IST-220 - Final 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

140

802.11ac provides an advantage over 802.11n by incorporating increased channel bonding capabilities. What size channels does 802.11ac NOT support? Choose all that apply 140 80 40 20

UTM (Urchin Tracking Module)

A __________ (use abbreviation) is a security strategy that combines multiple layers of security appliances and technologies into a single safety net.

bluesnarfing

A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred? bluesnarfing Data breach War driving Bluejacking

NFC

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data? NFC Bluetooth Z-Wave ANT+

LDAP

Active Directory and 389 Directory Server are both compatible with which directory access protocol? Kerberos RADIUS LDAP AES

Citrix Xen

Amazon and Rackspace both utilize what virtualization software below to create their cloud environments? VMware vSphere Parallels Citrix Xen Oracle VirtualBox

IDS

An _____________(use abbreviation) monitors network traffic and alerts (only) about suspicious activity.

IPS (intr

An ________________ (use abbreviation) can detect suspicious activity and block it from entering the network or the host

Implicit deny rule

Any traffic that is not explicitly permitted in the ACL is denied, which is called the ____________________________. Implicit permit rule Explicit deny rule Implicit deny rule Explicit permit rule

Text, support ticket

Aside from Email, what kinds of alerts can you program your network monitor to send to IT staff when it detects specific, problematic conditions?

Layer 7 (Application layer)

At what layer of the OSI model do proxy servers operate?

Physical layer

At what layer of the OSI model do the 802.11 standards vary? Physical layer Transport layer Data link layer Network layer

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?f

DiffServ

B (The signal is split into secondary waves that continue in the direction in which they split.)

Diffraction has what affect on a wireless signal's propagation? A The signal is completely absorbed by the diffracting material. B The signal is split into secondary waves that continue in the direction in which they split. C The signal is returned back towards the source of the original signal. D The signal is redirected into multiple directions.

Wireless

EAPoL is primarily used with what kind of transmission? WAN Ethernet Wireless COBoL

Freeware

For Windows-based computers, you can download a ___Blank 1____ SSH client, such as PuTTY, to form a secure connection SSH connection.

Z-Wave

Healing messages are a feature of what smart home protocol? ZigBee Z-Wave ANT+ Bluetooth

iptables

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall? netwall modfire iptables ipf

evil twin

Scenario: You just settled in for some study time at the local coffee shop. You pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for? Evil twin Brute force attack Guest network Bluejacking

Rogue AP

Scenario: You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity. You've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss? Hidden node Rogue AP Bluesnarfing War driving

signal-to-noise ratio (SNR)

Signals traveling through areas in which many wireless communications systems are in use will exhibit a lower _______________ due to the higher proportion of noise. Power-to-weight ratio Signal-to-noise ratio Frequency-to-subcarrier ratio Noise-to-signal ratio

True

T/F: Like other WPAN technologies, wireless USB requires little power and operates within about a 10-m range.

Channel, Frequency

To exchange information, two antennas must be tuned to the same __________. (pick two) Channel Frequency Fractal Subcarrier

management frames

What 802.11 frame type is involved in association and re-association, including probe and beacon frames? control frames management frames data frames extended frames

standby, online

What are the two main categories of UPSes? Online Failover Hot swappable Standby

Content filtering, file caching

What are the two primary features that give proxy servers an advantage over NAT?

Misconfiguration

What causes most firewall failures?

Active Directory

What feature of Windows Server allows for agentless authentication? ACL (access control list) AD (Active Directory) Network-based firewall IDS (intrusion detection system)

161

What port do SNMP agents listen on?

LACP (Link Aggregation Control Protocol)

What protocol is most often used to bond ports between a switch and a busy server? RDP LACP LDAP SNMP

Agent

What software might be installed on a device in order to authenticate it to the network?

5 GH

Which Wi-Fi frequency band offers 24 unlicensed communications channels in the United States? 5 GHz band 10 GHz band 2.4 GHz band 560 MHz band

PaaS (Platform as a Service)

Which cloud computing services model gives software developers access to multiple operating systems for testing? IaaS SaaS XaaS PaaS

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions? SFTP SSH SSL IPsec

D (It provides poor authentication and no encryption.)

Why is the telnet utility a poor choice for remote access to a device? A. It cannot be used over a public WAN connection. B. It does not allow for control of a computer remotely. C. It provides no mechanism for authentication. D. It provides poor authentication and no encryption.

B (If one power supply fails, the other can take over.)

Why might you want to install two power supplies in a critical server? A If one power supply fails, the other runs a diagnostic check. B If one power supply fails, the other can take over. C If one power supply fails, the other is hot swappable. D If one power supply fails, the server safely powers down.

NAT mode

With which network connection type does the VM obtain IP addressing information from its host? Host-only mode Bridged mode NAT mode Managed mode

C (Upon creation, each vNIC is automatically assigned a MAC address)

How does a vNIC get a MAC address? A The vNIC is assigned the host machine's MAC address B Upon creation, each vNIC is manually assigned a MAC address C Upon creation, each vNIC is automatically assigned a MAC address D The vNIC is created when the virtual machine is configured

guest network

Scenario: You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you configure on her AP to meet her requests? SSID A guest network Basic Service Set Password

False

T/F: A RAID 5 configuration requires a minimum of two hard disks to operate.

False

T/F: A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

True

T/F: A brownout is a momentary decrease in voltage; also known as a sag.

False

T/F: A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

True

T/F: All wireless signals are carried through the air by electromagnetic waves.

True

T/F: An 802.11 data frame contains four address fields, in contrast to the two address fields in 802.3 Ethernet.

True

T/F: An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

heat map

What feature of a site survey maps the Wi-Fi signals and other noise in your location? Ultraviolet map Heat map Infrared map SSID map

Layer 3 (Network layer)

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols? Layer 4 Layer 2 Layer 1 Layer 3

SDN Controller

What kind of device can be used to configure and manage physical and virtual networking devices across the network? MDM controller SDN controller WAP controller NIC controller

content-filtering firewall

What kind of firewall blocks traffic based on application data contained within the packets?

TGT(Ticket granting ticket)

What kind of ticket is held by Kerberos's TGS?

mean time between failures (MTBF)

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur? product cycle lifetime (PCL) mean time between failures (MTBF) maximum time available (MTA) estimated time to failure (ETTF)

Baseline

When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it to in order to determine what has changed? Log file Protocol Analyzer Baseline TCP dump

802.11n

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands? 802.11ac 802.11g 802.11b 802.11n

Class 1

Which Bluetooth class has the highest power output? Class 1 Class 2 They all have equal power output Class 3

CSMA (Carrier Sense Multiple Access)

Which Carrier Sense technology is used on wireless networks to reduce collisions? CSMA/CA 802.11 SSID CSMA/CD

ANT+

Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account? NFC SMC Bluetooth ANT+

application awareness

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

TCP

Which Transport layer protocol does PPTP use? NTP IP TCP IPSec

switchport port-security

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port? shutdown switchport port-security storm-control mac-limit

TLS (Transport Layer Security)

Which current protocol is used to create secure transmissions for HTTP browsing sessions? e. DNS-over-TLS TLS WEP SSL WPAv2

Wireshark

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

B (To simplify the process of granting rights to users)

Why do network administrators create domain groups to manage user security privileges? A To add/remove users from an ACL B To simplify the process of granting rights to users C To control port security D To apply MFA across the domain

A (The ISP's STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information.)

Why is a BPDU filter needed at the demarc? A The ISP's STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information. B Prevent inbound and outbound BPDU but will remove portfast state on a port if a BPDU is received. C To filter sending or receiving BPDUs on a switchport. D When you want a switch plugged into your network but you don't want it participating in spanning tree.

cold site

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Type 1

Which type of hypervisor is installed on bare metal? Type 2 Type 1 Type 3 Type 4

False

T/F: Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

A (Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others can't)

What kinds of issues might indicate a misconfigured ACL? A Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others can't B Protecting your internal networks from all external networks, particularly the public internet. C A reactive ACL that filters incoming and outgoing traffic dependent on upper-layer session information. D Implementing an ACL for edge routers and outward-bound connections.

reflection

When a wireless signal encounters a large obstacle, what happens to the signal? Attenuation Absorption Refraction Reflection

infrared

Which one of the following wireless transmission types requires a clear LOS to function? NFC Infrared Bluetooth Wi-Fi

3389

Which port must be open for RDP traffic to cross a firewall? 5525 443 3389 5581

Online UPS

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

VNC

Which terminal emulation protocol is similar to RDP but is open source? VNC ZOC SSH xterm

C (It becomes a giant when it exceeds the medium's maximum packet size.)

At what point is a packet considered to be a giant? A It becomes a giant when it exceeds 1500 bytes. B It becomes a giant only when fragmented pieces are reassembled and the packet size is too large. C It becomes a giant when it exceeds the medium's maximum packet size. D It becomes a giant once a VLAN tag is added.

root bridge

Only one ___________________ exists on a network using STP. Spanning tree Shortest path Loopback address Root bridge

runts

Packets that are smaller than a medium's minimum packet size are known by what term below?

A, D

Pick two advantages to using virtualization on a network A Efficient use of resources B Fault and threat isolation C Reducing global warming D Complex, detailed backups and recovery

False

T/F The LLC sublayer is primarily concerned with managing MAC addresses in message frames.

business continuity

What is the primary goal of disaster recovery? (proper term)

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite? L2TP IKEv2 PPTP OpenVPN

traffic shaping

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

SSL, TLS

___ and ___ are both methods of encrypting TCP/IP transmissions, including web pages and data entered into web forms, en route between the client and server using public key encryption technology. (pick 2) TLS PPP SSL RDP

DirectAccess

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources? DirectAccess Active Directory Group Policy RAS (Remote Access Service)

Hypervisor

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer? Hypervisor SDN (software-defined networking) NFV (Network Functions Virtualization) Terminal emulation

User Awareness

Which of the following features is common to both an NGFW and traditional firewalls? IDS and/or IPS User awareness Application Control Packet Filtering

Access Control

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+? Authorization Authentication Access control Accounting

PPPoE (Point-to-Point Protocol over Ethernet)

Which remote access protocol is used over an Ethernet network? RAS SLIP PPPoE PPP

C (It distorts the signal as it travels into and through a different transmission medium.)

How does refraction affect the propagation of a wireless transmission? A It causes the signal to be absorbed by the refracting material. B It causes the signal to be returned back towards the source of the origin. C It splits the signal into secondary waves that continue in the direction in which they split. D It distorts the signal as it travels into and through a different transmission medium.

FHSS

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band? FHSS DSSS ZigBee RTS/CTS

Virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes? Virtual router Virtual switch Virtual load balancer Virtual firewall

A

What's the essential difference between an IPS and an IDS? A An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity. B An IDS can perform stateful inspection. An IPS can react when alerted to such activity. C An IPS can only detect and log suspicious activity. An IDS can react when alerted to such activity. D An IDS can detect, log, and track suspicious activity. An IPS can react when alerted to such activity.

Certificate Authority (CA)

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites? Certificate Authority (CA) Certificate Authorizer Certificate Authenticator (CA) Certificate Authorization (CA)

Integrity

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? Confidentiality Symmetric Integrity Availability

DiffServ, Traffic Class

Which fields are modified in IPv4 and IPv6 packets to help prioritize traffic for QoS? _______ for IPv4 and _________ for iPv5

directional

Which kind of antenna is used in a point-to-point link, especially over long distances? Software-defined Fractal Omni-directional Directional

access-list acl_2 permit icmp any any

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

SFTP (Secure File Transfer Protocol)

Which remote file access protocol is an extension of SSH? HTTPS FTPS TFTP SFTP

OpenVPN

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked? MS-CHAPv2 VPN-over-TLS OpenVPN IPSec

D

Why do wireless networks experience a greater reduction in throughput compared with wired networks? A Wireless networks experience a low number of collisions and require greater overhead on each transmission, resulting in a significant reduction in throughput compared to wired networks. B wireless networks experience a high number of collisions and require greater overhead on each transmission, resulting in a significant increase in throughput compared to wired networks. C Wireless networks experience a Low number of collisions and require greater overhead on each transmission, resulting in a significant increase in throughput compared to wired networks. D Wireless networks experience a high number of collisions and require greater overhead on each transmission, resulting in a significant reduction in throughput compared to wired networks.


संबंधित स्टडी सेट्स

Maternal Newborn Health Promotion and Maintenance Quiz

View Set

351 Promulgated Contract Forms #5

View Set

Section C Test Bank-Risk Management

View Set

Chapter 1: Introduction to Drugs - ML6 (PHARM)

View Set

NCLEX Questions-Prioritizing Client Care

View Set

GS ECO 302 CH 5 A Survey of Probability Concepts

View Set