CTS108

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the approximate cost of the network diagram app called Draw.io?

$0

A default route is used if a router does not find a matching entry in its table. What is the default route?

0.0.0.0

Which of these are valid IPv6 addresses? choose 2

0260:d6FF:000A:30D2::30DB 1240:b332:FF:02CA::B

Match the seven troubleshooting steps with the step number.

1 - identify the problem 2 - establish a theory 3 - test your theory 4 - establish a plan 5 - implement the 6 - verify functional 7 - document findings

Match the Abbreviation with the Bandwidth

1 bit per second - 1bps 1,000 bits per second - 1Kbps 1,000,000 bits per second - 1 Mbps 1,000,000,000 bits per second - 1 Gbps 1,000,000,000,000 bits per second - 1 Tbps

Create the correct pin connections for a straight-through cable.

1-1 2-2 3-3.....

Create the correct pin connections for a Fast Ethernet crossover cable.

1-3 2-6 3-1 4-4 5-5 6-2 7-7 8-8

Create the correct pin connections for a Rollover cable.

1-8 2-7 3-6 4-5....

10GBase-SR cable has a maximum transmission speed of

10 Gbps

10GBase-T Ethernet cable has a maximum transmission speed of

10 Gbps

IP addresses can be displayed in decimal or binary. What is the binary value for 192

11000000

Write the subnet mask in Binary for 192.168.4.0/26. Use decimals between octets.

11111111.11111111.11111111.11000000

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

there are ____ bits in an IPv6 address

128

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

The APIPA addresses are from _____ to _____

169.254.0.1 - 169.254.255.254

You are using Wireshark to check traffic on your network. You set up all devices in the network to be in the subnet 192.168.10.0. You notice some broadcast packets being sent out. What is the broadcast address for the 192.168.10.0 subnet?

192.168.10.255

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

Write the subnet mask in Decimal for 192.168.4.0/26. Use decimals between octets.

255.255.255.192

Match the OSI Layer and the PDU

7,6,5 Payload or Data 4 Segment 3Packet 2 Frame 1 Bit or transmission

Which IPv4 addresses are valid?

74.122.199.254 192.168.4.64 1.22.146.5

The IEEE standard defines how VLAN information appears in frames and how switches interpret that information. The port information is sometimes referred to as the ____ tag.

802.1Q

A highly available server is available what percentage of the time?

99.999%

Kim was creating a baseline for the WAN from a client's computer. Kim ran a speedtest at 9am and another at 9pm. In about 20 words, give two reasons why Kim might have received drastically faster upload and download speeds at 9pm.

9am is a typical working hour where the bandwidth my be spread across multiple devices. This would greatly slow down the baseline WAN. At 9pm there would be much less demand for the bandwidth causing it to be much faster.

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service.

What statement regarding denial-of-service (DoS) attacks is accurate?

A denial-of-service attack prevents legitimate users from accessing normal network resources.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

In about 20 words explain double tagging

A hacker stacks VLAN tags in Ethernet frames by removing the first legitimate tag and revealing a second illegitimate tag that tricks the switch into forwarding the transmission.

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious access point

How is a posture assessment performed on an organization?

A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.

Of all the DSL standards, which is the most commonly in use today?

ADSL

Which one of these protocols communicates across the Internet, is used by edge routers and exterior routers to distribute data outside of an AS? It is also dubbed the "protocol of the Internet".

BGP

Bob and Alice have each created their own pair of keys for use with Public Key encryption and need a simple and secure key management system. One answer to this problem is to use digital certificates. The digital certificate is issued, maintained, and validated by a ___________

CA

A good naming convention for computers in classroom 223 in the CALT building on the Arnold Campus would be

CALT223-01, CALT223-02, CALT223-03

To protect data at rest, in use, and in motion, encryption methods are primarily evaluated by three benchmarks that form the ___ triad.

CIA

Which of these is not a wireless standards for IOT devices in a WPAN or HAN.

CSMA/CD

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

Carrier Ethernet Transport

Which organization set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices?

Cisco

Match the function to the Layer 4 Protocol.

Connection oriented - TCP Sequencing - TCP Acknowledgement - TCP Flow control - TCP Three way handshake - TCP Guarantees delivery - TCP Connectionless UDP Good for live or video - UDP

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

DNS poisoning

Select three types of VLANs that you might see implemented on a network:

Data default voice

Match the following terms with their definition.

Entry Facility - location where Demark point - device that marks MDF - centralized point IDF - provides an internal KVM - switch that connects

TCP transmissions continue until a specific flag bit is set to 1. Which flag is this?

FIN

Telnet is a secure protocol used to "remote in" or control a computer remotely.

False

Select the two main protocols that run at Layer 3 of the OSI Model.

ICMP IP

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share one or more IP address.

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium

When using Kerberos, what is the purpose of a ticket?

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

The Data Link layer adds ___ addresses.

MAC

What type of connector is this? =[]==---- black

MTRJ

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

To attach to a network a computer requires a NIC. NIC stands for (three words)

Network Interface card

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?

OC-3

Which of these area networks is the smallest by geographic size:

PAN

In about 20 words, explain the response between issuing a ping command and the tracert (or traceroute) command

Ping sends packets to a specific address and waits for a reply. Trace route traces from the computer to the host and shows the number of hops. shows the exact route the ICMP packet took

Good documentation includes business documents. Match the business documents below with their definition.

RFP - request to vendor MOU lists the intentional SOW - a detailed list of SLA - a legally binding MSA - a contract that d MLA grants a license

Match the Routing protocol with the Algorithm used. The Algorithm might be used more than once.

RIP - distance vector RIPv2 - distance vector IS-IS - link state OSPF - link state EIGRP - advanced distance vector BGP- advanced distance vector or path vector

Select the twisted pair cable connectors. Select two.

RJ45 RJ11

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

RTS/CTS (Request to Send/Clear to Send)

In a software defined network, what is responsible for controlling the flow of data?

SDN controller

Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?

SDSL

What statement regarding the different versions of the SHA hashing algorithm is accurate

SHA-2 and SHA-3 both support the same hash lengths.

What mail protocol is used to send mail messages to a server?

SMTP

What type of connector is this? -0----- yellow

ST

TCP uses a three-way handshake to establish a session before TCP transmits data. Select the transmissions of the three-way handshake

SYN, SYN/ACK, ACK

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

PoE is a method to

Send electrical power over twisted-pair Ethernet connections

The connectionless IP protocol relies on what other protocol to guarantee delivery of data?

TCP

Select the two main protocols that run at Layer 4 of the OSI Model.

TCP UDP

Imagine that you are using Symmetric Key Encryption and using Exclusive OR (XOR) to encrypt and decrypt messages The plain text is 1111 0100. The encryption key is 1011 0011.

The encrypted text in Binary is 0100 0111. The decryption key in Binary is 1011 0011

How can you determine the manufacturer of a NIC based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer

Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?

The packets are coded such that individual calls can be distinguished.

Diffraction has what effect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split

VoIP is

The use of any network to carry voice signals using TCP/IP protocols

Which of the following are advantages of peer-to-peer networks (Choose 3)

They are good for networks that support fewer than 15 computers. They are often less expensive to set up and maintain. They are simple to configure

In a Peer-to-Peer network model, each computer's operating system is responsible for controlling access to its resources.

True

RDP is a secure protocol used to "remote in" or control a computer remotely.

True

SSH is a secure protocol used to "remote in" or control a computer remotely.

True

Which type of hypervisor requires a host OS?

Type 2

Virtualization requires a hypervisor. Select the two types of hypervisor.

Type 2 Type 1

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 hypervisor

Select the two main protocols of the Transport layer.

UDP TCP

Match the antenna type with the coverage

Unidirectional - one direction omnidirectional - many directions

There are multiple mitigation techniques to reduce the risk of VLAN hopping. Select three

Use physical security methods such as door locks Don't use the default VLAN Change the native VLAN to an unused VLAN ID

When a switch is configured with STP, _____ ports are pointing toward the root bridge and _____ ports are pointing downstream from the root bridge.

root designated

only one ____ exists on a network using STP

root bridge

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable use policy document

The purpose of VLSM is to:

allow subnets to be further subdivided into smaller and smaller groupings.

A/an [ans] is a central conduit that connects the segments of a network

backbone

Where are MPLS labels placed within a frame?

between the layer 2 header and the layer 3 header

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

cipher lock

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

clustering

What type of cable is this? Oo.__

coaxial

What kind of firewall can block designated types of traffic based on application data contained within packets?

content-filtering firewall

Which of these are advantages to using virtualization? (Choose three)

cost and energy saving fault and threat isolation efficient use of resource

Which statement accurately describes what alien crosstalk is?

crosstalk that occurs between two cables.

For each type of multiplexing, a device that can combine many signals on a channel, a multiplexer (mux), is required at the transmitting end of the channel. At the receiving end, a _________ separates the combined signals.

demultiplexer

The act of taking advantage of a weakness is known as a/an ___ .

exploit

What type of connector is this? 0

f-connector

Match the signal interference with the characteristic

fading - something cause attenuation - the farther a signal interference - electromagnetic reflection - when the wave scattering - When a wireless signal encounters an object that has small dimensions compared with the signal's wavelength, it's diffused in multiple directions.

A safety measure that allows access during a failure is called _______ and a safety measure that denies access during a failure is called _______

fail open fail close

A RAID 5 configuration requires a minimum of two hard disks to operate.

false

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

false

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.

false

All switch ports must be in the same VLAN to forward frames correctly.

false

An ACL can only inspect outbound packets from your local LAN to the Internet

false

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

false

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

false

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

false

IPv4 and IPv6 use the same packet format.​

false

IPv6 does not have subnetting

false

Only Class B and Class C networks can be subnetted.

false

Public key encryption is also called Symmetric encryption

false

Sensitive electronic components can not be damaged by static electricity.

false

Switches are layer 2 devices and forward traffic based on IP addresses

false

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

false

The only function of network management is to check for hardware faults

false

Using VLSM, all subnets must be the same size

false

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.

false

The network administrator issues the ipconfig command on a computer. The IP address is 192.168.16.1 In classful subnetting this is the _________

first available host

Which of the following are reasons a network administrator might separate a network's traffic into smaller portions?

improve performance enhance security simplify troubleshooting

On a Windows system, what command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig/all

The most popular kind of encryption encodes (combines) the original data's bits using a ___, or a random string of characters to scramble the data and generate a unique and consistently sized data block called ciphertext.

key

The combination of a public key and a private key are known by what term below?

key pair

Typically a Switch operates at layer 2 of the OSI model. However, small organizations, such as a SOHO, can purchase a switch that also interprets Layer 3 data and works much like a router. What is this device called?

layer 3 switch

Match the OSI layer with the address it adds to the data from the upper layers of the OSI model.

layer 4 - Port address layer 3 - IP address layer 2 - MAC address

Select the five (5) security precautions listed in the text that should be applied to the privileged user account.

limited: access location use duration privacy

The network administrator needs to increase total throughput between two switches. They create redundant links by connecting three ports on one switch to three ports on the other switch and configure the ports on both switches to handle the traffic. Select two (2) terms for this technique

link aggregation port aggregation

Match the router function with a router

located inside networks within the same autonomous system - core router Connect an autonomous system with an outside network, also called an untrusted network - edge router Refers to any router outside the organization's AS, such as a router on the Internet backbone - exterior router

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

logic bomb

Each routing protocol is assigned a default administrative distance (AD), which is a number indicating the protocol's reliability. Which AD is given higher priority?

lower

When implementing VLANs, what type of switch do we need

managed

It is desirable for a system to have high availability, referring to the consistency and reliability of a connection, system, or other network resource to be accessible. What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

mean time between failures (MTBF)

What kind of tool can you use to measure voltage on a cable length?

multimeter

Would the IDS in this diagram be considered a host-based IDS or a network-based IDS?

network based ids

Each managed object on a managed device using SNMP is assigned which of the following?

object identifier (OD)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

online UPS

What document addresses the specific concerns related to special access given to administrators and certain support staff?

privileged user agreement

List the four deployment models for Cloud services

public private community hybrid

The LAN has 1 router and 3 switches managing devices. To help protect against faults and failures, the network has additional switches filling the same role on the network. If one switch fails, another takes over. This is an example of ___________.

redundancy

Signals that can travel in only one direction on a medium are referred to as what type of signal?

simplex

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

sliding-window

Your organization has decided to subnet their internal network. They are using the private addresses 192.168.5.0. The New Subnet Mask is /26. The first subnet will be used for the sales department. Fill in the dotted decimal addresses for the sales department in the following table.

subnet address - 192.168.5.0 first valid host - 192.168.5.1 last vlid host - 192.168.5.62

In planning for disaster recovery, what is the ultimate goal?

the continuation of business

Terry calls you because no one in the department can get to the AACC server that stores EPC documents. You just accessed the server successfully from another building. You go to Terry's department to do some diagnostics. Which command would let you know which router between Terry's department and the server is down?

tracert

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

true

A baseline is a report of the network's normal state of operation and might include a range of acceptable measurements.

true

A community cloud is a service shared between multiple organizations, but not available publicly.

true

A good Remote Access Policy would be to terminate remote sessions when not in use

true

A vNIC operates at layer 2 and provides network access for the VM.

true

All wireless signals are carried through the air by electromagnetic waves.

true

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

true

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

true

Fiber-optic cable comes in two types: single-mode fiber (SMF) and multimode fiber (MMF).

true

The term malware is derived from a combination of the words malicious and software.

true

To add security to a switch, we can store acceptable MAC addresses in a MAC address table.

true

When TCP sends data, the sequence numbers will be increased by the number of bits included in each received segment, as confirmation that the correct length of message was received. This new number (sequence number plus number of bits in the segment) will become the acknowledgment number for the return message.

true

To rollback or reverse an operating system patch you should

use the patch's automatic uninstall utility

The hypervisor creates a connection between a vNIC and a __________

vSwitch

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

wi-fi analyzer

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic

Match the cell technology generation with an accurate description.

1G services from the 2G used digital transport 3G data rates rose 4G all-IP, packet-switches

Which Frequency range do the Wi-Fi 802.11 b/g/n technologies use?

2.4 GHz

A MAC address is ___ bits

48

List two Password Policy tips from the text that you think are the most important and Why they are so important.

Do not use the same password on different applications is important because if one account gets hacked, all of your accounts that use the same password could be at risk. Changing the password at least every 60 days is important because longer a password is used, the more vulnerable it gets. Changing it will ensure longer security for the account.

you need to check connectivity to Cengage so you open a browser window and type "ping cengage.com" in a Command Prompt. What Layer 3 protocol does ping use?

ICMP

Explain disadvantage of a single point of failure as it pertains to Virtualization. Include an example

If the one server goes down for any reason, they all go down. For example, if you are running multiple guest machines on one host, and the host crashes, all guest machines will crash.

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

What type of connector is this? -o[}----

LC

What type of connector is this? {]

RJ45

Which encryption standard was originally used with WPA's TKIP?

Rivest Cipher 4 (RC4)

What kind of device can monitor a connection at the dmarc but cannot interpret data?

smart jack

Below is a [top] topology \|/ -*- + (*.) = mesh /|\

star + ring = mesh

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a/an ____ .

vulnerability

During some incidents, data will need to be collected in such a way that it can be presented in a court of law for the purpose of prosecuting an instigator of illegal activity. Some of the forensic data available for analysis can be damaged or destroyed if improperly handled. Ideally, one or more first responders would take charge in these cases. First responders are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court. However, it's critical that every IT technician in a company know how to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence, Put the six (6) First Responder steps in order.

1 - secure the area 2 - document the scene 3- monitor evidence 4 - protect the chain of custody 5 - monitor transport 6 - create a report

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

no more than one inch of the cable should be exposed

Your client has an open area with 20 devices communicating through a wireless network. Which type of antenna will have give the best communication for all 20 devices - an omnidirectional or a unidirectional?

omnidirectional

Periodically, we will be responsible for software and hardware changes. Match the terms below with their definition

patch - a correction upgrade - a major change rollback - the process of reverting

Of the well-known TCP and UDP ports, which two carry DHCP traffic?

port 68 port 67

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

port numbers

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

quid pro quo

What is the most popular AAA, open-source service, that runs in the Application layer and can use UDP or TCP in the Transport layer?

radius

A/an _______ manages traffic between two or more networks and helps find the best path for traffic.

router

A __________ table is a database that holds information about where hosts are located and the most efficient way to reach them.

routing

OSI Model Layers

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application

1000Base-LX cable has a maximum transmission speed of

1000 Mbps

Cat 5e cable has a Maximum supported throughput of

1000 Mbps

The equation to calculate the number of subnets from the New Subnet Mask is:

2n = Y where n is the number of bits changed from zero to one and Y is the number of subnets created

The C-Band utilized by satellites consists of what frequency range?

3.4-6.7 GHz

A MAC address is typically written as hex. Write a valid MAC address in Hex

30-65-EC-6F-C4-58

An IPv4 address has _______ bits and an IPv6 address has _____ bits

32 128

How many pairs of wires do Shielded Twisted pair and Unshielded twisted pair cable have?

4

When using DOCSIS 3.0, what is the minimum number of channels that can be used?

4

Which Frequency range do the Wi-Fi 802.11 a/n/ac technologies use?

5 GHz

What is the size of an ATM cell, including the header?

53 bytes

Bob and Alice have each created their own pair of keys for use with Public Key encryption. Alice receives a message from Bob. Bob encrypted the message so that Alice is the only one who will be able to decrypt the message. Which key will Alice use to decrypt the message?

Alice's private key

Bob and Alice have each created their own pair of keys for use with Public Key encryption. Bob wants to send a message to Alice and wants Alice to be the only person who can decrypt the message. Which key will Bob use to encrypt the message?

Alice's public key

Which of the following statements describes a RAID 0 configuration?

In a RAID 0, data is striped across multiple disks to improve performance.

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

STP must first select the root bridge, or master bridge.

If a router does not find a matching entry in its table and no default route is defined in the table, what does the router do with the packet?

drop the packet

Your organization has implemented subnetting. If the DHCP server is not on the same subnet as the client requesting DHCP information, the client cannot receive any DHCP information

false

radius can only work with wireless users

false

VLSM allows subnets to be further subdivided into

smaller and smaller groupings

1 - List the five categories used in Multi-factor Authentication and 2 - give an example of each.

something you know - a pin something you have - key fob something you are - iris pattern somewhere you are - where you are in a specific building something you do - the way you talk

It is called _____ routing when a network administrator configures a routing table to direct messages along specific paths between networks. It is called _______ routing when a router automatically calculates the best path between two networks and accumulates this information in its routing table

static dynamic

Match the IDS detection method with the description of the method.

statistical anomaly detection - compares network signature based detection - looks for identifiers

List the throughput in Mbps for T1 and T3 carriers.

t1 1.544 t3 44.736

A subnet of 255.255.248.0 can be represented by which CIDR notation?

29

ARP works in conjunction with IPv4 to discover the ____ address of a node on the local network and maps those addresses to ____ addresses.

MAC, IP

VoIP stands for:

voice over internet protocol

We can use ANDing to calculate the subnet address of a specific IP address if we also know the subnet mask. What is the result when we use ANDing rules to combine the following values? 1101 0010 1011 0011

1001 0010

100Base-T Ethernet cable has a maximum transmission speed of

100Mbps

When creating the New Subnet mask, we change Host Bits to Network Bits. Which subnet mask will create exactly two subnets for a Class C subnetting scheme?

1111 1111.1111 1111.1111 1111.1000 0000

A subnet mask can also be represented in CIDR notation. Write the subnet mask in Binary for an IP address with CIDR of /26.

1111 1111.1111 1111.1111 1111.1100 0000

An MTU is the maximum transmission unit, or the largest size of a frame, in bytes, that routers in the path will allow. What is the layer 2 default MTU

1500 bytes

You ask the client to type ipconfig from a Command Prompt window to display their IP address. It is 169.254.1.1. They need to go to Network and Sharing to change their IP address so it is within the range of valid host addresses for the 192.168.1.0 subnet. Which of the following addresses would be a valid address for their computer

192.168.1.6

In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?

An incident is a single event that affects more than a single group of users. Disasters are extreme events that effect more than a single system or limited group of users. Incidents are smaller scale and what a company should be prepared to deal with. Disasters will most likely require the assistance from the outside.

When a DHCP server gives a client an IP address, it sets a time limit, or least time, on the IP address.

At the end of lease time, the IP address expires and is now available to a new client. If the lease time is too long the network will suffer exhausted DHCP scope and no new clients can join. If the lease is too short, network availability will be disruptive. Lease times range from 2 hours to 8 days. Longer lease times are better for smaller offices without a lot of growth. Short lease times are better for larger networks where clients log on and off frequently.

If a router receives a packet and finds two matches with the LAN's network information, what does the router do with the packet?

Chooses the best of the two options based on their respective routing metrics.

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

List the range of the first octet of Class A, Class B, and Class C IPv4 addresses.

Class A 1-126 B 128-191 C192-223

The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?

EF (Expedited Forwarding) F (Assured Forwarding)

A BSS typically has one AP for end devices to communicate with. In this diagram, there are multiple BSSes. These multiple BSSes form a/an ______ .

ESS

Which IPv6 addresses are valid?

FE0:201:95af::32ab:56:3d4 2001:5af:2::56:3d4 2001:98:0045:0000:0001::2

Choose the two technologies used by wireless devices to avoid interference. Choose two.

FHSS DSSS

Match the two main Web service protocols and whether the protocol is Secure or Unsecure

HTTP Unsecure HTTPS Secure

The Network layer adds ___ addresses

IP

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

There are multiple reasons to implement VLANs on a network. Select three from the list below:

Identifying groups of devices whose data should be given priority handling Isolating connections with heavy or unpredictable traffic patterns Reducing the cost of networking equipment

Terminal emulation can provide remote access to a device. Why is the telnet utility a poor choice for remote access to a device?

It provides poor authentication and no encryption

My computer in the CALT building of AACC's main campus has an IP address of 10.0.16.141. I am requesting the Google home page. Because the Source IP address (my computer) is private it will need to be changed to AACC's public IP address at the router. The service changes the IP address before the packet is sent out to the Internet is called _____.

NAT

List the 5 Interior Gateway Protocols listed in the text.

RIP, RIPv2, IS-IS, OSPF, EIGRP

An Application layer utility program called __________ monitors and gathers information about network traffic and can alert network administrators about adverse conditions.

SNMP

Which four statements regarding the SSH (Secure Shell) collection of protocols are accurate?

SSH can be run at the shell prompt on a UNIX or Linux system SSH listens to port 22 SSH can be run at the command prompt on a Windows-based system SSH does both authentication and encryption

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

What happens when an NMS uses the SNMP Walk command?

The NMS uses get requests to move through sequential rows in the MIB database.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address

Which of the following are advantages of a Client-Server network model? (Choose 3)

They are more scalable User accounts and passwords are assigned in one place Access to multiple shared resources can be centrally granted to a user or group of users

A variant of BYOD, what does CYOD allow employees or students to do?

They can choose a device from a limited number of options.

In a cellular network, where does each wireless base station connect to?

They connect to a mobile switching center.

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

Which of these area networks is the largest by geographic size?

WAN

By default, the 802.11 standard does not offer any security. The client only needs to know the access point's SSID, which many access points broadcast. Network administrators may prevent their access points from broadcasting the SSIDs, making them harder to detect. However, this does not provide true security. One solution to this problem is encryption. Match the encryption with a feature.

WEP - the first implementation WPA - dynamically assigned WPA2 updated version

Anything as a Service or Everything as a Service is abbreviated by what letters?

XaaS

What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

ARP tables might contain two different types of entries. 1 - What are they, and 2 - How are they created?

`Dynamic and static are the two entries for ARP tables. `static are entries that do not change as someone entered them in manually. Dynamic entries are created by a client requesting an ARP.

In a DNS zone, what type of record holds the name-to-address mapping for IPv4 addresses

a record

A switch has two different types of ports. The ______ port will carry traffic for only 1 VLAN at a time; the ______ port will carry traffic for multiple VLANs.

access trunk

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

Controlling user's access to a network consists of three major elements known as AAA. What are each of these components?

accounting authentication authorization

Which wireless topology would be best for a small number of nodes closely positioned transmitting directly to each other without an intervening connectivity device?

ad hoc

There are multiple types of Layer 2 frames for wireless communications depending on the function of the frame - management frame, control frame, or data frame. The 802.11 data frame has four address fields.

address 1 - source address 2 - transmitter address 3 - receiver address 4 - destination address

A tag is added to Ethernet frames to identify their VLAN assignment. Where is the tag added:

after the source address

An RFID label on a box is an example of what type of physical security detection method?

asset tracking tagging

You are hired by an organization to find vulnerabilities in their organization's network. You are given a user ID and password. What type of vulnerability scanning is this?

authenticated

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

authorization

Match the term with its definition.

bandwidth - the amount of data throughput - the measure of

Match the three networking modes with their description.

bridged mode - a vNIC obtains NAT mode - The VM obtains IP addressing information from its host's virtualization software, rather than a server or router on the physical network. Other nodes communicate with the host machine's IP address to reach the VM. Host only mode - VMs on a host ca

In the following diagram, what path will data take if the server sends data to Host D? Server is the first device in the list; Host D is the last device in the list. Be specific.

device 1 server device 2 switch c device 4 switch d device 5 switch f device 6 host d

Match the backup scheme with the data copied.

full backup - backs everything up incremental - backs up only data differential - backs up data that has changed since the last

Networks are commonly segmented into groupings. Which of the following are acceptable groupings?

geographic locations departmental boundaries device types

Suppose your LAN uses a proxy server, and you want to send an email message from your workstation inside the LAN to a colleague via the Internet. Your message will first

go to the proxy server

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

honeynet

When two computers create a VPN tunnel directly between them it is called a ____ VPN.

host-to-host

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

Which wireless topology has one intervening connectivity device, such as an AP, that accepts wireless signals from multiple nodes and retransmits them to the rest of the network? This type of topology has no fault tolerance built in for the one AP

infrastructure

At what layer f the OSI model to proxy servers operate?

layer 7

Similar to duplexing which allows a signal to travel in both directions in a cable at one time, ___________ is a form of duplexing that allows multiple signals to travel simultaneously over one medium by separating the medium's channel into multiple smaller channels

multiplexing

IPv6 addresses do not have classes

true

IPv6 addressing does not utilize classful addressing, in other words, there are no Class A, Class B, or Class C networks

true

In a frame relay WAN, the ISP typically has the data circuit terminating equipment (DCE).

true

In a public switched telephone network (PSTN) , lines are terminated at the central office.

true

Latency on data networks is based on a calculation of a packet's round trip time (RTT).

true

Layer 2 is the only layer of the OSI model that adds a header and a trailer to the payload it inherits from the layer above it.

true

Most satellites circle the Earth 22,300 miles above the equator in a geosynchronous orbit.

true

Network Diagrams are graphical representations of a network's devices and connections.

true

Over a long-distance connection, using SSH keys is more secure than using passwords.

true

Port 123 is utilized by the Network Time Protocol service

true

Proxy servers and ACLs on network devices are examples of non-security devices outfitted with security features and abilities.

true

Routers work at layer 3. They join two or more networks and pass packets from one network to another.

true

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console

true

The TCP header includes a Source port and a Destination port. The UDP header does not include either of these.

true

The TIA/EIA standard for wall jacks in a work area requires that at least one outlet be provided for data and one for voice

true

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

true

The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

true

The process of designing, implementing, and maintaining an entire network is called the System Life Cycle.

true

When using IPv6, two or more nodes on the same link are said to be neighbors

true

Wireshark or any other monitoring software running on a single computer connected to a layer 2 switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

true


Ensembles d'études connexes

Multiplying Polynomials by Polynomials

View Set

Chapter 4 SIE Exam Quiz Questions

View Set

Latina Poetry as an Expression of Cultural Heritage

View Set

ISTM 210 - The Best Quizlet for Exam 1

View Set

Chapter 25: The Digestive System

View Set

Chapter 39 Aerosol Drug Therapy (Test 1- Egans)

View Set

ATI Ob Chapter 25 Newborn Nutrition

View Set