Networking Fundamentals (CIS180) Quiz 10

Ace your homework & exams now with Quizwiz!

When using SNMP with TLS, what port do agents receive requests on?

10161

In ACL statements, using the "any" keyword is equivalent to using a wildcard mask of what value?

255.255.255.255

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

BPDU guard

Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.

False

When utilizing Kerberos, an access granting ticket is the same as a key.

False

The Link Aggregation Control Protocol was initially defined by what IEEE standard?

IEEE 802.3ad

Which of the following statements describes a RAID 0 configuration?

In a RAID 0, data is striped across multiple disks to improve performance.

Which type of backup scheme only covers data that has changed since the last backup?

Incremental backup

What Storage Area Network (SAN) protocol runs on top of TCP, and can be used on an existing twisted-pair Ethernet network, while maintaining low cost?

Internet SCSI (iSCSI)

What does the Common Address Redundancy Protocol do?

It allows a pool of computers or interfaces to share the same IP address.

At what point is a packet considered to be a giant?

It becomes a giant when it exceeds the medium's maximum packet size.

How does a line conditioning UPS protect network equipment?

It filters line noise from incoming power

What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?

Mean time between failures (MTBF)

Once a device has failed, what metric measures the average amount of time to repair?

Mean time to repair (MTTR)

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.

True

The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.

True

The SNMP version 3 protocol introduces authentication, validation, and encryption for messages exchanged between devices and the network management console.

True

Wireshark or any other monitoring software running on a single computer connected to a switch doesn't see all the traffic on a network, but only the traffic the switch sends to it, which includes broadcast traffic and traffic specifically addressed to the computer.

True

You are attempting to determine how available your Linux systems are, and need to find the current system uptime. What command should you use?

uptime

What makes up the first 6 bits of the 8-bit DiffServ field?

Differentiated Services Code Point (DSCP)

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

Expedited forwarding

A network TAP serves what purpose on a network?

It provides a mirrored port for monitoring traffic between other ports.

The Wired Equivalent Privacy standard had what significant disadvantage?

It used a shared encryption key for all clients, and the key might never change.

What document addresses the specific concerns related to special access given to administrators and certain support staff?

Privileged user agreement

In planning for disaster recovery, what is the ultimate goal?

The continuation of business.

When viewing a syslog message, what does a level of 0 indicate?

The message is an emergency situation on the system.


Related study sets

Biología Tema 6: Flujo de energía de una célula

View Set

AHSS Ch. 6.2 Difference of two proportions

View Set

SU 6: Basis and Property Transactions

View Set

Chapter 34: Postwar Crosscurrents

View Set

Business strategy Exam 1 Self Study Questions

View Set

Common Core ELA 11 (3rd Unit Test Review)

View Set