Unit 8, Unit 9, Unit 10, Unit 11, Unit 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

At what layer of the OSI model do proxy servers operate?

Layer 7

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

______________ in SONET are analogous to the ________________ of T-carriers.

OC levels, digital signal levels

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Online UPS

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

What method does a GSM network use to separate data on a channel?

TDMA

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

Where does an MPLS label go in a PDU?

Between Layers 2 and 3

How many channels are in an ISDN PRI connection?

23B+D

How many bits of a Class A IP address are used for host information?

24 Bits

Which formulas can be used to calculate the magic number? Choose two.

256 - the interesting octet 2^h

What is the formula for determining the number of possible hosts on a network?

2^h - 2 = Z

Which IEEE standard determines how VLANs work on a network?

802.1Q

What feature of Windows Server allows for agentless authentication?

AD (Active Directory)

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Access control

What software might be installed on a device to authenticate it to the network?

Agent

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

Application awareness

What kind of network is the PSTN?

Circuit-switched

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold site

What kind of firewall blocks traffic based on application data contained within the packets?

Content-filtering firewall

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?

DHCP relay agent

A spoofed DNS record spreads to other DNS servers. What is this attack called?

DNS poisoning

What specifications define the standards for cable broadband?

DOCSIS

Which type of DoS attack orchestrates an attack using uninfected computers?

DRDoS (Distributed Reflection DoS) attack

Which of these attacks is a form of Wi-Fi DoS attack?

Deauthentication attack

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

Eight

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Penetration testing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

What port do SNMP agents listen on?

Port 161

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?

Posture assessment

What command requests the next record in an SNMP log?

SNMP Get Next

Which of the following is considered a secure protocol?

SSH

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smart jack

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic shaping

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

Which of the following features is common to both an NGFW and traditional firewalls?

User authentication

Which DSL standard has the fastest speeds immediately outside the CO?

VDSL

When shopping for a new router, what does the MTBF tell you?

When shopping for a new router, what does the MTBF tell you?

An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.

dedicated line, virtual circuit

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

switchport port-security

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

wireshark


Ensembles d'études connexes

Peds FINAL Exam PART 2 (Ch. 7, 10, & 18)

View Set

ECON 251 (PNW) Chapter 20 Learnsmart

View Set

Chemia Nowej Ery 1 1. Wodorotlenki - masa cząsteczkowa i udział procentowy mas pierwiastków w wodorotlenku

View Set