Computer Networking Chapter 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Which layer's diagram would show asset IDs, cable links, and wall/patch panel/switch port IDs?

Data Link (Layer 2)

Application

Logical (IP/Layer 3)

PHY (Physical layer)

PHY (Physical layer)

2
New cards

What is the standard method of sanitizing an HDD?

Overwriting

Degaussing

Shredding

Incineration

Overwriting

3
New cards

What historical method might IT departments have used for tracking IP usage?

Physical logbooks

Static files

Oral tradition

Cloud-based databases

Static files

4
New cards

Which of the following is the BEST approach when a configuration has drifted from its baseline?

Always revert to the golden configuration.

Update the baseline template without testing.

Perform testing to determine whether to revert.

Ignore the drift as it is usually insignificant.

Perform testing to determine whether to revert.

5
New cards

Why should configuration changes only be made with a service request ticket?

To ensure that the activity of network personnel is recorded

To increase the speed of changes

To bypass the approval process

To eliminate the need for documentation

To ensure that the activity of network personnel is recorded

6
New cards

What is the purpose of a rack diagram?

To record the position of each appliance in the rack

To map out the logical flow of data within the network

To track software versions installed on network devices

To document the physical location of employees within an office

To record the position of each appliance in the rack

7
New cards

Why is it important to stay up to date with system security advisories?

To stay informed about vulnerabilities

To monitor the stock market for technology companies

To ensure compliance with IT audit standards

To keep track of new IT products

To stay informed about vulnerabilities

8
New cards

Why is it important to track software license usage in an asset inventory?

To monitor employee internet usage

To track the company's profit margins

To ensure compliance with the vendor's licensing agreement

To evaluate the company's branding strategies

To ensure compliance with the vendor's licensing agreement

9
New cards

What is a configuration backup used for when applying an update?

To serve as a fallback

To reduce the time required for the update

To enhance the performance of the update

To comply with software licensing agreements

To serve as a fallback

10
New cards

What is referred to as configuration drift?

The act of backing up a CI's configuration

The process of updating a CI's baseline

The initial setup of a CI's configuration

The deviation of a CI from its baseline

The deviation of a CI from its baseline

11
New cards

What role does a Change Advisory Board (CAB) play in change management?

It documents the need for change.

It approves major or significant changes.

It implements the changes directly.

It creates the Request for Change (RFC) documents

It approves major or significant changes.

12
New cards

What does the Secure Erase (SE) command do on HDDs?

Encrypts all data on the drive

Marks all blocks as empty

Performs a single pass of zero-filling

Physically destroys the drive

Performs a single pass of zero-filling

13
New cards

Which backup mode creates a snapshot-type image of the whole system?

Configuration file

Incremental backup

Differential backup

State/bare metal

State/bare metal

14
New cards

What is the primary purpose of using physical network diagrams?

To capture the complex relationships between network elements

To document the physical location of employees

To track software installations on network devices

To monitor real-time network traffic

To capture the complex relationships between network elements

15
New cards

Which agreement is most likely to be used between two companies to protect shared sensitive information?

Employment Contract

Memorandum of Understanding (MOU)

Service Level Agreement (SLA)

Non-Disclosure Agreement (NDA)

Non-Disclosure Agreement (NDA)

16
New cards

What is the primary function of an availability monitor?

To increase the speed of a service

To manage network bandwidth

To trigger an alarm for service unscheduled downtime

To update digital certificates

To trigger an alarm for service unscheduled downtime

17
New cards

What does an IP scanner do?

Encrypts network traffic

Creates spreadsheets

Establishes the logical topology of the network

Edits images

Establishes the logical topology of the network

18
New cards

What metric measures the actual amount of data transferred over a network?

Memory usage

Throughput

Bandwidth

CPU utilization

Throughput

19
New cards

Which Nmap scan type is less stealthy due to its use of the operating system to attempt a full TCP connection?

Port range (-p)

UDP scans (-sU)

TCP SYN (-sS)

TCP connect (-sT)

TCP connect (-sT)

20
New cards

What is the purpose of using the -sV or -A switch with Nmap?

To limit the scan to the local network only

To increase the speed of the scan

To disable logging of the scan results

To probe for software versions on each port

To probe for software versions on each port

21
New cards

Which type of scanners use specially crafted probes to locate hosts that might be configured not to respond to pings?

Graphic design software

Security-oriented scanners

Email management systems

Spreadsheet analysis tools

Security-oriented scanners

22
New cards

What does an availability monitor check for in an HTTP service to confirm availability?

A 302 status code

A 404 status code

A 200 status code

A 500 status code

A 200 status code

23
New cards

What does Nmap use to determine whether a host is present when used without switches?

It sends an email to the network administrator.

It pings and sends a TCP ACK packet to ports 80 and 443.

It performs a full database scan.

It listens for any active Bluetooth devices.

It pings and sends a TCP ACK packet to ports 80 and 443.

24
New cards

Which of the following is NOT information that CDP can report?

MAC address table sizes

Power over Ethernet usage

Device ID/hostname

IOS version

MAC address table sizes

25
New cards

What is a basic type of IP scanning mentioned in the document?

Email filtering

Color correction

Spreadsheet analysis

Host discovery

Host discovery

26
New cards

Which feature allows Nmap to work out hop counts?

-sn switch

--script switch

--traceroute switch

-p switch

--traceroute switch

27
New cards

What should you consider doing if a server hosting a service is overloaded?

Throttle client connections.

Decrease the server's memory.

Increase network congestion.

Disable the Spanning Tree Protocol (STP).

Throttle client connections.

28
New cards

What does a configuration monitor do when there is a change to a device's production configuration?

It generates logs, alerts, or alarms.

It updates the baseline configuration.

It disconnects the device from the network.

It automatically reverts the change.

It generates logs, alerts, or alarms.

29
New cards

What is the primary function of Cisco Discovery Protocol (CDP)?

To provide a secure tunnel for data transmission

To assign IP addresses to devices on a network

To encrypt data traffic between Cisco devices

To discover information about directly connected Cisco devices

To discover information about directly connected Cisco devices

30
New cards

What can cause a broadcast storm in a network?

Low CPU utilization

Switching loops

Insufficient storage space on network devices

High bandwidth availability

Switching loops

31
New cards

What is the purpose of a community string in SNMP?

To identify the network topology

To increase network speed

To encrypt data packets

To serve as a type of password

To serve as a type of password

32
New cards

What is a major security weakness of SNMP v2c?

It supports too many users.

It uses strong encryption by default.

It sends community strings in plaintext.

It restricts management operations to known hosts.

It sends community strings in plaintext.

33
New cards

What mode in SNMPv3 does not encrypt packets but requires authentication?

authPriv

privAuth

noAuthNoPriv

authNoPriv

authNoPriv

34
New cards

An organization is using the Simple Network Management Protocol (SNMP) for remote management and monitoring of servers and network appliances and must deploy an agent to each device.

Where are the statistics relating to the activity of each device kept?

Get

OID

Trap

MIB

MIB

35
New cards

Which version of SNMP supports encryption and strong user-based authentication?

SNMP v2c

SNMP v4

SNMP v1

SNMP v3

SNMP v3