ITC 330 Final Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What part of a MAC address serves as the extension identifier, or device ID?

The last 24 bits of the MAC address

The TCP and UDP protocols both exist at what layer of the OSI model?

Transport (Layer 4)

All wireless signals are carried through the air by electromagnetic waves.

True

IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets

True

T/F: A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

True

T/F: IP is an unreliable, connectionless protocol, as it does not establish a session to send its packets

True

T/F: Over a long-distance connection, using SSH keys is more secure than using passwords.

True

T/F: The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

True

T/F: The fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

True

What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?

Vertical Cross Connect

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Wi-Fi analyzer

Session Layer and API Call

describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application API Call - application makes request to OS

The Group Policy utility can be opened by typing what name into a Run box?

gpedit.msc

Application Layer Examples

interface between two application, each on separate computers HTTP, SMTP, POP3, IMAP4, FTP, Telnet, RDP

Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocol?

link-state protocols

Presentation Layer Examples

reformatting, compressing, encrypting data for the receiving application Email Encryption

Data Link Layer

responsible for interfacing with the physical hardware only on the local network Wi-Fi, Ethernet, Switches Adds MAC address info to header and also a trailer to turn the packet into a frame

Network Layer and Examples

responsible for moving messages from one node to another until they reach the destination host Adds IP info to header and creates a packet IP, ICMP, and ARP operate at this layer

Physical Layer

responsible for sending bits via a wired or wireless transmission

Transport Layer

transporting Application layer payloads from one application to another using TCP and UDP Adds port information to the header TCP - Segments UDP - Datagrams

ARP

works with IPv4 to discover the MAC address of a host or node on the local network and maintains a database that maps IP addresses to MAC addresses on the local network Layer 2 protocol that uses IP in Layer 3 Relies on broadcasting

An IP address of 192.168.18.73/28 has what network ID?

192.168.18.64

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet?

255.255.224.0

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

What are the layers of the TCP/IP Model?

4. Application 3. Transport 2. Internet 1. Network Interface

What are the layers of the OSI Model?

7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical

What is NOT one of the ways in which networks are commonly segmented? a. by device manufacturer b. by device types c. by departmental boundaries d. by geographic location

By device manufacturer

Port 53

DNS - name resolution TCP/UDP

At what layer of the OSI model does a network switch normally operate?

Data Link (Layer 2)

What is a defining characteristic of a bus topology based network?

Devices are daisy-chained together in a single line

Port 21

FTP - file transfer - control (server listens at 21) TCP

Port 20

FTP-DATA - File transfer data (send/receives at this port) TCP

An IPv6 address consists of 128 bits that are written 10 blocks of hexadecimal numbers separated by colons

False

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP

False

T/F: A Type 2 hypervisor installs on a computer before any OS, and is therefore called a bare-metal hypervisor.

False

T/F: Only Class B and Class C networks can be subnetted

False

T/F: The protocol data unit for the Physical layer of the OSI model is payload, or data.

False

TCP uses a four-step process called a four-way handshake to establish a TCP connection

False - Three way for TCP

T/F: Routing Information Protocol (RIP) is an interior gateway protocol that uses a link-state algorithm

False - distance vector routing protocol

What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol? a. Connection-oriented Protocol b. Flow Control c. Sequencing and checksums d. Framing

Framing

Port 80

HTTP - requests between web servers and web clients TCP/UDP

Port 443

HTTPS - secure HTTP TCP

Port 143

IMAP4 - messages stored on server TCP

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium

What is the NMAP utility used for?

It is a port scanning utility that can identify open ports on a host

A network TAP serves what purpose on a network?

It provides a mirrored port for monitoring traffic between other ports

A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

A network with 10 bits remaining for the host portion will have how many usable host addresses?

1022

In the classful addressing scheme, what range of network addresses is considered Class B?

128.x.y.z to 191.255.x.y

What statement regarding denial-of-service (DoS) attacks is accurate? a. A denial-of-service attack is generally a result of a disgruntled employee. b. A denial-of-service attack occurs when a MAC address is impersonated on the network. c. A denial-of-service attack is no longer a major concern due to the increased throughput available on most networks. d. A denial-of-service attack prevents legitimate users from accessing normal network resources.

A denial-of-service attack prevents legitimate users from accessing normal network resources.

Which of the following is not a task handled by a router? A router can connect dissimilar networks. A router can reroute traffic if the path of first choice is down but a second path is available. A router forwards broadcasts over the network. A router can interpret Layer 3 and often Layer 4 addressing.

A router can connect dissimilar networks

Which of the following scenarios represents a phishing attempt? a. An employee at your company has received a malware-infected file in their e-mail. b. A gift was offered to an employee with access to secured information in exchange for details. c. A person posing as an employee tried to access a secured area at your organization. d. An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.

An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

Application

You supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network

What routing metric affects a path's potential performance due to delay?

Latency

At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?

Network (Layer 3)

ICMP

Network Layer protocol that reports on the success or failure of data delivery

Port 110

POP3 - download incoming messages TCP

How does the protocol data unit go through the OSI model?

Payload is sent by the Application, Presentation, and Session layers. Header info containing port info is added to create a Segment or Datagram (depending on if transmission uses TCP or UDP) at the Transport Layer Header info containing IP is added at the Network Layer to make a packet MAC address added as header and other info added as trailer to make a Frame at Data Link Layer Bit or Transmission is placed on the network at the Physical Layer

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

Port Numbers

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

Principle of Least Privilege

Port 3389

RDP - encrypted control of remote computers TCP

What is a router? What can a router do?

Router - joins two or more networks and passes packets from one network to another Routers can: - Connect dissimilar networks (LANs and WANs) - Interpret Layer 3 and often Layer 4 addressing - Determine the best path for data to follow from point A to point B - Reroute traffic if the path of the first choice is down but another path is available

Port 25

SMTP - outgoing email messages TCP

Port 22

SSH - secure communications between computers TCP

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

Which of the following is an example of proxy server software? a. Apache b. Snort c. Squid d. BIND

Squid

If you network consists of all connected devices connecting to one central device, such as a switch, what type of topology is being used?

Star Topology

The IP connectionless protocol relies on what other protocol to guarantee delivery of data?

TCP

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

Tailgating

Port 23

Telnet - unencrypted control of remote computers TCP

What does backbone cabling consist of?

The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.


Set pelajaran terkait

Series 7: Taxes and Tax Shelters (Types of Taxable Income)

View Set

Registration & Licensing Study Questions

View Set

GCP - Data Engineer Certification

View Set