DATA Quizzes 1-12
In a DNS zone, what type of record holds the name-to-address mapping for IPv6 addresses?
AAAA record
Of all the DSL standards, which is the most commonly in use today?
ADSL
When troubleshooting wireless issues, what statement is accurate?
Access points that use overlapping channels can cause interference with each other if they are too close.
In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?
Active Directory Domain Services (AD DS)
Which of the following scenarios represents a phishing attempt?
An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
When creating network diagrams, what icon description typically represents a network firewall?
An icon that resembles a brick wall.
Which file transfer protocol has no authentication or security for transferring files, uses UDP, and requires very little memory to use?
Trivial FTP (TFTP)
Which statement regarding the Border Gateway Protocol (BGP) is accurate?
BGP utilizes TCP for communicating updates.
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
BPDU guard
In North America, what ISDN connection type used two B channels and one D channel?
Basic Rate Interface (BRI)
Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Both IPv4 and IPv6 protocols will be used on the network.
What statement regarding the differences between the Windows tracert utility and the Linux/UNIX/macOS traceroute utility is accurate?
By default, the tracert utility uses ICMP echo requests, while traceroute uses UDP datagrams or TCP SYN messages.
The DTE or endpoint device for a leased line is known as which device below?
CSU/DSU
Which statement regarding the use of cable modems is NOT accurate?
Cable modems only operate at the Physical layer of the OSI model.
Which of the following is NOT a best practice when performing cable management?
Cable ties should be pulled tightly to keep cables from moving around in a bundle.
In metro settings, end-to-end, carrier-grade Ethernet networks can be established via what protocol?
Carrier Ethernet Transport
What is the minimum category of UTP cable required in order to support Gigabit speeds?
Cat 5e
Amazon and Rackspace both utilize what virtualization software below to create their cloud environments?
Citrix Xen
Which of the following virtualization products is an example of a bare-metal hypervisor?
Citrix XenServer
Which Bluetooth power class allows for a maximum power output of 100 mW and a range of up to 100 m?
Class 1
When Comcast was found to be interfering with BitTorrent traffic, what method was being used?
Comcast was interjecting TCP segments with the RST (reset) field set.
VMware Player and Linux KVM are both examples of what type of hypervisor?
Type 2 hypervisor
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?
Use the switchport port-security command to enable MAC filtering.
When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?
VLAN 1001
Regarding VNC (Virtual Network Computing or Virtual Network Connection), what statement is accurate?
VNC is open source, allowing companies to develop their own software based on VNC.
What is NOT a potential disadvantage of utilizing virtualization?
Virtualization software increases the complexity of backups, making creation of usable backups difficult.
A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?
VoIP PBX (private branch exchange)
In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines?
VoIP gateway
When is it appropriate to utilize the NAT network connection type?
Whenever the VM does not need to be access at a known address by other network nodes.
Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?
You pay only for the bandwidth you require.
What scenario might be ideal for the use of root guard in configuring a switch?
You wish to prevent switches beyond a certain port from becoming the root bridge, but still wish to use STP.
Which of the following scenarios would necessitate the use of a non-disclosure agreement?
Your company needs to prevent a new contractor from sharing information with a potential competitor.
Healing messages are a feature of what smart home protocol?
Z-Wave
What is the name of the GUI front end that is available for the Nmap utility?
Zenmap
In order to ensure that a cable is not affected by electromagnetic interference, how far away should the cable be from fluorescent lighting?
at least 3 feet
What aspect of AAA is responsible for determining what a user can and cannot do with network resources?
authorization
In IEEE terminology, a group of stations that share an access point are said to be part of which of the following?
basic service set
What special signal is issued periodically from an AP and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP?
beacon frame
Where are MPLS labels placed within a frame?
between the layer 2 header and the layer 3 header
What is NOT one of the ways in which networks are commonly segmented?
by device manufacturer
Noise that can degrade or distort a signal on a network is measured with what unit?
decibels
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
denial-of-service attack
You are troubleshooting a DNS issue on a Linux system, and need to test the resolution of your domain mycompany.com MX record using Google's DNS server with the IP address of 8.8.8.8. What dig command will accomplish this?
dig @8.8.8.8 mycompany.com MX
How often should you require users to change their passwords?
every 60 days
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
fail-close
A policy in which all exit doors for a building stay unlocked during a fire is an example of what type of policy?
fail-open
A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?
fiber cleaver
When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?
file integrity monitoring (FIM)
In IPv6, what field is used to indicate what sequence of packets from one source to one or multiple destinations a packet belongs to?
flow label
The Data Link Layer utilizes what name for its protocol data unit (PDU)?
frame
Enforcing a virtual security perimeter using a client's geographic location is known by what term?
geofencing
The Group Policy utility can be opened by typing what name into a Run box?
gpedit.msc
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
honeynet
What IPv6 field is similar to the TTL field in IPv4 packets?
hop limit
Where is a demarc located in relation to the structured cabling of an enterprise environment?
in the Main Distribution Frame (MDF)
A snapshot is most similar to which type of backup scheme?
incremental backup
Which type of backup scheme only covers data that has changed since the last backup?
incremental backup
On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?
ip helper-address
A Windows computer on your network is having issues resolving queries for a specific domain, but not other domains. Other computers on the same network resolve the name just fine. What command can you issue that might fix the problem?
ipconfig /flushdns
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
iptables
In Linux, what command can be used for viewing and setting wireless interface parameters?
iwconfig
When a device handles electrical signals improperly, usually resulting from a bad NIC, it is referred to by what term below?
jabber
What routing metric affects a path's potential performance due to delay?
latency
What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?
link local address
Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the network, are known as which type of protocols?
link-state protocols
You've been handed a fiber with a 1.25-mm ferrule that requires a connector. What is the most commonly used connector for this ferrule size?
local connector (LC)
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?
man-in-the-middle attack
What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
management frames
Your company is setting itself up to distribute software made by another company. What type of document should your company procure from the developing company?
master license agreement
Once a device has failed, what metric measures the average amount of time to repair?
mean time to repair (MTTR)
What kind of tool can you use to measure voltage on a cable length?
multimeter
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
multiple input-multiple output (MIMO)
With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
mycompany.com
What command will list only current connections, including IP addresses and port numbers?
netstat -n
Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?
online UPS
When using DHCP for IPv6 (i.e. DHCPv6), what port do clients receive responses on?
port 547
At the Transport layer of the OSI, what is used to find and communicate with a particular application running on a host?
port numbers
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
principle of least privilege
What document addresses the specific concerns related to special access given to administrators and certain support staff?
privileged user agreement
A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
probe frame
A change coordinator functions as what type of manager?
project manager
The use of certificate authorities to associate public keys with certain users is known by what term?
public-key infrastructure
What type of tool would you utilize to terminate twisted pair wire on a 66 or 110 block?
punchdown tool
Telephone connections follow what registered jack standard?
registered jack 11 (RJ-11)
Which of the following is a document that is sent as a request to vendors to submit a proposal for a product or service that your company wants to purchase?
request for proposal
Packets that are smaller than a medium's minimum packet size are known by what term below?
runts
What command will set the native VLAN on a Juniper switch port?
set native-vlan-id
You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?
show vlan
What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?
switched virtual circuit (SVC)
A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
tailgating
What tcpdump command can be used to filter out all traffic except SSH traffic?
tcpdump port 22
The Global System for Mobile Communications (GSM) utilizes what technology to create timeslots on a channel?
time division multiple access (TDMA)
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?
traceroute -I srv1.mycompany.com
An interface that manages traffic from multiple VLANs is known by what term?
trunk port
When dealing with static electricity, what kind of failure caused by static discharge shortens the life of a component, and can cause intermittent errors?
upset failure
What component of the backbone runs between a building's floors and can be used to connect an MDF and IDF or multiple IDFs?
vertical cross connect
What command can be used to check a domain computer's time source from a Command Prompt window?
w32tm /query /source
When viewing the pinout for T568B, what is the correct order of wire colors, starting at pin 1?
white/orange, orange, white/green, blue, white/blue, green, white/brown, brown
What type of diagram is a graphical representation of a network's wired infrastructure?
wiring schematic
What field in an IPv4 packet informs routers the level of precedence they should apply when processing an incoming packet?
Differentiated Services (DiffServ)
What makes up the first 6 bits of the 8-bit DiffServ field?
Differentiated Services Code Point (DSCP)
Which of the following suggestions can help prevent VLAN hopping attacks on a network?
Disable auto trunking and move native VLANs to unused VLANs.
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
Dynamic Multipoint VPN
What occurs when a collision happens on a network?
Each node on the network waits a random amount of time and then resends the transmission.
The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
FCS
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?
Framing
What is assigned to each node on a network, which is then used by the Network layer to uniquely identify the node?
IP address
Which type of cloud service model involves hardware services that are provided virtually, including network infrastructure devices such as virtual servers?
IaaS
When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
In an authorization file on the host where the SSH server is
What does the Common Address Redundancy Protocol do?
It allows a pool of computers or interfaces to share the same IP address.
What is the purpose of the checksum TCP field?
It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
At what point is a packet considered to be a giant?
It becomes a giant when it exceeds the medium's maximum packet size.
How does a line conditioning UPS protect network equipment?
It filters line noise from incoming power.
What does the MX record do in a forward DNS zone?
It identifies the e-mail server to be used for e-mail traffic for the domain.
A differential backup covers what data on a system?
It includes data that has changed since the last full backup.
What is the Nmap utility used for?
It is a port scanning utility that can identify open ports on a host.
What is a SIEM (Security Information and Event Management) system utilized for?
It is a system used to evaluate data from security devices and generate alerts.
When using RFID, what is an ARPT (Active Reader Passive Tag)?
It is a tag that is activated by an active reader, and uses power from the reader's radio to power its transmission.
When using Kerberos, what is the purpose of a ticket?
It is a temporary set of credentials that a client uses to prove to other servers that its identity has been validated.
When an 802.1Q tag is added to an Ethernet frame, where is it placed?
It is inserted between the source address and the Ethernet type field.
What is routing protocol convergence time defined as?
It is the time it takes for the protocol to recognize the best path in the event of a network change.
What statement regarding the Server Message Block protocol is accurate?
It is used by Windows and UNIX-based operating systems to share files.
What is a data-link connection identifier (DLCI) utilized for?
It is used by routers to determine which circuit to forward a frame to in a frame relay network.
What is the ARPA domain suffix utilized for?
It is used for reverse DNS queries, and holds PTR records.
What is the purpose of the Layer 2 LLC sublayer?
It is used to handle multiplexing, flow and error control, and reliability.
What statement correctly describes "jitter"?
Jitter is what happens when packets experience varying amounts of delay and arrive out of order.
A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?
Layer 2
At what layer of the OSI model does a network switch normally operate?
Layer 2
HTTP, IMAP4, FTP, and Telnet are all examples of protocols that operate at what layer of the OSI model?
Layer 7
The proper handling procedures for substances such as chemical solvents is typically outlined in which of the following options?
Material Safety Data Sheet (MSDS)
Which legacy authentication protocol requires mutual authentication?
Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)
By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?
NAT mode
Which statement accurately describes what near end crosstalk (NEXT) is?
NEXT is crosstalk that occurs between wire pairs near the source of a signal.
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?
Nessus
At what layer of the OSI model do the IP, ICMP, and ARP protocols operate?
Network
During termination of twisted pair cabling, what should be done to ensure minimal cross talk is introduced?
No more than 1 inch of the cable should be exposed.
What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises?
OC-48
Which statement does NOT accurately describe characteristics of the OSPF protocol?
OSPF requires very little CPU or memory resources.
What federal agency is charged with safety and health in the workplace?
Occupational Safety and Health Administration (OSHA)
With VTP, where is the VLAN database stored?
On the switch that is known as the stack master.
What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?
OpenVPN
Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?
PPP can support strong encryption, such as AH or ESP.
In the TCP/IP model, what layer is considered so simple that it is ignored entirely?
Physical
What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?
Priority Code Point (PCP)
Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?
Protected EAP (PEAP)
By far the most popular AAA service, what open-source service runs in the Application layer and can use UDP or TCP in the Transport layer?
RADIUS
Broadband cable Internet service and cable TV are most commonly delivered over long distances via what type of cable?
RG-6
The Windows Remote Desktop application utilizes what protocol to provide secure, encrypted transmissions?
Remote Desktop Protocol (RDP)
In a software defined network, what is responsible for controlling the flow of data?
SDN controller
Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?
SDSL
Which of the following statements correctly describes the SFP+ transceiver?
SFP+ is the same size as SFP, and supports a theoretical maximum transmission speed of 16 Gbps.
What statement regarding the different versions of the SHA hashing algorithm is accurate?
SHA-2 and SHA-3 both support the same hash lengths.
Which of the following protocols is used as a signaling protocol for the initial connection between hosts, but does not participate in data transfer during the session?
SIP
What mail protocol is used to send mail messages to a server?
SMTP
Which of the following Layer 1 WAN technologies is not normally used as last mile service, but rather traverses multiple ISP networks, connecting these networks to the Internet backbone?
SONET (Synchronous Optical Network)
What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
SSH supports port forwarding.
When using Spanning Tree Protocol, what is the first step in selecting paths through a network?
STP must first select the root bridge, or master bridge.
When using satellite services for your WAN connection, what statement is accurate?
Satellite services suffer more latency and jitter issues.
Which protocol designed to replace STP operates at Layer 3 of the OSI model?
Shortest Path Bridging (SPB)
Which of the following is an example of proxy server software?
Squid
On an ATM network, how is the path that data will take determined?
Switches determine the optimal path between sender and receiver, and then establish the path before transmission.
Encrypted control of remote computers using the RDP protocol is accomplished using what port number?
TCP 3389
You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?
TIA/EIA 568A
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
TIA/EIA-568
You are setting up a DNS zone and have been asked to create SPF and DKIM records. What type of DNS record will hold this information?
TXT record
You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?
The MTU for the network can be as high as 9198 bytes.
What happens when an NMS uses the SNMP walk command?
The NMS uses get requests to move through sequential rows in the MIB database.
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
When planning horizontal cabling, what is the maximum allowable distance that can be used?
100 meters
On a Cisco switch, what would the security association identifier be for VLAN 13?
100013
When using SNMP with TLS, what port do agents receive requests on?
10161
A network with 10 bits remaining for the host portion will have how many usable host addresses?
1022
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
10GBase-T
In the classful addressing scheme, what range of network addresses is considered a Class B?
128.0.x.y to 191.255.x.y
Near-field communication devices send data at what fixed frequency?
13.56 MHz
The 1000Base-LX utilizes light with what wavelength?
1300 nanometers
When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?
15
By default, what is the MTU size on a typical Ethernet network?
1500 bytes
Given a host IP address of 172.16.1.154 and a subnet mask of 255.255.254.0, what is the network ID for this host?
172.16.0.0
Equipment data racks most commonly are a standard width of what measurement?
19 inches
An IP address of 192.168.18.73/28 has what network ID?
192.168.18.64
Which of the following IPv6 addresses represents a global unicast address?
2000::/3
A network with a CIDR notation of /26 would have what subnet mask?
255.255.255.192
802.11ac Wave 2 devices can theoretically support how much maximum throughput?
3.47 Gbps
When terminating an Ethernet cable, about how far should the cable sheath extend into the plug?
3/8 inch
How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?
4 bytes
How many data streams are used in 802.11ac Wave 2 devices?
4 data streams
Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?
40km
What is the size of an ATM cell, including the header?
53 bytes
In an 802.11 data frame, what is the size of the frame check sequence field?
6 bytes
A fractional T1's bandwidth can be leased multiples of what data rate?
64 Kbps
In an ISDN connection, what amount of throughput did a single B channel provide?
64 Kbps
What is the maximum number of host IP addresses that can exist in a Class B network?
65,534
How many subnets can a /48 site prefix support?
65,536 subnets
What is the industry standard angle for an Angle Polished Connector (APC)?
8 degrees
If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?
8 seconds
Which of the following statements regarding the 802.11ac standard is NOT accurate?
802.11ac access points function more like a hub than a switch.
What IEEE standard includes an encryption key generation and management scheme known as TKIP?
802.11i
What IEEE standard specifies how VLAN information appears in frames and how switches interpret that information?
802.1Q
PoE+ devices are defined by what IEEE standard?
802.3at
The wireless spectrum, as defined by the FCC, spans between which two frequencies?
9 kHz and 300 GHz
A highly available server is available what percentage of the time?
99.999%
What statement regarding the use of a network attached storage device is accurate?
A NAS can be easily expanded without interrupting service.
What statement describes a transmission flaw that is occurring due to attenuation?
A customer modem is continuously losing signal due to large distance from the transmitting device.
What statement regarding denial-of-service (DoS) attacks is accurate?
A denial-of-service attack prevents legitimate users from accessing normal network resources.
What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?
A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides.
What scenario describes an evil twin attack?
A malicious access point is configured with the SSID of a non-malicious public access point.
Which of the following statements describes a worm?
A program that runs independently of other software and travels between computers and across networks.
Which of the following is not a task handled by a router?
A router forwards broadcasts over the network
What statement correctly identifies the purpose of a software patch?
A software patch is a correction, improvement, or enhancement to software
What statement correctly describes a stateless firewall?
A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
Which of the following is an example of encapsulation?
The addition of a header to data inherited from the layer above in the OSI model.
In the typical social engineering attack cycle, what occurs at Phase 3?
The attacker exploits an action undertaken by the victim in order to gain access.
In a red team-blue team exercise, what is the purpose of the blue team?
The blue team is charged with the defense of the network.
A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB serial to RJ-45 adapter, despite verifying terminal settings. What is the issue?
The cable must be a rollover cable.
What does backbone cabling consist of?
The cables or wireless links that provide interconnection between the entrance facility and MDF, and between the MDF and IDFs.
In Open System Authentication, how does authentication occur?
The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
You are troubleshooting a network issue on a client computer and discover that the network card has an IP address of 169.254.196.200. What does this mean?
The computer is configured to use DHCP, but was unable to lease an address.
Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?
The exposure of the cable can cause transmission interference between wires.
How can you determine the manufacturer of a NIC card based on the MAC address?
The first 24 bits, known as the Organizationally Unique Identifier, identify the manufacturer.
In the event of a duplicate MAC address shared by two hosts on a switched network, what statement is accurate?
The hosts will still send and receive traffic, but traffic may not always reach the correct destination.
Which of the following statements regarding IPv6 subnetting is NOT accurate?
The largest IPv6 subnet capable of being created is a /64.
If the EUI-64 standard is used, what part of an IPv6 address is affected?
The last four blocks of the address.
When viewing a syslog message, what does a level of 0 indicate?
The message is an emergency situation on the system.
What statement accurately reflects what occurs when a message is too large to transport on a network?
The message is divided into smaller messages called segments (for TCP) or datagrams (for UDP).
What is NOT a variable that an network access control list can filter traffic with?
The operating system used by the source or destination device.
What occurs if a network layer protocol is aware that a packet is larger than the maximum size for its network?
The packet will be divided into smaller packets using fragmentation.
Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?
The packets are coded such that individual calls can be distinguished.
How does the 802.11 data frame indicate how a large packet should be fragmented?
The sequence control field indicates how packets will be subdivided.
Diffraction has what affect on a wireless signal's propagation?
The signal is split into secondary waves that continue in the direction in which they split.
Which statement regarding the use of a bridged mode vNIC is accurate?
The vNIC will its own IP address on the physical LAN.
A variant of BYOD, what does CYOD allow employees or students to do?
They can choose a device from a limited number of options.
Which of the following is not one of the disadvantages of peer-to-peer networks?
They centralize user account logins
In a cellular network, where does each wireless base station connect to?
They connect to a mobile switching center.
How do routers create a broadcast domain boundary?
They do not forward broadcast traffic.
What is the most popular web server application?
Apache
Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?
acceptable use policy document
An RFID label on a box is an example of what type of physical security detection method?
asset tracking tagging
What type of door access control is a physical or electronic lock that requires a code in order to open the door?
cipher lock
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
clustering