DataCom Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Logic bomb

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Hypervisor

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Agent

What software might be installed on a device to authenticate it to the network?

DOCSIS

What specifications define the standards for cable broadband?

Virtual switch

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

How long devices like this one will last on average until the next failure

When shopping for a new router, what does the MTBF tell you?

VDSL

Which DSL standard has the fastest speeds immediately outside the CO?

802.1Q

Which IEEE standard determines how VLANs work on a network?

Application awareness

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

PaaS

Which cloud computing services model gives software developers access to multiple operating systems for testing?

switchport port-security

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

Integrity

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

IPsec

Which encryption protocol does GRE use to increase the security of its transmissions?

SSH

Which of the following is considered a secure protocol?

To increase the number of networking devices on a network

Which of the following is not a good reason to segment a network?

Access control

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Deauthentication attack

Which of these attacks is a form of Wi-Fi DoS attack?

Trunk

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Online UPS

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

IKEv2

Which tunneling protocol is a component of the IPsec protocol suite?

Top listeners

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Penetration testing

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Smart jack

What kind of device can monitor a connection at the demarc but cannot interpret data?

Content-filtering firewall

What kind of firewall blocks traffic based on application data contained within the packets?

Circuit-switched

What kind of network is the PSTN?

TDMA

What method does a GSM network use to separate data on a channel?

Port 161

What port do SNMP agents listen on?

User authentication

Which of the following features is common to both an NGFW and traditional firewalls?

DRDoS (Distributed Reflection DoS) attack

Which type of DoS attack orchestrates an attack using uninfected computers?

Cold site

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Wireshark

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

Phishing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

NDA

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

Insider threat

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

DNS poisoning

A spoofed DNS record spreads to other DNS servers. What is this attack called?

dedicated line, virtual circuit

An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.

24 bits

How many bits of a Class A IP address are used for host information?

23B+D

How many channels are in an ISDN PRI connection?

DirectAccess

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

Between Layers 2 and 3

Where does an MPLS label go in a PDU?

256 - the interesting octet and 2h

Which formulas can be used to calculate the magic number? Choose two.

The fourth one

Which hexadecimal block in an IPv6 address is used for the Subnet ID?

access-list acl_2 permit http any any

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

Speed

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

PPPoE

Which remote access protocol is used over an Ethernet network?

SFTP

Which remote file access protocol is an extension of SSH?

DHCP relay agent

While designing your network's VLAN topology, your team has decided to use a centrally managed DHCP server rather than creating a separate DHCP server for each VLAN. What software will you need to make the central DHCP server accessible across VLANs?

LDAP

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

SNMP Get Next

What command requests the next record in an SNMP log?

Network documentation is easier to manage.

What do well-chosen subnets accomplish?

AD

What feature of Windows Server allows for agentless authentication?

DiffServ

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

2h - 2 = Z

What is the formula for determining the number of possible hosts on a network?

8

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

Layer 3

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 7

At what layer of the OSI model do proxy servers operate?

NAT mode

With which network connection type does the VM obtain IP addressing information from its host?

Posture assessment

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?

Traffic shaping

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

OC levels, digital signal levels

______________ in SONET are analogous to the ________________ of T-carriers.


Set pelajaran terkait

Unit 7: Rules of the road and safe driving practices: Driving in the city and driving in the country

View Set

Organs from Mesoderm (Lec. 66-67)

View Set