Practice (5) Flashcards

1
Q

Which of the following are technologies typically used for personal area networks (PANs)? (Choose all correct answers.)

RFID

Z-Wave

ISDN

NFC

Bluetooth

A

Z-Wave

NFC

Bluetooth

Bluetooth, Z-Wave, and near-field communication (NFC) are all short-range wireless technologies that are capable of providing communications between PAN devices. The other options are not suitable for PAN communications. Radio-frequency identification (RFID) uses tags containing data, frequently embedded in pets, which can be read using electromagnetic fields. Integrated Services Digital Network (ISDN) is a wide area networking technology that uses the telephone infrastructure to provide a high-speed dial-up service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following types of network devices can provide authentication services for multiple remote access servers using the device’s own account database?

NAS

NGFW

RADIUS

A

RADIUS

A Remote Authentication Dial-In User Service (RADIUS) server can provide authentication, authorization, and accounting services for remote access servers. Intrusion detection systems (IDSs), next-generation firewalls (NGFWs), and network attached storage (NAS) devices do not provide authentication services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are designing the network for your company’s new branch office, and you need a device on which administrators can create virtual local area networks and that will forward traffic between them. Which of the following types of devices can do this?

Broadband router

Load balancer

Multilayer switch

A

Multilayer switch

A multilayer switch is a network connectivity device that functions at both the data link layer (layer 2) and the network layer (layer 3) of the OSI model. At layer 2, the device functions like a normal switch, creating an individual collision domain for each connected node and enabling administrators to create multiple VLANs. At layer 3, the device also provides routing capabilities by forwarding packets between the VLANs. Virtual routers, load balancers, and broadband routers are strictly layer 3 devices that can route traffic but cannot create VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are setting up a new network for which you have been given the IPv4 network address 10.61.0.0/19. You want to calculate the number of hosts you can create on each subnet. How many bits are allocated to the host identifier in an IPv4 address on this network?

5

8

13

A

13

The value after the slash in a classless inter-domain routing (CIDR) address specifies the number of bits in the network identifier. An IP address has 32 bits, so if 19 bits are allocated to the network identifier, 13 bits are left for the host identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The protocols that are responsible for the delivery of data packets to their final destinations on an internetwork operate at which layer of the Open Systems Interconnection (OSI) model?

Application

Session

Transport

Network

Data link

A

Network

On a TCP/IP network, the Internet Protocol (IP) at the network layer is the protocol responsible for the delivery of data to its final destination, using IP addresses that can be routed through an internetwork. Data link layer protocols are only concerned with communication between devices on a local area network (LAN) or between two points connected by a wide area network (WAN). The transport, session, and application layers are not involved in the actual delivery of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Originally, storage area networks (SANs) were dedicated solely to storage-based traffic. A local area network (LAN) was also required for other types of traffic. Today, however, it is possible for SAN and LAN traffic to coexist on a single network medium. Which of the following SAN protocols are capable of sharing a network medium with standard LAN traffic? (Choose all correct answers.)

InfiniBand

Fibre Channel

iSCSI

FCoE

A

iSCSI

FCoE

The iSCSI protocol runs on a standard IP network, and the Fibre Channel over Ethernet (FCoE) variant runs on a standard Ethernet network. Both of these protocols can share a network with LAN traffic, although the use of a quality of service (QoS) mechanism is usually recommended. The original Fibre Channel implementation and InfiniBand both require a dedicated network medium that does not support LAN traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following WAN technologies use digital signaling? (Choose all correct answers.)

ISDN

CATV

ATM

PSTN

DSL

SONET

A

ISDN

CATV

ATM

DSL

SONET

Integrated Services Digital Network (ISDN), cable television network (CATV), Asynchronous Transfer Mode (ATM), Digital Subscriber Line (DSL), and Synchronous Optical Network (SONET) are all digital networks. Public Switched Telephone Network (PSTN) is the standard telephone network, an analog, circuit-switched service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are planning an automated operating system deployment for 100 new Windows workstations your company has received. You intend to configure the workstations to boot using PXE, during which time the system will obtain an IP address from a DHCP server and then download a boot image file from a TFTP server. Which of the following well-known ports must you open on the firewall separating the workstations from the servers? (Choose all correct answers?)

64

65

66

67

68

69

A

67

68

69

Dynamic Host Configuration Protocol (DHCP) servers use well-known port numbers 67 and 68. The Trivial File Transfer Protocol (TFTP) uses port number 69. Neither protocol uses port 64, 65, or 66

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your department is experiencing frequent delays as users wait for images to render using their outdated graphics software package. As a result, you submitted a change request for a new software product at the monthly meeting of the company’s change management team. Now that the change request has been approved, it is time to implement the change. Which of the following administrative tasks will most likely be the change management team’s responsibility during the implementation process? (Choose all correct answers.)

Notifying users

Documenting all modifications made

Authorizing downtime

Designating a maintenance window

A

Authorizing downtime

Designating a maintenance window

The change management team is usually not responsible for tasks directly involved in the implementation of the changes they approve. Therefore, they would not be the ones to notify users exactly when the change will take place or document the procedure afterward. They would, however, be responsible for providing a maintenance window, during which the change must occur, and authorizing any downtime that would be needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are installing a new server that is equipped with two power supplies. The server’s firmware enables you to set the mode in which the power supplies will be used. In which of the following modes must the dual power supplies be running for the system to be fault tolerant?

Individual mode

Combined mode

Redundant mode

A

Redundant mode

A server with dual power supplies can run in one of two modes: redundant or combined. In redundant mode, each of the power supplies is capable of providing 100 percent of the power needed by the server. Therefore, the server can continue to run if one power supply fails, making it fault tolerant. In combined mode, both power supplies are needed to provide the server’s needs, so a failure of one power supply will bring the server down. Individual mode and hot backup mode are not terms used for this purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Domain Name System (DNS) defines a hierarchical name space, locations in which are reflected in fully qualified domain names (FQDNs). Which of the words in the FQDN www.paris.mydomain.org represents the bottommost layer in the DNS namespace’s domain hierarchy?

www

paris

mydomain

A

paris

Paris is the bottommost domain in the given FQDN

Paris is a subdomain within Mydomain, and Mydomain is a second-level domain registered by a particular organization. The topmost layer in the DNS hierarchy is represented by org, which is a top-level domain. In this FQDN, www is not the name of a domain; it is the name of a particular host in the paris.mydomain.org domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The term datagram is typically used by protocols offering connectionless delivery service. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all correct answers.)

TCP

IP

UDP

Ethernet

A

IP

UDP

The two main connectionless protocols in the TCP/IP suite are the Internet Protocol (IP) and the User Datagram Protocol (UDP), both of which use the term datagram for their protocol data units. Ethernet uses the term frame, and Transmission Control Protocol (TCP) uses the term segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

After using a tape backup solution for years, you have recently started backing up your server to an external hard disk drive. Your backup schedule calls for weekly full backups and daily incremental backups. In the past, performing a restore required multiple jobs, but now only a single job is needed. Why does performing incremental backups to a hard drive, rather than a tape drive, make it possible to restore a server with a single job, rather than multiple jobs?

Because hard drives can transfer data faster than tape drives

Because hard drives hold more data than tape drives

Because hard drives are random access devices and tape drives are not

A

Because hard drives are random access devices and tape drives are not

Data is stored on tape drives in a linear fashion. Once you write backup data to a tape, you cannot selectively replace individual files. When you perform a restore job, you have to restore the most recent full backup, followed by incremental backups, which overwrite some of the full backup files with newer ones. Hard disk drives are random access devices, meaning that individual files can be written to and read from any location on the disk. When you perform incremental backup jobs to a hard disk, the software can restore data using any version of each file that is available. Data capacity, transfer speed, and block size are not relevant to the number of jobs required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have just received notification of a new software release for an application you are running on your servers. The release is intended to address a newly discovered security vulnerability. Which of the following is the correct term for a software release containing a fix designed to address one specific issue?

An upgrade

A patch

A service pack

A

A patch

A patch is a relatively small update that is designed to address a specific issue, often a security exploit or vulnerability. Patches do not add features or new capabilities; they are fixes targeted at a specific area of the operating system. Updates, upgrades, and service packs are larger packages that might include new features and/or many different fixes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Twisted pair cables consist of multiple pairs of wires within a sheath, with each pair of wires twisted together separately. Which of the following statements best explains the reason for the twists in twisted pair cabling?

The twists help to prevent crosstalk in adjacent wire pairs and limit the effects of electromagnetic interference (EMI) on the signals carried over the cable.

The twists make it easier for installers to attach connectors to the cable ends.

The twists extend the cable’s bend radius allowance, making it easier to install.

A

The twists help to prevent crosstalk in adjacent wire pairs and limit the effects of electromagnetic interference (EMI) on the signals carried over the cable.

The twisted wire pairs inside twisted pair cable prevent the signals on the different wires from interfering with each other (which is called crosstalk). The twists also provide resistance to outside electromagnetic interference. The twists have no effect on collisions. The twists do nothing to facilitate the attachment of connectors. Twists have nothing to do with the bend radius allowance for the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You are contracting with a provider to obtain email services for the clients on your network, using their existing email servers in the public cloud. You do not need anything from the provider other than email. Which of the following service models will you be using?

PaaS

SaaS

IaaS

A

SaaS

The Software as a Service (SaaS) model provides consumers with access to a specific application, such as email servers, running on the provider’s servers. Infrastructure as a Service (IaaS) provides the consumers with processing, storage, and networking resources that they can use to install and run operating systems and other software of their choice. Platform as a Service (PaaS) provides consumers with the ability to install applications of their choice on a server installed by the provider

17
Q

Security Information and Event Management (SIEM) is a combination tool that uses information gathered from logs and network devices to provide a real-time analysis of the network’s security condition. Which of the following SIEM processes performs searches for specific criteria, during specific time frames, in logs located on different computers?

Correlation

Data aggregation

Forensic analysis

A

Forensic analysis

In SIEM, forensic analysis is a process of searching logs on multiple computers for specific information based on set criteria and time periods. The other three options specify other SIEM functions. Data aggregation is a process of consolidating log information from multiple sources. Correlation is the process of linking logged events with common attributes together. Retention is the long-term storage of log data

18
Q

When you start Dynamic Host Configuration Protocol (DHCP) client, it transmits DHCPDISCOVER messages to locate and initiate contact with DHCP servers. Which of the following types of transmissions does the client use for this purpose?

Broadcast

Multicast

Anycast

A

Broadcast

DHCP clients use broadcasts to transmit DHCPDISCOVER messages on the local network. DHCP servers are then required to respond to the broadcasts. DHCP clients cannot use unicast, multicast, or anycast messages to initiate contact with DHCP servers because the clients have no way of learning the addresses of the DHCP servers

19
Q

Virtual private networks (VPNs) use a technique called tunneling to secure its traffic as its passes over a public network, such as the Internet. In some cases, the traffic within the VPN tunnel is also encrypted. Which of the following VPN protocols does not provide encryption within the tunnel?

L2TP

IPsec

PPTP

A

L2TP

Layer 2 Tunneling Protocol (L2TP) is a VPN protocol that used to create the tunnel forming a VPN connection, but it does not encrypt the traffic passing through the tunnel. To do this, it requires a separate protocol that provides encryption, such as IPsec. Point-to-Point Tunneling Protocol (PPTP) and Secure Sockets Layer (SSL) are both capable of encrypting traffic in the tunnels they create

20
Q

You are installing a wireless network in a site that has a great many 2.4 GHz wireless telephones. Which of the following wireless networking technologies can you use, which will never experience interference from the telephones? (Choose all correct answers.)

IEEE 802.11b

IEEE 802.11g

IEEE 802.11ac

IEEE 802.11a

IEEE 802.11n

A

IEEE 802.11ac

IEEE 802.11a

IEEE 802.11b, 802.11g, and 802.11n networks all can use the 2.4 GHz frequency band for their transmissions, which can experience interference from a wireless telephone using the same frequency. IEEE 802.11a and IEEE 802.11ac, however, use the 5 GHz band, which will not experience interference from a 2.4 GHz phone

21
Q

Which of the following is another term for a switch?

Multicast hub

Multiport repeater

Multiport bridge

A

Multiport bridge

A switch is a data link layer device that essentially performs the function of a bridge for each device connected to one of its ports. It can therefore be described as a multiport bridge. Multiport repeater is another term for a hub, and multihomed router is a redundancy, as all routers are by definition multihomed—that is, connected to multiple networks. There is no such device as a multicast hub

22
Q

You are working at a client site with a managed router that includes a console port for administrative access, which you can use to connect a laptop and run a terminal program to access the device’s interface. Which of the following is the best term for this type of access to the device?

Client-to-site

In-band

Out-of-band

A

Out-of-band

The term out-of-band describes any type of management access to a device that does not go through the production network. Plugging a laptop into the console port avoids the network, so it is considered to be an example of out-of-band management. In-band management describes an access method that does through the production network. Client-to-site is a type of VPN connection, and Bring Your Own Device (BYOD) is a policy defining whether and how users are permitted to connect their personal devices to the network

23
Q

After some incidents of security breaches, you have been asked to draft a revised password policy for the company’s users. Which of the following are typical elements of a corporate password policy? (Choose all correct answers.)

Frequent password changes

Use of special characters

Minimum password length

Unique passwords

A

Frequent password changes

Use of special characters

Minimum password length

Unique passwords

The longer the password, the more difficult it is to guess. Corporate policies typically require passwords of a minimum length. A larger character set also makes a password more difficult to guess, so requiring upper- and lowercase, numeric, and special characters is common. Changing passwords forces the cracking process to start over, so policies typically require frequent password changes and require users to create unique passwords at each change

24
Q

You have a laptop that requires you to hold your finger on a scanner pad before you can use it. A device equipped with a fingerprint scanner that authenticates the user is using which of the following types of technology?

Tamper detection

Biometrics

Hand geometry

A

Biometrics

The technology that uses human physical characteristics to authenticate users is called biometrics. Biometric devices can identify users based on fingerprints, retinal patterns, voice prints, and other characteristics