Book-Cards-Pt2 - Sheet 1 Flashcards

1
Q

qtext

A

answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The length of time a computer is allowed to use a dynamic Internet Protocol (IP) address provide by a DHCP server is known as a .

A

Lease time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False: A network collision happens when two devices attempt to communicate on the same physical segment at the same time.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False: A firewall can permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False: Firewalls are not usually a combination of hardware and software.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of security device or software employs a redirection device known as a honeypot?

A

Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of firewall keeps track of existing connections passing through it?

A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

A

Content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a firewall’s list of rules, which it uses to block traffic?

A

Access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you want to allow remote access to 500 users, which type of device is recommended?

A

A VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a security zone that allows public traffic but is isolated from the private network called?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which unsecure protocol uses port 80 by default?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 192.168 in binary?

A

11000000.10101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port number does Secure Shell (SSH) use by default?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Logging, notification, and shunning are what types of reactions from what type of security device?

A

Passive reactions from an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: A demilitarized zone (DMZ) is a network segment that is neither public nor local, but halfway between.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You add a new cable to your network. What document do you update?

A

Wiring schematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True/False: An intrusion detection system replaces a firewall on your network.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True/False: An intrusion detection system (IDS) can detect attacks within encrypted traffic.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True/False: An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

192.168.10.0/28 is an example of which kind of notation?

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which terminal emulation program is insecure because it does not encrypt any data, including usernames and passwords?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which network topology has the most physical connections per host, which means it will have the least collisions?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a Class C address, a network ID is how many bits?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

100BaseTF uses what type of cable medium?

A

Ethernet over fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A UTP cable running 1000Mbps can be a maximum distance of .

A

100 meters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How can you verify that your DMZ is allowing TCP ports through?

A

Telnet to the ports in question on the DMZ server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

True/False: A dipole is an omnidirectional antenna.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

True/False: A parabolic is a type of omnidirectional antenna.

A

FALSE

31
Q

A network administrator is going to implement a packet filter on a network for Internet connections. What port must be allowed through the firewall for users to connect to secure websites?

A

443

33
Q

True/False: A repeater can be used to cache web pages for future retrieval.

A

FALSE

34
Q

True/False: A proxy service can be used to cache web pages for future retrieval.

A

TRUE

35
Q

What device can measure the time a signal goes down and back a cable?

A

TDR

36
Q

What device connects a local area network (LAN) to a T1 circuit?

A

Channel service unit/data service unit (CSU/DSU)

37
Q

An OTDR is used to test what?

A

Fiber

38
Q

When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?

A

Converged

39
Q

Which two protocols allow secure access to a VPN?

A

PPTP and IPSec

40
Q

What tool is used to connect an RF-45 to a UTP?

A

Crimper

41
Q

What wire pairs connect to a 66-block from the telecommunication company?

A

25 pair

42
Q

Implementing policies and procedures that define how corporate information is kept confidential and training employees on these procedures can help prevent what?

A

Social engineering

43
Q

At what layer of the Open Systems Interconnect (OSI) model does a router function?

A

Network

44
Q

Which TCP/IP well-known port number identifies Simple Mail Transfer Protocol (SMTP)?

A

25

45
Q

Which routing protocol uses a next hop as a metric in deciding how to route traffic?

A

RIP

46
Q

True/False: 156.144.226.123 is a valid IP address.

A

TRUE

47
Q

Which device monitors inbound and outbound network connections in order to identify suspicious activity?

A

IDS

48
Q

True/False: The Transport layer converts digital data into electronic signals to be put on a wire.

A

FALSE

50
Q

True/False: Internet Protocol Security (IPSec) encrypts data between web browsers and web servers.

A

FALSE

51
Q

Which device or software can identify and react to an attack by shutting down a port or dropping certain types of packets?

A

IPS

52
Q

True/False: Using Domain Name Service (DNS) will segment a network.

A

FALSE

53
Q

True/False: TCP is connection-oriented, and UDP is unreliable.

A

TRUE

54
Q

When configuring a wireless access point, what should you considering when selecting a channel?

A

Select a channel farthest from that of any other AP in the area.

55
Q

What does SNMP provide?

A

Automated alerts and reports on network devices.

56
Q

Your boss tells you to block certain ports on your firewall. What documentation do you need to update?

A

Policies, procedures, and configurations

57
Q

You need to provide inter-VLAN communication. What device do you need?

A

A Layer 3 switch (router).

58
Q

True/False: Antivirus (AV) software will help protect a computer from hackers.

A

FALSE

59
Q

True/False: Antivirus (AV) software will help protect a computer from Trojan horses.

A

TRUE

60
Q

A packet-filtering firewall operates at which layers of the OSI model?

A

Network and Transport

61
Q

True/False: A packet-filtering firewall operates at the Network and Data Link layers of the OSI model.

A

FALSE

62
Q

Which networking topology connects computers via a central device?

A

Star

63
Q

True/False: A ring networking topology connects computers via a central hub.

A

FALSE

64
Q

True/False: A cable modem selectively forwards data packets.

A

FALSE

65
Q

True/False: A bridge can selectively forward data packets.

A

TRUE

66
Q

True/False: A bridge is a network device that operates at Layer 2 of the OSI model.

A

TRUE

67
Q

True/False: A switch is a network device that operates at Layer 2 of the OSI model.

A

TRUE

68
Q

True/False: A hub and a repeater operate at Layer 2 of the OSI model.

A

FALSE

69
Q

True/False: A hub and a switch operate at the same layer of the OSI model.

A

FALSE

70
Q

True/False: A hub and router operate at the same layer of the OSI model.

A

FALSE

71
Q

True/False: A router and a bridge operate at the same layer of the OSI model.

A

FALSE

72
Q

What is 01100011.00011010 in decimal?

A

99.26

73
Q

A company wants to have an intranet. Where would the intranet web server be located in the network?

A

In the local area network (LAN), usually behind the firewall to the WAN

74
Q

True/False: A network administrator wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.

A

FALSE

75
Q

HTTPS uses what TCP destination port number?

A

443

76
Q

True/False: Virtual local area networks (VLANs) create collision domains.

A

FALSE