Study CND Flashcards
What is the bit size of the Next Header field in the IPv6 header format?
8 Bits
Which of the following is a presentation layer protocol? A. TCP B. RPC C. BGP D. LWAPP
Answer: D
LWAPP
What IEEE standard is Fast Basic Service Set Transition? And what does it do?
802.11r is the standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure handoffs from one base station to another, managed in a seamless manner.
__________ is a congestion control mechanism that is designed for unicast flows operating in an Internet environment and competing with TCP traffic?
TCP Friendly Rate Control
What is the IEEE-SA for wireless personal area networks?
802.15
Which layer performs routing of IP datagrams?
Internet Layer
Which of the following layers performs routing of IP datagrams? A. Transport layer B. Link layer C. Application layer D. Internet layer
Internet layer
Answer: D
Which of the following standards defines Logical Link Control (LLC)? A. 802.2 B. 802.3 C. 802.5 D. 802.4
802.2
Answer: A
Which of the following protocols supports source-specific multicast (SSM)? A. DHCP B. ARP C. DNS D. BGMP
BGMP
Answer: D
Token Ring is standardized by which of the following IEEE standards? A. 802.2 B. 802.4 C. 802.3 D. 802.1
802.4 is the standard for Token Ring
Answer: B
Which of the following is an example of a network providing DQDB access methods? A. IEEE 802.3 B. IEEE 802.2 C. IEEE 802.4 D. IEEE 802.6
802.6 - Local and Metropolitan Area Networks: Distributed Queue Dual Bus (DQDB) Subnetwork of a Metropolitan Area Network (MAN)
Answer: D
Which of the following IEEE standards defines the demand priority access method? A. 802.15 B. 802.3 C. 802.12 D. 802.11
802.12
Answer: C
has to do with 100 Mbit Wifi on demand access. Probably not on the test. MAN
Which of the following IEEE standards adds QoS features and multimedia support? A. 802.11b B. 802.11e C. 802.5 D. 802.11a
802.11e
Answer: B
Which of the following OSI layers is sometimes called the syntax layer?
Presentation layer
Which of the following IEEE standards defines the token passing ring topology? A. 802.4 B. 802.5 C. 802.3 D. 802.7
802.5
Answer: B
Which of the following IEEE standards defines a physical bus topology? A. 802.4 B. 802.5 C. 802.6 D. 802.3
802.4
Answer: A
Which of the following fields in the IPv6 header replaces the TTL field in the IPv4 header? A. Next header B. Traffic class C. Hop limit D. Version
Hop Limit
Answer: C
What is the response of an Xmas scan if a port is either open or filtered? A. RST B. No response C. FIN D. PUSH
NO Response
Answer: B
CSMA/CD is specified in which IEEE standard?
802.3
Which of the following protocols sends a jam signal when a collision is detected?
CSMA/CD
Which of the following protocols is used in wireless networks? A. CSMA B. CSMA/CD C. ALOHA D. CSMA/CA
CSMA/CA
Answer: D
TCP SYN scanning is also known as
half-open scanning
You are a professional Computer Hacking forensic investigator. You have been called to collect
evidences of buffer overflow and cookie snooping attacks. Which of the following logs will you
review to accomplish the task?
A. Program logs
B. Web server logs
C. Event logs
D. System logs
A. Program logs
C. Event logs
D. System logs
Answer: D, C, and A
Jason diagnoses the internals of his computer and observes that some changes have
been made in Sam’s computer registry. To rectify the issue, Jason has to restore the registry. Which of
the following utilities can Jason use to accomplish the task? Each correct answer represents a
complete solution. Choose all that apply.
A. Reg.exe
B. EventCombMT
C. Regedit.exe
D. Resplendent registrar
A. Reg.exe
C. Regedit.exe
D. Resplendent registrar