IS 4440 Final Review
What is the max theoretical throughput of the 802.11ac wireless technologywhen using Wave 1 devices?
1.3 Gbps
What two frequencies are used for most wireless networks?
2.4 GHz & 5 GHz
How many channels exist in a T1 connection?
24
Ideally, stations must remain within what range of an access point in order tomaintain optimal transmission speeds?
300 feet
How many data streams are used in 802.11ac Wave 2 devices?
4 data streams
What is the maximum theoretical throughput of 802.11n?
600 Mbps
A network with 6 bits remaining for the host portion will have how many usable host addresses?
62
Which 802.11 technology is the first Wi-Fi standard to approach gigabit Ethernet capabilities, and operates on the 5 GHz band?
802.11ac
Select the maximum allowable distances for horizontal wiring for a span that connects a data jack on a wall to a data closet, and for a span that connects a workstation to the data jack, respectively:
90 m & 10 m
A device that is responsible for modulating digital signals into analog signals, and demodulating analog signals into digital signals at the receiving end, is known as?
A modem
Which of the following is NOT a task handled by a router?
A router forwards broadcasts over the network.
What xDSL standard is the most popular?
ADSL
During the Windows Server 2012 R2 installation, what account creation prompts you for the password?
Administrator
What are the three primary event logs?
Application, Security, and System
What are the key benefits of security templates?
Apply consistent, scalable, and reproducible security settings throughout an enterprise.
When does Windows apply User Configuration policies by default?
As the user logs in
What is the minimum category of UTP cable required in order to support Gigabit speeds?
Cat 5e
Installing Windows Server 2012 R2 Active Directory Domain Services installs two default policies: Default Domain Policy and Default Domain Controller Policy. The administrator needs different policy settings. How best to proceed?
Create new Group Policy Objects to augment or override the existing default settings.
A MAN connection is also known as which two terms below?
Ethernet MAN & Metro Ethernet
A power fluctuation that results in a temporary dimming of lights is known asa blackout.
FALSE
IPv4 and IPv6 use the same packet format.
FALSE
Network segmentation decreases both performance and security on a network.
FALSE
UDP provides error checking, but not sequencing
FALSE
UDP provides error checking, but not sequencing.
FALSE
WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.
FALSE
What cable type comes in two different modes, single mode and multimode?
Fiber optic
What application or interface allows you to configure security filtering?
Group Policy Management console
What is the Microsoft Management Console (MMC) snapin that you use to create GPOs and manage their deployment to AD DS objects?
Group Policy Management console
What account is created during Windows Server 2012 R2 installation with the account disabled by default?
Guest
What IPv4 protocol handles multicasting for tasks such as videoconferencing or teleconferencing?
IGMP
What versions of the IP protocol are used on networks today (pick 2)?
IPv4 & IPv6
n order to simplify console access to computers in a rack, what device is typically used to provide a central portal for all devices on the rack?
KVM switch
At which two layers do wireless LANs operate?
Layer 1 & Layer 2
Ethernet exists at what layer of the OSI model?
Layer 2
At what two layers of the OSI model are LAN and WAN protocols likely to differ?
Layer 2 & Layer 1
At what layer of the OSI model would a TCP or UDP header be added to a payload?
Layer 4
What is the proper term for associating a Group Policy to a set of AD DS objects?
Linking
At what layer of the OSI model does the IPsec encryption protocol operate?
Network layer
What roles does Microsoft recommend can share the same server as the Hyper-V role?
No other role
What address does ARP work in conjunction with IPv4 to discover (pick 2)?
Physical & MAC
At what layer of the OSI model do the 802.11 standards vary?
Physical layer
What two options below are AAA services?
RADIUS & TACACS+
What is Resource Metering?
Resource metering documents virtual machine usage regarding a variety of criteria
What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?
Restricted Groups policy
A system that is capable of collecting and analyzing information generated by firewalls, IDS, and IPS systems is known as which term below?
SIEM system
Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of those two are further organized into three subnodes. What are the three?
Software settings, Windows settings, and Administrative Templates
The amount of memory that you want to allocate to the VM when it starts is called ______.
Startup RAM
The IP connectionless protocol relies on what other protocol to guarantee delivery of data?
TCP
A NIC card cannot determine whether the frames it transmits and receives are using IP packets or a different layer 3 protocol, because the NIC does not operate higher than Layer 2 of the OSI model.
TRUE
All wireless signals are carried through the air by electromagnetic waves.
TRUE
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
TRUE
Because Layer 2 switches use MAC addresses for communication, and each port is assigned a MAC address, VLANs are considered a Layer 2 solution for segmenting a network.
TRUE
Digital signals are composed of pulses of precise, positive voltages and zero voltages
TRUE
Each type of cable has a prescribed bend radius , which is the radius of the maximum arc into which you can loop a cable without impairing data transmission.
TRUE
IP is an unreliable, connectionless protocol.
TRUE
Multimode fiber contains a core that is larger than a single mode fiber core.
TRUE
Multipath signaling is a significant cause of fading.
TRUE
The carrier's endpoint on a WAN is called the Data Communications Equipment (DCE).
TRUE
What happens when a router receives a packet with a TTL of 0?
The router drops the packet and sends an ICMP TTL expired message back to the host.
What are the two categories of security settings within Group Policy? Select two answers
User & Computer
What are the two categories of security settings within Group Policy? Select two answers.
User & Computer
What did Microsoft introduce in Windows Server 2008, which is used to ensure users with administrative privileges still operate routine tasks as standard users?
User Account Control (UAC)
What are the two interfaces available for creating and managing user accounts in Windows Server 2012 R2?
User Accounts control panel and the Local Users and Groups snap-in for MMC
What are the two interfaces for creating and managing local user accounts a computer joined to the domain?
User Accounts control panel and the Local Users and Groups snap-in for MMC
Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?
Using the Enforce, Block Policy Inheritance, or Loopback settings
When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
VPN gateway
Ethernet is an example of what type of technology?
baseband
In IEEE terminology, a group of stations that share an access point are said to be part of what option below?
basic service set
Since cable TV and cable Internet can share the same coaxial cable, they are considered to be what type of technology?
broadband
Which of the following is NOT a valid wireless network topology?
bus
Digital certificates are issued by organizations known as what term?
certification authorities
What routing protocol criteria is defined as the time it takes to recognize a best path change in the event of a network outage?
convergence time
The number of times that a wave's amplitude cycles from its starting point, through its highest amplitude and its lowest amplitude, and back to its starting point over a fixed period of time, is known as what term below?
frequency
Heartbeat, time synchronization, and data exchange between parent and child partitions are all examples of functions provided by ________
guest integration services
Which method of transmission allows signals to travel in both directions over a medium but in only one direction at a time?
half duplex
What two fields below are used by IPv4 and IPv6 respectively to limit the number of times that a packet can be forwarded on a network?
hop limit & TTL
Server virtualization in Windows Server 2012 R2 is based on a module called the _________.
hypervisor
Where is a demarc located in relation to the structured cabling of an enterprise environment?
in the Main Distribution Frame (MDF)
Telnet and SSH are known as what type of management system?
in-band
Which of the following is NOT a valid reason for using virtualization?
increase performance
What do you call the process that after you link a GPO to a site with multiple domains, the Group Policy settings are applied to all the domains and the child objects beneath them?
inheritance
The combination of a public key and a private key are known by what term below?
key pair
What type of power flaw involves a fluctuation in voltage levels caused by other devices on the network or by EMI?
noise
The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?
out-of-band management
When the Hyper-V role is added to a Windows Server 2012 R2 server, the hypervisor creates the individual environments, each of which has its own operating system installed and accesses the computer's hardware via the hypervisor. What are those individual environments called?
partitions
What is the technique called that you can modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?
security filtering
What term below is used to describe the outer-most layer of protective covering of a coaxial cable?
sheath
Select the two terms below that are used to describe a UPS that providescontinuous voltage to a device by switching virtually instantaneously to the batterywhen it detects a loss of power:
standby UPS & standby power supply
What kind of GPO serves as a template for the creation of domain GPOs based on a standard collection of settings?
starter GPO
"When multiple GPOs are linked to a container, which GPO in the list has the highest priority?
the first
A network with the subnet mask 255.255.255.0 would have what CIDR block?
/24
What is the maximum supported throughput of a CAT6 cable?
10 Gbps
What is NOT one of the three characteristics of TCP in its role as a reliable delivery protocol?
Framing
Which 802.11 wireless innovation allows for the use of multiple antennas on an access point that can issue a signal to one or more receivers?
MIMO
Which virus below combines polymorphism and stealth techniques to create a very destructive virus?
Natas
What cloud service model involves providing applications through an online user interface, providing for compatibility with a multitude of different operating systems and devices?
SaaS
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
honeynet
Using a form of transmission that allows multiple signals to travel simultaneously over one medium is known as which of the following options?
multiplexing
In what type of topology is each site connected to two other sites, providing redundancy?
ring topology
In a TCP segment, what field indicates how many bytes the sender can issue to a receiver while acknowledgement for the segment is outstanding?
sliding window