IT Quiz Bowl - Networking

5.0(1)
studied byStudied by 143 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/98

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

99 Terms

1
New cards

You have implemented a network where hosts are assigned specific roles, such as file sharing and printing roles. Other hosts access those resources, but do not host services of their own. What type of network do you have?

Client Server

2
New cards

You have a small network that uses a switch to connect to multiple devices. Which physical topology are you using?

Star

3
New cards

Which OSI model layer is responsible for guaranteeing reliable message delivery?

Transport

4
New cards

Which of the following protocols stores email on the mail server and allows users to access messages from various client device without having to download the emails?

IMAP4

5
New cards

Which of the following connectors is used with Ethernet 100BaseT networks?

RJ45

6
New cards

You have just signed up for a broadband home internet service that uses coaxial cable. Which connector type will you most likely use?

F-Type

7
New cards

Which type of optical fiber is normally used to connect two buildings that are several kilometers apart?

Single-Mode

8
New cards

You are building network cables and attaching RJ45 connectors to each end. Which tool do you need for this task?

Crimping tool

9
New cards

You want to measure the voltage, amps, and ohms, of various device. Which tool should you use?

Multimeter

10
New cards

Which device sends signals from a computer onto a network?

Transceiver

11
New cards

At which OSI layer does a router operate to forward network messages?

Network

12
New cards

Your company purchases a new bridge that filters packets based on the MAC address of the destination computer. On which layer of the OSI model is this device functioning.

Data Link

13
New cards

At which layer of the OSI model do hubs operate

Physical

14
New cards

Which of the following hardware devices links multiple networks and directs traffic between networks?

Router

15
New cards

The media access control method of all Ethernet networks is

CSMA/CD

16
New cards

Ethernet 100BaseFx networks use what type of cabling

Fiber Optic

17
New cards

You need to connect two switches using their uplink ports. The switches do not support auto-MDI. What type of cable should you use?

Crossover

18
New cards

Angela is the network administrator for a rapidly growing company with a 100BaseT network. Users have recently complained about slow file transfers. While checking network traffic. Angela discovers a high number of collisions. Which connectivity device would best reduce the number of collisions and allow future growth.

Switch

19
New cards

Which of the following is the last IP address that can be assigned to hosts on the 166.70.0.0 network

166.70.255.254

20
New cards

Which of the following IP ranges is reserved for automatic private IP addressing

169.254.255.254

21
New cards

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values. Which device should you use?

DHCP server

22
New cards

You have a Windows Server 2016 system that you want to use as a DHCP relay agent. Which Windows Server 2016 service would you use to do this?

Routing and Remote Access

23
New cards

You want to implement a protocol on your network that allows computer to find the IP address of a host from a logical name. Which protocol should you implement?

DNS

24
New cards

You manage a network that uses IPv6 addressing. When clients connect devices to the network, they generate an interface ID and use NDP to learn the subnet prefix and default gateway. Which IPv6 address assignment is being used?

Stateless autoconfiguration

25
New cards

Which type of IP address is 232.111.255.250

Multicast

26
New cards

You work in an office that uses Linux servers and Windows servers. The network uses the TCP/IP protocol. You are sitting at a workstation that uses Windows 10. An application you are using is unable to contact a Windows server named FileSrv2. Which command can you use to determine whether your computer can still contact the server?

ping

27
New cards

Mary calls to tell you that she can't connect to an intranet server called WebSrv1. From her computer, you ping the Server's IP address. The ping test is successful. Which tool would you use on her workstation next to troubleshoot the problem?

nslookup

28
New cards

What does the ip address dhcp command allow you to do to?

Configure the switch to obtain an IP address from a DHCP server

29
New cards

A switch receives a frame addressed to the MAC address FF:FF:FF:FF:FF. What will the switch do with the frame?

Send it out to all ports except the port it was received on.

30
New cards

You can create a virtual LAN using which of the following?

Switch

31
New cards

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches.

Trunking

32
New cards

You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature prevents switching loops and ensures there is only a single active path between any two switches?

Spanning Tree

33
New cards

You manage a network with a single switch, On each switch port, a hub connects multiple devices to the switch. Which conditions are you most likely to experience on the network?

Collisions

34
New cards

When multiple routes to a destination exist, what is used to select the best possible route?

Metric

35
New cards

Which of the following routing protocols uses relative link cost as the metric?

OSPF

36
New cards

Which of the following techniques allows incoming traffic addressed to a specific port to move through a NAT router and be forwarded to a specific host?

Port forwarding

37
New cards

Which of the following utilities would you use to view the routing table?

route

38
New cards

You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?

Circuit-level

39
New cards

An all-in-one security appliance is best suited for which type of implementation?

A remote office with no on-site technician

40
New cards

Which firewall implementation creates a buffer network that can be used to host email or web servers?

DMZ

41
New cards

You want to maintain tight security on your internal network, so you restrict the access to the network through certain port numbers. If you wan to allow users to continue using DNS, which port should you enable?

53

42
New cards

In a SAN implementation, the servers that connect to shared storage devices are called

initiators

43
New cards

Which VoIP device helps establish the connection between two VoIP phones?

VoIP server

44
New cards

Which of the following protocols is used by VoIP to set up, maintain, and terminate a phone call?

SIP

45
New cards

Which type of virtualization completely simulates a real physical host.

Full virtualization

46
New cards

Which component is most likely to allow physical and virtual machines to communicate with each other?

Virtual switch

47
New cards

What key advantage does a virtual router have over a physical router?

Multiple networks can be connected to a single interface.

48
New cards

Which of the following cloud computing solutions will deliver software applications to client over the internet over the internet or on a local are network?

SaaS

49
New cards

An access point that conforms to the IEEE 802.11b standard behaves similarly to what other networking devices?

Hub

50
New cards

Which wireless networking component is used to connect multiple APs together?

DS

51
New cards

All of the 802.11 standards for wireless networking support which type of communication path sharing technology?

CSMA/CA

52
New cards

What is the frequency of 802.11a networking?

5.75GHz

53
New cards

How many total channels are available for 802.11a wireless networks

23

54
New cards

How many total channels are available for 802.11g networks

11

55
New cards

Which IEEE standard describes wireless communication

802.11b

56
New cards

Which data transmission rate is defined by the IEEE 802.11b wireless standard

11 Mbps

57
New cards

You are an administrator of a growing network. You notice the network you have created is broadcasting, but you cannot ping systems on different segments of your network. What device should you use?

Network bridge

58
New cards

Which protocol is well known for its use in the home security and home automation industry, uses a mesh technology, makes devices act as repeaters, and has a low data transfer rate?

Z-Wave

59
New cards

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

60
New cards

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

On a RADIUS server

61
New cards

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

62
New cards

What is the speed of an OC-3 connection?

155 Mbps

63
New cards

To access the internet through the PSTN, what kind of connectivity device must you use?

Modem

64
New cards

Your client has acquired several small companies and would like to connect them together into one network. Not all of the router are Cisco devices, and compatibility is a concern. Which WAN encapsulation method should you recommend your client use?

PPP

65
New cards

A healthcare organization provides mobile clinics throughout the world. Which network technology should you select to transfer patient statistical data to a central database via the internet to ensure network connectivity for any clinic located anywhere in the world, even remote areas?

Satellite

66
New cards

You are moving to an area where DSL will be available in the next six months. Which method of internet connectivity should you implement until DSL is available if your existing connectivity needs are minimal

PSTN

67
New cards

Which type of internet servicer uses the DOCSIS specification

Cable internet service providers

68
New cards

You are configuring your computer to dial up to the internet. What protocol should you use

PPP

69
New cards

Which type of device is required to implement port authentication through a switch

RADIUS server

70
New cards

You are concerned about the amount of traffic that passed through a router on your network. You want to see how the amount of traffic has changed over time. Which document would help you identify past average network traffic

Baseline

71
New cards

Which type of documentation would you consult to find the location of Rj45 wall jacks and their endpoints in the intermediate distribution closet

Wiring schematic

72
New cards

You need to find out what kind of laws might apply to the design and operation of your network. Which type of document would you consult?

Regulation

73
New cards

When troubleshooting a router, you want to identify which other devices are connected to the router, as well as the subnet addresses of each connected subnet. Which type of document would most likely have this information?

Network diagram

74
New cards

You want to make sure that the correct ports on a firewall are open or closed which document should you check?

Configuration documentation

75
New cards

What is the greatest threat to theft of data in most organizations?

USB devices

76
New cards

If an organization shows sufficient due care, which burden is eliminated in the event of a security breach?

Negiligence

77
New cards

Purchasing insurance is what type of response to risk?

Transference

78
New cards

Your company has developed and implemented countermeasures for the greatest risks to their assets. However, there is still some risk left. What is the remaining risk called?

Residual Risk

79
New cards

In business continuity planning, what is the primary focus of the scope.

Business process

80
New cards

When analyzing assets, which analysis method assigns financial values to assets?

Quantitative

81
New cards

You plane to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?

Change management

82
New cards

You want to use CCTV to increase the physical security. You want to be able to remotely control the camera position. Which camera type should you choose?

PTZ

83
New cards

What is the primary countermeasure to social engineering?

Awareness

84
New cards

A senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. The email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. Which type of an attack best describes the scenario?

Whaling

85
New cards

An attacker sets up 100 drones that flood a DNS server with invalid requests. This is an example of what type of attack?

DDoS

86
New cards

When you browse to a website, a pop-up window tells you that your computer has been infected with a virus. You click on the window to see what the problem is. Later, you find out that the window has installed spyware on your system. What type of attack has occurred?

Drive-by download

87
New cards

You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?

EAP

88
New cards

Which protocol does HTTPS use to offer greater security in web transactions?

SSL

89
New cards

A group of salesmen in your organization would like to access your private network through the internet while they are traveling. You want to control access to the private network through a single server.

Which solution should you implement?

VPN concentrator

90
New cards

Which exploit seeks to maliciously re-associate the IP address of a legitimate network host with the MAC address of the attacker's computer?

ARP poisoning

91
New cards

As the victim of a Smurf attack, what protection measure is the most effective during the attack?

Communicating with your upstream provider

92
New cards

What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?

IDS

93
New cards

What is the primary purpose of penetration testing?

Test the effectiveness of your security perimeter

94
New cards

Which type of security uses MAC addresses to identify devices that are allowed or denied a connection to a switch?

Port security

95
New cards

In addition to performing regular backups, what must you do protect your system from data loss?

Regularly test restoration procedures

96
New cards

You are considering using WIFI triangulation to track the location of wireless devices within your organization. However, you have read on the internet that this type of tracking can produce inaccurate results.

What is the most important consideration for getting reliable results when implementing this type of system?

Signal strength

97
New cards

You are concerned about attacks directed against the firewall on your network. You would like to examine the content of individual frames sent to the network.

Which tool should you use?

Packet sniffer

98
New cards

Which protocol uses traps to send notifications from network devices?

SNMP

99
New cards

Which type of switch optimizes network performance by using ASIC to perform switching at wire speed?

Multilayer switch