Network+ Review Questions Sec. 8-12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is a digital signature? A) A hashed web page B) An encrypted web page C) A hash of an encrypted data chunk that sender and receiver both have D) A web page that has been hashed with a private key

A hash of an encrypted data chunk that sender and receiver both have. A digital signature starts by encrypting a data chunk with a private key. The results are hashed and sent to a receiver. The receiver performs the same operation on the same data chunk but uses the public key and compares the results

A tech has just installed a new SOHO router for a client. Which security task should the tech perform first? A) Change the administrator name and password B) Disable port forwarding C) Disable the DHCP server D) Enable MAC address cloning

A) Change the administrator name and password

What is the role of port numbers in IP headers? A) Port numbers identify the sending and receiving processes between two hosts B) Port numbers identify which interfaces on a router should receive data in which interfaces forward data out C) Port numbers identify which connectors on a switch that should receive data in and which should forward data out D) Port numbers identify the path of routers between any two hosts that need to communicate with each other

A) Port numbers identify the sending and receiving processes between two hosts

Which of the following is a not an element of a route metric? A) MTU B) Hop distance C) Cost D) Bandwidth

B) Hop distance

Which of the following is not a characteristic of the OSPF routing protocol? A) OSPF is a link state protocol B) OSPF is a distance vector protocol C) OSPF routers are grouped into areas D) OSPF routers in an area elect a designated router and a backup designated router

B) OSPF is a distance vector protocol

What is the job of a router? A) To assign IP addresses to hosts on the network B) To connect networks with different network IDs C) To map IP addresses against MAC addresses D) To allow outside hosts to initiate contact with hosts on the LAN side of a network

B) To connect networks with different network IDs

Which of the following is not a characteristic of the RIP routing protocol? A) RIP is a distance vector protocol B) RIP is an interior gateway protocol C) RIP supports a maximum hop count of 127 hops D) The primary metric of RIP is hop count

C) RIP supports a maximum hop count of 127 hops

In what folder is the HOSTS file located in a Windows computer? A) C:\etc B) C:\Windows\System32\Drivers\etc C) C:\Windows\etc D) C:\Windows\System32\etc

C:\Windows\System32\Drivers\etc In a Windows-based computer, the HOSTS file is found in the C:\Windows\System32\Drivers\etc folder.

Which of the following is not a common certificate error or warning? A) Certificate is on the Certificate Relocation List (CRL) B) Self-signed Certificate C) Expired Certificate D) Certificate not valid for the site

Certificate is on the Certificate Relocation List (CRL) The CRL is the Certificate Revocation List, not the Certificate Relocation List.

Which port on a switch is used to manage the switch? A) Rollover port B) Console port C) Yost port D) Layer-three port

Console port Managed switches may be managed by a standard data port if in-band management is supported, but sophisticated switches use a console port.

Which feature of a SOHO router is not typically found in an enterprise router? A) Two or more router interfaces B) Graphical or textual management interface C) Each interface in the router must be configured D) Built in switch

D) Built in switch

Which of the following is not a characteristic of the BGP routing protocol? A) BGP is a hybrid of distance vector and link state routing protocols B) BGP is broken up into divisions called Autonomous Systems (AS) C) The primary job of BP is to route between ASes D) OSPF is the primary routing protocol between ASes

D) OSPF is the primary routing protocol between ASes

Port forwarding allows which of the following? A) Public Addresses to be assigned to the LAN side of a NAT router B) One host on the LAN side of a NAT router to be assigned with the same public address of the router's WAN interface C) Registers a LAN side host with a portable DNS address D) Outside access to hosts on the LAN side of a NAT router

D) Outside access to hosts on the LAN side of a NAT router

Which statement is not true of static routes? A) Routers can have static routes B) Hosts can have static routes C) Static routes are entered manually and must be manually changed by a human D) Static routes are entered manually but can be automatically changed by the router

D) Static routes are entered manually but can be automatically changed by the router

What is the job of DDNS? A) DDNS allows a local device to randomly change its DNS name B) DDNS rotates the IP address of a local device C) DDNS tracks IP address changes of a local device and updates DNS to reflect those changes D) DDNS prevents the IP address of a local device from being changed

DDNS tracks IP address changes of a local device and updates DNS to reflect those changes. The changes are propagated to a DDNS service which sends the changes to the appropriate DNS servers throughout the Internet.

What is the primary purpose of netstat? A) Captures frames and packets for later review B) Shows your computer's connection(s) to any web server(s) C) Graphical utility that charts amount of network data entering and leaving a host D) Displays all connections to and from a host computer

Displays all connections to and from a host computer, Netstat is a command line utility that shows a computer's network connections.

What does port mirroring accomplish? A) Enables inbound and outbound traffic from switch ports to be duplicated at the mirrored port B) Doubles switch-port bandwidth by a bonding a specified port to the mirrored port C) Redirects any inbound traffic to the mirrored port to another, specified port D) Redirects any outbound traffic from the mirrored port to a host with a specific IP address

Enables inbound and outbound traffic from switch ports to be duplicated at the mirrored port

Which of the following is not a network service problem? A) Duplicate IP address in DHCP scope B) Not enough IP addresses in the DHCP scope C) Overlong DHCP lease protocols D) Exclusions in the DHCP scope

Exclusions in the DHCP scope.

Which of the following is not a network information or troubleshooting utility? A) tracert B) pathping C) FTP D) Bandwidth tester

FTP is a file transfer application, not a testing application.

FTP uses TCP port 20 and TCP port 21. Which choice describes how the ports are used? A) FTP servers listen for commands on port 20 and respond with data on port 21 B) FTP servers listen for commands on port 21 and respond with data on port 20 C) FTP clients send requests on port 21 and receive data on port 21 D) FTP clients send requests on port 20 and receive data on port 20

FTP servers listen for commands on port 21 and respond with data on port 20. Active FTP servers receive commands on port 21 and respond with data on port 20.

Which statement is not true of a forward proxy? A) Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured B) Forward proxy servers function between the local network and the front-end router C) Forward proxy servers are application-specific D) Hosts must be configured to access the forward proxy server

Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured

In terms of network security, what is the purpose of hashing? A) Hash is a great side dish with eggs B) Hashing encrypts data C) Hashes are used to verify data integrity D) Hashing decrypts data that was encrypted by hashing

Hashing verifies data integrity by generating unique a value for a given chunk of data.

Ping uses which IP layer protocol? A) ICMP B) ARP C) RIP D) FTP

ICMP

Which statement is true of IPS and IDS systems? A) Passive IDS is the same as IPS B) IPS responds to threats with a notification to a specified staff C) IPS detects then attempts to defend against a threat D) Passive IPS is the same as IDS

IPS detects then attempts to defend against a threat Intrusion Prevention System (IPS) identifies a threat and attempts to prevent it. Passive Intrusion Detection System (IDS) is an old term that means IDS. IPS does not monitor and issue notifications - IPS actively detects and performs its own action to prevent a detected threat.

Which statement is true of inter-VLAN routing? A) InterVLAN routing calls for connecting each VLAN to a port on a router so that data can pass between the VLANs B) Inter-VLAN routing is implemented within switches to enable communication between VLANs C) Inter-VLAN routing encrypts and decrypts traffic between VLANs D) Inter-VLAN routing enabling remote VLANs to connect over a public network, such as the Internet

Inter-VLAN routing is implemented within switches to enable communication between VLANs

A website just changed its IP address and a user is unable to reach it by typing the site's domain name into their browser. What command can the user run to make the computer learn the website's new IP address? A) Ipconfig/updatednscache B) Ipconfig/flushdns C) Ipconfig/all D) Ipconfig/dnsupdate

Ipconfig/flushdns will clear the DNS cache and force the computer to perform a fresh DNS lookup to get the current IP address of a domain name host.

What is the Cisco protocol to perform port bonding? A) LACP B) HSRP C) CARP D) Inter-VLAN Routing

LACP Link Aggregation Control Protocol is a Cisco protocol to bind multiple switch ports into a single, load-distributed channel. HSRP is the Hot Standby Router Protocol.

What statement is true of a NAT router? A) NAT routers replace the source IP address with its own IP adresses B) NAT routers allow public addresses to exist on the LAN side of the router C) All hosts on the LAN side of the router are assigned the same IP address as the public address in the router D) The NAT function is performed at the ISP facility

NAT routers replace the source IP address with its own IP address.

Which is the default port for NTP? A) 321 B) 123 C) 132 D) 231

NTP uses port 123.

The primary command-line tool to troubleshoot Windows naming issues is what? A) Nbtstat B) Netstat C) Ipconfig D) Net

Nbtstat provides information about the netbios naming service that runs in some Windows-based computers.

What command will assign a drive letter to a network share? A) Net assign B) Net drive C) Net share D) Net use

Net use The net use command assigns a drive letter in the local computer to a shared folder in another computer.

When securing IP networks, developers focus on several key principles. Which of the following is NOT one of those principles? A) Performance B) Confidentiality C) Integrity D) Availablity

Performance is important to IP networks but is not a core tenet of securing the network.

Which would be the best solution to make an encrypted tunnel using SSH? A) Recode an unencrypted tunneling program to support SSH encryption B) Piggyback an existing tunnel program onto SSH C) Set up a tunnel using PPTP D) Set up a tunnel using L2TP/Ipsec

Piggyback an existing tunnel program onto SSH. The only option here that meets the criteria of the question is to piggyback a VPN session over an SSH connection.

What does QoS provide? A) Higher performance of selected traffic B) Blocking of specified traffic types C) Redirection of low priority traffic to slower router interfaces D) Prioritized throughput of different traffic types

Prioritized throughput of different traffic types QoS enables the prioritization of different traffic types with bandwidth approaches a connection's maximum capacity.

Which choice is not true about protocol analyzers such as WireShark? A) Protocol analyzers can capture packets and frames B) Protocol analyzers can show the contents of packets and frame C) Protocol analyzers can filter the contents of packets frames D) Protocol analyzers can generate packets and frames

Protocol analyzers can generate packets and frames, they can only capture and display them.

Which of the following is a secure email protocol? A) STMP B) STLS C) POP D) IMAP

STLS, Start Transport Layer Security (STLS) is the current approach to running secure email protocols.

Which is the BEST device to dole out requests to duplicate servers to ease congestion? A) DNS Server B) Round Robin Server C) Server Side Load Balancer D) Clusterer

Server Side Load Balancer

When operating multiple, duplicate servers such as web servers, which method is best to take advantage of the full power of all of the servers? A) HSRP B) DNS Server C) Round Robin Server D) Server Side Load Balancer

Server Side Load Balancer A load balancer evenly distributes requests across multiple servers so they all provide roughly equal services.

Which of the following is not an authentication factor? A) Something you are B) Something you can do C) Something you know D) Something you have

Something you can do. Modern authentication systems cannot evaluate an action so something you can do is not an authentication factor.

Which characteristic is true of TCP? A) TCP is connectionless B) The TCP three-way handshake begins with a SYN message, followed by an ACK response followed by an ACK SYN message C) TCP uses the FIN message to close a connection D) TCP uses the END message to close a connection

TCP uses the FIN message to close a connection

True or false: Most SOHO routers come with NAT enabled?

TRUE - It can be disabled and/or enabled in one of the router's administration settings.

Which choice describes a significant difference between Telnet and SSH? A) Telnet is an Internet Telephony protocol, SSH is a Secure Sharing protocol B) Telnet runs on a client, SSH runs on a server C) Telnet runs on a server, SSH runs on a client D) Telnet is unencrypted, SSH is encrypted

Telnet is unencrypted, SSH is encrypted. Telnet runs on TCP port 23 and is an unencrypted terminal emulation application that runs on both a client and a server. SSH runs on TCP port 22 and is an encrypted terminal emulation application that runs on both a client and a server.

Which statement is true of VLANs? A) VLANs enable remote stations to connect to the LAN from across the internet B) VLANs break up broadcast domains into multiple, smaller broadcast domains C) VLANs use SSH tunnels for cross-VLAN traffic D) VLANs can only be implemented on specified ports on a router

VLANs break up broadcast domains into multiple, smaller broadcast domains


Ensembles d'études connexes

Process and Skills Quizzes Week 4-8 (Exam #2)

View Set

GENERAL SCIENCE - UNIT 1: WHAT IS SCIENCE THE FOUR MAJOR AREAsOF SCIENCE?

View Set

LW 406 Exam II: Commercial Paper & ALL Quizzes

View Set

Chapter 6; Manufacturing Procurement

View Set