Network+ final part2
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
DHCP relay agent
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisoning
What specifications define the standards for cable broadband?
DOCSIS
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection Dos) attack
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another network?
Default gateway
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?
Direct Access
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Eight
A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?
Entrance facility
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Evil twin
When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?
FE80::/10
What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?
FHSS
What type of fiber cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?
Fiber type mismatch
When a router can't determine a path to a message's destination. Where does it send the message?
Gateway of last resort
In the client-server model, what is the primary protocol used for communication between a browser and web server?
HTTP
When shopping for a new router, what does the MTBF tell you?
How long devices like this one will last on average until the next failure
What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?
Hypervisor
Which two protocols manage neighbor discovery processes on IPv4 networks?
ICMP and ARP
Which tunneling protocol is a component of the IPsec protocol suite?
IKEv2
Which email protocol allows an email client to read mail stored on the mail server?
IMAP4
Which encryption protocol does GRE use to increase the security of its transmissions?
IPsec
Which one of the following wireless transmission types requires a clear LOS to function?
Infrared
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat
How many channels are in an ISDN PRI connection?
23B+D
How many bits of a Class A IP address are used for host information?
24 bits
What decimal number corresponds to the binary number 11111111?
255
Which formulas can be used to calculate the magic number? (Choose two)
256- the interesting octet & 2h
What is the formula for determining the number of possible hosts on a network?
2h - 2 =z
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
802.11n
Which IEEE standard determines how VLANs work on a network?
802.1Q
You have a network that consists of seven computers running Windows 10 Professional. You add an eighth computer with Windows Server 2016 installed. Which networking model can the network now support that it could not support without the addition of the eighth computer?
Client-Server
What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?
Coaxial cable, F-connector
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Cold site
What kind of firewall blocks traffic based on application data contained within the packets?
Content-filtering firewall
Which DSL standard has the fastest speeds immediately outside the CO?
VDSL
What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?
Virtual switch
Which device converts signals from a campus's analog phone equipment into IP data that can travel over the internet?
VoIP gateway
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
Wireshark
What type of diagram shows a graphical representation of a network's wired infrastructure?
Writing a schematic
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit http any any
Suppose you send data to the 11111 1111 11111 111111 IP address on an IPv4 network. To which device(s) are you transmitting?
all devices on your local network
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.?
dedicated line, virtual circuit
Which of these commands is available only in Linux?
dig
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
switchport port-security
Suppose you're creating patch cables to be used in a government office. What color wire goes in the first pin?
white/green
Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?
Integrity
If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease. Which command would you use?
Ipconfig/release
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Layer 3
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
Which email protocol allows an email client to download email messages to the local computer?
POP3
Which remote access protocol is used over an Ethernet network?
PPPoE
Which kind of multiplexing assigns slots to nodes according to priority and need?
STDM (statistical time division multiplexing)
What kind of device can monitor a connection at the demarc but cannot interpret data?
Smart jack
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Speed
A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?
Star
You have a network of ten computers connected to a single switch that has 12 ports. You need to add six more computers to the network so you add a second switch by connecting it to the first switch by way of a network cable. Which network topology is now used?
Star-Bus
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Static route
Which protocol's header would a layer 4 device read and process?
TCP
What method does a GSM network use to separate data on a channel?
TDMA
Which part of a MAC address is unique to each manufacturer?
The OUI
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increase traffic and why?
The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server.
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?
Tone locator
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Traffic shaping
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Trunk
Which of the following features is common to both an NGFW and traditional firewalls?
User authentication
What kind of network is the PSTN?
Circuit-switched
Which Bluetooth class has the highest power output?
Class 1
______________ in SONET are analogous to the ________________ of T-carriers?
OC levels, digital signal levels
Which of these categories of twisted-pair cable can support Gigabit Ethernet?
-Cat 5e, Cat 6a, Cat 7
Which of the following devices are you likely to find in the MDF? (Choose all that apply)
-Routers -Switches -KVM switch
You've decided to run an Nmap scan on your network. What app could you open to perform this task? (Choose all that apply)
-Zenmap -Command prompt -Power shell
What is the Internet standard MTU?
1,500 bytes
Which of these is considered a secure place to store a list of documented network passwords?
A password manager
A routing protocol's reliability and priority are rated by what measurement?
AD
What feature of Windows Server allows for agentless authentication?
AD (Active Directory)
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access control
What software might be installed on a device to authenticate it to the network?
Agent
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
Application awareness
Which routing protocol does an exterior router use to collect data to build it's routing tables?
BGP
Which transmission characteristic is never fully achieved?
Bandwidth
Where does an MPLS label go in a PDU?
Between Layers 2 and 3
A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?
Bluesnarfing
Which Carrier Sense technology is used on wireless networks to reduce collisions?
CSMA/CA
What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?
Cat 6a
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?
Checksum
At what layer of the OSI model do proxy servers operate?
Layer 7
What is the first step of inventory management?
List all components on the Network
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?
Look at whether the device is located on the ISP's side of the demark
Which fiber connector contains two strands of fiber in each ferrule?
MTRJ
Which type of DNS record identifies an email server?
MX record
With which network connection type does the VM obtain IP addressing information from its host?
NAT mode
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
Which kind of crosstalk occurs between wire pairs near the source of the signal?
NEXT
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
NFC
At which OSI layer does IP operate?
Network Layer
Which OSI layer is responsible for directing data from one LAN to another?....
Network Layer
What do well-chosen subnets accomplish?
Network documentation is easier to manage
Which cloud computing services model gives software developers access to multiple operating systems for testing?
PaaS
You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?
Patch cable
A network consists of five computers, all running Windows 10 Professional. All the computers are connected to a switch, which is connected to a router, which is connected to the Internet. Which networking model does the network use?
Peer-to-Peer
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Which type of address is used at the Transport layer to identify the receiving application?
Port
What port do SNMP agents listen on?
Port 161
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
Posture assessment
If you're shopping for a rack switch, what component on the sweitch tells you it can be mounted to a rack?
Rack ears
Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?
Remote Desktop
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?
Rogue AP
Which computers are the highest authorities in the Domain Name System hierarchy?
Root servers
Which remote file access protocol is an extension of SSH?
SFTP
What command requests the next record in an SNMP log?
SNMP Get Next
Which of the following is considered a secure protocol?
SSH
Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?
SSL and TLS