Pre-Assessment Flashcards

1
Q

Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length?

A

CAT 6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which device is used to organize network cables as they run between switches and other network devices?

A

Patch panel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which network device is used to connect two or more network segments by performing OSI layer 3 functions like packet-forwarding?

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which OSI layer is related to the function of the IP protocol suite?

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which OSI layer is responsible for organizing how bits are passed over the physical layer between devices within the same collision domain?

A

Data link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command should be used to manually enter the default gateway for a computer?

A

route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of medium is commonly used within a 1000 Mbps Ethernet network?

A

CAT5e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which cloud service provides hardware, operating systems, and web servers but not end-user applications?

A

PaaS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations?

A

Community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A user on a network is planning to launch an exploit against a coworker in a neighboring department. The user needs to identify the IP address of a coworker in the desired department.

Which tool or utility will allow the user to watch network traffic in real time to identify a target?

A

Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of attack exploits an unpatched software vulnerability?

A

Zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attacker plans to exploit flaws in an operating system to gain access to a user’s computer system.

What is a prevention mechanism for this type of attack?

A

Patching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A malicious user was able to lock a user’s account after guessing the user’s password multiple times unsuccessfully.

Which category of the CIA triad did the malicious user target in this attack?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of firewall initiates a new connection on behalf of the client and presents its own IP to the server when a client initiates a connection to a server?

A

Circuit level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which feature of a firewall allows an organization to use private non-routable networks while enabling communication to the internet?

A

Port Address Translation (PAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the meaning of “state” when referring to the stateful inspection in firewalls?

a) It refers to the connection state of a conversation between two computers
b) It refers to the connection state of a computer to the network.
c) It refers to the two firewall rules needed, one for the sender and one for the recipient.
d) It refers to the inspection of the traffic payload and forwarding on to its destination.

A

a) It refers to the connection state of a conversation between two computers

17
Q

Which type of port has access to all VLANs by default in a traditional layer 2 switch?

A

Trunk

18
Q

Which statement is true when comparing AES encryption to Triple DES (3DES)?

a) 3DES is a superior encryption protocol due to the triple nature.
b) AES requires less CPU utilization and uses a larger block size than 3DES.
c) 3DES requires less CPU utilization and uses a larger block size than AES.
d) AES was designed to run on high-end hardware, ensuring speedy throughput.

A

b) AES requires less CPU utilization and uses a larger block size than 3DES.

19
Q

Which type of firewall technology reads and analyzes the actual content of a message before forwarding to its destination?

A

Proxy servers

20
Q

Which phrase describes unencrypted data?

A

In the clear

21
Q

A user is mistakenly granted access to customer accounts not required for his duties.

Which component of the AAA model is violated?

A

Authorization

22
Q

Which type of Ethernet cable can maintain 10Gbps transmission speeds through the course of its maximum 100-meter length?

A

CAT 6a

23
Q

Which device is used to organize network cables as they run between switches and other network devices?

A

Patch panel

24
Q

Which network device is used to convert between digital information from a LAN and analog signals for transmission over a standard telephone wire?

A

Modem

25
Q

Which command should be used to manually enter the default gateway for a computer?

A

route

26
Q

What type of medium is commonly used within a 1000 Mbps Ethernet network?

A

CAT5e

27
Q

In which physical LAN topology are nodes connected to each other with a backbone cable that loops around and ends at the same point it started?

A

Ring

28
Q

Which cloud model provides an exclusive cloud computing service environment that is shared between two or more organizations?

A

Community

29
Q

A company has the policy that all new user passwords are P@ssw0rd but does not require new users to change their password. An employee randomly tries a coworker’s account with the new user password to see if they can log in as the coworker.

Which type of vulnerability does this create?

A

Default Password

30
Q

Which type of firewall initiates a new connection on behalf of the client and presents its own IP to the server when a client initiates a connection to a server?

A

Circuit level

31
Q

Which feature of a firewall allows an organization to use private non-routable networks while enabling communication to the internet?

A

PAT

32
Q

What does PAT stand for?

A

Port Address Translation

33
Q

What is the meaning of “state” when referring to stateful inspection in firewalls?

A

The connection state of a conversation between two computers (not a computer to the network)

34
Q

A company provides access to employee’s tax and personal information via a public-facing web portal.

What should the company implement to encrypt employees’ web access to this information?

A

TLS

35
Q

What does TLS stand for?

A

transport layer security

36
Q

What does NIDS stand for?

A

network intrusion detection system

37
Q

What does AES stand for?

A

advanced encryption standard

38
Q

Which type of port has access to all VLANs by default in a traditional layer 2 switch?

A

Trunk

39
Q

Which type of firewall technology reads and analyzes the actual content of a message before forwarding to its destination?

A

Proxy servers