370 456,789

Ace your homework & exams now with Quizwiz!

Which of the following is NOT a good reason to segment a network?

To increase the number of networking devices on a network

Which port mode on a switch enables that port to manage traffic for multiple VLANs?

Trunk

What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?

Virtual switch

Which remote file access protocol is an extension of SSH?

Which remote file access protocol is an extension of SSH?

You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize that you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?

evil twin

A routing protocol's reliability and priority are rated by what measurement?

AD

Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?

ANT+

Which routing protocol does an exterior router use to collect data to build its routing tables?

BGP

Which transmission characteristic is never fully achieved?

Bandwidth

A hacker takes advantage of an open Bluetooth connection to send a virus to a user's smartphone. What kind of security breach has occurred?

Bluejacking

Which Carrier Sense technology is used on wireless networks to reduce collisions?

CSMA/CA

What is the earliest twisted-pair cabling standard that meets the minimum requirements for 10GBase-T transmissions?

Cat 6a

What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?

Checksum

Which Bluetooth class has the highest power output?

Class 1

What kind of cable uses BNC connectors? Which connector is likely to be used by cable TV?

Coaxial cable, F-connector

A spoofed DNS record spreads to other DNS servers. What is this attack called?

DNS poisoning

Which type of DoS attack orchestrates an attack using uninfected computers?

DRDoS (Distributed Reflection DoS) attack

Which of these attacks is a form of Wi-Fi DoS attack?

Deauthentication attack

When a router can't determine a path to a message's destination, where does it send the message?

Default gateway

Which encryption benchmark ensures data is not modified after it's transmitted and before it's received?

Integrity

What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?

Layer 3

Leading up to the year 2020, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2020. What type of threat was this?

Logic bomb

With which network connection type does the VM obtain IP addressing information from its host?

NAT mode

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

Which kind of crosstalk occurs between wire pairs near the source of the signal?

NEXT

A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?

NFC

At which OSI layer does IP operate?

Network Layer

What do well-chosen subnets accomplish?

Network documentation is easier to manage.

Which OSI layer is responsible for directing data from one LAN to another?

Network layer

Which remote access protocol is used over an Ethernet network?

PPoE

What cloud computing services model gives software developers access to multiple operating systems for testing?

PaaS

What kind of attack simulation detects vulnerabilities and attempts to exploit them?

Penetration testing

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?

Phishing

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

Posture assessment

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?

Rouge AP

Which of the following is considered a secure protocol?

SSH

Which kind of multiplexing assigns slots to nodes according to priority and need?

STDM (statistical time division multiplexing)

What kind of route is created when a network administrator configures a router to use a specific path between nodes?

Static route

What is the Internet standard MTU?

1,500

How many bits of a Class A IP address are used for host information?

24

NAT mode

2n - 2 = Z

What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130 hosts per subnet?

8

Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?

802.11n

Which IEEE standard determines how VLANs work on a network?

802.1Q

What technology does Bluetooth use to take advantage of the 79 channels allocated to the Bluetooth band?

FHHS

What software allows you to define VMs and manage resource allocation and sharing among them on a host computer?

Hypervisor

Which two protocols manage neighbor discovery processes on IPv4 networks?

ICMP and ARP

Which encryption protocol does GRE use to increase the security of its transmissions?

IPsec

Which one of the following wireless transmission types requires a clear LOS to function?

Infrared

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat


Related study sets

Security+ SY0-501 Practice - Set A

View Set

Financial Analysis - Ratios - liquidity Ratio - current ratio

View Set

ECN 375 Exam #4 Practice Problems

View Set

Unit 1.2: Primate Diversity (Tarsiers, Lorises, Lemurs)

View Set

Covenant College | 20th Century World History | Exam 1

View Set