Networking week 8

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When using IPv6, what would a /64 network likely be assigned to?

A smaller organization or business.

How is a posture assessment performed on an organization?

A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.

When an 802.1Q tag is added to an Ethernet frame, where is it placed?

It is inserted between the source address and the Ethernet type field.

What statement regarding the different versions of the SHA hashing algorithm is accurate?

SHA-2 and SHA-3 both support the same hash lengths.

In the typical social engineering attack cycle, what occurs at Phase 3?

The attacker exploits an action undertaken by the victim in order to gain access.

In a red team-blue team exercise, what is the purpose of the blue team?

The blue team is charged with the defense of the network.

If the EUI-64 standard is used, what part of an IPv6 address is affected?

The last four blocks of the address.

In an IPv6 address, what do the first four blocks or 64 bits of the address represent?

The site prefix or global routing prefix.

A variant of BYOD, what does CYOD allow employees or students to do?

They can choose a device from a limited number of options.

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

True

A drop ceiling could be used by an intruder to gain access to a secured room.

True

By default, the native VLAN is the same as the default VLAN.

True

Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

True

IPv6 addressing does not utilize classful addressing, therefore every IPv6 address is classless.

True

In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.

True

Network segmentation at Layer 2 of the OSI model is accomplished using VLANs.

True

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

VLAN 1001

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

tailgating

A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

On a Cisco switch, what would the security association identifier be for VLAN 13?

100013

A network with 10 bits remaining for the host portion will have how many usable host addresses?

1022

Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?

172.16.0.0

An IP address of 192.168.18.73/28 has what network ID?

192.168.18.64

By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

24

What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number of hosts per subnet?

255.255.224.0

How many /64 subnets can be created within a /56 prefix?

256

How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?

4 bytes

How many subnets can a /48 site prefix support?

65,536 subnets

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

1. A native VLAN mismatch occurs when two access ports that are connected to each other are both tagging traffic with different VLAN IDs.

False

A hacker, in the original sense of the word, is someone with technical skill and malicious intent.

False

All that is needed to provide communication between two VLANs is a DHCP relay agent.

False

An unmanaged switch can still support the creation of VLANs, provided there is an interface for configuration.

False

Different types of organizations have similar levels of network security risks.

False

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

False

Network segmentation decreases both performance and security on a network.

False

Only Class B and Class C networks can be subnetted.

False

Written response

IDK

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable use policy document

An interface that manages traffic from multiple VLANs is known by what term?

aggregation port

An RFID label on a box is an example of what type of physical security detection method?

asset tracking tagging

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

cipher lock

What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?

deauthentication attack

How often should you require users to change their passwords?

every 60 days

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

honeynet

On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?

ip helper-address

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

logic bomb

An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

man-in-the-middle attack

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

quid pro quo

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

sha256sum


Set pelajaran terkait

Corporation Law: Corporation as a Person

View Set

Intro to Business Chapter Seven Quiz

View Set

BABOK V3 CBAP Study Guide: Techniques

View Set

ATI Nutrition Practice Questions

View Set

the powerhouse of the cell is the mitochondria

View Set

TX PACT science 4-8: Domain I & II- Scientific Instruction & Scientific process

View Set

Ch. 21 -- Inventory Mnmt., JIT and Simplified Cost Method (Adv. Mnmt. Acct.)

View Set