1/554
Practice Exam Questions: 1-23 & Exam Topic
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.
False
In the OSI model, the Layer 4 TCP protocol data unit is referred to as:
Segment
Which of the answers listed below refers to the Physical Layer of the OSI model?
Layer 1
Layer 7 of the OSI model is also known as:
Application Layer
At which OSI layers is the protocol data unit referred to simply as data?
Application Layer, Presentation Layer, and Session Layer
Which of the following answers refers to Layer 5 of the OSI model?
Session Layer
What is the name of Layer 3 in the OSI model?
Network Layer
Which of the answers listed below refers to Layer 4 of the OSI model?
Transport Layer
Which of the following answers describe the characteristics of a router?
Connects multiple networks together
Operates at Layer 3 of the OSI model
Uses IP addresses to send data packets to their destination
Which of the answers listed below refer to a network switch?
Connects multiple devices within a single network
Uses MAC addresses to forward data frames to the correct port
Operates at Layer 2 of the OSI model
Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?
Firewall
Which of the answers listed below illustrates the difference between passive and active network security breach response?
IDS vs. IPS
Which of the following answers can be used to describe the characteristic features of an IDS?
Does not take direct action to block or prevent attacks
Generates alerts and notifies security personnel when suspicious activity is detected
Monitors network traffic without direct involvement in traffic routing or packet modification
Which of the answers listed below refer to an IPS?
Takes proactive measures to block or mitigate intrusion attempts
Operates in an inline mode, actively intercepting and inspecting network traffic
Can drop or reject network packets, terminate connections, or take other actions to stop the attack
A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:
Load Balancer
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Proxy
A dedicated storage appliance that can be added to a local network is known as:
NAS (Network Attached Storage)
A dedicated local network consisting of devices providing data access is called:
SAN (Storage Area Network)
A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.
True
Which network infrastructure device enables centralized management of WAPs?
Wireless LAN Controller (WLC)
One of the key benefits provided by a CDN is the improvement of:
Content load times
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:
VPN (Virtual Private Network)
Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?
QoS (Quality of Service)
A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:
TTL (Time to Live)
Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?
NFV (Network Functions Virtualization)
Which of the following terms can be used to describe an isolated network area hosted within a public cloud environment?
VPC (virtual private cloud)
Which of the answers listed below can be used to describe the concept of a Network Security Group (NSG)?
Provides firewall-like capabilities
Applies security rules to specific virtual NICs (more granular control)
Used for controlling inbound and outbound traffic in cloud computing environments
Which of the following answers refer to the characteristics of a Network Security List (NSL)
Provides firewall-like capabilities
Applies security rules at the subnet level (less granular control)
Used for controlling inbound and outbound traffic in cloud computing environments
A type of network gateway that allows instances within a cloud environment to send and receive unencrypted traffic to and from the Internet is called:
Internet Gateway
Which of the statements listed below describe the functions of a cloud gateway using NAT?
Enables instances within a VPC to access external networks
Translates private IP addresses to a public IP address
Restricts inbound connections from external networks
Which network connectivity option enables a secure, encrypted Internet connection between an on-premises network and cloud resources?
VPN (Virtual Private Network)
Which cloud connectivity option provides a dedicated, private connection between an on-premises network and a cloud provider?
Direct Connect
Which of the following answers refers to a cloud deployment model where computing resources (such as servers, storage, and applications) are owned and operated by a third-party cloud service provider and shared across multiple organizations or tenants?
Public Cloud
A type of cloud deployment model where cloud resources are used exclusively by a single organization is referred to as:
Private Cloud
A hybrid cloud is a cloud computing environment that combines elements of both public and private clouds.
True
A cloud computing service model that provides remote access to software applications based on a subscription fee is known as:
SaaS (Software as a Service)
Which of the answers listed below refers to a cloud computing service model where clients, instead of buying hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and software?
IaaS (Infrastructure as a Service)
Which cloud computing service model would provide the best solution for a web developer intending to create a web app?
PaaS (Platform as a Service)
Which of the following terms refers to the ability of a system to handle increased load by gradually adding resources, such as additional servers or storage, in a planned and deliberate manner over time?
Scalability
Which of the terms listed below refers to the automatic and dynamic adjustment of resources based on real-time demand changes?
Rapid elasticity
Which of the following terms refers to a software architecture where multiple users, each with their own isolated environment and resources, are served by a single application instance?
Multitenancy
What is the function of FTP?
File exchange
Which of the answers listed below refers to a network protocol for secure file transfer over SSH?
SFTP (Secure File Transfer Protocol)
A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is called:
SSH (Secure Shell)
What are three key characteristics of Telnet?
Provides username & password authentication
Transmits data in an unencrypted form
Enables remote login and command execution
Which of the following answers refers to a secure replacement for Telnet?
SSH ( Secure Shell)
The SMTP protocol is used for:
Sending email messages between mail servers
Sending email messages from a client device
Which of the answers listed below refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
DNS (Domain Name System)
Which of the following network protocols provides an alternative solution to the manual allocation of IP addresses?
DHCP (Dynamic Host Configuration Protocol)
What are the characteristic features of TFTP?
Provides no security features
A very basic form of file-sharing protocol
Which network protocol enables retrieving contents of an Internet page from a web server?
HTTP
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network?
NTP
A type of protocol used in network management systems for monitoring network-attached devices is known as:
SNMP (Simple Network Management Protocol)
LDAP is an example of:
Directory access protocol
What is the name of a network protocol that secures web traffic via SSL/TLS encryption?
HTTPS
SMB is a protocol used for:
File and printer sharing between devices on a network
Which of the following answers refers to a network protocol used for sending and receiving log or event messages in a network?
Syslog
Which of the answers listed below refers to a deprecated protocol that was designed as a secure way to send emails from a client to a mail server and between mail servers?
SMTPS
Which of the following answers refers to a directory access protocol that uses SSL/TLS for secure communication?
LDAPS
Which of the answers listed below best describes the function of SQL Server?
Database management system
Which of the following answers refers to a Microsoft-proprietary protocol that provides a graphical interface for connecting to and controlling another networked host?
RDP
Which of the answers listed below refers to a network protocol used to establish, manage, and terminate multimedia communication sessions, such as voice calls, video calls, and instant messaging?
SIP
Which port enables the FTP data connection for transferring file data?
TCP port 20
The FTP control connection to administer a session is established through:
TCP port 21
The SSH protocol runs on:
TCP port 22
Unblocking TCP port 22 enables which type(s) of traffic?
SSH & SFTP (Secure Shell and Secure File Transfer Protocol)
SFTP is an extension of SSH and runs by default on TCP port 22.
True
Which of the following TCP ports is used by the Telnet protocol?
23
TCP port 25 is used by:
SMTP (Simple Mail Transfer Protocol)
Which of the TCP/UDP ports listed below is assigned to DNS?
53
A DHCP server runs on UDP port:
67
Which of the following UDP ports is used by a DHCP client?
68
UDP port 69 is assigned to:
TFTP (Trivial File Transfer Protocol)
Which protocol uses TCP port 80?
HTTP
Which of the UDP ports listed below is used by NTP?
123
An SNMP agent receives requests on UDP port:
161
An SNMP management station receives SNMP notifications from agents on UDP port:
162
TCP port 389 is the default network port for:
LDAP (Lightweight Directory Access Protocol)
Which of the following TCP ports is used by HTTPS?
443
TCP port 445 is assigned to:
SMB (Server Message Block)
The Syslog protocol runs on UDP port:
514
Which TCP port is used by the SMTP protocol for secure email transmission over TLS?
587
A network administrator wants to secure the existing access to a directory service with SSL/TLS encryption. Which of the TCP ports listed below needs to be opened to implement this change?
636
Which of the following services runs on TCP port 1433?
SQL Server
A network technician uses an RDP client on their Windows OS to remotely troubleshoot a problem on another Windows machine. Which TCP port needs to be opened for the built-in Windows RDP server to allow this type of network connection?
3389
Which of the TCP/UDP ports listed below is used for non-encrypted SIP traffic?
5060
Which TCP port is used by SIP over TLS?
5061
Which of the following protocols is used by network devices to send error messages and operational information, enabling administrators to diagnose and troubleshoot issues with IP packet delivery?
ICPM (Internet Control Message Protocol)
UDP is a connection-oriented protocol using a three-way handshake, which is a set of initial steps required for establishing a network connection. UDP supports error checking, flow control (managing the amount of data that is being sent), sequencing (rearranging packets that arrived out of order), and retransmission of lost packets. Example applications of UDP include the transmission of text and image data.
False
TCP is an example of a connectionless protocol. Because TCP does not support a three-way handshake while establishing a network connection, it is referred to as an unreliable or best-effort protocol. Example applications of TCP include the transmission of video and audio streaming data.
False
Which of the answers listed below does not refer to GRE?
Provides authentication, encryption, and data integrity
Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?
AH
Which of the following answers refers to an IPsec component that provides (among other security features) data confidentiality?
ESP
Which of the answers listed below refers to a protocol within the IPsec protocol suite used to set up secure connections and exchange cryptographic keys?
IKE (Internet Key Exchange)
A type of network traffic intended for a single host identified by a unique IP address is called:
Unicast
A type of network traffic sent from one sender to a particular group of receivers is referred to as:
Multicast
Which of the following answers describes network traffic sent from one sender to the nearest or best receiver among a group of potential receivers?
Anycast
Which of the answers listed below refers to a one-to-all communication type where data is sent from one sender to all possible receivers within a network segment?
Broadcast
Which of the following answers refer(s) to the IEEE 802.11a standard?
5 GHz frequency band, Maximum speed: 54 Mbps
Characteristic features of the IEEE 802.11b standard include:
2.4 GHz frequency band, Maximum speed: 11 Mbps