CIS 150 FINAL STUDY GUIDE

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation? Packet drops Utilization Jitter Error rate

Packet drops

With which network connection type does the VM obtain IP addressing information from its host? a. NAT mode b. Managed mode c. Isolation mode d. Bridged mode

a. NAT mode

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. NDA b. AUP c. MDM d. BYOD

a. NDA

Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Trunk b. Private c. Access d. Community

a. Trunk

What type of attack relies on spoofing? a. Friendly DoS attack b. Deauth attack c. Tailgating d. Pen testing

b. Deauth attack

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? a. Vulnerability b. Denial of service c. Principle of least privilege d. Insider threat

d. Insider threat

Which cloud management technique executes a series of tasks in a workflow? a. Automation b. SLA c. IaC d. Orchestration

d. Orchestration

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? a. Choke packet b. Stop-and-wait c. Go-back-n sliding window d. Selective repeat sliding window

d. Selective repeat sliding window

Ethernet uses which of the following switching types? A. circuit switching B. packet switching

B. packet switching

Which of the following would an environmental monitoring system not track? a. User authentication b. Data room lights c. UPS voltage d. Liquid detection

a. User authentication

A T1 circuit is composed of how many DS0 channels? A. 2 B. 8 C. 24 D. 32

C. 24

According to Nyquist, how many 8-bit samples must be taken each second to accurately reproduce a human voice with a 4000 Hz range? A. 1544 B. 4000 C. 8000 D. 64000

C. 8000

Which technology uses statistical multiplexing and committed information rates to emulate leased circuits? A. broadband cable B. DSL C. Frame Relay D. ISDN

C. Frame Relay

At what physical point does a network stop belonging to a customer, and start belonging to the service provider? A. carrier backbone B. carrier core C. demarcation D. LAN core

C. demarcation

This wireless protocol offers bandwidth of up to 12 Mbps down and 5 Mbps up, and relies on a structure of cells to provide contiguous coverage across a broad geographic area? A. 2G B. EDGE C. HSPA+ D. LTE

D. LTE

Which of the following wireless technologies uses an all-IP core and allows data rates up to 12 Mbps? A. CDMA B. GSM C. HSPA+ D. LTE

D. LTE

Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI? Noise Blackout Surge Brownout

Noise

Which of the following monitors traffic at a specific interface between a server or client and the network? Protocol analyzer Network monitor Port mirroring Reporting

Protocol analyzer (A network monitor is a tool that continually monitors network traffic and might receive data from monitored devices that are configured to report their statistics. A similar tool, a protocol analyzer, can monitor traffic at a specific interface between a server or client and the network.)

JV Steels has established its manufacturing plant in Alabama. Reports of a huge thunderstorm have surfaced in the media. As a network analyst at JV Steels, what kind of a power flaw should you be prepared for? Blackout Brownout Surge Noise

Surge

Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage? Generator PDU UPS Surge protector

UPS

What command requests the next record in an SNMP log? a. SNMP Get Next b. SNMP Get Request c. SNMP Get Response d. SNMP Trap

a. SNMP Get Next

Which of the following is considered a secure protocol? a. Telnet b. SSH c. HTTP d. FTP

b. SSH

How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits

c. 24 bits

Which port is used to establish an SSH connection to a Linux device and manage it remotely? 8080 443 21 53 22

22

Which technology uses a fixed cell size of 53 bytes to optimize transmission of voice, video, and data? A. ATM B. DSL C. ISDN D. PON

A. ATM

This is an OSI Layer 1 device that connects a router to a T1 WAN at its demarcation point. Hint: They are cards that insert into these routers, and appear as "Serial x/x" in the router's Command Line Interface. A. CSU/DSU B. Ethernet NIC C. FRAD D. modem

A. CSU/DSU

What is the bandwidth of a DS0 channel? A. 56 Kbps B. 64 Kbps C. 128 Kbps D. 1544 Kbps

B. 64 Kbps

Which of these hardware metrics needs to be measured to ensure the availability of the network? [Choose all that apply] CPU utilization Temperature Hard drive space Memory

CPU utilization Temperature Memory

Which of the following backups is managed by third-party vendors? Incremental backup Full backup Cloud backup Differential backup

Cloud backup

Which of the following technologies allows carriers to mix both circuit-switched connections and packet-switched connections over the same packet-switched network infrastructure by adding labels to packets carried over that infrastructure? A. CLEC B. HSPA C. LTE D. MPLS

D. MPLS

What is the major difference between the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP)? TFTP can only be used on routers TFTP needs fewer resources than FTP FTP can only be used on Windows devices TFTP can only be used on Linux devices

TFTP needs fewer resources than FTP

Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth? Packet drops Utilization Jitter Error rate

Utilization

A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster. Warm Cold Hot Cloud Passive

Warm

Which formulas can be used to calculate the magic number? Choose two. a. 256 - the interesting octet b. 2n c. 2h - 2 d. 2h

a. 256 - the interesting octet d. 2^h

What information does the switchport port-security command use to restrict access to a switch's interface? a. IP address b. MAC address c. Broadcast address d. Port number

b. MAC address

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? a. Jabbers b. Top listeners c. Giants d. Top talkers

b. Top listeners

What port do SNMP agents listen on? a. Port 21 b. Port 20 c. Port 161 d. Port 162

c. Port 161

Which type of switch connects all devices in a rack to the rest of the network? a. Spine switch b. Core switch c. ToR switch d. EoR switch

c. ToR switch

Active Directory and 389 Directory Server are both compatible with which directory access protocol? a. Kerberos b. RADIUS c. AD DS d. LDAP

d. LDAP

Which backup site includes a running server that does not have access to the latest backups? a. Cold site b. Hot site c. On site d. Warm site

d. Warm site

Which of the following can be determined using a WiFi Analyzer? [Choose all that apply] The domain name of the network Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point Wireless Access Point password

Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point

These devices reside at the customer's location(s), but belong to the service provider, and provide connectivity to the provider's network(s): A. CO (Central Office) B. CPE (Customer Premises Equipment) C. Local Loop D. SNA (System Network Architecture)

B. CPE (Customer Premises Equipment

Which of the following technologies uses coaxial cable to distribute high-speed data over the same media used for television signals? A. ATM B. DOCSIS C. DS1 D. HDSL

B. DOCSIS

Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded? Acknowledgment policy Window policy Admission policy Discarding policy

Discarding policy

Which application on Windows devices can be used to review events that occurred on the local system? Disk Management Task Manager Event Viewer File Explorer

Event Viewer

Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply] Identify and configure storage solution for the backup Use a user account to create the backup Create a virtual switch in Hyper-V Install the Windows Server Backup feature Configure a network interface card

Identify and configure storage solution for the backup install the Windows Server Backup feature

Which of the following will affect the quality of VoIP calls? Latency Jitter Bandwidth CPU utilization

Jitter

A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created? PL_Cluster PLCluster PLCluster1 PLABVS

PLCluster

Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? PRTG dashboard by Paessler Room Alert Monitor by AVTECH Wireshark Spiceworks

PRTG dashboard by Paessler

After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose? Mean Time Between Failure (MTBF) Mean Time To Repair (MTTR) Recovery Point Objective (RPO) Recovery Time Objective (RTO)

Recovery Point Objective (RPO)

Which service needs to be configured to ensure metrics for network devices can be captured? SMTP DNS SNMP DHCP

SNMP

When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply] The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured The server has the Windows Server Backup feature installed The server uses a local user account to log in

The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured

Why is it essential for a Network Administrator to monitor network bandwidth utilization? [Choose all that apply] To detect malicious applications To detect the available hosts on the network To ensure applications function correctly To prevent users from accessing the internet To ensure users can connect to network resources

To ensure applications function correctly To ensure users can connect to network resources

Which of the following Log Level Severity levels indicates that there can be a potential problem? Critical error Warning Error Information

Warning

Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? a. Application data b. Destination IP address c. SYN flags d. ICMP message

a. Application data

When shopping for a new router, what does the MTBF tell you? a. How long devices like this one will last on average until the next failure b. How much it will cost to repair that device c. How long until that device fails d. How long it will usually take to repair that device

a. How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Hypervisor b. Terminal emulation c. SDN (software-defined networking) d. NFV (Network Functions Virtualization)

a. Hypervisor

Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? a. Traffic log b. Audit log c. System log d. Jitter log

a. Traffic log Historical traffic logs can be used to investigate security breaches, confirm regulatory compliance, and investigate network performance issues. A system log tracks information on a single device and will not be helpful until you know which device(s) to check. The data in an audit log is thorough enough to retroactively prove compliance and is often used in forensics investigations; due to the level of detail included, an audit log is not likely the best place to start investigating a network problem. There's no such thing as a jitter log.

What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual switch b. Virtual firewall c. Virtual router d. Virtual load balancer

a. virtual switch

What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 0 bits b. 8 bits c. 9 bits d. 10 bits

b. 8 bits

Which of the following is not one of the AAA services provided by RADIUS and TACACS+? a. Accounting b. Administration c. Authorization d. Authentication

b. Administration

Which log type is used to prove who did what and when? a. Traffic log b. Audit log c. System log d. Syslog

b. Audit log

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? a. Dual power supplies b. Online UPS c. Standby UPS d. Generator

b. Online UPS

What information in a transmitted message might an IDS use to identify network threats? a. Port mirroring b. Signature c. ACL d. FIM

b. Signature

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? a. Access control vestibule b. Smart locker c. Locking rack d. Locking cabinet

b. Smart locker

While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? a. NetFlow b. Wireshark c. Spiceworks d. iPerf

b. Wireshark

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? a. access-list acl_2 permit icmp any any b. access-list acl_2 permit https any any c. access-list acl_2 deny tcp any any d. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www

b. access-list acl_2 permit https any any

Which IEEE standard determines how VLANs work on a network? a. 802.11 b. 802.1X c. 802.1Q d. 802.3af

c. 802.1Q

Which device would allow an attacker to make network clients use an illegitimate default gateway? a. Network-based firewall b. RA guard c. DHCP server d. Proxy server

c. DHCP server

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? a. Time to Live b. Traffic Class c. DiffServ d. Priority Code Point

c. DiffServ

When repairing a coworker's computer, you find some illegal files. What should you do next? a. Delete the files. b. Take screenshots on the computer and save them in your own folder. c. Disconnect the computer from the network and leave it running. d. Shut down the computer and unplug it.

c. Disconnect the computer from the network and leave it running.

Which of the following is not a good reason to segment a network? a. To reduce the demand on bandwidth b. To limit access to broadcast domains c. To increase the number of networking devices on a network d. To narrow down the location of problems on a network

c. To increase the number of networking devices on a network

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? a. Congestion control b. Power management c. Traffic shaping d. Flow control

c. Traffic shaping Traffic shaping can be used to limit the volume of traffic flowing into or out of an interface

Which power device prevents a critical server from losing power, even for an instant? a. Surge protector b. Generator c. UPS d. PDU

c. UPS

Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Router b. Switch c. Load balancer d. Firewall

c. load balancer

What is the formula for determining the number of possible hosts on a network? a. 2n - 2 = Y b. 2n = Y c. 2h = Z d. 2h - 2 = Z

d. 2h - 2 = Z

Which of the following would be assigned an OID? a. A web server b. An NMS server c. A UDP port d. A switch's interface

d. A switch's interface A device, such as a web server, can be managed by an NMS server, typically using UDP ports 161 and 162. Each managed device may contain several managed objects, which can be any characteristic of the device that is monitored, including components such as a switch's interface, processor temperature, or memory utilization. Each managed object is assigned an OID (object identifier).

Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. PDoS attack b. FTP bounce c. Ransomware d. DRDoS attack

d. DRDoS attack

Which assignment technique requires a RADIUS server? a. Static VLAN assignment b. Dynamic IP address assignment c. Static IP address assignment d. Dynamic VLAN assignment

d. Dynamic VLAN assignment

Which flow control method resends a lost frame along with all frames sent with it? a. Backpressure b. Selective repeat sliding window c. Stop-and-wait d. Go-back-n sliding window

d. Go-back-n sliding window

Which policy ensures messages are discarded when they don't match a specific firewall rule? a. Implicit allow b. Explicit allow c. Explicit deny d. Implicit deny

d. Implicit deny

At what layer of the OSI model do proxy servers operate? a. Layer 2 b. Layer 4 c. Layer 3 d. Layer 7

d. Layer 7

Which cloud service model gives software developers access to multiple platforms for testing code? a. SaaS b. XaaS c. IaaS d. PaaS

d. PaaS

Who is responsible for the security of hardware on which a public cloud runs? a. The cloud customer b. Both the cloud customer and the cloud provider c. It depends d. The cloud provider

d. The cloud provider

Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. By checking the interface statistics of the network By calculating the error rate By checking if the connection has any jitter By checking if the network is operating at maximum capacity

By checking if the connection has any jitter

Which of the following technologies allows multiple customers to share a single optical fiber strand, using passive splitters to distribute optical signals to individual premises, with downlink speeds of up to 655 Mbps? A. FRAD B. HDSL C. PON D. VDSL

C. PON

Why would a terminal emulator be used? To establish a remote connection to a Linux device from a Windows device To run powershell commands on a Linux device To create an FTP connection To establish a remote connection to a Linux device from a Linux device

To establish a remote connection to a Linux device from a Windows device

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? a. Cold site b. Standby site c. Warm site d. Hot site

a. Cold site

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? a. Logic bomb b. Virus c. Ransomware d. Worm

a. Logic bomb

Which of the following is not defined by syslog? a. Message security b. Message handling c. Message transmission d. Message format

a. Message security The syslog standard addresses three primary components, including event message format, event message transmission, and event message handling. Syslog does not define or require message security

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. a. Red team-blue team exercise b. Security audit c. Vulnerability assessment d. Pen testing

a. Red team-blue team exercise d. Pen testing

Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? a. Separation of duties b. Shared responsibility model c. Principle of least privilege d. Defense in depth

a. Separation of duties

Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? a. Traffic shaping b. Flow control c. Quality of Service d. Congestion control

b. Flow control flow control manages the number of frames transmitted end-to-end between a single sender and a single receiver. Congestion control, however, manages the volume of traffic throughout the network.

What do well-chosen subnets accomplish? a. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. b. Network documentation is easier to manage. c. Problems affect the entire network, making them more difficult to pin down. d. IP address spaces overlap for easier management.

b. Network documentation is easier to manage

Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Fault tolerance b. Speed c. Availability d. Bandwidth

b. Speed

Which of the following statements is true? Choose two. a. When streaming a movie, the transmission is sensitive to loss and tolerant of delays. b. When sending an email, the transmission is sensitive to loss and tolerant of delays. c. When sending an email, the transmission is sensitive to delays and tolerant of loss. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.

b. When sending an email, the transmission is sensitive to loss and tolerant of delays. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this? a. Tailgating b. Quid pro quo c. Phishing d. Baiting

c. Phishing

Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The third one b. The first one c. The fourth one d. The eighth one

c. The fourth one

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? a. Security audit b. Data breach c. Exploit d. Posture assessment

d. Posture assessment


Set pelajaran terkait

Intro to Psych Chapter 9 - Motivation and Emotion

View Set

Penny CH27 fetal heart and chest

View Set

Comprehensive Exam - Public Speaking - Chapter 15

View Set

Lab 10 Activity 5: Fatigue in Isolated Skeletal Muscle

View Set

Drugs Used for Seizure Disorders

View Set

CS317, Finite Automata & Regular Expressions, Chapter 2: Finite Automata, Finite Automata

View Set

Human resource management Business chapter 9

View Set

Chapter 25 : Management of complications of Heart disease

View Set