IT&C 247 Final

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/47

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:28 PM on 3/21/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

48 Terms

1
New cards
2
New cards
3
New cards
4
New cards
5
New cards
Which of the following devices is used to physically connect computers in the same VLAN?
A switch
6
New cards
How many bits are allocated to the host identifier in an IPv4 address on a 10.61.0.0/19 network?
13
7
New cards
Which TCP/IP parameter specifies the IP address of a router that provides access to other networks?
Default Gateway
8
New cards
What is the default subnet mask for an IPv4 Class A network?
255.0.0.0
9
New cards
What is the most accurate description of the subnetting process on an IPv4 network?
You borrow bits from the host identifier to create a subnet identifier
10
New cards
What term describes the ability to create subnets using any number of bits in CIDR?
VLSM
11
New cards
The gateway IP address is assigned to which physical device?
Router
12
New cards
At which OSI layer do MAC addresses operate?
Data link layer
13
New cards
Which protocol is NOT typically used to secure communication between web servers and browsers?
SSH
14
New cards
Which protocol uses a sliding window technique for flow control?
TCP
15
New cards
Which FTP variant is used to download boot image files during PXE startup?
TFTP
16
New cards
OSPF routers calculate route cost based on what specification?
Transmission speed
17
New cards
Which statement about BGP is NOT true?
BGP is a link state routing protocol
18
New cards
Which protocol is NOT used for remote control of computers?
TFTP
19
New cards
Which routing protocol uses Dijkstra’s algorithm?
OSPF
20
New cards
How is SSH an improvement over Telnet?
SSH encrypts passwords and data
21
New cards
Which routing protocol works well with different network speeds where hop count is inaccurate?
EIGRP
22
New cards
Which protocol measures route efficiency by hop count?
RIP
23
New cards
What is the native file sharing protocol for Windows?
SMB
24
New cards
What type of routing protocol relies on hop counts?
Distance vector protocol
25
New cards
What is the maximum number of routes in a RIP broadcast packet?
25
26
New cards
How do users exchange secure messages using symmetric encryption?
Use a shared secret key for encryption and decryption
27
New cards
Which statement about routers is true?
Routers are Network layer devices that use IP addresses to forward frames
28
New cards
On which devices should you disable unused ports for security?
Switches
29
New cards
Which statement about switches and routers is true?
Routers operate at the Network layer, whereas switches operate at the Data link layer
30
New cards
Which statement about VLANs is true?
A VLAN creates a limited broadcast domain on a switched network
31
New cards
Which device can create VLANs and route between them?
Multilayer switch
32
New cards
What problem is STP designed to prevent?
Broadcast storms
33
New cards
What is true about content filtering in firewalls?
Content filters examine packet data for objectionable material
34
New cards
What is a zero-day vulnerability?
A vulnerability with no fix yet developed
35
New cards
Honeypots and honeynets are what type of security measure?
Mitigation techniques
36
New cards
What is a honeypot?
A decoy system used to attract attackers
37
New cards
Which device can be implemented as software in an OS?
Firewall
38
New cards
How do account lockouts prevent password attacks?
By limiting incorrect login attempts
39
New cards
Identification badges and key fobs are what type of security?
Physical security
40
New cards
What defines a complex password?
Mixed uppercase, lowercase, numbers, and symbols
41
New cards
Which is NOT a server hardening policy?
Upgrading firmware
42
New cards
What best describes ransomware?
A system is locked until a fee is paid
43
New cards
Account lockout policies protect against what attack?
Brute force
44
New cards
What is the function of a firewall?
Restricts incoming and outgoing network traffic
45
New cards
Which CIA triad element prevents unauthorized data modification?
Integrity
46
New cards
What service do ACLs provide?
Authorization
47
New cards
Which protocol resolves names to IP addresses?
DNS
48
New cards
Which command displays a router’s configuration?
show config

Explore top flashcards

flashcards
Microscopic examination CASTS
34
Updated 657d ago
0.0(0)
flashcards
Zoology Exam 1
145
Updated 45d ago
0.0(0)
flashcards
Med Micro Case Studies
76
Updated 1196d ago
0.0(0)
flashcards
Y2 U1L1 Vamos a acampar
55
Updated 915d ago
0.0(0)
flashcards
Modern World History Midterm
51
Updated 205d ago
0.0(0)
flashcards
World History Exam
232
Updated 1033d ago
0.0(0)
flashcards
Concept of Globalization
22
Updated 1141d ago
0.0(0)
flashcards
Microscopic examination CASTS
34
Updated 657d ago
0.0(0)
flashcards
Zoology Exam 1
145
Updated 45d ago
0.0(0)
flashcards
Med Micro Case Studies
76
Updated 1196d ago
0.0(0)
flashcards
Y2 U1L1 Vamos a acampar
55
Updated 915d ago
0.0(0)
flashcards
Modern World History Midterm
51
Updated 205d ago
0.0(0)
flashcards
World History Exam
232
Updated 1033d ago
0.0(0)
flashcards
Concept of Globalization
22
Updated 1141d ago
0.0(0)