CIS 150 FINAL STUDY GUIDE
You are hired as a network administrator to monitor the organization's network status on an ongoing basis to make changes to meet the needs of your network's users. One feedback that you have received from the network engineer of the firm is that there is a lot of delay in network communications because some of the devices used in the network are resending transmissions. Which of the following KPIs will help you in getting a better understanding of the situation? Packet drops Utilization Jitter Error rate
Packet drops
With which network connection type does the VM obtain IP addressing information from its host? a. NAT mode b. Managed mode c. Isolation mode d. Bridged mode
a. NAT mode
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use? a. NDA b. AUP c. MDM d. BYOD
a. NDA
Which port mode on a switch enables that port to manage traffic for multiple VLANs? a. Trunk b. Private c. Access d. Community
a. Trunk
What type of attack relies on spoofing? a. Friendly DoS attack b. Deauth attack c. Tailgating d. Pen testing
b. Deauth attack
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? a. Vulnerability b. Denial of service c. Principle of least privilege d. Insider threat
d. Insider threat
Which cloud management technique executes a series of tasks in a workflow? a. Automation b. SLA c. IaC d. Orchestration
d. Orchestration
Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data? a. Choke packet b. Stop-and-wait c. Go-back-n sliding window d. Selective repeat sliding window
d. Selective repeat sliding window
Ethernet uses which of the following switching types? A. circuit switching B. packet switching
B. packet switching
Which of the following would an environmental monitoring system not track? a. User authentication b. Data room lights c. UPS voltage d. Liquid detection
a. User authentication
A T1 circuit is composed of how many DS0 channels? A. 2 B. 8 C. 24 D. 32
C. 24
According to Nyquist, how many 8-bit samples must be taken each second to accurately reproduce a human voice with a 4000 Hz range? A. 1544 B. 4000 C. 8000 D. 64000
C. 8000
Which technology uses statistical multiplexing and committed information rates to emulate leased circuits? A. broadband cable B. DSL C. Frame Relay D. ISDN
C. Frame Relay
At what physical point does a network stop belonging to a customer, and start belonging to the service provider? A. carrier backbone B. carrier core C. demarcation D. LAN core
C. demarcation
This wireless protocol offers bandwidth of up to 12 Mbps down and 5 Mbps up, and relies on a structure of cells to provide contiguous coverage across a broad geographic area? A. 2G B. EDGE C. HSPA+ D. LTE
D. LTE
Which of the following wireless technologies uses an all-IP core and allows data rates up to 12 Mbps? A. CDMA B. GSM C. HSPA+ D. LTE
D. LTE
Which of the following occurs when there is fluctuation in voltage levels caused by other devices on the network or EMI? Noise Blackout Surge Brownout
Noise
Which of the following monitors traffic at a specific interface between a server or client and the network? Protocol analyzer Network monitor Port mirroring Reporting
Protocol analyzer (A network monitor is a tool that continually monitors network traffic and might receive data from monitored devices that are configured to report their statistics. A similar tool, a protocol analyzer, can monitor traffic at a specific interface between a server or client and the network.)
JV Steels has established its manufacturing plant in Alabama. Reports of a huge thunderstorm have surfaced in the media. As a network analyst at JV Steels, what kind of a power flaw should you be prepared for? Blackout Brownout Surge Noise
Surge
Which of the following is a battery-operated power source directly attached to one or more devices and to a power supply, such as a wall outlet, that provides a backup power source in the event of a power outage? Generator PDU UPS Surge protector
UPS
What command requests the next record in an SNMP log? a. SNMP Get Next b. SNMP Get Request c. SNMP Get Response d. SNMP Trap
a. SNMP Get Next
Which of the following is considered a secure protocol? a. Telnet b. SSH c. HTTP d. FTP
b. SSH
How many bits of a class A IP address are used for host information? a. 8 bits b. 16 bits c. 24 bits d. 32 bits
c. 24 bits
Which port is used to establish an SSH connection to a Linux device and manage it remotely? 8080 443 21 53 22
22
Which technology uses a fixed cell size of 53 bytes to optimize transmission of voice, video, and data? A. ATM B. DSL C. ISDN D. PON
A. ATM
This is an OSI Layer 1 device that connects a router to a T1 WAN at its demarcation point. Hint: They are cards that insert into these routers, and appear as "Serial x/x" in the router's Command Line Interface. A. CSU/DSU B. Ethernet NIC C. FRAD D. modem
A. CSU/DSU
What is the bandwidth of a DS0 channel? A. 56 Kbps B. 64 Kbps C. 128 Kbps D. 1544 Kbps
B. 64 Kbps
Which of these hardware metrics needs to be measured to ensure the availability of the network? [Choose all that apply] CPU utilization Temperature Hard drive space Memory
CPU utilization Temperature Memory
Which of the following backups is managed by third-party vendors? Incremental backup Full backup Cloud backup Differential backup
Cloud backup
Which of the following technologies allows carriers to mix both circuit-switched connections and packet-switched connections over the same packet-switched network infrastructure by adding labels to packets carried over that infrastructure? A. CLEC B. HSPA C. LTE D. MPLS
D. MPLS
What is the major difference between the File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP)? TFTP can only be used on routers TFTP needs fewer resources than FTP FTP can only be used on Windows devices TFTP can only be used on Linux devices
TFTP needs fewer resources than FTP
Which of the following KPIs (key performance indicators) refers to the actual throughput used as a percentage of available bandwidth? Packet drops Utilization Jitter Error rate
Utilization
A__________ site contains all the relevant network equipment and data but needs to be configured in the event of a disaster. Warm Cold Hot Cloud Passive
Warm
Which formulas can be used to calculate the magic number? Choose two. a. 256 - the interesting octet b. 2n c. 2h - 2 d. 2h
a. 256 - the interesting octet d. 2^h
What information does the switchport port-security command use to restrict access to a switch's interface? a. IP address b. MAC address c. Broadcast address d. Port number
b. MAC address
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client. When you run your network monitor later this afternoon, what list will your coworker's computer likely show up on? a. Jabbers b. Top listeners c. Giants d. Top talkers
b. Top listeners
What port do SNMP agents listen on? a. Port 21 b. Port 20 c. Port 161 d. Port 162
c. Port 161
Which type of switch connects all devices in a rack to the rest of the network? a. Spine switch b. Core switch c. ToR switch d. EoR switch
c. ToR switch
Active Directory and 389 Directory Server are both compatible with which directory access protocol? a. Kerberos b. RADIUS c. AD DS d. LDAP
d. LDAP
Which backup site includes a running server that does not have access to the latest backups? a. Cold site b. Hot site c. On site d. Warm site
d. Warm site
Which of the following can be determined using a WiFi Analyzer? [Choose all that apply] The domain name of the network Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point Wireless Access Point password
Available Wireless Access Points Wireless Access Point signal strength The frequency of the Wireless Access Point
These devices reside at the customer's location(s), but belong to the service provider, and provide connectivity to the provider's network(s): A. CO (Central Office) B. CPE (Customer Premises Equipment) C. Local Loop D. SNA (System Network Architecture)
B. CPE (Customer Premises Equipment
Which of the following technologies uses coaxial cable to distribute high-speed data over the same media used for television signals? A. ATM B. DOCSIS C. DS1 D. HDSL
B. DOCSIS
Jeff Green has been hired as a systems analyst by an online retail company. The company is expecting a huge network traffic triggered by the Christmas sale, which will begin from the midnight of December 23. There is an urgent need to adopt a congestion control technique, and it is Jeff's responsibility to ensure that he selects an appropriate open-loop congestion control technique to prevent this congestion before it occurs. Which of the following techniques should Jeff ideally choose to ensure that important traffic can survive the congestion while less sensitive frames are discarded? Acknowledgment policy Window policy Admission policy Discarding policy
Discarding policy
Which application on Windows devices can be used to review events that occurred on the local system? Disk Management Task Manager Event Viewer File Explorer
Event Viewer
Which of the following needs to be done to ensure a backup can be scheduled? [Choose all that apply] Identify and configure storage solution for the backup Use a user account to create the backup Create a virtual switch in Hyper-V Install the Windows Server Backup feature Configure a network interface card
Identify and configure storage solution for the backup install the Windows Server Backup feature
Which of the following will affect the quality of VoIP calls? Latency Jitter Bandwidth CPU utilization
Jitter
A server needs to be added to a failover cluster, and a virtual switch needs to be created using Hyper-V Manager. The other server in the cluster has a preconfigured virtual switch named: PLCluster. What must be the name of the virtual switch that needs to be created? PL_Cluster PLCluster PLCluster1 PLABVS
PLCluster
Michigan Tires has hired you as a network administrator to monitor the network and to ensure that the network functions reliably. You will require a device to monitor the CPU temperatures of your servers. Which of the following software will you request from the management? PRTG dashboard by Paessler Room Alert Monitor by AVTECH Wireshark Spiceworks
PRTG dashboard by Paessler
After an incident has occurred resulting in data loss which of the following specifies the amount of acceptable data a company can lose? Mean Time Between Failure (MTBF) Mean Time To Repair (MTTR) Recovery Point Objective (RPO) Recovery Time Objective (RTO)
Recovery Point Objective (RPO)
Which service needs to be configured to ensure metrics for network devices can be captured? SMTP DNS SNMP DHCP
SNMP
When configuring a server for a failover cluster, what needs to be validated before adding the server to the cluster? [Choose all that apply] The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured The server has the Windows Server Backup feature installed The server uses a local user account to log in
The server has the same roles installed as other servers in the cluster The server has a network interface card configured the same as the other server in the cluster The hard drives are all similarly configured
Why is it essential for a Network Administrator to monitor network bandwidth utilization? [Choose all that apply] To detect malicious applications To detect the available hosts on the network To ensure applications function correctly To prevent users from accessing the internet To ensure users can connect to network resources
To ensure applications function correctly To ensure users can connect to network resources
Which of the following Log Level Severity levels indicates that there can be a potential problem? Critical error Warning Error Information
Warning
Which of the following criteria can a packet-filtering firewall not use to determine whether to accept or deny traffic? a. Application data b. Destination IP address c. SYN flags d. ICMP message
a. Application data
When shopping for a new router, what does the MTBF tell you? a. How long devices like this one will last on average until the next failure b. How much it will cost to repair that device c. How long until that device fails d. How long it will usually take to repair that device
a. How long devices like this one will last on average until the next failure
What software allows you to define VMs and manage resource allocation and sharing among VMs on a host computer? a. Hypervisor b. Terminal emulation c. SDN (software-defined networking) d. NFV (Network Functions Virtualization)
a. Hypervisor
Which log type would most likely be used first to investigate the cause of high numbers of dropped packets? a. Traffic log b. Audit log c. System log d. Jitter log
a. Traffic log Historical traffic logs can be used to investigate security breaches, confirm regulatory compliance, and investigate network performance issues. A system log tracks information on a single device and will not be helpful until you know which device(s) to check. The data in an audit log is thorough enough to retroactively prove compliance and is often used in forensics investigations; due to the level of detail included, an audit log is not likely the best place to start investigating a network problem. There's no such thing as a jitter log.
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes? a. Virtual switch b. Virtual firewall c. Virtual router d. Virtual load balancer
a. virtual switch
What is the greatest number of bits you could borrow from the host portion of a class B subnet mask and still have at least 130 hosts per subnet? a. 0 bits b. 8 bits c. 9 bits d. 10 bits
b. 8 bits
Which of the following is not one of the AAA services provided by RADIUS and TACACS+? a. Accounting b. Administration c. Authorization d. Authentication
b. Administration
Which log type is used to prove who did what and when? a. Traffic log b. Audit log c. System log d. Syslog
b. Audit log
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm? a. Dual power supplies b. Online UPS c. Standby UPS d. Generator
b. Online UPS
What information in a transmitted message might an IDS use to identify network threats? a. Port mirroring b. Signature c. ACL d. FIM
b. Signature
You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios? a. Access control vestibule b. Smart locker c. Locking rack d. Locking cabinet
b. Smart locker
While troubleshooting a recurring problem on your network, you want to examine the TCP messages being exchanged between a server and a client. Which tool should you use on the server? a. NetFlow b. Wireshark c. Spiceworks d. iPerf
b. Wireshark
Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address? a. access-list acl_2 permit icmp any any b. access-list acl_2 permit https any any c. access-list acl_2 deny tcp any any d. access-list acl_2 deny tcp host 2.2.2.2 host 3.3.3.3 eq www
b. access-list acl_2 permit https any any
Which IEEE standard determines how VLANs work on a network? a. 802.11 b. 802.1X c. 802.1Q d. 802.3af
c. 802.1Q
Which device would allow an attacker to make network clients use an illegitimate default gateway? a. Network-based firewall b. RA guard c. DHCP server d. Proxy server
c. DHCP server
What field in an IPv4 packet is altered to prioritize video streaming traffic over web surfing traffic? a. Time to Live b. Traffic Class c. DiffServ d. Priority Code Point
c. DiffServ
When repairing a coworker's computer, you find some illegal files. What should you do next? a. Delete the files. b. Take screenshots on the computer and save them in your own folder. c. Disconnect the computer from the network and leave it running. d. Shut down the computer and unplug it.
c. Disconnect the computer from the network and leave it running.
Which of the following is not a good reason to segment a network? a. To reduce the demand on bandwidth b. To limit access to broadcast domains c. To increase the number of networking devices on a network d. To narrow down the location of problems on a network
c. To increase the number of networking devices on a network
Your roommate has been hogging the bandwidth on your router lately. What feature should you configure on the router to limit the amount of bandwidth his computer can utilize at any one time? a. Congestion control b. Power management c. Traffic shaping d. Flow control
c. Traffic shaping Traffic shaping can be used to limit the volume of traffic flowing into or out of an interface
Which power device prevents a critical server from losing power, even for an instant? a. Surge protector b. Generator c. UPS d. PDU
c. UPS
Which device can manage traffic to multiple servers in a cluster so all servers equally share the traffic? a. Router b. Switch c. Load balancer d. Firewall
c. load balancer
What is the formula for determining the number of possible hosts on a network? a. 2n - 2 = Y b. 2n = Y c. 2h = Z d. 2h - 2 = Z
d. 2h - 2 = Z
Which of the following would be assigned an OID? a. A web server b. An NMS server c. A UDP port d. A switch's interface
d. A switch's interface A device, such as a web server, can be managed by an NMS server, typically using UDP ports 161 and 162. Each managed device may contain several managed objects, which can be any characteristic of the device that is monitored, including components such as a switch's interface, processor temperature, or memory utilization. Each managed object is assigned an OID (object identifier).
Which type of DoS attack orchestrates an attack bounced off uninfected computers? a. PDoS attack b. FTP bounce c. Ransomware d. DRDoS attack
d. DRDoS attack
Which assignment technique requires a RADIUS server? a. Static VLAN assignment b. Dynamic IP address assignment c. Static IP address assignment d. Dynamic VLAN assignment
d. Dynamic VLAN assignment
Which flow control method resends a lost frame along with all frames sent with it? a. Backpressure b. Selective repeat sliding window c. Stop-and-wait d. Go-back-n sliding window
d. Go-back-n sliding window
Which policy ensures messages are discarded when they don't match a specific firewall rule? a. Implicit allow b. Explicit allow c. Explicit deny d. Implicit deny
d. Implicit deny
At what layer of the OSI model do proxy servers operate? a. Layer 2 b. Layer 4 c. Layer 3 d. Layer 7
d. Layer 7
Which cloud service model gives software developers access to multiple platforms for testing code? a. SaaS b. XaaS c. IaaS d. PaaS
d. PaaS
Who is responsible for the security of hardware on which a public cloud runs? a. The cloud customer b. Both the cloud customer and the cloud provider c. It depends d. The cloud provider
d. The cloud provider
Nathan, a network engineer, has been contracted by a company to fix an error that has led to an increase in network latency during conference calls with various clients. Analyze the way to correctly diagnose this issue. By checking the interface statistics of the network By calculating the error rate By checking if the connection has any jitter By checking if the network is operating at maximum capacity
By checking if the connection has any jitter
Which of the following technologies allows multiple customers to share a single optical fiber strand, using passive splitters to distribute optical signals to individual premises, with downlink speeds of up to 655 Mbps? A. FRAD B. HDSL C. PON D. VDSL
C. PON
Why would a terminal emulator be used? To establish a remote connection to a Linux device from a Windows device To run powershell commands on a Linux device To create an FTP connection To establish a remote connection to a Linux device from a Linux device
To establish a remote connection to a Linux device from a Windows device
Which type of disaster recovery site contains all the equipment you would need to get up and running again after a disaster, and yet would require several weeks to implement? a. Cold site b. Standby site c. Warm site d. Hot site
a. Cold site
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? a. Logic bomb b. Virus c. Ransomware d. Worm
a. Logic bomb
Which of the following is not defined by syslog? a. Message security b. Message handling c. Message transmission d. Message format
a. Message security The syslog standard addresses three primary components, including event message format, event message transmission, and event message handling. Syslog does not define or require message security
Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. a. Red team-blue team exercise b. Security audit c. Vulnerability assessment d. Pen testing
a. Red team-blue team exercise d. Pen testing
Which principle ensures auditing processes are managed by someone other than the employees whose activities are being audited? a. Separation of duties b. Shared responsibility model c. Principle of least privilege d. Defense in depth
a. Separation of duties
Which bandwidth management technique limits traffic specifically between a single sender and a single receiver? a. Traffic shaping b. Flow control c. Quality of Service d. Congestion control
b. Flow control flow control manages the number of frames transmitted end-to-end between a single sender and a single receiver. Congestion control, however, manages the volume of traffic throughout the network.
What do well-chosen subnets accomplish? a. Routing efficiency is decreased by ensuring IP address spaces are not mathematically related. b. Network documentation is easier to manage. c. Problems affect the entire network, making them more difficult to pin down. d. IP address spaces overlap for easier management.
b. Network documentation is easier to manage
Which of the following features of a network connection between a switch and server is not improved by link aggregation? a. Fault tolerance b. Speed c. Availability d. Bandwidth
b. Speed
Which of the following statements is true? Choose two. a. When streaming a movie, the transmission is sensitive to loss and tolerant of delays. b. When sending an email, the transmission is sensitive to loss and tolerant of delays. c. When sending an email, the transmission is sensitive to delays and tolerant of loss. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.
b. When sending an email, the transmission is sensitive to loss and tolerant of delays. d. When streaming a movie, the transmission is sensitive to delays and tolerant of loss.
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this? a. Tailgating b. Quid pro quo c. Phishing d. Baiting
c. Phishing
Which hexadecimal block in an IPv6 address is used for the Subnet ID? a. The third one b. The first one c. The fourth one d. The eighth one
c. The fourth one
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? a. Security audit b. Data breach c. Exploit d. Posture assessment
d. Posture assessment