N10-007 1-21

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a typical cost of a network cable installation?

$50 - 150 per drop

Which switch is used with the Windows netstat utility to show name of a running program?

-b

Which switch is used with the Windows netstat utility to show the process ID?

-o

DNS domains that are not on the Internet should use the top-level name __________.

.local

Which term is an original top-level domain name?

.mil

Which ipconfig command switch would a technician use to display detailed information (such as DNS servers and MAC addresses)?

/all

When performing a binary XOR (eXclusive OR) function with a cleartext value of 0 and a key value of 0, what is the result?

0

When performing a binary XOR (eXclusive OR) function with a cleartext value of 1 and a key value of 1, what is the result?

0

What is the range of decimal values in each of the four groups of an IPv4 address?

0 to 255

What value will most routers insert into the routing table Destination LAN IP column if there is no gateway needed?

0.0.0.0

Which value of the ECN field is the default, indicating "not QoS aware"?

00

Which address notation is the IPv6 loopback address?

0000:0000:0000:0000:0000:0000:0000:0001

Ethernet reserves the address __________ for IPv4 multicast frame destination addresses

01-00-5E-xx-xx-xx

RFID devices generally communicate within __________.

1 meter

Which of the channels defined by the 802.11 standard may be used by a WAP using the 2.4-GHz band in the United States?

1 through 11

How long is the start frame delimiter?

1-byte

Which of the following could be a valid Autonomous System Number (ASN)?

1.33457

What is the data transfer speed for DS1?

1.544 Mbps

What is the size of a U, the equipment rack unit of measure, used for specifying height?

1.75 inches

Which value of the ECN field indicates "QoS aware, no congestion"?

10

What was the maximum speed at which 10BaseT Ethernet networks communicate?

10 Mbps

When a multispeed, auto-sensing 100BaseT NIC connects to a 10BaseT Ethernet hub, at what speed will the NIC function?

10 Mbps sending and receiving

What is the maximum cable length on a segment of a 1000BaseT network?

100 meters

What was the maximum distance between a hub and a node on a 10BaseT network?

100 meters

Of all the Gigabit Ethernet IEEE standards detailed in the chapter, which one maintains a signal over the greatest distance?

1000BaseLX

What version of Gigabit Ethernet is being positioned as the Ethernet backbone of the future?

1000BaseLX

Which version of Gigabit Ethernet is published under the 802.3ab standard?

1000BaseT

The __________ version of Gigabit Ethernet, published under the 802.3z standard, is divided into a series of standards, with names such as 1000BaseSX and 1000BaseLX.

1000BaseX

What User Datagram Protocol (UDP) ports does SNMP use for secure communication?

10162 and 10161

In 100BaseT, what is the maximum number of nodes per hub/switch?

1024

What is the maximum number of nodes that could be attached to a 10BaseT segment or hub?

1024

Which standard specified multimode cabling?

10BaseFL

Which Ethernet cabling standard defines an Ethernet network that uses CAT 3 or better UTP cabling, operating at 10 Mbps?

10BaseT

Which version of Ethernet was introduced in 1990?

10BaseT

Which 10 GbE standard features a multimode fiber type?

10GBaseSR

Which value of the ECN field indicates "QoS aware, congestion encountered"?

11

How long is a MAC address?

12 hexadecimal characters

How many binary digits are in in an IPv6 address?

128

What bandwidth does ISDN offer?

128 Kbps

How many powerful DNS server clusters, scattered all over the world, does the DNS root contain?

13

Which wavelength is used by 1000BaseLX fiber-optic cabling?

1300 nm

How many channels were defined by the 802.11 standard?

14

Which port is used to receive e-mail messages from e-mail servers (IMAP4)?

143

What is the maximum number of hops allowed by RIP?

15

Frames in most wired networks hold at most __________.

1500 bytes of data

What is the range of transfer speed for ATM?

155.52 to 622.08 Mbps and beyond

What User Datagram Protocol (UDP) ports does SNMP use for unsecure communication?

161 and 162

On which port does the NMS receives/listen?

162

Evolved High-Speed Packet Access (HSPA+) provided theoretical speeds up to __________, although most HSPA+ implementations rarely exceeded 10 Mbps.

168 Mbps

Which TCP/IP port does the H.323 video presentation protocol use?

1720

What is the maximum distance between a user's demarc and the central office for all versions of DSL?

18,000 feet

Which address notation is an example of an IPv6 address?

2001:0000:0000:3210:0800:200C:00CF:1234

The IPv6 address, 2001:0000:0000:3210:0800:200C:00CF:1234, can be shortened to __________.

2001:0:0:3210:800:200C:CF:1234

Which IP address is valid for an individual host expressed in dotted decimal notation?

215.233.32.91

Which address range does multicast use in IPv4?

224.0.0.0/4

How many channels are in a DS1 frame?

24

Which TCP/IP ports does MGCP use?

2427 and 2727

Including the separating periods, what is the maximum number of characters allowed by the DNS naming convention?

255

Which subnet mask is an example of classless subnetting?

255.255.240.0

Which formula would you use to arrive at the number of hosts on a subnet?

2x - 2, where x represents the number of zeroes in the subnet mask

What was the original maximum data transfer rate of the first Ethernet developed by Xerox?

3 Mbps

LTE networks feature speeds of up to __________ download.

300 Mbps

How many binary digits are in an IPv4 address?

32

How long is a subnet mask?

32 bits

The Ethernet address __________ is used on Ethernet frames that encapsulate IPv6 multicast packets.

33-33-xx-xx-xx-xx

What is the approximate total bandwidth of an E3 line?

34 Mbps

One of the last GSM technologies, Enhanced Data rates for GSM Evolution (EDGE), offered data speeds up to __________.

384 Kbps

Which key sizes does WEP use?

40 bits and 104 bits

The nodes that connect in an IBSS randomly generate a __________ string of numbers that looks and functions just like a MAC address.

48-bit

Which TCP/IP ports does the Real-time Transport Protocol (RTP) use for VoIP systems?

5004 and 5005

Which TCP/IP ports does the Session Initiation Protocol (SIP) use for VoIP systems?

5060 and 5061

What is the low end speed of the SONET Optical Carrier specification (OC-1)?

51.8 Mbps

What UDP port do DNS servers primarily use?

53

What is the size of an ATM fixed-length cell?

53 bytes

What is the minimum size of an Ethernet frame?

64 bytes

How many layers does the OSI model contain?

7

LTE networks feature speeds of __________ upload.

75 Mbps

Which port do HTTP Web servers use?

80

If you're one of those folks who uses a lot of data on your smartphone, it's generally a good idea to use __________ when available to avoid cellular WAN data use charges

802.11

Which Wi-Fi standard offers speeds of up to 54 Mbps, a range of up to about 300 feet, operates in the 2.4 GHz frequency, and is backward-compatible with an earlier, popular Wi-Fi standard?

802.11g

Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies?

802.11n

What wavelength is used on 10GBaseSW fiber-optic cabling?

850 nm

What wavelength is used on a 10GBaseSR network?

850 nm

Almost all multimode fiber cables transmit __________ wavelengths.

850-nm

Which port does the Kerberos authentication protocol use?

88

Which connector is currently used in wired networks?

8P8C

What is the maximum length for UTP cables allowed by the TIA/EIA 568 cabling specification?

90 meters

Jumbo frames are usually __________ bytes long—though technically, anything over 1500 counts—and they reduce the total number of frames moving through the network.

9000

Which device is an example of a serious enterprise WAP?

A Cisco Aironet device

What are you trying to discover when you test a cable for continuity?

A broken wire

What happens when frames are transmitted on the network from two different devices at the same time, corrupting each other's signals?

A collision occurs.

Which item is part of a wall outlet?

A female jack

In the newer Bluetooth 4.0 version, what is required during the pairing process?

A four-digit personal identification number (PIN)

In order for a VLAN to get its name, what is typically appended to the word "VLAN"?

A number

What are the three essential ingredients for a successful implementation of a basic structured cabling network?

A telecommunications room, horizontal cabling, and a work area

What is the result of running "Add a VPN connection" in Settings in the Control Panel on the Windows client side of a PPTP VPN connection?

A virtual NIC is created.

All IPv6 addresses have a record type of __________.

AAAA

What type of conversion process occurs with power converters?

AC to DC

Which document is arguably the most famous of all security policies as this is one document that pretty much everyone who works for any organization is required to read, and in many cases sign, before they can start work?

Acceptable use policy

Which type of domain allows all of the domain controllers to be equal partners, such that any domain controller can take over if one domain controller fails?

Active Directory

Which NIC light turns on when the card detects network traffic and intermittently flickers when operating properly?

Activity light

Which industrial control system (ICS) device makes changes that modify a characteristic such as temperature?

Actuator

Which wireless network mode operates by allowing two or more devices to communicate directly without any other intermediary hardware?

Ad hoc

Almost all TCP/IP applications have moved to __________ for symmetric cryptography.

Advanced Encryption Standard (AES)

When in doubt about symmetric encryption algorithms which algorithm should you always select?

Advanced Encryption Standard (AES)

Which term refers to a program that monitors the types of Web sites you frequent and uses that information to generate targeted advertisements, usually pop-up windows?

Adware

Which term refers to physically separating your network from every other network?

Air gap

Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks?

Aircrack-ng

Which term refers to a cipher's underlying mathematical formula?

Algorithm

Which statement about subnet masks is true?

All machines on the same network have the same subnet mask

What is the function of the multicast address FF02::1?

All nodes address

Which statement is true of an IPv6 prefix?

An IPv6 prefix is a maximum of 64 bits.

Which type of algorithm is used when two different keys, one to encrypt and one to decrypt, are used in encryption?

Asymmetric-key

Which term is refers to any encryption that uses different keys for encryption and decryption?

Asymmetric-key encryption

Which term defines what an authenticated person can do with data?

Authorization

Which test should a network administrator run on a CSU/DSU to test a WAN connection and verify the T-carrier connection from end to end?

BERT

Which protocol is a path vector routing protocol?

BGP

Which deployment model requires tight controls and separation of employee personal data from corporate data?

BYOD

Which deployment model uses employees' existing mobile devices for use by the corporation?

BYOD

Which routing metric refers to the ability of a connection to handle more data than others?

Bandwidth

Which term is synonymous with traffic shaping?

Bandwidth shaping

What type of unit is formed by a single WAP servicing a given area?

Basic Service Set (BSS)

Which term defines the most basic infrastructure mode network - a BSS of one WAP and one or more wireless nodes?

Basic Service Set Identifier (BSSID)

Which term refers to a very notable exception to the safeness of Bluetooth that was discovered by a security company called Armis and published in late 2017.

BlueBorne

Which protocol is used on the Internet for communication between Autonomous Systems?

Border Gateway Protocol (BGP-4)

Which term refers to a software connection that passes traffic from the real NIC to a virtual one?

Bridge

Which method of sending a packet allows every computer on the LAN to hear the message?

Broadcast

Which first generation network topology used a single cable that connected all the computers in a line?

Bus

The specification for 100BaseTX (100BaseT) calls for UTP cabling using __________ or better rated cabling.

CAT 5

What is the minimum category rating of UTP cabling you would need for a network that runs at 1000 Mbps?

CAT 5e

Which category (CAT) of UTP cabling is the fastest?

CAT 6

Which category rating uses a bandwidth of 250 MHz to accommodate 10000 Mbps?

CAT 6

Which device provides termination at each end of a T1 connection?

CSU/DSU

Which tool helps a technician make unshielded twisted pair (UTP) cables?

Cable stripper

Which tool can be used to notify a technician of a continuity problem or if a wire map is not correct?

Cable tester

Which DNS server is used to talk to other DNS servers to resolve IP addresses for DNS clients?

Cache-only DNS server

What are the three dominant mobile network technologies?

Cellular WANs, 802.11, and Bluetooth

Which term refers to a standardized type of file that includes a public key with a digital signature, and the digital signature of a trusted third party?

Certificate

Which tool tests a cable to ensure that it can handle its rated amount of capacity?

Certifier

Which term describes a portion of the available spectrum available for Wi-Fi network communication?

Channel

Which term refers to the result of running cleartext through a cipher algorithm using a key?

Ciphertext

Which company is leading the cutting edge of the unified communication (UC) field?

Cisco

Which hypervisor serves as the foundation for massive cloud offerings by Amazon, IBM, and RackSpace?

Citrix XenServer

If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?

Class B

A particular multicast called an IGMP group is assigned an address in which class range?

Class D range

Which statement best describes a Class E address ID?

Class E is considered to be experimental.

Which task is performed by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers?

Classless Inter-Domain Routing (CIDR)

Which term is another word for plaintext?

Cleartext

Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield?

Coaxial

Which secondary location will generally take more than a few days to bring online?

Cold

Which organization is the biggest player in the certificate authority market?

Comodo

What is the primary use of coaxial cable in networking today?

Connecting a cable modem to an Internet Service Provider (ISP)

Which term refers to another name for a session?

Connection

Which industrial control system (ICS) device knows enough to manage a process?

Controller

Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack?

DDoS

Which term does CompTIA use in place of a relay agent?

DHCP relay

On the Windows client side of a PPTP VPN connection, where does a client get an IP address from after it creates a virtual NIC?

DHCP server

Each analog voice call gets converted into a __________ signal at the telephone company's central office before being multiplexed into larger circuits.

DS0

What is the most basic data chunk you get in the telephone world?

DS0

Which digital signaling rate has a frame containing a framing bit and 24 channels where each channel holds a single 8-bit DS0 data sample?

DS1

Which algorithm is the oldest of the TCP/IP symmetric-key algorithms?

Data Encryption Standard (DES)

What OSI model layer supports PPTP?

Data Link

Which layer of the OSI model adds source and destination MAC addresses to frames?

Data Link

Which layer of the OSI model is the only layer divided into two sublayers?

Data Link

Which unit is used to measure signal loss in networking?

Decibel (dB)

Using the ping command, which message is displayed if your computer has no route to the address listed?

Destination host unreachable

Within a Windows OS, which tool can you use to verify that Windows recognizes a NIC and is ready to use it?

Device Manager

Which 802.11 collision avoidance method is currently implemented?

Distributed Coordination Function (DCF)

A deauthentication (deauth) attack is a form of __________ attack.

DoS

Which type of NAT allows many computers to share a pool of routable IP addresses that number fewer than the computers?

Dynamic NAT

Which term refers to ports in the 49152 to 65535 range?

Dynamic port

What is another name for electronic discovery?

E-discovery

What is the European counterpart to a T1 line?

E1

Which hypervisor is considered to be the industry leader?

ESXi

How many pins does an RJ-45 connector have?

Eight

Within the Differentiated Services (DiffServ) architecture, how many classes of service (CoS) are there?

Eight

Which condition specifically applies to UTP cabling?

Electromagnetic interference

Which term means to scramble, mix up, or change data in such a way that bad guys cannot read it; however, the person receiving the data can descramble it.

Encryption

Which term refers to session information stored in RAM by a computer on one side of a session?

Endpoint

Which term describes the status of a port that is part of an active working endpoint pair?

Established port

Which technology was the final 3G data standard?

Evolved High-Speed Packet Access (HSPA+)

What type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?

Extended Service Set (ESS)

The protocol used by Autonomous Systems to communicate with each other is generically called a(n) __________.

Exterior Gateway Protocol (EGP)

What is the universal MAC address for broadcast?

FF-FF-FF-FF-FF-FF

Which of the following is a broadcast MAC address?

FF-FF-FF-FF-FF-FF

Which multicast reserved address is designed to reach solicited-node addresses?

FF02::1:FFXX:XXXX

Which multicast addresses will only reach routers?

FF02::2

Which term refers to the 100-Mbps standards, even though there are now newer versions of Ethernet available?

Fast Ethernet

What type of patch adds new functionality to a system?

Feature changes/updates

What general type of cabling is a technician most likely to use today when installing Ethernet cabling in areas with high electrical interference?

Fiber-optic

What kind of cabling did the 10BaseFL standard specify?

Fiber-optic

Which type of cable is uses a two-number designator consisting of core and cladding measurements?

Fiber-optic

Which type of cable works best for long-distance transmissions?

Fiber-optic

Which technology refers to an infrastructure that can be utilized to support a SAN?

Fibre Channel over Ethernet (FCoE)

Without the preamble, how many basic pieces of information does an Ethernet frame contain?

Five

On an authoritative DNS server, which storage areas hold the IP addresses and FQDNs for the computers in a domain?

Forward lookup zones

Which zone files are the most important part of any DNS server?

Forward lookup zones

What is the norm today for the number of pairs in UTP cabling?

Four

What characteristic does spread-spectrum transmission change for each user?

Frequency

Which technology is used by multiplexers to separate individual voice calls by keeping every call in its own unique frequency range?

Frequency division multiplexing (FDM)

What are the most common symptoms of malware on a compromised system?

General sluggishness and random crashes

What does the letter "G' stand for in the 2G, 3G and 4G technologies?

Generation

The snmpwalk utility tells the SNMP manager to perform a series of __________ commands.

Get

Which core function is sent when an SNMP manager wants to query an agent?

Get

Which technology introduced the handy subscriber identity module (SIM) card that is now ubiquitous in smartphones?

Global System for Mobile Communications (GSM)

What type of IPv6 address do you need to get on the Internet?

Global unicast address

Which protocol is the underlying protocol used by the World Wide Web?

HTTP

Which protocol uses TCP as its transport layer protocol?

HTTP

Which term describes a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length?

Hash

__________ problems manifest themselves as intermittent problems.

Heat and power

Which vendor was one of the earliest PaaS providers?

Heroku

What term best describes the way the DNS name space is organized?

Hierarchical

Which term refers to the passage of a packet through a router?

Hop

Which term describes the cabling that goes more or less horizontally from a work area to the telecommunications room?

Horizontal cabling run

In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)?

Host.domain.root

Which secondary location is a complete duplicate of the primary site?

Hot

What is the meaning of the term "capacitance"?

How long it takes a wire to get a full charge

Which hypervisor comes with Microsoft Server and Windows 10?

Hyper-V

Which organization has the authority to create new top-level domain names?

ICANN

Which protocol does the ping application use?

ICMP

Which protocol is best for simple, connectionless applications that never need more than a single packet?

ICMP

In a modern DCS, each of the local controllers connects (eventually) to a centralized controller—called the __________—where global changes can be managed.

ICS server

Which trunk standard enables you to connect switches from different manufacturers?

IEEE 802.1Q

Which standard includes secure authentication using a RADIUS server and password encryption using EAP?

IEEE 802.1X

Which standard pushed support for multimedia messaging system (MMS) (so you can send cat pictures in your text messages) and IP-based telephony?

IMT-2000

A managed switch needs a(n) __________ to enable configuration on Layer 3.

IP address

What unique numeric identifier is assigned to each device on the network by the IP protocol in the OSI model's Network layer?

IP address

Which tool does Cisco implement to enable DHCP relay?

IP helper

Which protocol suite does L2TP use for all of its security needs?

IPsec

Which statement describes an ISDN PRI?

ISDN PRI is a full T1 line, carrying 23 B channels.

Which standards organization is named for the Greek word for "equal"?

ISO

An incident is an event in which the integrity of a(n) __________ is compromised.

IT infrastructure

What statement describes the advantage of fault tolerance?

If one cable break, all of the other computers can still communicate.

What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?

Independent Basic Service Set (IBSS)

Which cloud service model is used by Amazon Web Services (AWS)?

Infrastructure as a Service (IaaS)

Which companies were involved in the 1979 introduction of the DIX Ethernet standard?

Intel and Digital Equipment Corporation (DEC)

Which column in a routing table tells the router which of its ports to use?

Interface

Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?

Interframe gap

The network or networks within an AS communicate with protocols as well; these are called generically __________.

Interior Gateway Protocol (IGP)

Before plugging in RJ 45 cables, what should you determine to save a lot of time and effort once the system installation starts?

Internal IP addressing scheme

Which organization assigns Autonomous System Numbers (ASNs)?

Internet Assigned Numbers Authority (IANA)

IANA has grown dramatically and now oversees five __________ that parcel out IP addresses to large ISPs and major corporations

Internet Corporations for Assigned Names and Numbers (ICANNs)

What is an advantage of fiber-optic cabling over Unshielded Twisted Pair (UTP)?

It has a longer maximum distance.

Which of the following statements best describes the preamble of an Ethernet frame?

It includes a 7-byte series of alternating ones and zeroes followed by a 1-byte Start Frame.

Which statement best describes the importance of virtualization?

It increases flexibility as the scale of an operation increases.

Which statement best describes Logical Link Control (LLC)?

It is a sublayer of the Data Link layer.

Which statement describes an IP address?

It is a unique dotted decimal number assigned to every network device.

What statement describes a function of a NIC?

It uses the CRC to verify the data within each frame.

How does the receiving station on a network use the CRC to verify that it received accurate data?

It uses the same divisor as the sending station to find the same remainder.

Which statement applies to a PCIe NIC?

It usually come in either one-lane (×1) or two-lane (×2) varieties.

Which hypervisor is closely integrated with Linux's kernel?

KVM

Which authentication protocol is used in a TCP/IP network where many clients all connect to a single authenticating server with no point-to-point involved?

Kerberos

Which proprietary Cisco protocol was combined with PPTP to create the Layer 2 Tunneling Protocol (L2TP)?

L2F

The "R" in the standard 10GBaseSR stands for which type of signaling?

LAN

What is the most common connector used in a 1000BaseSX network?

LC

Which layer of the OSI model is associated with moving data between computers?

Layer 1

The Internet Control Message Protocol (ICMP) works at __________ to deliver connectionless packets.

Layer 3

What OSI model layer supports content switches?

Layer 7

What does the acronym LED stand for?

Light Emitting Diode

Which term is another name for an optical power meter?

Light meter

Which term represents the condition of whether a wireless device is connected?

Link state

Which address does a computer running IPv6 gives itself when it first boots up?

Link-local

Which term refers to making a bunch of servers look like a single server, thereby creating a server cluster?

Load balancing

Which technology is marketed as and now generally accepted as a true 4G technology?

Long Term Evolution (LTE)

Which term describes a method that enables an administrator to limit access to a network based on the physical addresses of wireless NICs?

MAC address filtering

VLANs based on __________ are called dynamic VLANs, although they are never used these days.

MAC addresses

Which authentication method is the most common authentication method for dial-up connections?

MS-CHAPv2

Which routing metric determines the largest frame a particular technology can handle?

MTU

Which type of attack involves the attacker tapping into communications between two systems?

Man in the middle

What is the meaning of the "10" in 10BaseT?

Maximum speed of 10 Mbps

Which document defines the duties parties commit to perform for each other and a time frame for the commitment?

Memorandum of understanding (MOU)

Which tool is considered to be the go-to tool for vulnerability testing?

Metasploit

Which device converts an analog signal to digital and a digital signal to analog?

Modulator-demodulator

Which term refers to a technology that serves as a replacement for Frame Relay and ATM switching?

Multi-Protocol Label Switching (MPLS)

Which method of sending a packet allows a single computer to send a packet to a group of interested computers?

Multicast

Which address is a set of reserved addresses designed to go only to certain systems?

Multicast address

What type of fiber-optic cabling and connectors does a 100BaseFX network use?

Multimode with ST or SC connectors

Which device takes a circuit and combines it with a few hundred other circuits into a single complex circuit on one wire?

Multiplexer

Which of the following is true of the names in a flat name space?

Names must be unique.

Which protocol makes the IPv6 automation magic work?

Neighbor Discovery Protocol (NDP)

Which two tools dominate the vulnerability testing arena?

Nessus and OpenVAS

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches?

NetFlow

Which command is universally known as the "show me the endpoint" utility?

Netstat

At which layer of the OSI model do routers work?

Network

Routers function at which layer of the OSI model?

Network

To what layer of the OSI model does the TCP/IP model's Internet layer roughly correspond?

Network

Which layer of the OSI model assembles the data it receives into pieces called packets?

Network

Which layer of the OSI model uses routers and IP addresses to ensure that packets arrive at the correct system?

Network

__________ defines a newer series of protection applications that combine the features of what traditionally was done by separate applications.

Network access control (NAC)

__________ is a type of dedicated file server used in many networks.

Network attached storage (NAS)

Which term describes a practical application of a topology and other critical technologies that provides a method to get data from one computer to another on a network?

Network technology

Which tool is a port scanner?

Nmap

Which spread-spectrum broadcasting method is the latest method?

OFDM

Which tool can be used to notify a technician where a cable break is occurring on a fiber cable?

OTDR

What is the only important measure of coax cabling?

Ohm rating

Which term refers to a relative measure of the resistance (or more precisely, characteristic impedance) on a cable?

Ohm rating

What network component is built into most motherboards today?

Onboard NIC

Which term describes the status for a socket that is prepared to respond to any IP packets destined for that socket's port number?

Open port

If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?

Optical time domain reflectometer (OTDR)

When a collision occurs on a network relying on the CSMA/CD access method, what alerts the network interface cards (NICs)?

Overlapping signals

Most PCs today have two types of expansion slots: PCI and __________.

PCIe

Which tools are tunneling protocols?

PPTP and L2TP

Which phone line has a baud rate of 2,400 and uses an RJ-11 connector?

PSTN

Which connection type is limited to point-to-point topology and uses a 25-pin female DB type?

Parallel

In the DNS naming convention, what character(s) separate(s) a domain name from its subdomains?

Period (.)

What type of agent is composed of modules that perform a thorough inventory of each security-oriented element in the computer?

Persistent agent

Which type of attack is a form of social engineering?

Phishing

Which layer of the OSI model defines a method of moving radio waves?

Physical

Which pins on an RJ-45 connector are used to receive data?

Pins 3 and 6

Which cloud service provider gives programmers all the tools they need to deploy, administer, and maintain a Web application?

Platform as a Service

What is another name for dynamic NAT? Destination port

Pooled NAT

Which form of NAT typically handles the one-to-many connections?

Port Address Translation (PAT)

Your company has a single server on a private LAN that it wants to make accessible from the Internet. Which of the following would give the server the protection of NAT, while allowing access to that server from the Internet?

Port forwarding

Which advantage of virtualization provides substantial reduction in dollars spent and electricity used?

Power savings

Which device is an example of a peripheral device?

Printer

Which term defines a number used by the operating system to track all the running programs?

Process ID (PID)

Which utility is categorized in the CompTIA Network+ exam as a hardware tool?

Protocol analyzer

Which tool can be used to access a Cisco router remotely from a Windows system?

PuTTY

Which tool puts UTP wires into 66- and 110-blocks?

Punchdown tool

Which standard offers authentication, authorization, and accounting?

RADIUS

Which term describes a technology that spreads data across multiple drives?

RAID

Which term refers to the most common limiting factor in a host's ability to run virtual machine?

RAM

Which vector routing protocol is the oldest?

RIP

Which routing protocol does not support Variable-Length Subnet Masking (VLSM)?

RIPv1

What protocol was adopted in 1994, and is now considered obsolete except for small, private WANs?

RIPv2

Which protocol is a distance vector routing protocol?

RIPv2

Which entity passes out IPv6 prefixes?

RIRs

What type of connector is used by all UTP Ethernet NICs?

RJ-45

Which type of port has a number in the 1024 to 49151 range?

Registered port

Which statement is an accurate comparison between repeaters and bridges?

Repeaters retransmit all packets, while bridges filter and forward traffic based on the MAC addresses of the computers on the network.

Which core function is sent by the agent after the SNMP manager queries an agent with a GetRequest or GetNextRequest?

Response

What enables a system to determine an FQDN by knowing the IP address?

Reverse lookup zones

Which term refers to the administrative account native to Linux?

Root

Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools?

Rootkit

What device splits a large network into subnets?

Router

Which statement describes a capability of routers?

Routers allow network connections across data lines that do not use Ethernet.

Which terms refer to versions of DSL service?

SDSL and ADSL

Unified communication leans heavily on ___________ for transmission.

SIP and RTP

Microsoft has used DNS names with the __________ protocol to provide folder and printer sharing in small TCP/IP networks.

SMB

Which underlying protocol enables network monitoring tools to work?

SNMP

Which record type defines the primary name server in charge of the forward lookup zone?

SOA

Which very high-speed fiber network was already in place and being used for wide area networking (WAN) transmissions, before the IEEE developed the 10 GbE Ethernet standards?

SONET

The "W" in the standard 10GBaseSW stands for which type of signaling?

SONET/WAN

A wireless hotspot is a feature that enables a device to share its cellular WAN connection by setting up a(n) __________ via its own 802.11 wireless.

SSID

What are the two most common types of SSL VPNs?

SSL portal VPNs and SSL tunnel VPNs

In which type of VPN does the client browser run an active control, such as Java?

SSL tunnel

Which zone is created on other DNS servers to act as backups to the primary zone?

Secondary

Which cryptographic hash comes in several versions?

Secure Hash Algorithm (SHA)

Which written document defines how an organization will protect its IT infrastructure?

Security policy

Who is responsible for the process of determining critical assets?

Senior management

Which industrial control system (ICS) device monitors characteristics like temperature?

Sensor

What cabling predates both networking and the personal computer?

Serial

When you install an ISDN terminal adapter (TA), what special number provided by the telephone company must be configured along with the other ISDN telephone number you want to call?

Service Profile ID (SPID)

Which term did Wi-Fi people create to use as another level of naming to describe a standard name applied to the BSS or IBSS to help the connection happen?

Service Set Identifier (SSID)

An NMS can tell an agent to make changes to the information it queries and sends, called variables, through a __________ protocol data unit (PDU).

Set

Which term represents a measurement of how well a wireless device is connecting to other devices?

Signal strength

What type of fiber-optic cable is used in a 1000BaseLX network?

Single-mode fiber

What type of fiber-optic cable uses lasers to send signals?

Single-mode fiber (SMF)

Which switch and network equipment modular transceivers have replaced gigabit interface converters (GBICs) as the modular connector of choice?

Small form-factor pluggable (SFP)

How do many small networks avoid using a full-blown file server?

Small networks take advantage of network attached storage (NAS).

Which term refers to a technology that is great for doing risky (or even not-so-risky) maintenance with a safety net?

Snapshot

Which characters are not permitted in a DNS domain or host name?

Spaces

__________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range.

Spread-spectrum

Which term refers to a function of any program that sends information about your system or your actions over the Internet?

Spyware

Which first generation network topology provided fault tolerance?

Star

A DHCPv6 server is operating very similarly to an IPv4 DHCP server by passing out complete IPv6 information: addresses and default gateways, as well as items like DNS server addresses. In which mode is this server?

Stateful

A(n) __________ DHCPv6 server relies on router advertisements to give some information to individual hosts, making small changes to what the router advertisements would normally show, such as the address of the DNS server.

Stateless

Which document defines the services and products the vendor agrees to supply and the time frames in which to supply them?

Statement of work (SOW)

__________ maps a single routable (that is, not private) IP address to a single machine, enabling you to access that machine from outside the network.

Static NAT

Which characteristic applies to stranded core cabling?

Stranded core wire is actually a bundle of tiny wire strands.

What is the cornerstone of subnetting?

Subnet mask

Which protocol is by far the most common type of session on a typical TCP/IP network?

TCP

Which protocol is connection-oriented?

TCP

What is the de facto protocol suite of the Internet?

TCP/IP

What network protocol do Apple systems use today?

TCP/IP

Which tool can be used to notify a technician where a cable break is occurring on a copper cable?

TDR

What series of standards does the U.S National Security Agency (NSA) define to block RF emanation?

TEMPEST

What file transfer protocol uses UDP port 69?

TFTP

Which protocol is popular for moving files between computers on the same LAN, where the chances of losing packets are very small?

TFTP

The __________ standard covers proper labeling and documentation of cabling, patch panels, and wall outlets

TIA/EIA 606

Who is often a supporter of first responders to a security incident and should follow good forensic practices?

Technician

What distance can a signal travel on a fiber-optic cable?

Tens of kilometers

Which standard offers authentication, authorization, and accounting?

Terminal Access Control Access Control System Plus (TACACS+)

What information is kept in the cached lookups folder for a DNS server?

The IP addresses already resolved

What information is included in the data portion of an Ethernet frame on an IP network?

The IP addresses of both systems

Which two parts are included in a MAC address?

The Organizationally Unique Identifier and the device ID of the NIC

How are incoming frames handled by a switch?

The frames are sent only to the interface associated with the destination MAC address.

UTP category ratings are based on what criteria?

The highest frequency the cable can handle

Which item is part of a fully qualified domain name (FQDN)?

The host name

What is a shared attribute of all members of the Ethernet family of networking technologies?

The network access method

What item do most professional cable installers use to quote the price for an installation?

The number of drops

Where does the CRC originate in a network frame?

The sending NIC attaches it.

In a specification such as 10BaseT, what does the word "base" identify?

The signal type

Which statement describes a weakness in WEP that allows it to be easily cracked?

The size of the encryption key

Which statement is true about DNS root servers?

They delegate name resolution to other DNS servers.

Which statement is true regarding standard equipment racks?

They provide safe, stable platforms for all the different hardware components.

Which term refers to any form of potential attack against your network?

Threat

Which tool is falls into the category of a third-party software tool?

Throughput tester

What is the purpose of a crimper?

To connect a RJ-45 connector to the cable

What is another name for a timestamped service ticket?

Token

Which tool has only one job: to help a technician locate a particular cable?

Tone generator

Which three states can be applied to switches using VLAN Trunking Protocol (VTP)?

Transparent, server, and client

An agent can solicit information from an NMS with the __________ protocol data unit (PDU).

Trap

Which type of malware looks or pretends to do one thing while, at the same time, doing something evil?

Trojan

Which term describes a port on a switch that is configured to carry all traffic, regardless of VLAN number, between all switches in a LAN?

Trunk port

What is the only way to ensure Bluetooth security in a high-security environment?

Turn it off

How many pairs of wires in a cable did a 10BaseT device actually use?

Two

How many copper wires are used by a T1 line?

Two pairs

Which type of hypervisor relies on an underlying operating system?

Type-2

Which device takes 8-bit-wide digital data, converts it into 1-bit-wide digital data, and then hands it to a modem for conversion to analog?

UART

Which Transport layer protocol does Trivial File Transfer Protocol (TFTP) use?

UDP

Which protocol do Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) use?

UDP

What type of address is a link-local address?

Unicast

Which method of sending a packet allows one computer to send a message directly to another user?

Unicast

Which type of cabling does the 10BaseT standard specify?

Unshielded Twisted Pair (UTP)

Which cable type suffers from electromagnetic interference (EMI)?

Unshielded twisted pair (UTP)

What is the current modem standard now on the market?

V.92

Which process allows you to assign ports to VLANs after you create the VLANs?

VLAN assignment

Which program is an example of bare-metal virtualization software?

VMware ESXi

Which tool is an example of a Type 1 hypervisor?

VMware ESXi

What hardware component was the first type of popular virtual machine seen in the PC world?

Virtual desktop

Which type of network enables you to segment a physical network into multiple discreet networks without adding additional hardware?

Virtual local area network (VLAN)

Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?

Virtual private network (VPN)

Which term refers to taking the hardware of the host system and segmenting it into individual virtual machines?

Virtualization

Which secondary location lacks current data and may not have functioning Internet/network links?

Warm

What function uses port 80?

Web server

What name is given to the port numbers in the range of 0 to 1023?

Well-known port numbers

Which individual will examine an infrastructure to find existing vulnerabilities and, instead of hurting the infrastructure, report findings so that an administrator can further harden the network?

White hat hacker

Which data encryption standard is outdated and should never be used?

Wired Equivalent Privacy (WEP)

Which program is an example of a powerful and free protocol analyzer?

Wireshark

Which type of malware replicates exclusively through networks?

Worm

Which term refers to the first generation of packet-switching technology?

X.25

Which term refers to a single computer under the control of an operator?

Zombie

In comparing the DNS name space to a computer's file system, a domain is like __________.

a folder

Community clouds are run by __________.

a group of organizations with similar goals or needs

A port will drop a packet for one of two reasons: __________.

an error or a discard

In IPv6, __________ is commonly used with DNS.

anycast

One of the benefits of using a SAN is that, by just reading and writing at the block level, it __________.

avoids the performance costs of implementing its own file system

A first responder's main way to secure an area is __________.

being physically present at the scene

Fingerprint readers, facial recognition cameras, voice analyzers, retinal blood vessel scanners or other more exotic characteristics are all examples of __________.

biometric devices

Most switches enable you to use multiple NICs for a single machine, a process called __________ or link aggregation.

bonding

Which filtering term does Wireshark use when creating a file that only shows DHCP packets?

bootp

Pretty much any attempt to guess the contents of some kind of data field that isn't obvious (or is hidden) is considered a(n) __________ attack.

brute force

If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.

business continuity

A packet sniffer is a program that queries a network interface and collects packets in a file called a __________ file.

capture

What entry is made at the command prompt in UNIX/Linux to display DNS server information?

cat /etc/resolv.conf

Time-division multiple access (TDMA) enabled multiple users to share the same __________ more or less at the same time.

channel

IP cameras and __________ are specific implementations of video monitoring.

closed-circuit televisions

Both near-end crosstalk (NEXT) and far-end crosstalk (FEXT) are measured in __________.

decibels

On a TCP/IP network, a router determines where an incoming packet should go by looking at the packet's __________.

destination IP addresses

When talking about QoS for medianets, an administrator needs to develop the concept of __________.

differentiated Services (DiffServ)

Which command, while not available on Windows, can be used on macOS/UNIX/Linux systems to diagnose DNS problems?

dig

If an incident can no longer be contained, causing significant damage or danger to the immediate infrastructure, it is covered under __________.

disaster recovery

If an incident is so vast that the incident response team cannot stop, contain, or remediate it, __________ comes into play.

disaster recovery

A __________ is when a port intentionally drops a well-formed frame.

discard

Bluetooth devices are not visible unless they are manually set to __________ mode.

discoverable

The vast majority of network rollouts in offices use a base of 1000BaseT connections, or __________, as you'll hear them called.

drops

In response to the demand for two-pair cabling, manufacturers often connect two fibers together to create __________ fiber-optic cabling.

duplex

An SNMP system has up to __________ core functions (depending on the version of SNMP).

eight

An oscilloscope is a powerful tool that enables a technician to see __________.

electrical pulses

A Web client's source port number, generated pseudo-randomly by the Web client computer, is classically assigned as a(n) __________.

ephemeral port number

A __________ cable that uses LEDs is known as multimode fiber (MMF).

fiber-optic

A Class C network block uses the __________ octets to define only the network ID.

first three

The older __________ connector left a little gap between the connection points due to imperfections in the glass.

flat-surface connector

In NetFlow, single flows are stored in a __________.

flow cache

All NICs on the same network must use the same __________, or they will not be able to communicate with other NICs.

frame type

A __________ VPN deals with a specific single connection between two machines using VPN software or hardware.

host-to-host

A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member of that network, is commonly called a(n) __________ connection.

host-to-site

The first and last bastion of defense for an entire infrastructure's security is at the individual __________.

hosts

Both Z-Wave and Zigbee use a mesh networking topology to facilitate communication in homes, yet both also have __________ that act as the network interconnect.

hubs

A supervisory control and data acquisition (SCADA) system is a subset of the __________.

industrial control system (ICS)

Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.

integrity

If you want to know how hard your network is working, use a(n) __________.

interface monitor

A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating __________.

interference

Which Linux command can be used to view IP settings?

ip

Which command can be used on a Windows computer to view the IP settings?

ipconfig

ARP poisoning is a common method for __________ attacks.

man in the middle

The SNMP manager requests and processes information from the __________ devices.

managed

Cat ratings are officially rated in __________, indicating the highest frequency the cable can handle.

megahertz (MHz)

In the case of a switch, it is typical for packet sniffers to connect to an interface using a __________ port.

mirrored

Which command is a dynamic (keeps running) equivalent to traceroute?

mtr

The VLAN designation for a trunk port is its __________VLAN.

native

When an IPv6 computer joins a network, it sends out multicast __________ packets searching for other computers on its broadcast domain.

neighbor solicitation

Software defined networking (SDN) cuts the control plane of individual devices out of the picture and lets an all-knowing program called a __________ controller dictate how both physical and virtual network components move traffic through the network.

network

The __________ defines who may access the network, how they may access the network, and what they can access.

network access policy

Which command would a technician use to diagnose DNS problems on a Windows computer?

nslookup

One of the first techniques that malicious users try is to probe hosts to identify any __________ ports.

open

The __________ watches some kind of monitor—the interface—and intervenes if necessary.

operator

A protocol analyzer tool is often referred to as a __________ analyzer.

packet

In NetFlow, a single flow is a flow of __________ from one specific place to another.

packets

NFC tags are __________.

passive

Microsoft has a utility called __________ that combines the functions of ping and tracert and adds some additional functions.

pathping

Virtual servers and virtual network components can be created in the cloud using Infrastructure as a Service (IaaS) providers, often at rates measured in __________ per hour.

pennies

Every Fully Qualified Domain Name (FQDN) will always have a(n) __________ on the end to signify the root.

period (.)

When a router has more than one route to the same network, the responsibility for assigning a different metric for each route lies with the __________.

person in charge of that router

Connected Bluetooth devices create a __________.

personal area network (PAN)

A MAC address is also known as a(n) __________ address.

physical

Which utility uses Internet Message Control Protocol (ICMP) packets to query by IP or by name?

ping

Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can be made between two computers?

ping and traceroute

Many years ago, the ping command had a bug that allowed malicious users to send malformed ping packets to a destination causing the __________ issue.

ping of death

Interface monitors track the quantity and utilization of traffic through a physical __________ or ports on a single device.

port

Cisco uses what it calls __________ as one of its tools to implement network admission control.

posture assessment

Packet sniffers need to capture all the packets they can so it is typical for them to connect to an interface in __________ mode.

promiscuous

Which type of backups are really just redundant servers?

real-time

Installing backup power in case of electrical failure is a form of __________.

redundancy

If you ping a device and no echo reply comes back before the default time, ping will respond with a __________ message.

request timed out

Training users to recognize social-engineering tactics assists in __________.

risk management

Which utility enables you to display and edit the local system's routing table?

route

Instead of NAT and private network IDs, IPv6 relies on __________.

router advertisements

A __________only comes into play if a computer hasn't heard from the router recently and demands a router advertisement.

router solicitation

The secret to dealing with failures is to avoid a __________.

single point of failure

Managed devices run specialized __________ called agents.

software

Code-division multiple access (CDMA) came out not long after GSM, and used a __________form of transmission.

spread-spectrum

Which command used in Linux is faster and more powerful than netstat?

ss

The NIC and the attached __________ determine full- or half-duplex during the auto-negotiation process.

switch

A __________ is an example of something to monitor.

temperature

In a Basic Service Set Identifier (BSSID) infrastructure mode network, the BSSID is the same as __________ for the WAP.

the MAC address

Which software tool is built into operating systems?

traceroute

Which utility can be used to diagnose where a problem lies when you have problems reaching a remote system?

traceroute

Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

unique

Which tool is used to create, configure, and maintain virtual machines on the host from the comfort of a client computer running the tool?

vSphere Client

The technology behind bridging NICs is a __________, which is just software that does the same Layer 2 switching a hardware switch does, including features like VLANs.

virtual switch

The different colors of the laser signals feature different __________.

wavelengths

When testing for continuity using a multimeter set it to Ohms; if you have a connection you will see a(n) __________ reading.

zero Ohms


Ensembles d'études connexes

Pathophysiology Exam 3 cardiac EAQ questions

View Set

Exam Prep: Title, Closing and Appraisal

View Set

Chapter 8 Developing and Maintaining relationships

View Set

Marketing Final Revision (MKTG11-100)

View Set

ATI Care of the patient w/ Cancer

View Set

Artificial Intelligence Final Exam

View Set