IST-220 Chapter 6-12 Reviews

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is the maximum capacity of a T1 line?

1.5 Mbps

How many channels are in an ISDN PRI connection?

23B+D

How large is an ATM cell?

53 bytes

In an ISDN connection, what amount of throughput did a single B channel provide?

64 Kbps

A highly available server is available what percentage of the time?

99.999%

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting server

What feature of Windows Server allows for agentless authentication?

AD

Of all the DSL standards, which is the most commonly in use today?

ADSL

Which of the following is not one of the three AAA services provided by RADIUS and TACACS+?

Access control

What software might be installed on a device in order to authenticate it to the network?

Agent

What two types of modulation does DSL use to carry data?

Amplitude Phase modulation

What's the essential difference between an IPS and an IDS?

An IDS can only detect and log suspicious activity. An IPS can react when alerted to such activity.

Which NGFW feature allows a network admin to restrict traffic generated by a specific game?

Application awareness

When you arrive at work one morning, your inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor. What can you compare it to in order to determine what has changed?

Baseline

Where does an MPLS label go in a PDU?

Between Layers 2 and 3

What is the primary goal of disaster recovery? (proper term)

Business continuity

What type of adapters are required on servers in an FCoE storage network?

CNA

Which statement regarding the use of cable modems is NOT accurate?

Cable modems only operate at the Physical layer of the OSI model

When surfing online, you get some strange data on an apparently secure website, and you realize you need to check the legitimacy of the site. What kind of organization issues digital certificates for websites?

Certificate Authority (CA)

What kind of network is the PSTN?

Circuit-switched

Which QoS technique operates at Layer 2 to more efficiently route Ethernet traffic between VLANs?

CoS

Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement?

Cold site

What kinds of issues might indicate a misconfigured ACL?

Connectivity and performance issues between two hosts in which some applications or ports can make the connection while others can't

What are the two primary features that give proxy servers an advantage over NAT?

Content filtering File caching

Which ISDN channel carries signaling information?

D channel

What specifications define the standards for cable broadband?

DOCSIS

What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic?

DiffServ

Which fields are modified in IPv4 and IPv6 packets to help prioritize traffic for QoS?

DiffServ for IPv4 Traffic Class for IPv6

What service in Windows Server 2016 authenticates remote users and computers to the Windows domain and its corporate network resources?

DirectAccess

Pick two advantages to using virtualization on a network

Efficient use of resources Fault and threat isolation

What kinds of alerts can you program your network monitor to send to IT staff when it detects specific, problematic conditions?

Email text message (SMS) New support ticket

A RAID 5 configuration requires a minimum of two hard disks to operate.

False

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

False

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

False

What causes most firewall failures?

Firewall misconfiguration

What type of network combines fiber with coax?

HFC

When shopping for a new router, what does the MTBF tell you?

How long devices like this one will last on average until the next failure

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Hypervisor

An _____________(use abbreviation) monitors network traffic and alerts (only) about suspicious activity.

IDS

Which tunneling protocol is a component of the IPsec protocol suite?

IKEv2

An ________________ (use abbreviation) can detect suspicious activity and block it from entering the network or the host

IPS

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Why might you want to install two power supplies in a critical server?

If one power supply fails, the other can take over

Any traffic that is not explicitly permitted in the ACL is denied, which is called the ____________________________.

Implicit deny rule

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

Internet SCSI (iSCSI)

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium's maximum packet size

How does a line conditioning UPS protect network equipment?

It filters line noise from incoming power

A differential backup covers what data on a system?

It includes only data that has changed since the last backup

In a public switched telephone network, what portion of the network is known as the local loop?

It is the portion that connects any residence or business to the nearest central office

What protocol is most often used to bond ports between a switch and a busy server?

LACP

Active Directory and 389 Directory Server are both compatible with which directory access protocol?

LDAP

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?

Layer 3

At what layer of the OSI model do proxy servers operate?

Layer 7

What file must be accessed in order to analyze SNMP logs?

MIB

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

What are two examples of Layer 2 LAN or PAN standards that also function at Layer 1?

NFC Bluetooth

______________ in SONET are analogous to the ________________ of T-carriers.

OC levels, digital signal levels

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?

OC-3

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm?

Online UPS

Which secured tunneling protocol might be able to cross firewalls where IPsec is blocked?

OpenVPN

Which remote access protocol is used over an Ethernet network?

PPPoE

What are two types of virtual circuits?

PVC and SVC

Which cloud computing services model gives software developers access to multiple operating systems for testing?

PaaS

What port do SNMP agents listen on?

Port 161

Only one ___________________ exists on a network using STP.

Root bridge

Which remote file access protocol is an extension of SSH?

SFTP

Which protocol can provide VoIP services over a Metro Ethernet connection?

SIP

What command requests the next record in an SNMP log?

SNMP Get Next

Which of the following features of a network connection between a switch and server is not improved by link aggregation?

Speed

What device must be installed on a DSL network to separate incoming voice and data signals?

Splitter

What are two main categories of UPSes?

Standby Online

Which command on an Arista switch would require an SNMP notification when too many devices try to connect to a port?

Switchport port-security

Which Transport layer protocol does PPTP use?

TCP

What method does a GSM network use to separate data on a channel?

TDMA

What kind of ticket is held by Kerberos' TGS?

TGT

Why is a BPDU filter needed at the demarc?

The ISP's STP-related topology information shouldn't be mixed with a corporate network's STP-related topology information.

What information is typically included in a Layer 1 frame?

The layer 2 payload

Why do network administrators create domain groups to manage user security privileges?

To simplify the process of granting rights to users

One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on?

Top listeners

Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time?

Traffic shaping

A brownout is a momentary decrease in voltage; also known as a sag.

True

Which type of hypervisor is installed on bare metal?

Type 1

A __________ (use abbreviation) is a security strategy that combines multiple layers of security appliances and technologies into a single safety net.

UTM

How does a vNIC get a MAC address?

Upon creation, each vNIC is automatically assigned a MAC address

Which DSL standard has the fastest speeds immediately outside the CO?

VDSL

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual switch

EAPoL is primarily used with what kind of transmission?

Wireless

While troubleshooting a recurring problem on your network, you will want to examine the TCP messages being exchanged between a server and a client. Which tool should you use?

Wireshark

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

clustering

What kind of firewall blocks traffic based on application data contained within the packets?

content-filtering firewall

An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.

dedicated line, virtual circuit

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

integrity

On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?

iptables

When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?

jabber

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

mean time between failures (MTBF)

Which of the following features is common to both an NGFW and traditional firewalls?

packet filtering

Packets that are smaller than a medium's minimum packet size are known by what term below?

runts

What kind of device can monitor a connection at the demarc but cannot interpret data?

smart jack

The T-carrier standards, also called T-CXR standards, utilize what type of multiplexing over two wire pairs to create multiple channels?

time division multiplexing (TDM)


Set pelajaran terkait

Commonly Confused Words Example Sentences Set #1

View Set

PrepU chapter 42 Stress and Adaptation

View Set

Ch. 34: Assessement of Digestive and Gastrointestinal Function

View Set

AP Gov: Chapter 8 - The Presidency

View Set

Chapter 20: Care of Patients with Immune Function Excess: Hypersensitivity (Allergy) and Autoimmunity

View Set

Aggregate Demand/ Aggregate Supply

View Set

Ch 4 - Individual Values, Perceptions, and Reactions (EXAM 2)

View Set

HIM CH8, HIM:CH10, HIM CH.11, Healthcare Ethics Exam3

View Set

Chapter 10 Section 10.1 - Explaining the Early Universe

View Set