Net + Practice Tests

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/554

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

555 Terms

1
New cards

In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.

False

2
New cards

In the OSI model, the Layer 4 TCP protocol data unit is referred to as:

Segment

3
New cards

Which of the answers listed below refers to the Physical Layer of the OSI model?

Layer 1

4
New cards

Layer 7 of the OSI model is also known as:

Application Layer

5
New cards

At which OSI layers is the protocol data unit referred to simply as data?

Application Layer, Presentation Layer, and Session Layer

6
New cards

Which of the following answers refers to Layer 5 of the OSI model?

Session Layer

7
New cards

What is the name of Layer 3 in the OSI model?

Network Layer

8
New cards

Which of the answers listed below refers to Layer 4 of the OSI model?

Transport Layer

9
New cards

Which of the following answers describe the characteristics of a router?

  • Connects multiple networks together

  • Operates at Layer 3 of the OSI model

  • Uses IP addresses to send data packets to their destination

10
New cards

Which of the answers listed below refer to a network switch?

  • Connects multiple devices within a single network

  • Uses MAC addresses to forward data frames to the correct port

  • Operates at Layer 2 of the OSI model

11
New cards

Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Firewall

12
New cards

Which of the answers listed below illustrates the difference between passive and active network security breach response?

IDS vs. IPS

13
New cards

Which of the following answers can be used to describe the characteristic features of an IDS?

  • Does not take direct action to block or prevent attacks

  • Generates alerts and notifies security personnel when suspicious activity is detected

  • Monitors network traffic without direct involvement in traffic routing or packet modification

14
New cards

Which of the answers listed below refer to an IPS?

  • Takes proactive measures to block or mitigate intrusion attempts

  • Operates in an inline mode, actively intercepting and inspecting network traffic

  • Can drop or reject network packets, terminate connections, or take other actions to stop the attack

15
New cards

A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:

Load Balancer

16
New cards

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

17
New cards

A dedicated storage appliance that can be added to a local network is known as:

NAS (Network Attached Storage)

18
New cards

A dedicated local network consisting of devices providing data access is called:

SAN (Storage Area Network)

19
New cards

A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.

True

20
New cards

Which network infrastructure device enables centralized management of WAPs?

Wireless LAN Controller (WLC)

21
New cards

One of the key benefits provided by a CDN is the improvement of:

Content load times

22
New cards

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

VPN (Virtual Private Network)

23
New cards

Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?

QoS (Quality of Service)

24
New cards

A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:

TTL (Time to Live)

25
New cards

Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?

NFV (Network Functions Virtualization)

26
New cards

Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?

VPC (virtual private cloud)

27
New cards

Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?

  • Provides firewall-like capabilities

  • Applies security rules to specific virtual NICs (more granular control)

  • Used for controlling inbound and outbound traffic in cloud computing environments

28
New cards

Which of the following answers refer to the characteristics of a Network Security List (NSL)

  • Provides firewall-like capabilities

  • Applies security rules at the subnet level (less granular control)

  • Used for controlling inbound and outbound traffic in cloud computing environments

29
New cards

A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:

Internet Gateway

30
New cards

Which of the statements listed below describe the functions of a cloud gateway using NAT?

  • Enables instances within a VPC to access external networks

  • Translates private IP addresses to a public IP address

  • Restricts inbound connections from external networks

31
New cards

Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?

VPN (Virtual Private Network)

32
New cards

Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?

Direct Connect

33
New cards

Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?

Public Cloud

34
New cards

A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:

Private Cloud

35
New cards

A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.

True

36
New cards

A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:

SaaS (Software as a Service)

37
New cards

Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?

IaaS (Infrastructure as a Service)

38
New cards

Which cloud computing service model would provide the best solution for a web developer intending to create a web app?

PaaS (Platform as a Service)

39
New cards

Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?

Scalability

40
New cards

Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?

Rapid elasticity

41
New cards

Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?

Multitenancy

42
New cards

What is the function of FTP?

File exchange

43
New cards

Which of the answers listed below refers to a network protocol for secure file transfer over SSH?

SFTP (Secure File Transfer Protocol)

44
New cards

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:

SSH (Secure Shell)

45
New cards

What are three key characteristics of Telnet?

  • Provides username & password authentication

  • Transmits data in an unencrypted form

  • Enables remote login and command execution

46
New cards

Which of the following answers refers to a secure replacement for Telnet?

SSH ( Secure Shell)

47
New cards

The SMTP protocol is used for:

  • Sending email messages between mail servers

  • Sending email messages from a client device

48
New cards

Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

DNS (Domain Name System)

49
New cards

Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?

DHCP (Dynamic Host Configuration Protocol)

50
New cards

What are the characteristic features of TFTP?

  • Provides no security features

  • A very basic form of file-sharing protocol

51
New cards

Which network protocol enables retrieving contents of an Internet page from a web server?

HTTP

52
New cards

Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?

NTP

53
New cards

A type of protocol used in network management systems for monitoring network-attached devices is known as:

SNMP (Simple Network Management Protocol)

54
New cards

LDAP is an example of:

Directory access protocol

55
New cards

What is the name of a network protocol that secures web traffic via SSL/TLS encryption?

HTTPS

56
New cards

SMB is a protocol used for:

File and printer sharing between devices on a network

57
New cards

Which of the following answers refers to a network protocol used for sending and receiving log or event messages in a network?

Syslog

58
New cards

Which of the answers listed below refers to a deprecated protocol that was designed as a secure way to send emails from a client to a mail server and between mail servers?

SMTPS

59
New cards

Which of the following answers refers to a directory access protocol that uses SSL/TLS for secure communication?

LDAPS

60
New cards

Which of the answers listed below best describes the function of SQL Server?

Database management system

61
New cards

Which of the following answers refers to a Microsoft-proprietary protocol that provides a graphical interface for connecting to and controlling another networked host?

RDP

62
New cards

Which of the answers listed below refers to a network protocol used to establish, manage, and terminate multimedia communication sessions, such as voice calls, video calls, and instant messaging?

SIP

63
New cards

Which port enables the FTP data connection for transferring file data?

TCP port 20

64
New cards

The FTP control connection to administer a session is established through:

TCP port 21

65
New cards

The SSH protocol runs on:

TCP port 22

66
New cards

Unblocking TCP port 22 enables which type(s) of traffic?

SSH & SFTP (Secure Shell and Secure File Transfer Protocol)

67
New cards

SFTP is an extension of SSH and runs by default on TCP port 22.

True

68
New cards

Which of the following TCP ports is used by the Telnet protocol?

23

69
New cards

TCP port 25 is used by:

SMTP (Simple Mail Transfer Protocol)

70
New cards

Which of the TCP/UDP ports listed below is assigned to DNS?

53

71
New cards

A DHCP server runs on UDP port:

67

72
New cards

Which of the following UDP ports is used by a DHCP client?

68

73
New cards

UDP port 69 is assigned to:

TFTP (Trivial File Transfer Protocol)

74
New cards

Which protocol uses TCP port 80?

HTTP

75
New cards

Which of the UDP ports listed below is used by NTP?

123

76
New cards

An SNMP agent receives requests on UDP port:

161

77
New cards

An SNMP management station receives SNMP notifications from agents on UDP port:

162

78
New cards

TCP port 389 is the default network port for:

LDAP (Lightweight Directory Access Protocol)

79
New cards

Which of the following TCP ports is used by HTTPS?

443

80
New cards

TCP port 445 is assigned to:

SMB (Server Message Block)

81
New cards

The Syslog protocol runs on UDP port:

514

82
New cards

Which TCP port is used by the SMTP protocol for secure email transmission over TLS?

587

83
New cards

A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the TCP ports listed below needs to be opened to implement this change?

636

84
New cards

Which of the following services runs on TCP port 1433?

SQL Server

85
New cards

A network technician uses an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which TCP port needs to be opened for the built-in Windows RDP server to allow this type of network connection?

3389

86
New cards

Which of the TCP/UDP ports listed below is used for non-encrypted SIP traffic?

5060

87
New cards

Which TCP port is used by SIP over TLS?

5061

88
New cards

Which of the following protocols is used by network devices to send error messages and operational information, enabling administrators to diagnose and troubleshoot issues with IP packet delivery?

ICPM (Internet Control Message Protocol)

89
New cards

UDP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required for establishing a network connection. UDP supports error checking, flow control (managing the amount of data that is being sent), sequencing (rearranging packets that arrived out of order), and retransmission of lost packets. Example applications of UDP include the transmission of text and image data.

False

90
New cards

TCP is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. Example applications of TCP include the transmission of video and audio streaming data.

False

91
New cards

Which of the answers listed below does not refer to GRE?

Provides authentication, encryption, and data integrity

92
New cards

Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?

AH

93
New cards

Which of the following answers refers to an IPsec component that provides (among other security features) data confidentiality?

ESP

94
New cards

Which of the answers listed below refers to a protocol within the IPsec protocol suite used to set up secure connections and exchange cryptographic keys?

IKE (Internet Key Exchange)

95
New cards

A type of network traffic intended for a single host identified by a unique IP address is called:

Unicast

96
New cards

A type of network traffic sent from one sender to a particular group of receivers is referred to as:

Multicast

97
New cards

Which of the following answers describes network traffic sent from one sender to the nearest or best receiver among a group of potential receivers?

Anycast

98
New cards

Which of the answers listed below refers to a one-to-all communication type where data is sent from one sender to all possible receivers within a network segment?

Broadcast

99
New cards

Which of the following answers refer(s) to the IEEE 802.11a standard?

5 GHz frequency band, Maximum speed: 54 Mbps

100
New cards

Characteristic features of the IEEE 802.11b standard include:

2.4 GHz frequency band, Maximum speed: 11 Mbps