CompTia Network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

An IPv6 address consists of

128 bits

Which of the following answers refers to a valid IPv6 EUI-64 format address generated from a MAC address of 29:88:68:0B:1B:CA? 2001:DB8:ABCD:12:2A88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2C88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2D88:68FF:FE0B:1BCA

2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA

An IPv4 address consists of:

32 bits

Which best describes a man-in-the-middle attack? Malicious code planted on a system, waiting for a triggering event before activating A false server intercepts communication from a client by impersonating the intended server. A person convinces an employee to reveal their login credentials over the phone. An IP packet is constructed that is larger than the valid size.

A false server intercepts communication from a client by impersonating the intended server.

Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA?

Accounting

Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type?

Anycast

Sue is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application. What is the most effective security control that Sue can apply to the address this risk?

Application Layer Firewall

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?

Bob's private key

A networked host with unknown IPv4 address can be reached via:

Broadcast

Which of the following refer to the multiplexing methods used in fiber-optic communication?

CWDM DWDM

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

IPv4 addresses are expressed with the use of

Decimal numbers

Which attack floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Denial of Service attack

In a private cloud companies such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security concerns>

False

IPv6 addresses are expressed with the use of:

Hexadecimal numbers

A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus What technology can be put in place to detect potential malware traffic on the network?

IDS

You were recently hired by a small start-up company. The company had no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use?

IaaS

What are two examples of social engineering?

Impersonation Phishing

What network is this? I allow computers to communicate with each other in the same building

LAN

Which of the following answers does not refer to the OSI TCP segment header?

Layer 3 header (Layer 4 header, source port number, destination port number, sequence number, checksum field; all do)

What can be said about Peer-to-Peer (P2P) networking?

Less stable and secure than client-server networking model Decentralized network type. In P2P networks, each node can at the same time serve and request resources.

A switch forwards data to the port that is connected to the destination device. It knows which port to forward it to based on which value?

MAC Address

An IPv6 link-local address is an equivalent of IPv4's:

MAC address

What are the characteristics of the 1000BASE-SX Ethernet standard?

Maximum cable segment length between 220 and 550 meters Multimode fiber-optic cabling

What are the characteristic features of the 100BASE-FX Ethernet standard?

Maximum cable segment length of up to 412 meters (half-duplex communication) Multimode Fiber Maximum cable segment length of up to 2 kilometers

Which of the answers listed below refer to the 1000BASE-LX Ethernet standard?

Maximum cable segment length of up to 5 kilometers over single-mode fiber Fiber-optic cabling Maximum cable segment length of up to 550 meters over multimode fiber

Which type of network topology provides the highest level of redundancy?

Mesh

A type of network traffic intended for a particular group of hosts is called:

Multicast

Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?

NAT

Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?

NAT

Be able to identify the binary representation of a decimal number (Ex. 192 = 11000000) OKAY?

OKAY

Convert binary to decimal notation (Ex. 10101100= 172) Okay?

OKAY

Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information?

PAT

Which of the following documents describes the concept of private IP addressing?

RFC 1918

Which of the following answers refers to a solution that simplifies large network infrastructure management through the use of software?

SDWAN

Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake?

SYN and ACK

In the OSI model, the layer 4 TCP PDU is known as

Segment

Which type of fiber cable is normally used to connect two buildings that are several miles apart?

Single-mode

Which of the following network topologies is most commonly used in comtemporary Ethernet LANs?

Star

Brian would like to secure his website. Which one of the following protocols is the best choice for encrypting communication between a website and its users?

TLS

What characteristic features does the bus topology have?

The main network cable becomes a single point of failure. All network nodes connect to a single central cable (trunk). A terminator at each end of the main network cable prevents collisions caused by signal bounce.

A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter.

True

Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IPv4 address and subnet mask when Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA- assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA- assigned address cannot connect to the Internet).

True

In the OSI model, the payload data (user data) is the actual data that is being nested between header and tail control informatikon

True

Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system. What type of hypervisor should he choose?

Type 1

James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops. What type of hypervisor is James looking for?

Type 2

A type of network traffic intended for a single host identified by a unique IP address is referred to as:

Unicast

Which of the following answers refer to the 100BASE-SX standard?

Uses LED as the source of the light Multimode fiber Maximum cable segment length of up to 300 meters

What are the characteristic features of the 10GBASE-LR Ethernet standard?

Uses laser as the source of light Single-mode fiber Maximum cable segment length of up to 10 kilometers

A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:

VLAN

Which of the following would provide the most effective security for a small wireless network?

WPA2

A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with?

White Hat Hackers

What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?

symmetric


Ensembles d'études connexes

WOH2040 - final exam study guide

View Set

Safety in Academic Chemistry Laboratories

View Set

MAN 4720 Huning Chapter 9: Corporate Strategy: Strategic Alliances, Mergers and Acquisitions

View Set

EW 2 Unit 12 p 120 предлоги движения

View Set