Networking

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What specifications define the standards for cable broadband?

DOCSIS

What type of attack relies on spoofing?

Deauth attack

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

Which OSI layer is responsible for directing data from one LAN to another?

Network Layer (Layer 3)

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

Which of the following applications could be used to run a website from a server

Ngnix

What is one advantage offered by VDI over RDS and VNC?

Offers access to multiple OSs in VMs

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static route

What method does a GSM network use to separate data on a channel?

TDMA

Who is responsible for the security of hardware on which a public cloud runs?

The cloud provider

If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which command would you use?

ipconfig /release

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

speed

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

trunk

Which devices converts signals from a campus's analog phone equipment into IP data that can travel over the Internet?

Voice gateway

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

Which protocol replaced TKIP for WPA2?

CCMP

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

Which of these categories of twisted-pair cable can support Gigabit Ethernet?

Cat 5e, Cat 6a, Cat 7

Which device would allow an attacker to make network clients use an illegitimate default gateway?

DHCP server

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

Which function of WPA/WPA2 security ensures data cannot be read in transit?

Encryption

When your computer first joins an IPv6 network, what is the prefix of the IPv6 address the computer first configures for itself?

FE80::/64

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which encryption protocol does GRE use to increase the security of its transmissions

IPSec

At what layers of the OSI model do proxy servers operate?

Layer 7

What is the first step of inventory management?

List all components on the network

Which device can manage traffic to multiple servers in a cluster so all servers equally shares the traffic?

Load balancer

What kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

Which part of a MAC address is unique to each manufacturer?

OUI (Organizationally Unique Identifier)

Which cloud service model gives software developers access to multiple platforms for testing code?

PaaS

A network consists of five computers, all running Windows 10 Pro. All of the computers are connected to a switch, which is connected to a router, which is connected to the internet. Which logical networking model does the network use?

Peer-to-peer

Which two encryption protocols might be used to provide secure transmissions for browser and web server communications?

SSL/TLS

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?

Selective repeat sliding window

Which protocol's header would a Layer 4 device read and process?

TCP

Which transmission characteristic is never fully achieved

bandwidth

Which of these commands has no parameters in Windows?

hostname

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

logic bomb

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

online UPS

You need to connect a new network printer to a nearby wall jack. What kind of cable should you use?

patch cable

What kind of device can monitor a connection at the demarc but cannot interpret data?

smart jack

A network consists of seven computers and a network printer, all connected directly to one switch. Which network topology does this network use?

star

A transceiver was recently damaged by a lightning strike during a storm. How might you decide whether the ISP is responsible for replacing this device, or whether your company must foot the bill?

Look at whether the device is located on the ISP's side of the demarc.

What information does the switchport port-security command use to restrict access to a switch's interface?

MAC address

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

Which DNS server offers the most current resolution to a DNS query?

Primary DNS server

A routings protocol's reliability and priority are rated by what measurement?

AD

Which of the following criteria can a packet-filtering firewall not used to determine whether to accept or deny traffic?

Application data

Which routing protocol does an exterior router use to collect data to build its routing tables?

BGP

What is the Internet standard MTU?

1,500 bytes.

Which formulas can be used to calculate the magic number? Choose two.

256- the interesting octet, 2^h

What is the formula for determining the number of possible hosts on a network?

2^h - 2 = Z

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11ax

Which IEEE standard determines how VLANs work on a network?

802.1Q

Which fiber connector contains two strands of fiber in each ferrule?

MT-RJ

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBASE-T transmissions at 100 meters?

Cat 6a

What security trap is this when you connect your smartphone to the Wi-Fi so you can listen to music. While signing in, the SSID is called "Free Coffee and Internet"

Evil twin

When a router can't determine a path to a message's destination, where does it send the message?

Gateway of last resort

Which encryption benchmark ensures data is not modified after it's transmitted before it's received?

Integrity

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

Which of these cellular technologies offers the fastest speeds?

LTE-A

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

What port do SNMP agents listen on?

Port 161

Finding an unauthorized AP with a very strong signal near in the middle of a 100-acre campus. What kind of threat needs to be reported?

Rogue AP

Which of the following devices are you likely to find in the MDF?

Routers, Switches, KVM switch

Which remote file access protocol is an extension of SSH?

SFTP

You need to access customer records in a database as you're planning a marketing campaign. What language can you use to pull the records most relevant to the campaign?

SQL

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

The fourth one

Which of the following is not a good reason to segment a network?

To increase the number of networking devices on a network

Which type of switch connects all devices in a rack to the rest of the network?

ToR switch

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

Which networking model can the network now support that it could not support without the upgrade?

Client-server

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold site

In the event of a fire, the most appropriate failure policy is a _______ policy

Fail-open

When shopping for a new router, what does the MBTF tell you?

How long devices like this one will last on average until the next failure

Which one of the following wireless transmission types requires a clear LOS to function?

IR

As you're working to fix a problem with an application, multiple changes happen. Which step would have prevented this complication?

Identify the problem

Which policy ensures messages are discarded when they don't match a specific firewall rule?

Implicit deny

Which cable is best suited for ultra-high speed connections between a router and a switch on the same rack?

Passive twinaxial cable

Which of the following attack simulations detect vulnerabilities and attempt to exploit them?

Pen testing, Red team-blue team exercise

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

You've decided to run an Nmap scan on your network. Which apps could you open to perform this task?

PowerShell, Command Prompt, Zenmap

What command requests the next record in an SNMP log?

SNMP Get Next

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?

Separation of duties

What information in a transmitted message might an IDS use to identify network threats?

Signature

You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?

The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server

Which part of a toner and probe kit emits an audible tone when it detects electrical activity on a wire pair?

Tone locator

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

Which of the following wireless technologies does not use the 2.4 GHz band?

Z-Wave

You're getting a duplicate IP address error on your computer and need to figure out what other device on your network is using the IP address 192.168.1.156. What command will show you which MAC address is mapped to that IP address

arp -a

What type of fiber-cable problem is caused when pairing a 50-micron core cable with a 62.5-micron core cable?

Fiber type mismatch

What type of device does a computer turn to when attempting to connect with a host with a known IP address on another network?

Default gateway

Which assignment technique requires a RADIUS server?

Dynamic VLAN assignment

A technician from your ISP has arrived to help you troubleshoot a weak WAN connection. To what location do you take her?

EF

Which of the following is an application layer protocol?

RDP

As you're troubleshooting a dead zone in your office, which measurement will help you determine the edges of the dead zone?

RSSI

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic shaping

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual switch


संबंधित स्टडी सेट्स

Chapter 4 Health and the Global Environment

View Set

Foundations Exam #3 CH: 21, 22, 23

View Set

Earth's Place in the Universe Summative 1 Review

View Set

Meanings of the Declaration of Independence

View Set

CORRECTED Chapter 10 Org Behavior

View Set