Skip to main content

IS5203 Week 8 Quizzez

4
Question

Refer to the exhibit. Which authentication protocol is shown in this exhibit?

reference image for question

Correct
 
4 of 7
5
Question

Which of the following types of authentication and access control does not need an external AAA server to verify credentials inputted by users?

Correct
 
5 of 7
6
Question

Which of the following types of authentication will continue to function even if network connectivity to any available AAA servers is lost?

Correct

What kind of network is the PSTN?
CORRECT


What kind of device can monitor a connection at the demarc but cannot interpret data?
CORRECT


Where does an MPLS label go in a PDU?
CORRECT

What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
CORRECT

How many channels are in an ISDN PRI connection?
CORRECT

What method does a GSM network use to separate data on a channel?
CORRECT

Which DSL standard has the fastest speeds immediately outside the CO?
CORRECT

An organization can lease a private _________________ that is not shared with other users, or a _________________ that can be physically configured over shared lines in the carrier's cloud.
CORRECT

______________ in SONET are analogous to the ________________ of T-carriers.
CORRECT

What specifications define the standards for cable broadband?
CORRECT

Which type of address uses 12 hexadecimal digits? (Choose two.)
CORRECT

Which of the following is the PDU used by a connection-oriented Transport layer protocol?
CORRECT

Which cell phone technology uses a spread-spectrum technique that uses codes on the packets to keep calls separated?
CORRECT

You need to implement software that can manage virtual machines and manage resource sharing between a host computer and guest VMs. What should you implement?
CORRECT

A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has been told that all Internet access should go through a single computer so incoming and outgoing traffic can be screened and only that computer should have an address revealed to the Internet. What should the administrator set up?
CORRECT

After configuring a static IP address on a desktop computer, the technician finds that he cannot communicate with other devices on the LAN. He verifies that the IP address and subnet mask are in the correct IP subnet. While the technician is troubleshooting, another user complains that she can no longer access the network. No other users seem to be having any problems. What could be the cause of the problem?
CORRECT

Which of the following best describes the IEEE 802.11b standard?
CORRECT

Which authentication protocol uses PKI to provide mutual authentication?
CORRECT

The Webmaster for a company installed a certificate on a Web server to provide secure communication between the Web server and Web browsers. What protocol will be used to provide a secure channel?
CORRECT

A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?
CORRECT

Your company is using standard structuring cabling techniques. You need a spreadsheet created that tells you which switch port in the IDF each PC is plugged into. Which of the following will help you with this task? (Choose two.)
CORRECT

You have been asked to install a physical security control that will prevent unauthorized users from accessing the server room. Which of the following should you install?
CORRECT


Which protocol is most likely used to communicate with a SAN over an Ethernet LAN using standard NICs?
CORRECT

You are a network administrator for a company that has two buildings. You are setting up a wireless network so users can maintain a network connection as they move between buildings. What should you be sure to configure on your WAPs to give the wireless users the best mobile experience?
CORRECT

A company negotiates with a service provider for Frame Relay service. At the conclusion, the company and service provider sign an agreement specifying the bandwidth and the availability of the service. What document was signed?
CORRECT

You have been called to terminate a DS3 connection at a customer site. What type of connector should you bring to terminate the copper cable?
CORRECT

Which type of Internet connection can provide an unshared connection over regular telephone lines operating with at least 1 Mbps of bandwidth?
CORRECT

One of your clients is adding several computers to a guest waiting area. They have asked you to ensure that inappropriate websites cannot be accessed from those computers. What should you configure?
CORRECT

A technician has run an MMF cable from the IDF to the MDF and is not getting a strong signal. He needs to check the length of the cable and see if there are any breaks or mismatched connectors. What should he use?
CORRECT

When two or more WAPs are installed in close proximity, what must be different on each WAP to avoid problems?
CORRECT

A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred?
CORRECT

Which of the following is a private IP address?
CORRECT

Your boss has asked you to run an Nmap scan on all the routers on one of your subnets. What is your boss looking for?
CORRECT

One morning you come into work and find that one of your servers has been attacked by malware. All the security patches are up-to-date. After doing some investigating and research, you cannot find any information about the nature of the attack or the server vulnerability that allowed it. What are you most likely experiencing?
CORRECT

MMF cable runs from a company datacenter to a workgroup switch that has 16 RJ-45 ports. A connection must be made from the MMF cable to the switch. What is necessary?
CORRECT

Which of the following is found in the intermediate distribution frame and is used to terminate cabling coming from the work area?
CORRECT

You need to ensure that customers have access to your public web servers in the event of a disaster such as a power outage or a failed server. What do you need to implement on your network?
CORRECT

You have been asked to install a device that supports WPA2 and 802.11ac. What device should you install?
CORRECT

While investigating a problem with a router, the show interface command reports line protocol down on the Ethernet port. A Cat5e cable is plugged into the port and is connected to another router's Ethernet port about 80 meters down the hall. Both routers are turned on and configured correctly. The cable is terminated using the TIA/EIA 568A standard on both ends and was tested with a cable certifier. What would solve the problem?
CORRECT

A network administrator manages a network with 75 servers. At least twenty of those servers are approaching end of life but the applications they are running are still critical. The administrator wants to consolidate the older servers into about five servers while maintaining isolation among the applications. What should the administrator implement?
CORRECT

A network technician has been asked to make a connection between two switches in an IDF and MDF using 1000BaseSX Ethernet. The IDF and MDF are about 85 meters apart. The technician brings an adequate length of Cat6a cable to make the connection but finds that he is unable to make a connection. What is the problem?
CORRECT

You are planning to configure a voice and video system that will use TCP/IP. You need to study the protocols and devices you might be using to deploy the system. Which of the following are you likely to study? (Choose two.)
CORRECT

A user is unable to connect to a server with address 172.21.100.100. A technician troubleshooting the problem enters the ipconfig command and sees the output shown below. What should be done to resolve the problem?

Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
Link-local IPv6 Address . . . . . : fe80::ec42:7e6a:d2d4:5410%20
IPv4 Address. . . . . . . . . . . : 172.31.210.1
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 172.31.10.250
CORRECT

Three Cat 5e cables were run from an office area to three computers in a machine shop. Work took place on the weekend when the machine shop was closed. The network is using 1000BaseT switches and all the NICs are 1000BaseT compatible. The longest run of cable is 85 meters. All cabling was certified and network connectivity was verified. On Monday, the users of the computers report very slow network performance and the switch reports CRC errors. What is the most likely reason for the problems?
CORRECT

Which type of cable should you use if you need to support up to 10 Gbps bandwidth at a distance of 85 meters using RJ45 connectors?
CORRECT

A recent audit has prompted a lengthy search for the whereabouts of high-value equipment. While the equipment was eventually found, you want to ensure that you don't have to waste time in the future searching for your equipment. What can you put in place to keep track of your equipment?
CORRECT

Which device uses CSMA/CD when the interface is set to half duplex mode?
CORRECT

You want to implement a system that uses certificates for identity verification and secure key management. What type of system do you need to implement?
CORRECT

Which of the following works over two copper wire pairs, uses TDM, and transmits at 1.544 Mbps?
CORRECT

You are configuring some new network printers and you want to be sure the printers are always dynamically assigned the same IP address. What should you configure?
CORRECT

One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, reliable Internet access. You have been asked to connect the branch office with the main office with a secure connection that uses their existing network infrastructure. What do you recommend?
CORRECT

You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?
CORRECT

Which layer of the OSI model should you examine if you want to troubleshoot a problem with the HTTP protocol?
CORRECT

You are familiar with SSH and are happy with the level of security it provides. You want similar secure communication for file transfers on your network. What should you use?
CORRECT

Which TCP/IP protocol has only these fields in its header: Source port, Destination port, Length, and Checksum?
CORRECT

A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do?
CORRECT
You need to perform out-of-band management on a router. How should you connect to the router?
CORRECT

Which device is used to detect suspicious packets and provides information about possible violations to a management station?
CORRECT

Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?
CORRECT

Which technology allows multiple signals to travel simultaneously over one medium?
CORRECT

A user transfers several MP3 files from her smartphone to her laptop computer using Bluetooth. What type of network infrastructure is she using?
CORRECT
You have been tasked with hardening some of the routers and switches on your network. Currently, your network administrators use telnet to remotely manage the devices. What can you do to make those devices more secure?
CORRECT
What type of connector is used with an SFP port?
CORRECT

A network technician is meeting with a representative of an ISP to inspect the facility where a new WAN connection will be made. Where should the technician meet the representative?
CORRECT

Which device should you install that will give your mobile users secure remote access to the company servers through the public Internet?
CORRECT

You have been asked to examine the status of antivirus software, security patches, and open ports. When you are finished, you should provide a report of your findings. What have you been asked to perform?
CORRECT

Recent police reports suggest that unsavory individuals have been casing the neighborhood where your company is located. You want to ensure that an alarm is triggered in the event someone is detected roaming the premises after business hours. What are you most likely to deploy?
CORRECT
Which of the following is a valid example of an IPv6 link local address?
CORRECT
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need?
CORRECT

Which networking model should you use to allow the users on each computer to control access to their own shared folders and printers without centralized control?
CORRECT
A network technician is asked to send ICMPv6 packets to the IPv6 loopback address on her computer. What command will the technician use?
CORRECT
While installing routers between two buildings, a technician must configure an IPv4 address on both routers using a subnet mask that will yield only the required IP addresses. What should the technician use for the subnet mask, expressed in CIDR notation?
CORRECT

You have recently implemented a new WAN technology to connect a remote branch office to your headquarters. While making VoIP calls between the offices, employees complain about delays between someone talking and the other party hearing what they've said. Which WAN technology is most likely to cause this apparent latency?
CORRECT

Which of the following is an authentication protocol that encrypts the username, authorization, and accounting information, works only over TCP, and was developed by Cisco?
CORRECT
You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?
CORRECT
You are going to be installing a videoconferencing system. One of the requirements of the system is that only workstations that run the conferencing client application receive packets related to the videoconference. You need to assign an address to the videoconferencing application. Which of the following addresses is appropriate?
CORRECT
You have just finished configuring a router on your corporate network that consists of several subnets. Some users have informed you that they have access to some of the servers, but not others that they used to have access to. What is the most likely reason for this problem?
CORRECT

Which of the following devices works with frames and MAC addresses and supports STP?
CORRECT
You have recently set up a new Windows server and have configured the Administrator account with a strong password. What else should you do to make the new server more secure?
CORRECT
A network administrator wants to provide backup power for his datacenter. He will be using a generator. What type of power does a generator produce and what other component is needed to provide the type of power required for a datacenter?
CORRECT

Which of the following separates multiple signals on the same medium by using time slots where each time slot carries data to a different destination or carries a different type of data to the same destination?
CORRECT
You are planning on a redesign of your network that will involve adding two VLANs and reconfiguring some IP subnets. What should you do first?
CORRECT

A startup company has an idea for a new medical records application. The company wants to develop the application so it can be run on multiple OSs. However, they have limited funds to build the development environment that is necessary to create and test the application properly. What service should they consider?
CORRECT

You are capturing packets with a network sniffer and notice a number of packets that are flagged by the sniffer and described as TCP retries. Which layer of the OSI model should you investigate?
CORRECT
A number of computers have been reported to be getting incorrect IP addresses. After doing some investigating, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next?
CORRECT
You need to provide a method to ensure that sensitive files downloaded from your servers can be verified for integrity. Which of the following solutions can you deploy?
CORRECT
While interviewing a user that has reported trouble accessing a server, you determine that other users on the LAN have no problem accessing the server. What question should you ask next?
CORRECT

While cleaning loose-tube fiber-optic cables, a technician gets some of the cleaning solvent near his eyes. Which of the following should the technician check to see how to deal with the problem?
CORRECT

You need to be able to create rules to filter packets and protect against attacks from the Internet. What type of device should you use?
CORRECT
While setting up a new network, a technician connects two switches together using a Cat6 straight-through cable. The switch ports are configured for 1000BaseT Ethernet, full-duplex, and do not support auto-MDIX. After making the connection, the link status light for both ports remains off. What is the most likely problem?
CORRECT
A network has four switches, each with twenty computers connected to the switch ports. Each set of twenty computers been assigned a different IP network number. What is required for all computers to communicate with each other?
CORRECT
You are configuring an AP for a WLAN. You want to use the strongest encryption supported by the device. Which of the following should you choose?
CORRECT
To improve performance on an iSCSI SAN, a network technician configured an MTU value of 9000 on the Ethernet LAN. What did the technician configure?
CORRECT

You arrive at a customer site to resolve a problem with a router. After logging on to the router, you find that it uses a different operating system than the routers you are familiar with. Which troubleshooting step should you take next?
CORRECT
A user's computer is redirected to an attacker's server after the attacker transmitted several frames onto the network. After some investigation, you have found that the user's computer had an incorrect mapping of an IP address to a MAC address. What type of attack took place?
CORRECT
While using a protocol analyzer, you see a packet with UDP source port 68 and destination port 67. What are you seeing?
CORRECT
You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15 cubicles where employees work with their mobile devices. You test connectivity from all locations and find that signal strength is good throughout the room. Several months later, you are called to troubleshoot connectivity problems at the site. You find that the large room was divided into two smaller rooms by a floor to ceiling wall with metal studs. What is the most likely reason for the connectivity problems?
CORRECT
You've arrived on site to a WAN installation where you will be performing maintenance operations. You have been told the WAN protocol in use allows multiple Layer 3 protocols and uses routers that use labels in the frame headers to make routing decisions. What WAN technology is in use?
CORRECT
The default VLAN on a switch has been assigned an IP address of 172.19.0.64/27 with a default gateway of 172.19.0.94. You can't ping the switch from your workstation that has the address 172.19.0.66/27 but you can ping your default gateway that has the address 172.19.0.94. Why can't you ping the switch?
CORRECT
Which of the following is associated with SNMP software? (Choose two.)
CORRECT

                                                                            
                                                                          Final Quiz                                                                      
WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.
Select one:
 

Feedback

A drop ceiling could be used by an intruder to gain access to a secured room.
Select one:
 

Feedback

In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.
Select one:
 

Feedback

Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?
Select one:
a.
PPP can utilize an authentication protocol, such as MS-CHAPv2 or EAP to authenticate a client.
b.
PPP can negotiate and establish a connection between two endpoints.
c.
PPP can support strong encryption, such as AH or ESP.
Correct
d.
PPP can support several Network layer protocols, such as IP, that might use the connection.

Feedback

Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
Select one:
a.
cached denial-of-service attack
b.
distributed denial-of-service attack
c.
permanent denial-of-service attack
d.
distributed reflection denial-of-service attack
Correct

Feedback

The Wired Equivalent Privacy standard had what significant disadvantage?
Select one:
a.
It used a shared encryption key for all clients, and the key might never change.
Correct
b.
It provided no encryption for traffic sent over the air.
c.
It only encrypted the initial connection authentication, but did not encrypt subsequent traffic.
d.
It did not allow the use of a password for access to the network.

Feedback

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?
Select one:
a.
encrypted virus
b.
boot sector virus
c.
worm
d.
logic bomb
Correct

Feedback

In a cellular network, where does each wireless base station connect to?
Select one:
a.
They connect directly to the central office.
b.
They connect to a mobile switching center.
Correct
c.
They connect to a wireless station repeater.
d.
They connect to other wireless base stations, then to the central office.

Feedback

What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?
Select one:
a.
management frames
Correct
b.
data frames
c.
control frames
d.
extended frames

Feedback

What statement regarding the use of a network attached storage device is accurate?
Select one:
a.
A NAS can typically only support RAID-0 configurations.
b.
A NAS does not contain its own file system, rather it relies on the host file system provided by individual clients.
c.
A NAS can be easily expanded without interrupting service.
Correct
d.
A NAS reads and writes from its disks significantly slower than other types of servers.

Feedback

Which statement regarding the Asynchronous Transfer Mode (ATM) technology is accurate?
Select one:
a.
ATM is highly dependent on predetermined schemes that specify the timing of data transmissions.
b.
In ATM, a message is called a frame and always consists of 1500 bytes of data.
c.
ATM is a point-to-multipoint WAN access technology that uses packet switching.
d.
ATM can provide 4 levels of QoS, from best effort delivery to guaranteed, real-time transmission.
Correct

Feedback

Which statement regarding the use of cable modems is NOT accurate?
Select one:
a.
DOCSIS 3.1 allows for full duplex speeds up to 10 Gbps.
b.
Modems that utilize the DOCSIS 3.0 or 3.1 standard are backward compatible with older DOCSIS networks.
c.
Cable modems only operate at the Physical layer of the OSI model.
Correct
d.
Cable broadband provides a dedicated and continuous connection.

Feedback

Multimode fiber contains a core that is larger than a single mode fiber core.
Select one:
 

Feedback

What statement regarding the Power Over Ethernet standards is inaccurate?
Select one:
a.
Electric current may run over a pair of wires used for data transmission.
b.
A device that supplies power for PoE is known as power sourcing equipment.
c.
Power over Ethernet requires CAT6 or better copper cable.
Correct
d.
The amount of power provided is 15.4 watts for standard PoE devices.

Feedback

With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?
Select one:
a.
ftp1.dallas
b.
ftp1
c.
mycompany.com
Correct
d.
ftp1.dallas.mycompany.

Feedback

You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.
Select one:
 

Feedback

What is NOT one of the ways in which networks are commonly segmented?
Select one:
a.
by departmental boundaries
b.
by geographic location
c.
by device types
d.
by device manufacturer
Correct

Feedback

What type of diagram is a graphical representation of a network's wired infrastructure?
Select one:
a.
network diagram
b.
topology map
c.
system diagram
d.
wiring schematic
Correct

Feedback

Near-field communication devices send data at what fixed frequency?
Select one:
a.
8.65 MHz
b.
47.1 MHz
c.
13.56 MHz
Correct
d.
21.39 MHz

Feedback

Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?
Select one:
a.
The router serving the network will have a redundant spare.
b.
Two different IPv4 address spaces will exist on the same network segment.
c.
Both IPv4 and IPv6 protocols will be used on the network.
Correct
d.
The network will exist on two separate segments, separated by a proxy.

Feedback

Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
Select one:
a.
denial-of-service attack
Correct
b.
rogue DHCP server
c.
DNS poisoning
d.
MAC address spoofing

Feedback

The C-Band utilized by satellites consists of what frequency range?
Select one:
a.
1.5 - 2.7 GHz
b.
12 - 18 GHz
c.
2.7 - 3.5 GHz
d.
3.4 - 6.7 GHz
Correct

Feedback

A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
Select one:
 

Feedback

Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?
Select one:
a.
EAP-TLS
b.
LEAP
c.
Protected EAP (PEAP)
Correct
d.
EAP-FAST

Feedback

Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.
Select one:
 

Feedback

Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.
Select one:
 

Feedback

What mail protocol is used to send mail messages to a server?
Select one:
a.
POP3
b.
IMAP4
c.
SMTP
Correct
d.
HTTPS

Feedback

A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.
Select one:
 

Feedback

What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?
Select one:
a.
IPsec
Correct
b.
L2TP
c.
SSL
d.
TLS

Feedback

Although MPLS can operate over Ethernet frames, it is more often used with other Layer 2 protocols, like those designed for WANs.
Select one:
 

Feedback

Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?
Select one:
a.
OC-3
Correct
b.
OC-1
c.
OC-24
d.
OC-12

Feedback

In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
Select one:
a.
The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
b.
The Presentation layer describes the interface between two applications, each on separate computers.
c.
The Presentation layer is responsible for transporting Application layer payloads from one application to another.
d.
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
Correct

Feedback

What happens when an NMS uses the SNMP walk command?
Select one:
a.
The NMS walks through a list of given SNMP hosts.
b.
The NMS uses get requests to move through sequential rows in the MIB database.
Correct
c.
The NMS sends a request for data to the agent on a managed device.
d.
The NMS requests a list of all active SNMP traps on the system.

Feedback

How many data streams are used in 802.11ac Wave 2 devices?
Select one:
a.
8 data streams
b.
3 data streams
c.
4 data streams
Correct
d.
2 data streams

Feedback

What IPv6 field is similar to the TTL field in IPv4 packets?
Select one:
a.
hop limit
Correct
b.
distance vector
c.
flow label
d.
next header

Feedback

Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?
Select one:
a.
Frame relay is a newly established network technology with more features than other technology.
b.
You pay only for the bandwidth you require.
Correct
c.
The paths that your data will take are always known.
d.
You are guaranteed to receive the maximum amount of bandwidth specified in the circuit contract

Feedback

An IP address of 192.168.18.73/28 has what network ID?
Select one:
a.
192.168.18.0
b.
192.168.18.32
c.
192.168.16.0
d.
192.168.18.64
Correct

Feedback

When an 802.1Q tag is added to an Ethernet frame, where is it placed?
Select one:
a.
It is inserted between the source address and the Ethernet type field.
Correct
b.
It is inserted between the preamble and the destination address.
c.
It is inserted between the destination and the source addresses.
d.
It is appended to the end of the frame.

Feedback

At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.
Select one:
 

Feedback

An 802.11ac signal can travel for approximately 2 miles from the source.
Select one:
 

Feedback

You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?
Select one:
a.
The MTU for the network is set at 65,535 bytes.
b.
The MTU for the network can be as high as 9198 bytes.
Correct
c.
Fragmented frames will be consolidated into whole frames before being sent.
d.
The network is not based on the Ethernet standard.

Feedback

The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.
Select one:
 

Feedback

How do routers create a broadcast domain boundary?
Select one:
a.
They forward broadcasts only to necessary segments.
Incorrect
b.
They listen to and direct broadcast traffic.
c.
They only forward broadcasts that are intended for multiple subnets.
d.
They do not forward broadcast traffic.

Feedback

You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?
Select one:
a.
EIGRP will increase CPU utilization on core routers.
b.
Increased traffic will result from the switch to EIGRP.
c.
EIGRP may not be available on non-Cisco routers.
Correct
d.
Convergence time will be increased with EIGRP.

Feedback

What type of device can be used to assess the quality of a wireless signal?
Select one:
a.
spectrum analyzer
Correct
b.
Wi-Fi analyzer
c.
channel scanner
d.
frequency hopper

Feedback

When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?
Select one:
a.
32
b.
20
c.
8
d.
15
Correct

Feedback

A hacker, in the original sense of the word, is someone with technical skill and malicious intent.
Select one:
 

Feedback

Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?
Select one:
a.
10km
b.
40km
Correct
c.
550m
d.
300m

Feedback

What is the purpose of the Layer 2 LLC sublayer?
Select one:
a.
It is used to handle multiplexing, flow and error control, and reliability.
Correct
b.
It performs management of the physical layer's modulation techniques.
c.
It is used to manage low-level encryption on a network.
d.
It is used to manage MAC addresses in message frames.

Feedback

You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?
Select one:
a.
TIA/EIA 568B
b.
TIA/EIA 568A
Correct
c.
TIA/EIA rollover
d.
TIA/EIA 568F

Feedback

A subnet of 255.255.248.0 can be represented by what CIDR notation?
Select one:
a.
/20
b.
/18
c.
/21
Correct
d.
/29

Feedback

Which of the following is an example of encapsulation?
Select one:
a.
The subtraction of a header from data inherited from the layer below in the OSI model.
b.
The addition of a header to data inherited from the layer above in the OSI model.
Correct
c.
The modification of headers from a higher layer in the OSI model.
d.
The addition of a trailer to data inherited from the layer above in the OSI model.

Feedback

A change coordinator functions as what type of manager?
Select one:
a.
human resources manager
b.
time manager
c.
project manager
Correct
d.
inventory manager

Feedback

VMware Player and Linux KVM are both examples of what type of hypervisor?
Select one:
a.
Type 2 hypervisor
Correct
b.
barebones hypervisor
c.
bare-metal hypervisor
d.
Type 1 hypervisor

Feedback

What statement correctly identifies the purpose of a software patch?
Select one:
a.
A software patch is a major change to a software package that enhances the functionality and features of the software, while also correcting bugs and vulnerabilities.
b.
A software patch is a correction, improvement, or enhancement to software.
Correct
c.
A software patch is a container for new software, and must be installed on relevant devices and incorporated with network resources.
d.
A software patch involves the process of reverting to a previous version of software after attempting to upgrade it.

Feedback

What is the maximum number of host IP addresses that can exist in a Class B network?
Select one:
a.
1022
b.
8190
c.
65,534
Correct
d.
32,766

Feedback

What is the purpose of the checksum TCP field?
Select one:
a.
It confirms receipt of data via a return message to the sender.
b.
It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
Correct
c.
It identifies the data segment's position in the stream of data segments being sent.
d.
It specifies special options, such as the maximum segment size a network can handle.

Feedback

When using IPv6, two or more nodes on the same link are said to be neighbors.
Select one:
 

Feedback

When using IPv6, two or more nodes on the same link are said to be neighbors.
Select one:
 

Feedback

When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn't change?
Select one:
a.
file access auditing (FAA)
b.
file checksum watching (FCW)
c.
file integrity monitoring (FIM)
Correct
d.
file change management (FCM)

Feedback

Each managed object on a managed device using SNMP is assigned which of the following?
Select one:
a.
object identifier (OID)
Correct
b.
process ID
c.
TCP/UDP port
d.
inode number

Feedback

Which statement regarding the use of a bridged mode vNIC is accurate?
Select one:
a.
The vNIC will be assigned a NAT-ed IP address.
b.
The vNIC will utilize the host PC's IP address.
c.
The vNIC will only be able to communicate across the bridge to the host PC.
d.
The vNIC will its own IP address on the physical LAN.
Correct

Feedback

Which command will produce statistics about each message transmitted by a host, separated according to protocol type?
Select one:
a.
netstat -an
Incorrect
b.
ipstat -a
c.
ipconfig -s
d.
netstat -s

Feedback

What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
Select one:
a.
SMTP
b.
HTTP
c.
POP3
d.
SNMP
Correct

Feedback

Which of the following statements correctly describes the malware characteristic of polymorphism?
Select one:
a.
Polymorphic malware utilizes encryption to prevent detection.
b.
Polymorphic malware can change its characteristics every time it is transferred to a new system.
Correct
c.
Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
d.
Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.

Feedback

Telephone connections follow what registered jack standard?
Select one:
a.
registered jack 100 (RJ-100)
Incorrect
b.
registered jack 12 (RJ-12)
c.
registered jack 11 (RJ-11)
d.
registered jack 45 (RJ-45)

Feedback

Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.
Select one:
 

Feedback

By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?
Select one:
a.
bridged mode
b.
lockdown mode
c.
NAT mode
Correct
d.
host-only mode

Feedback

What statement regarding the SSH (Secure Shell) collection of protocols is accurate?
Select one:
a.
SSH provides a graphical view of the remote computer.
b.
SSH supports port forwarding.
Correct
c.
SSH does not protect against DNS spoofing.
d.
SSH does not protect against IP spoofing.

Feedback

The protocol data unit for the Physical layer of the OSI model is payload, or data.
Select one:
 

Feedback

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?
Select one:
a.
tailgating
Correct
b.
baiting
c.
quid pro quo
d.
phishing

Feedback

What statement regarding main distribution frame or main distribution facilities is accurate?
Select one:
a.
The MDF refers to the racks holding network equipment in an organization.
b.
The MDF is the centralized point of interconnection for an organization's LAN or WAN.
Correct
c.
The MDF and entrance facility are always in separate rooms.
d.
The MDF provides intermediate connection between the IDF and end-user equipment on each floor.

Feedback

Upon connecting to a Wi-Fi network, you're redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?
Select one:
a.
guest network profile
b.
captive portal
Correct
c.
WPA2-Enterprise
d.
browser hijacking

Feedback

What command can you utilize to display TCP/IP configuration information for each network adapter installed?
Select one:
a.
ipconfig /all
Correct
b.
ipconfig /show
c.
ipconfig /list
d.
ipconfig /full

Feedback

Which of the following is an example of proxy server software?
Select one:
a.
Squid
Correct
b.
Apache
c.
BIND
d.
Snort

Feedback

All wireless signals are carried through the air by electromagnetic waves.
Select one:
 

Feedback

Which of the following suggestions can help prevent VLAN hopping attacks on a network?
Select one:
a.
Install an additional switch to isolate traffic.
b.
Install a router to process the untagged traffic on the VLAN.
c.
Use MAC address filtering.
d.
Disable auto trunking and move native VLANs to unused VLANs.
Correct

Feedback

A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?
Select one:
a.
VoIP LEC (local exchange carrier)
b.
VoIP router
c.
VoIP ATB (analog telephone branch)
d.
VoIP PBX (private branch exchange)
Correct

Feedback

Once a device has failed, what metric measures the average amount of time to repair?
Select one:
a.
mean restoration time (MRT)
b.
mean time to restore (MTTR)
c.
mean field replacement time (MFRT)
d.
mean time to repair (MTTR)
Correct

Feedback

Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).
Select one:
 

Feedback

Which of the following statements describes a worm?
Select one:
a.
A program that runs independently of other software and travels between computers and across networks.
Correct
b.
A program that disguises itself as something useful but actually harms your system.
c.
A program that locks a user's data or computer system until a ransom is paid.
d.
A process that runs automatically, without requiring a person to start or stop it.

Feedback

The Border Gateway Protocol is considered to be a hybrid routing protocol.
Select one:
 

Feedback

The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.
Select one:
 

Feedback

What command can be used to check a domain computer's time source from a Command Prompt window?
Select one:
a.
date /source
b.
ntpd show source
c.
w32tm /query /source
Correct
d.
time --source

Feedback

Which statement does NOT accurately describe characteristics of the OSPF protocol?
Select one:
a.
OSPF maintains a database of other routers' links.
b.
OSPF provides low network overhead.
c.
OSPF has no hop limits on a transmission path.
d.
OSPF requires very little CPU or memory resources.
Correct

Feedback

All that is needed to provide communication between two VLANs is a DHCP relay agent.
Select one:
 

Feedback

The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?
Select one:
a.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
Correct
b.
Carrier Sense Single Access with Collision Adaptation (CSSA/CA)
c.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)
d.
Carrier Sense Multiple Access with Collision Mitigation (CMSA/CM)

Feedback

The Data Link Layer utilizes what name for its protocol data unit (PDU)?
Select one:
a.
data
b.
frame
Correct
c.
packet
d.
bit

Feedback

In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.
Select one:
 

Feedback

An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
Select one:
 

Feedback

What tcpdump command can be used to filter out all traffic except SSH traffic?
Select one:
a.
tcpdump -p 22
b.
tcpdump -f +ssh
c.
tcpdump only ssh
d.
tcpdump port 22
Correct

Feedback

What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?
Select one:
a.
link local address
Correct
b.
anycast address
c.
multicast address
d.
global address

Feedback

On a Cisco switch, what would the security association identifier be for VLAN 13?
Select one:
a.
1013
b.
1000130
c.
100013
Correct
d.
5013

Feedback


Which statement accurately describes what near end crosstalk (NEXT) is?
Select one:
a.
NEXT is crosstalk that occurs between wire pairs near the source of a signal.
Correct
b.
NEXT is crosstalk that occurs only when a cable segment exceeds the bend radius.
c.
NEXT is crosstalk that occurs near the opposite end of a signal source.
d.
NEXT is crosstalk that occurs when an EMI source is near the data signal source.

Feedback

What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?
Select one:
a.
workgroup
b.
spreadsheet
c.
wiki
Correct
d.
co-op

Feedback

What 3-bit field in a 802.1Q tag is modified to set a frame's Class of Service (CoS)?
Select one:
a.
Priority Code Point (PCP)
Correct
b.
CRC checksum
c.
EtherType
d.
Tag Protocol Identifier (TPID)

Feedback

A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?
Select one:
a.
fiber stripper
b.
fiber snipper
c.
fiber cleaver
Correct
d.
fiber saw

Feedback

What text editor can be used on Linux to view and edit the contents of a configuration file?
Select one:
a.
edit
b.
Microsoft Word
c.
Notepad
d.
vim
Correct

Feedback

When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?
Select one:
a.
VPN proxy
b.
VPN gateway
Correct
c.
VPN transport
d.
VPN server

Feedback

You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?
Select one:
a.
Use the switchport port-security command to enable MAC filtering.
Correct
b.
Use the allowed-mac command to filter by MAC address.
c.
Use the secure port mac-address command to limit the port to learned addresses only.
d.
Use the mac-limit command to prevent more than one MAC from being accepted.

Feedback

How does refraction affect the propagation of a wireless transmission?
Select one:
a.
It causes the signal to be returned back towards the source of the origin.
b.
It distorts the signal as it travels into and through a different transmission medium.
Correct
c.
It splits the signal into secondary waves that continue in the direction in which they split.
d.
It causes the signal to be absorbed by the refracting material.

Feedback

In a red team-blue team exercise, what is the purpose of the blue team?
Select one:
a.
The blue team must observe the actions of the red team.
b.
The blue team is charged with the defense of the network.
Correct
c.
The blue team is tasked with attacking the network.
d.
The blue team consists of regulators that ensure no illegal activity is undertaken.

Feedback

What is a data-link connection identifier (DLCI) utilized for?
Select one:
a.
It is used by ATM switches to determine how to create a switched virtual circuit.
b.
It is a locally significant ID used to send connectionless information.
c.
It is used by routers to establish a packet-switched path to the destination.
d.
It is used by routers to determine which circuit to forward a frame to in a frame relay network.
Correct

Feedback

Signals that can travel in only one direction on a medium are referred to as what type of signal?
Select one:
a.
full-duplex
b.
simplex
Correct
c.
half-duplex
d.
duplex

Feedback

In order to generate a public and private key for use with SSH, what command line utility should you use?
Select one:
a.
key-generate
b.
ssh-newkey
c.
ssh-keygen
Correct
d.
gpg --ssh

Feedback

What statement correctly describes a stateless firewall?
Select one:
a.
A stateless firewall filters packets based on source and destination IP addresses.
b.
A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.
Correct
c.
A stateless firewall blocks designated types of traffic based on application data contained within packets.
d.
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

Feedback

The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.
Select one:
 

Feedback

What occurs when a collision happens on a network?
Select one:
a.
The collision will create an error in the network switch, but otherwise, no issues will occur as a result.
b.
Each node on the network stops transmitting, until manually told to reconnect and transmit.
c.
The collision goes undetected, and data transmission continues.
d.
Each node on the network waits a random amount of time and then resends the transmission.
Correct

Feedback

Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?
Select one:
a.
The termination will fail over time due to oxidation.
b.
The exposure of the cable can cause transmission interference between wires.
Correct
c.
The cable will lose its conductive properties.
d.
Exposing more cable than necessary can cause corrosion of the copper wire.

Feedback

When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?
Select one:
a.
scaled forwarding
b.
expedited forwarding
Correct
c.
prioritized forwarding
d.
assured forwarding

Feedback

How many subnets can a /48 site prefix support?
Select one:
a.
131,072 subnets
b.
256 subnets
c.
16384 subnets
d.
65,536 subnets
Correct

Feedback

The TCP and UDP protocols both exist at what layer of the OSI model?
Select one:
a.
Network
b.
Transport
Correct
c.
Application
d.
Presentation

Feedback

In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?
Select one:
a.
Link
b.
Internet
c.
Transport
d.
Application
Correct

Feedback

On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?
Select one:
a.
ip show
b.
ifconfig -a
Correct
c.
ipconfig /all
d.
if status

Feedback

A time domain reflectometer sends a signal and analyzes the return signal's change in amplitude to determine where cable imperfections may exist.
Select one:
 

Feedback

RG-59 is more expensive than RG-6, but has better resistance to attenuation.
Select one:
 

Feedback

What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?
Select one:
a.
statement of work
b.
service-level agreement
Correct
c.
master service agreement
d.
memorandum of understanding

Feedback

The term malware is derived from a combination of the words malicious and software.
Select one:
 

Feedback

Which of the following is not one of the disadvantages of peer-to-peer networks?
Select one:
a.
They lack scalability.
b.
They are impractical for connecting large numbers of computers.
c.
They are not necessarily secure.
d.
They centralize user account logins.
Correct

Feedback

Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?
Select one:
a.
port mirroring
Correct
b.
port shadowing
c.
port supertrunking
d.
port lurking

Feedback
































































































































































































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh