Network +

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which type of security camera would you likely see mounted on the ceiling of a bank or other secure location?

Dome

Which email protocol allows an email client to read mail stored on the mail server?

Imap4

Which availability solution is not specifically designed for high availability, but provides it by default?

Load Balancing

The most accurate time sources available by standard network connections reside at which stratum of the network time protocol?

1

Which Ethernet cable category was the first support gigabit transfer rates? -3 -5 -6 -6a -5e

5e

By default, which channel in a 2.4 GHz wireless network do not overlap? -3 -1 -11 -6 -9 -8

-1 -11 -6

If there are 6 bits available to address host systems in a network, how many hosts can you accommodate?

64

If one wireless router is using channel 6 and you want to setup an additional router using a different channel, which would be the best channel to use? -8 -4 -6 -5 -10 -11

11

IPAM is responsible for providing which type of network service? -Resolving host names to IP addresses -Synchronizing the time on network clients and servers -Assigning IP addresses to client systems -Administration and monitoring of DHCP and DNS servers -Statically configuring IP addresses

-Administration and monitoring of DHCP and DNS servers

Virus signatures are identified by anti-virus applications by using which techniques?

-Algorithms -Heuristic engines

What characteristics of a bridge distinguish it from a switch? -Bridges can connect dissimilar types of media? -Switches operate at layer 2 of the OSI model, bridges operate at layer 3 -bridges connect host systems together, switches connect network segments -Switches connect host systems together, bridges connect network segments -Bridges can connect dissimilar architectures

-Bridges can connect dissimilar types of media? -Switches connect host systems together, bridges connect network segments -Bridges can connect dissimilar architectures

Which symptoms might be indicative of an intermittent short in a network environment? -Picking up signals from a different connection -Packets arriving out of sequence -Broadcast storms -Incorrect pin assignments -Periodic connectivity loss

-Broadcast storms -Periodic connectivity loss

Documentation of an issue should include which values? -Your theory -Corrective actions -Your list of probably causes -Outcomes -Initial problem (date, reported by, scope)

-Corrective actions -Outcomes -Initial problem (date, reported by, scope)

ARP poisoning is often used as a part of what types of threats or attacks? -Rogue access points -Denial of service -Man-in-the-middle -Logic bombs -Session hijacking -Social engineering

-Denial of service -Man-in-the-middle

Which of the following types of conversions can be performed by media converters? -Electrical signals (copper wire) to light signals (fiber optic) -Physical address to logical address -Switching to Routing -Protocol X to protocol Y -Multi-mode fiber to single mode fiber

-Electrical signals (copper wire) to light signals (fiber optic) -Multi-mode fiber to single mode fiber

A load balancer can provide which networking features? -Even distribution of traffic across servers performing the same function -Extended connectivity for wireless clients -Converting analog voice signals to IP data packets -Improved performance and availability by ensuring servers do not become overwhelmed -Connecting dissimilar network architectures

-Even distribution of traffic across servers performing the same function -Improved performance a

Permissions to a file system resource can be granted to which types of objects? -Groups -Ports -Addresses -Computers -Protocols -Users

-Groups -Computers -Users

Which statement correctly describes a Native VLAN? -It is the only VLAN to receive a tag -It always receives its tag after all other VLANs -It is the only VLAN to not receive the tag -It always receives its tag before all other VLANs

-It is the only VLAN to not receive the tag

What characteristics distinguish TFTP from FTP and FTPS? -It uses UDP as its transport protocol -It is more secure -It is a simplified version of FTP -It used TDP as its transport protocol -It us more reliable

-It uses UDP as its transport protocol -It is a simplified version of FTP

"Data Pooling" refers to which public cloud risk considerations? -Infrastructure is shared by multiple tenants -Disaster recovery/backup concerns -An attack on one tenant could impact other tenants -Legal trans-boarder requirements -No common concerns or interests for security

-No common concerns or interests for security -Infrastructure is shared by multiple tenants

Rank the following wireless security configurations from least secure to most secure -Open -WPA2+TKIP/AES -WPA2+AES -WEP -WPA+TKIP

-Open -WEP -WPA+TKIP -WPA+TKIP/AES -WPA2+AES

which command line tools can be used to test and troubleshoot DNS? -Ping -Tracert -Nslookup -Ipconfig -Pathping

-Ping -Nslookup

Which objects are typically monitored using SNMP? -Printers -Files -Network Utilization -Servers -Users -Routers

-Printers -Network Utilization -Servers -Routers

The MTBF value of a device is typically derived from which factors? -Product experience/customer feedback -Performance baselines -Product testing -Warranty duration -Purchase history

-Product experience/customer feedback -Product testing

Auto-negotiation can automatically configure which settings on a network adapter?

-Speed -Flow -Duplex mode

Which statements about type 1 hypervisors are correct? -They are generally only used in smaller environments for testing and development -They can be installed directly on top of hardware -They generally perform better as they consume fewer system resources -They require an operating system to be installed -They are always open source

-They can be installed directly on top of hardware -They generally perform better as they consume fewer system resources

Which mitigation methods can be implemented to reduce the effects of network crosstalk? -Use shielded cables -Increase the signal strength -Avoid sources of power when running cables -Run cables closer together -Increase the speed of the connection

-Use shielded cables -Avoid sources of power when running cables

What are the advantages of using virtualization on a network?

-efficient use of resources -cost and energy savings -fault and threat isolation -simple backups, recovery, and replication

Rank the following obstructions(from lowest to highest) according to the amount of attenuation the can cause for wireless communications -wooden door -concrete wall -drywall -cinderblock -brick wall -glass windows

-glass windows -wooden door -drywall -cinderblock -brickwall -concrete wall

State the switch port sequencing method

1.) Blocking 2.)Listening 3.) Learning 4.) Forwarding

What is the range of addresses for the first subnet created by using the subnet mask of 255.255.255.192 in the 192.168.0.0 class C network?

192.168.0.0-192.168.0.63

Which subnetmask is required to create subnets capable of hosting 2000 hosts?

255.255.248.0

Which subnet mask would be used to supernet 2 class C networks together into a single subnet with 512 hosts?

255.255.254.0

Which subnet mask is commonly used in class A networks to make them the size of a class C network?

255.255.255.0

In today's business and computing environment import/export controls generally only apply to which tiers of country? -3 -4 -1 -2

3 4

Which port must be open for RDP traffic to cross a firewall?

3389

What is the port number for DNS?

53

What is the fundamental difference between a MAN and a WAN?

A MAN covers a small geographical area. And WAN covers a large geographical area

Describe black box penetration testing

A form of penetration testing where the tester is not given any information about the target

Which statement best describes CDMA? -A multiplexing method based on time divisions -A multiplexing method based on collision detection and avoidance -A global system for mobile phone service -A multiplexing method based on coded signals

A multiplexing method based on coded signals

The MTTF value of a device refers to which characteristic?

A point after which a device is no longer considered to be reliable

Which fiber cable connector is preferred when the least amount of return loss (reflection) is required? -APC -SC -LC -UPC -MT-RJ

APC

Which type of network can be created with as little as a wireless router and a connection to an ISP?

Ad-Hoc

How many characters are used for the passphrase when you have configured WPA/WPA2 for your wireless security?

Any value between 8 and 63

Which type of transmission would be used if an application needed to send packets to every other host on your network?

Broadcast

A flashing amber light on a network adapter might be indicative of which networking problem?

Collisions

What type of cable is depicted in the graphic? -Rollover -Multimode Fiber -Coaxial -Straight Through -Crossover

Crossover

Which type of cable should be used to make a network connection from one computer directly to another computer?

Crossover

Which term refers to the study of cryptographic systems?

Cryptanalysis

Which mobile device management techniques allows you to selectively wipe only corporate data while leaving personal data intact?

Device partitioning/containerization

A wireless signal having to move around a large object such as a hill or building is known as which type of interference?

Diffraction

Which type of cloud service connectivity method would typically allow for unlimited data transfers once implemented? -Pay as you go -Native VPN -VPN appliance -Remote Desktop -Direct Connection

Direct Connection

Which service in Windows Server 2016 authenticates remote users & computers to the windows domain & its corporate network resources?

DirectAccess

configuring radio balancing in a wireless controller refers to which feature?

Ensuring that all 802.11n clients are connected to 802.11n access points

Lightweight Directory Access Protocol (LDAP) is used for which purpose?

Establishing communication from an application to a network directory service

Marking (QoS)

Evaluates the policies, configuration, and information regarding the action to be taken when a packet is out of profile and decides what to do with the packet

Which types of wireless access points might be used by an attacker to gain access to confidential information? -Evil Twin -WLAN -Hot Spot -SSID -Rogue

Evil twin Rogue

Which type of port scanning method disguises the location of the sender?

FTP bounce

Which encryption protocol does GRE use to increase the security of transmissions?

IPsec

Which type of WAN service uses 2 dedicated phone lines to provide a bandwidth of approximately 128 kbps?

ISDN

Out-of-band management refers to which process?

Implementing redundancy to allow for continued network management in the event of failure.

Which local storage characteristics would be considered to be benefits over cloud storage? -It is more accessible and scalable -It is less expensive -It is faster -It is better protected against disaster -It offers better control of backups and access

It is better protected against disaster It is faster

Why might you choose to implement a wireless network using the 5GHz band as opposed to the 2.4 GHz Band?

It is generally less congested

TKIP (Temporal Key Integrity Protocol) had which primary benefits?

It was compatible with devices that supported WEP It offered better security than WEP

Scrambled or garbled communications when using VoIP or video conferencing applications is an indication of which type of network issue?

Jitter

Which SAN component is responsible for identifying the storage available to any given system?

LUN

Which options should typically be included in a software asset management implementation?

License overages Mobile device operating systems

What does LUN stand for?

Logical Unit Number

Which switch port protection method uses a whitelist of acceptable values to accept traffic?

MAC filtering

Which wireless authentication method involves maintaining a list of authorized addresses?

MAC filtering

Which type of service can route different protocols based on labels?

MPLS

What does MPLS stand for?

Multiprotocol Label Switching

Which routing protocol might send packets over a longer route if there is less traffic on that route?

OSPF

Which tool is used to characterize and find faults with fiber cabling?

OTDR

Port forwarding is commonly used in which types of applications?

Online gaming servers Voice over IP applications Peer to peer downloading

Which tunneling protocol is a component of the IPsec protocol suite?

OpenVPN

Which type of attack is designed to damage a system to the point of it generally needing to be replaced?

PDos

Which email protocol allows an email client to download email messages to the local computer?

POP3

Sharing a common internet connection over DSL is an example of which type of service?

PPPoE

Which termination point uses standard RJ-45 connections?

Patch Panel

A network consists of 5 computers all running windows 10 professional. All the computers are connected to a switch, which is connected to a router, which is connected to the internet. Which networking model does the network use?

Peer-to-peer

A WiFi Analyzer is typically used in which scenario?

Planning, surveying and mapping a new WiFi implementation

Which cloud computing service model gives a software developer access to multiple operating systems for testing?

Platform as a Service (PaaS) *The delivery option

What is the port number for HTTP?

Port 80 TCP

Performance concepts such as traffic shaping, Qos and diffServ are primarily concerned with providing what kind of service?

Prioritization of packets by importance

Which type of documentation outlines how a business collects, uses, shares and stores information?

Privacy Policy

Trusted Platform Modules (TPM) and up-to-date firmware can help to protect against which kind of threats?

Rootkits/bootkits

File integrity refers to which process?

Protecting a file from unauthorized changes

Implementing a rack diagram can assist in which task?

Quickly determine which equipment is necessary when purchasing

Which power management/availability solution might you implement to address isolated outages and offer multiple connectivity paths within your data center?

Redundant Circuits

Which type of WAN service would be most effective for real-time communications such as voice over IP and video conferencing?

SDSL

A man-in-the-middle attack that downgrades a secure connection to an unsecure one is known as which option?

SSL Stripping

Which security functions can be performed by a proxy server? -Shielding internal addresses from the public internet -Connecting dissimilar network architectures -Malware detection -Virus scanning -Packet examination and filtering

Shielding internal addresses from the public internet Packet examination and filtering

A new switch is connected to another switch by way of a network cable, and 3 computers are connected to the new switch. Which network topology is being used?

Star-bus

What does SAN stand for?

Storage Area Network

What is the port number for POP(SSL)?

TCP 995

What is a message called that is delivered by TCP? What is a message called that is delivered by UDP? At what layer do the protocols work?

TCP-segment UDP-datagram Transport

Which current protocol is used to create secure transmissions for HTTP browsing sessions?

TLS

Which linux based command line foot can be used to capture packets for future analysis

Tcpdump

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address

Which characteristics distinguishes a logic bomb from other types of threats?

The code remains dormant for a period of time after infection

Which advantages do 2.4 GHz transmission have over 5 GHz transmissions?

The have a wider signal coverage area They are more compatible with older devices They are better at penetrating obstacles and barriers

If a DHCP server is configured properly with a scope and the service is healthy yet still no addresses are being assigned what is the most likely cause?

The scope has not been activated yet

A remote access policy might typically define which connectivity characteristics?

The type of device you can use to connect

Most modern-day bandwidth speed testers are implemented in which manner?

Through browsers

Access control lists are used for which purposes in network communications?

To enable basic security for a network To restrict updates for routers to only specific interfaces

The "T" in 100BaseT stands for which cable characteristic?

Twisted pair cabling

Which type of address duplication conflict is most likely to happen in a network environment?

Two hosts configured with the same statically assigned IP address

Temporal Key Integrity Protocol (TKIP) was the primary encryption method in which wireless security implementation?

WPA

A documented system life cycle can be useful in which situations?

When determining budgets and allocations of resources

A hidden node normally occurs under which circumstances?

When nodes are close enough to the access point but too far away from each other

Which scenario would best warrant the implementation of a RADIUS server? -When you have a single network access server, with multiple authentication policies -When you have multiple network access servers, with multiple authentication policies -When you have multiple network access servers, with a single authentication policy -When you have a single network access server, with a single authentication policy

When you have multiple network access servers, with a single authentication policies

Which type of antenna is the most precise in terms of directional communications? -Semi-directional -Yagi_Uda -Parabolic -Omni-directional

Yagi-uda

Which 802.11 specification supports simultaneous connections of 2.4GHz and 5GHz transmissions? -n -a -b -ac -g

ac

Multiple Input Multiple Output (MIMO) is supported by which 802.11 specifications? -b -g -ac -a -n

ac n

Which 802.11 specification uses 2.4GHz transmissions and offers a speed up to 54 Mbps over a distance of approximately 150 feet? -a -ac -n -g -b

g

Targets and Initiators are components of which SAN protocol?

iSCSI

Incident response policies are generally implemented to respond to which types of incidents?

security breaches


संबंधित स्टडी सेट्स

PRACTICE QUESTIONS FOR EXAM 2 PEDS

View Set

Texas 30-Hour Promulgated Contract Forms with Flex Units

View Set

Argument Technique in Martin Luther King, Jr.'s "I Have a Dream" Speech Quiz Complete

View Set