Network and Security - Foundations_Pre-Assessment: Flashcards
A network is being created for an office, and there is a need for a router that manages internal network connections with no contact with the internet.
Which type of router is needed
A. Inter-provider border router
B. Core router
C. Subscriber edge router
D. Broadband router
Core router
An IT manager is designing a new network and needs a device that connects multiple networks.
Which device is needed?
A.Switch
B.Modem
C.Server
D.Router
Router
A network in a small office building connects all devices using wired connections with a star topology.
Which type of network is described?
A. LAN
B. WLAN
C. WAN
D. CAN
LAN
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to view a list of network addresses and port numbers.
Which command in Linux should be used for this purpose?
A. ifconfig
B. ping
C. traceroute
D. netstat
netstat
Users of a network have been experiencing issues. In the course of troubleshooting, an administrator wants to determine which ports have an active connection.
Which command in Windows should be used for this purpose?
A. ipconfig
B. tracert
C. netstat -an
D. arp -a
netstat -an
In the process of setting up a Linux-based network system, a technician needs to view network interfaces and their settings.
Which command should be used?
A. ifconfig
B. dig
C. ping
D. nslookup
ifconfig
A person is troubleshooting a network issue and needs to test DNS connectivity.
Which Linux command should be used?
A. nslookup
B. ifconfig
C. netstat
D. traceroute
nslookup
What is the TCP/IP layer that includes the Transmission Control Protocol (TCP)?
A. Physical or network access
B. Transport
C. Application
D. Network or internet
Transport
Which layer of the TCP/IP model includes the Internet Message Access Protocol (IMAP)?
A. Application
B. Physical or network access
C. Network or internet
D. Transport
Transport
Which OSI model layer creates, maintains, and disconnects process communications over the network?
A. Application
B. Transport
C. Session
D. Physical
Session
Which OSI model layer is responsible for breaking data into packets?
A. Physical
B. Application
C. Session
D. Transport
Application
Which layer of the OSI reference model includes all computer programs that interact with the network?
A. Physical
B. Application
C. Transport
D. Presentation
Application
What is the OSI model layer that includes the IPX?
A. Transport
B. Application
C. Session
D. Network
Network
What is the layer of the OSI model that is responsible for logical addressing?
A. Physical
B. Transport
C. Data link
D. Network
Network
What is the layer of the OSI model that translates binary computer language into the language of the transmission medium?
A. Physical
B. Presentation
C. Transport
D. Session
Physical
A company uses cloud service to manage its IT resources. The underlying hardware resources are shared by other companies as well.
What is the cloud deployment model described in the scenario?
A. Multi
B. Public
C. Hybrid
D. Private
Public
.
An organization uses one cloud service provider for data management and another service provider for development platforms.
What is the cloud deployment model described in the scenario?
A. Hybrid
B. Public
C. Community
D. Multi
Multi
A developer has an existing computer with an operating system. The developer wants to use a hypervisor to have access to several virtual machines for a specific project.
Which form of hypervisor fits the need described in the scenario?
A. Proprietary
B. Type 1
C. Open source
D. Type 2
Type 2
A company needs to maximize the number of virtual machines that can run on each host.
Which hypervisor should be used?
A. Open source
B. Type 1
C. Type 2
D. Proprietary
Type 1
An attacker gains unauthorized access to a computer and modifies browser security settings.
What is the purpose of the attack?
A. Denial of availability
B. Launch point
C. Data export
D. Data modification
Data modification
An attacker uses a trojan horse to forward usernames and passwords to an anonymous email address.
What is the purpose of the attack?
A. Launch point
B. Data modification
C. Denial of availability
D. Data export
Data export
A hacker purposefully breaks IT security to gain unauthorized access to systems and publish sensitive data.
Which term describes the given hacker?
A. White-hat
B. Black-hat
C. Blue-hat
D. Gray-hat
Black-hat