Network+ Chapter 7-9 Exam

Ace your homework & exams now with Quizwiz!

A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

An IP address of 192.168.18.73/28 has what network ID?

192.168.18.64

By default, when using classful addressing, how many bits exist in the host portion of a Class A address?

24

How many /64 subnets can be created within a /56 prefix?

256

Which of the following is NOT a task that a VPN concentrator is responsible for?

A VPN concentrator shuts down established connections when malicious traffic occurs.

What type of scenario would be best served by using a Platform as a Service (PaaS) cloud model?

A group of developers needs access to multiple operating systems and the runtime libraries that the OS provides

When using IPv6, what would a /64 network likely be assigned to?

A small organization or business

The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?

FCS

All that is needed to provide communication between two VLANs is a DHCP relay agent.

False

Different types of organizations have similar levels of network security risks.

False

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

False

The original version of the Secure Hash Algorithm was developed by MIT.

False

Which command can be used on a Windows system to create a hash of a file?

Get-FileHash

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPsec

What is the Nmap utility used for?

It is port scanning utility that can identity open port in a host

What does the VLAN Trunk Protocol (VTP) do?

It shares VLAN database information amongst switches that participate.

The combination of a public key and a private key are known by which of the following terms?

Key pair

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

Layer 2

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

NAT mode

With VTP, where is the VLAN database stored?

On the switch that is known as Stack Master

What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

Open VPN

What term is used to describe a space that is rented at a data center facility by a service provider?

Point of Presence(PoP)

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

Principle of least privilege

What statement regarding the different versions of the SHA hashing algorithm is accurate?

SHA 2 and SHA 3 both support same hash length

To generate a public and private key for use with SSH, what command line utility should you use?

SSH keygen

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH support port forwarding

On a Linux based system, what command can you use to create a hash of a file using SHA-256?

Sha254sum

You are working on a Cisco switch and need to learn what VLANs exist on the switch. Which command will list the current VLANs recognized by the switch?

Show vlan

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

Tailgating

In an IPv6 address, what do the first four blocks or 64 bits of the address represent?

The site prefix or global routing prefix

A /24 CIDR block is equivalent to a 255.255.255.0 subnet mask.

True

A drop ceiling could be used by an intruder to gain access to a secured room.

True

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

True

IPv6 addressing does not utilize classful addressing; therefore every IPv6 address is classless.

True

Over a long-distance connection, using SSH keys is more secure than using passwords.

True

PPP can support several types of Network layer protocols that might use the connection.

True

Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.

True

The Virtual Network Computing (VNC) application uses the cross-platform remote frame buffer (RFB) protocol.

True

The day after Patch Tuesday is informally dubbed Exploit Wednesday.

True

To identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.

True

Office 365 is an example of an SaaS implementation with a subscription model.

Ture

VMware Player and Linux KVM are both examples of what type of hypervisor?

Type-2 hypervisoer

When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?

VLAN 1001

What is NOT a potential disadvantage of utilizing virtualization?

Virtualization software increases the complexity of backups, making creation of usable backups difficult.

Where would restrictions regarding what users can and cannot do while accessing a network's resources be found?

acceptable user policy document

An interface that manages traffic from multiple VLANs is known by what term?

aggregation port

How often should you require users to change their passwords?

every 60 days

On certain Cisco products, what command can be used to create and send helper messages that support several types of UDP traffic, including DHCP, TFTP, DNS, and TACACS+?

ip helper-address

If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

quid pro quo

Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?

router-on-a-stick


Related study sets

Intro to Theatre Final Study Guide

View Set

FA Davis Maternity review questions test 1

View Set

Chapter 7: Antibacterial Drugs That Disrupt the Bacterial Cell Wall

View Set

Final: Basic Structure of Neuron & Structural/Functional classifications of Neurons.

View Set

Lifetime Health: Chapter 9 Vocabulary

View Set

N+ N10-008 - Missed Practice Test Questions 4 - 6

View Set

Real Estate Unit 18 - Federal Income Taxation of Real Property Ownership

View Set