DataCom Final
Logic bomb
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Hypervisor
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Agent
What software might be installed on a device to authenticate it to the network?
DOCSIS
What specifications define the standards for cable broadband?
Virtual switch
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
How long devices like this one will last on average until the next failure
When shopping for a new router, what does the MTBF tell you?
VDSL
Which DSL standard has the fastest speeds immediately outside the CO?
802.1Q
Which IEEE standard determines how VLANs work on a network?
Application awareness
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
PaaS
Which cloud computing services model gives software developers access to multiple operating systems for testing?
switchport port-security
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
Integrity
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
IPsec
Which encryption protocol does GRE use to increase the security of its transmissions?
SSH
Which of the following is considered a secure protocol?
To increase the number of networking devices on a network
Which of the following is not a good reason to segment a network?
Access control
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Deauthentication attack
Which of these attacks is a form of Wi-Fi DoS attack?
Trunk
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Online UPS
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
IKEv2
Which tunneling protocol is a component of the IPsec protocol suite?
Top listeners
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Penetration testing
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Smart jack
What kind of device can monitor a connection at the demarc but cannot interpret data?
Content-filtering firewall
What kind of firewall blocks traffic based on application data contained within the packets?
Circuit-switched
What kind of network is the PSTN?
TDMA
What method does a GSM network use to separate data on a channel?
Port 161
What port do SNMP agents listen on?
User authentication
Which of the following features is common to both an NGFW and traditional firewalls?
DRDoS (Distributed Reflection DoS) attack
Which type of DoS attack orchestrates an attack using uninfected computers?
Cold site
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Wireshark
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Phishing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
NDA
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
Insider threat
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
DNS poisoning
A spoofed DNS record spreads to other DNS servers. What is this attack called?
dedicated line, virtual circuit
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
24 bits
How many bits of a Class A IP address are used for host information?
23B+D
How many channels are in an ISDN PRI connection?
DirectAccess
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
Between Layers 2 and 3
Where does an MPLS label go in a PDU?
256 - the interesting octet and 2h
Which formulas can be used to calculate the magic number? Choose two.
The fourth one
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
access-list acl_2 permit http any any
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
Speed
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
PPPoE
Which remote access protocol is used over an Ethernet network?
SFTP
Which remote file access protocol is an extension of SSH?
DHCP relay agent
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
LDAP
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
SNMP Get Next
What command requests the next record in an SNMP log?
Network documentation is easier to manage.
What do well-chosen subnets accomplish?
AD
What feature of Windows Server allows for agentless authentication?
DiffServ
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
2h - 2 = Z
What is the formula for determining the number of possible hosts on a network?
8
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Layer 3
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 7
At what layer of the OSI model do proxy servers operate?
NAT mode
With which network connection type does the VM obtain IP addressing information from its host?
Posture assessment
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
Traffic shaping
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
OC levels, digital signal levels
______________ in SONET are analogous to the ________________ of T-carriers.