network

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information? a.802.1db.802.1cc.802.1Vd.802.1Q

802.1Q

A subnet of 255.255.248.0 can be represented by what CIDR notation?

A subnet mask of 255.255.248.0 is equivalent to a CIDR notation of /21. To determine the CIDR notation for a given subnet mask, count the number of consecutive 1 bits in the subnet mask. In this case, the subnet mask has 21 consecutive 1 bits, so the corresponding CIDR notation is /21. CIDR notation is commonly used in IP networking to specify the size of a subnet or network, and is expressed as a number of bits in the subnet mask. For example, a /24 CIDR notation indicates a subnet mask of 255.255.255.0, while a /16 CIDR notation indicates a subnet mask of 255.255.0.0.

Which of the following statements correctly describes the malware characteristic of polymorphism? a.Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.b.Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.c.Polymorphic malware can change its characteristics every time it is transferred to a new system.d.Polymorphic malware utilizes encryption to prevent detection.

Polymorphic malware can change its characteristics every time it is transferred to a new system.

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

Request to Send/Clear to Send (RTS/CTS)

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

The cloud service model that involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices is Software as a Service (SaaS). In this model, the software application is hosted and managed by a cloud service provider, and users can access it through a web browser or a thin client application. The provider is responsible for maintaining the software, including updates and security patches, while users only need

VMware Player and Linux KVM are both examples of what type of hypervisor? a.barebones hypervisorb.bare-metal hypervisorc.Type 1 hypervisord.Type 2 hypervisor

Type 2 hypervisor

What does the VLAN Trunk Protocol (VTP) do?

VLAN Trunk Protocol (VTP) is a Cisco proprietary protocol that allows switches to exchange VLAN information with each other. VTP is used to manage VLAN configurations in a switched network environment by maintaining a consistent database of VLAN information among all switches in the network. When VTP is enabled, switches can dynamically add, delete, and rename VLANs and propagate these changes to other switches in the network. VTP operates by designating one switch in the network as the VTP server, which is responsible for managing the VLAN database. The other switches in the network can be configured as VTP clients, which receive VLAN information from the server and synchronize their VLAN databases accordingly. VTP also supports the use of VTP transparent mode, in which a switch does not participate in VTP updates but can still forward VLAN traffic. One important thing to note is that VTP only works within a single administrative domain, meaning that it is limited to switches that are directly connected to each other. If switches are connected through a router or a Layer 3 boundary, VTP updates will not be propagated beyond that boundary.

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this? a.quid pro quob.tailgatingc.phishingd.baiting

tailgating

Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host? a.172.16.2.0b.172.16.1.0c.172.0.0.0d.172.16.0.0

172.16.0.0

An IP address of 192.168.18.73/28 has what network ID? a.192.168.18.0b.192.168.18.64c.192.168.16.0d.192.168.18.32

192.168.18.64

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet? a.255.255.224.0b.255.255.128.0c.255.255.192.0d.255.255.248.0

255.255.224.0

A network with a CIDR notation of /26 would have what subnet mask? a.255.255.255.192b.255.255.255.240c.255.255.255.224d.255.255.255.0

255.255.255.192

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value? a.0.0.255.255b.255.255.255.255c.0.0.0.0d.255.255.0.0

255.255.255.255

When using RFID, what is an ARPT (Active Reader Passive Tag)?

ARPT (Active Reader Passive Tag) is an RFID system architecture in which an active RFID reader sends a radio signal to passive RFID tags. The passive tags are not powered and do not transmit any signals unless they receive a signal from the active reader. When the active reader sends a signal to the passive tag, the tag responds by modulating the signal and reflecting it back to the reader. The reader then reads the modulated signal and extracts the information encoded in the tag. In this architecture, the reader is active and the tags are passive.

evil

An evil twin attack is a type of wireless network attack where an attacker creates a fake wireless access point (AP) that looks like a legitimate AP. The attacker can use this fake AP to intercept and manipulate network traffic, steal user credentials or sensitive information, or launch other attacks such as phishing or malware distribution.

Diffraction has what affect on a wireless signal's propagation? a.The signal is returned back towards the source of the original signal. b.The signal is completely absorbed by the diffracting material. c.The signal is split into secondary waves that continue in the direction in which they split. d.The signal is redirected into multiple directions.

C. The signal is split into secondary waves that continue in the dirtection.

Which of the following virtualization products is an example of a bare-metal hypervisor?

VMware ESXi is an example of a bare-metal hypervisor. A bare-metal hypervisor, also known as a type 1 hypervisor, is a virtualization platform that runs directly on the host computer's hardware without the need for a separate operating system. This type of hypervisor provides direct access to the underlying hardware resources, w

What is NOT a potential disadvantage of utilizing virtualization? a.Virtualization software increases the complexity of backups, making creation of usable backups difficult.b.Multiple virtual machines contending for finite resources can compromise performance.c.Increased complexity and administrative burden can result from the use of virtual machines.d.Licensing costs can be high due to every instance of commercial software requiring a separate license.

Virtualization software increases the complexity of backups, making creation of usable backups difficult

When is it appropriate to utilize the NAT network connection type? a.Only if the VM is intended for VM-to-host communications.b.Only when the VM requires an IP address on the physical LAN.c.Only if the VM does not need to communicate with the host PC.d.Whenever the VM does not need to be access at a known address by other network nodes.

Whenever the VM does not need to be access at a known address by other network nodes.

What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP? a.beacon frameb.broadcast framec.alert messaged.announcement packet

a. Beacon frame

How does refraction affect the propagation of a wireless transmission? a.It splits the signal into secondary waves that continue in the direction in which they split.b.It distorts the signal as it travels into and through a different transmission medium.c.It causes the signal to be absorbed by the refracting material.d.It causes the signal to be returned back towards the source of the origin.

b. It distorts the signal as it travels into and through a different transmission medium.

Which legacy authentication protocol requires mutual authentication? a.Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)b.Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)c.Challenge Handshake Authentication Protocol (CHAP)d.Password Authentication Protocol (PAP)

b. Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

What is NOT a variable that an network access control list can filter traffic with? a. The source or destination TCP/UDP port number in the packet. b. The operating system used by the source or destination device. c. The Transport layer protocol used for the packet. d. The Network layer protocol used for the packet.

b. The operating system used by the source or destination device.

When using Spanning Tree Protocol, what is the first step in selecting paths through a network? a.STP examines the possible paths between all other bridges.b.STP disables links that are not part of a shortest path.c.STP must first select the root bridge, or master bridge.d.STP begins to block BPDUs on non-designated ports.

c. STP must first select the root bridge, or master bridge.

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames? a. extended frames b. control frames c. data frames d. management frames

c. The signal is split into secondary waves that continue in the direction in which they split.

Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames? a.management framesb.extended framesc.data framesd.control frames

control frames

Which of the following statements describes a worm? a.A process that runs automatically, without requiring a person to start or stop it.b.A program that locks a user's data or computer system until a ransom is paid.c.A program that disguises itself as something useful but actually harms your system.d.A program that runs independently of other software and travels between computers and across networks.

d. A program that runs independently of other software and travels between computers and across networks.

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack? a.session hijacking attackb.buffer overflowc.banner-grabbing attackd.man-in-the-middle attack

d. man-in-the-middle attack

Enforcing a virtual security perimeter using a client's geographic location is known by what term? a.geohashingb.geolockingc.geofencingd.geolocating

geofencing

The combination of a public key and a private key are known by what term below? a.key setb.key teamc.key tied.key pair

key pair

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware? a.wormb.boot sector virusc.encrypted virusd.logic bomb

logic bomb

What term is used to describe a space that is rented at a data center facility by a service provider? a.service location (SL)b.point of presence (PoP)c.central service point (CSP)d.locally exchanged data point (ledp)

point of presence (PoP)


Ensembles d'études connexes

Chapter 30 Perioperative Nursing

View Set

Biology 1 (Biology 1610) CH.8 - "An introduction to Metabolism."

View Set

Nevada Status and codes Pertinent to life insurance only

View Set

NUR 497 EAQ #5 Medical Surgical & Pharm

View Set