2 Network + Final Study Guide (Multiple Choice) Flashcards
- The ultimate goal of network security is to protect which of the following?
a. the customers who use the system
b. the organization and its employees
c. business partners who access the network
d. all of the above
d. all of the above
- What is a policy that defines the methods involved when a user logs on to the network called?
a. audit
b. security
c. authentication
d. acceptable use
c. authentication
- Which of the following should not be a concern when discerning the level of security that is required in a network?
a. how difficult it would be to enforce a password policy
b. the costs to implement a security system
c. whether the data is important enough to safeguard
d. from whom the data needs to be protected
a. how difficult it would be to enforce a password policy
- In Windows 7, what is the maximum length that a password can be?
a. 8
b. 16
c. 64
d. 128
d. 128
- Which one of the following passwords meets Windows password complexity requirement?
a. NetWoRKing
b. NetworkingIsFun
c. N3tworking1O1
d. netw@rk!ngb@s!cs
c. N3tworking1O1
- Which form of authentication involves the exchange of a password-like key that must be entered on both devices?
a. Kerberos authentication
b. digital certificate
c. GNC privacy guard
d. preshared key
d. preshared key
- When using BitLocker to encrypt your entire disk which mode must you use if your system is not configured for TPM support?
a. transport mode
b. USB key mode
c. user authentication mode
d. encryption mode
b. USB key mode
- If you need to implement a VPN on a Windows Server 2008 system, what server role must be installed to access routing and remote access services?
a. network policy and access services
b. Active Directory services
c. domain name services
d. remote network services
a. network policy and access services
- Which VPN implementation needs no additional configuration to be allowed access through a firewall?
a. SSTP
b. IPSec
c. PPTP
d. L2TP
a. SSTP
- What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device?
a. IPSec
b. NAT
c. EFS
d. VPN
b. NAT
- What is the generic term used to describe programs that are designed to cause harm or disruption to a computer system?
a. spyware
b. malware
c. virus
d. Trojan
b. malware
- What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS?
a. rootkit
b. Trojan
c. hoax virus
d. spyware
a. rootkit
- Which of the following is a type of malware that isn’t self-replicating and is usually installed by the user without his knowledge? Its primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers.
a. rootkit
b. Trojan
c. hoax virus
d. spyware
d. spyware
- The 802.11i standard is the newest version of wireless security that uses more advanced encryption methods than the previous versions. What is it more commonly referred to as?
a. WEP
b. WAP
c. WPA
d. WPA2
d. WPA2
- Which of the following is a scanner used as a tool to determine what possible points of entry exist that are open and vulnerable on your system?
a. Port
b. Protocol
c. Ping
d. Finger
a. Port
- Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim?
a. packet storm
b. broadcast flood
c. smurf attack
d. half-open SYN attack
c. smurf attack
- Which of the following is not a true statement regarding the function of a switch?
a. It determines the path used based on the destination IP address
b. It sends broadcast frames out all connected ports
c. Each port on a switch represents a separate collision domain
d. Switches have the ability to operate in full-duplex mode
a. It determines the path used based on the destination IP address
- Which of the following combinations will you find in a switching table?
a. application/destination port number
b. IP address/exit interface
c. destination network/next Hop
d. MAC address/switch port number
d. MAC address/switch port number
- Besides a managed switch what is a high-end switch that offers features such as multicast processing and port security called?
a. intuitive
b. executive
c. smart
d. enterprise
c. smart
- Which of the following is not a function that would be found in a managed switch?
a. the ability to stop switching loops using STP
b. the ability to transfer it’s switching table with neighboring switches
c. the creation of VLANS to logically separate resources
d. to limit access to the network by enabling security on individual ports
b. the ability to transfer it’s switching table with neighboring switches
- Each interface on a router must have an IP address and what else to be able to communicate on the network?
a. network ID
b. default gateway
c. MAC address
d. serial number
c. MAC address
- When a router’s interface is configured with multiple IP addresses with each address belonging to different networks, what is it called?
a. multi-homed router
b. dynamic router
c. link-state router
d. router on a stick
d. router on a stick
- What type of routing protocol are RIP and RIPv2?
a. distance-state protocol
b. link-state protocol
c. hybrid protocol
d. distance-vector protocol
d. distance-vector protocol
- The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what?
a. delivery
b. convergence
c. congestion
d. concurrence
b. convergence
- When an access control list is applied on a router’s interface, that interface is performing a specific function on the packets that it receives. What is that function called?
a. packet filtering
b. packet forwarding
c. packet manipulating
d. packet dispatching
a. packet filtering
- What command issued from a command prompt will display the routing table in Windows?
a. route table
b. route print
c. route delete
d. route config
b. route print
- A wireless router is actually composed of three devices, a wireless access point and which two other devices?
a. a router and a hub
b. a switch and abridge
c. a router and a switch
d. a router and a bridge
c. a router and a switch
- What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks?
a. white hat
b. wardriver
c. script kiddy
d. phisher
b. wardriver
- Which is the PCI bus type that has the highest possible transfer rate?
a. PCI
b. PCIe
c. PCI-X
d. PCMCIA
b. PCIe
- Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive?
a. onboard coprocessor
b. advanced configuration power management interface
c. shared system memory
d. preboot execution environment
d. preboot execution environment
- Which part of the OS provides users and applications with an interface to manipulate files?
a. kernel
b. services
c. processes
d. file system
d. file system
- Older OSs first used what type of multitasking, which allowed a process to monopolize the CPU`s time until the process had completed its own task?
a. contextual
b. cooperative
c. preemptive
d. precocious
b. cooperative
- What method does the CPU use to divide its computing cycles between more than one process?
a. context switching
b. process switching
c. time slicing
d. thread slicing
c. time slicing
- In Windows, you use Task Manager to view the processes running on your computer. What do you use to view the running processes on some Linux systems?
a. resource monitor
b. terminal manager
c. performance manager
d. system monitor
d. system monitor
- What is the native file-sharing protocol in Linux?
a. SMB
b. NFS
c. NSF
d. SMP
b. NFS
- Which common email protocol allows the user to access messages, yet still have them stored on the server?
a. SMTP
b. IMAP
c. POP3
d. SNMP
b. IMAP
- What is the process called that grants or denies a user’s access to network resources?
a. authentication
b. acceptance
c. authorization
d. admission
c. authorization
- What directory service protocol used in Linux systems is also supported by Windows?
a. NFS
b. NIS
c. LDAP
d. LEAP
c. LDAP
- What storage solution involves a third-party company that provides off-site hosting of data?
a. network-attached storage
b. cloud-based storage
c. network accessed appliance
d. storage area network
b. cloud-based storag
- What is a partial copy of a VM that is used to restore it to a previous state?
a. snapshot
b. clone
c. hypervisor
d. host computer
a. snapshot