Cist 1401 Final Review
What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
Layer 3
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer?
Hypervisor
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic?
Load balancer
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited?
Separation of duties
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic bomb
At what layer of the OSI model do proxy servers operate?
Layer 7
What kind of route is created when a network administrator configures a router to use a specific path between nodes?
Static route
When shopping for a new router, what does the MTBF tell you?
How long devices like this one will last on average until the next failure
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Speed
Which IEEE standard determines how VLANs work on a network?
802.1Q
Which of the following is considered a secure protocol?
SSH(Secure Shell)
How many bits of a class A IP address are used for host information?
24 bits
What is the formula for determining the number of possible hosts on a network?
2h - 2 = Z
Which formulas can be used to calculate the magic number? Choose two.
2h, 256 - the interesting octet
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet?
8 bits
A routing protocol's reliability and priority are rated by what measurement?
AD(Active Directory)
Which of the following is not one of the AAA services provided by RADIUS and TACACS+?
Administration
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic?
Application data
Which routing protocol does an edge router use to collect data to build its routing tables for paths across the Internet?
BGP(Border Gateway Protocol)
Which device would allow an attacker to make network clients use an illegitimate default gateway?
DHCP(Dynamic Host Configuration Protocol) server
What specifications define the standards for cable broadband?
DOCSIS(Data Over Cable Service Interface Specification)
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
DRDoS(Distributed Reflection Denial of Service attack) attack
What type of attack relies on spoofing?
Deauth attack
Which assignment technique requires a RADIUS server?
Dynamic VLAN(Virtual Local Area Network) assignment
When a router can't determine a path to a message's destination, where does it send the message?
Gateway of last resort
Which policy ensures messages are discarded when they don't match a specific firewall rule?
Implicit deny
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat
Active Directory and 389 Directory Server are both compatible with which directory access protocol?
LDAP(Lightweight directory access protocol)
Which of these cellular technologies offers the fastest speeds?
LTE-A
What information does the switchport port-security command use to restrict access to a switch's interface?
MAC(Media Access Control) address
What do well-chosen subnets accomplish?
Network documentation is easier to manage.
With which network connection type does the VM obtain IP addressing information from its host?
NAT(Network Address Translation) mode
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA(non-disclosure agreement)
Which OSI layer is responsible for directing data from one LAN to another?
Network layer
Which cloud management technique executes a series of tasks in a workflow?
Orchestration
Which cloud service model gives software developers access to multiple platforms for testing code?
PaaS(Platform as a Service)
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.
Pen testing, Red team-blue team exercise
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?
Posture assessment
What information in a transmitted message might an IDS use to identify network threats?
Signature
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?
Smart locker
What kind of device can monitor a connection at the demarc but cannot interpret data?
Smartjack
What method does a GSM network use to separate data on a channel?
TDMA(Time-division multiple access)
Who is responsible for the security of hardware on which a public cloud runs?
The cloud provider
Which hexadecimal block in an IPv6 address is used for the Subnet ID?
The fourth one
Which of the following is not a good reason to segment a network?
To increase the number of networking devices on a network
Which type of switch connects all devices in a rack to the rest of the network?
ToR(Top of Rack) switch
Which port mode on a switch enables that port to manage traffic for multiple VLANs?
Trunk
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?
Virtual switch
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?
access-list acl_2 permit https any any