Fundamentals Networking Tech : Final Exam personal edit

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?

8 bits

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

When your computer first joins an IPv6 LAN, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/64

In the event of a fire, the most appropriate failure policy is a _______ policy.

Fail-open

When a router can't determine a path to a message's destination, where does it send the message?

Gateway of last resort

In the client-server model, what is the primary secure protocol used for communication between a browser and web server?

HTTPS

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?

Hypervisor

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which of the following devices are you likely to find in the MDF? Choose all that apply.

Switches Routers KVM switch

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat 6a

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

DRDoS attack

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

Default gateway

Which assignment technique requires a RADIUS server?

Dynamic VLAN assignment

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take them?

EF

Which of these commands has no parameters in Windows?

hostname

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

What is the Internet standard MTU?

1,500 bytes

A routing protocol's reliability and priority are rated by what measurement?

AD

Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device(s) are you transmitting?

All devices on your local network

Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?

BGP

Which transmission characteristic is never fully achieved?

Bandwidth

Which protocol replaced TKIP for WPA2?

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, cat 6a, cat 7

In Question 6, suppose one computer is upgraded from Windows 10 Professional to Windows Server 2019. Which networking model can the network now support that it could not support without the upgrade?

Client-server

What specifications define the standards for cable broadband?

DOCSIS

What type of attack relies on spoofing?

Deauth attack

Which cloud management technique executes a series of tasks in a workflow?

Orchestration

Which cloud service model gives software developers access to multiple platforms for testing code?

PaaS

Which cable is best suited for ultra-high-speed connections between a router and a switch on the same rack?

Passive twinaxial cable

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

Patch cable

Which DNS server offers the most current resolution to a DNS query?

Primary DNS server

You've just completed a survey of the wireless signals traversing the airspace in your company's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. Its SSID is broadcasting the name of a smartphone model. What kind of threat do you need to report to your boss?

Rogue AP

Which remote file access protocol is an extension of SSH?

SFTP (Secure File Transfer Protocol)

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers because the secondary server is requesting zone transfers from the primary server

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Which type of switch connects all devices in a rack to the rest of the network?

ToR switch

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?

Virtual switch

Which device converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

Voice Gateway

ICMP and ARP

Which two protocols manage neighbor discovery processes on IPv4 networks?

Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?

White/green

What type of diagram shows a graphical representation of a network's wired infrastructure?

Wiring diagram

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task? Choose all that apply.

Zenmap Command Prompt PowerShell

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.56. What command will show you which MAC address is mapped to that IP address?

arp -a

At which OSI layer does IP operate?

Network Layer (Layer 3)

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

Which OSI layer is responsible for directing data from one LAN to another?

Network layer

Which of the following applications could be used to run a website from a server?

Ngnix

What is one advantage offered by VDI over RDS and VNC?

Offers access to multiple OSs in VMs

Which protocol's header would a layer 4 device read and process?

TCP

What method does a GSM network use to separate data on a channel?

TDMA

Which part of a MAC address is unique to each manufacturer?

The OUI (Organizationally Unique Identifier)

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

How many bits of a class A IP address are used for host information?

24 bits

What decimal number corresponds to the binary number 11111111?

255

Which formulas can be used to calculate the magic number? Choose two.

2^h 256 - the interesting octet

What is the formula for determining the number of possible hosts on a network?

2^h - 2 = Z

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11ax

Which IEEE standard determines how VLANs work on a network?

802.1Q

Which of these is considered a secure place to store a list of documented network passwords?

A password manager

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Evil twin

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

Which one of the following wireless transmission types requires a clear LOS to function?

IR

As you're working to fix a problem with an application, you make multiple changes at once hoping that something will solve the issues you're having. You end up with more problems than when you started. Which step, if followed correctly, would have prevented this complication?

Identify the problem

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

Which of these cellular technologies offers the fastest speeds?

LTE-A

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

What is the first step of inventory management?

List all components on the network

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?

Load balancer

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

What information does the switchport port-security command use to restrict access to a switch's interface?

MAC address

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

Which type of DNS record identifies an email server?

MX record

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which logical networking model does the network use?

Peer-to-peer

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Which of the following is an application layer protocol?

RDP

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

If you're shopping for a rack switch, what component on the switch tells you it can be mounted to a rack?

Rack ears

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.

Red team-blue team exercise Pen testing

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

Which of the following is considered a secure protocol?

SSH

Which two encryption protocols might be used to provide secure transmissions for email services?

SSL and TLS

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smartjack

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

Star

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static route


Ensembles d'études connexes

Assignment Unit 3: Chapter 7 (Skeletal System: Part A)

View Set

MRI120 Ch.1 Intro to Sectional Anatomy

View Set

Assignment 5 - How Insurance Reduces Risk

View Set

Life Insurance: Completing the Application, Underwriting, and Delivering the Policy (12 Questions)

View Set

Pathophysiology Chapter 17 (Control of Cardiovascular Function) PrepU Quizzes

View Set

Psychology - Humanistic Psychology

View Set