MSIS 4523 Luse Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

2U

A ______ component takes up 3.5 inches on a rack.

online

A __________ UPS always has power flowing from the battery to the attached components.

10BaseT

A __________ node must be within 100 meters of its hub.

hop

A ___________ designates each time a packet goes through a router.

snapshot

A ____________ allows for system duplication of a VM.

continuity tester

A ________________ tests that you are getting a signal across a wire.

when was evidence taken into custody, what was taken into custody, to whom was evidence passed and when

A chain-of-custody document includes what information? (select three)

100 Mpbs

A company's workstations are running 100 Mbps network cards and have a Gigabit switch. What is the maximum throughput each workstation can have on the network?

DSL modem with firewall capabilities, Cable modem with a separate firewall

A customer with a SOHO requires fast, secure, cost-effective access to the internet. Which of the following would be the MOST appropriate solution? (Select Two)

MAC addresses

A dynamic VLAN assigns VLANs based on _________

DOS

A smurf attack is which type of attack?

load balancing

A specialized device that you install on your network to distribute network requests and ensure availability to all your users is an example of which type of network management techniques?

SNMP v2

A technician has been assigned to set up a network monitoring for some important network devices. Due to the sensitive nature of the devices, the information must be sent in a secure fashion to the monitoring station. Which protocol will facilitate monitoring and support secure transmission of the data?

There are other wireless devices in the area that operate on the wireless band and on the same wireless channel

A home user is experiencing performance issues with her wireless network. She has checked the following issues: -checked to make sure the laptop is within the appropriate wireless network range -checked the connected SSID are wireless channel -Checked that the laptop is the only device connected to the wireless network Which is the MOST likely cause for the performance issues?

Syslog server

A network administrator has been assigned to simplify the reviewing of network device events. Which could she use to achieve the desired result?

ipconfig

A network administrator is having intermittently lost connections with a local Windows server. She decides to check the IP address on the server to see if it conflicts with any other IP addresses on the network. Which of the following commands should Lisa use?

11

A network administrator is performing a site survey and detects an existing 802.11g signal on channel 5. Which of the following channels would be the LEAST likely to interfere with the existing signal?

2

A traditional switch operates at which layer?

NAT

A network needs to pass HTTP traffic from a SOHO firewall with a public IP address to an internal Web server with a private IP address. Which technology can accomplish this?

SNMP monitor

A network technician needs to check the configuration of a port on a switch. Which tool is he MOST likely to use to verify the configuration?

connects different networks

A router ____________ .

Network

A router operates at which layer in the OSI 7-layer model?

certificate services

A user is using a PKI authentication method. Which of the following will the user need to implement PKI?

Weak signal strength

A user that is connected to a wireless network moves a laptop from her desk to a conference room. When she arrives at the conference room, her laptop is trying to rejoin the wireless network. What common wireless problem can cause this issue?

The RADIUS server is down

A wireless network is secured with WPA2 Enterprise. Clients are unable to connect to the network. What is the MOST likely explanation for this problem?

PAP

All are part of the Kerberos except ___________.

not all machines may have a public IP during peak usage

All of the following are advantages of NAT except ___________ .

complicates

All of the following are reasons to use a model except _____________.

RAID

All of the following can help prevent physical intrusion except _________.

an 802.11n compatible client can connect to the wireless network only if its MAC address is 00-a1-29-da-d3-4a and the encryption key is known by the client

An 802.11g wireless access point has the following configuration: -AP encryption forced to WPA2-AES mode only -MAC address filtering enabled with the following MAC address in the allow list: 00-a1-29-da-d3-d4

HTTP URLs

An Application Layer (Layer 7) firewall, such as a proxy server, can filter what kind of traffic that a Network Layer (Layer 3) firewall cannot filter?

Use a VLAN

An Ethernet network, using only switches, is slowing down as more computers and switches are added. What could be done to alleviate this?

PoE and Qos

An IT manager needs a new switch to support VoIP phones and wireless access points in a new building. Which of the following features should be included in the new switch?

Social engineering

An accountant for a large corp receives a call from a person claiming to be John, a network technician in HQ. John says they have problems and he needs the accountants username and password so that he can resolve the problem. What is the scenario an example of?

the users who cannot connect are using older NICs without WPA2 support

An organization has decided to upgrade wireless security by switching from WEP encryption to WPA2. Each WAP has been set to the new encryption standard and users are given the new passwords. Most users can connect using the new authentication, but some users report that they cannot connect. Which of the following is the MOST likely cause of the problem?

PoE

An organization needs to install a WAP in a warehouse where a power outlet is not readily available. The network technician can configure a port on a switch that will provide both connectivity and electrical support to the WAP. What needs to be configured in the switch?

seven

At which layer of the OSI model does stateful packet filtering take place at?

Prune non-critical entries from log files, storage for legal conformance, control access to appropriate users

CH 20 Log management includes which of the following tasks? (Select 3)

Baseline

Casey is a new technician. He is monitoring network bandwidth and notes that the network is operating at 80% of capacity. Which of the following could be used to determine if this is abnormally high traffic use?

incorrect DNS

Clark is a user who took his laptop on a vacation to Wally World. He configured the laptop to match the wireless settings at the hotel. When back at work, Clark can reach the Internet, but he cannot access any internal network resources on team10b.com. Which of the following is the MOST likely reason?

-

-

Authentication

802.1x is used for?

104/128 bit WEP

A 24-character key is used in which type of wireless encryption scheme?

end-user security

DSL consists of all the following advantages over dial-up except for ___________ .

private keys (in a public-private key pair) encrypting hashed data

Digital signatures consist of ______.

Port

Each application is assigned its own __________.

port blocking, packet filtering

Firewalls are defined by which three basic technologies?(choose two)

port mirroring

For an ID system to be able to analyze all traffic on a switch, what is needed?

ESD, short circuits, static

Good ground provides protection against which threats? (select three)

Social engineering

Having the proper security policies and adequate training for employees protects your network from which of the following?

The server contains several virtual machines and the MAC addresses are from virtual machines

How can a single NIC in a server transmit packets from multiple different source MAC addresses?

allows for twice the bandwidth

How does full duplex compare to half duplex?

one

How many computers lose connectivity if one cable is cut in a star topology?

4

How many pairs of twisted wire are in a Cat6a cable?

Configure all the WAPs to use the same SSID

How should you configure multiple 802.11g wireless access points to create a single network that enables users to roam freely?

Bluesnarfing, Bluejacking

Identify specific threats to Bluetooth-enabled devices. (Select two)

129.186

Identify the network ID section of the following IP address: 129.186.140.200/16

default gateway

If a computer wishes to communicate with a host not on the same network, where does the computer have to send the message through to get outside the network?

full control

If user1 has read access for a particular folder and is also part of a group which has full control access to that folder, what are user1's effective permissions on the folder?

no access

If user1 has read access for a particular folder and is also part of a group which is denied access to that folder, what are user1's effective permissions on the folder?

system recovery

If you are Amazon and you lose money for each minute your server is down, which advantage of virtualization would directly contribute to alleviating this problem?

2

If you backup the entire server every Sunday night and differentially backup each night thereafter, how many backups would be needed to restore the system to the most recent state on Wednesday (day)?

3

If you backup the entire server every Sunday night and incrementally backup each night thereafter, how many backups would be needed to restore the system to the most recent state on Wednesday (day)?

Traffic on port number 80

If you want your firewall to block traffic generated by Web pages, what would you configure it to block?

peer-to-peer

In a ______________ network, each system can be both a provider and a user of content.

servers are missing DG info

Indira, an administrator, just installed a new switch. She has connected two servers with IP addresses of 192.168.105.20 and 192.168.105.30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff is able to ping the router on the other side of the switch at 192.168.105.1 from each of the servers. Also, Jeff can ping google from the router. Which of the following is the MOST likely cause of the problem?

/18

Jake has a network that he needs to subnet into 3 different networks. The original netmask is 255.255.0.0. What will the netmask of each of the new networks be?

SSH

Jason wants to be able to log into a network securely, with his user name and password sent over the network encrypted. Which of the following protocols would enable him to log in securely?

virtual servers

Jill is a network technician. She is concerned about power consumption, heat generated, and low space. What technology solves her problems?

SFTP, SCP

June needs to copy a file from one server to another securely. What protocol should she use? (select 2).

DNS

Many users on a small network report that while they can share files with each other, they can no longer access the internet. Troubleshooting reveals that Internet addresses are failing to resolve to IP addresses. Which technology is malfunctioning?

Install two NICs for bonding

Maria needs to install a server for a bank where up-time is a necessity. What could she do to add fault tolerance to the servers' network connections?

nslookup

Network technician John Watson, needs to check if the domain name resolution system is functioning properly. In Windows, which of the following software tools would he use to accomplish this?

ESSID

OSU uses this type of network identifier to enable multiple WAPs to use the same name.

someone you know

Personal authentication typically entails any or all the following except _________.

high availability, fault tolerance

Sam is setting up two pieces of networking equipment that are identical. He can use them in conjunction for what purpose? (select two)

Users have specified the wrong encryption type and routes are being rejected

Senior technician Klaus has installed a new WAP. Users are able to connect to it, but they cannot acccess the Internet. What is the MOST likely cause of the problem?

IP address and SNMP configuration

Several switches are being configured by a network technician so they can be remotely managed. Which switch element must be configured to support SSH connections to each of device, as well as retrieve various parameters?

at least 8 characters, combo on upper and lower case letters and numbers, change it every 30 days

Shelly has several users that are complaining about someone tampering with their computers. She knows their passwords suck. She recommends how to do better, (select three)

tagged VLAN

Some switches can have more than one VLAN assigned to a single port. What kind of VLANs are these?

Kerberos

TCP/UDP port 88 is the default for which of the following services?

All WEP keys include a 24-bit Initialization Vector and the WEP manufacturer chose not to include that

Tammy knows that WEP keys come in two lengths: 64-bit and 128-bit. However, when working with a WAP, she only sees options for 40-bit and 104-bit. What's happening?

is the place where the outside world connection connects to the internal connection

The Demarc ________ .

crosstalk

The LED lights on a NIC can indicate all the following except _________ .

archive bit

The __________ lets you know if a file has been backed up.

SSID

The ______________ is a 32-bit string inserted in the header of each frame processed by a WAP to identify the network.

baseline

The ______________ provides a "picture" of the network when working properly.

No personal information - like spouse and children names, no common words, a combination of letters and numbers

The best (most secure) passwords have which of the following characteristics?

18,000 ft

The most common maximum distance for both ISDN and DSL lines between the user and the central switch is:

Senior management and IT management should identify critical assets and critical nodes

The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?

A logical, rather than a physical switch used to connect devices on a network

The term virtual switch would best be described as which of the following?

Trunking

The traffic from multiple VLANS need to be combined and sent to a single port. Lulu belle, a network administrator, needs to configure the VLANs to enable this. Which of the following configuration changes would Lulu belle need to adjust?

MAC address

The unique physical address assigned to every network card is also known as a(n):

bridge

This allows each VM's virtual NIC to have a direct connection to the host machine's physical NIC.

modem

This device is used to change a digital signal to an analog signal and vice versa.

multiplexer

This device is used to combine multiple signals into one.

SONET

This protocol is used to transfer signals over the backbone of the Internet over fiber.

UDP

This protocol provides a connectionless transmission.

DSL

This technology uses PPPoE to authenticate.

ADSL

This type of DSL has faster download as compared to upload speeds.

whitelist

This type of MAC filtering provides the best option for security and management.

ad-hoc

This type of setup allows two computers to connect directly without extra hardware.

ATM

This uses a 53 byte cell size to send data.

443

To allow access to a s SSL/TLS enabled website, which port needs to be open?

443

To allow users to securely use a web interface that encrypts their connection to check their email from offsite, which port will need to be opened on your NAT?

IP sender, IP receiver, SM

To see if a message is destined for a machine on the same network, what pieces of information need to be compared? (select 3)

Traffic analysis

Users are reporting slow internet connection speeds. Network technician Zim suspects that users are streaming video and music. Which of the following would BEST confirm Zim's theory?

ping

Users report that an internal file server is inaccessible. Which of the following commands would be the MOST useful in determining Network-layer connectivity?

tracert

Users who are retrieving information from a company server on the network are experiencing slow access times. Which tool would provide access time information on each segment of the network to reach the server?

3

Using the below table, which line (1, 2, or 3 from top to bottom) describes where a packet destined for 65.42.3.54 will go?

SMS, email

What are typical ways of proactively communicating SNMP alerts? (select 2)

ACLs, firewall

What can a network administrator configure to control specific IP addresses and ports access to the internal network? (select two)

toner probe

What can a technician use to identify punch block terminations if the wiring diagram has been misplaced?

acceptable use policy

What could an employee look at to verify if he/she can use the internet on his/her work machine?

finished nature of the room

What do you not worry about when determining the location of a telecom room?

Memorandum of understanding

What document is used when a formal contract for services is not appropriate?

security policy

What documentation should you consult to find the requirements for password complexity?

Posture assessment is a Cisco process that queries a host to see if it meets certain security criteria

What does posture assessment do?

destination IP

What field in a packet is used for determining the route the packet will take?

switch, full duplex capability

What is needed to eliminate collisions on your Ethernet network?

Keeping clocks on a network synchronized

What is the NTP protocol used for?

more power

What is the benefit of using PoE+ (802.3at) over using PoE (802.3af)?

use bonding to connect two NICs on the server to the switch

What is the cheapest way to double throughput to an overused server

100 meters

What is the maximum cable length of 10GBaseT on Cat 6a?

Demarc

What is the name for the point where an IPS's responsibility for an Internet connection ends?

battery backup/UPS

What is the quickest and easiest technology available to keep servers and equipment up and running?

Provides a quantifiable reference to measure against current performance

What is the value of a baseline performance analysis?

destination port

What is used to designate the application that information sent across a network is destined for?

proxy server

What network device enables all of the network nodes to hide behind a single, public IP address?

star

What physical topology does 10BaseT use?

IP, SM, DG

What pieces of information are needed for a computer to function on an interconnected network?

53 UDP

What port number is used by DNS for common client lookup requests?

SNMP

What protocol would enable Jill, the admin of the Bayland Widget Corporations network, to monitor her routers remotely?

Only the 5-GHz band

What should 802.11n clients use to achieve MAXIMUM bandwidth throughput?

port forwarding

What technology allows you to forward a specific port from the WAN to a machine with a specific service on the LAN?

crossover

What type of cable is needed to connect two computers directly?

add a second NIC

What would offer the best fault tolerance to a new DHCP server?

against a wall

Where would a patch antenna for 802.11 usually be placed?

25

Which TCP port number is associated with SMTP?

ARP

Which TCP/IP protocol is used to resolve an IP address to a MAC address?

RBAC

Which access control model uses groups to assign access based on roles?

root

Which account has elevated privileges on a Linux box? (hint: also the name of a character on Person of Interest)

Cordless phone, microwave oven

Which appliances will most likely cause interference in an 802.11g network? (Select two)

OFDM

Which broadcasting method sends out signals on multiple frequencies concurrently while also hopping on different frequencies?

Broadband over powerline

Which choice is an economic approach to enable a home user with a single desktop computer to have internet access throughout the house?

ipconfig /all or nslookup

Which command do you use to see which domain server the client is assigned to forward DNS requests to?

RJ-45

Which connector type is used for Cat5e Ethernet?

repeater

Which device allows for a digital signal to be sent across spans which are outside the physical limits of the wire?

toner

Which device helps you locate and identify cables?

WPA2

Which encryption method provides for the use of a RADIUS server?

fault tolerance

Which is not a reason to use a bus topology?

cheaper

Which is not a reason to use fiber as opposed to twisted pair cable?

less memory usage

Which is not a reason to virtualize?

vertical cabling

Which is not one of the three components of structured cabling?

transport

Which layer of the OSI seven-layer model breaks outgoing data down into segments and reassembles incoming segments?

Smart jack

Which networking device enables you to troubleshoot remotely using a loopback?

WiMAX

Which of the following WAN technologies does not use traditional cabling methods as a network medium, but can be used for long distances?

NAT

Which of the following allows for the hiding of network IPs?

SHA2, MD5

Which of the following are hashes (select 2)?

wireless communication is half-duplex, hidden node problem

Which of the following are reasons that CSMA/CA is used?

Cat 5e Cat 6

Which of the following are typically used for horizontal cabling in a new installation (select two)?

multilayer switch, content switch

Which of the following can offer load balancing (select 2)?

1, 6, 11

Which of the following channels would you use for the wireless APs to facilitate the most WAPs without overlapping signals?

ESX

Which of the following does not need a host OS to run VMs?

virtual switch

Which of the following enables multiple VMs on a single box to communicate without traffic leaving the box?

IPsec

Which of the following encryption standards works at layer 3 of the OSI model?

speed

Which of the following is NOT a reason that a multilayer switch may be helpful?

RSA

Which of the following is NOT a symmetric-key encryption algorithm?

patch cable

Which of the following is NOT used to connect multiple hubs?

10.0.0.0/8

Which of the following is a private IP address?

Stateful inspection

Which of the following is an example of a firewall that checks all incoming traffic, then decides if the traffic should be allowed through or dumped?

virus

Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate/activate?

TTL

Which of the following is not a protocol used for VPNs?

switch

Which of the following is not a storage technology?

QoS

Which of the following is not part of configuration management?

listen for other SSIDs different from yours

Which of the following is not part of the distributed coordination function?

encryption

Which of the following is used to obscure the contents of a packet as it travels across the internet?

SMTP

Which of the following is used to send email between servers?

Kerberos

Which of the following standards is used by Windows for client authentication?

Virtual machines

Which of the following technologies enables multiple OSs to run at the same time on a single machine?

VoIP

Which of the following technologies would MOST likely require SIP ports to be open on a firewall?

MD5, SHA

Which options represent common hashing techniques? (Select two)

bluetooth

Which other common wireless technology can interfere with 802.11g signals?

21

Which port is used by passive FTP?

DWDM

Which protocol allows for greater throughput by assigning each signal a separate wavelength?

NTP

Which protocol needs to be enabled to allow Kerberos to work?

CWDM

Which selection is a multiplexing technology in WEN environments that combines multiple data streams onto a single fiber optic cable?

LWAPP

Which standard is commonly used to control thin-client wireless access points?

RAM

Which system component is typically the bottleneck when deciding how many VMs a physical box can hold?

Honeynet

Which technique would be used to test the network security of a particular network by allowing it to accept security attacks?

DOCSIS

Which technology enables data to be transported over wiring that carries cable television signals?

Jumbo frames

Which technology improves Ethernet data-transmission speed over a network?

IaaS

Which technology provides a Cloud-based computer that can be scaled-up as necessary, providing additional network capability, memory, CPUs, and storage?

goodput

Which term describes the rate at which usable information bits are delivered from one node to a destination?

behavior-based

Which type of IDS detects intrusions by examining traffic outside the "norm"?

Skype

Which type of application would benefit most from traffic shaping on a busy network?

CAT 6a

Which type of cabling is needed for speeds greater than a gigabit?

symmetric and asymmetric

Which type of encryption is used when securely sending a payment over the internet?

authoritative

Which type of name server is an SOA server?

SNMP

Which type of protocol is used to automate the updating of multiple VLAN switches?

Star

Which type of typology typically uses a hub to connect multiple machines?

VMware Workstation

Which virtualization technology is not necessarily part of the cloud?

n

Which wireless standard provides the best possible throughput?

The UNIX server IP will begin 192.168.4. And the final octet can be 2 or any number between 4 and 254.

You are attempting to connect to a UNIX server on your subnet. Your IP address is 192.168.4.3 with a subnet mask of 255.255.255.0 and your default gateway is 192.168.4.1. Which of the following is correct?

54 Mbps

You are creating a wireless network infrastructure for your company. You have three 802.11g WAPs to install. You decide to install them all within 50 meters of each other and set the channel to 1. After you finish the installation, what will the theoretical bandwidth of your network be?

SSL

You are looking into setting up a VPN connection at your offices and you want the VPN to operate at the highest layer of the OSI model. Which protocol would allow this?

CSMA/CD

You are using Gigabit Ethernet for the backbone of you LAN. Which of the following access methods does Gigabit Ethernet use?

cat5e cable, switch

You have been tasked with doing some consultant work for a small business. They want eight computers to be networked together. The small business wants their users to be able to share files with one another but not access the public internet. What items will you need to setup to get them up and running? (Select two.)

mesh

You have infinite resources (time, money, etc.). Which topology would you setup to get the best overall service?

Snips

You have just entered your MDF and are about to do a major upgrade on your network. In order to do so, you need to cut 100 pairs of wire in half. What tool will you use to do this?

the router does not let it pass through

You have just installed a new router in your organization and are now monitoring traffic with a packet analyzer. What do you notice about how a router treats broadcast packets on your network?

Implement VLANs on the switch

You have only one switch but you want it to support two separate network segments. What should you do to accomplish this?

OC1

You need to provide at least 50 Mbps to your office. What is the minimum one-line solution you could use?

When a router has been moved to another location

You work as an assistant network administrator for a medium sized company. You have been tasked with maintaining your company's configuration management documentation. When would it be a good time to make updates to your network maps?

198

Your subnet mask is 255.255.255.0. Your IP address is 210.35.156.198. What is the host ID?

a device can send and receive data simultaneously

Your supervisor tells you that he wants to install cable and NICs that will run full duplex. What does he mean by full duplex?

authorization

________ involves defining what a person accessing data can do with it.

clustering

__________ involves using multiple servers to provide load balancing.

hypervisor

__________ is an extra layer of programming to manage interaction between multiple OS's and hardware without the need for a host OS.

Port mirroring

__________ is used to redirect all traffic on a switch to a particular port.

modal distortion

____________ refers to the "direction" light goes down a channel.

caching

____________ stores requested data for subsequent use.

QoS

______________ adds a priority bit to give certain applications priority.


Set pelajaran terkait

Chapter 1: Introduction to Nursing PrepU

View Set

Chapter 25 The Sensory System - Eye

View Set

Quiz: Annuity Settlement Options

View Set

FIN437 Extra Questions for Exam 2

View Set

Law & Ethics for Health Professionals: Chapter 05

View Set

Depressive disorder, bipolar disorder, suicide, and self-injury

View Set