Data Communications and Networks Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Subnetting operates at Layer _____ while VLANs function at Layer _____ .

Layer 3, Layer 2

At what layer of the OSI model do proxy servers operate?

Layer 7

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic Bomb

What file must be accessed in order to analyze SNMP logs?

MIB (Management Information Base)

On which networking device do you configure VLANs?

Managed Switches

Which VLAN is designed to support administrative access to networking devices?

Management VLAN

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

Which VLAN on a switch manages untagged frames?

Native VLAN

When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it to in order to determine what has changed?

Network Baseline

_____ in SONET are analogous to the of _____ T-carriers.

OC Levels, Digital Signal Levels

What are two types of virtual circuits?

PVC (Permanent Virtual Circuit) and SVC (Switched Virtual Circuit)

What type of adapters are required on servers in an FCoE storage network?

Converged Network Adapters (CNA)

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

What device must be installed on a DSL network to protect the sound quality of phone calls?

Splitter

What are the two main categories of UPSes?

Standby and Online

What method does a GSM network use to separate data on a channel?

TDMA

Which ISDN channel carries signaling information?

The Bearer channel (or B channel)

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

WireShark

Which formulas can be used to calculate the magic number? Choose two.

a. 256 - the interesting octet d. 2^h

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need in order to make the central DHCP server accessible across VLANs?

a. DHCP relay agent

What do well-chosen subnets accomplish? IP address spaces overlap for easier management..

a. Network documentation is easier to manage.

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

b. Eight

How many bits of a Class A IP address are used for host information?

c. 24 bits

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

c. The fourth one

Which of the following is not a good reason to segment a network?

c. To increase the number of networking devices on a network

What is the formula for determining the number of possible hosts on a network?

d. 2^h - 2 = Z

Which IEEE standard determines how VLANs work on a network?

d. 802.1Q

What characteristic of ARP makes it particularly vulnerable to being used in a DoS attack?

· It performs no authentication

What type of scanning might identify that Telnet is running on a server?

· Port scanning

Only one exists on a network using STP.

· Root bridge

Which form of SHA was developed by private designers?

· SHA-3

What unique characteristic of zero-day exploits make them so dangerous?

· The vulnerability is exploited before the software developer has the opportunity to provide a solution for it or before the user applies the published solution

What kind of ticket is held by Kerberos's TGS?

· Tickets that grant access to a network service once a client has been authenticated by the authentication server (AS) · Ticket-Granting ticket (TGT)

Why do network administrators create domain groups to manage user security privileges?

· To assign appropriate permissions for each group and to prevent access to network resources that are not needed

Why is a BPDU filter needed at the demarc?

· To prevent the ISP's WAN topology from mixing with the corporate network's topology for the purpose of plotting STP paths · Disable STP on specific ports

Which of the following features is common to both an NGFW and traditional firewalls?

· User authentication

Where does an MPLS label go in a PDU?

Between Layers 2 and 3

What is the maximum capacity of a T1 line?

1.544 Mbps

Suppose your company has leased one Class C license, 120.10.10.0, and wants to sublease the first half of these IP addresses to another company. What is the CIDR notation for the subnet to be subleased? What is the subnet mask for this network?

120.10.10.0/25 255.255.255.128

What is the network ID with CIDR notation for the IP address 172.16.32.108 whose subnet mask is 255.255.255.0?

172.16.32.108/24

How many channels are in an ISDN PRI connection?

23B+D

How large is an ATM cell?

53 bytes

What information is typically included in a Layer 1 frame?

A start symbol or short preamble, a length field, the Layer 2 payload, and possibly a marker to end the frame

Accounting What feature of Windows Server allows for agentless authentication?

AD (Active Directory)

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Access Control

What two types of modulation does DSL use to carry data?

Amplitude and Phase Modulation

What is the primary goal of disaster recovery?

Business continuity

Why might organizations be willing to take on the risk of BYOD?

Cheaper for organizations to implement and tend to improve efficiency and morale for employees and students

What kind of network is the PSTN?

Circuit Switched

Which QoS technique operates at Layer 2 to more efficiently route Ethernet traffic between VLANs?

CoS (Class of Service)

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold Site

What area of a network can provide less stringent security so a web server is more accessible from the open Internet?

DMZ (Demilitarized Zone)

A spoofed DNS record spreads to other DNS servers. What is this attack called?

DNS Poisoning

What specifications define the standards for cable broadband?

DOCSIS

Which type of DoS attack orchestrates an attack using uninfected computers?

DRDoS (Distributed Reflection DoS) attack

Which of these attacks is a form of Wi-Fi DoS attack?

Deauthentication Attack

An organization can lease a private _____ that is not shared with other users, or a _____ that can be physically configured over shared lines in the carrier's cloud.

Dedicated Line, Virtual Circuit

Which fields are modified in IPv4 and IPv6 packets to help prioritize traffic for QoS?

DiffServ for IPv4 and Traffic Class for IPv6

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

Diffserv

What kinds of alerts can you program your network monitor to send to IT staff when it detects specific, problematic conditions?

Email, text (SMS), or new support tickets

What are three examples of Layer 2 LAN or PAN standards that also function at Layer 1?

Ethernet, USB, Wi-Fi

What type of network combines fiber with coax?

HFC (Hybrid Fiber Coaxil)

Why might you want to install two power supplies in a critical server?

If one power supply fails, the other can take over: redundancy

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider Threat

What protocol is most often used to bond ports between a switch and a busy server?

LACP (Link Aggregation Control Protocol)

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Penetration Testing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?

Phishing

What port do SNMP agents listen on?

Port 161

What are the four phases in the social engineering attack cycle?

Research, Building Trust, Exploit, Exit

Which protocol can provide VoIP services over a Metro Ethernet connection?

SIP (Session Initiation Protocol)

What command requests the next record in an SNMP log?

SNMP Get Next

Which of the following is considered a secure protocol?

SSH

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smart Jack

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top Listener

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic Shaping

Which DSL standard has the fastest speeds immediately outside the CO?

VDSL

An attacker configures a VLAN frame with two tags instead of just one. The first tag directs the frame to the authorized VLAN. After the frame enters the first VLAN, the switch appropriately removes the tag, then discovers the next tag, and sends the frame along to a protected VLAN, which the attacker is not authorized to access. What kind of attack is this?

VLAN Hopping

Which IP addressing technique subnets a subnet to create subnets of various sizes?

VLSM (Variable Length Subnet Mask )

What is the difference between a vulnerability and an exploit?

Vulnerability is a weakness of a system, process, or architecture that could lead to compromised information or unauthorized access to a network Exploit is the act of taking advantage of a vulnerability

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

d. Posture assessment

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

d. Trunk

Which Cisco command lists configured VLANs on a switch?

show VLAN

What software might be installed on a device in order to authenticate it to the network?

· Agent

What's the essential difference between an IPS and an IDS?

· An IDS can only detect and log suspicious activity. An ISP can react when alerted to such activity

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

· Application awareness

What are the two primary features that give proxy servers an advantage over NAT?

· Content filtering , file caching

What kind of firewall blocks traffic based on application data contained within the packets?

· Content-filtering firewall

A neighbor hacks into your secured wireless network on a regular basis, but you didn't give him the password. What loophole was most likely left open?

· Default password was not changed

Any traffic that is not explicitly permitted in the ACL is, which is called the .

· Denied, implicit deny rule

List five subtypes of DoS attacks.

· Distributed DoS, Distributed Reflection DoS, Amplified DoS, Permanent DoS, and Friendly DoS

Give an example of biometric detection.

· Face recognition on an iphone

What causes most firewall failures?

· Firewall misconfiguration

What kinds of issues might indicate a misconfigured ACL?

· When troubleshooting problems with performance between two hosts · or when some applications or ports can make the connection while others cant · Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others cant

EAPoL is primarily used with what kind of transmission?

· Wireless LANs

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

· access-list acl_2 permit http any any

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

· switchport port-security


Ensembles d'études connexes

Infotech English For Computer Users Student's Book - Unit 8

View Set

No-par value stock is characterized as stock which

View Set

EOG Questions :What are they asking? For each question, pay attention to the ALL CAPS word or phrase...if you see this word or phrase, what is the question really asking you?

View Set

Alterations in the Endocrine System

View Set

Performance Feedback and Evaluation

View Set

Chapter 8: Thinking, Language, and Intelligence

View Set

Database Final exam multiple choice

View Set