Network+ Chapter 7-9 Exam
A subnet of 255.255.248.0 can be represented by what CIDR notation?
/21
An IP address of 192.168.18.73/28 has what network ID?
192.168.18.64
By default, when using classful addressing, how many bits exist in the host portion of a Class A address?
24
How many /64 subnets can be created within a /56 prefix?
256
Which of the following is NOT a task that a VPN concentrator is responsible for?
A VPN concentrator shuts down established connections when malicious traffic occurs.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides
When using IPv6, what would a /64 network likely be assigned to?
A small organization or business
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
FCS
All that is needed to provide communication between two VLANs is a DHCP relay agent.
False
Different types of organizations have similar levels of network security risks.
False
It is ideal to use the same password for multiple different applications, provided the password is complex enough.
False
The original version of the Secure Hash Algorithm was developed by MIT.
False
Which command can be used on a Windows system to create a hash of a file?
Get-FileHash
What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
IPsec
What is the Nmap utility used for?
It is port scanning utility that can identity open port in a host
What does the VLAN Trunk Protocol (VTP) do?
It shares VLAN database information amongst switches that participate.
The combination of a public key and a private key are known by which of the following terms?
Key pair
A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?
Layer 2
By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?
NAT mode
With VTP, where is the VLAN database stored?
On the switch that is known as Stack Master
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
Open VPN
What term is used to describe a space that is rented at a data center facility by a service provider?
Point of Presence(PoP)
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
Principle of least privilege
What statement regarding the different versions of the SHA hashing algorithm is accurate?
SHA 2 and SHA 3 both support same hash length
To generate a public and private key for use with SSH, what command line utility should you use?
SSH keygen
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH support port forwarding
On a Linux based system, what command can you use to create a hash of a file using SHA-256?
Sha254sum
You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?
Show vlan
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
Tailgating
In an IPv6 address, what do the first four blocks or 64 bits of the address represent?
The site prefix or global routing prefix
A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.
True
A drop ceiling could be used by an intruder to gain access to a secured room.
True
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
IPv6 addressing does not utilize classful addressing; therefore every IPv6 address is classless.
True
Over a long-distance connection, using SSH keys is more secure than using passwords.
True
PPP can support several types of Network layer protocols that might use the connection.
True
Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.
True
The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.
True
The day after Patch Tuesday is informally dubbed Exploit Wednesday.
True
To identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.
True
Office 365 is an example of an SaaS implementation with a subscription model.
Ture
VMware Player and Linux KVM are both examples of what type of hypervisor?
Type-2 hypervisoer
When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?
VLAN 1001
What is NOT a potential disadvantage of utilizing virtualization?
Virtualization software increases the complexity of backups, making creation of usable backups difficult.
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
acceptable user policy document
An interface that manages traffic from multiple VLANs is known by what term?
aggregation port
How often should you require users to change their passwords?
every 60 days
On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?
ip helper-address
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?
quid pro quo
Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?
router-on-a-stick