IS5203 QUIZ 4

  1. 1000 Mbps is known as 1000 terabytes per second.  False. 
  2. 100BaseFX runs over Category 5e cable.  False
  3. 100BaseFX runs over multimode fiber-optic (MMF) cable   True
  4. 100BaseTX uses how many pairs of Category 5 unshielded twistedpair (UTP) cables?  Two pairs
  5. 32-bit is a valid Wired Equivalent Privacy (WEP) key.   False
  6. A company is in the process of upgrading its network infrastructure to support new VoIP telephony equipment where power won’t always be available for the phones. What is a primary feature to consider when selecting a new switch to support the phones?  PoE
  7. A denial of service (DoS) attack is meant to prevent users from accessing a system.  True
  8.  A mesh network has the least collisions.  True
  9. A rogue access point is where a switch has been installed on a network without the administrator’s knowledge.  False. 
  10. A security procedure defines the appropriate response to a security event on your network.  True
  11. A technician has just finished implementing a solution for a network that was implemented. What steps should the technician do next?  Verify the solution and, finally, document the issue and the solution issue.
  12. A technician is extending a data circuit to the other side of the building. What would the technician set up at the new location?  IDF
  13. A technician pings 127.0.0.1 and gets the following result: “Unable to contact IP driver, error code 2.” What should you do now?  Reinstall the TCP/IP protocol
  14. A user is booting a workstation and receives a message that a duplicate IP address is in use on the network. Which command could be used to troubleshoot the problem?  Arp
  15. A valid Media Access Control (MAC) address is how many bytes long?   6
  16. ADSL means that the uplink and download speeds of a DSL link are the same.  False
  17. An IT specialist is going to implement a packet filter on a network. What port must they allow through the firewall for users to connect to the Web?  80 for Internet connections.
  18. At what layer of the Open Systems Interconnection (OSI) model does a router function?  Network
  19. At what layer of the OSI model does UDP reside?  Transport
  20. At what two layers of the Open Systems Interconnection (OSI) model does a packet-filtering firewall operate?  Network and Transport
  21. Converting analog signals to digital signals and digital signals to analog signals can be done using what device?  Modem
  22.  DSL is used to connect hosts to an Ethernet hub.  False
  23. EIGRP has no version that supports IPv6.  False
  24.  EIGRP uses hop count as a metric to determine the best path to a remote network.  False
  25. How many pairs are crossed in a crossover cable?  Two
  26. In which layer of the OSI model does IPSec operate?  Network (Layer 3)
  27. In which OSI layer does a bridge operate?  Data Link
  28. Internet Protocol version 6 (IPv6) uses 128-bit addresses.  True
  29. IP spoofing is the process of sending a packet with a fake source address, pretending that the packet is coming from within the network the hacker is trying to attack.  True
  30. One of the purposes of a virtual local area network (VLAN) is to add more users.  False.
  31. OSPF can be used only on Cisco routers.  False
  32. RIPv2 is a hybrid routing protocol.  False
  33. SDSL means that your download and upload speeds on the line are different.  False
  34. The maximum segment length for Ethernet is __________.  100 meters (328 feet)
  35. Using a wireless access point (WAP), you can bridge an 802.3 network to an 802.11 network.  True
  36. UTP Ethernet networking is known as a physical ___________________ topology.  Star
  37. What are the three main types of intruder detection and defense?  Active detection, passive detection, proactive defense
  38. What defines how security will be implemented in an organization, including physical security, document security, and network security?  Security policy
  39. What device connects computers with wireless adapters to a network in infrastructure mode?  Access point
  40. What devices allow segregation of collision domains but not broadcasting domains?  Switches
  41. What does the acronym IDS stand for?  Intrusion detection system
  42. What does the acronym IS-IS stand for?  Intermediate System-to-Intermediate System
  43. What encryption protocol or standard allows you to create a virtual subnet on an intranet?  SSL VPN
  44. What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber?  Mechanical transfer registered jack (MT-RJ)
  45. What functionality does Kerberos provide?  Authentication of security principles and authorization of access to resources
  46. What is part of the IP suite and is used to monitor network-managed devices?  SNMP
  47. What is the default port for HTTPS?  443
  48. What is the Internet Protocol version 4 (IPv4) loopback address?   127.0.0.1
  49. What is the maximum speed of 802.11g?  54 Mbps (megabits per second)
  50. What is the maximum transmission distance of 10GBaseLR?  6 miles (10 kilometers)
  51. What is the term for a device that shares its resources with other network devices?  Server
  52. What protocol creates a secure connection between a web browser and a web server using Telnet?  Secure Sockets Layer (SSL)
  53. What tool would be used to test for a break in a fiber connection on the network?  OTDR
  54. What WAN protocol is described as residing in Layer 2.5 of the OSI model?  MPLS
  55. What well-known port does Trivial File Transfer Protocol (TFTP) use?  69
  56. Which command-line tools would be used to verify DNS functionality?  dig or nslookup
  57. Which is a topology used in networks for its scalability?  Star
  58. Which monitoring software is used to view a network at the frame sniffer level?  Packet
  59. Which nbtstat switch displays a list of all the NetBIOS IP addresses on the local workstation?  nbtstat -S
  60. Which nbtstat switch displays a list of all the NetBIOS names on the local workstation?  nbtstat -s
  61. Which system detects and reports attempts of unauthorized access to the network?  IDS
  62. Which two software types would be used for identifying an attack?  IDS and IPS
  63. Which type of connector does a 10BaseFL network use?  Straight tip (ST)
  64. Which type of virus attacks executable application and system program files?  File virus
  65. Which user-authentication method uses a public key and private key pair?  PKI
  66. Will a computer that shares no resources most likely be connected to the backbone or to a segment?    Segment
  67. You need your IP address, subnet mask, default gateway, and DNS information. What command will you type from a Windows command prompt?  ipconfig /all

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *