Network+ Chapter 10, 11, 12 2016

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is not a step that should be taken as part of a response policy?

Attempt to access files to determine if they are compromised

STP selects the root bridge based on what option below?

BID (BRIDGE ID)

A software configuration that can be used to disable STP on specific ports, such as the port leading to the network's demarc. It prevents access to network links that should not be considered when plotting STP paths in a network.

BPDU filter

Match A INTERFACE variety of ISDN that uses two 64-Kbps bearer channels and one 16-Kbps data channel, as sumarized by the notation 2Bps.

BRI (basic rate interface)

Match Control and provisioning of wireless access points

CAPWAP

In CIDR notation, the forward slash plus the number of bits used for the network ID. For example, the CIDR block 199.34.89.0/22 is /22

CIDR block

Match The guaranteed minimum amount of bandwidth selected when leasing a frame relay circuit. Frame relay costs are partially based on this.

CIR (committed information rate)

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

Carrier Ethernet Transport

When using frame relay, what is the name of the identifier that routers use to determine which circuit to send frame to?

DLCI (data link connection identifier)

In order to provide access to a historian by personnel working on the corporate network that are not authorized to work on the ICS network, where should the historian be placed?

DMZ

Which version of DOCSIS provides 38 Mbps per channel and requires a minimum of 4 channels to be used?

DOCSIS 3

Match A connectivity device located at a telecommunications carrier's office that aggregates multiple DSL subscriber lines and connects them to a larger carrier or to the Internet backbone.

DSLAM (DSL access multiplexer)

The customer's endpoint device on the WAN is called the _________.

DTE (Data Terminal Equipment)

What should be the first step of a response policy?

Determine if escalation is necessary

How can VLAN hopping attacks be prevented on a network?

Disable auto trunking and move native VLANs to unused VLANs

The time period in which a change can be implemented is known as?

maintenance window

What team member role coordinates the resources necessary to solve a problem?

manager

Match mostly owned and operated by companies that use them

LANs

In _________ , a vNIC relies on the host machine to act as a NAT device.

NAT mode

When copper cabling is used to carry T-1 traffic, what kind of connector is used?

RJ-48

With the VTP, the VLAN database is stored on a switch known as which option below?

stack master

The first iteration of STP was defined in what IEEE standard below?

802.1d

Match An enclosure made of conductive material that is designed to block electromagnetic signals, including Wi-Fi.

Faraday cage

A network with the subnet mask 255.255.255.0 would have what CIDR block?

/24

The best 802.11n signal can travel approximately how far?

1/4 mile

Match Metro Ethernet

10 Gbps available up to 100 Gbps in works

An active card, which contains an internal battery, can provide a usable range of up to what distance?

150m

Match services were analog

1G

How many channels exist in a T1 connection?

24

Which supernet mask below would allow an organization to cover the following networks with one routing entry: 192.168.0.0/24 192.168.1.0/24 192.168.2.0/24 192.168.3.0/24

255.255.252.0

A CIDR block of /26 is equivalent to what subnet mask below?

255.255.255.192

Match services use digital transmission; data rate 240 Kbps

2G

What is the frequency range of the C-band that is used by satellites?

3.4 - 6.7 GHz

In a PON system, an OLT contains a splitter that splits each port into how many logical channels?

32

Match data (not voice) communications use packet switching; data rate 384 Kbps

3G

What is the maximum throughput of a DS3 connection?

44.736

Match all-IP, packet-switched network for both data and voice transmission; throughout 100 Mbps for fast-moving mobile clients

4G

What is the size of an ATM packet?

53 bytes

A network with 6 bits remaining for the host portion will have how many usable hosts?

62

What is the maximum amount of throughput provided by an OC-12?

622.08 Mbps

In an ISDN connection, what is the size throughput a single B channel provide?

64 Kbps

What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?

802.1Q

The shortest path bridging protocol is defined in what IEEE standard?

802.1aq

What is a historian?

A centralized database of collected and analyzed data and control activities.

What xDSL standard is the most popular?

ADSL

What two network protocols below rely on virtual circuits?

ATM FRAME RELAY

Match A WAN technology functioning primarily at Layer 2 (although its protocols can also reach layers 1 and 3) that was originally conceived in the early 1980s at Bell Labs and standardized by the ITU in the mid-1990s.

ATM (Asynchronous Transfer Mode)

________ is a process of investigating deeper data on a computer and will essentially autopsy the computer to discover hidden data, such as deleted files fragments, and who has accessed that data and when.

Computer forensics

A centrally managed DHCP server can provide DHCP to multiple VLANs by configuring a ___________________.

DHCP relay agent

A MAN connection is also known as which two terms below?

Ethernet MAN Metro Ethernet

Any device in an ICS that is motorized and can control the physical system is called a fieldbus. T or F

F

Cipher locks are not designed for physical security, such as on an outside door. T or F

F

Network segmentation decreases both performance and security on a network. T or F

F

Only Class B and Class C networks can be subnetted. T or F

F

T-1 cables cannot utilize straight through cables using the same wiring scheme as LAN patch cables.

F

The first step of a response policy should be secure the area. T or F

F

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network. T or F

F

What two completing standards exist for cell phone networks?

GSM CDMA

Match A computer, including hardware and software, that technicians use to monitor and manage physical systems in an industrial system.

HMI (human-machine interfaces)

Cisco's proprietary standard, similar to VRRP, that assigns a virtual IP address to a group of routers. At first, messages routed to the virtual IP address are handled by the active router. If the active router fails, standby routers stand in line to take over responsibility for the virtual IP address.

HSRP (Hot Standby Routing Protocol)

Match A 4G cellular network technology that , in its latest version (called LTE-Advanced), achieves downlink data rates of up to 3 Gbps and uplink rates of up 1.5 Gbps. AT&T and Verizon have adopted LTE for their high-speed wireless data networks.

LTE (long Term Evolution)

Match direct all wireless frames to the controller by adding extra headers to the frames

LWAPP

At what two layers of the OSI model are LAN and WAN protocols likely to differ?

Layer 2 Layer 1

What protocol is common used to aggregate / bond T-1 / T-3 lines?

MLPPP

Match intentions of two or more parties enter into a binding agreement, or contract

MOU (memorandum of understanding)

Match A supervisory computer or server in an ICS or SCADA system that controls the physical system. Also called the control server or the SCADA server.

MTU (master terminal unit)

Match A WAN technology that sends Ethernet traffic across MAN connections.

Metro Ethernet

Match provides higher bandwidth at lower costs than current T-carrier and other options that rely on TDM (such as SONET)

Metro Ethernet

What type of VLAN automatically receives all untagged frames?

Native VLAN

A VLAN on a switch that will automatically receive all untagged frames. Options for native VLANs vary according to the switch manufacturer and model

Native Vlan

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?

OC-48

The _______ distributes signals to multiple endpoints via fiber-optic cable, in the case of FTTP, or via copper or coax cable.

ONU (Optical Network Unit)

Match correction, improvement, or enhancement to software

PATCH

Frame relay relies on what two different types of virtual circuits?

PVC SVC

Match request to vendors to submit a proposal for a product or service

RFP (request for proposal)

The virtualization of network services in which a network controller manages these services instead of the services being directly managed by the hardware devices involved.

SDN (software defined networking)

Match Legally binding contract that defines aspects of a service provided to a customer

SLA

Match A document that details the work that must be completed for a particular project, including specifics such as tasks, deliverable, standards, payment schedule, and work timeline.

SOW (statement of work)

To eliminate the possibility of traffic loops on a switches and bridges, the ________ is used.

STP (Spanning Tree Protocol)

Match An intelligent type of NIU located at the customer's demarc that can provide diagnostic information about the interface.

Smart Jack

A bus topology WAN is often the best option for an organization with only a few sites and the capability to use dedicated circuits.

T

Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network. T or F

T

Every security policy should included a response policy, which specifically defines the characteristics of an event that qualifies as a formal incident and the steps that should be followed as a results. T or F

T

In a PON setup, the system is considered passive because no repeaters or other devices intervene between the carrier and the customer. T OR F

T

The Spanning Tree Protocol stipulates that on any bridge, only one root port, which is the bridge's port that is closest to the root bridge, can forward frames toward the root bridge.

T

The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE) T OR F

T

The first step in asset management is to inventory all the components on the network. T or F

T

The use of virtualization allows for isolation of each guest system such that problems on one system do not affect another system. T or F

T

Multiplexing enables a single _______ circuit to carry 24 channels, each capable of 64 Kbps throughput.

T-1

Match major change to a software

UPGRADE

Match Identifies groups of devices whose data should be given priority handling

VLAN

An attack in which the attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.

VLAN hopping

A _________ occurs when an attacker generates transmissions that appear, to the switch, to belong to a protected VLAN.

VLAN hopping attack

A standard that assigns a virtual IP address to a group of routers. At first, messages routed to the virtual IP address are handled by the master router. If the master router fails, backup routers stand in line to take over responsibility for the virtual IP address.

VRRP (virtual router redundancy protocol)

Match owned and operated by telecommunications carriers, known as NSPs

WANs

Match use 2-to-11-to-66 GHz range

WiMax

Which option below is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

You pay only for the bandwidth you've used

In order to allow communication between VLANs for exchange of data, what must be used?

a router

The interface on a switch used for an end node. Devices connected to access ports are unaware of VLAN information.

access port

A server that collects and stores raw data, and connects to field devices from which it receives raw data and passes data on to other SCADA systems, is known as what two terms below?

acquisitions server

Match An ICS server that collects and stores raw data. This server connects to field devices from which it receives the raw data and passes that information on to other servers in the SCADA system.

acquisitions server

eDiscovery and computer forensics reveal what two different types of data?

active data ambient data

In computer forensics, hidden data such as deleted files and file fragments are known as what term?

ambient data

Match rollback

backleveling

A rollback is also know by what two terms below?

backleveling downgrading

Match A method of authentication in which a device scans an individual's unique physical characteristics, such as the color patterns in her iris or the geometry of her hand, to verify the user's identity.

biorecognition access

What type of physical security solution involves a device that scans an individual's unique physical characteristics?

biorecognition access

Which network type allows a vNIC to access a network directly using the host machine's NIC?

bridged mode

The goal of a disaster recovery plan is to ensure ________.

business continuity

In ATM, a packet is called a ______ and always consists of 48 bytes of data plus a 5 byte header.

cell

Match lightweight wireless protocol

centralized wireless management

Which type of disaster recovery site is a place where the computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected?

cold site

A switch is typically preconfigured with one __________ that includes all its ports.

default VLAN

Match cannot be renamed or deleted

default vlan

Match A magnetic hard drive eraser

degausser

What type of device can be used to erase contents of a hard drive using a magnetic field?

degausser

Match plan for managing the crisis

disaster recovery plan

Which team role is the person on call who first notices or is alerted to a problem?

dispatcher

What two terms describe the process that can reveal a great deal of information, called ESI (electronically stored information)?

eDiscovery electronic discovery

5 A special case of geosynchronous orbit in which the satellites stays directly above the equator and appears stationary from Earth.

geostationary orbit

Which virtual network type allows VMs to communicate with each other on the same host but disallows communication with other nodes on the network?

host-only mode

At what type of recovery site would computers, devices, and connectivity necessary to rebuild a network exist, and all are appropriately configured, updated, and connected to match your network's current state?

hot site

Telenet and SSH are known as what type of management system?

in-band

Which of the following is not a valid reason for using virtualization?

increase performance

Upon receipt of what type of notification is a company required to activate a defensible policy for the preservation of relevant data?

legal hold

Match untagged VLAN

native vlan

What two methods might be used by an ICS to control a physical system?

open loop system closed loop system

What protocol is used to provide a common language between virtualized service applications and a network's physical devices?

openFlow

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?

out-of-band management

What type of software is a correction, improvement, or enhancement to a piece of software?

patch

When performing inventory on software packages, which of the following is not something that should be inventoried?

proprietary source code

Match A smart card that does not require direct contact with a proximity reader in order to be detected and read.

prox card

What team member role, if necessary, learns about the situation and the response and then acts as official spokesperson for the organization to the public or other interested parties?

public relations specialist

If a destructive program is running that might be destroying evidence, what should be done?

pull the power cable

In what type of topology is each site connected to two other sites, providing redundancy?

ring topology

Match A type of WAN in which each site is connected to two other sites so that the entire WAN forms a ring pattern.

ring topology WAN

Match process of reverting to a previous version of software

rollback

In an IPv6 address, the first 64 bits of the address are known as what?

routing prefix

Microsoft sometimes releases a major group of patches to Windows or a Microsoft application, which it calls a _______.

service pack

Match An electronic access badge

smart card

If the line between the carrier and the customer experiences significant errors on a T-1, a _______ will report this fact to the carrier.

smart jack

What layer 3 technology is employed by distance-vector routing protocols in which a router knows which of its interfaces a routing update and will not retransmit, or adverstise, that same update on the same interface?

split horizon

What team member role focuses on only one thing: solving the problem as quickly as possible?

technical support specialist

Match A term that sometimes refers to wired communication, but generally refers to wireless communication that transmits data regarding specific measurements and conditions, such as weather data transmitted from a weather balloon to ground antennas.

telemetry

A _________ is a small network that is segmented from the rest of the network, and contains computers, called test beds.

testing lab

Match The equipment on a satellite that receives an uplinked signal from Earth, amplifies the signal, modifies its frequency, then retransmits it (in a downlink) to an antenna on Earth.

transponder

A single switch can manage traffic belonging to serveral VLANs on a single interface, by configuring the interface as what option below?

trunk port

The interface on a switch capable of managing traffic from multiple VLANs. A trunk is a link configured between two switches' trunk ports.

trunk port

A server that exists as a virtual machine, created and managed by virtualization software on a host, or physical, computer.

virtual server

Which type of recovery site is a place where computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected?

warm site


Set pelajaran terkait

Ch. 16: Financial Leverage and Capital Structure Policy

View Set

Los meses del año y las estaciones

View Set

period 7 AMSCO multiple choice questions

View Set

Chapter 19: Civil Liberties-First Amendment Freedoms

View Set