Test ?s and Info

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following PDUs is used by a connectionless protocol? A. Frames B. Segments C. Streams D. Datagram

D Explanation:UDP is a connectionless transport protocol that operates in the transport layer of the OSI model. UDP stands for User Datagram Protocol. PDUs (Protocol Data Units) used by UDP are known as Datagrams.

Which of the answers listed below refers to an encryption algorithm used in TKIP? DES 3DES AES RC4

RC4

Which of the following acronyms refers to a client authentication method used in WPA/WPA2 Personal modes? AES PSK RC4 IKE

PSK

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. PTR record resolves an IP address to a hostname for reverse lookups. The functionality provided by a PTR record is the opposite of A and AAAA DNS records. PTR record maps a domain name to a list of mail servers for that domain.

PTR record resolves an IP address to a hostname for reverse lookups. The functionality provided by a PTR record is the opposite of A and AAAA DNS records

The answers below have been arranged to represent the DNS hierarchy, from the highest level of the DNS tree (1), to the lowest level (5). Which of these answers are out of order? (Select all that apply) 1. Root domain (".", e.g. the optional trailing dot in "example.com.") 2. Top level domain (e.g. ".com", ".org", or ".edu") 3. Subdomain (e.g. "department" in "department.example.com") 4. Second level domain (e.g. "example.com") 5. Host or resource name (e.g. "a" in "a.department.example.com")

3 & 4 Structure is : Root Level. Top Level Domains. Second Level Domains. Sub-Domain. Host.

A technician installs a new piece of hardware and now needs to add the device to the network management tool database. However, when adding the device to the tool using SNMP credentials, the tool cannot successfully interpret the results. Which of the following would need to be added to the network management tool to allow it to interpret the new device and control it using SNMP? A. TRAP B. GET C. MIB D. WALK

C A management information base is a database used for managing the entities in a communication network. Most often associated with the Simple Network Management Protocol, the term is also used more generically in contexts such as in OSI/ISO Network management model

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols? A. Firewall B. Router C. 802.11 AP D. Switch

C Explanation:802.11 AP is a Wireless Access Point used in a wireless network.If two computers on a network send data frames at the same time, a collision between the frames can occur. The frames are then discarded and the sending computers will attempt to send the data again.Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks where computers connected to the wireless network attempt to avoid collisions by transmitting data only when the channel is sensed to be "idle". Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers connected to the wireless network often cannot see each other so CSMA/CA is a better option for avoiding collisions.Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless network. This goes some way to alleviating the problem of computers not being able to see each other because in a wireless network, the Wireless Access Point only issues a "Clear to Send" to one node at a time. With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to Send (CTS) packet is sent by the intended receiver. This will alert all computers within range of the sender, receiver or both, to not transmit for the duration of the transmission. This is known as the IEEE 802.11 RTS/CTS exchange.

A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames? A. HTTPS B. Fibre channel C. iSCSI D. MS-CHAP

C Explanation:A NAS or a SAN will use either iSCSI or Fiber Channel. In this question, the NAS is connected to an Ethernet network. Therefore, iSCSI will most likely be used (Fiber Channel over Ethernet (FCoE) can be used but is less common). ISCSI means Internet SCSI. ISCSI uses TCP (Transmission Control Protocol) which enables it to be used over TCP/IP networks such as Ethernet.For Fiber channel, a separate Fiber Channel network would be required unless FCoE is used.

Which of the following statements describing the function of a DNS PTR record are true? (Select 2 answers) A.) PTR record creates a pointer that maps a hostname to an IP address for reverse lookups. B.) The functionality provided by a PTR record allows multiple domain names to resolve to the same IP address. C.) PTR record resolves an IP address to a hostname for reverse lookups. D.) The functionality provided by a PTR record is the opposite of A and AAAA DNS records. E.) PTR record maps a domain name to a list of mail servers for that domain.

C & D

Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? MX CNAME AAAA PTR

CNAME

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue? A. Increase installed memory and install a larger flash module. B. Increase the number of VLANs configured on the switch. C. Decrease the number of VLANs configured on the switch. D. Increase the number of virtual terminals available.

D Explanation:You can set a limit of how many virtual terminals that can simultaneously be connected to a switch. Here the limit is set to one, and we should increase it. For a Cisco network device:You can use virtual terminal lines to connect to your Cisco NX-OS device, for example a switch. Secure Shell (SSH) and Telnet create virtual terminal sessions. You can configure an inactive session timeout and a maximum sessions limit for virtual terminals.session-limit sessions Example:switch(config-line)# session-limit 10Configures the maximum number of virtual sessions for the Cisco NX-OS device. The range is from 1 to 64.

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? EAP-TLS PEAP EAP-TTLS EAP-FAST

EAP-TLS

T1/E1 & T3/E3

T1 lines are a form of T-carrier lines that offer transmission speeds of 1.544 Mbps. E1 refers to the European equivalent of T1. See also T-carrier.

A security protocol designed to strengthen WEP implementations is known as: PEAP TKIP CCMP WPA2

TKIP

What is the name of an AES-based encryption mode implemented in WPA2? CCMP ECB CBC TKIP

TKIP


Set pelajaran terkait

Natural Selection and Motivation - Psych 1 Final

View Set

Semester 1 Child Development Exam 2

View Set

EverFi: Budgeting for your Loans

View Set

Statistics Exam 1 Definitions (Ch 1, 2, 3)

View Set

Black Swans and Unpredictability

View Set

Automotive Brakes 2023-2024 55-2

View Set

CSS -Defines How HTML is Displayed

View Set