IS 4440 Final Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the max theoretical throughput of the 802.11ac wireless technologywhen using Wave 1 devices?

1.3 Gbps

What two frequencies are used for most wireless networks?​

2.4 GHz & 5 GHz

How many channels exist in a T1 connection?​

24

Ideally, stations must remain within what range of an access point in order tomaintain optimal transmission speeds?

300 feet

How many data streams are used in 802.11ac Wave 2 devices?​

4 data streams

What is the maximum theoretical throughput of 802.11n?​

600 Mbps

A network with 6 bits remaining for the host portion will have how many usable host addresses?

62

Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?​

802.11ac

Select the maximum allowable distances for horizontal wiring for a span that connects a data jack on a wall to a data closet, and for a span that connects a workstation to the data jack, respectively:

90 m & 10 m

A device that is responsible for modulating digital signals into analog signals, and demodulating analog signals into digital signals at the receiving end, is known as?​

A modem

Which of the following is NOT a task handled by a router?

A router forwards broadcasts over the network.

What xDSL standard is the most popular?​

ADSL

During the Windows Server 2012 R2 installation, what account creation prompts you for the password?

Administrator

What are the three primary event logs?

Application, Security, and System

What are the key benefits of security templates?

Apply consistent, scalable, and reproducible security settings throughout an enterprise.

When does Windows apply User Configuration policies by default?

As the user logs in

What is the minimum category of UTP cable required in order to support Gigabit speeds?​

Cat 5e

Installing Windows Server 2012 R2 Active Directory Domain Services installs two default policies: Default Domain Policy and Default Domain Controller Policy. The administrator needs different policy settings. How best to proceed?

Create new Group Policy Objects to augment or override the existing default settings.

A MAN connection is also known as which two terms below?​

Ethernet MAN & Metro Ethernet

A power fluctuation that results in a temporary dimming of lights is known asa blackout.

FALSE

IPv4 and IPv6 use the same packet format.​

FALSE

Network segmentation decreases both performance and security on a network.

FALSE

UDP provides error checking, but not sequencing

FALSE

UDP provides error checking, but not sequencing.​

FALSE

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.​

FALSE

What cable type comes in two different modes, single mode and multimode?

Fiber optic

What application or interface allows you to configure security filtering?

Group Policy Management console

What is the Microsoft Management Console (MMC) snapin that you use to create GPOs and manage their deployment to AD DS objects?

Group Policy Management console

What account is created during Windows Server 2012 R2 installation with the account disabled by default?

Guest

What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing?

IGMP

​What versions of the IP protocol are used on networks today (pick 2)?

IPv4 & IPv6

n order to simplify console access to computers in a rack, what device is typically used to provide a central portal for all devices on the rack?​

KVM switch

At which two layers do wireless LANs operate?​

Layer 1 & Layer 2

Ethernet exists at what layer of the OSI model?

Layer 2

At what two layers of the OSI model are LAN and WAN protocols likely to differ?​

Layer 2 & Layer 1

​At what layer of the OSI model would a TCP or UDP header be added to a payload?

Layer 4

What is the proper term for associating a Group Policy to a set of AD DS objects?

Linking

At what layer of the OSI model does the IPsec encryption protocol operate?​

Network layer

What roles does Microsoft recommend can share the same server as the Hyper-V role?

No other role

What address does ARP work in conjunction with IPv4 to discover (pick 2)?

Physical & MAC

At what layer of the OSI model do the 802.11 standards vary?

Physical layer

What two options below are AAA services?​

RADIUS & TACACS+

What is Resource Metering?

Resource metering documents virtual machine usage regarding a variety of criteria

What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?

Restricted Groups policy

A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?

SIEM system

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?

Software settings, Windows settings, and Administrative Templates

The amount of memory that you want to allocate to the VM when it starts is called ______.

Startup RAM

​The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

A NIC card cannot determine whether the frames it transmits and receives are using IP packets or a different layer 3 protocol, because the NIC does not operate higher than Layer 2 of the OSI model.​

TRUE

All wireless signals are carried through the air by electromagnetic waves.

TRUE

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

TRUE

Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.​

TRUE

Digital signals are composed of pulses of precise, positive voltages and zero voltages

TRUE

Each type of cable has a prescribed bend radius , which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

TRUE

IP is an unreliable, connectionless protocol.​

TRUE

Multimode fiber contains a core that is larger than a single mode fiber core.

TRUE

Multipath signaling is a significant cause of fading.​

TRUE

The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE)​.

TRUE

What happens when a router receives a packet with a TTL of 0?​

The router drops the packet and sends an ICMP TTL expired message back to the host.

What are the two categories of security settings within Group Policy? Select two answers

User & Computer

What are the two categories of security settings within Group Policy? Select two answers.

User & Computer

What did Microsoft introduce in Windows Server 2008, which is used to ensure users with administrative privileges still operate routine tasks as standard users?

User Account Control (UAC)

What are the two interfaces available for creating and managing user accounts in Windows Server 2012 R2?

User Accounts control panel and the Local Users and Groups snap-in for MMC

What are the two interfaces for creating and managing local user accounts a computer joined to the domain?

User Accounts control panel and the Local Users and Groups snap-in for MMC

Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?

Using the Enforce, Block Policy Inheritance, or Loopback settings

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?​

VPN gateway

Ethernet is an example of what type of technology?

baseband

In IEEE terminology, a group of stations that share an access point are said to be part of what option below?

basic service set

Since cable TV and cable ​Internet can share the same coaxial cable, they are considered to be what type of technology?

broadband

Which of the following is NOT a valid wireless network topology?

bus

Digital certificates are issued by organizations known as what term?​

certification authorities

What routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage?

convergence time

The number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time, is known as ​what term below?

frequency

Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________

guest integration services

​Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?

half duplex

What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?

hop limit & TTL

Server virtualization in Windows Server 2012 R2 is based on a module called the _________.

hypervisor

Where is a demarc located in relation to the structured cabling of an enterprise environment?​

in the Main Distribution Frame (MDF)

Telnet and SSH are known as what type of management system?​

in-band

Which of the following is NOT a valid reason for using virtualization?​

increase performance

What do you call the process that after you link a GPO to a site with multiple domains, the Group Policy settings are applied to all the domains and the child objects beneath them?

inheritance

​The combination of a public key and a private key are known by what term below?

key pair

What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?​

noise

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?

out-of-band management

When the Hyper-V role is added to a Windows Server 2012 R2 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer's hardware via the hypervisor. What are those individual environments called?

partitions

What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?

security filtering

​What term below is used to describe the outer-most layer of protective covering of a coaxial cable?

sheath

Select the two terms below that are used to describe a UPS that providescontinuous voltage to a device by switching virtually instantaneously to the batterywhen it detects a loss of power:

standby UPS & standby power supply

What kind of GPO serves as a template for the creation of domain GPOs based on a standard collection of settings?

starter GPO

"When multiple GPOs are linked to a container, which GPO in the list has the highest priority?

the first

A network with the subnet mask 255.255.255.0 would have what CIDR block?

​/24

What is the maximum supported throughput of a CAT6 cable?​

​10 Gbps

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?​

​Framing

Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?​

​MIMO

​Which virus below combines polymorphism and stealth techniques to create a very destructive virus?

​Natas

​What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

​SaaS

​If multiple honeypots are connected to form a larger network, what term is used to describe the network?

​honeynet

Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options?​

​multiplexing

In what type of topology is each site connected to two other sites, ​providing redundancy?

​ring topology

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?​

​sliding window


Set pelajaran terkait

Family Education Rights and Privacy Act of 1974 (FERPA)

View Set

EMT Chapter 39 Vehicle Extrication and Special Rescue

View Set

Chapter 5: Understanding Nutrition

View Set

medsurg ch 61 Concepts of Care for Patients With Urinary Problems

View Set