Book-Cards-Pt2 - Sheet 1 Flashcards

(74 cards)

1
Q

qtext

A

answer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The length of time a computer is allowed to use a dynamic Internet Protocol (IP) address provide by a DHCP server is known as a .

A

Lease time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True/False: A network collision happens when two devices attempt to communicate on the same physical segment at the same time.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True/False: A firewall can permit, deny, encrypt, decrypt, and proxy all computer traffic that flows through it.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True/False: Firewalls are not usually a combination of hardware and software.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of security device or software employs a redirection device known as a honeypot?

A

Intrusion prevention system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of firewall keeps track of existing connections passing through it?

A

Stateful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If you wanted to ensure that your firewall could block inflammatory email, which type of service would you look for?

A

Content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a firewall’s list of rules, which it uses to block traffic?

A

Access control list (ACL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you want to allow remote access to 500 users, which type of device is recommended?

A

A VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a security zone that allows public traffic but is isolated from the private network called?

A

DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which unsecure protocol uses port 80 by default?

A

HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is 192.168 in binary?

A

11000000.10101

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port number does Secure Shell (SSH) use by default?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Logging, notification, and shunning are what types of reactions from what type of security device?

A

Passive reactions from an IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: A demilitarized zone (DMZ) is a network segment that is neither public nor local, but halfway between.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You add a new cable to your network. What document do you update?

A

Wiring schematics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

True/False: An intrusion detection system replaces a firewall on your network.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True/False: An intrusion detection system (IDS) can detect attacks within encrypted traffic.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True/False: An intrusion detection system (IDS) monitors network traffic, looking for signs of an intrusion.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

192.168.10.0/28 is an example of which kind of notation?

A

CIDR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which terminal emulation program is insecure because it does not encrypt any data, including usernames and passwords?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which network topology has the most physical connections per host, which means it will have the least collisions?

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In a Class C address, a network ID is how many bits?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
100BaseTF uses what type of cable medium?
Ethernet over fiber
26
True/False: A multimode fiber-optic cable (MMF) is terminated on a punch-down block.
FALSE
27
A UTP cable running 1000Mbps can be a maximum distance of                                       .
100 meters
28
How can you verify that your DMZ is allowing TCP ports through?
Telnet to the ports in question on the DMZ server.
29
True/False: A dipole is an omnidirectional antenna.
TRUE
30
True/False: A parabolic is a type of omnidirectional antenna.
FALSE
31
A network administrator is going to implement a packet filter on a network for Internet connections. What port must be allowed through the firewall for users to connect to secure websites?
443
33
True/False: A repeater can be used to cache web pages for future retrieval.
FALSE
34
True/False: A proxy service can be used to cache web pages for future retrieval.
TRUE
35
What device can measure the time a signal goes down and back a cable?
TDR
36
What device connects a local area network (LAN) to a T1 circuit?
Channel service unit/data service unit (CSU/DSU)
37
An OTDR is used to test what?
Fiber
38
When all routers in an autonomous system agree about the path from one point to another, the network is said to be what?
Converged
39
Which two protocols allow secure access to a VPN?
PPTP and IPSec
40
What tool is used to connect an RF-45 to a UTP?
Crimper
41
What wire pairs connect to a 66-block from the telecommunication company?
25 pair
42
Implementing policies and procedures that define how corporate information is kept confidential and training employees on these procedures can help prevent what?
Social engineering
43
At what layer of the Open Systems Interconnect (OSI) model does a router function?
Network
44
Which TCP/IP well-known port number identifies Simple Mail Transfer Protocol (SMTP)?
25
45
Which routing protocol uses a next hop as a metric in deciding how to route traffic?
RIP
46
True/False: 156.144.226.123 is a valid IP address.
TRUE
47
Which device monitors inbound and outbound network connections in order to identify suspicious activity?
IDS
48
True/False: The Transport layer converts digital data into electronic signals to be put on a wire.
FALSE
50
True/False: Internet Protocol Security (IPSec) encrypts data between web browsers and web servers.
FALSE
51
Which device or software can identify and react to an attack by shutting down a port or dropping certain types of packets?
IPS
52
True/False: Using Domain Name Service (DNS) will segment a network.
FALSE
53
True/False: TCP is connection-oriented, and UDP is unreliable.
TRUE
54
When configuring a wireless access point, what should you considering when selecting a channel?
Select a channel farthest from that of any other AP in the area.
55
What does SNMP provide?
Automated alerts and reports on network devices.
56
Your boss tells you to block certain ports on your firewall. What documentation do you need to update?
Policies, procedures, and configurations
57
You need to provide inter-VLAN communication. What device do you need?
A Layer 3 switch (router).
58
True/False: Antivirus (AV) software will help protect a computer from hackers.
FALSE
59
True/False: Antivirus (AV) software will help protect a computer from Trojan horses.
TRUE
60
A packet-filtering firewall operates at which layers of the OSI model?
Network and Transport
61
True/False: A packet-filtering firewall operates at the Network and Data Link layers of the OSI model.
FALSE
62
Which networking topology connects computers via a central device?
Star
63
True/False: A ring networking topology connects computers via a central hub.
FALSE
64
True/False: A cable modem selectively forwards data packets.
FALSE
65
True/False: A bridge can selectively forward data packets.
TRUE
66
True/False: A bridge is a network device that operates at Layer 2 of the OSI model.
TRUE
67
True/False: A switch is a network device that operates at Layer 2 of the OSI model.
TRUE
68
True/False: A hub and a repeater operate at Layer 2 of the OSI model.
FALSE
69
True/False: A hub and a switch operate at the same layer of the OSI model.
FALSE
70
True/False: A hub and router operate at the same layer of the OSI model.
FALSE
71
True/False: A router and a bridge operate at the same layer of the OSI model.
FALSE
72
What is 01100011.00011010 in decimal?
99.26
73
A company wants to have an intranet. Where would the intranet web server be located in the network?
In the local area network (LAN), usually behind the firewall to the WAN
74
True/False: A network administrator wants all computers protected from Trojan horses and worms. Implementing a firewall will accomplish this requirement.
FALSE
75
HTTPS uses what TCP destination port number?
443
76
True/False: Virtual local area networks (VLANs) create collision domains.
FALSE