Study Cards Flashcards

1
Q

The length of time a computer is allowed to use a dynamic Internet Protocol (IP) address provided by a DHCP server is known as the ________.

A

Lease Time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True/False: A Network collision happens when two devices attempt to communicate on the same physical segment at the same time.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False: A Firewall can permit, deny, encrypt, decrypt and proxy all computer traffic that flows through it.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False: Firewalls are not usually a combination of hardware and software.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of security device or software employs a redirection device known as a honeypot.

A

IPS (Intrusion Prevention System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Type of firewall keeps track of existing connections passing through it?

A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

A

Content Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a firewall’s list of rules, which it uses to block traffic?

A

Access Control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you want to allow remote access to 500 users, which type of device is recommended?

A

VPN Concertrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a security zone that allows public traffic but is isolated from the private network called?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which unsecure protocol uses port 80 by default?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is 192.168 in Binary?

A

1100000.1010100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What port number does Secure Shell (SSH) use by default?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Logging, notification, and shunning are what types of reactions from type of security device?

A

Passive reactions from an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True/False: A demilitarized zone (DMZ) is a network segment that is neither public nor local but halfway between.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You add a new cable to your network. What document do you update?

A

Wiring schematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

True/False: An intrusion detection system replaces a firewall on your network.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True/False: An intrusion detection system (IDS) can detect within encrypted traffic.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

An Intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

192.168.10.28/28 is an example of which kind of notation?

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which terminal emulation program is insecure because it does not encrypt any data including usernames and passwords?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which network topology has the most physical connections per host, which means it will have the least collisions?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a Class C Address, a network ID is how man bits?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

100BaseTF uses what type of cable medium?

A

Ethernet over Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A UTP cable running 1000Mbps can be a maximum distance of ________.

A

100 Meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How can you verify that your DMZ is allowing TCP ports through?

A

Telnet to the ports in question on the DMZ server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True/False: A parabolic is a type of omnidirectional antenna.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True/False: A dipole is an omnidirectional antenna.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A network administrator is going to implement a packet filter on a network for Internet connections. What port must be allowed through the firewall for users to connect to secure websites?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What protocol is used within a ping command?

A

ICMP

34
Q

True/False: A repeater can be used to cache web pages for future retrieval.

A

False

35
Q

True/False: A proxy service can be used to cache web pages for future retrieval.

A

True

36
Q

What device can measure the time a signal goes down and back on a cable?

A

TDR

37
Q

What device connects a local area network (LAN) to a T1 circuit?

A

Channel service unit/data service unit (CSU/DSU)

38
Q

A OTDR is used to test what?

A

Fiber

39
Q

When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?

A

Converged

40
Q

Which two protocols allow secure access to a VPN?

A

PPTP and IPSec

41
Q

What tool is used to connect an RJ-45 to a UTP?

A

Crimped

42
Q

What wire pairs connect to a 66 block from the telecommunication company?

A

25 pair

43
Q

Implementing policies and procedures that define how corporate information is kept confidential and training on these procedures can help prevent what?

A

Social engineering

44
Q

At what layer of the Open Systems Interconnect (OSI) model does a router function?

A

Network, Layer 3

45
Q

Which TCP/IP well-known port number identifies Simple Mail Transfer Protocol (SMTP)?

A

25

46
Q

Which routing protocol uses a next hop as a metric in deciding how to route traffic?

A

RIP

47
Q

True/False: 156.144.226.123 is a valid IP Address?

A

True

48
Q

Which device monitors inbound and outbound network connections in order to identify suspicious activity?

A

IDS

49
Q

True/False: The Transport Layer converts digital data into electronic signals to be put on a wire?

A

False

50
Q

Which two commands can you type to see the DNS servers that your computer is using?

A

ipconfig and nslookup

51
Q

True/False: Internet Protocol Security (IPSec) encrypts data between web browsers and web servers.

A

False

52
Q

Which device or software can identify and react to an attack by shutting down a port or dropping certain type of packets?

A

IPS

53
Q

True/False: Using Domain Name Service (DNS) will segment a network.

A

False

54
Q

True/False: TCP is connection-oriented and UDP is unreliable.

A

True

55
Q

When configuring a wireless access point, what should you considering when selecting a channel?

A

Select a channel farthest from that of any other AP in the area.

56
Q

What does SNMP provide?

A

Automated alerts and reports on network devices.

57
Q

Your boss tells you to block certain ports on your firewall. What documentation do you need to update.

A

Policies, Procedures, and configurations

58
Q

You need to provide inter-VLAN communications. what device do you need?

A

A Layer 3 Switch (ROuter)

59
Q

True/False: Antivirus (AV) software will help protect a computer from hackers.

A

False

60
Q

True/False: Antivirus (AV) software will help protect a computer from Trojan horses.

A

True

61
Q

A packet-filtering firewall operates at which of the OSI Model?

A

Transport and Network

62
Q

True/False: A Packet-filtering firewall operates at the Network and Data Link layers of the OSE Model.

A

False

63
Q

Which networking topology connects computers via a central device?

A

Star

64
Q

True/False: A Ring networking topology connects computers via a central hub.

A

False

65
Q

True/False: A cable modem selectively forwards data packets.

A

False

66
Q

True/False: A bridge can selective forward data packets.

A

True

67
Q

True/False: A Bridge is a network device that operates at Layer 2 of the OSI model.

A

True

68
Q

True/False: A switch is a network device that operates at the Layer 2 of the OSI model.

A

True

69
Q

True/False: A hub and a repeater operate at Layer 2 of the OSI Model.

A

False

70
Q

True/False: A Hub and a Switch operate at the same layer of the OSI Model.

A

False

71
Q

True/False: A router and a bridge operate at the same layer of the OSI Model.

A

False

72
Q

What is 0110001.00011010 in decimal?

A

99.26

73
Q

A company wants to have intranet. Where would the intranet web server be located in the network?

A

In the local area network (LAN), usually behind the wire wall to the WAN.

74
Q

True/False: A networking administrator wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.

A

False

75
Q

True/False: A Hub and a router operate at the same layer of the OSI model.

A

False

76
Q

HTTPS uses what TCP destination port number?

A

443

77
Q

True/False: Virtual local area networks (VLANS) create collision domains.

A

False