MSIS 4523 Luse Final
2U
A ______ component takes up 3.5 inches on a rack.
online
A __________ UPS always has power flowing from the battery to the attached components.
10BaseT
A __________ node must be within 100 meters of its hub.
hop
A ___________ designates each time a packet goes through a router.
snapshot
A ____________ allows for system duplication of a VM.
continuity tester
A ________________ tests that you are getting a signal across a wire.
when was evidence taken into custody, what was taken into custody, to whom was evidence passed and when
A chain-of-custody document includes what information? (select three)
100 Mpbs
A company's workstations are running 100 Mbps network cards and have a Gigabit switch. What is the maximum throughput each workstation can have on the network?
DSL modem with firewall capabilities, Cable modem with a separate firewall
A customer with a SOHO requires fast, secure, cost-effective access to the internet. Which of the following would be the MOST appropriate solution? (Select Two)
MAC addresses
A dynamic VLAN assigns VLANs based on _________
DOS
A smurf attack is which type of attack?
load balancing
A specialized device that you install on your network to distribute network requests and ensure availability to all your users is an example of which type of network management techniques?
SNMP v2
A technician has been assigned to set up a network monitoring for some important network devices. Due to the sensitive nature of the devices, the information must be sent in a secure fashion to the monitoring station. Which protocol will facilitate monitoring and support secure transmission of the data?
There are other wireless devices in the area that operate on the wireless band and on the same wireless channel
A home user is experiencing performance issues with her wireless network. She has checked the following issues: -checked to make sure the laptop is within the appropriate wireless network range -checked the connected SSID are wireless channel -Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues?
Syslog server
A network administrator has been assigned to simplify the reviewing of network device events. Which could she use to achieve the desired result?
ipconfig
A network administrator is having intermittently lost connections with a local Windows server. She decides to check the IP address on the server to see if it conflicts with any other IP addresses on the network. Which of the following commands should Lisa use?
11
A network administrator is performing a site survey and detects an existing 802.11g signal on channel 5. Which of the following channels would be the LEAST likely to interfere with the existing signal?
2
A traditional switch operates at which layer?
NAT
A network needs to pass HTTP traffic from a SOHO firewall with a public IP address to an internal Web server with a private IP address. Which technology can accomplish this?
SNMP monitor
A network technician needs to check the configuration of a port on a switch. Which tool is he MOST likely to use to verify the configuration?
connects different networks
A router ____________ .
Network
A router operates at which layer in the OSI 7-layer model?
certificate services
A user is using a PKI authentication method. Which of the following will the user need to implement PKI?
Weak signal strength
A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, her laptop is trying to rejoin the wireless network. What common wireless problem can cause this issue?
The RADIUS server is down
A wireless network is secured with WPA2 Enterprise. Clients are unable to connect to the network. What is the MOST likely explanation for this problem?
PAP
All are part of the Kerberos except ___________.
not all machines may have a public IP during peak usage
All of the following are advantages of NAT except ___________ .
complicates
All of the following are reasons to use a model except _____________.
RAID
All of the following can help prevent physical intrusion except _________.
an 802.11n compatible client can connect to the wireless network only if its MAC address is 00-a1-29-da-d3-4a and the encryption key is known by the client
An 802.11g wireless access point has the following configuration: -AP encryption forced to WPA2-AES mode only -MAC address filtering enabled with the following MAC address in the allow list: 00-a1-29-da-d3-d4
HTTP URLs
An Application Layer (Layer 7) firewall, such as a proxy server, can filter what kind of traffic that a Network Layer (Layer 3) firewall cannot filter?
Use a VLAN
An Ethernet network, using only switches, is slowing down as more computers and switches are added. What could be done to alleviate this?
PoE and Qos
An IT manager needs a new switch to support VoIP phones and wireless access points in a new building. Which of the following features should be included in the new switch?
Social engineering
An accountant for a large corp receives a call from a person claiming to be John, a network technician in HQ. John says they have problems and he needs the accountants username and password so that he can resolve the problem. What is the scenario an example of?
the users who cannot connect are using older NICs without WPA2 support
An organization has decided to upgrade wireless security by switching from WEP encryption to WPA2. Each WAP has been set to the new encryption standard and users are given the new passwords. Most users can connect using the new authentication, but some users report that they cannot connect. Which of the following is the MOST likely cause of the problem?
PoE
An organization needs to install a WAP in a warehouse where a power outlet is not readily available. The network technician can configure a port on a switch that will provide both connectivity and electrical support to the WAP. What needs to be configured in the switch?
seven
At which layer of the OSI model does stateful packet filtering take place at?
Prune non-critical entries from log files, storage for legal conformance, control access to appropriate users
CH 20 Log management includes which of the following tasks? (Select 3)
Baseline
Casey is a new technician. He is monitoring network bandwidth and notes that the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?
incorrect DNS
Clark is a user who took his laptop on a vacation to Wally World. He configured the laptop to match the wireless settings at the hotel. When back at work, Clark can reach the Internet, but he cannot access any internal network resources on team10b.com. Which of the following is the MOST likely reason?
-
-
Authentication
802.1x is used for?
104/128 bit WEP
A 24-character key is used in which type of wireless encryption scheme?
end-user security
DSL consists of all the following advantages over dial-up except for ___________ .
private keys (in a public-private key pair) encrypting hashed data
Digital signatures consist of ______.
Port
Each application is assigned its own __________.
port blocking, packet filtering
Firewalls are defined by which three basic technologies?(choose two)
port mirroring
For an ID system to be able to analyze all traffic on a switch, what is needed?
ESD, short circuits, static
Good ground provides protection against which threats? (select three)
Social engineering
Having the proper security policies and adequate training for employees protects your network from which of the following?
The server contains several virtual machines and the MAC addresses are from virtual machines
How can a single NIC in a server transmit packets from multiple different source MAC addresses?
allows for twice the bandwidth
How does full duplex compare to half duplex?
one
How many computers lose connectivity if one cable is cut in a star topology?
4
How many pairs of twisted wire are in a Cat6a cable?
Configure all the WAPs to use the same SSID
How should you configure multiple 802.11g wireless access points to create a single network that enables users to roam freely?
Bluesnarfing, Bluejacking
Identify specific threats to Bluetooth-enabled devices. (Select two)
129.186
Identify the network ID section of the following IP address: 129.186.140.200/16
default gateway
If a computer wishes to communicate with a host not on the same network, where does the computer have to send the message through to get outside the network?
full control
If user1 has read access for a particular folder and is also part of a group which has full control access to that folder, what are user1's effective permissions on the folder?
no access
If user1 has read access for a particular folder and is also part of a group which is denied access to that folder, what are user1's effective permissions on the folder?
system recovery
If you are Amazon and you lose money for each minute your server is down, which advantage of virtualization would directly contribute to alleviating this problem?
2
If you backup the entire server every Sunday night and differentially backup each night thereafter, how many backups would be needed to restore the system to the most recent state on Wednesday (day)?
3
If you backup the entire server every Sunday night and incrementally backup each night thereafter, how many backups would be needed to restore the system to the most recent state on Wednesday (day)?
Traffic on port number 80
If you want your firewall to block traffic generated by Web pages, what would you configure it to block?
peer-to-peer
In a ______________ network, each system can be both a provider and a user of content.
servers are missing DG info
Indira, an administrator, just installed a new switch. She has connected two servers with IP addresses of 192.168.105.20 and 192.168.105.30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff is able to ping the router on the other side of the switch at 192.168.105.1 from each of the servers. Also, Jeff can ping google from the router. Which of the following is the MOST likely cause of the problem?
/18
Jake has a network that he needs to subnet into 3 different networks. The original netmask is 255.255.0.0. What will the netmask of each of the new networks be?
SSH
Jason wants to be able to log into a network securely, with his user name and password sent over the network encrypted. Which of the following protocols would enable him to log in securely?
virtual servers
Jill is a network technician. She is concerned about power consumption, heat generated, and low space. What technology solves her problems?
SFTP, SCP
June needs to copy a file from one server to another securely. What protocol should she use? (select 2).
DNS
Many users on a small network report that while they can share files with each other, they can no longer access the internet. Troubleshooting reveals that Internet addresses are failing to resolve to IP addresses. Which technology is malfunctioning?
Install two NICs for bonding
Maria needs to install a server for a bank where up-time is a necessity. What could she do to add fault tolerance to the servers' network connections?
nslookup
Network technician John Watson, needs to check if the domain name resolution system is functioning properly. In Windows, which of the following software tools would he use to accomplish this?
ESSID
OSU uses this type of network identifier to enable multiple WAPs to use the same name.
someone you know
Personal authentication typically entails any or all the following except _________.
high availability, fault tolerance
Sam is setting up two pieces of networking equipment that are identical. He can use them in conjunction for what purpose? (select two)
Users have specified the wrong encryption type and routes are being rejected
Senior technician Klaus has installed a new WAP. Users are able to connect to it, but they cannot acccess the Internet. What is the MOST likely cause of the problem?
IP address and SNMP configuration
Several switches are being configured by a network technician so they can be remotely managed. Which switch element must be configured to support SSH connections to each of device, as well as retrieve various parameters?
at least 8 characters, combo on upper and lower case letters and numbers, change it every 30 days
Shelly has several users that are complaining about someone tampering with their computers. She knows their passwords suck. She recommends how to do better, (select three)
tagged VLAN
Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these?
Kerberos
TCP/UDP port 88 is the default for which of the following services?
All WEP keys include a 24-bit Initialization Vector and the WEP manufacturer chose not to include that
Tammy knows that WEP keys come in two lengths: 64-bit and 128-bit. However, when working with a WAP, she only sees options for 40-bit and 104-bit. What's happening?
is the place where the outside world connection connects to the internal connection
The Demarc ________ .
crosstalk
The LED lights on a NIC can indicate all the following except _________ .
archive bit
The __________ lets you know if a file has been backed up.
SSID
The ______________ is a 32-bit string inserted in the header of each frame processed by a WAP to identify the network.
baseline
The ______________ provides a "picture" of the network when working properly.
No personal information - like spouse and children names, no common words, a combination of letters and numbers
The best (most secure) passwords have which of the following characteristics?
18,000 ft
The most common maximum distance for both ISDN and DSL lines between the user and the central switch is:
Senior management and IT management should identify critical assets and critical nodes
The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?
A logical, rather than a physical switch used to connect devices on a network
The term virtual switch would best be described as which of the following?
Trunking
The traffic from multiple VLANS need to be combined and sent to a single port. Lulu belle, a network administrator, needs to configure the VLANs to enable this. Which of the following configuration changes would Lulu belle need to adjust?
MAC address
The unique physical address assigned to every network card is also known as a(n):
bridge
This allows each VM's virtual NIC to have a direct connection to the host machine's physical NIC.
modem
This device is used to change a digital signal to an analog signal and vice versa.
multiplexer
This device is used to combine multiple signals into one.
SONET
This protocol is used to transfer signals over the backbone of the Internet over fiber.
UDP
This protocol provides a connectionless transmission.
DSL
This technology uses PPPoE to authenticate.
ADSL
This type of DSL has faster download as compared to upload speeds.
whitelist
This type of MAC filtering provides the best option for security and management.
ad-hoc
This type of setup allows two computers to connect directly without extra hardware.
ATM
This uses a 53 byte cell size to send data.
443
To allow access to a s SSL/TLS enabled website, which port needs to be open?
443
To allow users to securely use a web interface that encrypts their connection to check their email from offsite, which port will need to be opened on your NAT?
IP sender, IP receiver, SM
To see if a message is destined for a machine on the same network, what pieces of information need to be compared? (select 3)
Traffic analysis
Users are reporting slow internet connection speeds. Network technician Zim suspects that users are streaming video and music. Which of the following would BEST confirm Zim's theory?
ping
Users report that an internal file server is inaccessible. Which of the following commands would be the MOST useful in determining Network-layer connectivity?
tracert
Users who are retrieving information from a company server on the network are experiencing slow access times. Which tool would provide access time information on each segment of the network to reach the server?
3
Using the below table, which line (1, 2, or 3 from top to bottom) describes where a packet destined for 65.42.3.54 will go?
SMS, email
What are typical ways of proactively communicating SNMP alerts? (select 2)
ACLs, firewall
What can a network administrator configure to control specific IP addresses and ports access to the internal network? (select two)
toner probe
What can a technician use to identify punch block terminations if the wiring diagram has been misplaced?
acceptable use policy
What could an employee look at to verify if he/she can use the internet on his/her work machine?
finished nature of the room
What do you not worry about when determining the location of a telecom room?
Memorandum of understanding
What document is used when a formal contract for services is not appropriate?
security policy
What documentation should you consult to find the requirements for password complexity?
Posture assessment is a Cisco process that queries a host to see if it meets certain security criteria
What does posture assessment do?
destination IP
What field in a packet is used for determining the route the packet will take?
switch, full duplex capability
What is needed to eliminate collisions on your Ethernet network?
Keeping clocks on a network synchronized
What is the NTP protocol used for?
more power
What is the benefit of using PoE+ (802.3at) over using PoE (802.3af)?
use bonding to connect two NICs on the server to the switch
What is the cheapest way to double throughput to an overused server
100 meters
What is the maximum cable length of 10GBaseT on Cat 6a?
Demarc
What is the name for the point where an IPS's responsibility for an Internet connection ends?
battery backup/UPS
What is the quickest and easiest technology available to keep servers and equipment up and running?
Provides a quantifiable reference to measure against current performance
What is the value of a baseline performance analysis?
destination port
What is used to designate the application that information sent across a network is destined for?
proxy server
What network device enables all of the network nodes to hide behind a single, public IP address?
star
What physical topology does 10BaseT use?
IP, SM, DG
What pieces of information are needed for a computer to function on an interconnected network?
53 UDP
What port number is used by DNS for common client lookup requests?
SNMP
What protocol would enable Jill, the admin of the Bayland Widget Corporations network, to monitor her routers remotely?
Only the 5-GHz band
What should 802.11n clients use to achieve MAXIMUM bandwidth throughput?
port forwarding
What technology allows you to forward a specific port from the WAN to a machine with a specific service on the LAN?
crossover
What type of cable is needed to connect two computers directly?
add a second NIC
What would offer the best fault tolerance to a new DHCP server?
against a wall
Where would a patch antenna for 802.11 usually be placed?
25
Which TCP port number is associated with SMTP?
ARP
Which TCP/IP protocol is used to resolve an IP address to a MAC address?
RBAC
Which access control model uses groups to assign access based on roles?
root
Which account has elevated privileges on a Linux box? (hint: also the name of a character on Person of Interest)
Cordless phone, microwave oven
Which appliances will most likely cause interference in an 802.11g network? (Select two)
OFDM
Which broadcasting method sends out signals on multiple frequencies concurrently while also hopping on different frequencies?
Broadband over powerline
Which choice is an economic approach to enable a home user with a single desktop computer to have internet access throughout the house?
ipconfig /all or nslookup
Which command do you use to see which domain server the client is assigned to forward DNS requests to?
RJ-45
Which connector type is used for Cat5e Ethernet?
repeater
Which device allows for a digital signal to be sent across spans which are outside the physical limits of the wire?
toner
Which device helps you locate and identify cables?
WPA2
Which encryption method provides for the use of a RADIUS server?
fault tolerance
Which is not a reason to use a bus topology?
cheaper
Which is not a reason to use fiber as opposed to twisted pair cable?
less memory usage
Which is not a reason to virtualize?
vertical cabling
Which is not one of the three components of structured cabling?
transport
Which layer of the OSI seven-layer model breaks outgoing data down into segments and reassembles incoming segments?
Smart jack
Which networking device enables you to troubleshoot remotely using a loopback?
WiMAX
Which of the following WAN technologies does not use traditional cabling methods as a network medium, but can be used for long distances?
NAT
Which of the following allows for the hiding of network IPs?
SHA2, MD5
Which of the following are hashes (select 2)?
wireless communication is half-duplex, hidden node problem
Which of the following are reasons that CSMA/CA is used?
Cat 5e Cat 6
Which of the following are typically used for horizontal cabling in a new installation (select two)?
multilayer switch, content switch
Which of the following can offer load balancing (select 2)?
1, 6, 11
Which of the following channels would you use for the wireless APs to facilitate the most WAPs without overlapping signals?
ESX
Which of the following does not need a host OS to run VMs?
virtual switch
Which of the following enables multiple VMs on a single box to communicate without traffic leaving the box?
IPsec
Which of the following encryption standards works at layer 3 of the OSI model?
speed
Which of the following is NOT a reason that a multilayer switch may be helpful?
RSA
Which of the following is NOT a symmetric-key encryption algorithm?
patch cable
Which of the following is NOT used to connect multiple hubs?
10.0.0.0/8
Which of the following is a private IP address?
Stateful inspection
Which of the following is an example of a firewall that checks all incoming traffic, then decides if the traffic should be allowed through or dumped?
virus
Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate/activate?
TTL
Which of the following is not a protocol used for VPNs?
switch
Which of the following is not a storage technology?
QoS
Which of the following is not part of configuration management?
listen for other SSIDs different from yours
Which of the following is not part of the distributed coordination function?
encryption
Which of the following is used to obscure the contents of a packet as it travels across the internet?
SMTP
Which of the following is used to send email between servers?
Kerberos
Which of the following standards is used by Windows for client authentication?
Virtual machines
Which of the following technologies enables multiple OSs to run at the same time on a single machine?
VoIP
Which of the following technologies would MOST likely require SIP ports to be open on a firewall?
MD5, SHA
Which options represent common hashing techniques? (Select two)
bluetooth
Which other common wireless technology can interfere with 802.11g signals?
21
Which port is used by passive FTP?
DWDM
Which protocol allows for greater throughput by assigning each signal a separate wavelength?
NTP
Which protocol needs to be enabled to allow Kerberos to work?
CWDM
Which selection is a multiplexing technology in WEN environments that combines multiple data streams onto a single fiber optic cable?
LWAPP
Which standard is commonly used to control thin-client wireless access points?
RAM
Which system component is typically the bottleneck when deciding how many VMs a physical box can hold?
Honeynet
Which technique would be used to test the network security of a particular network by allowing it to accept security attacks?
DOCSIS
Which technology enables data to be transported over wiring that carries cable television signals?
Jumbo frames
Which technology improves Ethernet data-transmission speed over a network?
IaaS
Which technology provides a Cloud-based computer that can be scaled-up as necessary, providing additional network capability, memory, CPUs, and storage?
goodput
Which term describes the rate at which usable information bits are delivered from one node to a destination?
behavior-based
Which type of IDS detects intrusions by examining traffic outside the "norm"?
Skype
Which type of application would benefit most from traffic shaping on a busy network?
CAT 6a
Which type of cabling is needed for speeds greater than a gigabit?
symmetric and asymmetric
Which type of encryption is used when securely sending a payment over the internet?
authoritative
Which type of name server is an SOA server?
SNMP
Which type of protocol is used to automate the updating of multiple VLAN switches?
Star
Which type of typology typically uses a hub to connect multiple machines?
VMware Workstation
Which virtualization technology is not necessarily part of the cloud?
n
Which wireless standard provides the best possible throughput?
The UNIX server IP will begin 192.168.4. And the final octet can be 2 or any number between 4 and 254.
You are attempting to connect to a UNIX server on your subnet. Your IP address is 192.168.4.3 with a subnet mask of 255.255.255.0 and your default gateway is 192.168.4.1. Which of the following is correct?
54 Mbps
You are creating a wireless network infrastructure for your company. You have three 802.11g WAPs to install. You decide to install them all within 50 meters of each other and set the channel to 1. After you finish the installation, what will the theoretical bandwidth of your network be?
SSL
You are looking into setting up a VPN connection at your offices and you want the VPN to operate at the highest layer of the OSI model. Which protocol would allow this?
CSMA/CD
You are using Gigabit Ethernet for the backbone of you LAN. Which of the following access methods does Gigabit Ethernet use?
cat5e cable, switch
You have been tasked with doing some consultant work for a small business. They want eight computers to be networked together. The small business wants their users to be able to share files with one another but not access the public internet. What items will you need to setup to get them up and running? (Select two.)
mesh
You have infinite resources (time, money, etc.). Which topology would you setup to get the best overall service?
Snips
You have just entered your MDF and are about to do a major upgrade on your network. In order to do so, you need to cut 100 pairs of wire in half. What tool will you use to do this?
the router does not let it pass through
You have just installed a new router in your organization and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats broadcast packets on your network?
Implement VLANs on the switch
You have only one switch but you want it to support two separate network segments. What should you do to accomplish this?
OC1
You need to provide at least 50 Mbps to your office. What is the minimum one-line solution you could use?
When a router has been moved to another location
You work as an assistant network administrator for a medium sized company. You have been tasked with maintaining your company's configuration management documentation. When would it be a good time to make updates to your network maps?
198
Your subnet mask is 255.255.255.0. Your IP address is 210.35.156.198. What is the host ID?
a device can send and receive data simultaneously
Your supervisor tells you that he wants to install cable and NICs that will run full duplex. What does he mean by full duplex?
authorization
________ involves defining what a person accessing data can do with it.
clustering
__________ involves using multiple servers to provide load balancing.
hypervisor
__________ is an extra layer of programming to manage interaction between multiple OS's and hardware without the need for a host OS.
Port mirroring
__________ is used to redirect all traffic on a switch to a particular port.
modal distortion
____________ refers to the "direction" light goes down a channel.
caching
____________ stores requested data for subsequent use.
QoS
______________ adds a priority bit to give certain applications priority.