2 - Telecommunications and Network Security Flashcards

1
Q

1.Whichprotocolprovidesfull-duplex,connectionoriented,andreliablecommunicationsoveravirtualcircuit?a.TCPb.UDPc.IPd.ICMP

A

A: TCP provides full-duplex, connection oriented, reliable communications over a virtual circuit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

2.WhichofthefollowingisnotoneofthefourlayersoftheTCP/IPmodel?a.Applicationb.Sessionc.Internetd.NetworkAccess

A

B: Session is not one of the four layers of the TCP/IP model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.WhatisusedbybothTCPandUDPtotrackmultiplecommunicationsthatoccuroverthesamenetworkinterfacesimultaneously?a.IPaddressb.MACaddressc.Portaddressd.Applicationorserviceprotocol

A

C: The port address is used by both TCP and UDP to track multiple communication sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

4.HowislogicalcommunicationaccomplishedbetweenpeerlayersoftheOSImodel?a.Encapsulationb.Remoteprocedurecallsc.Memoryaddressingd.Packetswapping

A

A: Peer layers of the OSI model are able to logically communicate through encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5.WhichofthefollowingisthecorrectorderoftheOSImodellayersfromlayerseventolayerone?a.Physical,DataLink,Network,Transport,Session,Presentation,Applicationb.Application,Presentation,Session,Transport,Network,DataLink,Physical.c.Physical,Network,Session,Transport,DataLink,Presentation,Applicationd.Application,Presentation,DataLink,Transport,Session,Network,Physical

A

B: The correct order of the layers of the OSI model starting with Layer 7 is Application, Presentation, Session, Transport, Network, Data Link, Physical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

6.AtwhatlayeroftheOSImodeldoesUDPoperate?a.Applicationb.Sessionc.Transportd.Network

A

C: UDP operates at the transport layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

7.AtwhatlayeroftheOSImodeldoestheIPprotocoloperate?a.Presentationb.Sessionc.Transportd.Network

A

D: The IP protocol operates at the Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

8.WhichofthefollowingisnotatrueorvalidcharacteristicoftheTCPprotocol?a.Connectionlessb.Fullduplexc.Usesacknowledgementsd.Sequencedsegments

A

A: TCP is connection-oriented, not connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

9.AtwhatlayeroftheTCP/IPmodelisdatacalledasegment?a.Applicationlayerb.Host-to-HostorTransportlayerc.InternetorNetworklayerd.NetworkAccesslayer

A

B: At the Host-to-Host or Transport layer data is called a segment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

10.Theoccurrenceofelectronicsignalsspillingoverfromonewiretoanotherisknownas?a.attenuationb.noisec.crosstalkd.superzaping

A

C: Crosstalk is the occurrence of electronic signals spilling over from one wire to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

11.WhatTCP/IPsub-protocolcanbeusedtotransferfilesbutrequiresnoauthentication?a.Telnetb.BootPc.LPDd.TFTP

A

D: TFTP is used to transfer files but does not use authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

12.WhichofthefollowingisnotpartoftheTCPhandshakeusedtoinitiateacommunicationsconnection?a.FINb.ACKc.SYNd.SYN/ACK

A

A: FIN is only used to terminate an existing TCP communications link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

13.AtwhatlayerisdatalabeledasegmentwithintheTCP/IPmodel?a.Applicationb.Host-to-Hostc.Internetd.NetworkAccess

A

B: The data is labeled a segment in the host-to-host layer of the TCP/IP model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

14.Whatistheabstractprotocolmodelthatiswidelyusedasthestandardframeworkfordesigningapplicationsandnetworkprotocols?a.Clark-Wilsonmodelb.OSImodelc.NetBIOSd.MACaddressing

A

B: The OSI model is the abstract protocol model that is widely used as the standard framework for designing applications and network protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

15.ThethirdlayeroftheOSImodelis?a.Sessionb.Transportc.Networkd.DataLink

A

C: The Network layer is the third layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.SSL(securesocketslayer)operatesatwhatleveloftheOSImodel?a.Networkb.Transportc.DataLinkd.Session

A

B: SSL (secure sockets layer) operates at the transport level of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

17.EthernetisanexampleofwhattypeofLANtransmissionprotocol?a.Broadbandb.CSMAc.CSMA/CAd.CSMA/CD

A

D: Ethernet is a CSMA/CD Carrier-Sense multiple Access with Collision Detection LAN transmission protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

18.Whattypeoffirewallisabletoself-modifyitstrafficfilters?a.Dynamicpacketfilteringb.Kernelproxyc.Statefulinspectiond.Applicationlevel

A

A: A dynamic packet filtering firewall is able to self-modify its traffic filters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

19.LogicalcommunicationbetweenpeerlayersoftheOSImodelaremadepossiblethroughtheuseof?a.encapsulationb.remoteprocedurecallsc.directaddressingd.broadcasts

A

A: Logical communication between peer layers of the OSI model are made possible through the use of encapsulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

20.Whichofthefollowingcannotbeusedtoexchangefiles?a.FTPb.NFSc.TFTPd.Telnet

A

D: Telnet cannot be used to exchange files, rather it is limited to running applications or commands remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

21.Whichofthefollowingprotocolsisusedfore-mail?a.SMTPb.LPDc.SNMPd.BootP

A

A: SMTP or Simple Mail Transport Protocol is used to transmit e-mail from server to server and from client to server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

22.WhatisthelastcommunicationbetweentwosystemsoveraTCP/IPconnectionbeforeactualdatacanbeexchanged?a.FINb.ACKc.SYN/ACKd.SYN

A

B: ACK is the third and final element of the three-way handshake that establishes a communication link between two systems. Once the ACK is received, actual data can be communicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

23.WhichofthefollowingisnotasecurityserviceusedtoprotectOSIcommunications?a.auditingb.authenticationc.dataintegrityd.packetreceiptacknowledgement

A

A: Auditing is not a security service used to protect OSI communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

24.TCPprovidesforallbutwhichofthefollowing?a.full-duplexcommunicationsb.connectionlesscommunicationsc.dataflowmanagementthroughslidingwindowsd.reliablecommunicationvirtualcircuits

A

B: TCP is connection oriented, UDP is connectionless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

25.Whichofthefollowingusesacknowledgementstoensurethatdataisdeliveredtotherecipient?a.UDPb.IPc.TCPd.TFTP

A

C: TCP is a reliable communications protocol since it does not use acknowledgements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

26.Whichofthefollowingtechnologiesisbasebandinsteadofbroadband?a.ATMb.ISDNc.DSLd.Ethernet

A

D: Ethernet is a baseband communication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

27.Thetypeofnetworktransmissionthatoriginatesfromasinglesourcebutisdirectedtowardmultiplespecificdestinationsisknownas?a.multicastb.broadcastc.unicastd.polling

A

A: Multicast is a type of network transmission that originates from a single source but is directed toward multiple specific destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

28.WhatLANmediaaccessmethodcanbeusedtoconnectsystemsupto2kmapart,supporttransmissionratesupto100MBps,ishighlyresistanttoelectromagneticandradiofrequencyinterference,andisoftenusedtoconnectseveraldifferenttypesofnetworks?a.GigabitEthernetb.FiberDistributedDataInterface(FDDI)c.CopperDistributedDataInterface(CDDI)d.AsynchronousTransferMode(ATM)

A

B: Fiber Distributed Data Interface (FDDI) is a LAN media access method can be used to connect systems up to 2 km apart, support transmission rates up to 100MBps, is highly resistant to electromagnetic and radio frequency interference, but which does not use virtual circuits. FDDI is a two-ring based token-passing media access topology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

29.Whichofthefollowingisnotavalidreasontodeployanetwork?a.shareresourcesb.enablecommunicationsbetweensystemsc.increasesecurityd.centralizeadministration

A

C: Networks are inherently less secure than stand alone systems. Therefore, deploying a network is a reduction in security, not an improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

30.Whatcategoryoftwistedpaircablingisratedtosupport1Gbpsofthroughput?a.Cat1b.Cat3c.Cat5d.Cat7

A

D: Cat 7 cable is rated for 1Gbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

31.AnetworkengineercreatesasinglenetworkbyconnectingthehubofoneofficefloortoanotherhubonanotherfloorusingaheavilyinsulatedCAT5cable.Oneofficeisonthefirstfloor,theotherisonthe48thfloor.Thesystemsarefullycompatible,butcommunicationsbetweenthetwofloorsoverthenetworkconnectionisverypoor.Whatismostlikelythecauseofthis?a.attenuationb.noisec.crosstalkd.protocolmismatch

A

A: Attenuation is the loss of signal strength caused by excessive cable length. This situation is most likely caused by attenuation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

32.Whyshouldplenumcablebeusedwhenwiringanewsecurefacility?a.itpreventswiretappingb.itwon’tproducetoxicfumeswhenburnedc.itincreasesthethroughputcapacityoftheITinfrastructured.itislessexpensivethanotheralternatives

A

B: Plenum cable should be used when wiring any facility since it won’t produce toxic fumes when burned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

33.Whichofthefollowingstatementsisnottrueregardingasynchronoustransmissions?a.receivermustalwaysbeinthereadytoreceivestateb.usedprimarilyforsmallamountsofdatac.timedtoaclockingmechanismd.oftenusesstopandstartdelimiterbits

A

C: Synchronous transmissions uses a clocking mechanism, asynchronous transmissions do not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

34.Whattypeoffirewallcreatesavirtualcircuitbetweentheworkstation/clientsystemandtheserver?a.astaticpacketfilteringfirewallb.astatefulinspectionfirewallc.akernelproxyfirewalld.asecondgenerationfirewall

A

D: A second generation firewall (an application level firewall, an application layer gateway, a circuit level firewall, a proxy server) creates a virtual circuit between the workstation/client system and the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

35.Whichofthefollowingisnotatruestatementaboutthirdgenerationfirewalls?a.theyoffersignificantlydecreasedperformanceb.theyarestatefulinspectionfirewallsc.theyoperateatthenetworklayerd.theyexaminethestateandcontentofdata

A

A: Third generation firewalls, or stateful inspection firewalls, offer improved performance over first and second generation firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

36.Adynamicpacketfilteringfirewallisknownaswhatgenerationoffirewall?a.fifthb.fourthc.thirdd.second

A

B: A fourth generation firewall is a dynamic packet filtering firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

37.Whatnetworkdeviceisusedspecificallytosafeguardagainstattenuation?a.hubb.bridgec.repeaterd.router

A

C: A repeater is a network device used specifically to safeguard against attenuation. Repeaters operate at layer 1 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

38.Whichofthefollowingnetworkdevicesoperatesexclusivelyatlayer3oftheOSImodel?a.bridgeb.repeaterc.switchd.router

A

D: Routers operate at layer 3 of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

39.Whatnetworkdevicecanbeusedtolinktwoormorenetworkstogethereveniftheyusedifferenttopologies?a.gatewayb.hubc.bridged.repeater

A

A: A gateway can link two or more networks together even if they use different topologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

40.Whichofthefollowingisnottrueinregardstoascreened-hostorsacrificial-hostfirewall?a.usespacketfilteringb.providesnetworkandapplicationlayerfilteringc.usesabastionhostd.isafirstgenerationfirewall

A

D: A screened-host or sacrificial-host firewall is NOT a first generation firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

41.Whichofthefollowingisnotavalidnameordesignationforanapplicationlevelfirewall?a.proxyserverb.circuitlevelfirewallc.adynamicfirewalld.secondgenerationfirewall

A

C: An application level firewall or application layer gateway is not a dynamic firewall, it is a static firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

42.Abenefitofusingnetworkaddresstranslationis?a.proxyservicesb.privateIPaddressesc.trafficthrottlingd.packetfiltering

A

B: NAT allows private IP addresses to be used in a private network and still support communications with the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

43.Networkaddresstranslationcanalsobereferredtoas?a.redirectionb.trafficroutingc.IPmaskingd.virtualcircuits

A

C: IP masking is another name for NAT. NAT masks the assigned IP address of its internal clients from all external users and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

44.WhichofthefollowingisnotoneofthesevenoriginaltopleveldomainnamesusedontheInternet?a..edub..milc..orgd..biz

A

D: .biz is not one of the seven original top-level domain names used on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

45.Ahostsystemcanbeafirewallifallbutwhichofthefollowingaretrue?a.twoNICsarepresenteachinadifferentnetworkb.thesameprotocolisusedonbothnetworksc.thesamenetworktopologyisusedonbothnetworksd.IPforwardingisdisabled

A

C: The connected networks need not use the same networking topology. As long as the NICs support the correct topology and the networks use the same protocol, a host server can act as a firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

46.ADMZordemilitarizedzoneisusedinanetworkingcontextforwhatprimarypurpose?a.toallowsystemsintheDMZtobeeasilyaccessedbyInternetusersb.toprovideameansbywhichaprivatenetworkcanbeconnectedtotheInternetc.toenableVPNconnectionsfromremoteusersd.toprovideahigherlevelofsecurityfortheprivatenetwork

A

D: to provide a higher level of security for the private network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

47.WhatnetworkingmechanismisusedtoallowcommunicationsfromaprivatenetworktotheInternettooccurwithoutenablingInternetuserstoinitiatecommunicationsorextractinternalnetworkconfigurationinformationfromtheinteractions?a.networkaddresstranslationb.routerc.firewalld.virtualprivatenetworking

A

A: Network address translation (NAT) allows private network clients to initiate communications with Internet services, but it does not allow Internet users to initiate communicates into the private network nor to extract network configuration information about the private network from any communications intercepted by external users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

48.Thefirstpacketswitchingnetworkwas?a.Framerelayb.X.25c.ATMd.SMDS

A

B: X.25 was the first packet switching network.

49
Q

49.InwhatmodeofaVPNisthedatacontainedintheIPpacketencryptedbuttheheaderoftheIPpacketisnotencrypted?a.tunnelb.headerthroughputc.transportd.linkhop

A

C: In a VPN in transport mode the data contained in the IP packet encrypted but the header of the IP packet is not encrypted.

50
Q

50.Thecountrycodesorgeographictop-leveldomainnamesarestandardized________characternames.a.2b.3c.4d.5

A

A: The country codes or geographic top-level domain names are standardized 2 character names.

51
Q

51.SynchronousOpticalNetwork(SONET)arecommonlyusedformetropolitanareanetworks(MAN).SONEToffersthebenefitofself-healingbecauseof?a.itsuseoffiberopticcableb.itsuseofredundantringsc.itsuseoftokenpassingd.itssupportofnumerousprotocoltypes

A

B: SONET is self-healing due to its use of redundant rings.

52
Q

52.Whichofthefollowingisnottrueforcircuitswitchingnetworks?a.usesphysicalpermanentconnectionsfromonepointtoanotherb.hasasingleswitchedcommunicationpathc.routesdatabasedonbestpathavailabled.isprimarilyvoiceoriented

A

C: Packet switching networks route data based on best path available.

53
Q

53.Whichofthefollowingisnottrueforpacketswitchingnetworks?a.transmitburstyorinconsistentlevelsoftrafficb.incorporatesvariabledelaysinthetransmissionofdatac.issensitivetothelossofdatad.isconnectionoriented

A

D: Circuit switching networks are connection oriented. Packet switching networks are connectionless.

54
Q

54.PasswordAuthenticationProtocol(PAP)isanauthenticationmechanismsupportedbymostremoteaccessservices.However,whyshouldPAPbeavoided?a.widerangeofcompatibilityb.usedonlybyremoteaccesssystemsc.requiresacertificateauthoritytofunctiond.transmitslogoncredentialsinplaintext

A

D: PAP transmits logon credentials in plain text and therefore provides no security or protection for the username and password. For this reason, PAP should be avoided. Challenge Handshake Authentication Protocol (CHAP) should be used instead.

55
Q

55.WhatRAIDlevelisbasicmirroring?a.RAID1b.RAID3c.RAID5d.RAID6

A

A: RAID 1 is basic mirroring.

56
Q

56.Whichofthefollowingisnotaformofserverfaulttolerance?a.DNSroundrobinpointingtoduplicateserversb.automatedbatchdumptoanofflineserverc.amirroredpairofserverswithhotrollovercapabilityd.serverclustering

A

B: Automated remote journaling to an offline server provides for a backup of a server, but it does not offer fault tolerance. If the primary server goes down, there is no means by which the backup server can be quickly and easily brought back online to support the network activities.

57
Q

57.WhichofthefollowingisnottrueinregardstoLayer2TunnelingProtocol(L2TP)?a.enablesasinglepointtopointconnectionb.operatesattheDataLinklayerc.supportstheencryptionofmultipleprotocolsd.usesPPPauthenticationandencryptionservices

A

D: PPTP (Point to Point Tunneling Protocol) uses PPP authentication and encryption services. L2TP uses IPSec.

58
Q

58.WhichofthefollowingisnottrueaboutIPSec?a.BuiltintoallversionsofTCP/IPb.EncryptsandauthenticatesIPdatac.Isusedtoestablishnetworktonetworkconnectivityd.Supportsmultiplesimultaneoustunnels

A

A: IPSec is built into IPv6, but not the currently used IPv4. However, add-ons by many OSes enable IPSec to be used over IPv4.

59
Q

59.Whichofthefollowingisnotavalidremoteaccesssecuritymethodforauthenticatingconnectingusers?a.CallerIDb.Digitalsignaturesc.Callbackd.RestrictedAddress

A

B: Digital signatures is not a valid remote access security method for authenticating connecting users. Digital signatures are used to verify the identity of the source of a transmission, they are not used in the authentication process.

60
Q

60.Inordertoprovidethemostsecureremoteaccessauthenticationmethodfordial-upclients,whichofthefollowingmechanismsshouldyouconfigureandenforce?a.nocallbackb.callbacktoauserprovidednumberc.callbacktoapredeterminednumberd.multilinkcallback

A

C: Using callback to a predetermined number is the most secure option. Ways to attack a predetermined callback is to hack the phone company and hijack a phone number or to use call forwarding at the predetermined number site.

61
Q

61.Whichofthefollowingnetworktopologiesistheleastfaulttolerant?a.Ethernetb.FDDIc.TokenRingd.FrameRelay

A

C: Token Ring is not fault tolerant. Its single ring design is a single point of failure.

62
Q

62.Whichofthefollowingisnotabackuptapemanagementscheme?a.Grandfather,father,sonb.Six-cartridgeweeklybackupprinciplec.PillarofAbsolomd.TowerofHanoi

A

C: Pillar of Absolom is not a commonly used backup tape management scheme. It is a fake distracter.

63
Q

63.Whichofthefollowingbackupmethodsdoesnotresetthearchivebitandbacksupalldatachangedsincethelastfullorincrementalbackup?a.Fullb.Dailyc.Incrementald.Differential

A

D: A differential backup does not reset the archive bit. A differential backup is used to backup all new data since the last full, daily, or incremental backup.

64
Q

64.Whatisalwaystrueaboutusingabackupmediasystemforprotectingdata?a.someamountofdataisalwayslostwhentheprimarysourcefailsb.transferratesarealwaysfasterthannormalnetworkconnectivityc.thetimerequiredtoperformbackupsdecreasesastheamountofdataincreasesd.thenumberofbackupmediasneededtoperformabackupdecreasesastheamountofdataincreases

A

A: Some data lost always occurs when the primary source fails because there is always a time lag between the last backup and the failure when data changes have occurred which are not stored on the backup media.

65
Q

65.Whatisthemostcommoncablingfailurefortwistedpaircabling?a.terminationb.excesscablelengthc.audiointerferenced.installation

A

B: Excess cable length is a common cabling failure for twisted pair cabling.

66
Q

66.WhatprotocolisareplacementforPPTP(PointtoPointTunnelingProtocol)asusedinVPNs(VirtualPrivateNetworks)?a.CHAPb.L2TPc.PPPd.HDLC

A

B: L2TP or Layer 2 Tunneling Protocol is the replacement for PPTP in VPNs.

67
Q

67.Whatnetworkdevicecanbeusedasaboundaryprotectionandsecuritymechanism?a.bridgeb.routerc.firewalld.switch

A

C: A firewall is a network device used as a boundary protection and security mechanism.

68
Q

68.WhichofthefollowingisatechnologythatfunctionsatLayer1oftheOSImodel?a.SMTPb.UDPc.ARPd.Ethernet

A

D: Ethernet operates at Layer 1 (Physical) of the OSI model.

69
Q

69.Whichofthefollowingisnotaformofdenialofserviceattack?a.sendingavictimlargee-mailattachmentsb.taskingallTCPportsforillegitimatetrafficc.submittingalargestreamoffragmentedIPpacketstoasystemd.attemptingtobreakalogonusingabruteforcepasswordattack

A

D: Attempting to break a logon using a brute force password attack is an intrusion attack or a password attack, it is not considered a denial of service attack.

70
Q

70.Whichofthefollowingdenialofserviceattacksrequiresthreecomponents(sourcesite,bouncesite,andtargetsite)tolaunchtheattack?a.Smurfb.PingofDeathc.SYNfloodd.Teardrop

A

A: A smurf attack requires the three components of a source site, bounce site, and target site to perpetrate its attack. A smurf attack sends a spoofed ping to the broadcast address of a high-volume bounce site that responds with a large flood to the target site.

71
Q

71.Whatnetworkingdeviceisprimarilysoftwareandcanbeusedtoconnectnetworksthatusedifferenttopologies?a.gatewayb.switchc.routerd.bridge

A

A: A gateway is a networking device that is primarily software and can be used to connect networks that use different topologies.

72
Q

72.WhatlayeroftheOSImodelprovidesend-to-endconveyanceservicesandestablishesalogicalconnectionbetweenserverandclient?a.presentationb.transportc.networkd.datalink

A

B: The transport layer of the OSI model provides end-to-end conveyance services and establishes a logical connection between server and client.

73
Q

73.Firewallsofferthebestcontroloversecurityandtrafficwhencombinedwith?a.routersb.bridgesc.hubsd.repeaters

A

A: Firewalls offer the best control over security and traffic when combined with routers. Routers include some access control and traffic filtering capabilities that complement the security features of a firewall.

74
Q

74.WhichofthefollowingisunaffectedbyRFIandEMI?a.coaxb.fiberopticc.twistedpaird.shieldedtwistedpair

A

B: Fiber optic is the only form of cabling which is resistance to all forms of EMI and RFI.

75
Q

75.TheTCP/IPprotocolstackorprotocolmodel,unliketheOSImodel,contains______________layers.a.8b.5c.4d.7

A

C: The TCP/IP protocol stack or protocol model contains 4 layers.

76
Q

76.Whatnetworkingdevicepreventsbroadcaststorms?a.repeaterb.hubc.bridged.switch

A

D: Switches block broadcast storms.

77
Q

77.RG58cablingisalsoknowas?a.ThickNetb.FiberOpticc.Twistedpaird.ThinNet

A

D: RG58 cable is also known as ThinNet.

78
Q

78.Cablenoiseisnotcausedby?a.Lengthofcableb.Motorsc.Heatersd.Florescentlighting

A

A: Attenuation is caused by too long of a cable, not noise.

79
Q

79.Whatisthelossofsignalstrengthcausedbythelengthofthecable?a.Crosstalkb.Attenuationc.Noised.Encryption

A

B: The loss of signal strength caused by the length of the cable is attenuation.

80
Q

80.ThetotalnumberofportsavailablewithinTCP/IPforcommunicationsessionsis?a.2b.1024c.65,536d.130,072

A

D: TCP/IP includes both TCP and UDP, both of which have 65,536 available ports. Thus the total number of ports is 130,072.

81
Q

81.Whatprotocolisusedinadisklessworkstationenvironmenttoinitiatethestartupprocessofterminals?a.BootPb.XWindowsc.LPDd.TFTP

A

A: BootP or bootstrap protocol is used in a diskless workstation environment to initiate the startup process of terminals.

82
Q

82.ThinNetcablingisalsoknownas?a.CAT5b.RG-58c.Twistedpaird.Plenum

A

B: ThinNet coax cabling is also known as RG-58 cabling.

83
Q

83.ACAT5cableisabletosupportnetworkcommunicationsuptowhatspeed?a.10Mbpsb.32Mbpsc.100Mbpsd.512Mbps

A

C: CAT 5 cable can support speeds up to 100Mbps.

84
Q

84.Whichofthefollowingstatementsistrueinregardstobroadbandcommunicationsorconnectivity?a.AnexampleofbroadbandisEthernet.b.Broadbandusestheentirecabletosupportasingletransmission.c.Broadbandcancarryseveralchannelssimultaneously.d.Broadbandisusuallyslowerthanbaseband.

A

C: Broadband can carry several channels simultaneously.

85
Q

85.EthernetisanexampleofwhichofthefollowingLANtechnologies?a.CSMAb.CSMA/CCc.CSMA/CAd.CSMA/CD

A

D: Ethernet is an example of CSMA/CD (Carrier-Sense Multiple Access, Collision Detection).

86
Q

86.WhatcablingtypeisleastvulnerabletocrosstalkandEMinterference?a.Fiberopticb.ThinkNetc.10Base2d.100BaseT

A

A: Fiber optic is least vulnerable to cross talk and EM interference.

87
Q

87.Whattypeofcablehasthemostproblemswithcrosstalk?a.ThickNetb.FiberOpticc.Twistedpaird.Shieldedcopper

A

C: Twisted pair has the most problems with crosstalk since it is typically not shielded.

88
Q

88.Whattypeorratingofcablingisspecificallydesignedtopreventtheproductionoftoxicfumeswhenburned?a.PVCb.Coaxc.Aluminumwrappedd.Plenum

A

D: Plenum is the cabling type or rating that is design to prevent the release of toxic fumes when burned.

89
Q

89.Adigitalsignalisindicatedbywhichofthefollowing?a.Linevoltagebeingonoroffb.Changeintheamplitudeofasignalc.Changeinthefrequencyofasignald.Achangeinthestrengthofthesignal

A

A: Digital transmission is identified by the line voltage being on or off.

90
Q

90.Whichofthefollowingisnottrueinregardstomodemsbasedonasynchronouscommunications?a.Datacanbesentatanytime,sothereceivermustalwaysbereadytoacceptincomingsignalsb.Dataissentonlyatspecifiedintervalsbasedonaclockingmechanismc.Usedforthetransmissionofsmallamountsofdatad.Startandstopdelimiterbitsarerequired

A

B: This is not true for modem communications, which are asynchronous. This is true of synchronous communications.

91
Q

91.Whichofthefollowingcanbeusedtosupportcommunicationsbetweentwonetworksthatemploydifferenttopologies?a.Bridgeb.Switchc.Repeaterd.Gateway

A

D: A gateway is used to support communications between two networks using different protocols.

92
Q

92.Ascreened-hostfirewallisalsoknownas?a.Afirstgenerationfirewallb.Asecondgenerationfirewallc.Athirdgenerationfirewalld.Afourthgenerationfirewall

A

B: A screened-host firewall is also known as a second generation firewall.

93
Q

93.Whichofthefollowingcreateasinglepointoffailure?a.Anetworkdeviceb.AmeshedEthernetnetworkc.FDDId.FrameRelayclouds

A

A: A network device is always a single-point of failure.

94
Q

94.Whichofthefollowingnetworkdevicesisdesignedtocompensateforattenuation?a.Routerb.Repeaterc.Switchd.NetworkInterfaceCard

A

B: A repeater is designed to compensate for attenuation by strengthening the signal before re-transmitting it.

95
Q

95.Whichofthefollowingdevicesblocksbroadcaststorms?a.Bridgeb.Hubc.Routerd.Repeater

A

C: A router blocks broadcast storms from traveling from one subnet to another.

96
Q

96.Whichofthefollowingisnotapacketswitchingsystem?a.TheX.25networkb.Thetelephonenetworkc.FrameRelaynetworksd.SMDSnetworks

A

B: The telephone network is a circuit switching, not packet switching, network.

97
Q

97.TheTowerofHanoiisanameassignedtowhat?a.Atapebackuprotationschemeb.AfaulttolerantRAIDconfigurationc.Aschemefordeployingfirewallsinascreenedtreed.Amethodfordetectingintrusionsthroughaccesslogs

A

A: The Tower of Hanoi is a tape backup rotation scheme.

98
Q

98.WhichofthefollowingdescribesaSmurfattack?a.Verylargee-mailattachmentsaresenttothevictimse-mailaddressb.ContinuallypollingallpossibleTCPandUDPportstopreventlegitimateconnectionsc.SendingnumerousSYNpacketstoaserverandnotreplyingtotheresultantSYN/ACKpackets.d.Apingpacketwithaspoofedaddressissenttoabroadcastaddress,thiscausesalargenumberofbouncedmessagestofloodthevictim

A

D: This is a Smurf DoS attack.

99
Q

99.Whatistheprimarypurposeofafirewall?a.Blockvirusattacksb.Filtertrafficc.Preventdenialofserviceattacksd.Trackuseractivity

A

B: The primary purpose of a firewall is to filter traffic based on the requirements of the security policy.

100
Q

100.Whattypeofleasedlineoffersdigitalsignalsatupto44.736Mbps?a.T1b.E3c.DS-3d.OC-1

A

C: A DS-3 also known as a T3 offers digital signals at up to 44.736Mbps.

101
Q

101.Acircuitlevelfirewallisavariationofwhattypeoffirewall?a.Dynamicpacketfilteringfirewallb.Screened-hostfirewallc.Statefulinspectionfirewalld.Packetlevelfirewall

A

B: A circuit level gateway is a variation of a screened host firewall.

102
Q

102.Whichofthefollowingisnotoneofthesevenoriginalgenerictopleveldomainnames?a..webb..educ..govd..mil

A

A: The original seven top level domain names are .com, .edu, .gov, .mil, .net, .org, and .int.

103
Q

103.InwhatIPSecVPNmodeistheoriginalIPpacketheaderencryptedandanewVPNspecificheaderisadded?a.Tunnelmodeb.Traversemodec.Transportmoded.Networkmode

A

A: In the IPSec VPN tunnel mode, the original IP packet header encrypted and a new VPN specific header is added.

104
Q

104.WhichofthefollowingisnottrueregardingVPNs?a.VPNsestablisharemoteaccesslinkthatallowstheremoteclienttoperformthesamefunctionsasifitwasconnectedwithanormalnetworkcable.b.VPNsoffercheapconnectionmechanismforgeographicallydistantlocations.c.VPNsprovideadirectcommunicationpathwaybetweentwosystemsoverapublicorprivatenetwork.d.VPNsmustalwaysuseencryption.

A

D: VPNs may or may not use encryption. Encryption is not a requirement for a VPN.

105
Q

105.Whichofthefollowingisnotacharacteristicofcircuitswitching?a.Constanttrafficb.Sensitivetolossoftheconnectionc.Voiceorientedd.Connectionless

A

D: Circuit switching is connection oriented.

106
Q

106.Aproxyserverisaformofwhattypeoffirewall?a.Packetfilteringb.Statefulinspectionc.ApplicationGatewayd.DynamicPacketFiltering

A

C: A proxy server is a form of application gateway firewall.

107
Q

107.Whattypeofbackupcopiesonlythefilesthathavechangedsincethelastbackupandwhichresetsthearchivebit?a.Fullbackupb.Incrementalc.Copyd.Differential

A

B: An incremental backup copies only the files that have changed since the last backup and resets the archive bit.

108
Q

108.Whichofthefollowingisnotconsideredaremoteaccessconnectiontype?a.ISDNb.VPNc.HSSId.DSL

A

C: HSSI or High Speed Serial Interface is not a remote access connection type, rather it is used to connect a remote access connection device or a router/switch to a computer system.

109
Q

109.BothPPTPandL2TPVPNprotocolsoperateatwhatlayeroftheOSImodel?a.Networklayerb.Datalinklayerc.Transportlayerd.Sessionlayer

A

B: PPTP and L2TP operate at the data link layer (layer 2).

110
Q

110.Whichofthefollowingisthemostcriticalconfigurationsettingforadual-homedhostfirewall?a.Disablingpacketforwardingb.UsingDHCPassignedIPaddressesoneachinterfacec.Usingthesamenetworktechnologiesoneachinterfaced.AssignbothinterfacesanIPaddresswithinthesamesubnet

A

A: Disabling packet forwarding is the most important configuration of a dual-homed host firewall. If this setting is not made, then traffic can easily bypass the firewall’s restrictions by employing the host system’s OS as a router.

111
Q

111.WhichofthefollowingisnotabenefitofNAT?a.NATisusedtohidetheinternalnetworkstructurefromtheexternalnetworkb.NATisusedtograntInternetaccesstoalargernumberofinternalclientsthanthereareexternalInternetIPaddressesc.NATrestrictstraffictorequestresponsesonlyd.NATisusefulagainstblockinge-mailbornviruses

A

D: NAT is not useful against blocking e-mail born viruses.

112
Q

112.WhattypeoffailuredoallcomponentsofanITinfrastructurehaveincommon?a.Virusinfectionb.Powerlossc.Corrupteddriverupdated.Poorphysicalconnection

A

B: Power loss is the one type of failure that all IT components share.

113
Q

113.WhyisthePAPremoteaccessauthenticationprotocolconsideredweak?a.ItprovidesamechanismfortransmittingboththeuserIDandtheauthenticationpasswordb.Itemploysaone-wayhashalgorithmtoprotectlogoncredentialsc.Ittransmitstheauthenticationcredentialsincleartextd.ItissupportedexclusivelybyWindowsoperatingsystems

A

C: PAP is considered weak because it transmits credentials in clear text.

114
Q

114.WhatlevelofRAIDemploysstripingwithinterleaveparitytoprovidefaulttoleranceandoftensupportshotswappabledrives?a.RAID0b.RAID1c.RAID3d.RAID5

A

D: RAID 5 is striping with interleave parity.

115
Q

115.Whichofthefollowingisusedprimarilybynon-Windowssystems?a.Dynamicpacketfilteringfirewallsb.Kernelproxyfirewallsc.SOCKSfirewallsd.Applicationgatewayfirewalls

A

C: SOCKS firewalls are used primarily by non-Windows systems. Windows systems employ WinSOCK firewalls.

116
Q

116.Whatisthemostcommonformoffailureforfiberopticcabling?a.Excesslengthdeployedb.EMinterferencec.Insufficientbandwidthd.Terminationfailure

A

D: Termination failure or an installation failure is the most common fault with fiber optic cabling.

117
Q

117.Whichofthefollowingisnotacommonproblemwithbackupsolutions?a.Thelengthoftimerequiredtocreateabackupincreasesovertimeb.Theamountofbackupmediaspacerequiredtocompleteabackupincreasesovertimec.Backupsoffer100%reliableformsofinsuranceagainstviruscorruptiond.Somedatalossisalwaysexperiencedwhenabackupisusedtorestoreafailedserver

A

C: Backups do not offer a 100% reliable form of insurance against virus corruption. Virus corruption can still occur, if it is not detected and manage in time, the corrupted version may be stored in the backup set. Backup restorations are not always successful.

118
Q

118.TheDNSserviceisusedtoperformwhatoperation?a.ResolveIPaddressesintoMACaddressesb.ResolvedomainnamesintoIPaddressesc.ResolvedomainnamesintoMACaddressesd.ResolveNetBIOSnamesintoIPaddresses

A

B: DNS is used to resolve domain names into IP addresses.