Network+ Chapter 10-12 Quiz

Ace your homework & exams now with Quizwiz!

Of all the DSL standards, which is the most commonly in use today?

ADSL

Which statement regarding the Asynchronous Transfer Mode (ATM) technology is accurate?

ATM can provide 4 levels of QoS, from best effort delivery to guaranteed, real-time transmission.

A RAID 5 configuration requires a minimum of two hard disks to operate.

False

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

False

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

False

Enforcing a virtual security perimeter using a client's geographic location is known by what term?

Geofencing

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

IEEE 802.3ad

What is a data-link connection identifier (DLCI) utilized for?

It is used by routers to determine which circuit to forward a frame to in a frame relay network.

The Wired Equivalent Privacy standard had what significant disadvantage?

It used a shared encryption key for all clients, and the key might never change.

In regards to the use of local authentication, what statement is accurate?

Local authentication is network and server failure tolerant.

Which legacy authentication protocol requires mutual authentication?

Microsoft Challenge Handshake Authentication Protocol, version 2 (MS-CHAPv2)

Each managed object on a managed device using SNMP is assigned which of the following?

Object Idenifier(OID)

Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?

Online UPS

What descendant of the Spanning Tree Protocol is defined by the IEEE 802.1W standard, and can detect as well as correct for link failures in milliseconds?

Rapid Spinning Tree Protocol (RSTP)

Which type of DSL technology has equal download and upload speeds maxing out at around 2 Mbps?

SDSL

Which of the following is an example of proxy server software?

Squid

What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?

Switched Virtual Circuit (SVC)

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

True

Most satellites circle the Earth 22,300 miles above the equator in a geosynchronous orbit.

True

Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/IPS systems are the network's specialized security devices.

True

The storm-control command is a type of flood guard that is available on most major network switch vendor platforms.

True

The supplicant is an EAP entity responsible for requesting authentication, such as a smartphone or laptop.

True

The word "synchronous" as used in the name of Synchronous Optical Network means that data being transmitted and received by nodes must conform to a timing scheme.

True

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the switchport port-security command to enable MAC filtering.

Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

You pay only for the bandwidth you require.

An 802.11ac signal can travel approximately 2 miles from the source.

false

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?

file integrity monitoring (FIM)

A snapshot is most similar to which type of backup scheme?

incremental backup

You have been tasked with the configuration of a Juniper switch, and have been told to restrict the number of MAC addresses allowed in the MAC address table. What command should you use?

mac- limit

Once a device has failed, what metric measures the average amount of time to repair?

mean time to repair (MTTR)

The T-carrier standards, also called T-CXR standards, utilize what type of multiplexing over two wire pairs to create multiple channels?

time division multiplexing (TDM)

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

true

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

uptime

How many transponders are contained within a typical satellite?

24 to 32

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

255.255.255.255

In an ISDN connection, what amount of throughput did a single B channel provide?

64Kbps

If you wish to maintain a "4 nines" availability rating, what is the maximum amount of down time you can have per day?

8 seconds

What IEEE standard includes an encryption key generation and management scheme known as TKIP?

802.11i

A highly available server is available what percentage of the time?

99.999%

The DTE or endpoint device for a leased line is known as which device below?

CSU/DSU

Which statement regarding the use of cable modems is NOT accurate?

Cable modems only operate at the Physical layer of the OSI model.

The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?

Clustering

When Comcast was found to be interfering with BitTorrent traffic, what method was being used?

Comcast was interjecting TCP segments with the RST (reset) field set.

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share the same IP address.

With a SIP trunk, what is the only limitation on the number of calls that can run at any one time?

The amount of available bandwidth.

In planning for disaster recovery, what is the ultimate goal?

The continuation of business.

What is NOT a variable that a network access control list can filter traffic with?

The operating system used by the source or destination device.

What kind of firewall can block designated types of traffic based on application data contained within packets?

content-filtering firewall

Where are MPLS labels placed within a frame?

between the layer 2 header and the layer 3 header

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

expedited forwarding


Related study sets

research methods - exam 1 practice questions

View Set

Linguistics Final he he he he he he he he he he he he he he he

View Set

Mental Chapter 25- The Aging Individual

View Set

ap environmental science unit 9 test review

View Set

Advanced Business Chapter 2: Entrepreneurs in Market Economy

View Set

Arkansas Statutes, Rules, and Regs for Life and Health Insurance

View Set