CompTia Network
An IPv6 address consists of
128 bits
Which of the following answers refers to a valid IPv6 EUI-64 format address generated from a MAC address of 29:88:68:0B:1B:CA? 2001:DB8:ABCD:12:2A88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2C88:68FF:FE0B:1BCA 2001:DB8:ABCD:12:2D88:68FF:FE0B:1BCA
2001:DB8:ABCD:12:2B88:68FF:FE0B:1BCA
An IPv4 address consists of:
32 bits
Which best describes a man-in-the-middle attack? Malicious code planted on a system, waiting for a triggering event before activating A false server intercepts communication from a client by impersonating the intended server. A person convinces an employee to reveal their login credentials over the phone. An IP packet is constructed that is larger than the valid size.
A false server intercepts communication from a client by impersonating the intended server.
Reports on a user's access and logs of successful and unsuccessful connection attempts are which part of AAA?
Accounting
Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type?
Anycast
Sue is inspecting her application logs and finds log records that indicate attackers may be attempting to use SQL injection attacks to access the database underlying her application. What is the most effective security control that Sue can apply to the address this risk?
Application Layer Firewall
Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key should he use to decrypt the message?
Bob's private key
A networked host with unknown IPv4 address can be reached via:
Broadcast
Which of the following refer to the multiplexing methods used in fiber-optic communication?
CWDM DWDM
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
Circuit-level
IPv4 addresses are expressed with the use of
Decimal numbers
Which attack floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Denial of Service attack
In a private cloud companies such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform are responsible for the physical data center security concerns>
False
IPv6 addresses are expressed with the use of:
Hexadecimal numbers
A company is concerned with traffic that flows through the network. There is a concern that there may be malware that exists that is not being blocked or eradicated by antivirus What technology can be put in place to detect potential malware traffic on the network?
IDS
You were recently hired by a small start-up company. The company had no plans to setup their own datacenter. You have been asked to find a cloud service that would provide several physical servers or virtual machines that the company would be able to install whatever operating systems and applications they need. Which cloud service model should you use?
IaaS
What are two examples of social engineering?
Impersonation Phishing
What network is this? I allow computers to communicate with each other in the same building
LAN
Which of the following answers does not refer to the OSI TCP segment header?
Layer 3 header (Layer 4 header, source port number, destination port number, sequence number, checksum field; all do)
What can be said about Peer-to-Peer (P2P) networking?
Less stable and secure than client-server networking model Decentralized network type. In P2P networks, each node can at the same time serve and request resources.
A switch forwards data to the port that is connected to the destination device. It knows which port to forward it to based on which value?
MAC Address
An IPv6 link-local address is an equivalent of IPv4's:
MAC address
What are the characteristics of the 1000BASE-SX Ethernet standard?
Maximum cable segment length between 220 and 550 meters Multimode fiber-optic cabling
What are the characteristic features of the 100BASE-FX Ethernet standard?
Maximum cable segment length of up to 412 meters (half-duplex communication) Multimode Fiber Maximum cable segment length of up to 2 kilometers
Which of the answers listed below refer to the 1000BASE-LX Ethernet standard?
Maximum cable segment length of up to 5 kilometers over single-mode fiber Fiber-optic cabling Maximum cable segment length of up to 550 meters over multimode fiber
Which type of network topology provides the highest level of redundancy?
Mesh
A type of network traffic intended for a particular group of hosts is called:
Multicast
Which of the following solutions alleviates the problem of the depleting IPv4 address space by allowing multiple hosts on the same private LAN to share a single public IP address?
NAT
Which of the solutions listed below hides the internal IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
NAT
Be able to identify the binary representation of a decimal number (Ex. 192 = 11000000) OKAY?
OKAY
Convert binary to decimal notation (Ex. 10101100= 172) Okay?
OKAY
Which of the following answers refers to a method that binds a combination of private IP address and port number with a corresponding public IP address and port information?
PAT
Which of the following documents describes the concept of private IP addressing?
RFC 1918
Which of the following answers refers to a solution that simplifies large network infrastructure management through the use of software?
SDWAN
Which of the following TCP flags are used for establishing a network connection via TCP three-way handshake?
SYN and ACK
In the OSI model, the layer 4 TCP PDU is known as
Segment
Which type of fiber cable is normally used to connect two buildings that are several miles apart?
Single-mode
Which of the following network topologies is most commonly used in comtemporary Ethernet LANs?
Star
Brian would like to secure his website. Which one of the following protocols is the best choice for encrypting communication between a website and its users?
TLS
What characteristic features does the bus topology have?
The main network cable becomes a single point of failure. All network nodes connect to a single central cable (trunk). A terminator at each end of the main network cable prevents collisions caused by signal bounce.
A double colon in an IPv6 address indicates that part of the address containing only zeros has been compressed to make the address shorter.
True
Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IPv4 address and subnet mask when Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.255.255. APIPA- assigned addresses are valid only for communications within a network segment that a given host is connected to (a host with APIPA- assigned address cannot connect to the Internet).
True
In the OSI model, the payload data (user data) is the actual data that is being nested between header and tail control informatikon
True
Barry is working with his organization's platforms team to select a virtualization approach for use in their data center. To provide stronger security, he would like to select a hypervisor that runs directly on bare metal hardware without an intervening host operating system. What type of hypervisor should he choose?
Type 1
James is working with his organization's platforms team to select a virtualization approach for use on test systems managed by developers. He is looking for a hypervisor that can run on top of the Windows operating system already installed on their laptops. What type of hypervisor is James looking for?
Type 2
A type of network traffic intended for a single host identified by a unique IP address is referred to as:
Unicast
Which of the following answers refer to the 100BASE-SX standard?
Uses LED as the source of the light Multimode fiber Maximum cable segment length of up to 300 meters
What are the characteristic features of the 10GBASE-LR Ethernet standard?
Uses laser as the source of light Single-mode fiber Maximum cable segment length of up to 10 kilometers
A type of network consisting of computers and peripheral devices that use high-frequency radio waves to communicate with each other is called:
VLAN
Which of the following would provide the most effective security for a small wireless network?
WPA2
A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with?
White Hat Hackers
What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
symmetric