Network+ (6th ed) Final Exam Practice

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which term is used for connecting multiple pieces of equipment, such as servers, in such a manner that they appear to the user and the network as one logical device, providing data and services to the organization? balancing branching parsing clustering

clustering Clustering refers to the practice of connecting multiple pieces of equipment, such as servers, in a way that they appear as a single logical unit to the user and network. This setup provides redundancy, load balancing, and improved availability, allowing the system to offer data and services seamlessly even if one server fails.

Which term is used for a networked group of servers in a dedicated space—a building or part of a building—that provides data storage, Web hosting, application hosting, cloud services, and more for remote client organizations? site-to-site VPN data center hypervisor virtual switch

data center A data center is a physical facility used to house networked groups of servers that provide various services such as data storage, web hosting, application hosting, and cloud services for remote clients. Data centers are designed to ensure high availability, security, and scalability for these services.

The physical location where connections come in from the outside world is known as the ____________________. telecommunications room (TCR) customer premises equipment (CPE) demarcation point (demarc) power distribution unit (PDU)

demarcation point (demarc) The demarcation point (demarc) is the physical location where the service provider's network ends and the customer's network begins. It is the point where connections from the outside world (such as internet or telephone lines) enter a building.

What type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points? basic service set (BSS) basic service set identifier (BSSID) independent basic service set (IBSS) extended service set (ESS)

extended service set (ESS) An Extended Service Set (ESS) is formed by a single wireless access point (WAP) that services a given area, which is then extended by adding more access points to cover a larger area. All the access points in an ESS are interconnected, allowing devices to roam seamlessly between them.

What is an advantage of fiber-optic cabling? signals travel more slowly easier and cheaper to install than UTP greater maximum distance susceptible to electrical interference

greater maximum distance Fiber-optic cabling offers a greater maximum distance for signal transmission compared to copper-based cables like UTP (Unshielded Twisted Pair) because light signals can travel much farther without degradation. This makes fiber-optic cables ideal for long-distance communication.

In the DNS naming convention, what is the correct sequence for writing a fully qualified domain name (FQDN)? Group of answer choices root.domain.host host.domain.root domain.host.root domain.root.host

host.domain.root In the DNS naming convention, a Fully Qualified Domain Name (FQDN) is written starting from the host (the specific machine or service) and moving up to the domain and then to the root. The general structure is: hostname.domain.tld (Top-Level Domain) For example: www.example.com

Which secondary location is a complete duplicate of the primary site? cold hot local physical

hot A hot site is a secondary location that is a complete duplicate of the primary site, including hardware, software, and data. It is fully operational and ready to take over operations almost immediately in the event of a disaster or failure at the primary site.

Virtualization enables one machine called the __________ to run multiple operating systems simultaneously. host hypervisor workstation server

hypervisor A hypervisor is the software layer that allows a host machine to run multiple virtual machines (VMs) simultaneously, each with its own operating system.

Which cloud service model is provided by Amazon Web Services (AWS)? platform as a service (PaaS) software as a service (SaaS) infrastructure as a service (IaaS) software-defined networking (SDN)

infrastructure as a service (IaaS) Amazon Web Services (AWS) primarily provides Infrastructure as a Service (IaaS). With IaaS, AWS offers scalable computing resources such as virtual machines, storage, and networking, which customers can use to build and manage their own infrastructure without having to own physical hardware.

Which service is considered to be the bottom of the service-layer cake? infrastructure as a service (IaaS) platform as a service (PaaS) software as a service (SaaS) desktop as a service (DaaS)

infrastructure as a service (IaaS) The cloud computing service model is often visualized as a service-layer cake, where different layers build upon one another:

Which term is used for the ability to support multiple customers on the same infrastructure at the same time? multitenancy logging intrusion overutilization

multitenancy Multitenancy refers to the ability of a single infrastructure or software application to support multiple customers (tenants) simultaneously, with each tenant's data and processes kept isolated from the others. This is a common concept in cloud computing, where the same physical resources are shared by different users or organizations.

A cable might experience crosstalk, where the electrical signal bleeds from one wire pair to another, creating __________. interference voltage spikes noise impedance

noise Crosstalk occurs when the electrical signal from one wire pair bleeds into another, causing noise in the communication. This can interfere with the proper transmission of data by creating unwanted signals that disrupt the clarity of the original transmission.

Which type of traffic involves data moving into and out of the data center? south-west north-east east-west north-south

north-south - North-South traffic refers to data moving into and out of the data center, typically between internal resources and external networks such as the internet or other remote locations. - This type of traffic often includes user requests, web traffic, and interactions with external clients or cloud services.

Which command would a technician use to diagnose DNS problems on a Windows computer? nslookup ipconfig ping dig

nslookup The nslookup command is used to query DNS servers and diagnose DNS-related problems on a Windows computer.

Which term is used for a dedicated data center at a company site? virtual desktop infrastructure private direct connection on-premises data center branch office

on-premises data center An on-premises data center refers to a dedicated data center located at a company's own site, where they manage and house their servers, storage, and networking equipment. It is physically located within the organization's premises.

Which tool can be used to identify the location of a cable break in a fiber cable? cable tester certifier time domain reflectometer optical time domain reflectometer

optical time domain reflectometer An OTDR (Optical Time Domain Reflectometer) is used to test and analyze fiber optic cables. It can detect faults, measure cable length, and pinpoint the location of breaks or splices by sending a light pulse through the fiber and measuring the reflections.

One of the great benefits of cloud computing is that if you need a teeny-tiny server that does almost no work, you can pay for a likewise teeny-tiny fraction of the resources of a huge server for a few __________ per day. Group of answer choices seconds cycles pennies dollars

pennies One of the biggest advantages of cloud computing is its pay-as-you-go pricing model. Cloud providers like AWS, Azure, and Google Cloud allow users to pay only for the resources they consume. If you need minimal computing power, you can often pay just pennies per day instead of renting an entire physical server. This makes cloud computing cost-efficient and scalable for businesses and individuals alike.

Which written document defines how an organization will protect its IT infrastructure? memorandum of understanding (MOU) service-level agreement (SLA) statement of work (SOW) security policy

security policy A security policy is a written document that outlines how an organization will protect its IT infrastructure, data, and systems. It defines security measures, access controls, best practices, and guidelines for handling potential threats.

Which service is considered to be at the top of the service-layer cake? desktop as a service (DaaS) platform as a service (PaaS) software as a service (SaaS) infrastructure as a service (IaaS)

software as a service (SaaS) The service-layer model of cloud computing is often visualized as a "stack" or "cake," with different layers representing different levels of abstraction: 1. Infrastructure as a Service (IaaS) - The foundational layer, providing virtualized computing resources like servers, storage, and networking. 2. Platform as a Service (PaaS) - Built on IaaS, providing a platform for developers to create, test, and deploy applications. 3. Software as a Service (SaaS) - The topmost layer, delivering fully functional software applications over the internet to end users. Since SaaS provides complete applications that users interact with directly (e.g., Google Workspace, Microsoft 365), it is considered to be at the top of the service-layer cake.

Which is a network that connects individual systems to a centralized bank of mass storage? virtualized network software-defined network private direct network storage area network

storage area network A Storage Area Network (SAN) is a high-speed, specialized network that connects multiple computers or servers to a centralized bank of mass storage devices. It allows systems to access storage as if it were a directly attached drive, providing high performance, scalability, and reliability for enterprise environments.

Which of the channels defined by the 802.11 standard may be used by a WAP using the 2.4-GHz band in the United States? 1 through 11 2 through 32 8 through 24 16 through 32

1 through 11 In the United States, Wi-Fi networks operating in the 2.4 GHz band are allowed to use channels 1 through 11, according to the 802.11 standard. These channels are spaced 5 MHz apart, with some overlap, and are commonly used for Wi-Fi communication.

What User Datagram Protocol (UDP) ports does SNMP use for unsecure communication? 61 and 62 610 and 612 161 and 162 10162 and 10161

161 and 162 - UDP port 161 is used for general SNMP messages (queries from the manager to the agent). - UDP port 162 is used for SNMP trap messages (asynchronous alerts from the agent to the manager).

Which TC3P ports does the Session Initiation Protocol (SIP) use for VoIP systems? 2427 and 2727 5004 and 5005 5030 and 5031 5060 and 5061

5060 and 5061 - SIP (Session Initiation Protocol) is used in VoIP (Voice over IP) systems for call setup, control, and termination. - It operates over TCP and UDP using the following ports: *5060: Used for unencrypted SIP signaling. *5061: Used for encrypted SIP signaling with TLS (Transport Layer Security).

Which Wi-Fi standard offers speeds of up to 100 Mbps (or higher), offers a range of up to about 300 feet, and operates in the 2.4-GHz and 5.0-GHz frequencies? 802.11g 802.11n 802.11b 802.11a

802.11n The 802.11n Wi-Fi standard offers speeds of up to 100 Mbps (or higher), provides a range of up to about 300 feet, and operates in both the 2.4 GHz and 5.0 GHz frequencies. It was a significant improvement over previous standards, offering better performance, range, and reliability.

Which tool is an open-source tool for penetration testing pretty much every aspect of wireless networks? Aircrack-ng Armitage Kali Linux OpenVAS

Aircrack-ng Aircrack-ng is an open-source toolset used for penetration testing and security auditing of wireless networks. It focuses on monitoring, attacking, testing, and cracking Wi-Fi security protocols like WEP, WPA, and WPA2.

Which term refers to a software connection that passes traffic from the real NIC to a virtual one? bridge NAT route switch

Bridge A bridge is a software connection that passes traffic from a physical network interface card (NIC) to a virtual NIC. It is often used in virtualization environments to allow communication between virtual machines (VMs) and the physical network or to connect different network segments.

Which type of attack uses hundreds, thousands, or even millions of computers under the control of a single operator to launch a coordinated attack? DDoS smurf attack phishing DHCP snooping

DDoS (Distributed Denial of Service) A DDoS attack involves using hundreds, thousands, or even millions of compromised computers (often called a botnet) under the control of a single attacker to launch a coordinated attack. The goal is to overwhelm a target's resources (such as a website or server), making it unavailable to legitimate users.

Which term refers to the 100-Mbps standards, even though there are now much faster versions of Ethernet available? Fast Ethernet Gigabit Ethernet full-duplex Ethernet switched Ethernet

Fast Ethernet Fast Ethernet refers to the 100-Mbps Ethernet standard, even though faster versions like Gigabit Ethernet (1 Gbps) and others are now more common. Fast Ethernet was a significant upgrade from the earlier 10-Mbps Ethernet (10Base-T) standard.

Which infrastructure, for the most part, is its own ecosystem designed for high-performance storage? Fibre Channel (FC) Internet Small Computer System Interface (iSCSI) Hot Standby Router (HSR) Gateway Load Balancer (GKB)

Fibre Channel (FC) Fibre Channel (FC) is a high-speed storage networking technology that is primarily used in Storage Area Networks (SANs). It is designed for high-performance storage and operates as its own dedicated ecosystem, separate from traditional Ethernet-based networks.

Which vendor was one of the earliest PaaS providers? Amazon VMware Microsoft Heroku

Heroku Heroku was one of the earliest Platform as a Service (PaaS) providers. It was founded in 2007 and initially focused on Ruby on Rails applications before expanding to support multiple programming languages. Heroku provided developers with an easy way to deploy, manage, and scale applications without worrying about underlying infrastructure.

Which task is the first step in the troubleshooting process? Establish a theory of probable cause. Implement and test the solution. Identify the problem. Test the theory to determine cause.

Identify the problem. Before forming any theories or implementing solutions, you need to gather information, observe symptoms, and determine what the actual issue is.

What type of unit is formed by two or more wireless nodes communicating in ad hoc mode? basic service set (BSS) basic service set identifier (BSSID) independent basic service set (IBSS) extended service set (ESS)

Independent Basic Service Set (IBSS) An Independent Basic Service Set (IBSS) is a type of wireless network where two or more wireless nodes (such as laptops or smartphones) communicate directly with each other in ad hoc mode, without needing an access point.

Which term is used to represent the manufacturer's best guess (based on historical data) regarding how much time will pass between major failures of a component? mean time to vulnerability mean time to failure mean time between failures mean time to repair

Mean Time Between Failures (MTBF) - MTBF (Mean Time Between Failures) represents the manufacturer's estimate of the average time that a system or component will operate before experiencing a failure. - It is based on historical data and is commonly used in reliability engineering to predict performance and maintenance needs.

Which company is leading the cutting edge of the unified communication (UC) field? Oracle Adobe Microsoft Cisco

Microsoft - Microsoft is a leader in Unified Communications (UC) with its Microsoft Teams platform, which integrates messaging, voice, video conferencing, and collaboration tools. - Microsoft Teams has become a dominant UC solution, especially in enterprise environments, due to its deep integration with Microsoft 365 (Office 365) services.

Which component houses network engineers and technicians who maintain the applications housed in the data center, such as databases, Web servers, and so forth? main distribution frame (MDF) power distribution unit (PDU) intermediate distribution frame (IDF) network operations center (NOC)

Network Operations Center (NOC) The Network Operations Center (NOC) is where network engineers and technicians monitor and maintain data center applications, including databases, web servers, and network infrastructure.

Which technology combines automated processes into bigger, multifaceted processes called pipelines or workflows? orchestration parsing virtualization kerning

Orchestration Orchestration refers to the technology that combines automated processes into larger, more complex processes called pipelines or workflows. It coordinates and manages various tasks to streamline operations, such as in IT automation, DevOps, and cloud environments.

Which type of malware takes advantage of very low-level operating system functions to hide itself from all but the most aggressive of anti-malware tools? Group of answer choices rootkit worm macro Trojan horse

Rootkit A rootkit is a type of malware that operates at a very low level of the operating system, often within the kernel, to hide its presence from standard anti-malware tools. Rootkits can modify system processes, manipulate logs, and even disable security software, making them difficult to detect and remove.

Unified communication leans heavily on ___________ protocols for transmission. UDP and TCP SIP and RTP STP and RIP RIP and OSPF

SIP and RTP Unified Communication (UC) systems rely heavily on SIP (Session Initiation Protocol) and RTP (Real-time Transport Protocol) for transmission.

Which underlying protocol enables network monitoring tools to work? Group of answer choices TCP SNMP UDP SMTP

SNMP (Simple Network Management Protocol) SNMP is the underlying protocol that enables network monitoring tools to collect information about network devices such as routers, switches, and servers. It allows for monitoring device status, performance, and health, and can send alerts when there are issues.

In which type of VPN does the client Web browser run an active control, such as Java? site-to-site tunnel VPNs proxy server SSL portal

SSL portal

An NMS can tell an agent to make changes to the information it queries and sends, called variables, through a __________ protocol data unit (PDU). Set Get Response Trap

Set In the context of SNMP (Simple Network Management Protocol), an NMS (Network Management System) can instruct an agent to modify or set the values of variables it manages. This action is done through a Set PDU (Protocol Data Unit).

Which type of hypervisor is installed on top of the operating system? Type 1 Type 2 Type 3 Type 4

Type 2 A Type 2 hypervisor (also known as a hosted hypervisor) is installed on top of an existing operating system. It relies on the host OS for resource management and is typically used for personal or development environments. Examples include VMware Workstation and Oracle VirtualBox. In contrast, a Type 1 hypervisor (also known as a bare-metal hypervisor) runs directly on the hardware without a host OS, offering better performance and security. Examples include VMware ESXi, Microsoft Hyper-V, and Xen.

Which program is an example of a powerful and open source protocol analyzer? Wireshark Syslog Cisco Network Assistant (CNA) PerfMon

Wireshark - Wireshark is a powerful, open-source protocol analyzer used for network troubleshooting, analysis, and cybersecurity investigations. - It captures and inspects network packets in real-time, allowing users to analyze communication between devices.

Which industrial control system (ICS) device makes changes that modify a characteristic such as temperature? actuator sensor controller interface

actuator An actuator is an Industrial Control System (ICS) device that physically makes changes to a system, such as modifying temperature, pressure, flow, or position in response to commands from a controller.

Using code to set up (provision) and maintain systems (installing software updates, for example) in a consistent manner, with no mistyped commands, is known as __________. diversion coercion automation parsing

automation Automation refers to using code or scripts to provision and maintain systems consistently and without human error. This process can include tasks like setting up environments, installing software updates, and other routine operations, ensuring that they are performed correctly every time.

Which term refers to the ability of one connection to handle more data than others? bandwidth cost transmission latency

bandwidth Bandwidth refers to the capacity of a connection to handle or transmit data, typically measured in bits per second (bps). A higher bandwidth means the connection can handle more data simultaneously, providing faster data transfer rates.

A spot where traffic causes latency is called a __________. giant runt drop bottleneck

bottleneck A bottleneck is a point in a network where traffic slows down due to limited bandwidth, processing power, or other constraints. It causes increased latency and can degrade overall network performance.

The oldest and simplest way to give multiple virtual machines legitimate IP addresses is to __________ the NIC, which works at Layer 2 of the OSI model, so each virtual network interface card (vNIC) gets a legitimate, unique MAC address. route host bridge separate

bridge The oldest and simplest way to give multiple virtual machines legitimate IP addresses is to bridge the NIC (Network Interface Card). This works at Layer 2 of the OSI model, allowing each virtual network interface card (vNIC) to get a unique MAC address, making it appear as if the virtual machines are directly connected to the physical network.

Which tool can be used to notify a technician of a continuity problem or if a wire map is not correct? cable tester certifier time domain reflectometer optical time domain reflectometer

cable tester A cable tester is a tool used to check for continuity issues, incorrect wiring (wire mapping), and basic connectivity problems in network cables. It helps technicians quickly identify and troubleshoot issues with Ethernet cables, such as open circuits, short circuits, or miswiring.

Which tool tests a cable to ensure that it can handle its rated amount of capacity? cable tester certifier time domain reflectometer optical time domain reflectometer

certifier A certifier is a tool used to test network cables to ensure they meet the required performance standards, such as bandwidth and other electrical properties. It verifies that the cable can handle its rated capacity for use in specific network environments (e.g., Cat 5e, Cat 6).

Which term describes a portion of the available spectrum for Wi-Fi network communication? channel frequency frame interframe space

channel In Wi-Fi network communication, a channel refers to a specific portion of the available radio frequency spectrum that is used for wireless data transmission. Wi-Fi networks operate in different frequency bands (e.g., 2.4 GHz, 5 GHz, and 6 GHz), and each band is divided into multiple channels to allow multiple networks or devices to communicate without excessive interference.

Which type of malware looks or pretends to do one thing while, at the same time, doing something evil? rootkit worm macro Trojan

Trojan A Trojan (short for Trojan Horse) is malware that pretends to be a legitimate program but secretly performs malicious actions in the background.

What are the three essential ingredients for a successful implementation of a basic structured cabling network? telecommunications room, vertical cabling, and a patch panel telecommunications room, horizontal cabling, and a work area a demarcation point, a patch panel, and a PC a rack, a patch panel, and a work area

telecommunications room, horizontal cabling, and a work area These are the three essential ingredients for a successful implementation of a basic structured cabling network: - Telecommunications room: A central location for network equipment like servers, routers, and switches. - Horizontal cabling: The wiring that connects the telecommunications room to work areas, typically within a building. - Work area: The location where devices (e.g., PCs, printers) are connected to the network via outlets or ports.

In a Basic service set identifier (BSSID) infrastructure mode network, the BSSID is the same as __________ for the WAP. the MAC address the SSID a randomly generated value the manufacturer ID

the MAC address In a Basic Service Set Identifier (BSSID) infrastructure mode network, the BSSID is essentially the MAC address of the Wireless Access Point (WAP).

Which term refers to any form of potential attack against your network? vulnerability threat risk contingency

threat A threat refers to any potential danger or attack that could exploit a vulnerability in your network or systems. It represents the possibility of harm, such as hackers, malware, or natural disasters, that could compromise the security of your network.

Which tool can be used to identify the location of a cable break in a copper cable? cable tester certifier time domain reflectometer optical time domain reflectometer

time domain reflectometer A Time Domain Reflectometer (TDR) is used to locate faults in copper cables, such as breaks, shorts, or other issues. It works by sending an electrical pulse down the cable and measuring the time it takes for the signal to reflect back due to a fault or discontinuity. Based on this time delay, the TDR calculates the distance to the fault.

Which term refers to a system with very high network output? host honeypot top talker demilitarized zone

top talker A top talker refers to a system or device on a network that generates very high network traffic output, meaning it sends large amounts of data to other systems or networks.

Which type of network enables you to segment a physical network into multiple discreet networks without adding additional hardware? virtual private network (VPN) dial-up Ethernet LAN virtual local area network (VLAN)

virtual local area network (VLAN) A VLAN allows you to segment a physical network into multiple discrete, logical networks without the need for additional hardware. It achieves this by using switches to create separate broadcast domains, which can improve security and traffic management.

Whenever you allow authorized remote users to access some part of your private network, you have created a(n) __________. virtual private network internet intranet extranet

virtual private network A virtual private network (VPN) allows authorized remote users to securely access a private network over the internet. It creates a secure tunnel that encrypts data traffic between the remote user and the network, ensuring privacy and security.

Generally, what do infrastructure as a service (IaaS) providers charge you for? security what you use subscriptions time

what you use Infrastructure as a Service (IaaS) providers typically charge based on a pay-as-you-go model, meaning you are billed for the actual resources you consume. This can include: - Compute power (e.g., virtual machines, CPU usage) - Storage (e.g., disk space, object storage) - Networking (e.g., data transfer, bandwidth)


Ensembles d'études connexes

Med Surg 2- Module 2-Neuro NCLEX Chapter Review

View Set

Nov. 11th - What is love? (The speech of Aristophanes in Plato's Symposium)

View Set

Saunders maternal nursing flashcard app (amniotic fluid & placenta)

View Set

Test 3- Immunity, Metabolism, and Cellular Regulation

View Set

Accounting Ch.12 Securities Classified "Trading" debt or FVTNI equity

View Set