CTS108
What is the approximate cost of the network diagram app called Draw.io?
$0
A default route is used if a router does not find a matching entry in its table. What is the default route?
0.0.0.0
Which of these are valid IPv6 addresses? choose 2
0260:d6FF:000A:30D2::30DB 1240:b332:FF:02CA::B
Match the seven troubleshooting steps with the step number.
1 - identify the problem 2 - establish a theory 3 - test your theory 4 - establish a plan 5 - implement the 6 - verify functional 7 - document findings
Match the Abbreviation with the Bandwidth
1 bit per second - 1bps 1,000 bits per second - 1Kbps 1,000,000 bits per second - 1 Mbps 1,000,000,000 bits per second - 1 Gbps 1,000,000,000,000 bits per second - 1 Tbps
Create the correct pin connections for a straight-through cable.
1-1 2-2 3-3.....
Create the correct pin connections for a Fast Ethernet crossover cable.
1-3 2-6 3-1 4-4 5-5 6-2 7-7 8-8
Create the correct pin connections for a Rollover cable.
1-8 2-7 3-6 4-5....
10GBase-SR cable has a maximum transmission speed of
10 Gbps
10GBase-T Ethernet cable has a maximum transmission speed of
10 Gbps
IP addresses can be displayed in decimal or binary. What is the binary value for 192
11000000
Write the subnet mask in Binary for 192.168.4.0/26. Use decimals between octets.
11111111.11111111.11111111.11000000
Which of the following IP addresses would be a loopback IP address?
127.0.0.1
there are ____ bits in an IPv6 address
128
When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?
15
The APIPA addresses are from _____ to _____
169.254.0.1 - 169.254.255.254
You are using Wireshark to check traffic on your network. You set up all devices in the network to be in the subnet 192.168.10.0. You notice some broadcast packets being sent out. What is the broadcast address for the 192.168.10.0 subnet?
192.168.10.255
A network with a CIDR notation of /26 would have what subnet mask?
255.255.255.192
Write the subnet mask in Decimal for 192.168.4.0/26. Use decimals between octets.
255.255.255.192
Match the OSI Layer and the PDU
7,6,5 Payload or Data 4 Segment 3Packet 2 Frame 1 Bit or transmission
Which IPv4 addresses are valid?
74.122.199.254 192.168.4.64 1.22.146.5
The IEEE standard defines how VLAN information appears in frames and how switches interpret that information. The port information is sometimes referred to as the ____ tag.
802.1Q
A highly available server is available what percentage of the time?
99.999%
Kim was creating a baseline for the WAN from a client's computer. Kim ran a speedtest at 9am and another at 9pm. In about 20 words, give two reasons why Kim might have received drastically faster upload and download speeds at 9pm.
9am is a typical working hour where the bandwidth my be spread across multiple devices. This would greatly slow down the baseline WAN. At 9pm there would be much less demand for the bandwidth causing it to be much faster.
What statement regarding the use of a network attached storage device is accurate?
A NAS can be easily expanded without interrupting service.
What statement regarding denial-of-service (DoS) attacks is accurate?
A denial-of-service attack prevents legitimate users from accessing normal network resources.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
In about 20 words explain double tagging
A hacker stacks VLAN tags in Ethernet frames by removing the first legitimate tag and revealing a second illegitimate tag that tricks the switch into forwarding the transmission.
What scenario describes an evil twin attack?
A malicious access point is configured with the SSID of a non-malicious access point
How is a posture assessment performed on an organization?
A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
Of all the DSL standards, which is the most commonly in use today?
ADSL
Which one of these protocols communicates across the Internet, is used by edge routers and exterior routers to distribute data outside of an AS? It is also dubbed the "protocol of the Internet".
BGP
Bob and Alice have each created their own pair of keys for use with Public Key encryption and need a simple and secure key management system. One answer to this problem is to use digital certificates. The digital certificate is issued, maintained, and validated by a ___________
CA
A good naming convention for computers in classroom 223 in the CALT building on the Arnold Campus would be
CALT223-01, CALT223-02, CALT223-03
To protect data at rest, in use, and in motion, encryption methods are primarily evaluated by three benchmarks that form the ___ triad.
CIA
Which of these is not a wireless standards for IOT devices in a WPAN or HAN.
CSMA/CD
In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?
Carrier Ethernet Transport
Which organization set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices?
Cisco
Match the function to the Layer 4 Protocol.
Connection oriented - TCP Sequencing - TCP Acknowledgement - TCP Flow control - TCP Three way handshake - TCP Guarantees delivery - TCP Connectionless UDP Good for live or video - UDP
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
DNS poisoning
Select three types of VLANs that you might see implemented on a network:
Data default voice
Match the following terms with their definition.
Entry Facility - location where Demark point - device that marks MDF - centralized point IDF - provides an internal KVM - switch that connects
TCP transmissions continue until a specific flag bit is set to 1. Which flag is this?
FIN
Telnet is a secure protocol used to "remote in" or control a computer remotely.
False
Select the two main protocols that run at Layer 3 of the OSI Model.
ICMP IP
What does the Common Address Redundancy Protocol do?
It allows a pool of computers or interfaces to share one or more IP address.
How does refraction affect the propagation of a wireless transmission?
It distorts the signal as it travels into and through a different transmission medium
When using Kerberos, what is the purpose of a ticket?
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
What is routing protocol convergence time defined as?
It is the time it takes for the protocol to recognize the best path in the event of a network change.
The Data Link layer adds ___ addresses.
MAC
What type of connector is this? =[]==---- black
MTRJ
Which statement accurately describes what near end crosstalk (NEXT) is?
NEXT is crosstalk that occurs between wire pairs near the source of a signal.
To attach to a network a computer requires a NIC. NIC stands for (three words)
Network Interface card
At what layer of the OSI model does the IPsec encryption protocol operate?
Network layer
Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?
OC-3
Which of these area networks is the smallest by geographic size:
PAN
In about 20 words, explain the response between issuing a ping command and the tracert (or traceroute) command
Ping sends packets to a specific address and waits for a reply. Trace route traces from the computer to the host and shows the number of hops. shows the exact route the ICMP packet took
Good documentation includes business documents. Match the business documents below with their definition.
RFP - request to vendor MOU lists the intentional SOW - a detailed list of SLA - a legally binding MSA - a contract that d MLA grants a license
Match the Routing protocol with the Algorithm used. The Algorithm might be used more than once.
RIP - distance vector RIPv2 - distance vector IS-IS - link state OSPF - link state EIGRP - advanced distance vector BGP- advanced distance vector or path vector
Select the twisted pair cable connectors. Select two.
RJ45 RJ11
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
RTS/CTS (Request to Send/Clear to Send)
In a software defined network, what is responsible for controlling the flow of data?
SDN controller
Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?
SDSL
What statement regarding the different versions of the SHA hashing algorithm is accurate
SHA-2 and SHA-3 both support the same hash lengths.
What mail protocol is used to send mail messages to a server?
SMTP
What type of connector is this? -0----- yellow
ST
TCP uses a three-way handshake to establish a session before TCP transmits data. Select the transmissions of the three-way handshake
SYN, SYN/ACK, ACK
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
PoE is a method to
Send electrical power over twisted-pair Ethernet connections
The connectionless IP protocol relies on what other protocol to guarantee delivery of data?
TCP
Select the two main protocols that run at Layer 4 of the OSI Model.
TCP UDP
Imagine that you are using Symmetric Key Encryption and using Exclusive OR (XOR) to encrypt and decrypt messages The plain text is 1111 0100. The encryption key is 1011 0011.
The encrypted text in Binary is 0100 0111. The decryption key in Binary is 1011 0011
How can you determine the manufacturer of a NIC based on the MAC address?
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer
Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?
The packets are coded such that individual calls can be distinguished.
Diffraction has what effect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split
VoIP is
The use of any network to carry voice signals using TCP/IP protocols
Which of the following are advantages of peer-to-peer networks (Choose 3)
They are good for networks that support fewer than 15 computers. They are often less expensive to set up and maintain. They are simple to configure
In a Peer-to-Peer network model, each computer's operating system is responsible for controlling access to its resources.
True
RDP is a secure protocol used to "remote in" or control a computer remotely.
True
SSH is a secure protocol used to "remote in" or control a computer remotely.
True
Which type of hypervisor requires a host OS?
Type 2
Virtualization requires a hypervisor. Select the two types of hypervisor.
Type 2 Type 1
VMware Player and Linux KVM are both examples of what type of hypervisor?
Type 2 hypervisor
Select the two main protocols of the Transport layer.
UDP TCP
Match the antenna type with the coverage
Unidirectional - one direction omnidirectional - many directions
There are multiple mitigation techniques to reduce the risk of VLAN hopping. Select three
Use physical security methods such as door locks Don't use the default VLAN Change the native VLAN to an unused VLAN ID
When a switch is configured with STP, _____ ports are pointing toward the root bridge and _____ ports are pointing downstream from the root bridge.
root designated
only one ____ exists on a network using STP
root bridge
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
acceptable use policy document
The purpose of VLSM is to:
allow subnets to be further subdivided into smaller and smaller groupings.
A/an [ans] is a central conduit that connects the segments of a network
backbone
Where are MPLS labels placed within a frame?
between the layer 2 header and the layer 3 header
Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
captive portal
What type of door access control is a physical or electronic lock that requires a code in order to open the door?
cipher lock
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
clustering
What type of cable is this? Oo.__
coaxial
What kind of firewall can block designated types of traffic based on application data contained within packets?
content-filtering firewall
Which of these are advantages to using virtualization? (Choose three)
cost and energy saving fault and threat isolation efficient use of resource
Which statement accurately describes what alien crosstalk is?
crosstalk that occurs between two cables.
For each type of multiplexing, a device that can combine many signals on a channel, a multiplexer (mux), is required at the transmitting end of the channel. At the receiving end, a _________ separates the combined signals.
demultiplexer
The act of taking advantage of a weakness is known as a/an ___ .
exploit
What type of connector is this? 0
f-connector
Match the signal interference with the characteristic
fading - something cause attenuation - the farther a signal interference - electromagnetic reflection - when the wave scattering - When a wireless signal encounters an object that has small dimensions compared with the signal's wavelength, it's diffused in multiple directions.
A safety measure that allows access during a failure is called _______ and a safety measure that denies access during a failure is called _______
fail open fail close
A RAID 5 configuration requires a minimum of two hard disks to operate.
false
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
false
A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.
false
All switch ports must be in the same VLAN to forward frames correctly.
false
An ACL can only inspect outbound packets from your local LAN to the Internet
false
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
false
Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.
false
Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.
false
IPv4 and IPv6 use the same packet format.
false
IPv6 does not have subnetting
false
Only Class B and Class C networks can be subnetted.
false
Public key encryption is also called Symmetric encryption
false
Sensitive electronic components can not be damaged by static electricity.
false
Switches are layer 2 devices and forward traffic based on IP addresses
false
The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
false
The only function of network management is to check for hardware faults
false
Using VLSM, all subnets must be the same size
false
WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.
false
The network administrator issues the ipconfig command on a computer. The IP address is 192.168.16.1 In classful subnetting this is the _________
first available host
Which of the following are reasons a network administrator might separate a network's traffic into smaller portions?
improve performance enhance security simplify troubleshooting
On a Windows system, what command can you utilize to display TCP/IP configuration information for each network adapter installed?
ipconfig/all
The most popular kind of encryption encodes (combines) the original data's bits using a ___, or a random string of characters to scramble the data and generate a unique and consistently sized data block called ciphertext.
key
The combination of a public key and a private key are known by what term below?
key pair
Typically a Switch operates at layer 2 of the OSI model. However, small organizations, such as a SOHO, can purchase a switch that also interprets Layer 3 data and works much like a router. What is this device called?
layer 3 switch
Match the OSI layer with the address it adds to the data from the upper layers of the OSI model.
layer 4 - Port address layer 3 - IP address layer 2 - MAC address
Select the five (5) security precautions listed in the text that should be applied to the privileged user account.
limited: access location use duration privacy
The network administrator needs to increase total throughput between two switches. They create redundant links by connecting three ports on one switch to three ports on the other switch and configure the ports on both switches to handle the traffic. Select two (2) terms for this technique
link aggregation port aggregation
Match the router function with a router
located inside networks within the same autonomous system - core router Connect an autonomous system with an outside network, also called an untrusted network - edge router Refers to any router outside the organization's AS, such as a router on the Internet backbone - exterior router
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?
logic bomb
Each routing protocol is assigned a default administrative distance (AD), which is a number indicating the protocol's reliability. Which AD is given higher priority?
lower
When implementing VLANs, what type of switch do we need
managed
It is desirable for a system to have high availability, referring to the consistency and reliability of a connection, system, or other network resource to be accessible. What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
mean time between failures (MTBF)
What kind of tool can you use to measure voltage on a cable length?
multimeter
Would the IDS in this diagram be considered a host-based IDS or a network-based IDS?
network based ids
Each managed object on a managed device using SNMP is assigned which of the following?
object identifier (OD)
Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?
online UPS
What document addresses the specific concerns related to special access given to administrators and certain support staff?
privileged user agreement
List the four deployment models for Cloud services
public private community hybrid
The LAN has 1 router and 3 switches managing devices. To help protect against faults and failures, the network has additional switches filling the same role on the network. If one switch fails, another takes over. This is an example of ___________.
redundancy
Signals that can travel in only one direction on a medium are referred to as what type of signal?
simplex
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?
sliding-window
Your organization has decided to subnet their internal network. They are using the private addresses 192.168.5.0. The New Subnet Mask is /26. The first subnet will be used for the sales department. Fill in the dotted decimal addresses for the sales department in the following table.
subnet address - 192.168.5.0 first valid host - 192.168.5.1 last vlid host - 192.168.5.62
In planning for disaster recovery, what is the ultimate goal?
the continuation of business
Terry calls you because no one in the department can get to the AACC server that stores EPC documents. You just accessed the server successfully from another building. You go to Terry's department to do some diagnostics. Which command would let you know which router between Terry's department and the server is down?
tracert
A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.
true
A baseline is a report of the network's normal state of operation and might include a range of acceptable measurements.
true
A community cloud is a service shared between multiple organizations, but not available publicly.
true
A good Remote Access Policy would be to terminate remote sessions when not in use
true
A vNIC operates at layer 2 and provides network access for the VM.
true
All wireless signals are carried through the air by electromagnetic waves.
true
At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
true
Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.
true
Fiber-optic cable comes in two types: single-mode fiber (SMF) and multimode fiber (MMF).
true
The term malware is derived from a combination of the words malicious and software.
true
To add security to a switch, we can store acceptable MAC addresses in a MAC address table.
true
When TCP sends data, the sequence numbers will be increased by the number of bits included in each received segment, as confirmation that the correct length of message was received. This new number (sequence number plus number of bits in the segment) will become the acknowledgment number for the return message.
true
To rollback or reverse an operating system patch you should
use the patch's automatic uninstall utility
The hypervisor creates a connection between a vNIC and a __________
vSwitch
If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?
wi-fi analyzer
What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?
wiki
What type of diagram is a graphical representation of a network's wired infrastructure?
wiring schematic
Match the cell technology generation with an accurate description.
1G services from the 2G used digital transport 3G data rates rose 4G all-IP, packet-switches
Which Frequency range do the Wi-Fi 802.11 b/g/n technologies use?
2.4 GHz
A MAC address is ___ bits
48
List two Password Policy tips from the text that you think are the most important and Why they are so important.
Do not use the same password on different applications is important because if one account gets hacked, all of your accounts that use the same password could be at risk. Changing the password at least every 60 days is important because longer a password is used, the more vulnerable it gets. Changing it will ensure longer security for the account.
you need to check connectivity to Cengage so you open a browser window and type "ping cengage.com" in a Command Prompt. What Layer 3 protocol does ping use?
ICMP
Explain disadvantage of a single point of failure as it pertains to Virtualization. Include an example
If the one server goes down for any reason, they all go down. For example, if you are running multiple guest machines on one host, and the host crashes, all guest machines will crash.
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Both IPv4 and IPv6 protocols will be used on the network.
The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
What type of connector is this? -o[}----
LC
What type of connector is this? {]
RJ45
Which encryption standard was originally used with WPA's TKIP?
Rivest Cipher 4 (RC4)
What kind of device can monitor a connection at the dmarc but cannot interpret data?
smart jack
Below is a [top] topology \|/ -*- + (*.) = mesh /|\
star + ring = mesh
A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a/an ____ .
vulnerability
During some incidents, data will need to be collected in such a way that it can be presented in a court of law for the purpose of prosecuting an instigator of illegal activity. Some of the forensic data available for analysis can be damaged or destroyed if improperly handled. Ideally, one or more first responders would take charge in these cases. First responders are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court. However, it's critical that every IT technician in a company know how to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence, Put the six (6) First Responder steps in order.
1 - secure the area 2 - document the scene 3- monitor evidence 4 - protect the chain of custody 5 - monitor transport 6 - create a report
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
no more than one inch of the cable should be exposed
Your client has an open area with 20 devices communicating through a wireless network. Which type of antenna will have give the best communication for all 20 devices - an omnidirectional or a unidirectional?
omnidirectional
Periodically, we will be responsible for software and hardware changes. Match the terms below with their definition
patch - a correction upgrade - a major change rollback - the process of reverting
Of the well-known TCP and UDP ports, which two carry DHCP traffic?
port 68 port 67
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
port numbers
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?
quid pro quo
What is the most popular AAA, open-source service, that runs in the Application layer and can use UDP or TCP in the Transport layer?
radius
A/an _______ manages traffic between two or more networks and helps find the best path for traffic.
router
A __________ table is a database that holds information about where hosts are located and the most efficient way to reach them.
routing
OSI Model Layers
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application
1000Base-LX cable has a maximum transmission speed of
1000 Mbps
Cat 5e cable has a Maximum supported throughput of
1000 Mbps
The equation to calculate the number of subnets from the New Subnet Mask is:
2n = Y where n is the number of bits changed from zero to one and Y is the number of subnets created
The C-Band utilized by satellites consists of what frequency range?
3.4-6.7 GHz
A MAC address is typically written as hex. Write a valid MAC address in Hex
30-65-EC-6F-C4-58
An IPv4 address has _______ bits and an IPv6 address has _____ bits
32 128
How many pairs of wires do Shielded Twisted pair and Unshielded twisted pair cable have?
4
When using DOCSIS 3.0, what is the minimum number of channels that can be used?
4
Which Frequency range do the Wi-Fi 802.11 a/n/ac technologies use?
5 GHz
What is the size of an ATM cell, including the header?
53 bytes
Bob and Alice have each created their own pair of keys for use with Public Key encryption. Alice receives a message from Bob. Bob encrypted the message so that Alice is the only one who will be able to decrypt the message. Which key will Alice use to decrypt the message?
Alice's private key
Bob and Alice have each created their own pair of keys for use with Public Key encryption. Bob wants to send a message to Alice and wants Alice to be the only person who can decrypt the message. Which key will Bob use to encrypt the message?
Alice's public key
Which of the following statements describes a RAID 0 configuration?
In a RAID 0, data is striped across multiple disks to improve performance.
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?
STP must first select the root bridge, or master bridge.
If a router does not find a matching entry in its table and no default route is defined in the table, what does the router do with the packet?
drop the packet
Your organization has implemented subnetting. If the DHCP server is not on the same subnet as the client requesting DHCP information, the client cannot receive any DHCP information
false
radius can only work with wireless users
false
VLSM allows subnets to be further subdivided into
smaller and smaller groupings
1 - List the five categories used in Multi-factor Authentication and 2 - give an example of each.
something you know - a pin something you have - key fob something you are - iris pattern somewhere you are - where you are in a specific building something you do - the way you talk
It is called _____ routing when a network administrator configures a routing table to direct messages along specific paths between networks. It is called _______ routing when a router automatically calculates the best path between two networks and accumulates this information in its routing table
static dynamic
Match the IDS detection method with the description of the method.
statistical anomaly detection - compares network signature based detection - looks for identifiers
List the throughput in Mbps for T1 and T3 carriers.
t1 1.544 t3 44.736
A subnet of 255.255.248.0 can be represented by which CIDR notation?
29
ARP works in conjunction with IPv4 to discover the ____ address of a node on the local network and maps those addresses to ____ addresses.
MAC, IP
VoIP stands for:
voice over internet protocol
We can use ANDing to calculate the subnet address of a specific IP address if we also know the subnet mask. What is the result when we use ANDing rules to combine the following values? 1101 0010 1011 0011
1001 0010
100Base-T Ethernet cable has a maximum transmission speed of
100Mbps
When creating the New Subnet mask, we change Host Bits to Network Bits. Which subnet mask will create exactly two subnets for a Class C subnetting scheme?
1111 1111.1111 1111.1111 1111.1000 0000
A subnet mask can also be represented in CIDR notation. Write the subnet mask in Binary for an IP address with CIDR of /26.
1111 1111.1111 1111.1111 1111.1100 0000
An MTU is the maximum transmission unit, or the largest size of a frame, in bytes, that routers in the path will allow. What is the layer 2 default MTU
1500 bytes
You ask the client to type ipconfig from a Command Prompt window to display their IP address. It is 169.254.1.1. They need to go to Network and Sharing to change their IP address so it is within the range of valid host addresses for the 192.168.1.0 subnet. Which of the following addresses would be a valid address for their computer
192.168.1.6
In preparing and planning for disaster recovery, what is the difference between an incident and a disaster?
An incident is a single event that affects more than a single group of users. Disasters are extreme events that effect more than a single system or limited group of users. Incidents are smaller scale and what a company should be prepared to deal with. Disasters will most likely require the assistance from the outside.
When a DHCP server gives a client an IP address, it sets a time limit, or least time, on the IP address.
At the end of lease time, the IP address expires and is now available to a new client. If the lease time is too long the network will suffer exhausted DHCP scope and no new clients can join. If the lease is too short, network availability will be disruptive. Lease times range from 2 hours to 8 days. Longer lease times are better for smaller offices without a lot of growth. Short lease times are better for larger networks where clients log on and off frequently.
If a router receives a packet and finds two matches with the LAN's network information, what does the router do with the packet?
Chooses the best of the two options based on their respective routing metrics.
The DTE or endpoint device for a leased line is known as which device below?
CSU/DSU
List the range of the first octet of Class A, Class B, and Class C IPv4 addresses.
Class A 1-126 B 128-191 C192-223
The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?
EF (Expedited Forwarding) F (Assured Forwarding)
A BSS typically has one AP for end devices to communicate with. In this diagram, there are multiple BSSes. These multiple BSSes form a/an ______ .
ESS
Which IPv6 addresses are valid?
FE0:201:95af::32ab:56:3d4 2001:5af:2::56:3d4 2001:98:0045:0000:0001::2
Choose the two technologies used by wireless devices to avoid interference. Choose two.
FHSS DSSS
Match the two main Web service protocols and whether the protocol is Secure or Unsecure
HTTP Unsecure HTTPS Secure
The Network layer adds ___ addresses
IP
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
There are multiple reasons to implement VLANs on a network. Select three from the list below:
Identifying groups of devices whose data should be given priority handling Isolating connections with heavy or unpredictable traffic patterns Reducing the cost of networking equipment
Terminal emulation can provide remote access to a device. Why is the telnet utility a poor choice for remote access to a device?
It provides poor authentication and no encryption
My computer in the CALT building of AACC's main campus has an IP address of 10.0.16.141. I am requesting the Google home page. Because the Source IP address (my computer) is private it will need to be changed to AACC's public IP address at the router. The service changes the IP address before the packet is sent out to the Internet is called _____.
NAT
List the 5 Interior Gateway Protocols listed in the text.
RIP, RIPv2, IS-IS, OSPF, EIGRP
An Application layer utility program called __________ monitors and gathers information about network traffic and can alert network administrators about adverse conditions.
SNMP
Which four statements regarding the SSH (Secure Shell) collection of protocols are accurate?
SSH can be run at the shell prompt on a UNIX or Linux system SSH listens to port 22 SSH can be run at the command prompt on a Windows-based system SSH does both authentication and encryption
Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
TCP 3389
You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?
The MTU for the network can be as high as 9198 bytes.
What happens when an NMS uses the SNMP Walk command?
The NMS uses get requests to move through sequential rows in the MIB database.
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
The computer is configured to use DHCP, but was unable to lease an address
Which of the following are advantages of a Client-Server network model? (Choose 3)
They are more scalable User accounts and passwords are assigned in one place Access to multiple shared resources can be centrally granted to a user or group of users
A variant of BYOD, what does CYOD allow employees or students to do?
They can choose a device from a limited number of options.
In a cellular network, where does each wireless base station connect to?
They connect to a mobile switching center.
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway
Which of these area networks is the largest by geographic size?
WAN
By default, the 802.11 standard does not offer any security. The client only needs to know the access point's SSID, which many access points broadcast. Network administrators may prevent their access points from broadcasting the SSIDs, making them harder to detect. However, this does not provide true security. One solution to this problem is encryption. Match the encryption with a feature.
WEP - the first implementation WPA - dynamically assigned WPA2 updated version
Anything as a Service or Everything as a Service is abbreviated by what letters?
XaaS
What is the name of the GUI front end that is available for the Nmap utility?
Zenmap
ARP tables might contain two different types of entries. 1 - What are they, and 2 - How are they created?
`Dynamic and static are the two entries for ARP tables. `static are entries that do not change as someone entered them in manually. Dynamic entries are created by a client requesting an ARP.
In a DNS zone, what type of record holds the name-to-address mapping for IPv4 addresses
a record
A switch has two different types of ports. The ______ port will carry traffic for only 1 VLAN at a time; the ______ port will carry traffic for multiple VLANs.
access trunk
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit http any any
Controlling user's access to a network consists of three major elements known as AAA. What are each of these components?
accounting authentication authorization
Which wireless topology would be best for a small number of nodes closely positioned transmitting directly to each other without an intervening connectivity device?
ad hoc
There are multiple types of Layer 2 frames for wireless communications depending on the function of the frame - management frame, control frame, or data frame. The 802.11 data frame has four address fields.
address 1 - source address 2 - transmitter address 3 - receiver address 4 - destination address
A tag is added to Ethernet frames to identify their VLAN assignment. Where is the tag added:
after the source address
An RFID label on a box is an example of what type of physical security detection method?
asset tracking tagging
You are hired by an organization to find vulnerabilities in their organization's network. You are given a user ID and password. What type of vulnerability scanning is this?
authenticated
What aspect of AAA is responsible for determining what a user can and cannot do with network resources?
authorization
Match the term with its definition.
bandwidth - the amount of data throughput - the measure of
Match the three networking modes with their description.
bridged mode - a vNIC obtains NAT mode - The VM obtains IP addressing information from its host's virtualization software, rather than a server or router on the physical network. Other nodes communicate with the host machine's IP address to reach the VM. Host only mode - VMs on a host ca
In the following diagram, what path will data take if the server sends data to Host D? Server is the first device in the list; Host D is the last device in the list. Be specific.
device 1 server device 2 switch c device 4 switch d device 5 switch f device 6 host d
Match the backup scheme with the data copied.
full backup - backs everything up incremental - backs up only data differential - backs up data that has changed since the last
Networks are commonly segmented into groupings. Which of the following are acceptable groupings?
geographic locations departmental boundaries device types
Suppose your LAN uses a proxy server, and you want to send an email message from your workstation inside the LAN to a colleague via the Internet. Your message will first
go to the proxy server
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
honeynet
When two computers create a VPN tunnel directly between them it is called a ____ VPN.
host-to-host
On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
ifconfig -a
Which wireless topology has one intervening connectivity device, such as an AP, that accepts wireless signals from multiple nodes and retransmits them to the rest of the network? This type of topology has no fault tolerance built in for the one AP
infrastructure
At what layer f the OSI model to proxy servers operate?
layer 7
Similar to duplexing which allows a signal to travel in both directions in a cable at one time, ___________ is a form of duplexing that allows multiple signals to travel simultaneously over one medium by separating the medium's channel into multiple smaller channels
multiplexing
IPv6 addresses do not have classes
true
IPv6 addressing does not utilize classful addressing, in other words, there are no Class A, Class B, or Class C networks
true
In a frame relay WAN, the ISP typically has the data circuit terminating equipment (DCE).
true
In a public switched telephone network (PSTN) , lines are terminated at the central office.
true
Latency on data networks is based on a calculation of a packet's round trip time (RTT).
true
Layer 2 is the only layer of the OSI model that adds a header and a trailer to the payload it inherits from the layer above it.
true
Most satellites circle the Earth 22,300 miles above the equator in a geosynchronous orbit.
true
Network Diagrams are graphical representations of a network's devices and connections.
true
Over a long-distance connection, using SSH keys is more secure than using passwords.
true
Port 123 is utilized by the Network Time Protocol service
true
Proxy servers and ACLs on network devices are examples of non-security devices outfitted with security features and abilities.
true
Routers work at layer 3. They join two or more networks and pass packets from one network to another.
true
The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console
true
The TCP header includes a Source port and a Destination port. The UDP header does not include either of these.
true
The TIA/EIA standard for wall jacks in a work area requires that at least one outlet be provided for data and one for voice
true
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
true
The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.
true
The process of designing, implementing, and maintaining an entire network is called the System Life Cycle.
true
When using IPv6, two or more nodes on the same link are said to be neighbors
true
Wireshark or any other monitoring software running on a single computer connected to a layer 2 switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.
true