. True or false?

False. A 110 block is more suitable for data connections than the older 66 block. 66 block --> Primarily for phone connections 110 block --> designed to term Cat5 or better ... handle data rather than phone lines

The Transport layer header addresses a receiving application by a number called a MAC address. True or false?

False. Called a port.

The pathping utility sends 10 pings per hop by default. True or False?

False. Pathping utility sends 100 pings per hop. Pathping combines elements of ping and tracert. Sends multiple pings to each hop along a rate, then compiles the information into a single report.

In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to? flow label traffic class group ID traffic exchange

Flow label Routers interpret flow information to ensure packets belonging to same transmission arrive together. Traffic class identifies the packet's priority; similar to DiffServ field in IPv4

Which of the following statements describes a RAID 0 configuration? In a RAID 0, four or more disks are used to mirror data within each pair of disks, and then striped to multiple pairs of disks. In a RAID 0, data is mirrored on multiple disks to provide fault tolerance. In a RAID 0, data is striped across three or more drives, with parity information added to the data. In a RAID 0, data is striped across multiple disks to improve performance.

In a RAID 0, data is striped across multiple disks to improve performance. a = RAID 10 b = RAID 1 c = RAID 5

When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect? In the /var/run/ssh/public folder. In the /etc/ssh/keys folder. In an authorization file on the host where the SSH server is. In an authorization file under your home directory on your computer.

In an authorization file on the host where the SSH server is.

In a public switched telephone network, what portion of the network is known as the local loop? It is the portion that connects any residence or business to the nearest central office. It is the portion of the network between the NIU and the remote switching facility. It is the portion of the network from the remote switching facility to the central office. It is the inside wire within the residence or business that connects to the NIU.

It is the portion that connects any residence or business to the nearest central office.

A network TAP serves what purpose on a network? It provides a mirrored port for monitoring traffic between other ports. It provides wireless monitoring capabilities, as well as spectrum analysis. It serves as a miniature firewall that can be placed in front of any connection. It monitors network throughput at a specific point in the network.

It provides a mirrored port for monitoring traffic between other ports. Network TAP = Network Test Access Point, aka packet sniffer -4 ports: *2 ports send + rec. all traffic *3rd mirrors traffic, sending it to a PC running monitoring software *4th for port configuration

Why is the telnet utility a poor choice for remote access to a device? It provides no mechanism for authentication. It does not allow for control of a computer remotely. It provides poor authentication and no encryption. It cannot be used over a public WAN connection.

It provides poor authentication and no encryption.

What statement correctly describes "jitter"? Jitter is the fluctuation of a signal's strength as it travels away from its source. Jitter is the transmission of signal onto unintended pairs in a copper cable. Jitter is the loss of 50% or more packets in a given data stream, causing a connection to falter. Jitter is what happens when packets experience varying amounts of delay and arrive out of order.

Jitter is what happens when packets experience varying amounts of delay and arrive out of order. Jitter = AKA packet delay variation

Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company? master license agreement master service agreement memorandum of understanding service-level agreement

Master license agreement. Master license agreement = grants a license from a developer to a 3rd party for the purpose of marketing, or distribute to consumers as stand alone or part of another product/suite Master service agreement = contract that defines terms of future contracts. Memorandum of understanding = present intentions of 2 or more parties to enter a binding contract. MOU is NOT a contract. Service-level agreement = legally binding contract, or part of a contract, that defines (in plain language) the aspects of a service to consumer.

Which legacy authentication protocol requires mutual authentication? Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2) Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

What kind of tool can you use to measure voltage on a cable length? time domain reflectometer multimeter light meter continuity tester

Multimeter Light meters, aka OPM, measures amt of light power transmitted Continuity tester tests if cable carries signal to destination

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host? IP addresses MAC addresses port numbers domain names

Port numbers. >IP addresses run on the Network Layer. >MAC addresses work on the Data Link Layer.

What optional protocol can be used in 802.11 to reserve the medium for one node's use? HA/RA (Hold Airtime/Reserved Airtime) RAR/CTU (Reserve Airtime Request/Clear to Use) RTS/CTS (Request to Send/Clear to Send) RT/FT (Request Time/Fair Time)

RTS/CTS (Request to Send/Clear to Send)

The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions? File Transfer Protocol (FTP) Secure Sockets Layer (SSL) Secure Shell (SSH) Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP)

Which encryption standard was originally utilized with WPA's TKIP? Data Encryption Standard (DES) Blowfish Rivest Cipher 4 (RC4) Advanced Encryption Standard (AES)

Rivest Cipher 4 (RC4) TKIP = Temporal Key Integrity Protocol -Encryption keygen + management scheme

Which of the following statements correctly describes the SFP+ transceiver? SFP+ provides the same function as GBICs and is more compact. It is theoretically capable of 5 Gbps. SFP+ complies with the 802.3ba standard, allowing four channels in a single transceiver and supporting up to 40 Gbps data rates . SFP+ supports up to 10 Gbps and is slightly larger than SFP, with lower power consumption than XFP. SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.

Which of the following is an example of proxy server software? BIND Snort Squid Apache

Squid

On an ATM network, how is the path that data will take determined? A frame relay route table establishes each hop that will be taken to a single destination. Data is transmitted, and then the path taken will vary depending on the load encountered at each ATM participant node. Switches determine the optimal path between sender and receiver, and then establish the path before transmission. When data is ready to be transmitted, an ATM participating router will contact the destination ATM router, establish a tunnel, then pass the data.

Switches determine the optimal path between sender and receiver, and then establish the path before transmission. [network xmits data]

The IP connectionless protocol relies on what other protocol to guarantee delivery of data? UDP TCP ICMP ARP

TCP -once IP delivers the message to the correct host, it depends on TCP to ensure msgs are put back in correct order -relies on TCP or UDP to ensure each msg reaches correct application on host

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean? The MTU for the network can be as high as 9198 bytes. Fragmented frames will be consolidated into whole frames before being sent. The MTU for the network is set at 65,535 bytes. The network is not based on the Ethernet standard.

The MTU for the network can be as high as 9198 bytes. Jumbo frame = setting on Ethernet network. Allows creation and transmission of extra large frames as high as 9198 bytes.

With a SIP trunk, what is the only limitation on the number of calls that can run at any one time? The total number of time division slots allocated to the SIP client organization. The total number of SIP bearer channels provisioned on the SIP switch. The maximum number of channels available on the transmission medium. The amount of available bandwidth.

The amount of available bandwidth.

A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue? The cable must be a rollover cable. The USB standard is incompatible with the serial connection used by the console port. Router console ports are only used when connected to other routers. The router console port is providing an Ethernet connection, instead of a serial connection.

The cable must be a rollover cable. rollover cable = console cable

What does backbone cabling consist of? The shielded cables that are used for high data transmission rates between an organization and an ISP. Short length cables with connectors at both ends. The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs. It is cabling that connects workstations to the closest data room and to switches housed in the room.

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs

In planning for disaster recovery, what is the ultimate goal? The management of damage. The preservation of critical data. The continuation of business. The protection of infrastructure.

The continuation of business.

Which of the following statements regarding IPv6 subnetting is NOT accurate? IPv6 addressing uses no classes, and is therefore classless. IPv6 does not use subnet masks. A single IPv6 subnet is capable of supplying 8,446,744,073,709,551,616 IPv6 addresses. The largest IPv6 subnet capable of being created is a /64.

The largest IPv6 subnet capable of being created is a /64. The largest Ipv6 subnet capable of being created is actually /128

What part of a MAC address serves as the extension identifier, or device ID? The first 12 bits of the MAC address. The last 12 bits of the MAC address. The first 24 bits of the MAC address. The last 24 bits of the MAC address.

The last 24 bits of the MAC address. First 24 = organizationally unique identifier Last 24 = extension identifier

How do routers create a broadcast domain boundary? They listen to and direct broadcast traffic. They do not forward broadcast traffic. They forward broadcasts only to necessary segments. They only forward broadcasts that are intended for multiple subnets.

They do not forward broadcast traffic. "technically, which consists of all nodes a broadcast reaches, can be referred to a domain boundary" --> tl;dr LAN = domain boundary "routers don't forward broadcast messages, thus creating a boundary for LAN"

Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use? FTP Secure (FTPS) File Transfer Protocol (FTP) Trivial FTP (TFTP) Secure FTP (SFTP)

Trivial FTP (TFTP)

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask. True or false?

True

A brownout is a momentary decrease in voltage; also known as a sag. True or false?

True

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites? VPN transport VPN gateway VPN proxy VPN server

VPN gateway

When is it appropriate to utilize the NAT network connection type? Only if the VM is intended for VM-to-host communications. Only when the VM requires an IP address on the physical LAN. Whenever the VM does not need to be access at a known address by other network nodes. Only if the VM does not need to communicate with the host PC.

Whenever the VM does not need to be access at a known address by other network nodes.

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use? spectrum analyzer Wi-Fi analyzer protocol analyzer air scanner

Wi-Fi analyzer

Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit? Frame relay is a newly established network technology with more features than other technology. The paths that your data will take are always known. You are guaranteed to receive the maximum amount of bandwidth specified in the circuit contract You pay only for the bandwidth you require.

You pay only for the bandwidth you require. Frame relay = group of layer 2 protocols; today --> data link layer protocol for using virtual circuit interface media -connection oriented protocol -superceded by newer tech

Which of the following scenarios would necessitate the use of a non-disclosure agreement? Your company needs to prevent a new contractor from sharing information with a potential competitor. Your company wishes to educate users on the proper use of the network. Your company would like to allow employees to bring their own devices. Your company needs to impose password restrictions on new users in the network.

Your company needs to prevent a new contractor from sharing information with a potential competitor.

What is the name of the GUI front end that is available for the Nmap utility? GUINmap iMap Zenmap VizMap

Zenmap Nmap = network mapping tool

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found? license restrictions document non-disclosure agreement document terms of service document acceptable use policy document

acceptable use policy document

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of? WPA2-Enterprise captive portal guest network profile browser hijacking

captive portal

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS? deauthentication attack channel hopping attack ARP poisoning attack man-in-the-middle attack

deauthentication attack

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages? denial-of-service attack DNS poisoning rogue DHCP server MAC address spoofing

denial-of-service attack

You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this? dig @8.8.8.8 mycompany.com MX dig --server 8.8.8.8 --type=mx mycompany.com dig -s 8.8.8.8 -t mx mycompany.com dig query 8.8.8.8 domain mycompany.com type mx

dig @8.8.8.8 mycompany.com MX -dig command : queries DNS servers w/ more advanced options than nslookup Correct answer requests list of all A records in domain on specific name server.

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target? cached denial-of-service attack distributed denial-of-service attack distributed reflection denial-of-service attack permanent denial-of-service attack

distributed reflection denial-of-service attack

The use of certificate authorities to associate public keys with certain users is known by what term? symmetric identification public-key infrastructure public-key organization certified infrastructure

public-key infrastructure

Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs? router overloading router-on-a-branch branched router router-on-a-stick

router-on-a-stick ROAS

What command will set the native VLAN on a Juniper switch port? switchport set native vlan config native vlan switchport trunk native vlan set native-vlan-id

set native-vlan-id

You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch? show vlan show vlandb get vlans list switch-vlans

show vlan


Ensembles d'études connexes

Chapter 1 and 2 Study Quanatative

View Set

EXAM 3 ch32 1209-1227, 1231-1235, ch25 838-842, 844-852, 859-863, 872-876, ch16 505-508, ch8 245-249, ch31 1192-1206

View Set

Noun Clause Sentence Prescriptions

View Set

NURS 3230 Chapter 45 Spirituality NCLEX

View Set