Ch.8 Flashcards
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
Question options:
UDP
IPX/SPX
TCP/IP
Appletalk
TCP/IP
At what level of the OSI model does the IP protocol function?
Question options:
Transport Layer
Network Layer
Data link Layer
Presentation Layer
Network Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?
Question options:
Application Layer
Presentation Layer
Network Layer
Transport Layer
Transport Layer
The capability for devices to exchange low-level control messages is provided by what protocol?
Question options:
ICMP
FTP
UDP
TCP
ICMP
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
Question options:
entity
community string
MIB
OID
community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
Question options:
WINS
NIS
TACACS+
DNS
DNS
DNS poisoning can be prevented using the latest edition of what software below?
Question options:
BIND
DHCP
WINS
finger
BIND
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
Question options:
19
20
21
22
21
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
Question options:
bridge
router
switch
hub
router
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:
Questions options:
flood guard
protocol guard
link guard
frame guard
flood guard
Broadcast storms can be prevented by using loop prevention technology. Which item below can be used to help prevent loops?
Question options:
Virtual trunking protocol
Dijkstra’s algorithm
- 11x
- 1d
802.1d
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
Question options:
VLAN
subnets
IP address
MAC address
VLAN
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
Question options:
IEEE 802.3ad
IEEE 802.11n
IEEE 802.1x
IEEE 802.1z
IEEE 802.1x
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
Question options:
Cloud Application as a Service
Cloud Infrastructure as a Service
Cloud Software as a Service
Cloud System as a Service
Cloud Software as a Service
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
Question options:
kernel
supervisor
hypercard
hypervisor
hypervisor