1/34
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
PTP can be deployed as a layer 3 protocol over IP. What is a limitation of this deployment?
It cannot achieve the same accuracy as layer 2 implementations.
It is incompatible with most network adapters.
It requires additional satellite synchronization.
It increases the network bandwidth usage significantly
It cannot achieve the same accuracy as layer 2 implementations.
What is established between a server and a client after successful authentication with TLS?
A public network
An encrypted tunnel
A data compression protocol
A direct physical connection
An encrypted tunnel
You are the network administrator for a small consulting firm. You've set up an NTP server to manage the time across all the machines in the network.
You have a computer that's experiencing a slight time drift of just a few seconds.
Which time correction should you use to fix the system's clock?
Slam
Slew
Skew
Jitter
Slew
What is it called when a system's clock begins to be off by a few seconds or even minutes?
Slew
Time drift
Dispersion
Slam
Time drift
You are setting up a secure website for your online store. You want to ensure that all data transmitted between your website and your customers is encrypted.
Which of the following steps is essential for you to achieve this?
Obtain and install a digital certificate.
Install a web analytics tool.
Increase your website's bandwidth.
Implement a CAPTCHA system on your website.
Obtain and install a digital certificate.
What can happen if a server or host is configured with the incorrect time?
It can lead to increased network speed
It will increase the security of network communications
It will automatically correct itself without NTP
It may not be able to access network services
It may not be able to access network services
What happens during a TLS handshake?
The server provides its digital certificate to the client for authentication.
The server and client agree on a data compression method.
The server's processing load is reduced.
The client and server negotiate network congestion management.
The server provides its digital certificate to the client for authentication.
What is the main advantage of Precision Time Protocol (PTP) over Network Time Protocol (NTP)?
PTP is easier to implement.
PTP supports more network services.
PTP provides nanosecond precision.
PTP uses less network bandwidth.
PTP provides nanosecond precision.
Which of the following time standards does NTP use?
EDT
PDT
CDT
UTC
UTC
What role does a grandmaster clock play in a PTP domain?
It acts as the primary backup time source.
It synchronizes directly with satellite clocks.
It is the authoritative time source.
It serves as the primary network router.
It is the authoritative time source.
What does the term "stateless protocol" imply about HTTP?
Each request from a client to a server is treated as a new request.
The server stores data in a centralized database for all requests.
The server retains information about client requests indefinitely.
The server requires authentication for every request.
Each request from a client to a server is treated as a new request.
Which TCP port does HTTPS encrypted traffic default to?
8080
80
21
443
443
Why is FTPES usually preferred over FTPS?
FTPES supports larger file transfers.
FTPES is faster than FTPS.
FTPES uses stronger encryption than FTPS.
FTPES is easier to configure with firewalls.
FTPES is easier to configure with firewalls.
What feature does version 2 of HTTP add to enhance its functionality?
More state-preserving features
Increased encryption
Improved FTP support
Faster email transmission
More state-preserving features
What is the primary function of a database?
To provision information in a format that can be read and updated
To serve as a graphical user interface for data management
To store data in a static format that cannot be updated
To encrypt data using transport layer security
To provision information in a format that can be read and updated
Which of the following is a limitation of active FTP mode regarding firewalls?
It only works with TCP port 22.
It encrypts the data transfer by default.
It can cause configuration problems due to unpredictable port usage.
It requires HTTPS for data transfer.
It can cause configuration problems due to unpredictable port usage.
Which operating system is typically used by NAS appliances?
iOS
Windows
MacOS
Linux-based
Linux-based
What is the purpose of using TLS transport encryption in databases?
To improve the graphical user interface
To increase data storage capacity
To secure data transmission over the network
To synchronize data between servers
To secure data transmission over the network
In the context of FTP over Explicit TLS (FTPES), which command is used to encrypt the data connection for actual file transfers after upgrading an unsecure connection to a secure one?
PASV
SSH
AUTH TLS
PROT
PROT
Why is SMB1 now disabled by default on current Windows versions?
It does not support printing services.
It is too slow.
It has very serious security vulnerabilities.
It does not support encryption.
It has very serious security vulnerabilities.
Which protocol is typically used for copy or backup operations on a NAS appliance?
SNMP
SMB or FTP
HTTP
SMTP
SMB or FTP
What does a client use to identify the resource it wants to request from an HTTP server?
Port number
Uniform Resource Locator (URL)
IP address
MAC address
Uniform Resource Locator (URL)
What is the primary purpose of the File Transfer Protocol (FTP)?
To stream video content
To encrypt web traffic
To send email messages
To transfer files between a client and server
To transfer files between a client and server
Why might TFTP not be suitable for transferring large files?
It encrypts the data, causing overhead.
It requires manual confirmation for each packet.
It operates over UDP, which does not guarantee delivery.
It only works within local networks.
It operates over UDP, which does not guarantee delivery.
Which version of SMB supports message encryption?
All versions
SMB3
SMB2
SMB1
SMB3
What is a key advantage of using VoIP technology over traditional PSTN lines?
Limited call routing options
Ability to transmit voice over IP networks
Higher call costs
Requirement for separate voice and data channels
Ability to transmit voice over IP networks
How do VoIP phones use VLAN tagging?
To prioritize video traffic over voice traffic
To ensure that voice and data traffic are combined on the same network
To disable all data traffic except for VoIP communication
To ensure that SIP control and RTP media protocols are segregated from normal data traffic
To ensure that SIP control and RTP media protocols are segregated from normal data traffic
How do VoIP phones distinguish data traffic from voice traffic?
By using digital certificates for voice traffic only
By configuring separate VLAN IDs for data and voice traffic
By using separate physical links for each type of traffic
By prioritizing voice traffic over data traffic using PoE
By configuring separate VLAN IDs for data and voice traffic
What is a significant difference between a TDM PBX and a VoIP PBX?
A TDM PBX can only support voice mail, while a VoIP PBX cannot.
A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.
A VoIP PBX requires a separate data channel for each call, while a TDM PBX does not.
A TDM PBX uses the Internet for all calls, while a VoIP PBX uses the PSTN.
A TDM PBX is supplied as vendor-specific hardware, while a VoIP PBX can be implemented as software.
What is one of the primary purposes of the Internet Message Access Protocol (IMAP)?
To connect to web servers
To encrypt email messages
To deliver email to hosts that are permanently available
To manage a mailbox on a server
To manage a mailbox on a server
What is the purpose of the STARTTLS command in SMTP?
To create a new email account
To upgrade an existing unsecure connection to use TLS
To encrypt the entire email message content
To downgrade the connection to an unsecure state
To upgrade an existing unsecure connection to use TLS
What does SMTP use to discover the IP address of the recipient's SMTP server?
The domain name part of the recipient's email address
The sender's IP address
The recipient's physical address
The recipient's email password
The domain name part of the recipient's email address
In a Windows environment, which protocol is typically used to access Microsoft Exchange mailboxes?
SMTP
IMAP
MAPI
HTTPS
MAPI
What is the purpose of using a tel: URI scheme in SIP systems?
To encrypt voice communications
To compress audio data for transmission
To dial a landline or cell phone
To assign unique identifiers to devices
To dial a landline or cell phone
Which of the following is a unique identifier used by SIP endpoints?
MAC address
SIP URI
IP address
DNS name
SIP URI