Ch.8 Flashcards

1
Q

What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

Question options:

UDP

IPX/SPX

TCP/IP

Appletalk

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

At what level of the OSI model does the IP protocol function?

Question options:

Transport Layer

Network Layer

Data link Layer

Presentation Layer

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?

Question options:

Application Layer

Presentation Layer

Network Layer

Transport Layer

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The capability for devices to exchange low-level control messages is provided by what protocol?

Question options:

ICMP

FTP

UDP

TCP

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

Question options:

entity

community string

MIB

OID

A

community string

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

Question options:

WINS

NIS

TACACS+

DNS

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DNS poisoning can be prevented using the latest edition of what software below?

Question options:

BIND

DHCP

WINS

finger

A

BIND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?

Question options:

19

20

21

22

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

Question options:

bridge

router

switch

hub

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:

Questions options:

flood guard

protocol guard

link guard

frame guard

A

flood guard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?

Question options:

Virtual trunking protocol

Dijkstra’s algorithm

  1. 11x
  2. 1d
A

802.1d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

Question options:

VLAN

subnets

IP address

MAC address

A

VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?

Question options:

IEEE 802.3ad

IEEE 802.11n

IEEE 802.1x

IEEE 802.1z

A

IEEE 802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?

Question options:

Cloud Application as a Service

Cloud Infrastructure as a Service

Cloud Software as a Service

Cloud System as a Service

A

Cloud Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

Question options:

kernel

supervisor

hypercard

hypervisor

A

hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In what type of cloud computing does the customer have the highest level of control?

Question options:

Cloud Application as a Service

Cloud Infrastructure as a Service

Cloud Software as a Service

Cloud System as a Service

A

Cloud Infrastructure as a Service

17
Q

​What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?

Question options:

​Static

​Dynamic

​Sticky

​Permissive

A

​Sticky

18
Q

Which of the following is not a benefit that can be provided by using IP telephony?​

Question options:

​Simplified management

​Decreased network utilization

Reduced infrastructure requirements

​Increased user productivity

A

​Decreased network utilization

19
Q

What is the term used for a device that requests permission from an authenticator to join a network?​

Question options:

​Remote client

​Supplicant

Widget

​Requester

A

​Supplicant

20
Q

What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?

Question options:

​SSH

​Telnet

​NetBIOS

​DHCP

A

​NetBIOS