ITN 101 FINAL EXAM

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Peer-to-peer model

A network consists of 10 computers, all running Windows 7 Professional. One computer acts as a file server and serves up data to other computers on the network. Which networking model does the network use?

Star topology

A network consists of seven computers and a network printer all connected directly to one switch. Which network topology does this network use?

Client-server model

In Question 11, suppose one computer is upgraded from Windows 7 Professional to Windows Server 2012 R2. Which networking model can the network now support that it could not support without the upgrade?

Private key

In public key encryption, which key is used to decrypt the message?

HTTP

In the client-server model, what is the primary protocol used for communication between a browser and Web server?

Community cloud

Organizations with common interests, such as regulatory requirements, performance requirements, or data access, might share resources in a ________

2^h-2 = Z

What is the formula for determining the number of possible hosts on a network?

Softphone

What kind of phone is a Skype app?

Buffer overflow

What kind of vulnerability is exploited by a ping of death?

Port number

What number does a host use to identify the application involved in a transmission?

UTM (Unified threat management)

What of the following features does not distinguish an NGFW from traditional firewalls?

MLP

What protocol is used to bond multiple T-1s?

Agent

What software might be installed on a device in order to authenticate it to the network?

MPLS

Which QoS technique operates at the OSI layer "2.5"?

RTP

Which Session layer protocol is a streaming live video teleconference likely to use on the network?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

Coaxial

Which of the following cabling types is not recognized by the TIA/EIA for horizontal wiring?

Access control

Which of the following is NOT one of the three AAA services provided by RADIUS and TACACS+?

SSL & TLS

Which two encryption protocols might be used to provide secure transmissions for browser and Web server communications?

SSL and TLS

Which two protocols are available to create secure transmissions for the HTTP sessions?

DRDoS (distributed reflector DoS) attack

Which type of DoS attack orchestrates an attack using uninfected computers?

HIPAA

What federal organization sets strict standards to protect privacy of patient records?

Blue-snarfing

A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred?

Ad hoc

A student has completed his part of a group research paper, and needs to share it with a classmate. He sees the classmate as they're crossing the parking lot between classes. Which WLAN architecture could they use to transfer the file from one laptop to the other?

NFC (near-field communication)

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

Layer 1 (physical layer) & layer 2 (data link layer)

In which layer(s) of the OSI model do NIC (network interface card)'s operate?

Frequency

To exchange information, two antennas must be tuned to the same_________.

802.16

What IEEE committee established WiMAX technologies?

255

What decimal number corresponds to the binary number 11111111?

Amplifier, repeater

What device can boost an analog signal? A digital signal?

Surge protector

What device protects computer equipment from a momentary increase in voltage due to lightning strikes, solar flares, or electrical problems?

Rack-monitoring system

What device provides a central control portal for all devices on a rack?

Port forwarding

What feature must be configured on a router to redirect traffic from an insecure port to a secure one?

Active directory

What feature of Windows Server allows for agentless authentication?

Checksum

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Inverter

What generator component converts DC power from the generator to AC power that the electrical infrastructure in a data center can use?

Framing

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?​

Cat 6a

What is the earliest-pair cabling standard that meets the minimum requirements for 10Gbase-T transmissions?

Layer 3 (network later)

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3 (network layer)

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Active directory

What is the name of the domain controller database that Windows Server 2012 R2 uses to store data about user access and resources on the network?

Hypervisor

What is the software that allows you to define VMs and manage resource allocation and sharing among them?

Header

What is the very beginning of an Ethernet frame called?

Coaxial cable, coaxial cable, F-connector

What kind of cable uses BNC connectors? F-connectors? Which connector is likely to be used by cable TV?

Smart jack

What kind of device can monitor a connection at the demarc but cannot interpret data?

Patch panel

What kind of networking device on today's racks does nothing to the data transmitted on a line other than pass it along through the connection?

Static route

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Ticket granting services

What kind of ticket is held by Kerberos' TGS?

Boot sector viruses

What kind of virus runs in place of the computer's normal system files?

Throttling

What method do ISPs use to purposely slow down bandwidth utilization by customers?

Server mirroring

What process ensures that exact duplicates of servers are available if needed in the event of a disaster?

Direct Access

What service in Windows Server 2012 R2 authenticates remote users and computers to the Windows domain and its corporate network resources?

Remote desktop services

What service provided by Windows Server 2012 R2 allows a computer to serve up applications to other computers on the network?

DMZ

What should you place between the corporate network and the ICS network?

DOCSIS

What specification defined the standards for broadband cable?

Ethernet over power line

What technology allows a user to access the Internet through the wiring of a home?

Default gateway

What type of device does a computer turn to first when attempting to make contact with a host on another network?

Always on remote connections

What unique VPN connection characteristic is provided by the conjunction of RRAS and DirectAccess?

Gateway of last resort

When a router can't determine a path to a message's destination, where does it send the message?

Simplex, simplex, half-duplex

When an Ethernet NIC has been configured by the OS to use half-duplex, the transmit pair of the cable uses___________ transmissions, the receive pair in the cable uses ___________ transmissions, and the twisted-pair in the cable uses ___________transmissions.

ping

When messages to a remote Web server are being lost for no apparent reason and you suspect the problem might be a path MTU black hole, which TCP/IP utility can you use to diagnose the problem?

Certificate authority

When surfing online you get some strange data on an apparently secure web site, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates?

FE80::/10

When your computer first joins an IPv6 network, what is the prefix of the IP address the computer first configures itself?

802.11n

Which 802.11 standard can be used in both the 2.4-GHz and 5-GHz bands?

Class 1

Which Bluetooth class has the highest power output?

CSMA / CA (Carrier Sense Multiple Access with Collision Avoidance)

Which Carrier Sense technology is used on wireless networks to reduce collisions?

RTU

Which ICS component senses attributes of the physical system and converts analog data to digital data, but cannot control the physical system?

Network layer (layer 3)

Which OSI layer is responsible for directing data from one LAN to another?

Mesh topology

Which WAN topology always sends data directly from its origin to its destination?

Remote desktop

Which application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions?

MOU

Which business document fills the gap between an informal handshake and the legally binding signatures on contracts?

Cat 5e and higher

Which categories of twisted-pair cable can support Gigabit Ethernet?

Telnet

Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?

PaaS

Which cloud computing service model gives software developers access to multiple operating systems for testing?

Statistical multiplexing

Which kind of multiplexing assigns slots to nodes according to priority and need?

Active card

Which of the following cards specifically contains an internal lithium battery?

Ethernet

Which of the following is not an example of a broadband transmission?

Wi-Fi

Which one of the following wireless transmission types does NOT require a clear LOS to function

The OUI

Which part of a mac address is unique to each manufacturer?

Probe

Which part of a toner and probe kit emits a tone when it detects electrical activity on wire pair?

Trunk port

Which port on a switch manages traffic for multiple VLANs?

VRRP

Which protocol assigns a virtual IP to a group of routers?

TCP

Which protocol's header would a Layer 4 (transport) device read and process?

MTU

Which server controls the physical system in an ICS network?

NEXT

Which type of cross-talk occurs between wire pairs near the source of a signal?

Hot site

Which type of disaster recovery site is the most expensive?

Analog

Which type of transmission is measured by baud rate?

Evil twin

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

Rogue access point

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

MLA

Your company has developed a Web site that includes a small program that collects real-time data on mortgage rates in specific geographic areas, and uses that information to calculate mortgage payment amounts based on the user's inputted data. The program was written by an independent software developer, who has granted your company a license to incorporate the program into your Web site for your customers' use. Which document was used?

Inform technical staff and users to the problem and what to expect

Your team is in the process of implementing what you thought would be a relatively minor update to the NOS. You've hit a small but time-consuming snag, and it's now obvious that the update won't be completed until about an hour after your maintenance window passes. What should you do immediately?

OC levels, digital signal levels

______________ in SONET are analogous to the ________________ of T-carriers.

To reduce the number of routing table entries by combining several entries

Which of the following is not a good reason to subnet a network?

Port 161

What do SNMP agents listen on?

syslog

What utility in Linux provides standards for generating, storing, and processing messages about events on a system?

CIFS (Common internet file system)

What version of SMB can be used across Windows, UNIX, and other operating systems?

Virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Jamming

What wireless attack might a potential hacker execute with a specially configured transmitter?

POP3

Which email protocol allows an email client to download email messages to the local computer?

IMAP4

Which email protocol allows an email client to read mail stored on the mail server?

PPPoE

Which remote access protocol is used over an Ethernet network?

BGP

Which routing protocol does an exterior router use to collect data to build its routing tables?

SMTP is a connection based protocol uses TCP

Which statement describes SMTP?

TCP, UDP

Which transport layer protocol does PPTP use? Which transport layer protocol does L2TP use?

L2TP

Which tunneling protocol is accepted and used by multiple vendors?

Ethernet 2 frame

Which type of Ethernet frames do today's networks use?

Port number

Which type of address is used at the Transport layer to identify the receiving application?

DHCP relay agents

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need?

Wirless

EAPoL is primarily used with what kind of transmission?

128 bits

How many bits does an IPv6 address contain?

24 bits

How many bits of a Class A IP address are used for host information?

IP config/release

If you are connected to a network that uses DHCP, and you need to terminate your windows workstation DHCP lease, which command would you use?

Conversational voice, streaming live audio and voice, and streaming stored audio and voice

List three types of services a network might support that are considered part of unified communications or convergence.

Top listeners

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Power redundancy

Providing a backup power source is called?

Application layer (layer 7)

RTP and RTCP operate at which layer of the OSI model?

All devices on your local network

Suppose you send data to 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To which device are you transmitting?

IPsec and SSL

What are the two primary encryption techniques used by VPN's today?

128 bits

What is the minimum acceptable key size for today's security standards?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

You have just brought online a new secondary DNS server and notice your monitoring software report a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

SIP

You're trying to choose a signaling protocol for your company's network because you're about to upgrade to a VoIP system. You need to keep it simple because this is a small company with a simple network. Which protocol should you choose?

Traffic policing

Your roommate has been hogging the bandwidth on your router lately. What technique can you use to limit the amount of bandwidth his computer can utilize at any one time?

Authentication, encryption hashing

_______ is used for confidentiality while ______ is used for integrity and authentication.

Root servers

What computers are the highest authorities in the DOMAN Name System hierarchy?

AD

A routing protocol's reliability and priority are rated by what measurement?

Dedicated line, virtual circut

An organization can lease a private, _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.

Dropped, implicit deny

Any traffic that is not explicitly permitted in the ACL is _______, which is called the ______.

Web server

Apache is a popular example of what type of networking software?

Layer 7 (application layer)

At what layer of the OSI model do proxy servers operate?

Network layer (layer 3)

At which OSI layer does IP operate?

in-band management

Telnet and SSH are called __________________ systems because they use the existing network and its protocols to interface with the switch.

18U & 42U

What are the two primary standard widths for rack systems?

snmpgetnext

What command retrieves the next record un an SNMP (simple network management protocol) log?

Brute force attack

A hacker runs a program that tries numerous character combinations until it stumbles on the correct combination and cracks the key. What offensive strategy is this program using?


संबंधित स्टडी सेट्स

Computer User Support for Help Desk and Support Specialists Chapter 12

View Set

Science|Phases, Eclipses, Tides, Phases of Earth's Moon, Earth in Space|Review

View Set