IST 220 Exam 2

Ace your homework & exams now with Quizwiz!

Which of the following routes messages outside of an autonomous system (AS) or between two networks? a) An exterior routing protocol b) An interior routing protocol c) A routed protocol d) None; it's not possible to route outside of an AS.

a) An exterior routing protocol

On an 802.11x network, which of the following refers to the authentication process, including login processing, service classes, protocol support, and the functions that perform user or device authentication? a) Authentication framework b) Authentication algorithm c) Data frame encryption d) EAP encapsulation

a) Authentication framework

Which aspect of wide area network (WAN) performance management ensures that spikes and network traffic growth can scale quickly as needed? a) Capacity planning b) Distance (local, metro, long-haul) c) Throughput d) Visibility

a) Capacity planning

Which of the following protocols is nonroutable? a) Dynamic Host Configuration Protocol b) Open Shortest Path First c) Enhanced IGRP d) Border Gateway Protocol

a) Dynamic Host Configuration Protocol

An example of a circuit-switched network is: a) Integrated Services Digital Network (ISDN). b) Asynchronous Transfer Mode (ATM). c) Synchronous Optical Network (SONET). d) Multiprotocol Label Switching (MPLS).

a) Integrated Services Digital Network (ISDN).

Which of the following is typically used for departmental workgroup LANs or a backbone network environment that aggregates edge layer switches? a) LAN switch b) Router c) Media converter d) Wireless range extender/amplifier

a) LAN switch

Passive monitoring and protocol analysis is a network access control (NAC) visibility solution. Which of the following best describes passive monitoring and protocol analysis? a) NAC devices capture and examine IP interactions and dialogs to determine traffic types and flows on the network. b) NAC devices poll switches, VPN concentrators, wireless controllers, and private and public cloud controllers for a list of connected devices and virtual machines. c) An administrator runs several scans, such as Address Resolution Protocol (ARP), ping, nmap, and endpoint profiling using SNMP queries. d) NAC devices prescreen remote computers for OS, patch level, antivirus, and other configuration settings.

a) NAC devices capture and examine IP interactions and dialogs to determine traffic types and flows on the network.

Different stationary objects create different levels of attenuation (loss of strength) in an RF signal. Of the following, which has the highest degree of attenuation? a) Paper b) Glass c) Wire mesh in glass d) Marble

a) Paper

"Identify all single points of failure" is an example of which type of best practice? a) Preventive measure b) Reacting to faults c) Escalation d) Communication

a) Preventive measure

All of the following are true of measuring network performance, except: a) a good tool should have a positive effect on what it is measuring. b) when measuring network speed, you could look at the network interface controller (NIC) configuration and the switch port configuration. c) record all readings and add sufficient documentation to explain the context of each measurement. d) compare the results to a standard or guideline to determine their meaning.

a) a good tool should have a positive effect on what it is measuring.

All of the following are common network resiliency methods, except: a) single connections between critical nodes. b) redundant critical devices. c) quality of service monitoring to react to service slowdowns. d) redirection to avoid congestion.

a) single connections between critical nodes.

To improve security and enhance the authentication methods of wireless LANs (WLANs), the __________ standard incorporated the IEEE 802.1X authentication framework. a) 802.11h b) 802.11i c) 802.11ac d) 802.11ax

b) 802.11i

Lin is an IT networking professional for a large corporation. She is evaluating a new management system for the network. The system will track network resource use and bill various departments and units for that use. What type of management system is Lin evaluating? a) Fault management b) Accounting management c) Security management d) Performance management

b) Accounting management

Susan is a network engineer in charge of a medium-sized enterprise network. It is a single-vendor network with all devices from Cisco. Which of the following protocols is most likely in use? a) Open Shortest Path First (OSPF) b) Enhanced Interior Gateway Routing Protocol (EIGRP) c) Routing Information Protocol (RIP) d) Border Gateway Protocol (BGP)

b) Enhanced Interior Gateway Routing Protocol (EIGRP)

Which routing metric indicates the number of intermediary routers a packet will have to pass through to reach a destination network? a) Bandwidth b) Hop count c) Load d) Cost

b) Hop count

A common Internet Protocol version 4 (IPv4) routing protocol is: a) RIPng. b) Intermediate System-to-Intermediate System (IS-IS). c) Open Shortest Path First (OSPFv3). d) Multiprotocol BGP (MP-BGP).

b) Intermediate System-to-Intermediate System (IS-IS).

Which of the following is a Physical Layer device that changes an Ethernet signal from, for example, fiber optic to copper transmission media? a) LAN switch b) Media converter c) Wireless range extender/amplifier d) Internet of Things (IoT) endpoint

b) Media converter

Bill is an IT specialist. He has set up a variety of procedures, devices, software programs, and actions to monitor the company's hardware and software. One day, a monitoring tool detects a fault on the network. Bill locates the fault, evaluates it, and then resolves it. What is a simple way to describe what Bill has done? a) Performed risk management b) Practiced fault management c) Performed threat analysis d) Eliminated vulnerabilities

b) Practiced fault management

Which of the following is not true of switching and collision domains? a) A Layer 2 switch separates LANs into multiple collision domains. b) The fewer nodes on an Ethernet collision domain, the greater the chance of a collision occurring. c) A hub acts as a single Ethernet collision domain. d) A Layer 2 switch forwards traffic to only a single port that has the destination address associated to that port.

b) The fewer nodes on an Ethernet collision domain, the greater the chance of a collision occurring.

A new or improved physical media solution must meet certain requirements to be an attractive option and to be adopted by the marketplace. Which of the following requirements is most affected by interference in the environment? a) Availability b) Usability c) Affordability d) Installability

b) Usability

Miriam is an IT manager. She leads a team that is performing a site survey in preparation for a new wireless LAN (WLAN). The team is using site survey software to determine radio coverage and interference patterns in all areas of the facility. What information is typically not determined during a site survey? a) The best locations for and the positioning of wireless access points and antennas b) Whether existing electrical outlets provide power c) Provide even levels of coverage and capacity d) Areas where additional antennas, access points, or repeaters may be needed to overcome interference, signal loss, or range problems

b) Whether existing electrical outlets provide power

All of the following are true of local area networks (LANs), except: a) a LAN is the means for interconnecting devices. b) a LAN cannot operate completely on Layer 2 (the Data Link Layer). c) Layer 2 works closely with Layer 1 to transport frames around a LAN. d) most of the technological advancements in Layer 2 are directly related to Layer 1 advances or differences.

b) a LAN cannot operate completely on Layer 2 (the Data Link Layer).

All of the following are true of a network management system (NMS), except: a) NMS actions may include notifying a technician or running a predefined set of instructions to react to a specific measurement. b) due to the type of monitoring they perform, NMSs focus on wired networks only. c) an overactive NMS sending out frequent queries can cause a network to slow down. d) a good NMS allows users to view the network's performance characteristics in the context of other characteristics and historical measurements.

b) due to the type of monitoring they perform, NMSs focus on wired networks only.

Quality of Service (QoS): a) refers to Layer 2 networking. b) guarantees fixed bandwidth for critical applications like VoIP, video, and streaming. c) is used as an identifier in IEEE 802.1p Layer 2 frames. d) is used by network engineers to shape traffic by enabling prioritization at Layer 2.

b) guarantees fixed bandwidth for critical applications like VoIP, video, and streaming.

All of the following are true of Internet Protocol (IP), except: a) to send messages using IP, higher-layer data must be encapsulated into IP datagrams. b) it allows routers to determine which routes are available and which is the most efficient to a destination. c) encapsulated datagrams are sent to the Data Link Layer, where they are further encapsulated into frames. d) on the Network Layer, IP puts Transport Layer messages, including the headers and trailers of all higher layers, into the data field of an IP datagram.

b) it allows routers to determine which routes are available and which is the most efficient to a destination.

Susan is a network engineer for a marketing firm with 80 staff members. Ten employees are designers who work with high-resolution media files and streaming video content daily. Their content decreases performance of the overall network. What is the best solution to improve network performance for general users? a) Create a virtual LAN (VLAN) for the general users. b) Create a wide area network (WAN) connection for the designers. c) Create a virtual LAN (VLAN) using dynamic membership for the designers. d) Shift the designers to a separate network with a bus topology.

c) Create a virtual LAN (VLAN) using dynamic membership for the designers.

What OSI Network Layer functionality breaks up a packet into fragments that must fit within the maximum transmission unit (MTU) size of the Data Link Layer frame format? a) Datagram/packet encapsulation b) Error handling and diagnostics c) Fragmentation and reassembly d) Internetwork routing

c) Fragmentation and reassembly

Which aspect of wide area network (WAN) security management is most closely aligned to how security business decisions are made (for example, risk transfer versus risk mitigation)? a) Access control b) Continuous monitoring c) Governance d) Recovery planning

c) Governance

Devaki is a security professional. She wants to better align IT services with organizational business requirements. She is working on an IT service catalog so that people in her company understand the specific services they can expect from the IT department. She also plans to update some of the company's IT security policies. Which of the following is the best resource for her to consult? a) ISO/IEC 27000 series b) National Institute of Standards and Technology (NIST) Special Publication (SP) 800 series of documents c) Information Technology Infrastructure Library (ITIL) d) Committee of Sponsoring Organizations (COSO) of the Treadway Commission

c) Information Technology Infrastructure Library (ITIL)

Which type of wireless attack includes ARP spoofing and session hijacking? a) Client-to-client b) Denial of service c) Interception d) Insertion

c) Interception

Wireless denial of service (DoS) attacks affect different OSI model layers. Which layer is attacked primarily by blocking, jamming, or removing the means of transmission? a) Transport b) Network c) Physical d) Data Link

c) Physical

Which wireless technology combines two amplitude modulation (AM) signals onto a single channel, which effectively doubles the available bandwidth of the channel? a) Direct sequence spread spectrum (DSSS) b) Complementary code keying (CCK) c) Quadrature amplitude modulation (QAM) d) Dynamic rate shifting (DRS)

c) Quadrature amplitude modulation (QAM)

The purpose of which type of attack is to gather intelligence for other impending attacks? a) Eavesdropping b) Denial of service c) Reconnaissance d) Accidental

c) Reconnaissance

Which aspect of wide area network (WAN) fault management is about the network's ability to self-heal? a) Fault monitoring b) Incident response c) Resiliency d) Redundancy

c) Resiliency

How does virtualization of routers and their switching functionality support Layer 3 resiliency? a) Provides high availability b) Creates an alternate path in the event of a cable cut c) Supports collapsed backbones and internetworking between LANs d) Is needed for electrical outages or failure of the primary electrical source

c) Supports collapsed backbones and internetworking between LANs

What is the purpose of Rapid Spanning Tree Protocol (RSTP)? a) To assign virtual LANs (VLANs) to an instance of a multiple spanning tree b) To prevent spanning tree calculations from occurring automatically c) To make spanning tree convergence faster d) To more quickly create switching loops

c) To make spanning tree convergence faster

Which aspect of wide area network (WAN) performance management involves packet prioritization? a) Monitoring b) Monthly reporting c) Traffic shaping d) Visibility

c) Traffic shaping

Each entry in a routing table specifies one particular: a) advertisement. b) MAC address. c) path. d) frame.

c) path.

Domain Name System (DNS): a) is a method for planning, tracking, and managing IP address space on a network. b) allows a network system administrator to automatically allocate IP addresses to endpoints when they connect to the LAN upon startup. c) translates human readable domain names (such as www.amazon.com) to machine readable IP addresses (such as 192.0.2.43). d) synchronizes the system clocks of computers and other network devices like routers and firewalls.

c) translates human readable domain names (such as www.amazon.com) to machine readable IP addresses (such as 192.0.2.43).

All of the following are wide area network (WAN) and software-defined WAN (SD-WAN) business drivers for SMB and enterprise organizations, except: a) cloud migration. b) network agility. c) virtual (VLAN) capabilities for segmentation. d) network visibility.

c) virtual (VLAN) capabilities for segmentation.

Jiang is a network professional for a small to medium-sized company. He is looking for a simple-to-install appliance that offers lots of security features: antimalware monitoring, content filtering, firewall, intrusion detection, and spam protection. Which of the following does Jiang choose? a) An authorization, authentication, and accounting (AAA) server b) Certificate authority with digital certificates c) An intrusion detection system (IDS)/intrusion prevention system (IPS) d) A universal threat management (UTM) device

d) A universal threat management (UTM) device

Capturing user audit trails and logs provide a complete view of a user's interaction with systems, applications, and data. Which of the following refers to continuous monitoring in order to capture information? a) Identification b) Authentication c) Authorization d) Accounting

d) Accounting

Which aspect of wide area network (WAN) accounting management is least useful for dealing with service providers if service level agreements (SLAs) have not been met? a) Audit of service provider billing b) Performance monitoring and reporting c) Vendor management d) Asset inventory and management (WAN)

d) Asset inventory and management (WAN)

Layer 2 networks operate at the Data Link Layer. They examine and make forwarding or filtering decisions based on information in a protocol data unit (PDU). Where are PDUs located? a) MAC address table b) Routing table c) Access control list (ACL) d) Data Link header

d) Data Link header

Which part of a network's physical infrastructure is usually a virtual LAN (VLAN) configured from a router, switch, or firewall; has public-facing Internet Protocol (IP) addresses; and acts as the gateway for remote users? a) Core or backbone network b) Distribution network c) Edge network d) Demilitarized zone (DMZ)/VLAN

d) Demilitarized zone (DMZ)/VLAN

Which of the following is a reactive rather than proactive best practice? a) Use automation whenever possible to detect and resolve faults. b) Use the information at your disposal to predict likely faults before they occur. c) Establish baselines and study normal operation to recognize behavior that isn't normal. d) Identify the scope of the fault.

d) Identify the scope of the fault.

Which type of wireless attack involves adding an unauthorized device to a wireless network to gain access to the Internet gateway or the wired network to which an access point is attached? a) Client-to-client b) Denial of service c) Interception d) Insertion

d) Insertion

What OSI Network Layer functionality moves data across a series of interconnected networks? a) Datagram/packet encapsulation b) Error handling and diagnostics c) Fragmentation and reassembly d) Internetwork routing

d) Internetwork routing

Maya is a network engineer. She is planning to implement cloud-based Voice over Internet Protocol (VoIP), streaming, and time-sensitive applications. Maya wants to ensure that the wide area network (WAN) infrastructure can support these technologies and provide a good user experience. Which technology would be the best choice? a) Integrated Services Digital Network (ISDN) b) Satellite c) Virtual private networking d) Multiprotocol Label Switching (MPLS)

d) Multiprotocol Label Switching (MPLS)

All of the following are true of network access control (NAC), except: a) EEE 802.1X is a standard that defines access control to the network. b) NAC can preauthorize which devices can gain access to the network. c) through policy, network administrators can define prescreening conditions prior to authorizing a new device to access the network. d) NAC helps with uniform access control across wired networks; wireless network use their own form of NAC.

d) NAC helps with uniform access control across wired networks; wireless network use their own form of NAC.

The Spanning Tree Protocol (STP) configuration process has several steps. Each step refines the spanning tree to determine the best path through the network. Which of the following is not an STP configuration step? a) Identify the root bridge. b) Identify the root port (RP). c) Elect designated ports. d) Open other ports.

d) Open other ports.

Which Layer 2 header field has a 3-byte organizationally unique identifier (OUI) used to identify the network interface controller (NIC) manufacturer and includes the 2-byte Protocol Type field? a) MAC address b) Protocol Type field c) DSAP/SSAP field d) SNAP field

d) SNAP field

Jiang is in charge of wireless networking for his government agency. He needs to replace several wireless access points and a wireless controller. He wants to replace them with products that have the strongest wireless security. Which of the following should be part of his desired specifications? a) MAC layer address filtering b) Wired Equivalent Privacy (WEP) c) Wi-Fi Protected Access 2 (WPA2) d) Wi-Fi Protected Access 3 (WPA3)

d) Wi-Fi Protected Access 3 (WPA3)

Multiprotocol Label Switching (MPLS): a) is a circuit-switching technology. b) does not operate at Layer 2. c) routes at Layer 3. d) allows IP traffic to flow in a full or partial mesh configuration.

d) allows IP traffic to flow in a full or partial mesh configuration.

A formal process of comparing measurements to one or more baselines is referred to as: a) a probe. b) benchmarking. c) gathering metrics. d) an audit.

d) an audit.

With a proper IT asset inventory, an IT organization can do all of the following, except: a) see IT assets. b) grant or block access to IT assets based on compliance with policy. c) configure and patch IT assets. d) automatically purchase assets that have reached end of life.

d) automatically purchase assets that have reached end of life.

All of the following are true of fault tolerance, except: a) fault tolerance is similar to redundancy and resiliency. b) fault tolerance pertains to an outage or a failure that a network can sustain without eliminating availability completely. c) an automatic switchover solution such as a backup power supply is an example of a fault-tolerance solution. d) full redundancy is inexpensive.

d) full redundancy is inexpensive.

A __________ is a database of characteristics for a specific type of device. a) dashboard b) honeynet c) Simple Network Management Protocol (SNMP) trap d) management information base (MIB)

d) management information base (MIB)

All of the following are advantages of wireless networks versus wired networks, except: a) mobility. b) cost. c) scalability. d) security.

d) security.

All of the following are true of multilayer switches, except: a) they are commonly found in data centers, server farms, and virtual environments. b) they operate at all layers of the OSI model. c) they perform functions up to the Application Layer (Layer 7). d) they are the same as Layer 3 switches, but usually function at faster speeds.

d) they are the same as Layer 3 switches, but usually function at faster speeds.


Related study sets

Chapter 9 Legal Capacity and Contract

View Set

Microecon Exam 2 (Ch. 7, 8, 9, 10, 11, 13)

View Set

chapters 7 & 8: skeletal system and bone structure part 1

View Set

Evidence of Title and the Importance of Recording in Texas UNIT EXAM

View Set

Test 3 - Back of Book (ATI & Text)

View Set