1/273
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Subtracting an interesting octet value from 256 yields what number?
a.host ID
b.network ID
c.magic number
d.subnet ID
magic number
The LLC sublayer is primarily concerned with managing MAC addresses in message frames.
True
False
False
What is the minimum category of UTP cable required in order to support Gigabit speeds?
a.Cat 3
b.Cat 6
c.Cat 5e
d.Cat 5
Cat 5e
The use of multiple antennas on an access point to issue a signal to one or more receivers is enabled by what 802.11 innovation?
a.frame aggregation
b.spread spectrum frequency hopping
c.multiple input-multiple output (MIMO)
d.channel bonding
multiple input-multiple output (MIMO)
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
a.honeycomb
b.lurenet
c.combolure
d.honeynet
honeynet
A brownout is a momentary decrease in voltage; also known as a sag.
True
False
True
What standard describes uniform, enterprise-wide cabling systems, regardless of who manufactures or sells the various parts used in the system?
a.TIA/EIA-568
b.ITU 922
c.ISO 9001
d.IEEE 802.3
TIA/EIA-568
Which type of uninterruptible power supply uses AC power to continuously charge its battery, while also providing power to devices through the battery?
a.line conditioning UPS
b.online UPS
c.standby UPS
d.surge UPS
online UPS
The C-Band utilized by satellites consists of what frequency range?
a.2.7 - 3.5 GHz
b.12 - 18 GHz
c.1.5 - 2.7 GHz
d.3.4 - 6.7 GHz
3.4 - 6.7 GHz
Which type of backup scheme only covers data that has changed since the last backup?
a.incremental backup
b.differential backup
c.snapshot backup
d.full backup
incremental backup
Servers that have a NOS installed require less memory, processing power, and storage capacity than clients because servers are called on to handle only light processing loads and requests from multiple clients.
True
False
False
In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.
True
False
True
Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).
True
False
True
What tcpdump command can be used to filter out all traffic except SSH traffic?
a.tcpdump port 22
b.tcpdump -f +ssh
c.tcpdump only ssh
d.tcpdump -p 22
tcpdump port 22
In Open System Authentication, how does authentication occur?
a.The client sends a pre-shared key along with the access point's SSID.
b.The access point forces the client to authenticate via a captive portal, after which all communication is encrypted.
c.The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
d.The client requests an encrypted tunnel, after which, the client's MAC serves as the authentication.
The client "authenticates" using only the SSID name. In other words, no real authentication occurs.
A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.
True
False
False
You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?
a.The network is not based on the Ethernet standard.
b.The MTU for the network can be as high as 9198 bytes.
c.The MTU for the network is set at 65,535 bytes.
d.Fragmented frames will be consolidated into whole frames before being sent.
The MTU for the network can be as high as 9198 bytes.
What statement regarding the different versions of the SHA hashing algorithm is accurate?
a.SHA-0 is the most secure version of SHA.
b.SHA-1 supports a 128-bit hash function.
c.SHA-2 and SHA-3 both support the same hash lengths.
d.SHA-2 only supports a 256-bit hash.
SHA-2 and SHA-3 both support the same hash lengths.
How large is the 802.1Q tag that is added to an Ethernet frame when using VLANs?
a.20 bytes
b.4 bytes
c.12 bytes
d.8 bytes
4 bytes
What is NOT one of the ways in which networks are commonly segmented?
a.by device types
b.by device manufacturer
c.by departmental boundaries
d.by geographic location
by device manufacturer
You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?
a.Use the mac-limit command to prevent more than one MAC from being accepted.
b.Use the switchport port-security command to enable MAC filtering.
c.Use the allowed-mac command to filter by MAC address.
d.Use the secure port mac-address command to limit the port to learned addresses only.
Use the switchport port-security command to enable MAC filtering.
In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?
a.The Presentation layer is responsible for describing how data between applications is synced and recovered if messages don't arrive intact at the receiving application.
b.The Presentation layer describes the interface between two applications, each on separate computers.
c.The Presentation layer is responsible for transporting Application layer payloads from one application to another.
d.The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.
Considering that multiple users occupy the same channel when using CDMA, how are various calls using this technology kept separate?
a.The transmissions are encrypted, such that only the appropriate device can decrypt its own call.
b.The packets include the end user's SIM IMEI in each packet.
c.The sending and receiving of data is performed on different frequencies. Users hop between these frequencies to avoid interference.
d.The packets are coded such that individual calls can be distinguished.
The packets are coded such that individual calls can be distinguished.
How does refraction affect the propagation of a wireless transmission?
a.It splits the signal into secondary waves that continue in the direction in which they split.
b.It causes the signal to be returned back towards the source of the origin.
c.It distorts the signal as it travels into and through a different transmission medium.
d.It causes the signal to be absorbed by the refracting material.
It distorts the signal as it travels into and through a different transmission medium.
User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and uninstall software, and 2) permission to read, modify, create, or delete data files and folders.
True
False
True
When an 802.1Q tag is added to an Ethernet frame, where is it placed?
a.It is inserted between the preamble and the destination address.
b.It is inserted between the source address and the Ethernet type field.
c.It is appended to the end of the frame.
d.It is inserted between the destination and the source addresses.
It is inserted between the source address and the Ethernet type field.
Which command will produce statistics about each message transmitted by a host, separated according to protocol type?
a.ipconfig -s
b.netstat -s
c.ipstat -a
d.netstat -an
netstat -s
When planning horizontal cabling, what is the maximum allowable distance that can be used?
a.100 feet
b.300 meters
c.100 meters
d.1,000 feet
100 meters
What optional protocol can be used in 802.11 to reserve the medium for one node's use?
a.RAR/CTU (Reserve Airtime Request/Clear to Use)
b.RT/FT (Request Time/Fair Time)
c.RTS/CTS (Request to Send/Clear to Send)
d.HA/RA (Hold Airtime/Reserved Airtime)
RTS/CTS (Request to Send/Clear to Send)
A variant of BYOD, what does CYOD allow employees or students to do?
a.They can supply their choice of cloud application or storage.
b.They can choose a device from a limited number of options.
c.They can supply their own software on a computer or mobile device.
d.They can use whatever devices they wish to bring.
They can choose a device from a limited number of options.
The FTP protocol utilizes UDP, while TFTP uses TCP for data transmission.
True
False
False
In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?
a.BPDU guard
b.root guard
c.BPDU filter
d.BPDU drop
BPDU guard
What command can be used to check a domain computer's time source from a Command Prompt window?
a.time --source
b.w32tm /query /source
c.ntpd show source
d.date /source
w32tm /query /source
What does a statement of work document do?
a.It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.
b.It documents the intentions of two or more parties to enter into a binding agreement, or contract, and is sometimes used between an informal handshake and the legally binding signatures on contracts.
c.It is a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer, such as the service provided by an ISP.
d.It is a contract that defines the terms of future contracts between parties, such as payment terms or arbitration arrangements.
It documents in detail the work that must be completed for a particular object, and includes specifics such as tasks, deliverables, standards, payment schedule, and work timeline.
IPv4 and IPv6 use the same packet format.
True
False
False
The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?
a.principle of least privilege
b.limited liability access
c.minimal access/minimal exposure
d.least-risk privilege profile
principle of least privilege
Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.
True
False
True
The DTE or endpoint device for a leased line is known as which device below?
a.cable modem
b.CSU/DSU
c.DSL modem
d.ISDN modem
CSU/DSU
What type of virtual circuit allows connections to be established when parties need to transmit, then terminated after the transmission is complete?
a.switched virtual circuit (SVC)
b.dynamic virtual circuit (DVC)
c.looping virtual circuit (LVC)
d.permanent virtual circuit (PVC)
switched virtual circuit (SVC)
Utilized by China's so-called "Great Firewall", what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?
a.rogue DHCP server
b.denial-of-service attack
c.DNS poisoning
d.MAC address spoofing
Book says DNS poisoning (Redirection)
But book does not say DNS poisoning prevents access to web pages. This is why I think it could be (Denial of Service) because the test reads DNS poisoning to be wrong when the book says otherwise.
Healing messages are a feature of what smart home protocol?
a.ANT+
b.Z-Wave
c.ZigBee
d.Bluetooth
Z-Wave
Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?
a.550m
b.10km
c.300m
d.40km
40km
What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requiring constant, static tunnels?
a.Symmetric VPN Autodial
b.Auto Switched VPN Service
c.Dynamic Multipoint VPN
d.Dynamic SmartVPN
Dynamic Multipoint VPN
What is the Nmap utility used for?
a.It is a port scanning utility that can identify open ports on a host.
b.It is used to identify unsecured sensitive data on the network, such as credit cards.
c.It is an automated vulnerability and penetration testing framework.
d.It is a software firewall that can be used to secure a vulnerable host.
It is a port scanning utility that can identify open ports on a host.
The Wi-Fi Protected Setup PIN can be easily cracked through a brute force attack.
True
False
True
What does the MX record do in a forward DNS zone?
a.It identifies the authoritative name server for a domain.
b.It identifies the e-mail server to be used for e-mail traffic for the domain.
c.It identifies the hostname and port of a computer that hosts a specific network service, such as FTP or SIP.
d.It holds the alternative names for a host.
It identifies the e-mail server to be used for e-mail traffic for the domain.
A subnet of 255.255.248.0 can be represented by what CIDR notation?
a./20
b./29
c./18
d./21
/21
Near-field communication devices send data at what fixed frequency?
a.8.65 MHz
b.47.1 MHz
c.21.39 MHz
d.13.56 MHz
13.56 MHz
When using IPv6, two or more nodes on the same link are said to be neighbors.
True
False
True
What is the fastest Ethernet standard that can possibly be used on twisted-pair cabling?
a.10GBase-T
b.1000Base-T
c.100Base-T
d.10TBase-T
10GBase-T
The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.
True
False
True
What type of device can be used to assess the quality of a wireless signal?
a.frequency hopper
b.spectrum analyzer
c.channel scanner
d.Wi-Fi analyzer
spectrum analyzer
In Linux, what command can be used for viewing and setting wireless interface parameters?
a.wlanconf
b.ifconfig
c.wifid
d.iwconfig
iwconfig
The PEAP standard creates an encrypted TLS tunnel between the supplicant and the server before proceeding with the usual EAP process.
True
False
True
Network segmentation at Layer 2 of the OSI model is accomplished using VLANs.
True
False
True
What federal agency is charged with safety and health in the workplace?
a.Office Safety and Standards Department (OSSD)
b.Occupational Safety and Health Administration (OSHA)
c.Workplace Safety and Hazard Administration (WSHA)
d.Hazardous Materials and Safety Management (HMSM)
Occupational Safety and Health Administration (OSHA)
In order to generate a public and private key for use with SSH, what command line utility should you use?
a.key-generate
b.gpg --ssh
c.ssh-newkey
d.ssh-keygen
ssh-keygen
When dealing with a Cisco switch, what is NOT one of the pre-established VLANs?
a.VLAN 1
b.VLAN 1005
c.VLAN 1003
d.VLAN 1001
VLAN 1001
Which of the following is NOT a task that a VPN concentrator is responsible for?
a.A VPN concentrator authenticates VPN clients.
b.A VPN concentrator shuts down established connections when malicious traffic occurs.
c.A VPN concentrator establishes tunnels for VPN connections.
d.A VPN concentrator manages encryption for VPN transmissions.
A VPN concentrator shuts down established connections when malicious traffic occurs.
At what layer of the OSI model do the 802.11 standards vary?
a.Network layer
b.Physical layer
c.Data link layer
d.Transport layer
Physical layer
Setting a NIC to run in promiscuous mode will allow it to see all network traffic passing through a network switch.
True
False
False
A wireless node that is in active scanning mode transmits what special type of frame in order to find available access points?
a.probe frame
b.beacon frame
c.ping frame
d.association request
probe frame
When using Spanning Tree Protocol, which port on non-root bridges can forward traffic toward the root bridge?
a.Only one root port, which is the bridge's port that is furthest from the root bridge, can forward.
b.All ports can forward frames to the root bridge, provided they are not in a down state.
c.All ports will forward frames to the root bridge, unless a BPDU is received back on that same port.
d.Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
When using public and private keys to connect to an SSH server from a Linux device, where must your public key be placed before you can connect?
a.In an authorization file under your home directory on your computer.
b.In an authorization file on the host where the SSH server is.
c.In the /etc/ssh/keys folder.
d.In the /var/run/ssh/public folder.
In an authorization file on the host where the SSH server is.
The Transport layer header addresses a receiving application by a number called a MAC address.
True
False
False
What is the name of the GUI front end that is available for the Nmap utility?
a.VizMap
b.iMap
c.Zenmap
d.GUINmap
Zenmap
Different types of organizations have similar levels of network security risks.
True
False
False
By default, Active Directory is configured to use the Kerberos protocol, but can be configured to use LDAP or a combination of LDAP and Kerberos.
True
False
True
In a coaxial cabling, what does the RG rating measure?
a.The overall thickness of the cable.
b.The number of twists in the copper core.
c.The maximum distance the cable is rated for, in kilometers.
d.The materials used for shielding and conducting cores.
The materials used for shielding and conducting cores.
What term is used to describe the average amount of time that will pass for a device before a failure is expected to occur?
a.mean time between failures (MTBF)
b.maximum time available (MTA)
c.estimated time to failure (ETTF)
d.product cycle lifetime (PCL)
mean time between failures (MTBF)
The Transmission Control Protocol (TCP) is considered to be a connectionless, or best-effort delivery protocol.
True
False
False
Which of the following is NOT a best practice when performing cable management?
a.Cable should not be placed across a floor where they might be damaged by traffic.
b.A cable tester should be used to verify that each segment of cable is transmitting reliably.
c.Grounding requirements should be followed when running cables.
d.Cable ties should be pulled tightly to keep cables from moving around in a bundle.
Cable ties should be pulled tightly to keep cables from moving around in a bundle.
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
a.iptables
b.ipf
c.netwall
d.modfire
iptables
What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?
a.master service agreement
b.service-level agreement
c.memorandum of understanding
d.statement of work
service-level agreement
How is a posture assessment performed on an organization?
a.An assessment of how a network will perform under stress is performed to determine if the network throughput is adequate.
b.A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
c.A third party organization is tasked with attempting to break into the organization and compromise security in order to determine threat vectors.
d.A report of data that is subject to special regulation is created, such that the organization is aware of what data needs protection.
A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
How do routers create a broadcast domain boundary?
a.They do not forward broadcast traffic.
b.They forward broadcasts only to necessary segments.
c.They listen to and direct broadcast traffic.
d.They only forward broadcasts that are intended for multiple subnets.
They do not forward broadcast traffic.
What is by far the most popular DNS server software available?
a.BIND
b.Microsoft DNS
c.Dnsmasq
d.Oracle Resolver
BIND
Which of the following is an example of encapsulation?
a.The modification of headers from a higher layer in the OSI model.
b.The addition of a header to data inherited from the layer above in the OSI model.
c.The addition of a trailer to data inherited from the layer above in the OSI model.
d.The subtraction of a header from data inherited from the layer below in the OSI model.
The addition of a header to data inherited from the layer above in the OSI model.
When creating network diagrams, what icon description typically represents a network firewall?
a.An icon that has a hockey-puck shape with two arrows pointing inward and two arrows pointing outward.
b.An icon that is rectangular in shape, with squiggly lines on the front.
c.An icon that resembles a brick wall.
d.An icon that is rectangular, which contains four arrows pointing in opposite directions.
An icon that resembles a brick wall.
Which traceroute command will perform a trace using ICMP echo requests instead of UDP datagrams to the host srv1.mycompany.com?
a.traceroute -i srv1.mycompany.com
b.traceroute -w srv1.mycompany.com
c.traceroute -o ICMP srv1.mycompany.com
d.traceroute -I srv1.mycompany.com
traceroute -I srv1.mycompany.com
FTPS (FTP Security or FTP Secure) and SFTP (Secure FTP) are two names for the same protocol.
True
False
False
Noise that can degrade or distort a signal on a network is measured with what unit?
a.joules
b.farads
c.volts
d.decibels
decibels
Which of the following suggestions can help prevent VLAN hopping attacks on a network?
a.Install a router to process the untagged traffic on the VLAN.
b.Install an additional switch to isolate traffic.
c.Use MAC address filtering.
d.Disable auto trunking and move native VLANs to unused VLANs.
Disable auto trunking and move native VLANs to unused VLANs.
Which 802.11 frame type is related to medium access and data delivery, and includes ACK and RTS/CTS frames?
a.control frames
b.data frames
c.management frames
d.extended frames
control frames
What is the purpose of the Layer 2 LLC sublayer?
a.It is used to manage MAC addresses in message frames.
b.It is used to handle multiplexing, flow and error control, and reliability.
c.It performs management of the physical layer's modulation techniques.
d.It is used to manage low-level encryption on a network.
It is used to handle multiplexing, flow and error control, and reliability.
What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?
a.SNMP
b.POP3
c.HTTP
d.SMTP
SNMP
The Group Policy utility can be opened by typing what name into a Run box?
a.grppol.msc
b.secpol.msc
c.grouppol.msc
d.gpedit.msc
gpedit.msc
When troubleshooting wireless issues, what statement is accurate?
a.Simultaneous wired and wireless network connections do not affect the ability to communicate on the network.
b.Access points that use overlapping channels can cause interference with each other if they are too close.
c.A WPA key can be used to associate with a WEP configured access point.
d.Access point power levels should always be configured to output as much power as possible.
Access points that use overlapping channels can cause interference with each other if they are too close.
A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?
a.encrypted virus
b.logic bomb
c.worm
d.boot sector virus
logic bomb
Where are MPLS labels placed within a frame?
a.between the layer 2 header and the layer 3 header
b.between the layer 3 header and the data payload
c.at the end of the layer 2 trailer
d.between the data payload and the layer 2 trailer
between the layer 2 header and the layer 3 header
ICANN is responsible for restrictions on use of the .com, .org, and .net TLDs.
True
False
False
An open electrical circuit as a result of a failed circuit breaker is considered to be what type of failure system?
a.fail-close
b.fail-tolerant
c.fail-dynamic
d.fail-open
fail-close
It is ideal to use the same password for multiple different applications, provided the password is complex enough.
True
False
False
What is the purpose of the checksum TCP field?
a.It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
b.It confirms receipt of data via a return message to the sender.
c.It specifies special options, such as the maximum segment size a network can handle.
d.It identifies the data segment's position in the stream of data segments being sent.
It allows the receiving node to determine whether the TCP segment became corrupted during transmission.
An IPv6 address consists of 128 bits that are written as 10 blocks of hexadecimal numbers separated by colons.
True
False
False
(written as 8 blocks)
Which of the following scenarios represents a phishing attempt?
a.A person posing as an employee tried to access a secured area at your organization.
b.An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
c.A gift was offered to an employee with access to secured information in exchange for details.
d.An employee at your company has received a malware-infected file in their e-mail.
An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
A short circuit is one where needed connections are missing, such as when a wire breaks.
True
False
False
Which of the following terms is commonly used to describe a VLAN configuration in which one router connects to a switch that supports multiple VLANs?
a.router-on-a-branch
b.router overloading
c.branched router
d.router-on-a-stick
router-on-a-stick
How many /64 subnets can be created within a /56 prefix?
a.1024
b.2048
c.256
d.512
256
The grouping of multiple servers so that they appear as a single device to the rest of the network is known as which term?
a.server overloading
b.clustering
c.link aggregating
d.load balancing
clustering