IS5203 Week -8 quiz

1.WANs connect nodes, such as workstations, servers, printers, and other devices, in a small geographical area on a single network.

‘False’.

2. A drop ceiling could be used by an intruder to gain access to a secured room.

 ‘True’.

3. In general, an API (application programming interface) call is the method an application uses when it makes a request of the OS.

‘True’.

4. Which of the following statements regarding the Point-to-Point (PPP) protocol is NOT accurate?

PPP can support strong encryption, such as AH or ESP.

5. Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?

distributed reflection denial-of-service attack

6. The Wired Equivalent Privacy standard had what significant disadvantage?

 It used a shared encryption key for all clients, and the key might never change.

7. A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

 logic bomb

8. In a cellular network, where does each wireless base station connect to?

They connect to a mobile switching center

9. What 802.11 frame type is involved in association and reassociation, including probe and beacon frames?

 management frames

10. What statement regarding the use of a network attached storage device is accurate?

A NAS can be easily expanded without interrupting service.

11. Which statement regarding the Asynchronous Transfer Mode (ATM) technology is accurate?

ATM can provide 4 levels of QoS, from best effort delivery to guaranteed, real-time transmission.

12. Which statement regarding the use of cable modems is NOT accurate?

Cable modems only operate at the Physical layer of the OSI model.

13. Multimode fiber contains a core that is larger than a single mode fiber core.

True’.

14. What statement regarding the Power Over Ethernet standards is inaccurate?

Power over Ethernet requires CAT6 or better copper cable.

15. With a FQDN of ftp1.dallas.mycompany.com, what part is the domain name?

mycompany.com

16. You can find out where various logs are kept on some UNIX and Linux systems by viewing the /etc/syslog.conf or /etc/rsyslog.conf files.

‘True’.

17. What is NOT one of the ways in which networks are commonly segmented?

by device manufacturer

18. What type of diagram is a graphical representation of a network’s wired infrastructure?

 wiring schematic

19. Near-field communication devices send data at what fixed frequency?

13.56 MHz

20. Your supervisor has asked you to configure a new prototype network with a dual stack configuration. What does this mean?

Both IPv4 and IPv6 protocols will be used on the network.

21. Utilized by China’s so-called “Great Firewall”, what type of attack can prevent user access to web pages, or even redirect them to illegitimate web pages?

denial-of-service attack

22. The C-Band utilized by satellites consists of what frequency range?

3.4 – 6.7 GHz

23. A stateless firewall inspects each incoming packet to determine whether it belongs to a currently active connection.

false

24. Which adaptation of EAP utilizes EAP-MSCHAPv2 inside of an encrypted TLS tunnel?

Protected EAP (PEAP)

25. Most UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.

true

26. Class of Service utilizes 8 levels of priority, and modifies the PCP field in an 802.1Q tag.

true

27. What mail protocol is used to send mail messages to a server?

SMTP

28. A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate configuration.

‘False’.

29. What security encryption protocol requires regular re-establishment of a connection and can be used with any type of TCP/IP transmission?

IPsec

30. Although MPLS can operate over Ethernet frames, it is more often used with other Layer 2 protocols, like those designed for WANs.

true

31. Which SONET OC level is a popular choice for large businesses, and is equivalent to 100 T1s?

OC-3

32. In considering the responsibilities of each layer of the OSI model, what statement accurately reflects those of the Presentation layer?

The Presentation layer is responsible for reformatting, compressing, and/or encrypting data in a way that the application on the receiving end can read.

33. What happens when an NMS uses the SNMP walk command?

The NMS uses get requests to move through sequential rows in the MIB database.

34. How many data streams are used in 802.11ac Wave 2 devices?

4 data streams

35. What IPv6 field is similar to the TTL field in IPv4 packets?

 hop limit

36. Which of the following is an advantage of leasing a frame relay circuit over leasing a dedicated circuit?

You pay only for the bandwidth you require.

37. An IP address of 192.168.18.73/28 has what network ID?

 192.168.18.64

38. When an 802.1Q tag is added to an Ethernet frame, where is it placed?

 It is inserted between the source address and the Ethernet type field.

39. At the root level of the DNS hierarchical structure, 13 clusters of root servers hold information used to locate TLD servers.

True’.

40. An 802.11ac signal can travel for approximately 2 miles from the source.

False’.

41. You have been tasked with maintaining a network that is jumbo frame enabled. What does this mean?

The MTU for the network can be as high as 9198 bytes.

42. The TIA/EIA standard for wall jacks in a work area require that at least one outlet be provided for data and one for voice.

True’.

43. How do routers create a broadcast domain boundary?

 They do not forward broadcast traffic.

44. You have been tasked with the replacement of OSPF with EIGRP throughout your organization, which consists of a mixture of Cisco routers and routers from other vendors. What statement is accurate?

EIGRP may not be available on non-Cisco routers.

45. What type of device can be used to assess the quality of a wireless signal?

spectrum analyzer

46. When using the Routing Information Protocol (RIP), what is the maximum number of hops a message can take between its source and its destination before the destination is considered unreachable?

15

47. A hacker, in the original sense of the word, is someone with technical skill and malicious intent.

‘False’.

48. Both 10GBase-ER and 10GBase-EW have what maximum distance limitation on a segment of single mode fiber?

40km

49. What is the purpose of the Layer 2 LLC sublayer?

It is used to handle multiplexing, flow and error control, and reliability.

50. You have been awarded a contract for wiring a new federal building. What twisted-pair wiring standard must you use?

TIA/EIA 568A

51. A subnet of 255.255.248.0 can be represented by what CIDR notation?

/21

52. Which of the following is an example of encapsulation?

The addition of a header to data inherited from the layer above in the OSI model.

53. A change coordinator functions as what type of manager?

 project manager

54. VMware Player and Linux KVM are both examples of what type of hypervisor?

Type 2 hypervisor

55. What statement correctly identifies the purpose of a software patch?

A software patch is a correction, improvement, or enhancement to software.

56. What is the maximum number of host IP addresses that can exist in a Class B network?

 65,534

57. What is the purpose of the checksum TCP field?

It allows the receiving node to determine whether the TCP segment became corrupted during transmission.

58. When using IPv6, two or more nodes on the same link are said to be neighbors.

True’.

59. When using IPv6, two or more nodes on the same link are said to be neighbors.

‘True’.

60. When using a host-based intrusion detection system, what additional feature might be available to alert the system of any changes made to files that shouldn’t change?

file integrity monitoring (FIM)

61. Each managed object on a managed device using SNMP is assigned which of the following?

object identifier (OID)

62. Which statement regarding the use of a bridged mode vNIC is accurate?

The vNIC will its own IP address on the physical LAN.

63. Which command will produce statistics about each message transmitted by a host, separated according to protocol type?

netstat -s

64. What Application layer protocol can be used to monitor and gather information about network traffic and can alert network administrators about adverse conditions that need attention?

SNMP

65. Which of the following statements correctly describes the malware characteristic of polymorphism?

 Polymorphic malware can change its characteristics every time it is transferred to a new system.

66. Telephone connections follow what registered jack standard?

 registered jack 11 (RJ-11)

67. Of the three methods of access control (RBAC, DAC, and MAC), RBAC is the least secure of the options.

‘False’.

68. By default, what network connection type is selected when creating a VM in VMware, VirtualBox, or KVM?

NAT mode

69. What statement regarding the SSH (Secure Shell) collection of protocols is accurate?

SSH supports port forwarding.

70. The protocol data unit for the Physical layer of the OSI model is payload, or data.

 ‘False’.

71. A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

tailgating

72. What statement regarding main distribution frame or main distribution facilities is accurate?

The MDF is the centralized point of interconnection for an organization’s LAN or WAN.

73. Upon connecting to a Wi-Fi network, you’re redirected to a login screen and a request to accept terms of service before being connected. What is this an example of?

captive portal

74. What command can you utilize to display TCP/IP configuration information for each network adapter installed?

 ipconfig /all

75. Which of the following is an example of proxy server software?

Squid

76. All wireless signals are carried through the air by electromagnetic waves.

True’.

77. Which of the following suggestions can help prevent VLAN hopping attacks on a network?

Disable auto trunking and move native VLANs to unused VLANs.

78. A dedicated telephone switch or virtual switching device that connects and manages calls within a private organization, and manages call connections that exit the network through a VoIP gateway, is known by what term?

 VoIP PBX (private branch exchange)

79. Once a device has failed, what metric measures the average amount of time to repair?

mean time to repair (MTTR)

80. Fiber-optic cable comes in two types: single-mode fiber (SMF) or multimode fiber (MMF).

true

81. Which of the following statements describes a worm?

A program that runs independently of other software and travels between computers and across networks.

82. The Border Gateway Protocol is considered to be a hybrid routing protocol.

‘True’.

83. The HTTPS (HTTP Secure) protocol utilizes the same TCP port as HTTP, port 80.

 ‘False’.

84. What command can be used to check a domain computer’s time source from a Command Prompt window?

w32tm /query /source

85. Which statement does NOT accurately describe characteristics of the OSPF protocol?

 OSPF requires very little CPU or memory resources.

86. All that is needed to provide communication between two VLANs is a DHCP relay agent.

false

87. The 802.11 standard specifies the use of what technique in order to minimize the potential for collisions?

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

88. The Data Link Layer utilizes what name for its protocol data unit (PDU)?

 frame

89. In order to identify the transmissions that belong to each VLAN, a switch will add a tag to Ethernet frames that identifies the port through which they arrive at the switch.

True’.

90. An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

True’.

91. What tcpdump command can be used to filter out all traffic except SSH traffic?

 tcpdump port 22

92. What type of IPv6 address is fe80::8cf1:2c42:ffde:da1c?

link local address

93. On a Cisco switch, what would the security association identifier be for VLAN 13?

100013

94. Which statement accurately describes what near end crosstalk (NEXT) is?

NEXT is crosstalk that occurs between wire pairs near the source of a signal.

95. What type of documentation tool is a website that can be edited by users, allowing them to add files and photos and links between pages?

wiki

96. What 3-bit field in a 802.1Q tag is modified to set a frame’s Class of Service (CoS)?

Priority Code Point (PCP)

97. A typical fiber termination kit should include what tool for cutting a clean slice through fiber strands?

 fiber cleaver

98. What text editor can be used on Linux to view and edit the contents of a configuration file?

 vim

99. When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes the connection between sites?

VPN gateway

100. You have been asked by your superior to configure all Cisco network switches to allow only acceptable MAC addresses through switch access ports. How is this accomplished?

Use the switchport port-security command to enable MAC filtering.

101. How does refraction affect the propagation of a wireless transmission?

 It distorts the signal as it travels into and through a different transmission medium.

102. In a red team-blue team exercise, what is the purpose of the blue team?

The blue team is charged with the defense of the network.

103. What is a data-link connection identifier (DLCI) utilized for?

It is used by routers to determine which circuit to forward a frame to in a frame relay network.

104. Signals that can travel in only one direction on a medium are referred to as what type of signal?

simplex

105. In order to generate a public and private key for use with SSH, what command line utility should you use?

ssh-keygen

106. What statement correctly describes a stateless firewall?

A stateless firewall manages each incoming packet as a stand-alone entity, without regard to currently active connections.

107. The Wireless Personal Area Network (WPAN) is defined in the 802.15 standard.

True’.

108. What occurs when a collision happens on a network?

 Each node on the network waits a random amount of time and then resends the transmission.

109. Why should you not leave more than 1 inch of exposed cable before a twisted-pair termination?

The exposure of the cable can cause transmission interference between wires.

110. When using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?

expedited forwarding

111. How many subnets can a /48 site prefix support?

65,536 subnets

112. The TCP and UDP protocols both exist at what layer of the OSI model?

Transport

113.In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model?

 Application

114. On a Linux-based system, what command can be used to display TCP/IP information associated with every interface on the system?

 ifconfig -a

115. A time domain reflectometer sends a signal and analyzes the return signal’s change in amplitude to determine where cable imperfections may exist.

True’.

116. RG-59 is more expensive than RG-6, but has better resistance to attenuation.

‘False’.

117. What kind of document serves as a legally binding contract or part of a contract that defines, in plain language and in measurable terms, the aspects of a service provided to a customer?

service-level agreement

118. The term malware is derived from a combination of the words malicious and software.

True’.

119. Which of the following is not one of the disadvantages of peer-to-peer networks?

 They centralize user account logins.

120. Which of the following terms is used to describe the configuration of a port to copy all traffic passing through the switch to the device at the other end of the port?

port mirroring

Other Links:

Statistics Quiz

Networking Quiz

See other websites for quiz:

Check on QUIZLET

Check on CHEGG

Leave a Reply

Your email address will not be published. Required fields are marked *