Chapter 11 Homework Flashcards

1
Q

What type of traffic would most likely have the highest priority through the network?

A

voice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

hardware threats

A

physical damage to servers, routers, switches, cabling plant, and workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

environmental threats

A

temperature and humidity extremes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

electrical threats

A

voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in a ping ā€˜Uā€™ may indicate that a router along the path _________

A

did not contain a route to the destination address and that the ping was unsuccessful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is one of the most effective security tools available for protecting users from external threats?

A

password encryption techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is used by the traceroute command to send and receive echo-requests and echo-replies

A

ICMP (internet control message protocal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is considered the most effective way to mitigate a worm attack?

A

download security updates and patch all vulnerable systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page?

A

ipconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hich process failed if a computer cannot access the Internet and received an IP address of 169.254.142.5

A

DNS (domain name system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which element of scaling a network involves identifying the physical and logical topologies?

A

network documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should traffic flow be captured in order to best understand traffic patterns in a network?

A

during peak utilization times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5. Which command, when issued on a Windows PC, will display the path to the remote host?

A

tracert 10.1.1.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An administrator wants to back up a router configuration file to a USB drive that is connected to the router. Which command should the administrator use to verify that the USB drive is being recognized by the router?

A

show file systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network services use to define a set of rules that govern how devices communicate and the data formats used in a network

A

protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly