Network+ Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____________ policies detail how a security break or disaster is dealt with.

Incident response

To obtain the IEEE speed designated as high, clients are within how many meters of the AP? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550

A 40 to 125

An RJ-11 connector is which type? A 6P2C B 6P4C C 6P6C D 8P8C

A 6P2C

Which IEEE standard defines the communication protocol for Ethernet? A 802.3 B 802.5 C 802.11 D 802.15

A 802.3

Which protocol is used to convert logical IP addresses to physical MAC addresses? A ARP B DNS C IMAP4 D RIP

A ARP

Which WAN technology that's used to connect a small ISP or large business to a regional ISP, and a regional ISP to an Internet backbone, uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic? A ATM B E1/E3 C Frame relay D T1/T3 E X.25

A ATM

Which type of hubs repairs weak signals by actually retransmitting the data with proper transmission voltage and current? A Active B Intelligent C Passive D Switching

A Active

To which TCP/IP architecture layer do e-mail and Web browser protocols belong? A Application B Internet C Network Interface D Transport

A Application

Which of the following are default Windows Logs? (Choose all that apply.) A Application B Hardware C Media Player D Security

A Application D Security

Multilayer switches combine Layer 2 data switching with Layer 3 routing using which of the following? A Application-specific integrated circuit (ASIC) B MPLS C Round robin D Specialized software

A Application-specific integrated circuit (ASIC)

The 802.1x standard requires which roles in the authentication process? (Select all that apply.)

A Authentication server B Authenticator D Requesting access device

After installing the DHCP Server service on a domain member server, what must be done in Active Directory before it begins delivering leased IP addresses? A Authorize it. B Reinstall Active Directory. C Activate it. D Modify the firewall rules.

A Authorize it.

Which wireless technology is used to create a connection between two devices? (Select all that apply.) A Bluetooth B Infrared C Radio D Wi-Fi E WiMAX

A Bluetooth B Infrared

In which network topology is each node connected to the next by a direct line so that a continuous line is formed? A Bus B Mesh C Ring D Star

A Bus

Repeaters are typically used on what type of network? A Bus B Star C Ring D Hybrid

A Bus

Which network topologies can you use with Ethernet networks? (Choose all that apply.) A Bus B Mesh C Ring D Star

A Bus D Star

Which TCP/IP-based management protocol implemented on routers provides for security? A CMIP over TCP/IP (CMOT) B Common Management Information Protocol (CMIP) C Simple Network Management Protocol (SNMP) D SNMPv3

A CMIP over TCP/IP (CMOT)

Before data gets onto a T1 line, it must be cleaned and formatted by a device called what? A CSU/DSU B Router C Hub D Demarc device

A CSU/DSU

Which network medium contains a layer of braided wire or foil between the core and the outside insulating layer, plus another layer of plastic or rubberized material that separates the central core from the shielding layer? A Coaxial B Twisted pair C Fiber optic D Wireless

A Coaxial

Which of the following are types of events reported in Event Viewer? (Choose all that apply.) A Critical B Error C Logon D Logoff

A Critical B Error

Which of the following are client options that can be set at the scope level? (Choose all that apply.) A DNS B WINS C ROUTER D MAC address

A DNS B WINS C ROUTER

What type of bridge can package frames of one format into the format of another? A Encapsulating B Heterogeneous C Translating D Transparent

A Encapsulating

Many companies run what type of cabling as their backbone media? A Fiber optic B Solid twisted pair C Stranded twisted pair D Coaxial

A Fiber optic

Which protocol is responsible for the logical addressing of each packet created by the transport layer? A IP B RIP C TCP D UDP

A IP

At a minimum, which IPv4 address components must you configure in order to communicate on your local subnet? A IP address B Subnet mask C Default gateway D DNS server address

A IP address B Subnet mask

Repeaters operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

A Layer 1 - Physical

Which OSI layer transmits bits from one computer to another and regulates the transmission stream over a medium? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

A Layer 1—Physical

Which content switch load balancing method indirectly accounts for differences in server processor speeds? A Least connections B Round robin C Weighting

A Least connections

Which of the following display types can you use to display data in Performance Monitor? A Line graph B Pie chart C Histogram D Pictogram

A Line graph C Histogram

In which network type does each host on the LAN has the same authority as other hosts? A Peer-to-peer network B Local area network C Client/server network D Wide area network

A Peer-to-peer network

The original four NAPs are called what? A Public Internet exchange points B Private Internet exchange points C Commercial Internet Exchange (CIX) points D Federal Internet Exchange (FIX) points

A Public Internet exchange points

Modems use which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45

A RJ-11

If you're using copper cable, what type of cable do you use for user and patch cords? A Solid B Stranded

A Solid

Which standard specifies UTP standards for workstation runs? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.

A TIA/EIA-568-C

What is the pinout difference between the T568A and T568B standards? (Select all that apply.) A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 D The wire color attached to pin 4 E The wire color attached to pin 5 F The wire color attached to pin 6 G The wire color attached to pin 7 H The wire color attached to pin 8

A The wire color attached to pin 1 B The wire color attached to pin 2 C The wire color attached to pin 3 F The wire color attached to pin 6

Define bastion host.

A bastion host is a computer that is located between the Internet and your intranet. It has two network cards, one for each network. Communications between the networks is typically blocked to prevent inbound access to intranet systems.

According to the 802.11 standard, an access point is _____________.

A device that acts as a transparent bridge between wireless clients and a wired network.

What is a RADIUS realm?

A realm defines a namespace.

_____________ policies address the use of computer equipment and network resources for personal use or use that doesn't benefit the organization.

Acceptable use

Why would an administrator use password cracking tools?

Administrators often use them as well to test how vulnerable their network is to attacks. They might also use the tools to access systems or devices where the password has been lost.

What might be the cause if you are unable to connect to radio wireless device?

Answers include: • Out of range • Interference from electrical motors or equipment • Drivers not installed • Wireless router turned off • Security settings preventing connections

List four network function tests you can perform with a cable testing device.

Answers include: • Verifying if PC is ON, if it appears as a PC and maximum speed • Verifying if hub is ON, if it appears as a hub and maximum speed • Verifying PC to hub speed and data transmission • Verifying hub to hub data transmission • Determining if straight thru or crossover patch cable is required • Finding speed bottlenecks on LANs • Monitoring LAN link between two devices

Name at least two actions you should take to limit risk of attacks on your network devices (switches, routers, and so forth).

Answers should include: • Changing default passwords • Disabling features, protocols, and options you do not need • Applying firmware and software updates regularly • Monitoring physical and virtual access to your network and devices

What are the three VPN security models?

Authentication before connection, trusted delivery network, and Secure VPN

What are the three steps of the AAA model?

Authentication, authorization, and accounting

VPNs generally use __________, __________, and __________ to enable secure remote connections across insecure networks.

Authentication, tunneling, and encryption

An IPv6 subnet ID is how many bits long? A 8 B 16 C 32 D 64

B 16

The standard BNC barrel connector is considered a how-many-pin connector? A 1 B 2 C 3 D 4

B 2

How many octets are in an IPv4 address? A 2 B 4 C 8 D 16

B 4

For which port must you create a Windows Firewall exception when using HTTP in event forwarding? A 45 B 80 C 180 D 443

B 80

Ratified in 2003, which standard is a combination of 802.11a and 802.11b? A 802.11c B 802.11g C 802.11h D 802.11n

B 802.11g

Of the four components to security on a wireless network, to which one does a RADIUS server belong? A Access control B Authentication C Encryption D Isolation

B Authentication

Which Ethernet standard designates fiber optic cabling as its required medium? (Choose all that apply.) A BASE-CX B BASE-R C BASE-T D BASE-W E BASE-X

B BASE-R E BASE-X

Which wireless protocol is a short-range wireless technology limited to transmission distances of about 100 meters or less? A 802.11a B Bluetooth C Wi-Fi D WiMAX

B Bluetooth

Which type of address is written in the standard 4-part dotted decimal address, followed by /N where N is a number from 0 to 32? A APIPA B CIDR C IPv4 D IPv6

B CIDR

Which WAN connection technology currently uses Enhanced Data rates for GSM Evolution (EDGE), Evolution-Data Optimized (EV-DO), or High-Speed Downlink Packet Access (HSDPA)? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

B Cellular

What are two popular options for horizontal runs to modular office systems? (Select two.) A Cable trays B Consolidation points C Multiuser outlets D Straight runs E Splices

B Consolidation points C Multiuser outlets

Which occurs because alternating electrical current flowing through a wire creates an electromagnetic field around the wire? A Attenuation B Crosstalk C Interference D Shorts

B Crosstalk

The point at which the communications network owned by one company connects to the communications network owned by another company is called what? A Cross-connect B Demarc C Entrance facility D Main distribution frame

B Demarc

Which protocol do Web browsers and Web servers use most often? A FTP B HTTP C HTTP(S) D TFTP

B HTTP

When wiring Ethernet in a star topology, the internetworking device you use to take the signal transmitted from one computer and propagate it to all the other computers on the network is which of the following? A Bridge B Hub C Repeater D Switch

B Hub

The ping utility is the most common use of which protocol? A ARP B ICMP/ICMPv6 C IGMP D RIP

B ICMP/ICMPv6

A 16-byte address displayed in hexadecimal is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address

B IPv6 address

Which type of hub is yet to be defined, but might include management features and support the TCP/IP Simple Network Management Protocol (SNMP)? A Active B Intelligent C Passive D Switching

B Intelligent

To which TCP/IP architecture layer do routing protocols belong? A Application B Internet C Network Interface D Transport

B Internet

Which command displays the IP address of the host and other configuration information? A Getmac B Ipconfig C Nslookup D Ping

B Ipconfig

Bridges operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

B Layer 2 - Data link.

Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server network D Wide area network

B Local area network

In which network topology do all nodes have independent connections to all other nodes? A Bus B Mesh C Ring D Star

B Mesh

The diameter of fiber optic cable is expressed in which measurement? A Centimeters B Microns C Millimeters D Ohms

B Microns

Which of the following event delivery optimization settings might you use when collecting events from a branch office that's connected over a slow WAN link? A Minimize Latency B Minimize Bandwidth C Maximize Bandwidth D Maximize Latency

B Minimize Bandwidth

The two most common Interior Gateway protocols are: A NAT B OSPF C RIP D SNMP

B OSPF C RIP

Impedance is measured in which of the following? A Nanoseconds B Ohms C Millimeters D Volts

B Ohms

Which connection type uses two directional antennas to make the wireless link? A Indoor point-to-multipoint LANs B Outdoor point-to-point links C Outdoor point-to-multipoint links D Wi-Fi E WiMAX

B Outdoor point-to-point links

Which terminating device has the following advantages? • It's a permanent link. • Channel testing is easier. • It's a solid connection. • Moves easily. A Connecting block B Patch panel

B Patch panel

__________ are designed to fix security vulnerabilities. A Hotfixes B Patches C Updates D BIOS updates

B Patches

Thicknet cables are which type? (Choose all that apply.) A RG-6 B RG-8 C RG-11 D RG-58 E RG-59

B RG-8 C RG-11

Which of the following Radio Guide cable categories is used for Ethernet networking? (Select all that apply.) A RG-6 B RG-8 C RG-9 D RG-11 E RG-58 F RG-59

B RG-8 D RG-11 E RG-58

Which standard addresses the entrance facility, equipment room, backbone pathways, telecommunications room, and horizontal pathways? A TIA/EIA-568-C B TIA/EIA-569-A C TIA/EIA-606 D There is no standard for these components.

B TIA/EIA-569-A

Which network medium is composed of four pairs of wires, where the pairs are twisted together and bundled within a covering? A Coaxial B Twisted pair C Fiber optic D Wireless

B Twisted pair

Which of the following cities hosts one of the four original NAPs? (Choose all that apply.) A San Francisco, CA B Washington, DC C New York, NY D Seattle, WA E Chicago, IL

B Washington, DC E Chicago, IL

Which utility enables you to reset a computer's network adapter? A Network Map B Windows Network Diagnostics C IPConfig D Local Area Connection

B Windows Network Diagnostics

___________ combine the characteristics of bridges and routers.

Brouters

In a UTP installation, you don't want to exceed what distance from the user's equipment to the final termination point in the telecommunications room? A 10 meters B 90 meters C 100 meters D 1000 meters

C 100 meters

What AWG gauge is most common for cross-connect jumpers? A 20 B 22 C 24 D 26

C 24

What is the default subnet mask for a Class C IP address? A 255.0.0.0 B 255.255.0.0 C 255.255.255.0 D 0.255.255.255

C 255.255.255.0

How many octets are part of the network ID when using the subnet mask 255.255.255.0? A 1 B 2 C 3 D 4

C 3

With VLAN trunking, a single network adapter can virtualize "n" number of network adapters. "n" has a theoretical limit of what? A 90 B 1000 C 4096 D 5012

C 4096

How many bits are in an octet? A 2 B 4 C 8 D 16

C 8

Which network type requires a network operating system (NOS)? A Peer-to-peer network B Local area network C Client/server network D Wide area network

C Client/server network

Which is WAN connection technology that uses high-speed connections made over regular analog phone lines? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

C DSL

Which type of crosstalk is a calculated value of the crosstalk between pairs measured at the far end of the cable? A Near End Crosstalk (NEXT) B Far End Crosstalk (FEXT) C Equal Level Far End Crosstalk (ELFEXT) D Pair to Pair Crosstalk

C Equal Level Far End Crosstalk (ELFEXT)

Which of the following is the local group you can use to grant permissions to view event logs on a remote computer? A Event Log Managers B Event Log Admins C Event Log Readers D Event Log Browsers

C Event Log Readers

Which network medium carries light-based data through strands of glass or plastic no thicker than a human hair? A Coaxial B Twisted pair C Fiber optic D Wireless

C Fiber optic

Routers operate at which OSI layer? A Layer 1 - Physical B Layer 2 - Data link. C Layer 3 - Network D Layer 4 - Transport

C Layer 3 - Network

Which OSI layer addresses data messages, translates logical addresses into actual physical addresses, and routes data to addresses on the network? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

C Layer 3—Network

The built-in identifying address coded into the NIC by the manufacturers is called which of the following? A IPv4 address B IPv6 address C MAC address D Port address

C MAC address

Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages

C Media access method

When the signal from one pair of wires interferes with the signal on another pair of wires, it's called what? A Attenuation B Impedance C Near End Crosstalk D Signal degradation

C Near End Crosstalk

To which TCP/IP architecture layer do the media access methods belong? A Application B Internet C Network Interface D Transport

C Network Interface

In which type of network is data is broken up into packets before it's sent over the network? A Point-to-point B Point-to-multipoint C Packet-switching D Circuit-switching

C Packet-switching

What are the two choices you have for terminating network wiring in the telecommunications room? (Choose two.) A Cross-connect B LAN router C Patch panel D Punchdown terminal

C Patch panel D Punchdown terminal

Backbones, workstation runs, and cross connects are part of what type of wiring? A Horizontal runs B Movable wiring C Permanent wiring D Vertical cabling

C Permanent wiring

Bridges filter based on which of the following? A Host name B Domain C Physical address D Signal quality

C Physical address

In which network topology is each node connected to a central device by two wires? A Bus B Mesh C Ring D Star

C Ring

Physically, Token Ring networks look like a star, but they operate like which topology? A Bus B Hybrid C Ring

C Ring

Which of the following is another name for default gateway? A Host B Hub C Router D Switch

C Router

Which e-mail protocol is used to send and receive e-mail messages between e-mail servers and used by e-mail client software to send messages to the server, but never used to retrieve e-mail from a server? A IMAP4 B POP3 C SMTP

C SMTP

What is the default lease length used by a wired scope created in the Windows Server 2008 DHCP Service? A Three hours B Three days C Six days D Eight days E 30 days

C Six days

Which is a simple software-based protocol analyzer? A The command-line utility ARP B The command-line utility IPCONFIG C The Windows Network Monitor utility D The Windows Network Control Panel utility

C The Windows Network Monitor utility

The interface on the access point used to connect to the existing wired network is typically called what? A Antenna B Transmitter C WAN port D Wireless NIC

C WAN port

Which of the following is the most widely used wireless technology at present? A 802.11a B Bluetooth C Wi-Fi D WiMAX

C Wi-Fi

Which network component is most vulnerable to performance problems caused by poor installation practices? A Clients B Servers C Wiring D Network transmission devices

C Wiring

Which command would you use to verify name resolution (DNS) settings? A ipconfig B ping C nslookup D tracert

C nslookup

______________ is an acronym for the channel access method that avoids collisions rather than detecting them.

CSMA/CD

_____________ policies describe the set of procedures followed whenever a network change is made.

Change management

Which Ethernet standard is the fastest? A Twisted Pair Ethernet B Fast Ethernet C Gigabyte Ethernet D 10GbE

D 10GbE

How many bits is an IPv6 address? A 8 B 32 C 64 D 128

D 128

Which is not a valid subnet mask? A 255.255.0.0 B 255.247.0.0 C 255.255.255.0 D 255.0.255.0

D 255.0.255.0

For which port must you create a Windows Firewall exception when using HTTPS in event forwarding? A 45 B 80 C 180 D 443

D 443

You should place your wireless LAN access points within how many meters of the wireless clients? A 40 to 125 B 55 to 200 C 60 to 90 D 90 to 400 E 115 to 550

D 90 to 400

Which of the following is a reason to revoke a certificate? A A newer certificate has been issued to the user or computer. B The private key has become known to someone other than the holder. C The user or computer is no longer employed by the company. D All of the above.

D All of the above.

An IPv4 packet sent to all workstations on the network is called a __________. A Directed packet B Unicast C Multicast D Broadcast

D Broadcast

What was introduced to make IPv4 Internet routing more efficient? A Subnet masks B Switches C DHCP D CIDR

D CIDR

IP address 227.43.76.109 is an example of which of the following classes of IP addresses? A Class A B Class B C Class C D Class D

D Class D

Which type of network cable transmits digital signals in the form of pulses of light? A Coaxial B Unshielded Twisted Pair (UTP) C Shield Twisted Pair (STP) D Fiber Optic

D Fiber Optic

For LAN cross-connects, how many pairs of wires are in the cable? A One B Two C Three D Four

D Four

Which OSI layer divides long communications into smaller data packages, handles error recognition and correction, and acknowledges the correct receipt of data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

D Layer 4—Transport

Which of the following are router protocols? (Choose all that apply.) A ATM B Frame relay C IPX D RIP E OSPF F TCP/IP G X-25

D RIP E OSPF

Twisted pair network cable uses which RJ connector? A RJ-11 B RJ-14 C RJ-25 D RJ-45

D RJ-45

In which network topology is each node connected to a central network transmission device such as a hub or a switch? A Bus B Mesh C Ring D Star

D Star

Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment? A Bridge B Hub C Router D Switch

D Switch

The device on a NIC card that converts the data that it receives from the system into a signal that's appropriate to the network is called a ______________. A Port B PROM chip C Receiver D Transceiver

D Transceiver

To which TCP/IP architecture layer do TCP and UDP belong? A Application B Internet C Network Interface D Transport

D Transport

Which TCP/IP architecture layer makes use of ports? A Application B Internet C Network Interface D Transport

D Transport

Which encryption method uses Advanced Encryption System (AES) cipher for stronger encryption? A 802.11i B WEP C WPA Personal D WPA2

D WPA2

Which network medium is a popular choice for outdoors or in an historic building? A Coaxial B Twisted pair C Fiber optic D Wireless

D Wireless

_______________ servers match host names to IP addresses.

DNS

Analytical and __________ logs are hidden by default and generally used only by developers.

Debug

You'd use the LAN __________ Data Collector Set to troubleshoot network performance.

Diagnostics

Rather than destroying or stealing data, a ____________ attack is designed to disrupt daily standard operation.

DoS

Man-in-the-middle attacks can be used for what types of attacks?

DoS, Web spoofing, information theft, and TCP session hijacking

_____________ means that reasonable precautions are being taken which indicates that the organization is being responsible.

Due care

Which categories of UTP cabling can be used in Gigabit Ethernet networks? (Select all that apply.) A CAT 1 B CAT 2 C CAT 3 D CAT 4 E CAT 5 F CAT 5e G CAT 6 H CAT 6e I CAT 7

E CAT 5 F CAT 5e G CAT 6 H CAT 6e

Which type of coaxial cable is used for low-power video and RF signal connections? A RG-6 B RG-8 C RG-11 D RG-58 E RG-59

E RG-59

Which OSI layer provides security, encryption, and compression for the data? A Layer 1—Physical B Layer 2—Data Link C Layer 3—Network D Layer 4—Transport E Layer 5—Session F Layer 6—Presentation G Layer 7—Application

F Layer 6—Presentation

Which is WAN connection technology that uses encryption and security protocols to create a private network over a public network? A Cable B Cellular C DSL D DUN E Satellite F VPN G Wireless

F VPN

True or false? Network Map is enabled by default in Windows Vista computers within an Active Directory domain.

False

True or false? TACACS+ is backward compatible with TACACS and XTACACS.

False

True or false? The IP address 169.254.226.4 can be routed on the Internet.

False

True or false? A star Ethernet might be faster than a bus Ethernet, especially if there are many nodes on the network.

False. A star Ethernet might be slower than a bus Ethernet, because the hub generates a lot of data traffic that isn't used. It replicates all the data it receives from any source and sends it to every node.

True or false? To enable remote access to your network, you must provide services for authentication, authorization, and accounting.

False. Accounting functions are optional.

True or false? Events are collected in event reports.

False. Events are collect in event logs.

True or false? Firewalls are hardware devices.

False. Firewalls can be implemented as hardware or software.

True or false? The System Diagnostics Data Collector Set runs for exactly 5 minutes.

False. It runs for 1 minute.

True or false? Windows 2000 Professional clients have no way of supporting IEEE 802.1x authentication.

False. Microsoft provides an 802.1x Authentication Client download that allows Windows 2000 computers to use the 802.1x standard.

True or false? On the majority of today's laptop computers, the network adapters are PC Cards.

False. Network adapters are standard equipment on notebook computers now.

True or false? In Windows Vista, you use the software that comes with your modem to create dial-up connections to remote servers.

False. Once you've installed a modem on your computer, you establish a connection to an ISP's dial-up server or a company's remote access server by using Windows Vista's "Set up a connection or network" wizard.

True or false? PCI-based modems are less expensive to purchase because the CPU must handle all the processing, making them cheaper to produce.

False. The CPU handles all the processing for an AMR, CNR, or ACR modem, sound card, or network card.

True or false? The internetworking device used to connect computers on a Token Ring network is called a Token Ring hub.

False. Token Ring networks use Multistation Access Units (MSAUs).

True or false? The star topology uses a central networking device called a multistation access unit (MSAU).

False. Token Ring networks use a multistation access unit (MSAU).

True or false? A WINS server is necessary for address translation between IP addresses and network nodes' FQDNs.

False. WINS is used for NetBIOS names.

True or false? You must enable the Windows Event Collector service on the source computer when configuring event forwarding.

False. You must configure it on the collecting computer.

Why might you filter outgoing traffic between your DMZ and the Internet?

Filtering outgoing traffic that is initiated by a DMZ computer would prevent your systems from being used to take part in distributed denial-of-service attacks.

How can you remove an update from Windows Vista?

From the Windows Update window, click View update history. Click the Installed Updates link on the Review your update history page. If the update can be removed, Uninstall is displayed in the toolbar. Click Uninstall to remove the update.

A smurf attack overwhelms a host by flooding it with ____________ packets.

ICMP

You can use the command-line utility _______________ to retrieve a computer's IP configuration.

IPCONFIG

A(n) _________ device can terminate a network connection or user session.

IPS

You install a(n) ____________ device on the perimeter of your network to monitor for and stop threats before they are passed on your network.

IPS

Diameter provides better security than RADIUS by providing end-toend security using __________ or __________.

IPsec or TLS

Smaller companies and individuals use a(n) ____________ to make the connection to a commercial backbone.

ISP

What steps can you take to minimize electrical interference on your wired LAN?

Install cables in separate conduits away from items such as electric motors (like those found in lifts/elevators), fluorescent lights, and air conditioners. In areas where there's an abundance of electrical noise, use shielded cables or other technologies such as fiber optic cables to avoid interference.

List some of the items a dumpster diver seeks.

Internal phone directories, organizational charts, policy manuals, calendars, outdated hardware, systems manuals, network diagrams, other technical information sources.

The three main zones into which you can divide a network are the _________, _________, and _________.

Intranet, perimeter network (or DMZ), and extranet (or Internet)

How does the code of ethics in a human resources policy relate to computer security?

It defines the stance of the organization on information security and demands that users act honestly, responsibly, and legally to protect the organization's information.

What is meant by operating system hardening?

It is the process of modifying an operating system's default configuration to make it more secure from outside threats.

You're configuring your network switch to improve its security. You have changed the default password for the unit's Web interface. What else should you configure to be sure all management interfaces have been locked down?

Make sure to secure TELNET and SNMP interfaces. Also, if available, block access to management interfaces from all external network locations. In the case of wireless devices, block access to management interfaces over wireless connections (allow wired connections only).

Why can't computer equipment just be thrown in with the regular trash?

Many pieces of computer equipment contain hazardous materials and heavy metals. Also, you want to make sure that any information stored on the equipment is not able to be retrieved.

_____________ fiber optic cable is used mostly for short distances (up to 500 m).

Multi-mode

Which is more secure, an LM hash or an NTLM hash? Why?

NTLM hashes are more secure. LM hashes start by converting all characters to uppercase then storing the hash in two 7-byte strings; longer passwords are truncated and shorter passwords are padded with null characters.

A ___________________ name is a 16-character name, with the first 15 characters available for the name and the 16th character reserved to describe a particular service or functionality.

NetBIOS

For Windows Server 2008, Microsoft's RADIUS server is called __________.

Network Policy Services (NPS)

CHAP is an authentication scheme used by _________ servers to validate the identity of the remote user.

PPP

Name two VPN protocols.

PPTP and L2TP are the most common. IPsec can be used with VPNs, though it is a general network protocol.

An AP typically broadcasts its _____________ so clients can discover its presence.

SSID

____________ attacks flood a server with half open TCP connections which prevent users from being able to access the server.

SYN flood

What are the three LDAP Bind methods?

Simple Bind, SASL (Simple Authentication and Security Layer), and Anonymous BIND

TACACS+ uses __________ rather than UDP for messages.

TCP

List at least three primary causes for compromised security.

Technology weaknesses, configuration weaknesses, policy weaknesses, human error or malice.

SSH was designed as a replacement for ________________ and other insecure remote shells, which sent data (including passwords) in plaintext.

Telnet

In RADIUS terminology, what is the name given to the system that provides connectivity services for remote computers?

The RADIUS client

In RADIUS terminology, what is the name given to the system that provides authentication services for remote computers?

The RADIUS server

TACACS+ provides better message security than RADIUS because it encrypts __________.

The entire message and not just the message body.

What are the two IPsec encryption modes?

Transport and tunnel

A __________ is a program that poses as something else, causing the user to 'willingly' inflict the attack on himself or herself.

Trojan horse

True or false? 802.11b, 802.11a, and 802.11g are all considered Wi-Fi.

True

True or false? A LAN becomes a WAN when you expand the network configuration beyond your own premises and must lease data communication lines from a public carrier.

True

True or false? A computer will use a default gateway if the destination IP address is on a different network.

True

True or false? A traffic shaper can limit the amount of bandwidth a certain type of traffic is allowed to use.

True

True or false? Brouters operate at both the network layer for routable protocols and at the data link layer for non-routable protocols.

True

True or false? Event Viewer is a Computer Management component.

True

True or false? It is important when training users to alert them to ways that attackers attempt to gather personally identifiable information and information about the organization's network.

True

True or false? Kerberos authenticates users and servers over an open multi-platform network using a single login procedure.

True

True or false? Routers were designed to prevent unnecessary broadcasts in bridged networks

True

True or false? Wireless Zero Configuration enables Windows Vista and Windows XP computers to automatically connect to available wireless networks.

True

True or false? You can safely distribute your public key to others.

True

True or false? Routers have a lower throughput than bridges.

True. A router activity needs more processor time, more memory, and multiple network connections.

True or false? In a star topology, when a single connection fails, it doesn't affect the communication ability of other computers.

True. In the star topology, when a single connection fails, it doesn't affect the communication ability of other computers connected to the same network transmission device.

True or false? The purpose of a modem is to convert digital data signals from the computer into analog signals for transmission over the phone line.

True. It also converts analog signals received from the phone line back into digital signals for the computer.

True or false? TCP is a connection-oriented protocol that creates and verifies a connection with a remote host before sending information.

True. UDP is connectionless.

True or false? You terminate both workstation drops and backbone wiring using the same device.

True. You can use the same patch panel or punchdown to terminate both workstation drops and backbone wiring.

How does antivirus software recognize new viruses and worms?

Updated virus definitions are downloaded.

Where do you need to look to determine whether a service pack has been installed?

View Computer Properties, and in the Windows edition portion of the page it will indicate if a Service Pack has been installed.

What is the Windows Vista built-in spyware protection function called?

Windows Defender

When a router also acts as a firewall, it's called a _____________ router.

screening

Why is it necessary to have a disposal and destruction of computer equipment policy?

You should have a disposal and destruction policy for computer equipment so that when equipment is decommissioned that the information on the components cannot compromise the security of the network and the organization.

Large networks are frequently broken down into manageable pieces called _______________.

segments

Fiber optic cabling is often used as the ____________ for networks.

backbone

Ethernet _____________ combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers.

bonding

The benefit of a ___________ topology is that it's simple and inexpensive to set up.

bus

A wire map test checks for wiring errors and __________ faults.

cable

War _____________ is the process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand.

chalking

The Internet Assigned Numbers Authority (IANA) implemented _____________ IPv4 addresses in order to differentiate between the portion of the IP address that identifies a particular network and the portion that identifies a specific host on that network.

classful

_____________ cable has the best wiring value and expansion capability.

composite

When monitoring a computer using Performance Monitor, you must add __________ to display real-time data on the line graph.

counters

Minimize sharp bends in the cable, which can distort the _____________ characteristics of the cable.

electrical

Security on a WLAN is accomplished by _______________ the MAC addresses of wireless NICs that are allowed to use the access point and by encrypting data sent over the wireless LAN.

filtering

In a(n) ______________ site survey, you temporarily set up your WAPs at the locations you're considering for permanent placement.

informal

What command should you enter to view the Host Name and DNS Server address?

ipconfig /all

When a bridge has a LAN link directly attached on each side, it's known as a ___________ bridge.

local

The ___________ topology is extremely fault tolerant, but expensive to implement.

mesh

Least privilege refers to employees having only information that they _____________.

need to know

The patch panel is then connected to the multiport hub by __________ cables.

patch

Cables that run in _______________ must meet applicable fire protection and environmental requirements.

plenums

An example of a ________________ connection is the dial-up connection from a computer to an ISP.

point-to-point

In event forwarding, under normal settings, the collecting computer uses a __________ method to obtain events from a source computer.

pull

You use the wecutil __________ command to enable and configure the Windows Event Collector service on a collecting computer.

qc

You use the winrm __________ command to enable and configure the Windows Remote Management service on a source computer.

quickconfig

In a WLAN, the wireless NIC allows nodes to communicate over ____________ distances using radio waves, which it sends to, and receives, from the hub.

short

To collect events on the collecting computer, you must create a __________.

subscription

In order to transmit data on a Token Ring network, a node must have possession of the _____________.

token

Network backbone cabling run from floor to floor connecting the main cross-connect to intermediate cross-connects on each floor is referred to as ___________ cabling.

vertical

The target systems in a DDoS attack use ____________ which are later woken up to launch the attack.

zombies or agents

What are the four components of wireless security?

• Access control • Encryption • Authentication • Isolation

A network analyzer can detect problems with what four pieces of hardware?

• Cabling • Jacks • Network cards • Hubs

What information does the command ipconfig report?

• Connection-specific DNS Suffix • IP Address • Subnet Mask • Default Gateway

List four physical cable tests you can perform using a cable testing device.

• Locating miswired cables • Locating missing cables • Locating cables that don't support your network type (for example, 100 Base-T) • Testing hub connections • Testing PC connections • Testing installed cables • Testing patch cables • Locating and tracing inactive cables

Compare one-, two-, and three-factor authentication.

• One-factor authentication typically uses just something you know-a username and password. • Two-factor authentication adds something you have or something you are—the username and password are combined with a token or a biometric reading. • Three-factor authentication combines something you know, something you have, and something you are—typically a username and password, a token, and a biometric reading.


संबंधित स्टडी सेट्स

EXAM 2 System Analysis and Design

View Set

Starting Out with Python, 3e Ch 4

View Set

Audit Chapter 5 Risk Assessment: Internal Control Evaluation

View Set

Biology Exam 2 - Mastering Bio HW

View Set

Ch. 14 Express & Implied Warranties

View Set

L3 Soil components and soil formation

View Set

Cardiovascular Priority Questions

View Set