CTS 110 Network Essentials Module 1 to Module 13 Quiz for Network+ Guide to Networks 8th Edition

Ace your homework & exams now with Quizwiz!

A default route is used if a router does not find a matching entry in its table. What is the default route?

0.0.0.0

Convert Decimal 20 to Binary. Make sure you list all eight bits.

0001 0100

When a DHCP server gives a client an IP address, it sets a time limit, or lease time, on the IP address. In about 30 words, explain: 1 - What happens at the end of the lease time. 2 - What happens if the lease time is too short. 3 - What happens if the lease time is too long. 4 - Include a suggested low and high lease time. 5 - What type of office can benefit from a longer lease time. 6 - What type of office can benefit from a shorter lease time.

1 - At the end of lease time, the IP address expires and is now available to a new client. 2 - If the lease time is too long the network will suffer exhausted DHCP scope and no new clients can join. 3 - If the lease is too short, network availability will be disruptive. 4 - Lease times range from 2 hours to 8 days. 5 - Longer lease times are better for smaller offices without a lot of growth. 6 - Short lease times are better for larger networks where clients log on and off frequently.

ARP tables might contain two different types of entries. 1 - What are they, and 2 - How are they created?

1 - Dynamic and static are the two entries for ARP tables 2 - Static are entries that do not change as someone entered them in manually. Dynamic entries are created by a client requesting an ARP.

Match the Abbreviation with the Bandwidth

1 bit per second= 1 bps 1,000 bits per second= 1 Kbps 1,000,000 bits per second= 1 Mbps 1,000,000,000 bits per second=1 Gbps 1,000,000,000,000 bits per second= 1 Tbps

Your client has an open area with 20 devices communicating through a wireless network. Which type of antenna will have give the best communication for all 20 devices - an omnidirectional or a unidirectional?

omnidirectional

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

online UPS

Fill in the command that produced the following output. Be specific. In other words, you must include everything that would be typed in Command Prompt. Pinging google.com [142.250.73.206] with 32 bytes of data: Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Reply from 142.250.73.206: bytes=32 time=32ms TTL=54 Reply from 142.250.73.206: bytes=32 time=38ms TTL=54 Reply from 142.250.73.206: bytes=32 time=30ms TTL=54 Ping statistics for 142.250.73.206: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 30ms, Maximum = 38ms, Average = 32ms

ping google.com

The LAN has 1 router and 3 switches managing devices. To help protect against faults and failures, the network has additional switches filling the same role on the network. If one switch fails, another takes over. This is an example of ___________.

redundancy

Below is a [top] topology.

ring

When a switch is configured with STP, __________ ports are pointing toward the root bridge and ____________ ports are pointing downstream from the root bridge.

root designated

Only one ___________ exists on a network using STP.

root bridge

A/an _______ manages traffic between two or more networks and helps find the best path for traffic.

router

A __________ table is a database that holds information about where hosts are located and the most efficient way to reach them.

routing

10GBase-SR cable has a maximum transmission speed of

10 Gbps

10GBase-T Ethernet cable has a maximum transmission speed of

10 Gbps

100Base-T Ethernet cable has a maximum transmission speed of

100 Mbps

1000Base-LX cable has a maximum transmission speed of

1000 Mbps

Cat 5e cable has a Maximum supported throughput of

1000 Mbps

The equation to calculate the number of subnets from the New Subnet Mask is:

2n = Y where n is the number of bits changed from zero to one and Y is the number of subnets created

How many Routers are in this diagram?

3

The C-Band utilized by satellites consists of what frequency range?

3.4 - 6.7 GHz

A MAC address is typically written as hex. Write a valid MAC address in Hex.

30:65:EC:6F:C4:58

An IPv4 address has ________ bits and an IPv6 address has __________bits.

32 bits for IPv4 address 128 bits for IPv6 address

How many Switches are in this diagram?

4

How many pairs of wires do Shielded Twisted pair and Unshielded twisted pair cable have?

4

When using DOCSIS 3.0, what is the minimum number of channels that can be used?

4

A MAC address is ___ bits.

48

Which Frequency range do the Wi-Fi 802.11 a/n/ac technologies use?

5 GHz

What is the size of an ATM cell, including the header?

53 bytes

How many Broadcast Domains are in this diagram?

6

How many subnets are in this diagram?

6

What statement regarding denial-of-service (DoS) attacks is accurate?

A denial-of-service attack prevents legitimate users from accessing normal network resources.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.

In about 20 words explain double tagging.

A hacker stacks VLAN tags in Ethernet frames by removing the first legitimate tag and revealing a second illegitimate tag that tricks the switch into forwarding the transmission.

Bob and Alice have each created their own pair of keys for use with Public Key encryption. Alice receives a message from Bob. Bob encrypted the message so that Alice is the only one who will be able to decrypt the message. Which key will Alice use to decrypt the message?

Alice's private key

Bob and Alice have each created their own pair of keys for use with Public Key encryption. Bob wants to send a message to Alice and wants Alice to be the only person who can decrypt the message. Which key will Bob use to encrypt the message?

Alice's public key

Which organization set the standard for the diagram symbols used to represent routers, switches, firewalls, and other devices?

Cisco

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

False

A system with an availability of 99.999% can be down for a maximum of 52 minutes per year.

False

ACLs are automatically installed and running on a router.

False

All switch ports must be in the same VLAN to forward frames correctly.

False

An ACL can only inspect outbound packets from your local LAN to the Internet.

False

An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.

False

Cable that is coated with flame-resistant polyvinyl chloride (PVC) is acceptable for use in plenum areas.

False

Different types of organizations have similar levels of network security risks.

False

Due to many vulnerabilities and a short key length, the WPA security standard was replaced with WEP.

False

IPv4 and IPv6 use the same packet format and length.

False

IPv6 does not use subnetting.

False

Only Class B and Class C networks can be subnetted.

False

Packet Tracer is a simulation tool created by AACC.

False

Public key encryption is also called Symmetric encryption

False

RADIUS can only work with wireless users.

False

Sensitive electronic components can not be damaged by static electricity.

False

Switches are layer 2 devices and forward traffic based on IP addresses.

False

Telnet is a secure protocol used to "remote in" or control a computer remotely.

False

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

False

The TCP header includes a Source port and a Destination port. The UDP header does not include either of these.

False

The only function of network management is to check for hardware faults.

False

Using VLSM, all subnets must be the same size.

False

WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.

False

Your organization has implemented subnetting. If the DHCP server is not on the same subnet as the client requesting DHCP information, the client cannot receive any DHCP information

False

Which of the following statements describes a RAID 0 configuration?

In a RAID 0, data is striped across multiple disks to improve performance.

When using Spanning Tree Protocol, what is the first step in selecting paths through a network?

STP must first select the root bridge, or master bridge.

TCP uses a three-way handshake to establish a session before TCP transmits data. Select the transmissions of the three-way handshake.

SYN, SYN/ACK, ACK

What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?

SaaS

PoE is a method to

Send electrical power over twisted-pair Ethernet connections

When TCP sends data, the sequence numbers will be increased by the number of bits included in each received segment, as confirmation that the correct length of message was received. This new number (sequence number plus number of bits in the segment) will become the acknowledgment number for the return message.

True

When using IPv6, two or more nodes on the same link are said to be neighbors.

True

Wireshark or any other monitoring software running on a single computer connected to a layer 2 switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

True

Which type of hypervisor requires a host OS?

Type 2

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 hypervisor

Match the antenna type with the coverage.

Unidirectional antenna: One direction Omnidirectional: Many directions

What type of connector is this?

f-connector

Match the term with the definition.

White Hat Hacker: Hired by organizations to access their security and risks Black Hat Hacker: Use their skills to bypass security systems to cause damage, steal data or compromise privacy Grey Hat Hacker: Might engage in illegal activity, their intent is to educate and assist

Below is a [top] topology.

star

What is the approximate cost of the network diagram app called Draw.io?

$0

Which of these are valid IPv6 addresses? (Choose 2)

- 1240:b332:FF:02CA::B - 0260:d6FF:000A:30D2::30DB

The DiffServ technique for addressing QoS issues defines what two different types of data stream forwarding?

- AF (Assured Forwarding)- - EF (Expedited Forwarding)-

Choose the two technologies used by wireless devices to avoid interference. Choose two.

- DSSS - FHSS

Select three types of VLANs that you might see implemented on a network:

- Data - Voice - Default

List two Password Policy tips from the text that you think are the most important and Why they are so important.

- Do not use the same password on different applications is important because if one account gets hacked, all of your accounts that use the same password could be at risk. - Changing the password at least every 60 days is important because longer a password is used, the more vulnerable it gets. Changing it will ensure longer security for the account.

Which of these are advantages to using virtualization? (Choose three)

- Efficient use of resource - Fault and threat isolation - Cost and energy saving

Networks are commonly segmented into groupings. Which of the following are acceptable groupings? Select 3

- Geographic locations - Device types - Departmental boundaries

Select the two main protocols that run at Layer 3 of the OSI Model.

- ICMP - IP

Select the five (5) security precautions listed in the text that should be applied to the privileged user account.

- Limited Duration - Limited Use - Limited Location - Limited Privacy - Limited Access

ARP works in conjunction with IPv4 to discover the _______________ address of a node on the local network and maps those addresses to _________________ addresses.

- MAC - IP

The network administrator needs to increase total throughput between two switches. They create redundant links by connecting three ports on one switch to three ports on the other switch and configure the ports on both switches to handle the traffic. Select two (2) terms for this technique.

- Port aggregation - Link aggregation

Select the twisted pair cable connectors. Select two.

- RJ11 - RJ45

There are multiple reasons to implement VLANs on a network. Select three from the list below:

- Reducing the cost of networking equipment - Identifying groups of devices whose data should be given priority handling - Isolating connections with heavy or unpredictable traffic patterns

Which four statements regarding the SSH (Secure Shell) collection of protocols are accurate?

- SSH can be run at the shell prompt on a UNIX or Linux system - SSH can be run at the command prompt on a Windows-based system - SSH does both authentication and encryption - SSH listens at port 22

Which of the following are reasons a network administrator might separate a network's traffic into smaller portions? Select 3

- Simplify troubleshooting - Enhance security - Improve performance

Virtualization requires a hypervisor. Select the two types of hypervisor.

- Type 1 - Type 2

Select the two main protocols that run at Layer 4 of the OSI Model.

- UDP - TCP

There are multiple mitigation techniques to reduce the risk of VLAN hopping. Select three.

- Use physical security methods such as door locks - Change the native VLAN to an unused VLAN ID - Don't use the default VLAN

What two transmissions are considered delay-sensitive and loss tolerant?

- Video - Voice

Controlling user's access to a network consists of three major elements known as AAA. What are each of these components?

- authentication - accounting - authorization

It is called ____________ routing when a network administrator configures a routing table to direct messages along specific paths between networks. It is called ___________ routing when a router automatically calculates the best path between two networks and accumulates this information in its routing table.

- static - dynamic

Which of the following are advantages of a Client-Server network model? (Choose 3)

-They are more scalable. -Access to multiple shared resources can be centrally granted to a user or group of users. -User accounts and passwords are assigned in one place.

Which of the following are advantages of peer-to-peer networks (Choose 3)

-They are simple to configure. -They are good for networks that support fewer than 15 computers. -They are often less expensive to set up and maintain.

Select the two main protocols of the Transport layer.

-UDP -TCP

A safety measure that allows access during a failure is called ________ and a safety measure that denies access during a failure is called and a safety measure that denies access during a failure is called ________.

-fail open -fail close

Decimal and Binary values can also be represented by Hex characters. What are the valid Hex characters?

0-9, A-F

We can use ANDing to calculate the subnet address of a specific IP address if we also know the subnet mask. What is the result when we use ANDing rules to combine the following values? 1101 0010 1011 0011

1001 0010

IP addresses can be displayed in decimal or binary. What is the binary value for 192?

1100 0000

When creating the New Subnet mask, we change Host Bits to Network Bits. Which subnet mask will create exactly two subnets for a Class C subnetting scheme?

1111 1111.1111 1111.1111 1111.1000 0000

A subnet mask can also be represented in CIDR notation. Write the subnet mask in Binary for an IP address with CIDR of /26.

1111 1111.1111 1111.1111 1111.1100 0000

Write the subnet mask in Binary for 192.168.4.0/26. Use decimals between octets.

1111 1111.1111 1111.1111 1111.1100 0000

Which of the following IP addresses would be a loopback IP address?

127.0.0.1

An IPv6 address is ____ bits long.

128

There are ________ bits in an IPv6 address.

128

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

An MTU is the maximum transmission unit, or the largest size of a frame, in bytes, that routers in the path will allow. What is the layer 2 default MTU?

1500 bytes

The APIPA addresses are from ___________ to ______________.

169.254.0.1 to 169.254.255.254

You ask the client to type ipconfig from a Command Prompt window to display their IP address. It is 169.254.1.1. They need to go to Network and Sharing to change their IP address so it is within the range of valid host addresses for the 192.168.1.0 subnet. Which of the following addresses would be a valid address for their computer:

192.168.1.6

You are using Wireshark to check traffic on your network. You set up all devices in the network to be in the subnet 192.168.10.0. You notice some broadcast packets being sent out. What is the broadcast address for the 192.168.10.0 subnet?

192.168.10.255

What type of door access control is a physical or electronic lock that requires a code in order to open the door?

Cipher Lock

As the network engineer, you are configuring two new subnets for a client - one for the Sales department and one for the R&D department. The Sales department will have the subnet 192.168.100.0. R&D will use 192.168.200.0. Match the Valid Host addresses with their department or indicate that the address is Not a valid host for either department. Reminder - some addresses can not be used as a Valid Host address.

192.168.100.1: Sales 192.168.100.59: Sales 192.168.100.201: Sales 192.168.100.254: Sales 192.168.200.5: R&D 192.168.200.17: R&D 192.168.200.101:R&D 192.168.200.210: R&D 192.168.300.5: Not a valid host for either department 192.168.100.256: Not a valid host for either department 192.168.200.0: Not a valid host for either department 192.168.200: Not a valid host for either department

Which IPv4 addresses are valid? (Choose 3)

192.168.4.64 74.122.199.254 1.22.146.5

Match the cell technology generation with an accurate description.

1G: Services from 1970s and 1980s were analog 2G: Used digital transmission and paved the way for texting and media downloads on mobile devices 3G: Data rates rose to 384 Kbps and data (but not voice) communications used packet switching 4G: All IP, packet-switched network for both

Which Frequency range do the Wi-Fi 802.11 b/g/n technologies use?

2.4 GHz

Which IPv6 addresses are valid? (Choose 3)

2001:5af:2::56:3d4 2001:98:0045:0000:0001::2 FE0:201:95af::32ab:56:3d4

A subnet of 255.255.248.0 can be represented by which CIDR notation?

21

IP addresses can be displayed in decimal or binary. What is the decimal value for 1111 1111?

255

A network with a CIDR notation of /26 would have what subnet mask?

255.255.255.192

Write the subnet mask in Decimal for 192.168.4.0/26. Use decimals between octets.

255.255.255.192

If multiple honeypots are connected to form a larger network, what term is used to describe the network?

Honeynet

The IEEE standard defines how VLAN information appears in frames and how switches interpret that information. The port information is sometimes referred to as the ____ tag.

802.1Q

A highly available server is available what percentage of the time?

99.999%

Kim was creating a baseline for the WAN from a client's computer. Kim ran a speedtest at 9am and another at 9pm. In about 20 words, give two reasons why Kim might have received drastically faster upload and download speeds at 9pm.

9am is a typical working hour where the bandwidth may be spread across multiple devices. This would greatly slow down the baseline WAN. At 9pm there would be much less demand for the bandwidth causing it to be much faster.

Write the Hex character for binary 1010.

A

What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service.

What scenario describes an evil twin attack?

A malicious access point is configured with the SSID of a non-malicious access point.

In a DNS zone, what type of record holds the name-to-address mapping for IPv4 addresses?

A record

How is a posture assessment performed on an organization?

A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.

Of all the DSL standards, which is the most commonly in use today?

ADSL

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

Acceptable use policy document

There are multiple types of Layer 2 frames for wireless communications depending on the function of the frame - management frame, control frame, or data frame. The 802.11 data frame has four address fields. List the use for each of the four address fields:

Address 1 - Source address Address 2 - Transmitter address Address 3 - Receiver address Address 4 - Destination address

A tag is added to Ethernet frames to identify their VLAN assignment. Where is the tag added:

After the Source address

In preparing and planning for disaster recovery, what is the difference between an incident and a disaster? Answer in at least 25 words

An incident is a single event that affects more than a single group of users. Disasters are extreme events that effect more than a single system or limited group of users.

An RFID label on a box is an example of what type of physical security detection method?

Asset tracking tagging

You are hired by an organization to find vulnerabilities in their organization's network. You are given a user ID and password. What type of vulnerability scanning is this?

Authenticated

If a router receives a packet and finds two matches with the LAN's network information, what does the router do with the packet?

Chooses the best of the two options based on their respective routing metrics.

Which one of these protocols communicates across the Internet, is used by edge routers and exterior routers to distribute data outside of an AS? It is also dubbed the "protocol of the Internet".

BGP

Match the term with its definition.

Bandwidth: The amount of data that could theoretically be transmitted during a given period of time. Throughput: The measure of how much data is actually transmitted during a given period of time.

Where are MPLS labels placed within a frame?

Between the layer 2 header and the layer 3 header

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

Match the three networking modes with their description.

Bridged mode: A vNIC obtains addressing information from the DHCP server on the physical LAN. The IP addresses of vNIC and physical NIC are in the same subnet NAT mode: The VM obtains IP addressing information from its host's virtualization software, rather than a server or router on the physical network. Other nodes communicate with the host machine's IP address to reach the VM Host-only mode: VMs on a host can exchange data with each other and with their host, but they cannot communicate with any nodes beyond the host. VMs use the DHCP service in the host's virtualization software to obtain IP address assignments

Computers store values as an electrical charge (binary 1) or no electrical charge (binary 0). Each binary value is called a bit. What is a group of eight bits called?

Byte

Bob and Alice have each created their own pair of keys for use with Public Key encryption and need a simple and secure key management system. One answer to this problem is to use digital certificates. The digital certificate is issued, maintained, and validated by a ___________ .

CA (certificate authority)

A good naming convention for computers in classroom 223 in the CALT building on the Arnold Campus would be:

CALT223-01, CALT223-02, CALT223-03

To protect data at rest, in use, and in motion, encryption methods are primarily evaluated by three benchmarks that form the ___ triad.

CIA

Which of these is not a wireless standards for IOT devices in a WPAN or HAN.

CSMA/CD

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?

Carrier Ethernet Transport

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

Each IP address Class has a default Subnet Mask which uses the whole octet for either network bits or host bits. List the Default Subnet Mask in Binary then Dotted Decimal for each class below.

Class A Binary: 1111 1111.0000 0000.0000 0000.0000 0000 Class A Decimal: 255.0.0.0 Class B Binary: 1111 1111.1111 1111.0000 0000.0000 0000 Class B Decimal: 255.255.0.0 Class C Binary: 1111 1111.1111 1111.1111 1111.0000 0000 Class C Decimal: 255.255.255.0

List the Private address range for each class of IPv4 addresses:

Class A range: 10.0.0.0 - 10.255.255.255 Class B range: 172.16.0.0 - 172.31.255.255 Class C range: 192.168.0.0 - 192.168.255.255

List the range of the first octet of Class A, Class B, and Class C IPv4 addresses.

Class A: 1-126 Class B: 128-191 Class C: 192-223

Match the Class with the Network and Host portion for IP addresses.

Class A: N.H.H.H Class B: N.N.H.H Class C: N.N.N.H

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

Clustering

Match the disaster recovery contingency with an accurate description.

Cold site: Computers, devices, and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated, or connected Warm site: Computers, devices, and connectivity necessary to rebuild a network exist, with some pieces appropriately configured, updated, or connected Hot site: Computers, devices, and connectivity necessary to rebuild a network exist, but all appropriately configured, updated, or connected to match your network's current state

Match the function to the Layer 4 Protocol.

Connection-oriented: TCP Sequencing: TCP Acknowledgment: TCP Flow control: TCP Three-way-handshake: TCP Guarantees delivery: TCP Connectionless: UDP Good for live audio or video: UDP

Which statement accurately describes what alien crosstalk is?

Crosstalk that occurs between two cables.

What type of connector is this?

ST

Convert Binary 1101 0111 to Hex.

D7

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

DNS poisoning

In the following diagram, what path will data take if the server sends data to Host D? Server is the first device in the list; Host D is the last device in the list. Be specific.

Device 1: Server Device 2: Switch E Device 3: Switch C Device 4: Switch D Device 5: Switch F Device 6: Host D

If a router does not find a matching entry in its table and no default route is defined in the table, what does the router do with the packet?

Drop the packet

A BSS typically has one AP for end devices to communicate with. In this diagram, there are multiple BSSes. These multiple BSSes form a/an ______ .

ESS

Match the following terms with their definition.

Entry Facility: Location where an incoming network, such as the Internet, connects with the school or corporate network Demark point: Device that marks where a telecommunications service provider's network ends and the organization's network begins MDF: Centralized point of interconnection for an organization's LAN or WAN IDF: Provides an intermediate connection between MDF and end-user equipment on each floor and in each building KVM: Switch that connects to a single console to provide central control portal for all device on the rack

The act of taking advantage of a weakness is known as a/an ___ .

Exploit

TCP transmissions continue until a specific flag bit is set to 1. Which flag is this?

FIN

Match the signal interference with the characteristic.

Fading: Something causes the strength of the signal that reaches the receiver to be lower than the transmitted signal's strength Attenuation: The farther a signal moves away from the transmission source, the more it weakens Interference: Electromagnetic waves in the atmosphere can problems with wireless communications similar to how EMI (Electromagnetic Interference) affects wired transmissions Reflection: When the wave encounters an obstacle, it bounces back towards its source Scattering: When a wireless signal encounters an object that has small dimensions compared with the signal's wavelength, it's diffused in multiple directions

A RAID 5 configuration requires a minimum of two hard disks to operate.

False

According to the standard for diagram symbols, what is the following device?

Firewall

The network administrator issues the ipconfig command on a computer. The IP address is 192.168.16.1 In classful subnetting this is the _________ .

First available host

Match the backup scheme with the data copied.

Full backup: Backs up everything every time a backup is done Incremental backup: Backs up only data that has changed since the last backup Differential backup: Backs up data that has changed since the last full backup

Match the two main Web service protocols and whether the protocol is Secure or Unsecure

HTTP-Unsecure HTTPS-Secure

You need to check connectivity to Cengage so you open a browser window and type "ping cengage.com" in a Command Prompt. What Layer 3 protocol does ping use?

ICMP

The Network layer adds ___ addresses.

IP

Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?

IaaS

Explain disadvantage of a single point of failure as it pertains to Virtualization. Include an example.

If the one server goes down for any reason, they all go down. For example, if you are running multiple guest machines on one host, and the host crashes, all guest machines will crash.

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share one or more IP address.

How does refraction affect the propagation of a wireless transmission?

It distorts the signal as it travels into and through a different transmission medium.

When using Kerberos, what is the purpose of a ticket?

It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.

What is routing protocol convergence time defined as?

It is the time it takes for the protocol to recognize the best path in the event of a network change.

Terminal emulation can provide remote access to a device. Why is the telnet utility a poor choice for remote access to a device?

It provides poor authentication and no encryption.

What type of connector is this?

LC

Typically a Switch operates at layer 2 of the OSI model. However, small organizations, such as a SOHO, can purchase a switch that also interprets Layer 3 data and works much like a router. What is this device called?

Layer 3 Switch

Match the OSI layer with the address it adds to the data from the upper layers of the OSI model.

Layer 4: Port address Layer 3: IP address Layer 2: MAC address

At what layer of the OSI model to proxy servers operate?

Layer 7

Match the OSI Layer and the PDU:

Layer 7, 6, and 5: Payload or Data Layer 4: Segment Layer 3: Packet Layer 2: Frame Layer 1: Bit or transmission

List the seven layers of the OSI model in order - layer 1 at the bottom and Layer 7 at the top.

Layer 7: Application Layer 6: Presentation Layer 5: Session Layer 4: Transport Layer 3: Network Layer 2: Data Link Layer 1: Physical

Match the router function with a router.

Located inside networks within the same autonomous system: Core router or interior router Connect an autonomous system with an outside network, also called an untrusted network: Edge router or border router Refers to any router outside the organization's AS, such as a router on the Internet backbone: Exterior router

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

Logic Bomb

Each routing protocol is assigned a default administrative distance (AD), which is a number indicating the protocol's reliability. Which AD is given higher priority?

Lower

The Data Link layer adds ___ addresses.

MAC

What type of connector is this?

MTRJ

When implementing VLANs, what type of switch do we need:

Managed

It is desirable for a system to have high availability, referring to the consistency and reliability of a connection, system, or other network resource to be accessible. What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

Mean time between failures (MTBF)

Similar to duplexing which allows a signal to travel in both directions in a cable at one time, ___________ is a form of duplexing that allows multiple signals to travel simultaneously over one medium by separating the medium's channel into multiple smaller channels.

Multiplexing

My computer in the CALT building of AACC's main campus has an IP address of 10.0.16.141. I am requesting the Google home page. Because the Source IP address (my computer) is private it will need to be changed to AACC's public IP address at the router. The service that changes the IP address before the packet is sent out to the Internet is called _____.

NAT

Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

To attach to a network a computer requires a NIC. NIC stands for (three words) [ans1].

Network Interface Card

At what layer of the OSI model does the IPsec encryption protocol operate?

Network layer

Would the IDS in this diagram be considered a host-based IDS or a network-based IDS?

Network-based IDS

During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?

No more than 1 inch of the cable should be exposed.

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?

OC-3

Each managed object on a managed device using SNMP is assigned which of the following?

Object identifier (OID)

What federal agency is charged with safety and health in the workplace?

Occupational Safety and Health Administration (OSHA)

Which of these area networks is the smallest by geographic size:

PAN

Periodically, we will be responsible for software and hardware changes. Match the terms below with their definition

Patch: A correction, improvement, or enhancement to software which corrects bugs or add minor enhancements Upgrade: A major change to a software package that enhances functionality and features of the software Rollback: The process of reverting to a previous version of software

Create the correct pin connections for a straight-through cable.

Pin 1 connects to pin 1 Pin 2 connects to pin 2 Pin 3 connects to pin 3 Pin 4 connects to pin 4 Pin 5 connects to pin 5 Pin 6 connects to pin 6 Pin 7 connects to pin 7 Pin 8 connects to pin 8

Create the correct pin connections for a Fast Ethernet crossover cable.

Pin 1 connects to pin 3 Pin 2 connects to pin 6 Pin 3 connects to pin 1 Pin 4 connects to pin 4 Pin 5 connects to pin 5 Pin 6 connects to pin 2 Pin 7 connects to pin 7 Pin 8 connects to pin 8

Create the correct pin connections for a Rollover cable.

Pin 1 connects to pin 8 Pin 2 connects to pin 7 Pin 3 connects to pin 6 Pin 4 connects to pin 5 Pin 5 connects to pin 4 Pin 6 connects to pin 3 Pin 7 connects to pin 2 Pin 8 connects to pin 1

In about 20 words, explain the response between issuing a ping command and the tracert (or traceroute) command.

Ping sends packets to a specific address and waits for a reply. Trace route traces from the computer to the host and shows the number of hops.

Of the well-known TCP and UDP ports, which two carry DHCP traffic?

Port 67 Port 68

At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?

Port numbers

What document addresses the specific concerns related to special access given to administrators and certain support staff?

Privileged user agreement

List the four deployment models for Cloud services. Do not include the word 'cloud' in your answer.

Public Private Community Hybrid

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

Quid pro quo

What is the most popular AAA, open-source service, that runs in the Application layer and can use UDP or TCP in the Transport layer?

RADIUS

Good documentation includes business documents. Match the business documents below with their definition.

RFP: Request to vendors to submit a proposal for a product or service MOU: List the intentions of two or more parties to enter into a binding agreement, or contract SOW: A detailed list of the work that must be completed for a particular subject SLA: A legally binding contract or port of a contract that defines the aspects of a service MSA: A contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements MLA: Grants a license from a creator, such as a software producer, to a third party for the purpose of marketing the products to consumers

List the 5 Interior Gateway Protocols listed in the text.

RIP, RIPv2, IS-IS, OSPF, EIGRP

Match the Routing protocol with the Algorithm used. The Algorithm might be used more than once.

RIP: Distance-vector RIPv2: Distance-vector IS-IS: Link-state OSPF: Link-state EIGRP: Advanced distance-vector BGP: Advanced distance-vector or path vector

What type of connector is this?

RJ45

What optional protocol can be used in 802.11 to reserve the medium for one node's use?

RTS/CTS (Request to Send/Clear to Send)

Which encryption standard was originally used with WPA's TKIP?

Rivest Cipher 4 (RC4)

According to the standard for diagram symbols, what is the following device?

Router

In a software defined network, what is responsible for controlling the flow of data?

SDN controller

Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?

SDSL

What statement regarding the different versions of the SHA hashing algorithm is accurate?

SHA-2 and SHA-3 both support the same hash lengths.

What mail protocol is used to send mail messages to a server?

SMTP

An Application layer utility program called __________ monitors and gathers information about network traffic and can alert network administrators about adverse conditions.

SNMP

Signals that can travel in only one direction on a medium are referred to as what type of signal?

Simplex

In a TCP segment, what field indicates how many bytes the sender can issue to a receiver before acknowledgment is received?

Sliding-window

VLSM allows subnets to be further subdivided into

Smaller and smaller groupings

What kind of device can monitor a connection at the demarc but cannot interpret data?

Smart Jack

1 - List the five categories used in Multi-factor Authentication and 2 - give an example of each.

Something you know: A Password Something you have: An ATM Card Something you are: Your Iris Pattern Somewhere you are: Your location in a specific building Something you do: The way you speak

Match the IDS detection method with the description of the method.

Statistical anomaly detection: Compare network traffic samples to a predetermined baseline to detect anomalies beyond certain parameters Signature-based detection: Looks for identifiable patterns, or signatures, of code that are known to indicate specific vulnerabilities , exploits, or other undesirable traffic

Match the seven troubleshooting steps with the step number.

Step 1: Identify the problem and its symptoms Step 2: Establish a theory of probable cause Step 3: Test your theory to determine the cause Step 4: Establish a plan for resolving the problem Step 5: Implement the solution or escalate the problem Step 6: Verify functionality and implement preventive measures Step 7: Document findings, actions, and outcomes

During some incidents, data will need to be collected in such a way that it can be presented in a court of law for the purpose of prosecuting an instigator of illegal activity. Some of the forensic data available for analysis can be damaged or destroyed if improperly handled. Ideally, one or more first responders would take charge in these cases. First responders are the people with training and/or certifications that prepare them to handle evidence in such a way as to preserve its admissibility in court. However, it's critical that every IT technician in a company know how to safeguard sensitive information, logged data, and other legal evidence until the first responder or incident response team can take over the collection of evidence, Put the six (6) First Responder steps in order.

Step 1: Secure the area Step 2: Document the scene Step 3: Monitor evidence and data collection Step 4: Protect the chain of custody Step 5: Monitor transport of data and equipment Step 6: Create a report

Your organization has decided to subnet their internal network. They are using the private addresses 192.168.5.0. The New Subnet Mask is /26. The first subnet will be used for the sales department. Fill in the dotted decimal addresses for the sales department in the following table.

Subnet address: 192.168.5.0 First Valid host address: 192.168.5.1 Last Valid host address: 192.168.5.62

According to the standard for diagram symbols, what is the following device?

Switch

List the throughput in Mbps for T1 and T3 carriers.

T1: 1.544 T3: 44.736

The connectionless IP protocol relies on what other protocol to guarantee delivery of data?

TCP

Encrypted control of remote computers using the RDP protocol is accomplished using what port number?

TCP 3389

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

What happens when an NMS uses the SNMP Walk command?

The NMS uses get requests to move through sequential rows in the MIB database.

You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?

The computer is configured to use DHCP, but was unable to lease an address.

In planning for disaster recovery, what is the ultimate goal?

The continuation of business.

Imagine that you are using Symmetric Key Encryption and using Exclusive OR (XOR) to encrypt and decrypt messages. The plain text is 1111 0100. The encryption key is 1011 0011.

The encrypted text in Binary is 0100 0111. The decryption key in Binary is 1011 0011.

How can you determine the manufacturer of a NIC based on the MAC address?

The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.

Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?

The packets are coded such that individual calls can be distinguished.

Diffraction has what effect on a wireless signal's propagation?

The signal is split into secondary waves that continue in the direction in which they split.

VoIP is

The use of any network to carry voice signals using TCP/IP protocols

A variant of BYOD, what does CYOD allow employees or students to do?

They can choose a device from a limited number of options.

In a cellular network, where does each wireless base station connect to?

They connect to a mobile switching center.

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

True

A baseline is a report of the network's normal state of operation and might include a range of acceptable measurements.

True

A community cloud is a service shared between multiple organizations, but not available publicly.

True

A good Remote Access Policy would be to terminate remote sessions when not in use.

True

A vNIC operates at layer 2 and provides network access for the VM.

True

All wireless signals are carried through the air by electromagnetic waves.

True

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True

Each type of cable has a prescribed bend radius, which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.

True

Fiber-optic cable comes in two types: single-mode fiber (SMF) and multimode fiber (MMF).

True

IPv6 addresses do not have Classes

True

IPv6 addressing does not utilize classful addressing, in other words, there are no Class A, Class B, or Class C networks.

True

In a Peer-to-Peer network model, each computer's operating system is responsible for controlling access to its resources.

True

In a frame relay WAN, the ISP typically has the data circuit terminating equipment (DCE).

True

In a public switched telephone network (PSTN) , lines are terminated at the central office.

True

Latency on data networks is based on a calculation of a packet's round trip time (RTT).

True

Layer 2 is the only layer of the OSI model that adds a header and a trailer to the payload it inherits from the layer above it.

True

Most satellites circle the Earth 22,300 miles above the equator in a geosynchronous orbit.

True

Network Diagrams are graphical representations of a network's devices and connections.

True

Over a long-distance connection, using SSH keys is more secure than using passwords.

True

Port 123 is utilized by the Network Time Protocol service.

True

Proxy servers and ACLs on network devices are examples of non-security devices outfitted with security features and abilities.

True

RDP is a secure protocol used to "remote in" or control a computer remotely.

True

Routers work at layer 3. They join two or more networks and pass packets from one network to another.

True

SSH is a secure protocol used to "remote in" or control a computer remotely.

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

True

The TIA/EIA standard for wall jacks in a work area requires that at least one outlet be provided for data and one for voice.

True

The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.

True

The most secure Wi-Fi communication is made possible by combining a RADIUS server with WPA or WPA2, known as WPA-Enterprise or WPA2-Enterprise, respectively.

True

The process of designing, implementing, and maintaining an entire network is called the System Life Cycle.

True

The term malware is derived from a combination of the words malicious and software.

True

To add security to a switch, we can store acceptable MAC addresses in a MAC address table.

True

To download Packet Tracer, you must first sign up for the free Introduction to Packet Tracer online course.

True

To rollback or reverse an operating system patch you should

Use the patch's automatic uninstall utility

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

VoIP stands for [ans].

Voice over Internet Protocol

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a/an ____ .

Vulnerability

Which of these area networks is the largest by geographic size?

WAN

By default, the 802.11 standard does not offer any security. The client only needs to know the access point's SSID, which many access points broadcast. Network administrators may prevent their access points from broadcasting the SSIDs, making them harder to detect. However, this does not provide true security. One solution to this problem is encryption. Match the encryption with a feature.

WEP: The first implementation allowed for 64-bit shared network keys used for authenticating all users and for exchanging data WPA: Dynamically assigns every transmissions its own key WPA2: Updated version which includes support for earlier versions and legacy equipment

If you need to evaluate Wi-Fi network availability as well as optimize Wi-Fi signal settings and identify security threats, what tool should you use?

Wi-Fi analyzer

According to the standard for diagram symbols, what is the following device?

Workstation

Anything as a Service or Everything as a Service is abbreviated by what letters?

XaaS

Nmap was originally designed for Linux as a command-line utility but has since been expanded for compatibility on several other OSes. What is the name of the GUI front end that is available for the Nmap utility?

Zenmap

A switch has two different types of ports. The __________ port will carry traffic for only 1 VLAN at a time; the __________ port will carry traffic for multiple VLANs.

access trunk

Which of the following ACL commands would permit web-browsing traffic from any IP address to any IP address?

access-list acl_2 permit http any any

Which wireless topology would be best for a small number of nodes closely positioned transmitting directly to each other without an intervening connectivity device?

ad hoc

The purpose of VLSM is to:

allow subnets to be further subdivided into smaller and smaller groupings.

What aspect of AAA is responsible for determining what a user can and cannot do with network resources?

authorization

What type of cable is this?

coaxial

A/an [ans] is a central conduit that connects the segments of a network. The arrows are pointing to the central conduit.

backbone

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

What kind of firewall can block designated types of traffic based on application data contained within packets?

content-filtering firewall

For each type of multiplexing, a device that can combine many signals on a channel, a multiplexer (mux), is required at the transmitting end of the channel. At the receiving end, a _________ separates the combined signals.

demultiplexer

Suppose your LAN uses a proxy server, and you want to send an email message from your workstation inside the LAN to a colleague via the Internet. Your message will first

go to the proxy server

When two computers create a VPN tunnel directly between them it is called a ____ VPN.

host-to-host

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

ifconfig -a

Which wireless topology has one intervening connectivity device, such as an AP, that accepts wireless signals from multiple nodes and retransmits them to the rest of the network? This type of topology has no fault tolerance built in for the one AP.

infrastructure

On a Windows system, what command can you utilize to display TCP/IP configuration information for each network adapter installed?

ipconfig /all

The most popular kind of encryption encodes (combines) the original data's bits using a ___, or a random string of characters to scramble the data and generate a unique and consistently sized data block called ciphertext.

key

The combination of a public key and a private key are known by what term below?

key pair

Below is a [top] topology.

mesh

What kind of tool can you use to measure voltage on a cable length?

multimeter

Terry calls you because no one in the department can get to the AACC server that stores EPC documents. You just accessed the server successfully from another building. You go to Terry's department to do some diagnostics. Which command would let you know which router between Terry's department and the server is down?

tracert

The hypervisor creates a connection between a vNIC and a __________ .

vSwitch

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

What type of diagram is a graphical representation of a network's wired infrastructure?

wiring schematic


Related study sets

Chapter 12: Engine application and selection

View Set

Access Chapter 4 Critical Thinking

View Set

Chapter 6 Dealing with conflict human relations

View Set

Certification Exam | Chapters 7, 10, 13, 14 ,15

View Set

Chapter 18 Aseptic Techniques (SABURI)

View Set