Unit 8, Unit 9, Unit 10, Unit 11, Unit 12
At what layer of the OSI model do proxy servers operate?
Layer 7
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
What do well-chosen subnets accomplish?
Network documentation is easier to manage.
______________ in SONET are analogous to the ________________ of T-carriers.
OC levels, digital signal levels
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?
Online UPS
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Speed
What method does a GSM network use to separate data on a channel?
TDMA
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit http any any
Where does an MPLS label go in a PDU?
Between Layers 2 and 3
How many channels are in an ISDN PRI connection?
23B+D
How many bits of a Class A IP address are used for host information?
24 Bits
Which formulas can be used to calculate the magic number? Choose two.
256 - the interesting octet 2^h
What is the formula for determining the number of possible hosts on a network?
2^h - 2 = Z
Which IEEE standard determines how VLANs work on a network?
802.1Q
What feature of Windows Server allows for agentless authentication?
AD (Active Directory)
Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?
Access control
What software might be installed on a device to authenticate it to the network?
Agent
Which NGFW feature allows a network admin to restrict traffic generated by a specific game?
Application awareness
What kind of network is the PSTN?
Circuit-switched
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?
Cold site
What kind of firewall blocks traffic based on application data contained within the packets?
Content-filtering firewall
While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?
DHCP relay agent
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisoning
What specifications define the standards for cable broadband?
DOCSIS
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?
DiffServ
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?
Eight
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
What port do SNMP agents listen on?
Port 161
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
Posture assessment
What command requests the next record in an SNMP log?
SNMP Get Next
Which of the following is considered a secure protocol?
SSH
What kind of device can monitor a connection at the demarc but cannot interpret data?
Smart jack
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?
Top listeners
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?
Traffic shaping
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Trunk
Which of the following features is common to both an NGFW and traditional firewalls?
User authentication
Which DSL standard has the fastest speeds immediately outside the CO?
VDSL
When shopping for a new router, what does the MTBF tell you?
When shopping for a new router, what does the MTBF tell you?
An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
dedicated line, virtual circuit
Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?
switchport port-security
While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?
wireshark