- 1000 Mbps is known as 1000 terabytes per second. False.
- 100BaseFX runs over Category 5e cable. False
- 100BaseFX runs over multimode fiber-optic (MMF) cable True
- 100BaseTX uses how many pairs of Category 5 unshielded twistedpair (UTP) cables? Two pairs
- 32-bit is a valid Wired Equivalent Privacy (WEP) key. False
- A company is in the process of upgrading its network infrastructure to support new VoIP telephony equipment where power won’t always be available for the phones. What is a primary feature to consider when selecting a new switch to support the phones? PoE
- A denial of service (DoS) attack is meant to prevent users from accessing a system. True
- A mesh network has the least collisions. True
- A rogue access point is where a switch has been installed on a network without the administrator’s knowledge. False.
- A security procedure defines the appropriate response to a security event on your network. True
- A technician has just finished implementing a solution for a network that was implemented. What steps should the technician do next? Verify the solution and, finally, document the issue and the solution issue.
- A technician is extending a data circuit to the other side of the building. What would the technician set up at the new location? IDF
- A technician pings 127.0.0.1 and gets the following result: “Unable to contact IP driver, error code 2.” What should you do now? Reinstall the TCP/IP protocol
- A user is booting a workstation and receives a message that a duplicate IP address is in use on the network. Which command could be used to troubleshoot the problem? Arp
- A valid Media Access Control (MAC) address is how many bytes long? 6
- ADSL means that the uplink and download speeds of a DSL link are the same. False
- An IT specialist is going to implement a packet filter on a network. What port must they allow through the firewall for users to connect to the Web? 80 for Internet connections.
- At what layer of the Open Systems Interconnection (OSI) model does a router function? Network
- At what layer of the OSI model does UDP reside? Transport
- At what two layers of the Open Systems Interconnection (OSI) model does a packet-filtering firewall operate? Network and Transport
- Converting analog signals to digital signals and digital signals to analog signals can be done using what device? Modem
- DSL is used to connect hosts to an Ethernet hub. False
- EIGRP has no version that supports IPv6. False
- EIGRP uses hop count as a metric to determine the best path to a remote network. False
- How many pairs are crossed in a crossover cable? Two
- In which layer of the OSI model does IPSec operate? Network (Layer 3)
- In which OSI layer does a bridge operate? Data Link
- Internet Protocol version 6 (IPv6) uses 128-bit addresses. True
- IP spoofing is the process of sending a packet with a fake source address, pretending that the packet is coming from within the network the hacker is trying to attack. True
- One of the purposes of a virtual local area network (VLAN) is to add more users. False.
- OSPF can be used only on Cisco routers. False
- RIPv2 is a hybrid routing protocol. False
- SDSL means that your download and upload speeds on the line are different. False
- The maximum segment length for Ethernet is __________. 100 meters (328 feet)
- Using a wireless access point (WAP), you can bridge an 802.3 network to an 802.11 network. True
- UTP Ethernet networking is known as a physical ___________________ topology. Star
- What are the three main types of intruder detection and defense? Active detection, passive detection, proactive defense
- What defines how security will be implemented in an organization, including physical security, document security, and network security? Security policy
- What device connects computers with wireless adapters to a network in infrastructure mode? Access point
- What devices allow segregation of collision domains but not broadcasting domains? Switches
- What does the acronym IDS stand for? Intrusion detection system
- What does the acronym IS-IS stand for? Intermediate System-to-Intermediate System
- What encryption protocol or standard allows you to create a virtual subnet on an intranet? SSL VPN
- What fiber connector looks similar to an RJ-45 connector and connects two strands of fiber? Mechanical transfer registered jack (MT-RJ)
- What functionality does Kerberos provide? Authentication of security principles and authorization of access to resources
- What is part of the IP suite and is used to monitor network-managed devices? SNMP
- What is the default port for HTTPS? 443
- What is the Internet Protocol version 4 (IPv4) loopback address? 127.0.0.1
- What is the maximum speed of 802.11g? 54 Mbps (megabits per second)
- What is the maximum transmission distance of 10GBaseLR? 6 miles (10 kilometers)
- What is the term for a device that shares its resources with other network devices? Server
- What protocol creates a secure connection between a web browser and a web server using Telnet? Secure Sockets Layer (SSL)
- What tool would be used to test for a break in a fiber connection on the network? OTDR
- What WAN protocol is described as residing in Layer 2.5 of the OSI model? MPLS
- What well-known port does Trivial File Transfer Protocol (TFTP) use? 69
- Which command-line tools would be used to verify DNS functionality? dig or nslookup
- Which is a topology used in networks for its scalability? Star
- Which monitoring software is used to view a network at the frame sniffer level? Packet
- Which nbtstat switch displays a list of all the NetBIOS IP addresses on the local workstation? nbtstat -S
- Which nbtstat switch displays a list of all the NetBIOS names on the local workstation? nbtstat -s
- Which system detects and reports attempts of unauthorized access to the network? IDS
- Which two software types would be used for identifying an attack? IDS and IPS
- Which type of connector does a 10BaseFL network use? Straight tip (ST)
- Which type of virus attacks executable application and system program files? File virus
- Which user-authentication method uses a public key and private key pair? PKI
- Will a computer that shares no resources most likely be connected to the backbone or to a segment? Segment
- You need your IP address, subnet mask, default gateway, and DNS information. What command will you type from a Windows command prompt? ipconfig /all
Other Links:
See other websites for quiz:
Check on QUIZLET